CN109491591A - A kind of information diffusion method suitable for cloudy storage system - Google Patents

A kind of information diffusion method suitable for cloudy storage system Download PDF

Info

Publication number
CN109491591A
CN109491591A CN201811080554.1A CN201811080554A CN109491591A CN 109491591 A CN109491591 A CN 109491591A CN 201811080554 A CN201811080554 A CN 201811080554A CN 109491591 A CN109491591 A CN 109491591A
Authority
CN
China
Prior art keywords
share
storage system
data
algorithm
diffusion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811080554.1A
Other languages
Chinese (zh)
Inventor
柳毅
王平雁
凌捷
欧毓毅
罗玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201811080554.1A priority Critical patent/CN109491591A/en
Publication of CN109491591A publication Critical patent/CN109491591A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • G06F3/0607Improving or facilitating administration, e.g. storage management by facilitating the process of upgrading existing storage systems, e.g. for improving compatibility between host and storage device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/064Management of blocks
    • G06F3/0641De-duplication techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention relates to data deduplication technical fields, and in particular to a kind of information diffusion method suitable for cloudy storage system, storage method are that file F is divided into n data block using diffusion of information algorithm, obtain { F1, F2 ..., Fn };Convergence key { K1, K2 ..., Kn } is calculated to { F1, F2 ..., Fn } respectively using convergent encryption algorithm;It is encrypted using convergence key pair { F1, F2 ..., Fn }, obtains n parts of share;Share is uploaded to n cloud storage service device respectively;Cloud storage service device checks for duplicate share, carries out deduplication operation if repeating;Otherwise, which is stored;One aspect of the present invention, which remains SSMS algorithm, has the characteristics that reliability, there is fault-tolerance, on the other hand convergent encryption is taken to replace the random information in SSMS algorithm, it ensure that identical data always generate identical diffusion result, therefore it can realize data deduplication in cloud storage system, there is very strong creativeness.

Description

A kind of information diffusion method suitable for cloudy storage system
Technical field
The present invention relates to data deduplication technical fields, and in particular to a kind of diffusion of information side suitable for cloudy storage system Method.
Background technique
With the continuous development of cloud computing and big data technology, more and more users using cloud storage service to data into Row storage and management, therefore unavoidably cause mass of redundancy data.In order to save the memory space and net of cloud storage system Network bandwidth consumption, researchers propose data deduplication (deduplication) technology, i.e. data de-duplication technology.Cloud clothes The text of the redundancy in cloud storage system is eliminated in business provider (CSP, Cloud Service Provider) by taking the technology The redundant data of part or file internal only retains a data copy.
For the angle of storage system framework, cloud data deduplication can be based on following two system: (1) single cloud storage system System, is made of a CSP and provides cloud storage service;(2) cloudy (multicloud) storage system, also referred to as cloud medium cloud (cloud-of-clouds) storage system is made of multiple CSP, and user data is dispersedly stored in the cloudy system.
The drawbacks of single cloud storage system: 1, availability of data problem, availability of data refer to that CSP can be provided a user and continue Continuous service, however once repeatedly occurred the case where interrupting service in actual cloud storage system, that is, single point failure occurs; 2, Information Security problem, Information Security refer to that user is stored in the data in CSP and is not checked or revealed, deposit in actual cloud In storage system, after privacy of user data are revealed by CSP or meet with hacker attack, serious safety problem will lead to;3, the ridge CSP Disconnected problem, after user stores mass data into the same CSP, user's migrating data to other CSP must pay high Expense or user meet with CSP the case where improving price, monopolization problem can be all caused to the user.
After diffusion of information algorithm (IDA, Information Dispersal Algorithm) is proposed by Rabin, occur Many modified hydrothermal process, applicable scene different from, one of which can be used for carrying out big file the algorithm of privacy sharing SSMS(Secret Sharing Made Short).SSMS algorithm is defined as follows: given portion user data i.e. secret, benefit N share is obtained after being diffused processing to secret with (n, m) broadcast algorithm (wherein n >=m >=1), then (1) is by any m Share can recover complete secret;(2) any secret data cannot be obtained by any m-1 share.
Convergent encryption (CE, Convergent Encryption) algorithm is a kind of determinacy encryption algorithm, convergence key by Data content generates, it is ensured that obtains identical key by identical data.Convergent encryption algorithm is usually former by following basic code Language is constituted:
KeyGen (F)=> K: convergence encryption key generating algorithms.Input data plaintext F, output convergence key K.Wherein, key K It is usually generated by hash function H, i.e. K=H (F).
Encrypt (K, F)=> C: Encryption Algorithm.Encrypted ciphertext C is passed through in input convergence key K and plaintext F, output.
Decrypt (K, C)=> F: decipherment algorithm.Input convergence key K and ciphertext C, exports the plaintext F after decryption.
TagGen (F)=> TF: label generates algorithm.Input data plaintext F exports corresponding label TF.
The characteristics of for cloudy storage system, the invention patent propose a kind of combination convergence on the basis of SSMS algorithm The information diffusion method of Encryption Algorithm is applicable to support the cloudy storage system of data deduplication.
Summary of the invention
In view of the deficiencies of the prior art, the invention discloses a kind of information diffusion methods suitable for cloudy storage system, originally On the one hand invention remains SSMS algorithm has the characteristics that reliability, that is, has fault-tolerance, on the other hand take convergent encryption generation For the random information in SSMS algorithm, it ensure that identical data always generate identical diffusion as a result, therefore can realize that cloud is deposited Data deduplication in storage system;
The present invention is achieved by the following technical programs:
A kind of information diffusion method suitable for cloudy storage system, it is characterised in that: the described method comprises the following steps:
S1: user utilize (n, m)-SSMS algorithm to file F carry out diffusion of information processing, obtain n data block F1, F2,…,Fn};Wherein the length of file F is denoted as L, then the length of each data block is | Fi |=L/m;After Fi is i-th of diffusion Data block;
S2: convergence key KeyGen (Fi)=> Ki is calculated to { F1, F2 ..., Fn } respectively using convergent encryption algorithm, is obtained To K1, K2 ..., Kn };Ki is the convergence key of Fi;
S3: encryption Encrypt (Ki, Fi) is carried out to { F1, F2 ..., Fn } respectively using convergence key { K1, K2 ..., Kn } => Si, obtaining n parts of share is { S1, S2 ..., Sn };Wherein share is the data block carried out after convergent encryption to Fi;Si is I-th part of share;
S4: { S1, S2 ..., Sn } is dispersedly uploaded to n cloud storage service device { CSP1, CSP2 ..., CSPn };
S5:CSP carries out repeated detection to the share received, if existing share in CSP, carries out data and go It operates again;Otherwise, CSP stores the share;Wherein CSP is cloud service provider.
Preferably, in the S1, n is data number of blocks of the file F after diffusion;M is minimum number required for restoring F According to number of blocks;Wherein n >=m >=1.
Preferably, the S4 are as follows: Si is uploaded to corresponding CSPi.
A kind of information recovering method suitable for cloudy storage system, it is characterised in that: the described method comprises the following steps:
S1: user fetches the share of file F from any m CSP, m parts total, i.e. { S1, S2 ..., Sm };
S2: using corresponding convergence key { K1, K2 ..., Km } to m parts of share be decrypted Decrypt (Ki, Si)=> Fi obtains m data block { F1, F2 ..., Fm };
S3: by F1, F2 ..., and Fm }=> F.
Preferably, the S3 is defined according to SSMS algorithm, recovers file F by any m data block.
The invention has the benefit that
The information diffusion method suitable for cloudy storage system that the present invention is mentioned has the advantage that compared to existing technology It is as follows:
(1) storage efficiency is high.Due to taking convergent encryption to replace the random information in SSMS algorithm, identical number ensure that According to always generating identical diffusion as a result, being therefore suitable for supporting the cloudy storage system of data deduplication, for same part data (obtaining n parts of share after diffusion) only needs to store once in cloudy storage system, therefore storage efficiency is high;
(2) fault-tolerance enhances.Data in cloudy storage system have reliability, it is only necessary to which any m CSP is operated normally Can restoring user data, effectively prevent single point failure, and if single cloud storage system failure will lead to service disruption;
(3) Information Security enhances.Attacker must at least obtain m share (controlling m CSP) and could be used User data, and need to restrain key and can just be decrypted, otherwise attacker can not obtain any effective information.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is system model figure of the invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Embodiment 1
A kind of information diffusion method suitable for cloudy storage system as shown in Figure 1, comprising the following steps:
S1: user utilize (n, m)-SSMS algorithm to file F carry out diffusion of information processing, obtain n data block F1, F2,…,Fn};Wherein the length of file F is denoted as L, then the length of each data block is | Fi |=L/m;After Fi is i-th of diffusion Data block;
S2: convergence key KeyGen (Fi)=> Ki is calculated to { F1, F2 ..., Fn } respectively using convergent encryption algorithm, is obtained To K1, K2 ..., Kn };Ki is the convergence key of Fi;
S3: encryption Encrypt (Ki, Fi) is carried out to { F1, F2 ..., Fn } respectively using convergence key { K1, K2 ..., Kn } => Si, obtaining n parts of share is { S1, S2 ..., Sn };Wherein share is the data block carried out after convergent encryption to Fi;Si is I-th part of share;
S4: { S1, S2 ..., Sn } is dispersedly uploaded to n cloud storage service device { CSP1, CSP2 ..., CSPn };
S5:CSP carries out repeated detection to the share received, if existing share in CSP, carries out data and go It operates again;Otherwise, CSP stores the share;Wherein CSP is cloud service provider.
In S1, n is data number of blocks of the file F after diffusion;M is minimum data number of blocks required for restoring F;Its Middle n >=m >=1.
S4 are as follows: Si is uploaded to corresponding CSPi.
Embodiment 2
A kind of information recovering method suitable for cloudy storage system, comprising the following steps:
S1: user fetches the share of file F from any m CSP, m parts total, i.e. { S1, S2 ..., Sm };
S2: using corresponding convergence key { K1, K2 ..., Km } to m parts of share be decrypted Decrypt (Ki, Si)=> Fi obtains m data block { F1, F2 ..., Fm };
S3: by F1, F2 ..., and Fm }=> F.
Preferably, the S3 is defined according to SSMS algorithm, recovers file F by any m data block.
One aspect of the present invention, which remains SSMS algorithm, has the characteristics that reliability, that is, has fault-tolerance, therefore can be used for more Cloud storage system, in the cloudy framework for possessing n CSP, as long as m CSP is operated normally it is ensured that user data is available, i.e., It is at best able to n-m CSP of tolerance while failing;On the other hand it takes convergent encryption to replace the random information in SSMS algorithm, protects It has demonstrate,proved identical data and has always generated identical diffusion as a result, therefore can realize data deduplication in cloud storage system.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments Invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each implementation Technical solution documented by example is modified or equivalent replacement of some of the technical features;And these modification or Replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (5)

1. a kind of information diffusion method suitable for cloudy storage system, it is characterised in that: the described method comprises the following steps:
S1: user utilize (n, m)-SSMS algorithm to file F carry out diffusion of information processing, obtain n data block F1, F2 ..., Fn};Wherein the length of file F is denoted as L, then the length of each data block is | Fi |=L/m;Fi is the data after i-th of diffusion Block;
S2: convergence key KeyGen (Fi)=> Ki is calculated to { F1, F2 ..., Fn } respectively using convergent encryption algorithm, is obtained {K1,K2,…,Kn};Ki is the convergence key of Fi;
S3: using convergence key { K1, K2 ..., Kn } respectively to { F1, F2 ..., Fn } carry out encryption Encrypt (Ki, Fi)=> Si, obtaining n parts of share is { S1, S2 ..., Sn };Wherein share is the data block carried out after convergent encryption to Fi;Si is i-th Part share;
S4: { S1, S2 ..., Sn } is dispersedly uploaded to n cloud storage service device { CSP1, CSP2 ..., CSPn };
S5:CSP carries out repeated detection to the share received, if existing share in CSP, carries out data deduplication behaviour Make;Otherwise, CSP stores the share;Wherein CSP is cloud service provider.
2. the information diffusion method according to claim 1 suitable for cloudy storage system, it is characterised in that: in the S1, n For data number of blocks of the file F after diffusion;M is minimum data number of blocks required for restoring F;Wherein n >=m >=1.
3. the information diffusion method according to claim 1 suitable for cloudy storage system, it is characterised in that: the S4 are as follows: Si is uploaded to corresponding CSPi.
4. a kind of information recovering method suitable for cloudy storage system, it is characterised in that: the described method comprises the following steps:
S1: user fetches the share of file F from any m CSP, m parts total, i.e. { S1, S2 ..., Sm };
S2: being decrypted Decrypt (Ki, Si)=> Fi to m parts of share using corresponding convergence key { K1, K2 ..., Km }, M data block { F1, F2 ..., Fm };
S3: by F1, F2 ..., and Fm }=> F.
5. according to shown in claim 4 be suitable for cloudy storage system information recovering method, it is characterised in that: the S3 according to The definition of SSMS algorithm, recovers file F by any m data block.
CN201811080554.1A 2018-09-17 2018-09-17 A kind of information diffusion method suitable for cloudy storage system Pending CN109491591A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811080554.1A CN109491591A (en) 2018-09-17 2018-09-17 A kind of information diffusion method suitable for cloudy storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811080554.1A CN109491591A (en) 2018-09-17 2018-09-17 A kind of information diffusion method suitable for cloudy storage system

Publications (1)

Publication Number Publication Date
CN109491591A true CN109491591A (en) 2019-03-19

Family

ID=65690665

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811080554.1A Pending CN109491591A (en) 2018-09-17 2018-09-17 A kind of information diffusion method suitable for cloudy storage system

Country Status (1)

Country Link
CN (1) CN109491591A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110381066A (en) * 2019-07-23 2019-10-25 广东工业大学 Enhance the resource data transmission method of privacy in a kind of block chain
CN112565434A (en) * 2020-12-09 2021-03-26 广东工业大学 Cloud storage safety duplicate removal method and device based on Mercker hash tree
CN114143098A (en) * 2021-12-03 2022-03-04 建信金融科技有限责任公司 Data storage method and data storage device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103118089A (en) * 2013-01-22 2013-05-22 华中科技大学 Safe storage method based on a plurality of cloud storage systems and system thereof
CN103139300A (en) * 2013-02-05 2013-06-05 杭州电子科技大学 Virtual machine image management optimization method based on data de-duplication
CN103327059A (en) * 2012-03-23 2013-09-25 神盾股份有限公司 Cloud storage system, cloud storage management method and electronic device thereof
CN103931156A (en) * 2011-05-14 2014-07-16 比特卡萨公司 Cloud file system with server-side deduplication of user-agnostic encrypted files
CN103929467A (en) * 2013-01-14 2014-07-16 埃森哲环球服务有限公司 Secure Online Distributed Data Storage Services
CN104754055A (en) * 2015-04-03 2015-07-01 易云捷讯科技(北京)有限公司 Safety cloud storage method for use in multi-cloud environment
CN104902010A (en) * 2015-04-30 2015-09-09 浙江工商大学 Cloud storage method and system for file
CN104915609A (en) * 2015-05-28 2015-09-16 武汉科技大学 Data hiding method based on Lagrange interpolation method and multiple clouds
CN106911770A (en) * 2017-02-20 2017-06-30 北京古盘创世科技发展有限公司 A kind of data sharing method and system based on many cloud storages
CN107977168A (en) * 2017-12-15 2018-05-01 安徽长泰信息安全服务有限公司 A kind of data based on cloud storage disperse storage system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103931156A (en) * 2011-05-14 2014-07-16 比特卡萨公司 Cloud file system with server-side deduplication of user-agnostic encrypted files
CN103327059A (en) * 2012-03-23 2013-09-25 神盾股份有限公司 Cloud storage system, cloud storage management method and electronic device thereof
CN103929467A (en) * 2013-01-14 2014-07-16 埃森哲环球服务有限公司 Secure Online Distributed Data Storage Services
CN103118089A (en) * 2013-01-22 2013-05-22 华中科技大学 Safe storage method based on a plurality of cloud storage systems and system thereof
CN103139300A (en) * 2013-02-05 2013-06-05 杭州电子科技大学 Virtual machine image management optimization method based on data de-duplication
CN104754055A (en) * 2015-04-03 2015-07-01 易云捷讯科技(北京)有限公司 Safety cloud storage method for use in multi-cloud environment
CN104902010A (en) * 2015-04-30 2015-09-09 浙江工商大学 Cloud storage method and system for file
CN104915609A (en) * 2015-05-28 2015-09-16 武汉科技大学 Data hiding method based on Lagrange interpolation method and multiple clouds
CN106911770A (en) * 2017-02-20 2017-06-30 北京古盘创世科技发展有限公司 A kind of data sharing method and system based on many cloud storages
CN107977168A (en) * 2017-12-15 2018-05-01 安徽长泰信息安全服务有限公司 A kind of data based on cloud storage disperse storage system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110381066A (en) * 2019-07-23 2019-10-25 广东工业大学 Enhance the resource data transmission method of privacy in a kind of block chain
CN110381066B (en) * 2019-07-23 2021-07-06 广东工业大学 Resource data transmission method for enhancing privacy in block chain
CN112565434A (en) * 2020-12-09 2021-03-26 广东工业大学 Cloud storage safety duplicate removal method and device based on Mercker hash tree
CN114143098A (en) * 2021-12-03 2022-03-04 建信金融科技有限责任公司 Data storage method and data storage device
CN114143098B (en) * 2021-12-03 2023-08-15 建信金融科技有限责任公司 Data storage method and data storage device

Similar Documents

Publication Publication Date Title
CN110169015B (en) Achieving consensus among network nodes in a distributed system
CN109756582B (en) Information recording method, device, node and storage medium in block chain network
CN110213354B (en) Cloud storage data confidentiality protection method
CN101964080B (en) Method and system for storing a file as slices on storage elements
US10764261B2 (en) System and method for enabling a scalable public-key infrastructure on a smart grid network
CN111526197B (en) Cloud data secure sharing method
CN109450881B (en) A kind of data transmission system, method and device
CN107154945A (en) A kind of cloudy fragmentation method for secure storing and system based on correcting and eleting codes
CN104331346A (en) Data protection method
CN109491591A (en) A kind of information diffusion method suitable for cloudy storage system
CN104410683A (en) Data backup method
CN109587178A (en) A kind of intelligent appliance encryption control system and method based on MQTT
CN104331345B (en) A kind of data reconstruction method
Xia et al. Secure and trust-oriented edge storage for Internet of Things
CN109241754A (en) A kind of cloud file data de-duplication method based on block chain
CN105120003A (en) Method for realizing data backup in cloud environment
CN109640299B (en) Aggregation method and system for ensuring M2M communication integrity and fault tolerance
CN103326822A (en) Data-fragment-based method and system for protecting privacy of participatory perception system
CN108964911A (en) A kind of stream media service system based on block chain and quantum flow data block technology
Ueno et al. Performance evaluation of a disaster recovery system and practical network system applications
WO2018208787A1 (en) High-performance access management and data protection for distributed messaging applications
CN108494552B (en) Cloud storage data deduplication method supporting efficient convergence key management
CN116032499A (en) Distributed cloud file storage method and system, user terminal and cloud device thereof
CN113360924A (en) Data processing method, device, electronic equipment and medium
Balaji et al. Data Security and Deduplication Framework for Securing and Deduplicating Users’ Data in Public and Private Cloud Environment.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190319