CN109361687A - A kind of P2P private network control method and control device - Google Patents
A kind of P2P private network control method and control device Download PDFInfo
- Publication number
- CN109361687A CN109361687A CN201811367230.6A CN201811367230A CN109361687A CN 109361687 A CN109361687 A CN 109361687A CN 201811367230 A CN201811367230 A CN 201811367230A CN 109361687 A CN109361687 A CN 109361687A
- Authority
- CN
- China
- Prior art keywords
- terminal
- data
- network
- downloading
- permission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
Abstract
The present invention provides a kind of P2P private network control methods to include the following steps: that a. receives the data download request from a terminal for downloading in P2P processing data under network environment;B. judge whether the terminal has the permission for downloading the data, if the terminal has the permission for downloading the data, execute down operation;Wherein, the P2P network is to the terminal and not set browsing limits, the present invention provides a kind of P2P private network control method and control devices, access whether terminal has access authority by judging, so that it is determined that executing down operation, the judgment mode of the terminal access permission includes but is not limited to be judged by forms such as asymmetric secret key or white lists, operation of the present invention is simple, easy to use, powerful, it is practical, there is great commercial value.
Description
Technical field
The invention belongs to P2P private network field, in particular to a kind of P2P private network control method and control device.
Background technique
With the continuous development of computer technology and network technology, internet is in people's lives, study, work, scientific research
In play indispensable effect, people will be completed various affairs by internet nearly every day, be obtained
Various information are taken, the either service of information provided by different websites is different, when user needs to obtain news
When, needing to browse news website may browse through special shopping website when user needs to buy thing.
Nowadays, internet has become one of people's life habit, such as at work, if a company has
The file of storage then in order to which the information between multiple computers can be shared, while can be allowed specified computer by multiple computers
Access, at this moment, so that it may by way of P2P, make each computer all in the status of equity, a computer both can be used as
Server can also be used as work station, thus can greatly improve the efficiency of work.
P2P, i.e. peer-to-peer computer network are a kind of distributions that task and workload are distributed between fellow (Peer)
A kind of networking or latticed form that formula application architecture, which is P2P computing model, to be formed in application layer.It is " right that " Peer " has in English
The meaning of grade persons, partner, opposite end ".Therefore, from literal, P2P can be understood as P2P computing or peer-to-peer network.It is domestic
P2P is translated into " point-to-point " or " end-to-end " by media, and academia is then collectively referred to as peer-to-peer network (Peer-to-peer
It networking) or P2P computing (Peer-to-peer computing), can be with is defined as: the participant of network shares him
A part of hardware resource (processing capacity, storage capacity, network-connectivity, printer etc.) for being possessed, these shared moneys
Source can directly be accessed by network offering services and content by other peer nodes (Peer) without being subjected to intermediate entities.?
Participant in this network is both supplier (Server) and the acquisition of resource, service and content of resource, service and content
Person (Client).
In P2P network environment, all in the status of equity between the multiple stage computers that are connected to each other, each computer has
Identical function, no master-slave, a computer can not only be used for server, set shared resource for other computers in network
It is used, and can be used as work station, in general whole network does not depend on dedicated centralized servers, without dedicated work yet
It stands.Each computer in network can serve as the requestor of network service and sound is made in the request of other computers
It answers, resource, service and content is provided.These usual resources and service include: shared and the exchange, computing resource (such as CPU of information
Computing capability is shared), storage shared (such as the use of caching and disk space), network share, sharing printer.
A kind of common data interchange or shared form are exactly the form of P2P currently on the market, i.e., point-to-point, end-to-end
Form, such form does not need intermediate server, to reduce intermediate link, effectively raise efficiency, still, by
In many files be not the permission for being suitble to each computer to be owned by access so that how to be encrypted on the private network of P2P but at
Current urgent problem.
And currently, there is no a kind of method for being able to solve the above problem, especially a kind of P2P private network controlling parties in the market
Method and control device.
Summary of the invention
For technological deficiency of the existing technology, the object of the present invention is to provide a kind of P2P private network control method and
Control device, according to an aspect of the invention, there is provided a kind of P2P private network control method, under P2P network environment
Data downloading is managed, is included the following steps:
A. the data download request from a terminal is received;
B. judge whether the terminal has the permission for downloading the data, if the terminal, which has, downloads the data
Permission then executes down operation;
Wherein, the P2P network is to the terminal and not set browsing limits.
Preferably, the terminal is judged in the step b whether there is the step of permission for downloading the data to include such as
Lower step:
B1. judge whether the terminal has the permission for downloading the data based on asymmetric key mechanisms.
Preferably, the terminal is judged in the step b whether there is the step of permission for downloading the data to include such as
Lower step:
Whether b1 ' judges the terminal in the white list of the P2P network;
If b2 ' the terminal is in the white list, it is determined that the terminal has the permission for downloading the data.
Preferably, the white list corresponds to the white list of the part resource in the P2P Internet resources, the P2P net
There are multiple white lists in network.
Preferably, download permission is set when the data in the P2P network are stored.
According to another aspect of the present invention, a kind of P2P private network control device is provided, comprising:
First acquisition device: the data download request from a terminal is received;
First judgment means: judging whether the terminal has the permission for downloading the data, if under the terminal has
The permission for carrying the data, then execute down operation;
Wherein, the P2P network is to the terminal and not set browsing limits.
Preferably, further includes:
Second judgment means: judge whether the terminal has the power for downloading the data based on asymmetric key mechanisms
Limit.
Preferably, further includes:
Third judgment means: judge the terminal whether in the white list of the P2P network;
First determining device: if the terminal is in the white list, it is determined that the terminal, which has, downloads the data
Permission.
The present invention provides a kind of P2P private network control method and control devices, access whether terminal has visit by judging
Ask permission, so that it is determined that execute down operation, the judgment mode of the terminal access permission include but is not limited to pass through it is asymmetric
The judgement of the forms such as secret key or white list, operation of the present invention is simple, easy to use, powerful, practical, has very big
Commercial value.
Detailed description of the invention
Upon reading the detailed description of non-limiting embodiments with reference to the following drawings, other feature of the invention,
Objects and advantages will become more apparent upon:
Fig. 1 shows a specific embodiment of the invention, a kind of idiographic flow schematic diagram of P2P private network control method;
Fig. 2 shows the first embodiment of the present invention, receive and judge whether the terminal has based on asymmetric key mechanisms
There is the idiographic flow schematic diagram for the permission for downloading the data;
Whether Fig. 3 shows the second embodiment of the present invention, judge the terminal in the white list of the P2P network
Idiographic flow schematic diagram;And
Fig. 4 shows another embodiment of the present invention, a kind of module connection signal of P2P private network control device
Figure.
Specific embodiment
In order to preferably technical solution of the present invention be made clearly to show, the present invention is made into one with reference to the accompanying drawing
Walk explanation.
Fig. 1 shows a specific embodiment of the invention, a kind of idiographic flow schematic diagram of P2P private network control method,
Specifically, include the following steps:
Firstly, enter step S101, the data download request from a terminal is received, by terminal to the P2P net
Network initiates access request, and the feedback information based on the P2P network and the terminal establish data connection, and the terminal is based on
It is requested with the data connection of the P2P network to the downloading of the P2P network initiated data, it will be appreciated by those skilled in the art that institute
Stating terminal can be the terminal calculated in unit, the terminal being also possible in the non-computational unit by domain name access.
Further, the P2P network is to the terminal and not set browsing limits, and the terminal is in the P2P network
Inside possess browse right, it can be understood as, the terminal not to the data in the P2P network be downloaded request when
It waits, there is the permission for browsing all files to be downloaded or data.
Then, S102 is entered step, judges whether the terminal has the permission for downloading the data, the terminal passes through
The P2P network initiates downloading request, and the P2P network is based on the end message and judges whether the terminal has the number
According to download permission, judge whether the terminal there is download permission can judge in the following way, be based on unsymmetrical key machine
Whether system judges whether the terminal has the permission for downloading the data, or by judging the terminal in the P2P net
In the white list of network, if the terminal is in the white list, it is determined that the terminal has the permission for downloading the data, with
Upper two kinds of judgment modes will be described in detail in subsequent embodiment, and it will not be described here, it will be appreciated by those skilled in the art that this
Step is judgment step, if judging, the terminal has access authority, thens follow the steps S103, the terminal is not visited if judging
Ask permission, then middle connection breaking.
Finally, entering step S103, if the terminal has the permission for downloading the data, down operation is executed, institute
It states after P2P network judges that the terminal has download permission, the terminal then can execute down operation in the P2P network,
It will be appreciated by those skilled in the art that the terminal then belongs in the P2P network under the premise of terminal has download permission
A server, and the other end for being performed down operation also corresponds to a server, and the P2P is equivalent to a little pair
The data interchange of point, eliminates the transition of intermediate link, greatly improves the efficiency of downloading or upload.
Fig. 2 shows the first embodiment of the present invention, receive and judge whether the terminal has based on asymmetric key mechanisms
There is the idiographic flow schematic diagram for the permission for downloading the data specifically to include the following steps:
It will be appreciated by those skilled in the art that the step S201 in described Fig. 2 can refer to the step S101 in described Fig. 1,
It will not go into details for this.
Then, S202 is entered step, judges whether the terminal has the downloading data based on asymmetric key mechanisms
Permission, it will be appreciated by those skilled in the art that nowadays in the mode of conventional P2P, there is no for being downloaded file setting
Any encryption measures, and be easy to cause the hidden danger of very big information leakage in this way, and in this application, by it is described to
Downloading file setting asymmetric key mechanisms the problem of can be effectively solved the safety of file, specifically, the terminal to
The P2P network initiates downloading request, and the P2P network is by verifying whether unsymmetrical key matches, to judge the end
Whether end has download permission, and the unsymmetrical key needs two keys, i.e. public key and private key, quilt in the file to be downloaded
One private key is set, if the terminal initiates downloading request to the file to be downloaded in the P2P network, the terminal is needed
To input the public key to match with the file to be downloaded in the file to be downloaded, could complete to match, the public key and
The private key is uniquely, it will be appreciated by those skilled in the art that the step S202 is judgment step, if being passed through by the terminal
The asymmetric key mechanisms judge that the terminal has access authority, then follow the steps S203, conversely, if the terminal passes through
The asymmetric key mechanisms judge that the terminal does not have access authority, then the P2P network will refuse the terminal
Downloading request.
In a preferred embodiment, the terminal inputs and the file to be downloaded phase in the P2P network
When the public key matched, if there is the case where input error, a settable threshold value in the P2P network such as allows input error time
Number is three times, if being more than input or mistake three times, it is determined that the public key of the terminal, which inputs, to be mismatched, meanwhile, to it is described to
The holder for downloading file private key sends relevant information, such as accesses the IP of terminal and the specific time information of request downloading.
It will be appreciated by those skilled in the art that the step S203 in described Fig. 2 can refer to the step S103 in described Fig. 1,
It will not go into details for this.
Whether Fig. 3 shows the second embodiment of the present invention, judge the terminal in the white list of the P2P network
Idiographic flow schematic diagram specifically include the following steps:
It will be appreciated by those skilled in the art that the step S301 in described Fig. 3 can refer to the step S101 in described Fig. 1,
It will not go into details for this.
Then, S302 is entered step, the terminal is judged whether in the white list of the P2P network, in such reality
It applies in example, white list can be arranged in the holder of the file to be downloaded in the file to be downloaded, and the white list corresponds to
In the P2P network calculate unit in all computers, by all computers selective choosing have access right
The computer of limit, to form white list, the terminal for not being selected into the white list does not have download permission then.
Further, the white list corresponds to the white list of the part resource in the P2P Internet resources, the P2P
There are multiple white lists in network, it will be appreciated by those skilled in the art that there are multiple networks moneys in the P2P Internet resources
Source, the white list are that all or part of Internet resources are added to the white list in multiple Internet resources.
In a preferred embodiment, the terminal is not in the white list, and the P2P network is to described under
The downloading request that document holder sends the terminal is carried, the terminal can be added in real time by the file to be downloaded holder
To in the white list, the terminal is made to have download permission.
Finally, S303 is entered step, if the terminal is in the white list, it is determined that the terminal has described in downloading
The permission of data, the terminal judge that the terminal is then based on the terminal in the white list by the P2P network
In the white list, the P2P network determines that the download permission of the terminal, the terminal carry out down the downloading file
Carry operation.
It will be appreciated by those skilled in the art that the storage person is then to institute when storing in the P2P network to file
The white list for stating store files setting download permission, make it is described be stored file can only by the terminal downloads in the white list,
Preferably, when storing in the P2P network to file, while also the file can be arranged browse right, it is described
Browse right can also be arranged by white list, and the white list of the browse right and the white list of the download permission can be set respectively
It sets.
Further, the judgment mode in described Fig. 2 synchronous can be executed with the judgment mode in described Fig. 3, specifically, first
Judge the terminal whether in the list of the white list, if the terminal in the list of the white list, to described
When file to be downloaded initiates downloading request, then also need to input the public key to match with the private key of the file to be downloaded, in institute
Under the premise of the successful matching for stating asymmetric key mechanisms, behaviour that the terminal could be downloaded the valence of asking to be downloaded
Make.
Fig. 4 shows another embodiment of the present invention, a kind of module connection of P2P private network control device is shown
It is intended to, it will be appreciated by those skilled in the art that the present invention provides a kind of P2P private network control devices, comprising: the first acquisition device: connect
The data download request from a terminal is received, access request is initiated to the P2P network by terminal, and be based on the P2P
The feedback information of network and the terminal establish data connection, and the terminal is based on the data connection with the P2P network to institute
The downloading request of P2P network initiated data is stated, the terminal can be the terminal in the calculating unit, be also possible to pass through domain
Terminal in the non-computational unit of name access, first acquisition device are connect with first judgment means.
Further, further include the first judgment means: judging whether the terminal has the permission for downloading the data, if
The terminal has the permission for downloading the data, then executes down operation;Wherein, the P2P network to the terminal not
Setting browsing limitation, the P2P network judge whether the terminal there is the downloading of the data to weigh based on the end message
Limit, judges whether the terminal there is download permission can judge in the following way, based on described in asymmetric key mechanisms judgement
Whether terminal has a permission for downloading the data, or by judge the terminal whether the P2P network white list
It is interior, if the terminal is in the white list, it is determined that the terminal has the permission for downloading the data, first judgement
Device is connect with first acquisition device, and respectively with second judgment means, the third judgment means and described
The connection of one determining device.
It further, further include the second judgment means: under judging whether the terminal has based on asymmetric key mechanisms
The permission of the data is carried, the terminal initiates downloading request to the P2P network, and the P2P network is asymmetric by verifying
Whether key matches, to judge whether the terminal has download permission, the unsymmetrical key needs two keys, i.e., public
A private key is set in the file to be downloaded, if the terminal is in the P2P network to the text to be downloaded in key and private key
Part initiates downloading request, then the terminal needs to input the public affairs to match with the file to be downloaded in the file to be downloaded
Key, could complete pairing, and the public key and the private key are unique, second judgment means and first judgment means
Connection.
Further, further include third judgment means: judge the terminal whether in the white list of the P2P network,
White list can be arranged in the holder of the file to be downloaded in the file to be downloaded, and the white list corresponds to the P2P
All computers in unit are calculated in network, by all computers selective choosing have the calculating of access authority
Machine, to form white list, the terminal for not being selected into the white list does not have download permission then, the third judgment means with
First judgment means and first determining device connection.
It further, further include the first determining device: if the terminal is in the white list, it is determined that the terminal tool
There is a permission for downloading the data, the terminal is judged by the P2P network, and the terminal is in the white list, then base
In the terminal in the white list, the P2P network determines the download permission of the terminal, and the terminal is to the downloading
File is downloaded operation, and first determining device is connect with first judgment means and the third judgment means.
Specific embodiments of the present invention are described above.It is to be appreciated that the invention is not limited to above-mentioned
Particular implementation, those skilled in the art can make various deformations or amendments within the scope of the claims, this not shadow
Ring substantive content of the invention.
Claims (8)
1. a kind of P2P private network control method, for being downloaded in P2P processing data under network environment, which is characterized in that including as follows
Step:
A. the data download request from a terminal is received;
B. judge whether the terminal has the permission for downloading the data, if the terminal has the power for downloading the data
Limit, then execute down operation;
Wherein, the P2P network is to the terminal and not set browsing limits,
Wherein, judge that the step of whether terminal has the permission for downloading the data includes the following steps: in the step b
Whether b1 〞 judges the terminal in the white list of the P2P network;
B2 〞 judges whether the terminal has the permission for downloading the data based on asymmetric key mechanisms.
2. control method according to claim 1, which is characterized in that judge whether the terminal has in the step b
The step of downloading the permission of the data includes the following steps:
B1. judge whether the terminal has the permission for downloading the data based on asymmetric key mechanisms.
3. control method according to claim 1, which is characterized in that judge whether the terminal has in the step b
The step of downloading the permission of the data includes the following steps:
Whether b1 ' judges the terminal in the white list of the P2P network;
If b2 ' the terminal is in the white list, it is determined that the terminal has the permission for downloading the data.
4. control method according to claim 3, which is characterized in that the white list corresponds to the P2P Internet resources
In part resource white list, there are multiple white lists in the P2P network.
5. control method according to any one of claim 1 to 4, which is characterized in that the data quilt in the P2P network
Download permission is set when storage.
6. a kind of P2P private network control device characterized by comprising
First acquisition device (1): the data download request from a terminal is received;
First judgment means (2): judging whether the terminal has the permission for downloading the data, if the terminal has downloading
The permission of the data, then execute down operation;
Wherein, the P2P network is to the terminal and not set browsing limits.
7. control device according to claim 6, which is characterized in that further include:
Second judgment means (21): judge whether the terminal has the power for downloading the data based on asymmetric key mechanisms
Limit.
8. control device according to claim 6, which is characterized in that further include:
Third judgment means (22): judge the terminal whether in the white list of the P2P network;
First determining device (23): if the terminal is in the white list, it is determined that the terminal, which has, downloads the data
Permission.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811367230.6A CN109361687A (en) | 2018-11-16 | 2018-11-16 | A kind of P2P private network control method and control device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811367230.6A CN109361687A (en) | 2018-11-16 | 2018-11-16 | A kind of P2P private network control method and control device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109361687A true CN109361687A (en) | 2019-02-19 |
Family
ID=65345580
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811367230.6A Withdrawn CN109361687A (en) | 2018-11-16 | 2018-11-16 | A kind of P2P private network control method and control device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109361687A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050240591A1 (en) * | 2004-04-21 | 2005-10-27 | Carla Marceau | Secure peer-to-peer object storage system |
CN101068245A (en) * | 2007-03-30 | 2007-11-07 | 腾讯科技(深圳)有限公司 | Shared file issuing and downloading method and file sharing control system |
CN101515947A (en) * | 2009-02-17 | 2009-08-26 | 浙江大学 | Method and system for the quick-speed and safe distribution of file based on P2P |
CN102523282A (en) * | 2011-12-14 | 2012-06-27 | 北京百纳威尔科技有限公司 | Mobile terminal data sharing method, apparatus thereof and network server |
CN108683747A (en) * | 2018-06-11 | 2018-10-19 | 华为技术有限公司 | Resource acquisition, distribution, method for down loading, device, equipment and storage medium |
-
2018
- 2018-11-16 CN CN201811367230.6A patent/CN109361687A/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050240591A1 (en) * | 2004-04-21 | 2005-10-27 | Carla Marceau | Secure peer-to-peer object storage system |
CN101068245A (en) * | 2007-03-30 | 2007-11-07 | 腾讯科技(深圳)有限公司 | Shared file issuing and downloading method and file sharing control system |
CN101515947A (en) * | 2009-02-17 | 2009-08-26 | 浙江大学 | Method and system for the quick-speed and safe distribution of file based on P2P |
CN102523282A (en) * | 2011-12-14 | 2012-06-27 | 北京百纳威尔科技有限公司 | Mobile terminal data sharing method, apparatus thereof and network server |
CN108683747A (en) * | 2018-06-11 | 2018-10-19 | 华为技术有限公司 | Resource acquisition, distribution, method for down loading, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11770296B2 (en) | Decentralized data storage and processing for IoT devices | |
Ray | An introduction to dew computing: definition, concept and implications | |
Soni et al. | API features individualizing of web services: REST and SOAP | |
TWI221979B (en) | Secured and access controlled peer-to-peer resource sharing method and apparatus | |
Kourtellis et al. | Prometheus: User-controlled p2p social data management for socially-aware applications | |
CN114756520A (en) | Method and system for synchronizing offline data in a computing system | |
TW201404073A (en) | Techniques to monitor connection pathson networked devices | |
US20100138552A1 (en) | Edge peer device, pan gateway device, super peer device, and p2p network-based interconnection method | |
Rubio-Medrano et al. | Federated access management for collaborative network environments: Framework and case study | |
Bernstein et al. | Intercloud exchanges and roots topology and trust blueprint | |
US20230137345A1 (en) | System and method for decentralized user controlled social media | |
CN109361687A (en) | A kind of P2P private network control method and control device | |
Mayer et al. | Semantic metadata to support device interaction in smart environments | |
Kourtellis et al. | Special issue on foundations of social computing: Enabling social applications via decentralized social data management | |
Verma et al. | SRIRAM: A scalable resilient autonomic mesh | |
Ullah et al. | IoT resource management using direct discovery mechanism in OCF framework | |
US11943211B2 (en) | Device monitoring in accessing network | |
Li et al. | Context-aware trust negotiation in peer-to-peer service collaborations | |
Kraft et al. | Using conflict-free replicated data types for serverless mobile social applications | |
Apolónia et al. | Enhancing online communities with cycle-sharing for social networks | |
Tomaiuolo et al. | Supporting Social Networks With Agent-Based Services | |
Friedman et al. | A generic decentralized trust management framework | |
Huang | Managing Data Consistency in IoT Devices | |
Krishnan et al. | Cloud Storage | |
Yu | Intercloud system and data communications protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190219 |
|
WW01 | Invention patent application withdrawn after publication |