CN106203166A - A kind of auto navigation information data sharing method - Google Patents

A kind of auto navigation information data sharing method Download PDF

Info

Publication number
CN106203166A
CN106203166A CN201610538251.4A CN201610538251A CN106203166A CN 106203166 A CN106203166 A CN 106203166A CN 201610538251 A CN201610538251 A CN 201610538251A CN 106203166 A CN106203166 A CN 106203166A
Authority
CN
China
Prior art keywords
information data
navigation information
auto navigation
user
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610538251.4A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610538251.4A priority Critical patent/CN106203166A/en
Publication of CN106203166A publication Critical patent/CN106203166A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Navigation (AREA)

Abstract

The invention provides a kind of auto navigation information data sharing method, store safely including auto navigation information data and have secure access to auto navigation information data;Described auto navigation information data stores safely and comprises the following steps: (1) carries out safety verification to storage user identity;(2) auto navigation information data is carried out pretreatment;(3) encode;(4) hardware store Resource Abstract is concentrated, be mapped to a complete unified resource pool, and operating system of user is virtualized;(5) auto navigation information data is stored in resource pool with the form of final code;The secure access of described auto navigation information data comprises the following steps: (1) carries out safety verification to accessing user identity;(2) the auto navigation information data being stored on resource pool is read.The present invention can realize accessible sharing, and decreases EMS memory occupation, improves data call speed, and improves the safety that auto navigation information data is shared on the premise of ensureing convenience.

Description

A kind of auto navigation information data sharing method
Technical field
The present invention relates to auto navigation information data technical field, in particular to a kind of auto navigation information data Sharing method.
Background technology
Auto navigation information data sharing method in correlation technique can not realize safely and efficiently depositing of information of sharing Storage and the issue of shared information so that promptness and safety that auto navigation information data is shared are poor.
Summary of the invention
It is an object of the invention to provide a kind of auto navigation information data sharing method, to solve above-mentioned problem.
The purpose of the present invention realizes by the following technical solutions:
A kind of auto navigation information data sharing method, is characterized in that, including preliminary treatment, auto navigation information data peace Full storage and auto navigation information data have secure access to;
Described preliminary treatment comprises the following steps:
Auto navigation server receives the more newly downloaded request that download terminal sends;
Determine that auto navigation information data, described auto navigation information data include layering according to described more newly downloaded request The map datum of piecemeal storage;
Download described auto navigation information data from auto navigation data base and send;
Download terminal receives described auto navigation information data and processes described auto navigation information data;
Described download terminal sends auto navigation information data to car navigation terminal;
This car navigation terminal utilizes described auto navigation information data to update existing auto navigation information data.
Preferably, it is characterized in that, the detailed process that described auto navigation information data carries out processing is:
The map datum downloaded is compiled, i.e. arranges according to level and block number.
Preferably, it is characterized in that, described download terminal is the computer having information processing capability, described computer pass through because of Special net is connected with auto navigation server.
Preferably, it is characterised in that
Described auto navigation information data stores safely and comprises the following steps:
When Step 101 stores the storage request that user submits auto navigation information data to, storage user identity is pacified Full checking;
Step 102 carries out pretreatment to auto navigation information data, and auto navigation information data is divided into rudimentary knowledge With professional knowledge two types data, described rudimentary knowledge includes text and the figure that can reflect information O&M service basic condition Picture, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated auto navigation information data is used custom coding method respectively by Step 103 according to classified types Encoding, described custom coding method is as follows:
(1) using pretreated auto navigation information data as coded object, if what auto navigation information data Z comprised M attribute is S1,S2,…,Sm
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight because of Submatrix W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition RnDegree, span is [0,1];
2) defined attribute weight wi:
w i = Σ j = 1 n a i j
Attribute weight is normalized and obtains normalization attribute weight w 'i:
w i ′ = w i Σ i = 1 m w i
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
X i = 1 , w i &prime; &GreaterEqual; T 1 0 , w i &prime; < T 1
4) set up attribute and choose Optimized model:
Z = &Sigma; i = 1 m S i X i
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of auto navigation information data;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped Make system virtualization;
Auto navigation information data is stored in resource pool by Step 105 with the form of final code;
The secure access of described auto navigation information data comprises the following steps:
When Step 201 accesses the access request that user submits auto navigation information data to, pacify accessing user identity Full checking;
When Step 202 responds access request, read the auto navigation information data being stored on resource pool, particularly as follows:
(1) K-means clustering method is used all kinds of business in auto navigation information data to be divided, to any two Auto navigation information data Z in individual class1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into Ask auto navigation information data Z1Or Z2, all to auto navigation information data Z1And Z2Prefetch, wherein threshold value T2Value Scope is [m/2,3m/4];
(2) concrete auto navigation information data positional information is obtained according to cluster index;
(3) according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling.
Preferably, described to access user identity carry out safety verification, particularly as follows:
(1) provide the password code of terminal authentication access user's input and identity the most correct in local service, if Correctly, access request, password code and identity are encrypted, form ciphertext collection, and ciphertext collection is sent to knowledge clothes Business device certification end, if incorrect, returns error reporting;
(2), after knowledge services device certification end receives described ciphertext collection, correspondence is concentrated to access the password of user's input ciphertext The ciphertext of password and identity is decrypted calculating, extracts password code and the value of identity accessing user's input, so After find identity relative recording that password is decrypted calculating in authentication database, if system exist this access user Record, and the password decrypted is consistent with the password code that family inputs, then judge that described access user, as validated user, will simultaneously Fingerprint collecting instruction, ciphertext collection, this session key and an encryption session random number are sent to knowledge request user side, knowledge Server authentication end preserves identity and association key simultaneously;If there is not this user record, knowledge services device certification in system Hold and provide terminal to return error reporting to local service;
(3) instruction of described fingerprint collecting, ciphertext collection, this session key and an encryption are received when resource request user side After session random number, verify that this session key and an encryption session random number are the most correct, if correctly, send out to accessing user Go out finger print information input instruction, this session key and encryption session random number are decrypted calculating, simultaneously by identity It is sent to knowledge services device certification end after being encrypted with the finger print information of input;If it is incorrect, to knowledge services device certification end Send illegal report;
(4) during the finger print information of the identity after knowledge services device certification end receives encryption and input, after encryption The finger print information of identity and input be decrypted calculating, and the fingerprint that would correspond to identity extracts in data base Out the finger print information with input compares, if the two is identical, then responds access request, if the two differs, returns illegal Report.
Preferably, described to storage user identity carry out safety verification, particularly as follows:
(1), when local service provides terminal to receive fingerprint and the identity storing user's input, user will be stored defeated The fingerprint entered and identity are sent to knowledge store certification end after being encrypted;
(2) knowledge store certification end is decrypted calculating to fingerprint and the identity of the storage user's input after encryption, And the fingerprint that would correspond to identity extracts in data base and compares with the fingerprint storing user's input, if the two Identical, it is determined that this storage user is legal storage user, for the virtual resource that legal storage user's configuration is corresponding with storage request Pond, if incorrect, provides terminal to return error reporting to local service.
The present invention can include following beneficial effect:
1, auto navigation information data is encoded, facilitate Back ground Information and realize with all kinds of business information accessible common Enjoy;
2, according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling, subtracts Lack EMS memory occupation, improve data call speed;
3, to storage user carry out safety verification time, User Identity and finger print information the most encrypted after transmit, Not havinging plaintext version, knowledge store certification end is just true after verifying the User Identity after encryption and finger print information Whether fixed be that storage user's configuration asks corresponding virtual resource pond with storage, limits the illegal storage of disabled user, and tests Card speed is fast, further increases the safety that auto navigation information data is shared on the premise of ensureing convenience;
4, to access user carry out safety verification time, the information such as user name, password, fingerprint and session random number is all with close Literary composition form is transmitted, and does not haves plaintext version;Meanwhile, according to symmetry and the one-way hash function feature of user key, Via the user profile ciphertext of passage transmission, there is unipolarity, even data are intercepted and captured, be intended to it is cracked the most highly difficult, When taking precautions against transmission with this, user data is divulged a secret, and privacy of user can obtain guarantee, thus further increases auto navigation Information Number According to shared safety.
It should be appreciated that it is only exemplary that above general description and details hereinafter describe, can not be limited this Open.
Accompanying drawing explanation
Fig. 1 is the method flow diagram that the auto navigation information data of the present invention stores safely;
Fig. 2 is the method flow diagram of the auto navigation information data secure access of the present invention
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the present invention Example, and for explaining the principle of the present invention together with description.
Detailed description of the invention
Below by specific embodiment and combine accompanying drawing the present invention is described in further detail.
Embodiment 1
See Fig. 1, Fig. 2, the present embodiment one auto navigation information data sharing method, it is characterized in that, including tentatively locating Reason, auto navigation information data store safely and the secure access of auto navigation information data;
Described preliminary treatment comprises the following steps:
Auto navigation server receives the more newly downloaded request that download terminal sends;
Determine that auto navigation information data, described auto navigation information data include layering according to described more newly downloaded request The map datum of piecemeal storage;
Download described auto navigation information data from auto navigation data base and send;
Download terminal receives described auto navigation information data and processes described auto navigation information data;
Described download terminal sends auto navigation information data to car navigation terminal;
This car navigation terminal utilizes described auto navigation information data to update existing auto navigation information data.
Preferably, it is characterized in that, the detailed process that described auto navigation information data carries out processing is:
The map datum downloaded is compiled, i.e. arranges according to level and block number.
Preferably, it is characterized in that, described download terminal is the computer having information processing capability, described computer pass through because of Special net is connected with auto navigation server.
Preferably, it is characterised in that
Described auto navigation information data stores safely and comprises the following steps:
When Step 101 stores the storage request that user submits auto navigation information data to, storage user identity is pacified Full checking;
Step 102 carries out pretreatment to auto navigation information data, and auto navigation information data is divided into rudimentary knowledge With professional knowledge two types data, described rudimentary knowledge includes text and the figure that can reflect information O&M service basic condition Picture, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated auto navigation information data is used custom coding method respectively by Step 103 according to classified types Encode;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped Make system virtualization;
Auto navigation information data is stored in resource pool by Step 105 with the form of final code;
The secure access of described auto navigation information data comprises the following steps:
When Step 201 accesses the access request that user submits auto navigation information data to, pacify accessing user identity Full checking;
When Step 202 responds access request, read the auto navigation information data being stored on resource pool, particularly as follows:
(1) K-means clustering method is used all kinds of business in auto navigation information data to be divided, to any two Auto navigation information data Z in individual class1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into Ask auto navigation information data Z1Or Z2, all to auto navigation information data Z1And Z2Prefetch;
(2) concrete auto navigation information data positional information is obtained according to cluster index;
(3) according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling.
Auto navigation information data is encoded by the present embodiment, facilitates Back ground Information and realizes nothing with all kinds of business information Obstacle is shared;According to cluster result and auto navigation information data positional information, auto navigation information data is scheduling, subtracts Lack EMS memory occupation, improve data call speed.
Embodiment 2
See Fig. 1, Fig. 2, the present embodiment one auto navigation information data sharing method, it is characterized in that, including tentatively locating Reason, auto navigation information data store safely and the secure access of auto navigation information data;
Described preliminary treatment comprises the following steps:
Auto navigation server receives the more newly downloaded request that download terminal sends;
Determine that auto navigation information data, described auto navigation information data include layering according to described more newly downloaded request The map datum of piecemeal storage;
Download described auto navigation information data from auto navigation data base and send;
Download terminal receives described auto navigation information data and processes described auto navigation information data;
Described download terminal sends auto navigation information data to car navigation terminal;
This car navigation terminal utilizes described auto navigation information data to update existing auto navigation information data.
Preferably, it is characterized in that, the detailed process that described auto navigation information data carries out processing is:
The map datum downloaded is compiled, i.e. arranges according to level and block number.
Preferably, it is characterized in that, described download terminal is the computer having information processing capability, described computer pass through because of Special net is connected with auto navigation server.
Preferably, it is characterised in that
Described auto navigation information data stores safely and comprises the following steps:
When Step 101 stores the storage request that user submits auto navigation information data to, storage user identity is pacified Full checking;
Step 102 carries out pretreatment to auto navigation information data, and auto navigation information data is divided into rudimentary knowledge With professional knowledge two types data, described rudimentary knowledge includes text and the figure that can reflect information O&M service basic condition Picture, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated auto navigation information data is used custom coding method respectively by Step 103 according to classified types Encode;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped Make system virtualization;
Auto navigation information data is stored in resource pool by Step 105 with the form of final code;
The secure access of described auto navigation information data comprises the following steps:
When Step 201 accesses the access request that user submits auto navigation information data to, pacify accessing user identity Full checking;
When Step 202 responds access request, read the auto navigation information data being stored on resource pool, particularly as follows:
(1) K-means clustering method is used all kinds of business in auto navigation information data to be divided, to any two Auto navigation information data Z in individual class1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into Ask auto navigation information data Z1Or Z2, all to auto navigation information data Z1And Z2Prefetch;
(2) concrete auto navigation information data positional information is obtained according to cluster index;
(3) according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling.
Wherein, the custom coding method of the present embodiment is as follows:
(1) using pretreated auto navigation information data as coded object, if what auto navigation information data Z comprised M attribute is S1,S2,…,Sm
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight because of Submatrix W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition RnDegree, span is [0,1];
2) defined attribute weight wi:
w i = &Sigma; j = 1 n a i j
Attribute weight is normalized and obtains normalization attribute weight w 'i:
w i &prime; = w i &Sigma; i = 1 m w i
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
X i = 1 , w i &prime; &GreaterEqual; T 1 0 , w i &prime; < T 1
4) set up attribute and choose Optimized model:
Z = &Sigma; i = 1 m S i X i
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of auto navigation information data;
Auto navigation information data is encoded by the present embodiment, facilitates Back ground Information and realizes nothing with all kinds of business information Obstacle is shared;According to cluster result and auto navigation information data positional information, auto navigation information data is scheduling, subtracts Having lacked EMS memory occupation, improve data call speed, the present embodiment sets threshold value T2Value be m/2, data call speed carries High by 0.5%.
Embodiment 3
See Fig. 1, Fig. 2, the present embodiment one auto navigation information data sharing method, it is characterized in that, including tentatively locating Reason, auto navigation information data store safely and the secure access of auto navigation information data;
Described preliminary treatment comprises the following steps:
Auto navigation server receives the more newly downloaded request that download terminal sends;
Determine that auto navigation information data, described auto navigation information data include layering according to described more newly downloaded request The map datum of piecemeal storage;
Download described auto navigation information data from auto navigation data base and send;
Download terminal receives described auto navigation information data and processes described auto navigation information data;
Described download terminal sends auto navigation information data to car navigation terminal;
This car navigation terminal utilizes described auto navigation information data to update existing auto navigation information data.
Preferably, it is characterized in that, the detailed process that described auto navigation information data carries out processing is:
The map datum downloaded is compiled, i.e. arranges according to level and block number.
Preferably, it is characterized in that, described download terminal is the computer having information processing capability, described computer pass through because of Special net is connected with auto navigation server.
Preferably, it is characterised in that
Described auto navigation information data stores safely and comprises the following steps:
When Step 101 stores the storage request that user submits auto navigation information data to, storage user identity is pacified Full checking;
Step 102 carries out pretreatment to auto navigation information data, and auto navigation information data is divided into rudimentary knowledge With professional knowledge two types data, described rudimentary knowledge includes text and the figure that can reflect information O&M service basic condition Picture, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated auto navigation information data is used custom coding method respectively by Step 103 according to classified types Encoding, described custom coding method is as follows:
(1) using pretreated auto navigation information data as coded object, if what auto navigation information data Z comprised M attribute is S1,S2,…,Sm
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight because of Submatrix W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition RnDegree, span is [0,1];
2) defined attribute weight wi:
w i = &Sigma; j = 1 n a i j
Attribute weight is normalized and obtains normalization attribute weight w 'i:
w i &prime; = w i &Sigma; i = 1 m w i
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
X i = 1 , w i &prime; &GreaterEqual; T 1 0 , w i &prime; < T 1
4) set up attribute and choose Optimized model:
Z = &Sigma; i = 1 m S i X i
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of auto navigation information data;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped Make system virtualization;
Auto navigation information data is stored in resource pool by Step 105 with the form of final code;
The secure access of described auto navigation information data comprises the following steps:
When Step 201 accesses the access request that user submits auto navigation information data to, pacify accessing user identity Full checking;
When Step 202 responds access request, read the auto navigation information data being stored on resource pool, particularly as follows:
(1) K-means clustering method is used all kinds of business in auto navigation information data to be divided, to any two Auto navigation information data Z in individual class1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into Ask auto navigation information data Z1Or Z2, all to auto navigation information data Z1And Z2Prefetch, wherein threshold value T2Value Scope is [m/2,3m/4];
(2) concrete auto navigation information data positional information is obtained according to cluster index;
(3) according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling.
Wherein, described to access user identity carry out safety verification, particularly as follows:
(1) provide the password code of terminal authentication access user's input and identity the most correct in local service, if Correctly, access request, password code and identity are encrypted, form ciphertext collection, and ciphertext collection is sent to knowledge clothes Business device certification end, if incorrect, returns error reporting;
(2), after knowledge services device certification end receives described ciphertext collection, correspondence is concentrated to access the password of user's input ciphertext The ciphertext of password and identity is decrypted calculating, extracts password code and the value of identity accessing user's input, so After find identity relative recording that password is decrypted calculating in authentication database, if system exist this access user Record, and the password decrypted is consistent with the password code that family inputs, then judge that described access user, as validated user, will simultaneously Fingerprint collecting instruction, ciphertext collection, this session key and an encryption session random number are sent to knowledge request user side, knowledge Server authentication end preserves identity and association key simultaneously;If there is not this user record, knowledge services device certification in system Hold and provide terminal to return error reporting to local service;
(3) instruction of described fingerprint collecting, ciphertext collection, this session key and an encryption are received when resource request user side After session random number, verify that this session key and an encryption session random number are the most correct, if correctly, send out to accessing user Go out finger print information input instruction, this session key and encryption session random number are decrypted calculating, simultaneously by identity It is sent to knowledge services device certification end after being encrypted with the finger print information of input;If it is incorrect, to knowledge services device certification end Send illegal report;
(4) during the finger print information of the identity after knowledge services device certification end receives encryption and input, after encryption The finger print information of identity and input be decrypted calculating, and the fingerprint that would correspond to identity extracts in data base Out the finger print information with input compares, if the two is identical, then responds access request, if the two differs, returns illegal Report.
The present embodiment to access user carry out safety verification time, the information such as user name, password, fingerprint and session random number All transmit with ciphertext form, do not have plaintext version;Meanwhile, according to symmetry and the one-way hash function of user key Feature, has unipolarity via the user profile ciphertext of passage transmission, even data are intercepted and captured, is intended to crack it the most very Difficulty, when taking precautions against transmission with this, user data is divulged a secret, and privacy of user can obtain guarantee, thus further increases auto navigation letter The safety of breath data sharing;Auto navigation information data is encoded, facilitates Back ground Information real with all kinds of business information Existing accessible shared;According to cluster result and auto navigation information data positional information, auto navigation information data is adjusted Degree, decreases EMS memory occupation, improves data call speed, and the present embodiment sets threshold value T2Value be 9m/16, data call Speed improves 0.7%.
Embodiment 4
See Fig. 1, Fig. 2, the present embodiment one auto navigation information data sharing method, it is characterized in that, including tentatively locating Reason, auto navigation information data store safely and the secure access of auto navigation information data;
Described preliminary treatment comprises the following steps:
Auto navigation server receives the more newly downloaded request that download terminal sends;
Determine that auto navigation information data, described auto navigation information data include layering according to described more newly downloaded request The map datum of piecemeal storage;
Download described auto navigation information data from auto navigation data base and send;
Download terminal receives described auto navigation information data and processes described auto navigation information data;
Described download terminal sends auto navigation information data to car navigation terminal;
This car navigation terminal utilizes described auto navigation information data to update existing auto navigation information data.
Preferably, it is characterized in that, the detailed process that described auto navigation information data carries out processing is:
The map datum downloaded is compiled, i.e. arranges according to level and block number.
Preferably, it is characterized in that, described download terminal is the computer having information processing capability, described computer pass through because of Special net is connected with auto navigation server.
Preferably, it is characterised in that
Described auto navigation information data stores safely and comprises the following steps:
When Step 101 stores the storage request that user submits auto navigation information data to, storage user identity is pacified Full checking;
Step 102 carries out pretreatment to auto navigation information data, and auto navigation information data is divided into rudimentary knowledge With professional knowledge two types data, described rudimentary knowledge includes text and the figure that can reflect information O&M service basic condition Picture, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated auto navigation information data is used custom coding method respectively by Step 103 according to classified types Encoding, described custom coding method is as follows:
(1) using pretreated auto navigation information data as coded object, if what auto navigation information data Z comprised M attribute is S1,S2,…,Sm
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2..., Rn, according to attribute and constraints thereof, obtain attribute weight because of Submatrix W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition RnDegree, span is [0,1];
2) defined attribute weight wi:
w i = &Sigma; j = 1 n a i j
Attribute weight is normalized and obtains normalization attribute weight w 'i:
w i &prime; = w i &Sigma; i = 1 m w i
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
X i = 1 , w i &prime; &GreaterEqual; T 1 0 , w i &prime; < T 1
4) set up attribute and choose Optimized model:
Z = &Sigma; i = 1 m S i X i
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of auto navigation information data;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped Make system virtualization;
Auto navigation information data is stored in resource pool by Step 105 with the form of final code;
The secure access of described auto navigation information data comprises the following steps:
When Step 201 accesses the access request that user submits auto navigation information data to, pacify accessing user identity Full checking;
When Step 202 responds access request, read the auto navigation information data being stored on resource pool, particularly as follows:
(1) K-means clustering method is used all kinds of business in auto navigation information data to be divided, to any two Auto navigation information data Z in individual class1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into Ask auto navigation information data Z1Or Z2, all to auto navigation information data Z1And Z2Prefetch, wherein threshold value T2Value Scope is [m/2,3m/4];
(2) concrete auto navigation information data positional information is obtained according to cluster index;
(3) according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling.
Wherein, described to access user identity carry out safety verification, particularly as follows:
(1) provide the password code of terminal authentication access user's input and identity the most correct in local service, if Correctly, access request, password code and identity are encrypted, form ciphertext collection, and ciphertext collection is sent to knowledge clothes Business device certification end, if incorrect, returns error reporting;
(2), after knowledge services device certification end receives described ciphertext collection, correspondence is concentrated to access the password of user's input ciphertext The ciphertext of password and identity is decrypted calculating, extracts password code and the value of identity accessing user's input, so After find identity relative recording that password is decrypted calculating in authentication database, if system exist this access user Record, and the password decrypted is consistent with the password code that family inputs, then judge that described access user, as validated user, will simultaneously Fingerprint collecting instruction, ciphertext collection, this session key and an encryption session random number are sent to knowledge request user side, knowledge Server authentication end preserves identity and association key simultaneously;If there is not this user record, knowledge services device certification in system Hold and provide terminal to return error reporting to local service;
(3) instruction of described fingerprint collecting, ciphertext collection, this session key and an encryption are received when resource request user side After session random number, verify that this session key and an encryption session random number are the most correct, if correctly, send out to accessing user Go out finger print information input instruction, this session key and encryption session random number are decrypted calculating, simultaneously by identity It is sent to knowledge services device certification end after being encrypted with the finger print information of input;If it is incorrect, to knowledge services device certification end Send illegal report;
(4) during the finger print information of the identity after knowledge services device certification end receives encryption and input, after encryption The finger print information of identity and input be decrypted calculating, and the fingerprint that would correspond to identity extracts in data base Out the finger print information with input compares, if the two is identical, then responds access request, if the two differs, returns illegal Report.
Wherein, described to storage user identity carry out safety verification, particularly as follows:
(1), when local service provides terminal to receive fingerprint and the identity storing user's input, user will be stored defeated The fingerprint entered and identity are sent to knowledge store certification end after being encrypted;
(2) knowledge store certification end is decrypted calculating to fingerprint and the identity of the storage user's input after encryption, And the fingerprint that would correspond to identity extracts in data base and compares with the fingerprint storing user's input, if the two Identical, it is determined that this storage user is legal storage user, for the virtual resource that legal storage user's configuration is corresponding with storage request Pond, if incorrect, provides terminal to return error reporting to local service.
The present embodiment to storage user carry out safety verification time, User Identity and finger print information the most encrypted after carry out Transmission, does not haves plaintext version, and the User Identity after encryption and finger print information are verified by knowledge store certification end Rear just determine whether to ask corresponding virtual resource pond for storage user's configuration with storage, limit illegally depositing of disabled user Storage, and verifying speed is fast, further increases the safety that auto navigation information data is shared on the premise of ensureing convenience, And to access user carry out safety verification time, the information such as user name, password, fingerprint and session random number is all entered with ciphertext form Row transmission, does not haves plaintext version;Meanwhile, according to symmetry and the one-way hash function feature of user key, via passage The user profile ciphertext of transmission has unipolarity, even data are intercepted and captured, is intended to crack it the most highly difficult, takes precautions against with this During transmission, user data is divulged a secret, and privacy of user can obtain guarantee, thus further increases what auto navigation information data was shared Safety;Auto navigation information data is encoded, facilitates Back ground Information and realize accessible sharing with all kinds of business information; According to cluster result and auto navigation information data positional information, auto navigation information data is scheduling, decreases internal memory and account for With, improve data call speed, the present embodiment sets threshold value T2Value be 5m/8, data call speed improves 0.9%.
Embodiment 5
See Fig. 1, Fig. 2, the present embodiment one auto navigation information data sharing method, it is characterized in that, including tentatively locating Reason, auto navigation information data store safely and the secure access of auto navigation information data;
Described preliminary treatment comprises the following steps:
Auto navigation server receives the more newly downloaded request that download terminal sends;
Determine that auto navigation information data, described auto navigation information data include layering according to described more newly downloaded request The map datum of piecemeal storage;
Download described auto navigation information data from auto navigation data base and send;
Download terminal receives described auto navigation information data and processes described auto navigation information data;
Described download terminal sends auto navigation information data to car navigation terminal;
This car navigation terminal utilizes described auto navigation information data to update existing auto navigation information data.
Preferably, it is characterized in that, the detailed process that described auto navigation information data carries out processing is:
The map datum downloaded is compiled, i.e. arranges according to level and block number.
Preferably, it is characterized in that, described download terminal is the computer having information processing capability, described computer pass through because of Special net is connected with auto navigation server.
Preferably, it is characterised in that
Described auto navigation information data stores safely and comprises the following steps:
When Step 101 stores the storage request that user submits auto navigation information data to, storage user identity is pacified Full checking;
Step 102 carries out pretreatment to auto navigation information data, and auto navigation information data is divided into rudimentary knowledge With professional knowledge two types data, described rudimentary knowledge includes text and the figure that can reflect information O&M service basic condition Picture, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated auto navigation information data is used custom coding method respectively by Step 103 according to classified types Encoding, described custom coding method is as follows:
(1) using pretreated auto navigation information data as coded object, if what auto navigation information data Z comprised M attribute is S1,S2,…,Sm
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight because of Submatrix W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition RnDegree, span is [0,1];
2) defined attribute weight wi:
w i = &Sigma; j = 1 n a i j
Attribute weight is normalized and obtains normalization attribute weight w 'i:
w i &prime; = w i &Sigma; i = 1 m w i
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
X i = 1 , w i &prime; &GreaterEqual; T 1 0 , w i &prime; < T 1
4) set up attribute and choose Optimized model:
Z = &Sigma; i = 1 m S i X i
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of auto navigation information data;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped Make system virtualization;
Auto navigation information data is stored in resource pool by Step 105 with the form of final code;
The secure access of described auto navigation information data comprises the following steps:
When Step 201 accesses the access request that user submits auto navigation information data to, pacify accessing user identity Full checking;
When Step 202 responds access request, read the auto navigation information data being stored on resource pool, particularly as follows:
(1) K-means clustering method is used all kinds of business in auto navigation information data to be divided, to any two Auto navigation information data Z in individual class1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into Ask auto navigation information data Z1Or Z2, all to auto navigation information data Z1And Z2Prefetch, wherein threshold value T2Value Scope is [m/2,3m/4];
(2) concrete auto navigation information data positional information is obtained according to cluster index;
(3) according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling.
Wherein, described to access user identity carry out safety verification, particularly as follows:
(1) provide the password code of terminal authentication access user's input and identity the most correct in local service, if Correctly, access request, password code and identity are encrypted, form ciphertext collection, and ciphertext collection is sent to knowledge clothes Business device certification end, if incorrect, returns error reporting;
(2), after knowledge services device certification end receives described ciphertext collection, correspondence is concentrated to access the password of user's input ciphertext The ciphertext of password and identity is decrypted calculating, extracts password code and the value of identity accessing user's input, so After find identity relative recording that password is decrypted calculating in authentication database, if system exist this access user Record, and the password decrypted is consistent with the password code that family inputs, then judge that described access user, as validated user, will simultaneously Fingerprint collecting instruction, ciphertext collection, this session key and an encryption session random number are sent to knowledge request user side, knowledge Server authentication end preserves identity and association key simultaneously;If there is not this user record, knowledge services device certification in system Hold and provide terminal to return error reporting to local service;
(3) instruction of described fingerprint collecting, ciphertext collection, this session key and an encryption are received when resource request user side After session random number, verify that this session key and an encryption session random number are the most correct, if correctly, send out to accessing user Go out finger print information input instruction, this session key and encryption session random number are decrypted calculating, simultaneously by identity It is sent to knowledge services device certification end after being encrypted with the finger print information of input;If it is incorrect, to knowledge services device certification end Send illegal report;
(4) during the finger print information of the identity after knowledge services device certification end receives encryption and input, after encryption The finger print information of identity and input be decrypted calculating, and the fingerprint that would correspond to identity extracts in data base Out the finger print information with input compares, if the two is identical, then responds access request, if the two differs, returns illegal Report.
Wherein, described to storage user identity carry out safety verification, particularly as follows:
(1), when local service provides terminal to receive fingerprint and the identity storing user's input, user will be stored defeated The fingerprint entered and identity are sent to knowledge store certification end after being encrypted;
(2) knowledge store certification end is decrypted calculating to fingerprint and the identity of the storage user's input after encryption, And the fingerprint that would correspond to identity extracts in data base and compares with the fingerprint storing user's input, if the two Identical, it is determined that this storage user is legal storage user, for the virtual resource that legal storage user's configuration is corresponding with storage request Pond, if incorrect, provides terminal to return error reporting to local service.
The present embodiment to storage user carry out safety verification time, User Identity and finger print information the most encrypted after carry out Transmission, does not haves plaintext version, and the User Identity after encryption and finger print information are verified by knowledge store certification end Rear just determine whether to ask corresponding virtual resource pond for storage user's configuration with storage, limit illegally depositing of disabled user Storage, and verifying speed is fast, further increases the safety that auto navigation information data is shared on the premise of ensureing convenience, And to access user carry out safety verification time, the information such as user name, password, fingerprint and session random number is all entered with ciphertext form Row transmission, does not haves plaintext version;Meanwhile, according to symmetry and the one-way hash function feature of user key, via passage The user profile ciphertext of transmission has unipolarity, even data are intercepted and captured, is intended to crack it the most highly difficult, takes precautions against with this During transmission, user data is divulged a secret, and privacy of user can obtain guarantee, thus further increases what auto navigation information data was shared Safety;Auto navigation information data is encoded, facilitates Back ground Information and realize accessible sharing with all kinds of business information; According to cluster result and auto navigation information data positional information, auto navigation information data is scheduling, decreases internal memory and account for With, improve data call speed, the present embodiment sets threshold value T2Value be 11m/16, data call speed improves 1.2%.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, that is made any repaiies Change, equivalent, improvement etc., should be included within the scope of the present invention.

Claims (6)

1. an auto navigation information data sharing method, is characterized in that, including preliminary treatment, auto navigation information data safety Storage and auto navigation information data have secure access to;
Described preliminary treatment comprises the following steps:
Auto navigation server receives the more newly downloaded request that download terminal sends;
Determine that auto navigation information data, described auto navigation information data include hierarchical block according to described more newly downloaded request The map datum of storage;
Download described auto navigation information data from auto navigation data base and send;
Download terminal receives described auto navigation information data and processes described auto navigation information data;
Described download terminal sends auto navigation information data to car navigation terminal;
This car navigation terminal utilizes described auto navigation information data to update existing auto navigation information data.
A kind of auto navigation information data sharing method the most according to claim 1, is characterized in that, described auto navigation is believed The detailed process that breath data carry out processing is:
The map datum downloaded is compiled, i.e. arranges according to level and block number.
A kind of auto navigation information data sharing method the most according to claim 2, is characterized in that, described download terminal is Having the computer of information processing capability, described computer is connected with auto navigation server by the Internet.
A kind of auto navigation information data sharing method the most according to claim 3, it is characterised in that
Described auto navigation information data stores safely and comprises the following steps:
When Step 101 stores the storage request that user submits auto navigation information data to, storage user identity is carried out safety and tests Card;
Step 102 carries out pretreatment to auto navigation information data, and auto navigation information data is divided into rudimentary knowledge and industry Business knowledge two types data, described rudimentary knowledge includes text and the image that can reflect information O&M service basic condition, Described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated auto navigation information data is carried out by custom coding method respectively by Step 103 according to classified types Coding, described custom coding method is as follows:
(1) using pretreated auto navigation information data as coded object, if m that auto navigation information data Z comprises Attribute is S1,S2,…,Sm
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight factor square Battle array W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition Rn's Degree, span is [0,1];
2) defined attribute weight wi:
w i = &Sigma; j = 1 n a i j
Attribute weight is normalized and obtains normalization attribute weight w 'i:
w i &prime; = w i &Sigma; i = 1 m w i
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
X i = 1 , w i &prime; &GreaterEqual; T 1 0 , w i &prime; < T 1
4) set up attribute and choose Optimized model:
Z = &Sigma; i = 1 m S i X i
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of auto navigation information data;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and by user operation system System virtualization;
Auto navigation information data is stored in resource pool by Step 105 with the form of final code;
The secure access of described auto navigation information data comprises the following steps:
When Step 201 accesses the access request that user submits auto navigation information data to, carry out testing safely to accessing user identity Card;
When Step 202 responds access request, read the auto navigation information data being stored on resource pool, particularly as follows:
(1) K-means clustering method is used all kinds of business in auto navigation information data to be divided, to any two class Interior auto navigation information data Z1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter inquire about automobile Navigation information data Z1Or Z2, all to auto navigation information data Z1And Z2Prefetch, wherein threshold value T2Span be [m/2,3m/4];
(2) concrete auto navigation information data positional information is obtained according to cluster index;
(3) according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling.
A kind of auto navigation information data sharing method the most according to claim 4, it is characterised in that described to accessing use Family identity carries out safety verification, particularly as follows:
(1) provide the password code of terminal authentication access user's input and identity the most correct in local service, if correctly, Access request, password code and identity are encrypted, form ciphertext collection, and ciphertext collection is sent to knowledge services device recognizes Card end, if incorrect, returns error reporting;
(2), after knowledge services device certification end receives described ciphertext collection, correspondence is concentrated to access the password code of user's input ciphertext It is decrypted calculating with the ciphertext of identity, extracts password code and the value of identity accessing user's input, then exist Find identity relative recording that password is decrypted calculating in authentication database, if system exists this accesses user's note Record, and the password decrypted is consistent with the password code that family inputs, then judge that described access user, as validated user, will refer to simultaneously Stricture of vagina acquisition instructions, ciphertext collection, this session key and an encryption session random number are sent to knowledge request user side, and knowledge takes Business device certification end preserves identity and association key simultaneously;If there is not this user record, knowledge services device certification end in system Terminal is provided to return error reporting to local service;
(3) instruction of described fingerprint collecting, ciphertext collection, this session key and an encryption session are received when resource request user side After random number, verify that this session key and an encryption session random number are the most correct, if correctly, send finger to accessing user The input instruction of stricture of vagina information, is decrypted calculating, simultaneously by identity with defeated to this session key and encryption session random number The finger print information entered is sent to knowledge services device certification end after being encrypted;If incorrect, send to knowledge services device certification end Illegal report;
(4) during the finger print information of the identity after knowledge services device certification end receives encryption and input, to the body after encryption Part mark is decrypted calculating with the finger print information of input, and the fingerprint that would correspond to identity extracts in data base Compare with the finger print information of input, if the two is identical, then respond access request, if the two differs, return illegal report.
A kind of auto navigation information data sharing method the most according to claim 5, it is characterised in that described to storage use Family identity carries out safety verification, particularly as follows:
(1), when local service provides terminal to receive fingerprint and the identity storing user's input, user's input will be stored Fingerprint and identity are sent to knowledge store certification end after being encrypted;
(2) knowledge store certification end is decrypted calculating to fingerprint and the identity of the storage user's input after encryption, and will Extract in data base corresponding to the fingerprint of identity and compare with the fingerprint storing user's input, if the two phase With, it is determined that this storage user is legal storage user, configures the virtual resource pond corresponding with storage request for legal storage user, If incorrect, terminal is provided to return error reporting to local service.
CN201610538251.4A 2016-07-07 2016-07-07 A kind of auto navigation information data sharing method Withdrawn CN106203166A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610538251.4A CN106203166A (en) 2016-07-07 2016-07-07 A kind of auto navigation information data sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610538251.4A CN106203166A (en) 2016-07-07 2016-07-07 A kind of auto navigation information data sharing method

Publications (1)

Publication Number Publication Date
CN106203166A true CN106203166A (en) 2016-12-07

Family

ID=57472920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610538251.4A Withdrawn CN106203166A (en) 2016-07-07 2016-07-07 A kind of auto navigation information data sharing method

Country Status (1)

Country Link
CN (1) CN106203166A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111107114A (en) * 2018-10-25 2020-05-05 上海博泰悦臻电子设备制造有限公司 Information synchronization method, terminal and computer readable storage medium
CN112753026A (en) * 2018-09-26 2021-05-04 美光科技公司 Memory pooling between selected memory resources by a base station

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112753026A (en) * 2018-09-26 2021-05-04 美光科技公司 Memory pooling between selected memory resources by a base station
CN112753026B (en) * 2018-09-26 2022-04-05 美光科技公司 Memory pooling between selected memory resources by a base station
CN111107114A (en) * 2018-10-25 2020-05-05 上海博泰悦臻电子设备制造有限公司 Information synchronization method, terminal and computer readable storage medium
CN111107114B (en) * 2018-10-25 2022-11-04 博泰车联网科技(上海)股份有限公司 Information synchronization method, terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
US11681790B2 (en) System and method for user enrollment in a secure biometric verification system
US10248783B2 (en) Methods and systems for identity creation, verification and management
US8275995B2 (en) Identity authentication and secured access systems, components, and methods
US7802723B2 (en) System and method for nameless biometric authentication and non-repudiation validation
CN106096061A (en) A kind of environmental monitoring information data sharing method
CN106131010A (en) A kind of electric network data sharing method
CN108134791A (en) A kind of data center&#39;s total management system login validation method
CN109768983A (en) Dynamic and Multi dimensional personal identification method, apparatus and system based on block chain
CN106202415A (en) A kind of earth geography information data sharing method
CN105827571A (en) UAF (Universal Authentication Framework) protocol based multi-modal biological characteristic authentication method and equipment
CN106056005A (en) Method for sharing satellite information data
CN104038509A (en) Fingerprint authentication cloud system
CN106156640B (en) Information O&M service knowledge sharing method based on big data trust computing
CN106203166A (en) A kind of auto navigation information data sharing method
Hamer et al. Private digital identity on blockchain
CN105262747A (en) Polymorphic terminal identity verification system and method based on biological characteristic recognition
CN101655893B (en) Manufacture method of intelligent blog lock, Blog access control method and system thereof
Fumy et al. Handbook of EID Security: Concepts, Practical Experiences, Technologies
AU2020344601A1 (en) Enhanced biometric authentication
CN111931230A (en) Data authorization method and device, storage medium and electronic device
CN106130737A (en) A kind of road congestion information data sharing method
CN109785456A (en) A kind of distributed Work attendance management system and Work attendance method based on mobile terminal
CN109165491A (en) Security certificate method, apparatus, electronic equipment and storage medium
CN106209846A (en) A kind of weather information data sharing method
CN106203169A (en) A kind of railway information data sharing method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C04 Withdrawal of patent application after publication (patent law 2001)
WW01 Invention patent application withdrawn after publication

Application publication date: 20161207