CN113271294A - Edge computing gateway identity authentication method based on block chain technology - Google Patents
Edge computing gateway identity authentication method based on block chain technology Download PDFInfo
- Publication number
- CN113271294A CN113271294A CN202110446176.XA CN202110446176A CN113271294A CN 113271294 A CN113271294 A CN 113271294A CN 202110446176 A CN202110446176 A CN 202110446176A CN 113271294 A CN113271294 A CN 113271294A
- Authority
- CN
- China
- Prior art keywords
- identity
- block chain
- user
- terminal
- gateway
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Biomedical Technology (AREA)
- Data Mining & Analysis (AREA)
- Bioethics (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention belongs to the technical field of identity authentication, in particular to an edge computing gateway identity authentication method based on a block chain technology, which comprises the following steps: s1: generating a block chain private key and a block chain public key of a block chain seed according to a preset block chain key algorithm, wherein the block chain seed is generated by adopting a random number generator; calculating the block chain address of the block chain public key according to a block chain address generation algorithm; s2: and sending the personal information to an identity registration mechanism, and sending the identity information abstract, the block chain public key and the block chain address to a gateway identity service mechanism after receiving a verification passing message of the identity registration mechanism so that the gateway identity service mechanism generates a personal information gateway identity. The invention simplifies the authentication mode of the identity authentication of the blockchain organization, and can further prevent the counterfeit identity between different blockchain organizations because the gateway identities cannot be falsely used between different blockchain organizations.
Description
Technical Field
The invention relates to the technical field of identity authentication, in particular to an edge computing gateway identity authentication method based on a block chain technology.
Background
The current blockchain technology provides excellent privacy protection and point-to-point service for users by virtue of the advantages of distributed consensus, decentralized general ledger, asymmetric encryption and the like, and has attracted wide attention in various fields of industry 4.0. Along with the popularization of non-overlapped intelligent equipment in social life, such as intelligent factories, smart cities and smart homes, the privacy of users is more and more transparent. In order to strengthen personal information protection for users, realize data cooperation sharing among platforms in single fields and avoid the defects of high cost, high delay and low efficiency of a centralized platform, a distributed authentication system based on a block chain becomes a core technology for solving the problems.
However, the existing block chain technology-based edge computing gateway identity authentication method usually adopts a gateway certificate issued by a private authentication center to perform block chain organization identity authentication, which not only easily causes mutual identity falsifying between block chain organizations, but also only independently verifies the information of the gateway certificate issued by the private authentication center in the private identity authentication mode, and has the problem of low security.
Disclosure of Invention
Based on the technical problems provided in the background art, the invention provides an edge computing gateway identity authentication method based on a block chain technology.
The invention provides an edge computing gateway identity authentication method based on a block chain technology, which comprises the following steps:
s1: generating a block chain private key and a block chain public key of a block chain seed according to a preset block chain key algorithm, wherein the block chain seed is generated by adopting a random number generator; calculating the block chain address of the block chain public key according to a block chain address generation algorithm;
s2: sending the personal information to an identity registration mechanism, and sending the identity information abstract, the block chain public key and the block chain address to a gateway identity service mechanism after receiving a verification passing message of the identity registration mechanism so that the gateway identity service mechanism generates a personal information gateway identity;
s3: if the personal information gateway identity sent by the gateway identity service mechanism is received, sending a user registration request to a block chain authentication platform, wherein the first gateway identity application request is used for indicating the secondary authentication center to write the current organization information corresponding to the current organization identity into the root information of the gateway identity of the secondary authentication center, and generating the current gateway identity corresponding to the current organization identity;
s4: verifying whether the user is legal or not based on the personal information, and acquiring system chain information related to the user from a right chain node when the user is verified to be a legal user so as to verify whether the user has a function right of accessing a target application or not according to the system chain information and request parameters carried in the calling request;
s5: receiving an access request sent by a terminal, and acquiring user identity information carried by the access request; the user identity information comprises a user identification module ID, biological characteristics of a user and personal information of the user, the identity of the terminal is verified according to the user identification module ID, the biological characteristics of the user, the personal information of the user and pre-acquired public parameters of the terminal, and if the terminal passes the verification, the user identification module ID, the biological characteristics of the user and the personal information of the user are received and the authority is opened to the terminal;
s6: the block chain link point receives the user identification module ID, the biological characteristics of the user and the personal information of the user to acquire public key data; when the verification of the private key signature data is completed according to the public key data, acquiring equipment identification data of the user terminal and generating secret key data according to the equipment identification data; sending the key data to the user terminal; receiving authentication data submitted by the user terminal aiming at the key data; and when the authentication data submitted by the user terminal passes the verification, judging that the identity authentication passes.
Preferably, the user identification module ID and the biometric characteristic of the user are generated according to an asymmetric encryption algorithm, a master public key, a private key of the terminal, and an identification number of the terminal; wherein the identification number of the terminal is allocated by a network layer of the block chain after the terminal is successfully registered on the block chain.
Preferably, after accepting the user identification module ID and the biometric characteristic of the user and opening the right to the terminal, the method further includes: receiving a downloading request sent by the terminal, and acquiring information of required data carried by the downloading request; and acquiring the average time delay of the terminal for downloading the required data, and acquiring a cache path which enables the average time delay of the terminal for downloading the required data to be minimum according to a belief propagation algorithm.
Preferably, the receiving terminal node receives an identity authentication request, where the identity authentication request includes identity information of the terminal node; inquiring the identity authentication data of the terminal node in the edge server block chain according to the identity authentication request of the terminal node; and responding to the identity authentication request according to the identity authentication data.
Preferably, the system further comprises an encryption unit and a sending unit, wherein the encryption unit is used for carrying out double encryption on the personal information according to the block chain private key and the registration public key; and the sending unit is used for sending the double-encrypted personal information to the identity registration authority.
Preferably, the system further comprises a third sending module, configured to send the personal information gateway identity to a service system platform after sending the user registration request to the blockchain authentication platform, so that the service system platform sends an inquiry request to the blockchain authentication platform to verify whether the personal information gateway identity exists in a historical book of the blockchain authentication platform.
The beneficial effects of the invention are as follows:
1. the edge computing gateway identity authentication method based on the block chain technology comprises the steps of writing the current gateway identity into the block chain block of the current organization, sending an identity information authentication request to the chain link point of the identity block to be authenticated, wherein the identity information authentication request is used for indicating the chain link point of the identity block to be authenticated to return the corresponding gateway identity, finally, authenticating the organization identity of the chain link node of the identity block to be authenticated by the first organization node according to the returned gateway identity, obtaining the gateway identity by sending a gateway identity application request to the second-level authentication center, reducing the processing pressure of the authoritative authentication center, further obtaining the organization identity of the chain link node of the identity block to be authenticated by identifying the gateway identity, simplifying the authentication mode of block chain organization identity authentication, and avoiding the mutual misuse of the gateway identities among different block chain organizations, further, false identities between different blockchain organizations can be prevented.
2. According to the edge computing gateway identity authentication method based on the block chain technology, the ID of the user identification module is recorded into the identity information abstract, the ID of the user identification module corresponds to the personal information one by one, and if the personal information data of the identity registration mechanism is lost, the personal information can be reversely inquired through the ID of the user identification module and a user identification module verification mechanism so as to recover the data of the identity registration mechanism.
The parts of the device not involved are the same as or can be implemented using prior art.
Detailed Description
The technical solution of the present patent will be described in further detail with reference to the following embodiments.
Reference will now be made in detail to embodiments of the present patent, examples of which are illustrated in the accompanying documents, wherein like reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by reference to the documents are exemplary only for the purpose of explaining the present patent and are not to be construed as limiting the present patent.
In the description of this patent, it is to be understood that the terms "center," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like are used in the positional or orientational relationships indicated by the documents to facilitate the description of the patent and to simplify the description, but are not intended to indicate or imply that the referenced device or element must have a particular orientation, be constructed and operated in a particular orientation, and are not to be construed as limiting the patent.
In the description of this patent, it is noted that unless otherwise specifically stated or limited, the terms "mounted," "connected," and "disposed" are to be construed broadly and can include, for example, fixedly connected, disposed, detachably connected, disposed, or integrally connected and disposed. The specific meaning of the above terms in this patent may be understood by those of ordinary skill in the art as appropriate.
The identity authentication method of the edge computing gateway based on the block chain technology comprises the following steps:
s1: generating a block chain private key and a block chain public key of a block chain seed according to a preset block chain key algorithm, wherein the block chain seed is generated by adopting a random number generator; calculating a block chain address of a block chain public key according to a block chain address generation algorithm;
s2: sending the personal information to an identity registration mechanism, receiving a verification passing message of the identity registration mechanism, and sending an identity information abstract, a block chain public key and a block chain address to a gateway identity service mechanism so that the gateway identity service mechanism generates a personal information gateway identity;
s3: if the personal information gateway identity sent by the gateway identity service mechanism is received, a user registration request is sent to the block chain authentication platform, the first gateway identity application request is used for indicating the secondary authentication center to write the current organization information corresponding to the current organization identity into the root information of the gateway identity of the secondary authentication center, and the current gateway identity corresponding to the current organization identity is generated;
s4: verifying whether the user is legal or not based on the personal information, and when the user is verified to be a legal user, acquiring system chain information related to the user from the right chain node so as to verify whether the user has the function right of accessing the target application or not according to the system chain information and request parameters carried in the calling request;
s5: receiving an access request sent by a terminal, and acquiring user identity information carried by the access request; the user identity information comprises a user identification module ID, biological characteristics of a user and personal information of the user, the identity of the terminal is verified according to the user identification module ID, the biological characteristics of the user, the personal information of the user and pre-acquired public parameters of the terminal, and if the terminal passes the verification, the user identification module ID, the biological characteristics of the user and the personal information of the user are received and the authority is opened to the terminal;
s6: the block chain link point receives a user identification module ID, biological characteristics of a user and personal information of the user to acquire public key data; when the verification of the private key signature data is completed according to the public key data, acquiring equipment identification data of the user terminal and generating secret key data according to the equipment identification data; sending the key data to the user terminal; receiving authentication data submitted by a user terminal aiming at the key data; and when the authentication data submitted by the user terminal passes the verification, judging that the identity authentication passes.
In the invention, a user identification module ID and the biological characteristics of a user are generated according to an asymmetric encryption algorithm, a master public key, a private key of a terminal and an identification number of the terminal; the identification number of the terminal is allocated by the network layer of the block chain after the terminal is successfully registered on the block chain.
The invention also includes following steps after receiving the ID of the user identification module and the biological characteristics of the user and opening the authority to the terminal: receiving a downloading request sent by a terminal, and acquiring information of required data carried by the downloading request; and acquiring the average time delay of the data required by the terminal downloading, and acquiring a cache path which enables the average time delay of the data required by the terminal downloading to be minimum according to a belief propagation algorithm.
In the invention, an identity authentication request of a terminal node is received, wherein the identity authentication request comprises identity information of the terminal node; inquiring the identity authentication data of the terminal node in the edge server block chain according to the identity authentication request of the terminal node; and responding to the identity authentication request according to the identity authentication data.
The invention also comprises an encryption unit and a sending unit, wherein the encryption unit is used for carrying out double encryption on the personal information according to the block chain private key and the registration public key; and the sending unit is used for sending the double-encrypted personal information to the identity registration authority.
The system comprises a third sending module and a block chain authentication platform, wherein the third sending module is used for sending a user registration request to the block chain authentication platform and then sending the personal information gateway identity to the service system platform, so that the service system platform can send a query request to the block chain authentication platform to verify whether the personal information gateway identity exists in a historical account book of the block chain authentication platform.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.
Claims (6)
1. The identity authentication method of the edge computing gateway based on the block chain technology is characterized by comprising the following steps:
s1: generating a block chain private key and a block chain public key of a block chain seed according to a preset block chain key algorithm, wherein the block chain seed is generated by adopting a random number generator; calculating the block chain address of the block chain public key according to a block chain address generation algorithm;
s2: sending the personal information to an identity registration mechanism, and sending the identity information abstract, the block chain public key and the block chain address to a gateway identity service mechanism after receiving a verification passing message of the identity registration mechanism so that the gateway identity service mechanism generates a personal information gateway identity;
s3: if the personal information gateway identity sent by the gateway identity service mechanism is received, sending a user registration request to a block chain authentication platform, wherein the first gateway identity application request is used for indicating the secondary authentication center to write the current organization information corresponding to the current organization identity into the root information of the gateway identity of the secondary authentication center, and generating the current gateway identity corresponding to the current organization identity;
s4: verifying whether the user is legal or not based on the personal information, and acquiring system chain information related to the user from a right chain node when the user is verified to be a legal user so as to verify whether the user has a function right of accessing a target application or not according to the system chain information and request parameters carried in the calling request;
s5: receiving an access request sent by a terminal, and acquiring user identity information carried by the access request; the user identity information comprises a user identification module ID, biological characteristics of a user and personal information of the user, the identity of the terminal is verified according to the user identification module ID, the biological characteristics of the user, the personal information of the user and pre-acquired public parameters of the terminal, and if the terminal passes the verification, the user identification module ID, the biological characteristics of the user and the personal information of the user are received and the authority is opened to the terminal;
s6: the block chain link point receives the user identification module ID, the biological characteristics of the user and the personal information of the user to acquire public key data; when the verification of the private key signature data is completed according to the public key data, acquiring equipment identification data of the user terminal and generating secret key data according to the equipment identification data; sending the key data to the user terminal; receiving authentication data submitted by the user terminal aiming at the key data; and when the authentication data submitted by the user terminal passes the verification, judging that the identity authentication passes.
2. The identity authentication method of the edge computing gateway based on the block chain technology as claimed in claim 1, wherein the user identification module ID, the biometric feature of the user are generated according to an asymmetric encryption algorithm, a master public key, a private key of the terminal, and an identification number of the terminal; wherein the identification number of the terminal is allocated by a network layer of the block chain after the terminal is successfully registered on the block chain.
3. The identity authentication method of an edge computing gateway based on a blockchain technology according to claim 1, further comprising after accepting the user identification module ID, the biometric feature of the user and opening the right to the terminal: receiving a downloading request sent by the terminal, and acquiring information of required data carried by the downloading request; and acquiring the average time delay of the terminal for downloading the required data, and acquiring a cache path which enables the average time delay of the terminal for downloading the required data to be minimum according to a belief propagation algorithm.
4. The method according to claim 3, wherein the receiving terminal node requests identity authentication, the identity authentication request includes identity information of the terminal node; inquiring the identity authentication data of the terminal node in the edge server block chain according to the identity authentication request of the terminal node; and responding to the identity authentication request according to the identity authentication data.
5. The identity authentication method of the edge computing gateway based on the blockchain technology according to claim 1, further comprising an encryption unit and a sending unit, wherein the encryption unit is used for performing double encryption on the personal information according to the blockchain private key and the registration public key; and the sending unit is used for sending the double-encrypted personal information to the identity registration authority.
6. The method of claim 4, further comprising a third sending module, configured to send the personal information gateway identity to a service system platform after the user registration request is sent to the blockchain authentication platform, so that the service system platform sends a query request to the blockchain authentication platform to verify whether the personal information gateway identity exists in the historical account book of the blockchain authentication platform.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110446176.XA CN113271294A (en) | 2021-04-25 | 2021-04-25 | Edge computing gateway identity authentication method based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110446176.XA CN113271294A (en) | 2021-04-25 | 2021-04-25 | Edge computing gateway identity authentication method based on block chain technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113271294A true CN113271294A (en) | 2021-08-17 |
Family
ID=77229399
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110446176.XA Pending CN113271294A (en) | 2021-04-25 | 2021-04-25 | Edge computing gateway identity authentication method based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113271294A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019104690A1 (en) * | 2017-11-30 | 2019-06-06 | 深圳前海达闼云端智能科技有限公司 | Mobile network access authentication method, device, storage medium and block chain node |
CN110086821A (en) * | 2019-05-07 | 2019-08-02 | 国网江苏省电力有限公司无锡供电分公司 | The authentication method of electric power things-internet gateway and the access of electric power internet-of-things terminal based on block chain |
US20190288854A1 (en) * | 2016-09-18 | 2019-09-19 | Cloudminds (Shenzhen) Robotics Systems Co., Ltd. | Blockchain-based identity authentication method, device, node and system |
CN110505227A (en) * | 2019-08-23 | 2019-11-26 | 国网江苏省电力有限公司无锡供电分公司 | Power telecom network access authentication method and device based on block chain |
CN111859348A (en) * | 2020-07-31 | 2020-10-30 | 上海微位网络科技有限公司 | Identity authentication method and device based on user identification module and block chain technology |
-
2021
- 2021-04-25 CN CN202110446176.XA patent/CN113271294A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190288854A1 (en) * | 2016-09-18 | 2019-09-19 | Cloudminds (Shenzhen) Robotics Systems Co., Ltd. | Blockchain-based identity authentication method, device, node and system |
WO2019104690A1 (en) * | 2017-11-30 | 2019-06-06 | 深圳前海达闼云端智能科技有限公司 | Mobile network access authentication method, device, storage medium and block chain node |
CN110086821A (en) * | 2019-05-07 | 2019-08-02 | 国网江苏省电力有限公司无锡供电分公司 | The authentication method of electric power things-internet gateway and the access of electric power internet-of-things terminal based on block chain |
CN110505227A (en) * | 2019-08-23 | 2019-11-26 | 国网江苏省电力有限公司无锡供电分公司 | Power telecom network access authentication method and device based on block chain |
CN111859348A (en) * | 2020-07-31 | 2020-10-30 | 上海微位网络科技有限公司 | Identity authentication method and device based on user identification module and block chain technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113239382A (en) | Credible identity model based on block chain intelligent contract | |
US8516259B2 (en) | Verifying authenticity of voice mail participants in telephony networks | |
US20090046839A1 (en) | Verifying authenticity of called party in telephony networks | |
CN107181765A (en) | Network digital identity identifying method based on block chain technology | |
CN109040139A (en) | A kind of identity authorization system and method based on block chain and intelligent contract | |
CN108881167A (en) | A kind of intelligent contract of finite field block catenary system | |
WO2007005919A2 (en) | System and method for security in global computer transactions that enable reverse-authentication of a server by a client | |
CN102790674A (en) | Authentication method, equipment and system | |
CN101959183A (en) | A kind of mobile subscriber identification code IMSI guard method based on assumed name | |
CN102420690A (en) | Fusion and authentication method and system of identity and authority in industrial control system | |
CN106375308A (en) | Hybrid cloud-oriented cross-cloud user authentication system | |
CN101345743A (en) | Method and system for preventing network attack by utilizing address analysis protocol | |
CN112613006B (en) | Power data sharing method and device, electronic equipment and storage medium | |
US9906501B2 (en) | Publicly available protected electronic mail system | |
CN111444492A (en) | Digital identity verification method based on medical block chain | |
CN109670825B (en) | Digital asset real name registration system based on certificate association | |
CN102255916A (en) | Access authentication method, device, server and system | |
CN108011873A (en) | A kind of illegal connection determination methods based on set covering | |
CN115021989A (en) | Mutual trust and mutual recognition method and system for industrial internet heterogeneous identification analysis system | |
CN112565294A (en) | Identity authentication method based on block chain electronic signature | |
CN113919005B (en) | Digital certificate issuing method based on Schnorr aggregate signature | |
CN111260348A (en) | Fair payment system based on intelligent contract in Internet of vehicles and working method thereof | |
CN102164149A (en) | Method for guarding against mapping cheat based on identifying separation mapping network | |
Kim et al. | Can we create a cross-domain federated identity for the industrial Internet of Things without Google? | |
CN113271294A (en) | Edge computing gateway identity authentication method based on block chain technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20210817 |
|
WD01 | Invention patent application deemed withdrawn after publication |