CN108599991A - The key node searching method of Trust transitivity is influenced in social Internet of Things - Google Patents

The key node searching method of Trust transitivity is influenced in social Internet of Things Download PDF

Info

Publication number
CN108599991A
CN108599991A CN201810235534.0A CN201810235534A CN108599991A CN 108599991 A CN108599991 A CN 108599991A CN 201810235534 A CN201810235534 A CN 201810235534A CN 108599991 A CN108599991 A CN 108599991A
Authority
CN
China
Prior art keywords
node
user
key
nodes
user node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810235534.0A
Other languages
Chinese (zh)
Other versions
CN108599991B (en
Inventor
蔺智挺
李文娜
孙李兵
项雅琴
王朋飞
吴秀龙
彭春雨
黎轩
陈军宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui University
Original Assignee
Anhui University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui University filed Critical Anhui University
Priority to CN201810235534.0A priority Critical patent/CN108599991B/en
Publication of CN108599991A publication Critical patent/CN108599991A/en
Application granted granted Critical
Publication of CN108599991B publication Critical patent/CN108599991B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The invention discloses the key node searching methods that Trust transitivity is influenced in a kind of social Internet of Things, can find all key nodes in asymmetric, weighting, the SIoT networks not being fully connected, be conducive to ensure SIoT normal works;At the same time it can also improve SIoT nodes degrees of communication.

Description

The key node searching method of Trust transitivity is influenced in social Internet of Things
Technical field
The present invention relates to the crucial sections that Trust transitivity is influenced in internet of things field more particularly to a kind of social Internet of Things Point searching method.
Background technology
Internet of Things (IoT) is developing into an attractive next generation network pattern and service infrastructure.Object The target of networking be by anyone and anything (such as computer, camera, wrist-watch, washing machine, bicycle, automobile, the mankind, plant, Animal) it connects, and by providing service whenever and wherever possible in conjunction with network.IoT covers many technologies, including framework, biography Sensor, coding, transmission, data processing, network, discovery, trust etc..It provides solution appropriate to be widely applied, As traffic safety, waste management, safety, resource management, logistics, retail industry, Industry Control, health care and tracking are stolen wealth Production etc..Compared with wireless sensor network (WSN), the sensitive zones of Internet of Things are more extensive, are more focused on the daily life of people Living and working environment.Since things is substantially by human manipulation and work, so the concept of community network is integrated into object In networking solution, it forms a kind of novel network, i.e., social Internet of Things (SIoT).
In community network, people may frequently encounter other and not recognize completely or the not no use of interaction experiences before Family.These users will be enlarged by the trusting relationship for having the contemporary of same interest and preference in same field with them.In this way, user Between be formed one with isomery trust large-scale users to trust network (UTN).It is also referred to as isomery trust network (HTN).In HTN, the interaction of people is built upon on the basis of trust, so the prediction that is delivered in trusted does not join directly It plays an important role when trust between the user of system.If trust can not be transmitted, will be always maintained between stranger Strange state.Therefore, new interaction cannot be formed between them.This will lead to the low connectivity of network, and task and service are not It can be by appropriate processing.Therefore, Trust transitivity appropriate is very important for SIoT.
The node that trust can be transmitted is known as intermediate node, and the collection of intermediate node is collectively referred to as path.However, only in part Intermediate node is key node, these key nodes can significantly affect the transitivity of trust.When the node in SIoT is based on trusting Transitive relation when establishing network, if we remove the key node of network, the performance of network will be affected.In other words It says, because transmission path is destroyed, some nodes possibly can not access service.Therefore, it is necessary to retrieve in entire SIoT Key node, to ensure SIoT work normally.
Invention content
The object of the present invention is to provide the key node searching methods that Trust transitivity is influenced in a kind of social Internet of Things.
The purpose of the present invention is what is be achieved through the following technical solutions:
It is a kind of society Internet of Things in influence Trust transitivity key node searching method, including:
Social Internet of Things is a weighting and oriented network, and social Internet of Things are indicated using the figure G with vertex V and side E Net, vertex therein are user node, and user node is divided into commission node, be commissioned node and intermediate node;Definition, which is trusted, to be passed Path TP is passed, to indicate the set for entrusting node to the intermediate node between node of being commissioned;Key node is to influence Trust transitivity The intermediate node of path performance;
If residing context is identical between user node, and the confidence value between user node and user node is big In threshold value, then confidence level transmission can be carried out between relative users node, that is, there is access, then carried out by following manner crucial Node searching:
Initialize the nearest key node of each user node;
All user nodes and side are initialized as not searching for;
When executing key node search, Trust transitivity path TP is updated by active user's node v;User node v and its Neighbor user node j shares identical context and confidence value between the two is more than threshold value, if user node v is adjacent with it The side occupied between user node j is not searched, then it is to have searched to record the side between user node v and its neighbor user node j Rope;Meanwhile neighbor user node j is scanned for if it is first time, then user node v is the nearest of neighbor user node j Key node;If not once being scanned for neighbor user node j, then user node v be not neighbor user node j most Nearly key node updates the nearest key node of user node j again;It repeats the above process, until not nearest key node Or the nearest key node found belongs to TP;
Search is iterated according to above-mentioned identical mode for other users node;
The nearest key node of each user node obtained in above-mentioned iterative process will be recorded, and pass through The mode of the nearest key node of iterative search finds all key nodes in network.
It as seen from the above technical solution provided by the invention, can be in asymmetric, weighting, be fully connected All key nodes are found in SIoT networks, are conducive to ensure SIoT normal works;It is saved at the same time it can also improve in SIoT networks Point-connectivity.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill in field, without creative efforts, other are can also be obtained according to these attached drawings Attached drawing.
Fig. 1 is the key node searching method that Trust transitivity is influenced in a kind of social Internet of Things provided in an embodiment of the present invention Flow chart.
Specific implementation mode
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on this The embodiment of invention, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, belongs to protection scope of the present invention.
Since things is substantially by human manipulation and work, so the concept of community network is integrated into Internet of Things solution Certainly in scheme.In Internet of Things, trustee generates and delegates duties, and trustee receives task and provides clothes to successfully complete task Business.But how to find suitable trustee is critical issue when trustee delegates duties.In general, it can use to trust and make Suitable trustee is selected for module.In SIoT, trust be one in certain context based on to confidence level Actively it is expected, risk task is entrusted to the process for the trustee for being equipped with suitable equipment by trustee.Trustee puts into practice simultaneously Trustee is evaluated.Finally, evaluation result will influence the attitude of both sides in turn.It includes many factors that trust, which is one, Dynamic process, however fixed certain two people of expression of confidence level are directed to some task to mutual trusted degree, therefore trust It is not equal to confidence level.
When whether trustee is based on trusting go one trustee of assessment credible, do not handed between trustee and the trustee The possibility of mutual experience is very big.Therefore, it is necessary to intermediate nodes to transmit trust.Intermediate node determines whether trust can be passed It passs.It is meant that if commission nodes X request service, the node Y that is commissioned provides service for the transitivity trusted in SIoT, and X with Without direct social bond between Y, then confidence level needs to transmit by intermediate node I.We discuss Trust transitivity below A kind of classical case:If X trusts I, I trusts Y, then X can trust Y
Trust is transmitted by intermediate node, therefore the Trust transitivity in intermediate node between any two constitutes final committee The confidence level asked someone between trustee.The Trust transitivity between arbitrary two adjacent node can be measured using confidence level.It is non- The confidence value TW of task i is directed between adjacent node X and Yi XYBy the confidence level of each pair of adjacent intermediate node in its transmission path Value is folded to be multiplied:
Indicate the intermediate node sequence in the selected path between X and Y in SIoT.Specifically, confidence value TWiXY is by trustee Y, trustee Y, intermediate nodeSpecific tasks i and contextInfluence:
In order to establish the defence mental model of trust, used in the embodiment of the present invention general purpose function g as with context Relevant function.ContextBe in trusting one it is extremely important but through commonly overlooked element.Trustee X must be assessed up and down TextIt is advantageous to trustee Y or task i, less favorably, or it is harmful.Because context is an external influence factors, it It can greatly influence the behavior of Y and final result.In SIoT, context<CX,CY,CI> includes the upper of commission nodes X Hereafter CX, the context of the node Y that is commissioned, intermediate node I context CI;If entrusting nodes X, be commissioned node Y and intermediate node Context residing for I is identical, and the confidence value between adjacent node is more than threshold value, then can carry out confidence level transmission, no Then transmitting will be blocked:
Wherein, TWi XY、TWi XI、TWi IYThe corresponding expression commission nodes X and node Y that is commissioned, commission nodes X and intermediate node I, the intermediate node I and node Y that is commissioned is directed to the confidence value of task i;ω1And ω2For pre-set two believability thresholds.
Pay attention to:Formula (1) has ignored a part for confidence level:(1-TWiAB)*(1-TWiBC), it is contained in formula (3) In.It indicate commission nodes X to intermediate node I can not reliability be multiplied by false judgments of the intermediate node I to the node Y that is commissioned.
In general, social Internet of Things can be indicated using the figure G with vertex V and side E, and vertex therein is to use Family node, user node (hereinafter node) are divided into commission node, be commissioned node and intermediate node;G is schemed by adjacency matrix An×n Description, its element axyIndicate the intensity between vertex x and vertex y.Element on leading diagonal does not define, and is arranged to Zero.If two nodes are connected by a line, they in scheming G are adjacent.If network be connection and it is right (a claimedxy=ayx), key node can be found by cut point algorithm.However, it is asymmetric to trust, i.e., in their friendship During mutually, there is directionality and otherness between node.For example, being 0.9 to the confidence value of Bob from Alice;On the contrary, Bob may be 0.5 to the confidence value of Alice.Therefore, the Trust transitivity network of social Internet of Things is a weighting, orientation net Network.In addition, connection can change according to different ISPs, since these servers have different contexts.In order to Key node is found out, the embodiment of the present invention, which defines, transmits trust path TPn XY, it is illustrated between trustee X to trustee Y Intermediate node set, X can assess and obtain the service provided by Y;Because there is a plurality of transmission path, n, which is represented, transmits road The serial number of diameter, including the transmission path set of all transmission paths is denoted as TPSXY.Based on the process for trusting transition, trust transmitting Some constraintss are applied in network.If a, l ∈ TPn XY, and(this means that l is trusty as one a Intermediate node), thenWith regard to nonsensical, because l trusts a and does not represent a trusts l.In other words, Trust transitivity path Closed circulation be nonsensical.
As previously mentioned, if context residing between user node and user node in figure G is identical, and user node with Confidence value between user node is more than threshold value, then confidence level transmission can be carried out between relative users node, that is, exists logical Road;Crucial point search can be carried out by following methods later, its pseudocode of crucial point search is as follows:
The first step is initiation parameter:Nearest_key_node (*) (the 2nd row).Nearest_key_node (*) is recorded The nearest key node of each node in Trust transitivity network is kept away by search record purge before before formally starting search Exempt to influence this search result.All key nodes of some node can be found by the nearest key node of iterative search.It is adjacent It connects matrix and has recorded node relationships (the 4th row) in Trust transitivity network.
TP has recorded current transmission path, i.e., all between ISP (trustee) and requestor (trustee) Intermediate node.TP is initialized as empty (the 5th row).Before attempting to find key node, node and side are initialized as not searching for (6-7 rows).It is since trustee can be serviced by oneself, the nearest_key_node of trustee is (crucial recently Node) it is set as empty (eighth row).
When executing key node searching algorithm (KNS, the 9th row), TP is updated by active user's node v (the 15th row).With The node v neighbor user nodes to be searched in family had an interactive node (being present in TP) before should not being, but should be with User node v shares same context and confidence value between the two is more than the node of threshold value, trusts to transmit.It should note Meaning, some nodes may have multiple roles, and belong to multiple contexts.Assuming that user node j saves for active user The neighbor node of point v, the side between user node v and user node j should not be searched (16-17 rows).If user saves It is not searched before side between point v and user node j, then it is to record the side between user node v and user node j Search.If being scanned for for the first time to user node j, then the nearest key node of user node j is user node v, because Not to be searched before user node v to the side of user node j, and it is to search for user node j for the first time, so with current The path of update out, the path that can reach user node j can only be by user node v.If not search user saves for the first time Point j had search to user node j before just representing and was not by user node v, it is meant that also has other paths that can arrive Up to user node j, then user node v is not the nearest key node of user node j.And the road of user node j can be reached now Diameter is added to a path by user node v, then what the nearest key node of user node j may be newly added Path effects, so needing the nearest key node (the 22nd row) of user node j of update.For the sake of simplicity, it does not show The pseudocode of upd_nearest_k_node.The function principle:If the nearest key node k of user node j is not belonging to TP, Mean that original key node k recently is no longer key node, then the nearest key node of user node j is altered to the nearest of k Key node, and recursive call upd_nearest_k_node;This process is repeated, until not nearest key node or discovery Nearest key node belongs to TP.
Then, it is iterated search (the 24th row), updates TP correctly to record current transmission path (the 27th row).Most Afterwards, all key nodes (the 11st row) of each node are shown.
Meanwhile in iterative search procedures, the nearest key node of each user node will be recorded, by repeatedly Generation, which searches nearest key node, can find all key nodes in network.Illustratively, the nearest key node of a is b, b Nearest key node be c, c is without nearest key node.Then a key nodes are b, c.
It will be understood by those skilled in the art that 14~28 rows of above-mentioned pseudocode are the expansion to the 9th row.It is opened from the 1st row Begin to execute, jump to the 14th row when to 9 row and start to execute, executes 14~28 rows (period meeting recursive call oneself), after The 10th row of rebound continues to 13 rows, entire program finishes execution.KNS () is a function, and the 9th row is to this function It calls, the 14th~28 row is the definition to this function.
Said program of the embodiment of the present invention can find institute in asymmetric, weighting, the SIoT networks not being fully connected There is key node, is conducive to ensure SIoT normal works;At the same time it can also improve SIoT nodes degrees of communication.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment can By software realization, the mode of necessary general hardware platform can also be added to realize by software.Based on this understanding, The technical solution of above-described embodiment can be expressed in the form of software products, the software product can be stored in one it is non-easily In the property lost storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.), including some instructions are with so that a computer is set Standby (can be personal computer, server or the network equipment etc.) executes the method described in each embodiment of the present invention.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Any one skilled in the art is in the technical scope of present disclosure, the change or replacement that can be readily occurred in, It should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of claims Subject to enclosing.

Claims (2)

1. influencing the key node searching method of Trust transitivity in a kind of society's Internet of Things, which is characterized in that including:
Social Internet of Things is a weighting and oriented network, and social Internet of Things is indicated using the figure G with vertex V and side E, In vertex be user node, user node is divided into commission node, be commissioned node and intermediate node;Define Trust transitivity path TP, to indicate the set for entrusting node to the intermediate node between node of being commissioned;Key node is to influence Trust transitivity path property The intermediate node of energy;
If residing context is identical between user node, and the confidence value between user node and user node is more than threshold Value, then can carry out confidence level transmission, that is, there is access, then carry out key node by following manner between relative users node Search:
Initialize the nearest key node of each user node;
All user nodes and side are initialized as not searching for;
When executing key node search, Trust transitivity path TP is updated by active user's node v;User node v and its neighbour User node j shares identical context and confidence value between the two is more than threshold value, if user node v is used with its neighbour Side between the node j of family is not searched, then it is to have searched for record the side between user node v and its neighbor user node j;Together When, neighbor user node j is scanned for if it is first time, then the nearest crucial section that user node v is neighbor user node j Point;If not once being scanned for neighbor user node j, then user node v is not the nearest key of neighbor user node j Node updates the nearest key node of user node j again;It repeats the above process, until not nearest key node or discovery Nearest key node belong to TP;
Search is iterated according to above-mentioned identical mode for other users node;
The nearest key node of each user node obtained in above-mentioned iterative process will be recorded, and pass through iteration The mode of nearest key node is searched to find all key nodes in network.
2. the key node searching method of Trust transitivity is influenced in a kind of social Internet of Things according to claim 1, it is special Sign is,
Commission nodes X and the node Y that is commissioned are two non-adjacent user nodes, for the task i of commission nodes X publication, if Commission nodes X, be commissioned node Y and the two intermediate node I residing for context it is identical, and the confidence level between adjacent node Value is more than threshold value, then can carry out confidence level transmission, and otherwise transmitting will be blocked:
Wherein, TWi XY、TWi XI、TWi IYThe corresponding expression commission nodes X and node Y that is commissioned, commission nodes X and intermediate node I, in The intermediate node I and node Y that is commissioned is directed to the confidence value of task i;ω1And ω2For pre-set two believability thresholds;Up and down Text<CX,CY,CI> C thereinX、CY、CIBe corresponding in turn to commission nodes X, be commissioned node Y, intermediate node I context.
CN201810235534.0A 2018-03-21 2018-03-21 Method for searching key nodes influencing trust transfer in social Internet of things Active CN108599991B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810235534.0A CN108599991B (en) 2018-03-21 2018-03-21 Method for searching key nodes influencing trust transfer in social Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810235534.0A CN108599991B (en) 2018-03-21 2018-03-21 Method for searching key nodes influencing trust transfer in social Internet of things

Publications (2)

Publication Number Publication Date
CN108599991A true CN108599991A (en) 2018-09-28
CN108599991B CN108599991B (en) 2020-12-29

Family

ID=63627127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810235534.0A Active CN108599991B (en) 2018-03-21 2018-03-21 Method for searching key nodes influencing trust transfer in social Internet of things

Country Status (1)

Country Link
CN (1) CN108599991B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080201447A1 (en) * 2007-02-15 2008-08-21 Young Wook Kim Online social networking method based on third party's evaluation and system therefor
CN103150399A (en) * 2013-03-26 2013-06-12 常州德诗蓝电子科技有限公司 Information recommending method based on trust in social network
CN103995823A (en) * 2014-03-25 2014-08-20 南京邮电大学 Information recommending method based on social network
CN104008163A (en) * 2014-05-29 2014-08-27 上海师范大学 Trust based social network maximum influence node calculation method
CN104268171A (en) * 2014-09-11 2015-01-07 东北大学 Activity similarity and social trust based social networking website friend recommendation system and method
CN104765825A (en) * 2015-04-10 2015-07-08 清华大学 Method and device for predicting social network links based on cooperative fusion theory
CN104838411A (en) * 2015-02-11 2015-08-12 深圳市仁盟互动网络科技有限公司 Method and system for establishing friendship based on trust recommendation social networking services
CN107330461A (en) * 2017-06-27 2017-11-07 安徽师范大学 Collaborative filtering recommending method based on emotion with trust

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080201447A1 (en) * 2007-02-15 2008-08-21 Young Wook Kim Online social networking method based on third party's evaluation and system therefor
CN103150399A (en) * 2013-03-26 2013-06-12 常州德诗蓝电子科技有限公司 Information recommending method based on trust in social network
CN103995823A (en) * 2014-03-25 2014-08-20 南京邮电大学 Information recommending method based on social network
CN104008163A (en) * 2014-05-29 2014-08-27 上海师范大学 Trust based social network maximum influence node calculation method
CN104268171A (en) * 2014-09-11 2015-01-07 东北大学 Activity similarity and social trust based social networking website friend recommendation system and method
CN104838411A (en) * 2015-02-11 2015-08-12 深圳市仁盟互动网络科技有限公司 Method and system for establishing friendship based on trust recommendation social networking services
CN104765825A (en) * 2015-04-10 2015-07-08 清华大学 Method and device for predicting social network links based on cooperative fusion theory
CN107330461A (en) * 2017-06-27 2017-11-07 安徽师范大学 Collaborative filtering recommending method based on emotion with trust

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ZHITING LIN等: ""Clarifying Trust in Social Internet of Things"", 《IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING》 *
张群: ""基于双连通性的在线社交网络关键用户发现"", 《中国优秀硕士学位论文全文数据库》 *
蒋昌礼: ""微博网络关键节点和关键链路识别方法研究与软件研制"", 《中国优秀硕士学位论文全文数据库》 *

Also Published As

Publication number Publication date
CN108599991B (en) 2020-12-29

Similar Documents

Publication Publication Date Title
Rathore et al. BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network
Wang et al. The evolution of the Internet of Things (IoT) over the past 20 years
Kong et al. k-core: Theories and applications
CN105991521B (en) Network risk assessment method and device
Borge-Holthoefer et al. Absence of influential spreaders in rumor dynamics
CN110677433B (en) Method, system, equipment and readable storage medium for predicting network attack
Chen et al. FCM technique for efficient intrusion detection system for wireless networks in cloud environment
CN107733877B (en) Management method and system for wireless communication architecture of Internet of things
Kaur et al. Edge computing: Classification, applications, and challenges
Savenko et al. Botnet detection technique for corporate area network
Jaouadi et al. Influence maximization problem in social networks: An overview
Bhale et al. Energy efficient approach to detect sinkhole attack using roving IDS in 6LoWPAN network
Ayaz et al. Energy Efficient Intrusion Detection in a heterogeneous environment of Wireless sensor networks
Feng et al. Predicting the intrusion intentions by observing system call sequences
Hsieh et al. Applying an ontology to a patrol intrusion detection system for wireless sensor networks
Wang et al. Exploiting social circle broadness for influential spreaders identification in social networks
Poongothai et al. A noncooperative game approach for intrusion detection in mobile adhoc networks
Khamayseh et al. Dynamic framework to mining internet of things for multimedia services
Król On modelling social propagation phenomenon
CN108599991A (en) The key node searching method of Trust transitivity is influenced in social Internet of Things
Perez et al. A dynamic approach to detecting suspicious profiles on social platforms
Chen et al. Dynamic threshold strategy optimization for security protection in Internet of Things: An adversarial deep learning‐based game‐theoretical approach
Yang et al. Research on detection and prevention of mobile device botnet in cloud service systems
Shalaginov et al. Modern cybercrime investigation: technological advancement of smart devices and legal aspects of corresponding digital transformation
Tseng et al. Building a self-organizing phishing model based upon dynamic EMCUD

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant