CN109687958A - A kind of design of art work certificate and verification method based on fidelity block chain - Google Patents

A kind of design of art work certificate and verification method based on fidelity block chain Download PDF

Info

Publication number
CN109687958A
CN109687958A CN201811616876.3A CN201811616876A CN109687958A CN 109687958 A CN109687958 A CN 109687958A CN 201811616876 A CN201811616876 A CN 201811616876A CN 109687958 A CN109687958 A CN 109687958A
Authority
CN
China
Prior art keywords
certificate
block chain
art work
fidelity
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811616876.3A
Other languages
Chinese (zh)
Inventor
路成业
王凌
罗维
马晓婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iallchain Co Ltd
Original Assignee
Iallchain Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iallchain Co Ltd filed Critical Iallchain Co Ltd
Priority to CN201811616876.3A priority Critical patent/CN109687958A/en
Publication of CN109687958A publication Critical patent/CN109687958A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention discloses a kind of design of art work certificate and verification method based on fidelity block chain, it is characterized in that, fidelity block chain is constructed using art work certifying organization as node, all nodes in fidelity block chain obtain public private key by privacy sharing, it is signed using identical private key to the characteristic information by the art work after Jianzhen, as the anti-fake verification mark in the art work certificate, the certificate of generation is saved into fidelity block chain, arbitrary node can be verified by certificate of the public private key to the art work on the block chain;The specific steps of this method include update and revocation of (1) building fidelity block chain (2) using group's public key PK Generative Art product certificate (3) the verifying certificate true and false (4) certificate.

Description

A kind of design of art work certificate and verification method based on fidelity block chain
Technical field
The invention belongs to network communication technology fields, further relate to one of technical field of network security and are based on protecting The art work certificate of true block chain designs and verification method.Present invention can apply to carry out digitlization guarantor to the art work after Jianzhen Very, when needing to identify the true and false of a certain part art work, the method verified to it based on block chain certificate.
Background technique
Global art work industry is annoying to the fidelity of the art work, the Jianzhen and fidelity process to the art work can be by artificial Manipulation, subjective colo(u)r is serious, value float it is excessive, it would be highly desirable to standardize.Block chain technology applies mould with believable account book Formula utilizes the chain structures such as hash function and Merkel tree, it is ensured that data are open and clear, no under the framework of decentralization It is tampered.The art work is subjected to digitized processing and persistence in combination with technologies such as image procossing, finger prints processings, also can be used as The voucher of anti-fake Jianzhen.
Secret sharing techniques are an important research contents of information security field, and it is total that equal rights are held since its is multiple It is similar to the decentralization feature of block chain to enjoy the features such as secret, it can be further combined with realization block chain node key agreement. The domestic cryptographic algorithm in China is increasingly developed, and such as SM2, SM3, SM4, SM9 etc. is combined with domestic password, pushes information security The progress in field.
Summary of the invention
It is an object of the invention in view of the above-mentioned problems, propose it is a kind of based on fidelity block chain the art work certificate design and Verification method realizes the verifying of the art work identity under fidelity block chain using the method for block chain certificate.
Realizing the thinking of the object of the invention is: fidelity block chain, fidelity area are constructed using art work certifying organization as node All nodes in block chain obtain public private key by privacy sharing, using identical private key to the art work after passing through Jianzhen Characteristic information is signed, and as the anti-fake verification mark in the art work certificate, the certificate of generation is saved into fidelity block Chain, arbitrary node can be verified by certificate of the public private key to the art work on the block chain.
The specific steps of this method include the following:
(1) fidelity block chain is constructed:
(1a) determines the art work verification machine that fidelity chain is added according to the quantity of the open ended node of block chain communication capacity Structure node VA1, VA2...VAn;
(1b) selects { x according to number of nodes on finite field (1-N)1, x2L xnCorresponding with each node and openly;
(1c) each node combines the IDi of itself successively to calculate using hash 256 domestic password SM3 algorithmsAnd wherein a certain node VAi is issued in order, whereinIndicate xiI power;
(1d) VAi calculates generation system private key SK secrecy, successively calculatesIt sends To VA1, calculateIt is sent to VA2... calculatingIt is sent to VAn, is finally calculatedSecret is protected It deposits, generates the corresponding public key of PK and openly, whereinIndicate xiI power;
(1e) all nodes can be calculated by shamir privacy sharing algorithm and obtain SK;
(1f) if there is new node be added when, can only by include system again in n node authentication after obtain m1-mn, and then SK is calculated;
(2) PK Generative Art product certificate is utilized:
(2a) arbitrary node VAi generates the anti-counterfeit certificate of the art work after art work is accredited as genuine piece between one, 1: the certificate serial number .2: issuer Information ID that Time of Day etc. automatically forms i.3 the content of certificate includes: identifying the art work When extracted characteristic information, massage.4 is obtained after digital processing: the cryptographic Hash Hash of characteristic information (massage) the signing messages Sign (massage) that .5:VAi is signed using public public key PK and domestic cryptographic algorithm SM9 6: current value and current owner's information .7: other relevant informations such as circulation process;
The certificate of the art work is stored in block chain by (2b) VAi;
(3) the certificate true and false is verified:
When any one node needs to verify the art work true and false on (3a) fidelity block chain, the art work certificate is extracted, Extract the characteristic information newmassage of the art work again simultaneously;
(3b) inquires the state of the certificate on block chain, no to then follow the steps if state is very, to then follow the steps (3c) (3f);
Whether (3c) calculates Hash (massage) and sees identical as in certificate, if so, thening follow the steps (3d), otherwise holds Row step (3f);
Whether (3d) calculating Hash (newmassage) is identical as Hash (massage) in certificate, if so, executing step Suddenly (3e), it is no to then follow the steps (3f);
(3e) utilizes SM9 signature verification algorithm and private key SK, verifies the correctness of signing messages, returns to verifying if correct Otherwise success executes (3f);
(3f) terminates certification;
(4) certificate update and revocation:
(4a) inquires the art work certificate, if certificate shape if the verified art work is fakement on block chain State is very, then certificate to be newly stored into block chain, and state is set as cancelling;
(4b) is if the verified art work is genuine piece, but when needing to change its current value or owner information, is needed Former certificate status is set as cancelling, updates signing messages, update need to change information, regenerate certificate and upload to block Chain.
2. the design of art work certificate and verification method according to claim 1 based on fidelity block chain, feature It is, inquiry certificate status described in step (3b) (4a) refers to, is with the deposit of certificate cryptographic Hash when certificate is stored in block chain , the state for returning to certificate can be set in query interface: true or revocation, the state can be carried out by the node on fidelity block chain Inquiry.
Compared with the prior art, the present invention has the following advantages:
First, since the present invention constructs fidelity block chain, realized by the privacy sharing between fidelity block chain interior joint Key agreement overcomes the prior art and needs to carry out key distribution and maintenance by centring system, causes maintenance load is increased to ask Topic, so that the present invention has the advantages that better practicability and scalability in art work fidelity field.
Second, due to the certificate after persistence Jianzhen of the present invention, all art work relevant informations are stored in certificate, are passed through Fidelity block chain carries out data safety preservation and update, optimizes the existing art work and saves system, so that the present invention is in the art work There is good practicability in fidelity industry.
Detailed description of the invention
Fig. 1 is flow chart of the invention.
Specific embodiment
1 couple of present invention is described further with reference to the accompanying drawing.
Step 1, fidelity block chain is constructed:
According to the quantity of the open ended node of block chain communication capacity, the art work certifying organization section that fidelity chain is added is determined Point VA1, VA2...Van,
According to number of nodes, { x is selected on finite field (1-N)1, x2L xnCorresponding with each node and openly;
Each node combines the IDi of itself successively to calculate using hash 256 domestic password SM3 algorithmsAnd wherein a certain node VAi is issued in order, whereinIndicate xiI power;
VAi calculates generation system private key SK secrecy, successively calculatesIt is sent to VA1 is calculatedIt is sent to VA2... calculating It is sent to VAn, is finally calculatedSecret saves, and generates the corresponding public key of PK and openly, WhereinIndicate xiI power;
All nodes can be calculated by shamir privacy sharing algorithm and obtain SK;
If there is new node be added when, can only by include system again in n node authentication after obtain m1-mn, And then SK is calculated.
Step 2, PK Generative Art product certificate is utilized:
Arbitrary node VAi generates the anti-counterfeit certificate of the art work, certificate after the art work is accredited as genuine piece between one Content 1: the certificate serial number .2: issuer Information ID that Time of Day etc. automatically forms i.3 include: identify art work when institute The characteristic information of extraction, obtains massage.4 after digital processing: cryptographic Hash Hash (massage) .5 of characteristic information: VAi utilizes public public key PK and signing messages Sign (massage) 6 that domestic cryptographic algorithm SM9 signs: other related letters Breath;
The certificate of the art work is stored in block chain by VAi.
Step 3, the certificate true and false is verified:
When any one node needs to verify the art work true and false on fidelity block chain, the art work certificate is extracted, simultaneously Again the characteristic information newmassage of the art work is extracted;
The state of the certificate is inquired on block chain, if state is revocation, terminates to authenticate;
The inquiry certificate status refers to, when certificate is stored in block chain, is stored in certificate cryptographic Hash, query interface The state for returning to certificate can be set: true or revocation, the state can be inquired by the node on fidelity block chain;
It calculates Hash (massage) and whether identical as in certificate sees, terminate to authenticate if not identical;
Whether calculating Hash (newmassage) is identical as Hash (massage) in certificate, terminates to recognize if not identical Card;
Using SM9 signature verification algorithm and private key SK, verify the correctness of signing messages, if correct return authentication at Function terminates to authenticate if incorrect.
Step 4, certificate update and revocation:
If the verified art work is fakement, the art work certificate is inquired on block chain, if certificate status is Very, then certificate is newly stored into block chain, and state is set as cancelling;
The inquiry certificate status refers to, when certificate is stored in block chain, is stored in certificate cryptographic Hash, query interface The state for returning to certificate can be set: true or revocation, the state can be inquired by the node on fidelity block chain;
If the verified art work is genuine piece, but when needing to change its current value or owner information, needing will be former Certificate status is set as cancelling, and updates signing messages, and update need to change information, regenerate certificate and upload to block chain.

Claims (2)

1. a kind of design of art work certificate and verification method based on fidelity block chain, which is characterized in that with art work verification machine Structure constructs fidelity block chain as node, and all nodes in fidelity block chain obtain public private key by privacy sharing, utilizes Identical private key signs to the characteristic information by the art work after Jianzhen, as the anti-fake verification in the art work certificate Mark, is saved into fidelity block chain for the certificate of generation, arbitrary node can be by public private key to the art work on the block chain Certificate is verified;The specific steps of this method include the following:
(1) fidelity block chain is constructed:
(1a) determines the art work certifying organization section that fidelity chain is added according to the quantity of the open ended node of block chain communication capacity Point VA1, VA2...VAn;
(1b) selects { x according to number of nodes on finite field (1-N)1, x2L xnCorresponding with each node and openly;
1c) each node combines the IDi of itself successively to calculate using hash 256 domestic password SM3 algorithmsAnd wherein a certain node VAi is issued in order, whereinIndicate xiI power;
(1d) VAi calculates generation system private key SK secrecy, successively calculatesIt is sent to VA1 is calculatedIt is sent to VA2... calculating It is sent to VAn, is finally calculatedSecret saves, and generates the corresponding public key of PK and openly, WhereinIndicate xiI power;
(1e) all nodes can be calculated by shamir privacy sharing algorithm and obtain SK;
(1f) if there is new node be added when, can only by include system again in n node authentication after obtain m1-mn, And then SK is calculated;
(2) PK Generative Art product certificate is utilized:
(2a) arbitrary node VAi generates the anti-counterfeit certificate of the art work, certificate after the art work is accredited as genuine piece between one Content 1: the certificate serial number .2: issuer Information ID that Time of Day etc. automatically forms i.3 include: identify art work when institute The characteristic information of extraction, obtains massage.4 after digital processing: cryptographic Hash Hash (massage) .5 of characteristic information: The signing messages Sign (massage) 6: current value that VAi is signed using public public key PK and domestic cryptographic algorithm SM9 with Current owner's information .7: other relevant informations such as circulation process;
The certificate of the art work is stored in block chain by (2b) VAi;
(3) the certificate true and false is verified:
When any one node needs to verify the art work true and false on (3a) fidelity block chain, the art work certificate is extracted, simultaneously Again the characteristic information newmassage of the art work is extracted;
(3b) inquires the state of the certificate on block chain, no to then follow the steps if state is very, to then follow the steps (3c) (3f);
Whether (3c) calculates Hash (massage) and sees identical as in certificate, if so, thening follow the steps (3d), otherwise executes step Suddenly (3f);
Whether (3d) calculating Hash (newmassage) is identical as Hash (massage) in certificate, if so, thening follow the steps (3e), it is no to then follow the steps (3f);
(3e) utilizes SM9 signature verification algorithm and private key SK, verifies the correctness of signing messages, returned if correct verifying at Otherwise function executes (3f);
(3f) terminates certification;
(4) certificate update and revocation:
(4a) inquires the art work certificate, if certificate status is if the verified art work is fakement on block chain Very, then certificate is newly stored into block chain, and state is set as cancelling;
(4b) is if the verified art work is genuine piece, but when needing to change its current value or owner information, needing will be former Certificate status is set as cancelling, and updates signing messages, and update need to change information, regenerate certificate and upload to block chain.
2. the design of art work certificate and verification method according to claim 1 based on fidelity block chain, which is characterized in that Inquiry certificate status described in step (3b) (4a) refers to, when certificate is stored in block chain, is to be stored in certificate cryptographic Hash, looks into Asking interface can be set the state for returning to certificate: true or revocation, the state can be inquired by the node on fidelity block chain.
CN201811616876.3A 2018-12-28 2018-12-28 A kind of design of art work certificate and verification method based on fidelity block chain Pending CN109687958A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811616876.3A CN109687958A (en) 2018-12-28 2018-12-28 A kind of design of art work certificate and verification method based on fidelity block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811616876.3A CN109687958A (en) 2018-12-28 2018-12-28 A kind of design of art work certificate and verification method based on fidelity block chain

Publications (1)

Publication Number Publication Date
CN109687958A true CN109687958A (en) 2019-04-26

Family

ID=66190064

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811616876.3A Pending CN109687958A (en) 2018-12-28 2018-12-28 A kind of design of art work certificate and verification method based on fidelity block chain

Country Status (1)

Country Link
CN (1) CN109687958A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080195862A1 (en) * 2007-02-12 2008-08-14 Research In Motion Limited Providing personal certificate warnings in a system and method for processing messages composed by a user
CN101547099A (en) * 2009-05-07 2009-09-30 张键红 Elliptical curve-based method and elliptical curve-based device for self-authenticating signature
CN106503994A (en) * 2016-11-02 2017-03-15 西安电子科技大学 Block chain private data access control method based on encryption attribute
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106991573A (en) * 2017-04-07 2017-07-28 中链科技有限公司 Art work fidelity method and server based on block chain technology
CN107769925A (en) * 2017-09-15 2018-03-06 山东大学 Public key infrastructure system and its certificate management method based on block chain
CN108712261A (en) * 2018-05-10 2018-10-26 杭州智块网络科技有限公司 A kind of key generation method, device and medium based on block chain
CN108768630A (en) * 2018-05-25 2018-11-06 全链通有限公司 The encryption communication method and system of block chain node
US20180322491A1 (en) * 2017-03-31 2018-11-08 Vijay K. Madisetti Method and System for Blockchain-Based Combined Identity, Ownership, Integrity and Custody Management

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080195862A1 (en) * 2007-02-12 2008-08-14 Research In Motion Limited Providing personal certificate warnings in a system and method for processing messages composed by a user
CN101547099A (en) * 2009-05-07 2009-09-30 张键红 Elliptical curve-based method and elliptical curve-based device for self-authenticating signature
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106503994A (en) * 2016-11-02 2017-03-15 西安电子科技大学 Block chain private data access control method based on encryption attribute
US20180322491A1 (en) * 2017-03-31 2018-11-08 Vijay K. Madisetti Method and System for Blockchain-Based Combined Identity, Ownership, Integrity and Custody Management
CN106991573A (en) * 2017-04-07 2017-07-28 中链科技有限公司 Art work fidelity method and server based on block chain technology
CN107769925A (en) * 2017-09-15 2018-03-06 山东大学 Public key infrastructure system and its certificate management method based on block chain
CN108712261A (en) * 2018-05-10 2018-10-26 杭州智块网络科技有限公司 A kind of key generation method, device and medium based on block chain
CN108768630A (en) * 2018-05-25 2018-11-06 全链通有限公司 The encryption communication method and system of block chain node

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
马晓婷等: ""基于区块链技术的跨域认证方案"", 《电子学报》 *

Similar Documents

Publication Publication Date Title
CN107342867B (en) Signature verification method and device
CN107948143B (en) Identity-based privacy protection integrity detection method and system in cloud storage
CN103268460B (en) A kind of cloud integrity of data stored verification method
CN114143080A (en) Block chain data privacy protection and sharing method based on zero knowledge proof
KR101425552B1 (en) Group signature system and schemes with controllable linkability
CN106789090A (en) Public key infrastructure system and semi-random participating certificate endorsement method based on block chain
CN108646983A (en) The treating method and apparatus of storage service data on block chain
CN104994110A (en) Method for assigning verifier for auditing cloud storage data
CN110264200A (en) Block chain data processing method and device
CN101951388A (en) Remote attestation method in credible computing environment
CN109861829B (en) Cloud data justice auditing system supporting dynamic updating and auditing method thereof
CN109670826B (en) Anti-quantum computation block chain transaction method based on asymmetric key pool
CN108768635A (en) A kind of cipher mark administrative model and method suitable for Internet of things system
CN105721153A (en) System and method for key exchange based on authentication information
CN110737915B (en) Anti-quantum-computation anonymous identity recognition method and system based on implicit certificate
CN103634788A (en) Certificateless multi-proxy signcryption method with forward secrecy
CN108768975A (en) Support the data integrity verification method of key updating and third party's secret protection
CN104079412A (en) Trusted PKG-free threshold proxy signature method based on identity safety of smart power grid
CN106611136A (en) Data tampering verification method in cloud storage
Bellare et al. Deterring certificate subversion: efficient double-authentication-preventing signatures
CN105187218A (en) Digital record signature method for multicore infrastructure and verification method
Zhao et al. Fuzzy identity-based dynamic auditing of big data on cloud storage
CN108664814A (en) A kind of group data integrity verification method based on agency
CN110278081B (en) Control method and device for group digital signature
CN110266653A (en) A kind of method for authenticating, system and terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing

Applicant after: IALLCHAIN Co.,Ltd.

Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing.

Applicant before: IALLCHAIN Co.,Ltd.

CB02 Change of applicant information
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190426

WD01 Invention patent application deemed withdrawn after publication