CN109361687A - A kind of P2P private network control method and control device - Google Patents

A kind of P2P private network control method and control device Download PDF

Info

Publication number
CN109361687A
CN109361687A CN201811367230.6A CN201811367230A CN109361687A CN 109361687 A CN109361687 A CN 109361687A CN 201811367230 A CN201811367230 A CN 201811367230A CN 109361687 A CN109361687 A CN 109361687A
Authority
CN
China
Prior art keywords
terminal
data
network
downloading
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811367230.6A
Other languages
Chinese (zh)
Inventor
祝志波
郑宗超
白雪峰
高杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI 2345 NETWORK TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI 2345 NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI 2345 NETWORK TECHNOLOGY Co Ltd filed Critical SHANGHAI 2345 NETWORK TECHNOLOGY Co Ltd
Priority to CN201811367230.6A priority Critical patent/CN109361687A/en
Publication of CN109361687A publication Critical patent/CN109361687A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks

Abstract

The present invention provides a kind of P2P private network control methods to include the following steps: that a. receives the data download request from a terminal for downloading in P2P processing data under network environment;B. judge whether the terminal has the permission for downloading the data, if the terminal has the permission for downloading the data, execute down operation;Wherein, the P2P network is to the terminal and not set browsing limits, the present invention provides a kind of P2P private network control method and control devices, access whether terminal has access authority by judging, so that it is determined that executing down operation, the judgment mode of the terminal access permission includes but is not limited to be judged by forms such as asymmetric secret key or white lists, operation of the present invention is simple, easy to use, powerful, it is practical, there is great commercial value.

Description

A kind of P2P private network control method and control device
Technical field
The invention belongs to P2P private network field, in particular to a kind of P2P private network control method and control device.
Background technique
With the continuous development of computer technology and network technology, internet is in people's lives, study, work, scientific research In play indispensable effect, people will be completed various affairs by internet nearly every day, be obtained Various information are taken, the either service of information provided by different websites is different, when user needs to obtain news When, needing to browse news website may browse through special shopping website when user needs to buy thing.
Nowadays, internet has become one of people's life habit, such as at work, if a company has The file of storage then in order to which the information between multiple computers can be shared, while can be allowed specified computer by multiple computers Access, at this moment, so that it may by way of P2P, make each computer all in the status of equity, a computer both can be used as Server can also be used as work station, thus can greatly improve the efficiency of work.
P2P, i.e. peer-to-peer computer network are a kind of distributions that task and workload are distributed between fellow (Peer) A kind of networking or latticed form that formula application architecture, which is P2P computing model, to be formed in application layer.It is " right that " Peer " has in English The meaning of grade persons, partner, opposite end ".Therefore, from literal, P2P can be understood as P2P computing or peer-to-peer network.It is domestic P2P is translated into " point-to-point " or " end-to-end " by media, and academia is then collectively referred to as peer-to-peer network (Peer-to-peer It networking) or P2P computing (Peer-to-peer computing), can be with is defined as: the participant of network shares him A part of hardware resource (processing capacity, storage capacity, network-connectivity, printer etc.) for being possessed, these shared moneys Source can directly be accessed by network offering services and content by other peer nodes (Peer) without being subjected to intermediate entities.? Participant in this network is both supplier (Server) and the acquisition of resource, service and content of resource, service and content Person (Client).
In P2P network environment, all in the status of equity between the multiple stage computers that are connected to each other, each computer has Identical function, no master-slave, a computer can not only be used for server, set shared resource for other computers in network It is used, and can be used as work station, in general whole network does not depend on dedicated centralized servers, without dedicated work yet It stands.Each computer in network can serve as the requestor of network service and sound is made in the request of other computers It answers, resource, service and content is provided.These usual resources and service include: shared and the exchange, computing resource (such as CPU of information Computing capability is shared), storage shared (such as the use of caching and disk space), network share, sharing printer.
A kind of common data interchange or shared form are exactly the form of P2P currently on the market, i.e., point-to-point, end-to-end Form, such form does not need intermediate server, to reduce intermediate link, effectively raise efficiency, still, by In many files be not the permission for being suitble to each computer to be owned by access so that how to be encrypted on the private network of P2P but at Current urgent problem.
And currently, there is no a kind of method for being able to solve the above problem, especially a kind of P2P private network controlling parties in the market Method and control device.
Summary of the invention
For technological deficiency of the existing technology, the object of the present invention is to provide a kind of P2P private network control method and Control device, according to an aspect of the invention, there is provided a kind of P2P private network control method, under P2P network environment Data downloading is managed, is included the following steps:
A. the data download request from a terminal is received;
B. judge whether the terminal has the permission for downloading the data, if the terminal, which has, downloads the data Permission then executes down operation;
Wherein, the P2P network is to the terminal and not set browsing limits.
Preferably, the terminal is judged in the step b whether there is the step of permission for downloading the data to include such as Lower step:
B1. judge whether the terminal has the permission for downloading the data based on asymmetric key mechanisms.
Preferably, the terminal is judged in the step b whether there is the step of permission for downloading the data to include such as Lower step:
Whether b1 ' judges the terminal in the white list of the P2P network;
If b2 ' the terminal is in the white list, it is determined that the terminal has the permission for downloading the data.
Preferably, the white list corresponds to the white list of the part resource in the P2P Internet resources, the P2P net There are multiple white lists in network.
Preferably, download permission is set when the data in the P2P network are stored.
According to another aspect of the present invention, a kind of P2P private network control device is provided, comprising:
First acquisition device: the data download request from a terminal is received;
First judgment means: judging whether the terminal has the permission for downloading the data, if under the terminal has The permission for carrying the data, then execute down operation;
Wherein, the P2P network is to the terminal and not set browsing limits.
Preferably, further includes:
Second judgment means: judge whether the terminal has the power for downloading the data based on asymmetric key mechanisms Limit.
Preferably, further includes:
Third judgment means: judge the terminal whether in the white list of the P2P network;
First determining device: if the terminal is in the white list, it is determined that the terminal, which has, downloads the data Permission.
The present invention provides a kind of P2P private network control method and control devices, access whether terminal has visit by judging Ask permission, so that it is determined that execute down operation, the judgment mode of the terminal access permission include but is not limited to pass through it is asymmetric The judgement of the forms such as secret key or white list, operation of the present invention is simple, easy to use, powerful, practical, has very big Commercial value.
Detailed description of the invention
Upon reading the detailed description of non-limiting embodiments with reference to the following drawings, other feature of the invention, Objects and advantages will become more apparent upon:
Fig. 1 shows a specific embodiment of the invention, a kind of idiographic flow schematic diagram of P2P private network control method;
Fig. 2 shows the first embodiment of the present invention, receive and judge whether the terminal has based on asymmetric key mechanisms There is the idiographic flow schematic diagram for the permission for downloading the data;
Whether Fig. 3 shows the second embodiment of the present invention, judge the terminal in the white list of the P2P network Idiographic flow schematic diagram;And
Fig. 4 shows another embodiment of the present invention, a kind of module connection signal of P2P private network control device Figure.
Specific embodiment
In order to preferably technical solution of the present invention be made clearly to show, the present invention is made into one with reference to the accompanying drawing Walk explanation.
Fig. 1 shows a specific embodiment of the invention, a kind of idiographic flow schematic diagram of P2P private network control method, Specifically, include the following steps:
Firstly, enter step S101, the data download request from a terminal is received, by terminal to the P2P net Network initiates access request, and the feedback information based on the P2P network and the terminal establish data connection, and the terminal is based on It is requested with the data connection of the P2P network to the downloading of the P2P network initiated data, it will be appreciated by those skilled in the art that institute Stating terminal can be the terminal calculated in unit, the terminal being also possible in the non-computational unit by domain name access.
Further, the P2P network is to the terminal and not set browsing limits, and the terminal is in the P2P network Inside possess browse right, it can be understood as, the terminal not to the data in the P2P network be downloaded request when It waits, there is the permission for browsing all files to be downloaded or data.
Then, S102 is entered step, judges whether the terminal has the permission for downloading the data, the terminal passes through The P2P network initiates downloading request, and the P2P network is based on the end message and judges whether the terminal has the number According to download permission, judge whether the terminal there is download permission can judge in the following way, be based on unsymmetrical key machine Whether system judges whether the terminal has the permission for downloading the data, or by judging the terminal in the P2P net In the white list of network, if the terminal is in the white list, it is determined that the terminal has the permission for downloading the data, with Upper two kinds of judgment modes will be described in detail in subsequent embodiment, and it will not be described here, it will be appreciated by those skilled in the art that this Step is judgment step, if judging, the terminal has access authority, thens follow the steps S103, the terminal is not visited if judging Ask permission, then middle connection breaking.
Finally, entering step S103, if the terminal has the permission for downloading the data, down operation is executed, institute It states after P2P network judges that the terminal has download permission, the terminal then can execute down operation in the P2P network, It will be appreciated by those skilled in the art that the terminal then belongs in the P2P network under the premise of terminal has download permission A server, and the other end for being performed down operation also corresponds to a server, and the P2P is equivalent to a little pair The data interchange of point, eliminates the transition of intermediate link, greatly improves the efficiency of downloading or upload.
Fig. 2 shows the first embodiment of the present invention, receive and judge whether the terminal has based on asymmetric key mechanisms There is the idiographic flow schematic diagram for the permission for downloading the data specifically to include the following steps:
It will be appreciated by those skilled in the art that the step S201 in described Fig. 2 can refer to the step S101 in described Fig. 1, It will not go into details for this.
Then, S202 is entered step, judges whether the terminal has the downloading data based on asymmetric key mechanisms Permission, it will be appreciated by those skilled in the art that nowadays in the mode of conventional P2P, there is no for being downloaded file setting Any encryption measures, and be easy to cause the hidden danger of very big information leakage in this way, and in this application, by it is described to Downloading file setting asymmetric key mechanisms the problem of can be effectively solved the safety of file, specifically, the terminal to The P2P network initiates downloading request, and the P2P network is by verifying whether unsymmetrical key matches, to judge the end Whether end has download permission, and the unsymmetrical key needs two keys, i.e. public key and private key, quilt in the file to be downloaded One private key is set, if the terminal initiates downloading request to the file to be downloaded in the P2P network, the terminal is needed To input the public key to match with the file to be downloaded in the file to be downloaded, could complete to match, the public key and The private key is uniquely, it will be appreciated by those skilled in the art that the step S202 is judgment step, if being passed through by the terminal The asymmetric key mechanisms judge that the terminal has access authority, then follow the steps S203, conversely, if the terminal passes through The asymmetric key mechanisms judge that the terminal does not have access authority, then the P2P network will refuse the terminal Downloading request.
In a preferred embodiment, the terminal inputs and the file to be downloaded phase in the P2P network When the public key matched, if there is the case where input error, a settable threshold value in the P2P network such as allows input error time Number is three times, if being more than input or mistake three times, it is determined that the public key of the terminal, which inputs, to be mismatched, meanwhile, to it is described to The holder for downloading file private key sends relevant information, such as accesses the IP of terminal and the specific time information of request downloading.
It will be appreciated by those skilled in the art that the step S203 in described Fig. 2 can refer to the step S103 in described Fig. 1, It will not go into details for this.
Whether Fig. 3 shows the second embodiment of the present invention, judge the terminal in the white list of the P2P network Idiographic flow schematic diagram specifically include the following steps:
It will be appreciated by those skilled in the art that the step S301 in described Fig. 3 can refer to the step S101 in described Fig. 1, It will not go into details for this.
Then, S302 is entered step, the terminal is judged whether in the white list of the P2P network, in such reality It applies in example, white list can be arranged in the holder of the file to be downloaded in the file to be downloaded, and the white list corresponds to In the P2P network calculate unit in all computers, by all computers selective choosing have access right The computer of limit, to form white list, the terminal for not being selected into the white list does not have download permission then.
Further, the white list corresponds to the white list of the part resource in the P2P Internet resources, the P2P There are multiple white lists in network, it will be appreciated by those skilled in the art that there are multiple networks moneys in the P2P Internet resources Source, the white list are that all or part of Internet resources are added to the white list in multiple Internet resources.
In a preferred embodiment, the terminal is not in the white list, and the P2P network is to described under The downloading request that document holder sends the terminal is carried, the terminal can be added in real time by the file to be downloaded holder To in the white list, the terminal is made to have download permission.
Finally, S303 is entered step, if the terminal is in the white list, it is determined that the terminal has described in downloading The permission of data, the terminal judge that the terminal is then based on the terminal in the white list by the P2P network In the white list, the P2P network determines that the download permission of the terminal, the terminal carry out down the downloading file Carry operation.
It will be appreciated by those skilled in the art that the storage person is then to institute when storing in the P2P network to file The white list for stating store files setting download permission, make it is described be stored file can only by the terminal downloads in the white list, Preferably, when storing in the P2P network to file, while also the file can be arranged browse right, it is described Browse right can also be arranged by white list, and the white list of the browse right and the white list of the download permission can be set respectively It sets.
Further, the judgment mode in described Fig. 2 synchronous can be executed with the judgment mode in described Fig. 3, specifically, first Judge the terminal whether in the list of the white list, if the terminal in the list of the white list, to described When file to be downloaded initiates downloading request, then also need to input the public key to match with the private key of the file to be downloaded, in institute Under the premise of the successful matching for stating asymmetric key mechanisms, behaviour that the terminal could be downloaded the valence of asking to be downloaded Make.
Fig. 4 shows another embodiment of the present invention, a kind of module connection of P2P private network control device is shown It is intended to, it will be appreciated by those skilled in the art that the present invention provides a kind of P2P private network control devices, comprising: the first acquisition device: connect The data download request from a terminal is received, access request is initiated to the P2P network by terminal, and be based on the P2P The feedback information of network and the terminal establish data connection, and the terminal is based on the data connection with the P2P network to institute The downloading request of P2P network initiated data is stated, the terminal can be the terminal in the calculating unit, be also possible to pass through domain Terminal in the non-computational unit of name access, first acquisition device are connect with first judgment means.
Further, further include the first judgment means: judging whether the terminal has the permission for downloading the data, if The terminal has the permission for downloading the data, then executes down operation;Wherein, the P2P network to the terminal not Setting browsing limitation, the P2P network judge whether the terminal there is the downloading of the data to weigh based on the end message Limit, judges whether the terminal there is download permission can judge in the following way, based on described in asymmetric key mechanisms judgement Whether terminal has a permission for downloading the data, or by judge the terminal whether the P2P network white list It is interior, if the terminal is in the white list, it is determined that the terminal has the permission for downloading the data, first judgement Device is connect with first acquisition device, and respectively with second judgment means, the third judgment means and described The connection of one determining device.
It further, further include the second judgment means: under judging whether the terminal has based on asymmetric key mechanisms The permission of the data is carried, the terminal initiates downloading request to the P2P network, and the P2P network is asymmetric by verifying Whether key matches, to judge whether the terminal has download permission, the unsymmetrical key needs two keys, i.e., public A private key is set in the file to be downloaded, if the terminal is in the P2P network to the text to be downloaded in key and private key Part initiates downloading request, then the terminal needs to input the public affairs to match with the file to be downloaded in the file to be downloaded Key, could complete pairing, and the public key and the private key are unique, second judgment means and first judgment means Connection.
Further, further include third judgment means: judge the terminal whether in the white list of the P2P network, White list can be arranged in the holder of the file to be downloaded in the file to be downloaded, and the white list corresponds to the P2P All computers in unit are calculated in network, by all computers selective choosing have the calculating of access authority Machine, to form white list, the terminal for not being selected into the white list does not have download permission then, the third judgment means with First judgment means and first determining device connection.
It further, further include the first determining device: if the terminal is in the white list, it is determined that the terminal tool There is a permission for downloading the data, the terminal is judged by the P2P network, and the terminal is in the white list, then base In the terminal in the white list, the P2P network determines the download permission of the terminal, and the terminal is to the downloading File is downloaded operation, and first determining device is connect with first judgment means and the third judgment means.
Specific embodiments of the present invention are described above.It is to be appreciated that the invention is not limited to above-mentioned Particular implementation, those skilled in the art can make various deformations or amendments within the scope of the claims, this not shadow Ring substantive content of the invention.

Claims (8)

1. a kind of P2P private network control method, for being downloaded in P2P processing data under network environment, which is characterized in that including as follows Step:
A. the data download request from a terminal is received;
B. judge whether the terminal has the permission for downloading the data, if the terminal has the power for downloading the data Limit, then execute down operation;
Wherein, the P2P network is to the terminal and not set browsing limits,
Wherein, judge that the step of whether terminal has the permission for downloading the data includes the following steps: in the step b
Whether b1 〞 judges the terminal in the white list of the P2P network;
B2 〞 judges whether the terminal has the permission for downloading the data based on asymmetric key mechanisms.
2. control method according to claim 1, which is characterized in that judge whether the terminal has in the step b The step of downloading the permission of the data includes the following steps:
B1. judge whether the terminal has the permission for downloading the data based on asymmetric key mechanisms.
3. control method according to claim 1, which is characterized in that judge whether the terminal has in the step b The step of downloading the permission of the data includes the following steps:
Whether b1 ' judges the terminal in the white list of the P2P network;
If b2 ' the terminal is in the white list, it is determined that the terminal has the permission for downloading the data.
4. control method according to claim 3, which is characterized in that the white list corresponds to the P2P Internet resources In part resource white list, there are multiple white lists in the P2P network.
5. control method according to any one of claim 1 to 4, which is characterized in that the data quilt in the P2P network Download permission is set when storage.
6. a kind of P2P private network control device characterized by comprising
First acquisition device (1): the data download request from a terminal is received;
First judgment means (2): judging whether the terminal has the permission for downloading the data, if the terminal has downloading The permission of the data, then execute down operation;
Wherein, the P2P network is to the terminal and not set browsing limits.
7. control device according to claim 6, which is characterized in that further include:
Second judgment means (21): judge whether the terminal has the power for downloading the data based on asymmetric key mechanisms Limit.
8. control device according to claim 6, which is characterized in that further include:
Third judgment means (22): judge the terminal whether in the white list of the P2P network;
First determining device (23): if the terminal is in the white list, it is determined that the terminal, which has, downloads the data Permission.
CN201811367230.6A 2018-11-16 2018-11-16 A kind of P2P private network control method and control device Withdrawn CN109361687A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811367230.6A CN109361687A (en) 2018-11-16 2018-11-16 A kind of P2P private network control method and control device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811367230.6A CN109361687A (en) 2018-11-16 2018-11-16 A kind of P2P private network control method and control device

Publications (1)

Publication Number Publication Date
CN109361687A true CN109361687A (en) 2019-02-19

Family

ID=65345580

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811367230.6A Withdrawn CN109361687A (en) 2018-11-16 2018-11-16 A kind of P2P private network control method and control device

Country Status (1)

Country Link
CN (1) CN109361687A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050240591A1 (en) * 2004-04-21 2005-10-27 Carla Marceau Secure peer-to-peer object storage system
CN101068245A (en) * 2007-03-30 2007-11-07 腾讯科技(深圳)有限公司 Shared file issuing and downloading method and file sharing control system
CN101515947A (en) * 2009-02-17 2009-08-26 浙江大学 Method and system for the quick-speed and safe distribution of file based on P2P
CN102523282A (en) * 2011-12-14 2012-06-27 北京百纳威尔科技有限公司 Mobile terminal data sharing method, apparatus thereof and network server
CN108683747A (en) * 2018-06-11 2018-10-19 华为技术有限公司 Resource acquisition, distribution, method for down loading, device, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050240591A1 (en) * 2004-04-21 2005-10-27 Carla Marceau Secure peer-to-peer object storage system
CN101068245A (en) * 2007-03-30 2007-11-07 腾讯科技(深圳)有限公司 Shared file issuing and downloading method and file sharing control system
CN101515947A (en) * 2009-02-17 2009-08-26 浙江大学 Method and system for the quick-speed and safe distribution of file based on P2P
CN102523282A (en) * 2011-12-14 2012-06-27 北京百纳威尔科技有限公司 Mobile terminal data sharing method, apparatus thereof and network server
CN108683747A (en) * 2018-06-11 2018-10-19 华为技术有限公司 Resource acquisition, distribution, method for down loading, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US11770296B2 (en) Decentralized data storage and processing for IoT devices
Ray An introduction to dew computing: definition, concept and implications
Soni et al. API features individualizing of web services: REST and SOAP
TWI221979B (en) Secured and access controlled peer-to-peer resource sharing method and apparatus
Kourtellis et al. Prometheus: User-controlled p2p social data management for socially-aware applications
CN114756520A (en) Method and system for synchronizing offline data in a computing system
TW201404073A (en) Techniques to monitor connection pathson networked devices
US20100138552A1 (en) Edge peer device, pan gateway device, super peer device, and p2p network-based interconnection method
Rubio-Medrano et al. Federated access management for collaborative network environments: Framework and case study
Bernstein et al. Intercloud exchanges and roots topology and trust blueprint
US20230137345A1 (en) System and method for decentralized user controlled social media
CN109361687A (en) A kind of P2P private network control method and control device
Mayer et al. Semantic metadata to support device interaction in smart environments
Kourtellis et al. Special issue on foundations of social computing: Enabling social applications via decentralized social data management
Verma et al. SRIRAM: A scalable resilient autonomic mesh
Ullah et al. IoT resource management using direct discovery mechanism in OCF framework
US11943211B2 (en) Device monitoring in accessing network
Li et al. Context-aware trust negotiation in peer-to-peer service collaborations
Kraft et al. Using conflict-free replicated data types for serverless mobile social applications
Apolónia et al. Enhancing online communities with cycle-sharing for social networks
Tomaiuolo et al. Supporting Social Networks With Agent-Based Services
Friedman et al. A generic decentralized trust management framework
Huang Managing Data Consistency in IoT Devices
Krishnan et al. Cloud Storage
Yu Intercloud system and data communications protocol

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20190219

WW01 Invention patent application withdrawn after publication