CN114362964A - Big data encryption transmission method and system - Google Patents
Big data encryption transmission method and system Download PDFInfo
- Publication number
- CN114362964A CN114362964A CN202210028665.8A CN202210028665A CN114362964A CN 114362964 A CN114362964 A CN 114362964A CN 202210028665 A CN202210028665 A CN 202210028665A CN 114362964 A CN114362964 A CN 114362964A
- Authority
- CN
- China
- Prior art keywords
- data
- big data
- transmitted
- encryption
- abstract
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a big data encryption transmission method and system, and relates to the field of big data. The big data encryption transmission method comprises the following steps: acquiring a transmission request of a data set to be transmitted, and performing abstract extraction and encryption on data; converting the abstract part of each data set to be transmitted in the acquired big data into a big data code; and after receiving the data set to be transmitted, decrypting the received data, comparing the decrypted abstract with the big data code in the received data, and transmitting the decrypted data if the decrypted abstract is matched with the big data code in the received data. The data encryption method and the data encryption device can encrypt a plurality of data to be transmitted to obtain a plurality of encrypted data, and transmit the encrypted data to the user side, so that the number of keys is reduced on the premise of ensuring the safety of big data. In addition, the invention also provides a big data encryption transmission system.
Description
Technical Field
The invention relates to the field of big data, in particular to a big data encryption transmission method and a big data encryption transmission system.
Background
The big data can be stored in different places by using a distributed storage scheme, which is beneficial to reducing the pressure and cost of big data storage. Since hospitals and medical schools are generally distributed (each area necessarily has a respective hospital), the distributed storage big data technology is suitable for being adopted. However, when distributed storage is adopted, when data needs to be transmitted, if an encryption transmission technology is adopted, the situation that the number of keys is too large occurs, because the number of the storage terminals is inevitably increased due to the distributed storage, and in the encryption transmission process of the traditional technology, the number of the keys is in direct proportion to the number of the storage terminals, so that the management of the keys and the decryption of the ciphertext are not facilitated; and if the encryption transmission technology is not adopted, the security of the big data is difficult to guarantee.
The prior art adopts a public key system as follows: PKI, set up the file (namely: the file quantity is very much) encryption transmission system of the big data under the cloud computing environment, however, adopt PKI technology at cloud computing platform end, the cost to set up CA authentication center is higher, the file encryption transmission needs to carry on the integrality verification to the file, CA authentication center carries on the speed that the integrality verifies to the signature file of the cloud user slow, because, the quantity of cloud user and quantity of the cloud user file are very big, belong to big data, CA authentication center can not satisfy the super large scale namely: the market demands of encrypted transmission and integrity verification of mass file data influence the application of PKI technology in the technical field of cloud security.
Disclosure of Invention
The invention aims to provide a big data encryption transmission method, which can encrypt a plurality of data to be transmitted to obtain a plurality of encrypted data and transmit the encrypted data to a user side, so that the number of keys is reduced on the premise of ensuring the safety of the big data.
Another object of the present invention is to provide a big data encryption transmission system, which is capable of operating a big data encryption transmission method.
The embodiment of the invention is realized by the following steps:
in a first aspect, an embodiment of the present application provides a big data encryption transmission method, which includes obtaining a transmission request of a data set to be transmitted, and performing abstract extraction and encryption on data; converting the abstract part of each data set to be transmitted in the acquired big data into a big data code; and after receiving the data set to be transmitted, decrypting the received data, comparing the decrypted abstract with the big data code in the received data, and transmitting the decrypted data if the decrypted abstract is matched with the big data code in the received data.
In some embodiments of the present invention, the obtaining a transmission request of a data set to be transmitted and performing digest extraction and encryption on data includes: and when the transmission request of the data set to be transmitted is obtained, carrying out network environment detection on each data in the data set to be transmitted.
In some embodiments of the present invention, the above further includes: each data in the data set to be transmitted carries different permutation string sequences, different element merging methods and the same message digest value for verification.
In some embodiments of the present invention, the above further includes: and determining the encryption grade of the abstract according to the abstract value, and encrypting the data set to be transmitted according to the encryption grade.
In some embodiments of the present invention, the converting the obtained summary portion of each to-be-transmitted data set in the big data into the big data code includes: the output format of the big data codes converted by the abstract part of each data set to be transmitted is the same as the storage format of the data set to be transmitted, and each big data code has signature information used for uniquely determining the big data code.
In some embodiments of the present invention, the decrypting the received data after receiving the data set to be transmitted, comparing the decrypted digest with the big data code in the received data, and if the two are matched, transmitting the decrypted data includes: and correspondingly decrypting the negotiated encryption algorithm according to the algorithm supported by the data set to be transmitted, and extracting the abstract of the decrypted data set to be transmitted.
In some embodiments of the present invention, the above further includes: and comparing the decrypted abstract with the big data code in the received data, and stopping data transmission if the decrypted abstract is not matched with the big data code in the received data.
In a second aspect, an embodiment of the present application provides a big data encryption transmission system, which includes an extraction encryption module, configured to obtain a transmission request of a data set to be transmitted, extract and encrypt a summary of data;
the conversion module is used for converting the obtained abstract part of each data set to be transmitted in the big data into a big data code;
and the transmission module is used for decrypting the received data after receiving the data set to be transmitted, comparing the decrypted abstract with the big data code in the received data, and transmitting the decrypted data if the decrypted abstract is matched with the big data code in the received data.
In some embodiments of the invention, the above includes: at least one memory for storing computer instructions; at least one processor in communication with the memory, wherein the at least one processor, when executing the computer instructions, causes the system to: the device comprises an extraction encryption module, a conversion module and a transmission module.
In a third aspect, an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements a method such as any one of big data encryption transmission methods.
Compared with the prior art, the embodiment of the invention has at least the following advantages or beneficial effects:
the device can perform digest encryption and decryption to obtain a plurality of digest value sets; if the specified digest values exist in the digest value sets, a plurality of data to be transmitted are encrypted to obtain a plurality of encrypted data, and the encrypted data are transmitted to the user side, so that the number of keys is reduced on the premise of ensuring the security of big data. When the user big data is issued to the terminals at different levels, the terminals can be ensured to only obtain partial big data in the user big data according to the authority levels of the terminals, and further the disclosure of the privacy big data in the user big data is avoided.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic diagram illustrating steps of a big data encryption transmission method according to an embodiment of the present invention;
fig. 2 is a detailed step diagram of a big data encryption transmission method according to an embodiment of the present invention;
fig. 3 is a schematic block diagram of a big data encryption transmission system according to an embodiment of the present invention;
fig. 4 is an electronic device according to an embodiment of the present invention.
Icon: 10-extracting an encryption module; 20-a conversion module; 30-a transmission module; 101-a memory; 102-a processor; 103-communication interface.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
It is to be noted that the term "comprises," "comprising," or any other variation thereof is intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the individual features of the embodiments can be combined with one another without conflict.
Example 1
Referring to fig. 1, fig. 1 is a schematic diagram of a big data encryption transmission method according to an embodiment of the present invention, which includes the following steps:
step S100, acquiring a transmission request of a data set to be transmitted, and performing abstract extraction and encryption on data;
in some embodiments, the obtained data set to be transmitted is subjected to abstract extraction; the method specifically comprises the following steps:
the data sending end adopts an MD5 algorithm to process the acquired data set to be transmitted to obtain an MD5 code, wherein the MD5 code is used for document comparison; and the data sending end also adopts a TextRank algorithm to process the acquired data set to be transmitted to obtain keywords of the data set to be transmitted, and the obtained keywords of the data set to be transmitted are used for generating an encryption grade. The TextRank algorithm calculates the importance of each word based on the co-occurrence relationship between the words. And performing data filling, initial value setting and four-wheel cycle operation on the data set to be transmitted to generate an MD5 code, and further transmitting the MD5 code and the keywords. Data filling: after the data is filled with one 1 and N0 s until the length of the message is equal to 448 as a result of the remainder of 512, the length of the message is N × 512+448(bit) after the filling. Initial value setting: a structure is initially defined. The structure contains one plaintext block and the computed hash value at a time that needs to be processed. Four-wheel cycle: 16 runs were performed per round. Each operation operates on three of a, b, c, and d with a non-linear function, and then adds the result to a fourth variable, a sub-group of text and a constant. The result is then shifted to the left by an indefinite number and added to one of a, b, c or d. Finally, one of a, b, c or d is replaced by the result. Four rounds are performed according to the calculation.
Symmetrically encrypting the data set to be transmitted according to the encryption level to generate a public key PK1 and a corresponding data set ciphertext to be transmitted; the public key PK1 is asymmetrically encrypted by adopting an asymmetric encryption algorithm to generate a cipher text encrypted by the public key PK2 and the public key PK2 and a private key SK 1.
Illustratively, the algorithm employed for the symmetric key is the DES algorithm. The integrity check key is 8 bits, and the remaining 56 bits on the key participate in the DES operation. And generating a ciphertext from the data set to be transmitted by using a DES algorithm. Illustratively, the algorithm used in the asymmetric encryption algorithm is an RSA algorithm.
Step S110, converting the abstract part of each data set to be transmitted in the acquired big data into big data codes;
in some embodiments, the big data codes can be completely output on each target terminal, each big data set is converted into the big data codes with the same output format as the storage format of the big data set in the big data transmission server, and each big data code has signature information for uniquely determining the big data code.
And step S120, after the data set to be transmitted is received, decrypting the received data, comparing the decrypted abstract with the big data code in the received data, and transmitting the decrypted data if the two are matched.
In some embodiments, after receiving the data, the data output terminal decrypts the encrypted ciphertext of the public key PK2 by using the private key SK1 to obtain the public key PK 1; decrypting the ciphertext of the data set to be transmitted according to the public key PK1 to obtain a decrypted data set to be transmitted; carrying out abstract extraction on the decrypted data set to be transmitted; and comparing the extracted abstract with the abstract in the received data, and if the extracted abstract and the abstract are the same, transmitting the decrypted data.
Example 2
Referring to fig. 2, fig. 2 is a detailed step diagram of a big data encryption transmission method according to an embodiment of the present invention, which is shown as follows:
step S200, when the transmission request of the data set to be transmitted is obtained, network environment detection is carried out on each data in the data set to be transmitted.
Step S210, each data in the data set to be transmitted carries a different permutation string sequence, a different element merging method, and the same message digest value for verification.
And step S220, determining the encryption grade of the abstract according to the abstract value, and encrypting the data set to be transmitted according to the encryption grade.
In step S230, the output format of the big data codes converted from the digest portion of each to-be-transmitted data set is the same as the storage format of the to-be-transmitted data set, and each big data code has signature information for uniquely determining the big data code.
And S240, correspondingly decrypting the negotiated encryption algorithm according to the algorithm supported by the data set to be transmitted, and extracting the abstract of the decrypted data set to be transmitted.
Step S250, comparing the decrypted abstract with the big data code in the received data, and if the two are not matched, stopping data transmission.
In some embodiments, a data set to be transmitted is symmetrically encrypted, and a key of a symmetric algorithm is managed by adopting an asymmetric encryption algorithm; SSL secure channels are established between the data sending end and the Hadoop memory and between the Hadoop memory and the data output end, and the sending end sends data packets to the Hadoop memory; the data output end applies for a required data set to be transmitted from the Hadoop memory, the Hadoop confirms the encryption grade of the data output end, and after the confirmation is finished, the Hadoop memory returns a data packet to the data output end and sends a data called notice to the data sending end; and the data output end decrypts the data after receiving the data, extracts the abstract by adopting a keyword extraction algorithm, compares the extracted abstract with the metadata abstract transmitted by the Hadoop memory, and outputs and displays the decrypted data after the comparison is finished.
Example 3
Referring to fig. 3, fig. 3 is a schematic diagram of a big data encryption transmission system module according to an embodiment of the present invention, which is shown as follows:
the extraction encryption module 10 is used for acquiring a transmission request of a data set to be transmitted, and performing abstract extraction and encryption on data;
the conversion module 20 is configured to convert the obtained summary portion of each to-be-transmitted data set in the big data into a big data code;
the transmission module 30 is configured to decrypt the received data after receiving the data set to be transmitted, compare the decrypted digest with the big data code in the received data, and transmit the decrypted data if the two are matched.
As shown in fig. 4, an embodiment of the present application provides an electronic device, which includes a memory 101 for storing one or more programs; a processor 102. The one or more programs, when executed by the processor 102, implement the method of any of the first aspects as described above.
Also included is a communication interface 103, and the memory 101, processor 102 and communication interface 103 are electrically connected to each other, directly or indirectly, to enable transfer or interaction of data. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The memory 101 may be used to store software programs and modules, and the processor 102 executes the software programs and modules stored in the memory 101 to thereby execute various functional applications and data processing. The communication interface 103 may be used for communicating signaling or data with other node devices.
The Memory 101 may be, but is not limited to, a Random Access Memory 101 (RAM), a Read Only Memory 101 (ROM), a Programmable Read Only Memory 101 (PROM), an Erasable Read Only Memory 101 (EPROM), an electrically Erasable Read Only Memory 101 (EEPROM), and the like.
The processor 102 may be an integrated circuit chip having signal processing capabilities. The Processor 102 may be a general-purpose Processor 102, including a Central Processing Unit (CPU) 102, a Network Processor 102 (NP), and the like; but may also be a Digital Signal processor 102 (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware components.
In the embodiments provided in the present application, it should be understood that the disclosed method and system can be implemented in other ways. The method and system embodiments described above are merely illustrative, for example, the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of methods and systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
In another aspect, embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, which, when executed by the processor 102, implements the method according to any one of the first aspect described above. The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory 101 (ROM), a Random Access Memory 101 (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In summary, the big data encryption transmission method and system provided by the embodiment of the present application can perform digest encryption and decryption to obtain a plurality of digest value sets; if the specified digest values exist in the digest value sets, a plurality of data to be transmitted are encrypted to obtain a plurality of encrypted data, and the encrypted data are transmitted to the user side, so that the number of keys is reduced on the premise of ensuring the security of big data. When the user big data is issued to the terminals at different levels, the terminals can be ensured to only obtain partial big data in the user big data according to the authority levels of the terminals, and further the disclosure of the privacy big data in the user big data is avoided.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes will occur to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Claims (10)
1. A big data encryption transmission method is characterized by comprising the following steps:
acquiring a transmission request of a data set to be transmitted, and performing abstract extraction and encryption on data;
converting the abstract part of each data set to be transmitted in the acquired big data into a big data code;
and after receiving the data set to be transmitted, decrypting the received data, comparing the decrypted abstract with the big data code in the received data, and transmitting the decrypted data if the decrypted abstract is matched with the big data code in the received data.
2. The big data encryption transmission method according to claim 1, wherein the obtaining of the transmission request of the data set to be transmitted and the data digest extraction and encryption comprise:
and when the transmission request of the data set to be transmitted is obtained, carrying out network environment detection on each data in the data set to be transmitted.
3. The big data encryption transmission method according to claim 2, further comprising:
each data in the data set to be transmitted carries different permutation string sequences, different element merging methods and the same message digest value for verification.
4. The big data encryption transmission method according to claim 3, further comprising:
and determining the encryption grade of the abstract according to the abstract value, and encrypting the data set to be transmitted according to the encryption grade.
5. The big data encryption transmission method according to claim 1, wherein the converting the obtained digest portion of each data set to be transmitted in the big data into the big data code comprises:
the output format of the big data codes converted by the abstract part of each data set to be transmitted is the same as the storage format of the data set to be transmitted, and each big data code has signature information used for uniquely determining the big data code.
6. The big data encryption transmission method according to claim 1, wherein after receiving the data set to be transmitted, decrypting the received data, comparing the decrypted digest with the big data code in the received data, and if the two are matched, transmitting the decrypted data comprises:
and correspondingly decrypting the negotiated encryption algorithm according to the algorithm supported by the data set to be transmitted, and extracting the abstract of the decrypted data set to be transmitted.
7. The big data encryption transmission method according to claim 6, further comprising:
and comparing the decrypted abstract with the big data code in the received data, and stopping data transmission if the decrypted abstract is not matched with the big data code in the received data.
8. A big data encryption transmission system, comprising:
the extraction encryption module is used for acquiring a transmission request of a data set to be transmitted and performing abstract extraction and encryption on data;
the conversion module is used for converting the obtained abstract part of each data set to be transmitted in the big data into a big data code;
and the transmission module is used for decrypting the received data after receiving the data set to be transmitted, comparing the decrypted abstract with the big data code in the received data, and transmitting the decrypted data if the decrypted abstract is matched with the big data code in the received data.
9. The big data encryption transmission system according to claim 8, comprising:
at least one memory for storing computer instructions;
at least one processor in communication with the memory, wherein the at least one processor, when executing the computer instructions, causes the system to perform: the device comprises an extraction encryption module, a conversion module and a transmission module.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210028665.8A CN114362964A (en) | 2022-01-11 | 2022-01-11 | Big data encryption transmission method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210028665.8A CN114362964A (en) | 2022-01-11 | 2022-01-11 | Big data encryption transmission method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114362964A true CN114362964A (en) | 2022-04-15 |
Family
ID=81110174
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210028665.8A Withdrawn CN114362964A (en) | 2022-01-11 | 2022-01-11 | Big data encryption transmission method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114362964A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118432942A (en) * | 2024-07-02 | 2024-08-02 | 南京华飞数据技术有限公司 | Digital signal encryption transmission system and method applied to network communication |
-
2022
- 2022-01-11 CN CN202210028665.8A patent/CN114362964A/en not_active Withdrawn
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118432942A (en) * | 2024-07-02 | 2024-08-02 | 南京华飞数据技术有限公司 | Digital signal encryption transmission system and method applied to network communication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8892881B2 (en) | Split key secure access system | |
CN110138739B (en) | Data information encryption method and device, computer equipment and storage medium | |
JP2019531673A (en) | Data processing method and apparatus | |
US11664982B2 (en) | Key management for multi-party computation | |
CN105227566A (en) | Cipher key processing method, key handling device and key handling system | |
CN113449338B (en) | Information encryption storage method and system based on block chain | |
CN104601681A (en) | File fragmentation processing method and device | |
CN112926075B (en) | SM9 key generation method, device, equipment and storage medium | |
KR20210063378A (en) | Computer-implemented systems and methods that share common secrets | |
Abdel-Kader et al. | Efficient two-stage cryptography scheme for secure distributed data storage in cloud computing. | |
US11233646B2 (en) | Searchable encryption method | |
CN112382376A (en) | Medical instrument management tracing system based on block chain | |
CN112948867A (en) | Method and device for generating and decrypting encrypted message and electronic equipment | |
US20200274709A1 (en) | Calculation device for encryption using public key and encryption method thereof | |
CN116866029B (en) | Random number encryption data transmission method, device, computer equipment and storage medium | |
CN114362964A (en) | Big data encryption transmission method and system | |
CN112398646B (en) | Identity-based encryption method and system with short public parameters on ideal lattice | |
CN115834163B (en) | Method, device, equipment and storage medium for generating secret key of encrypted data | |
CN115102768B (en) | Data processing method and device and computer equipment | |
CN115277064B (en) | Data encryption and data decryption methods and devices, electronic equipment and medium | |
CN115865540A (en) | Information secure transmission method and device | |
CN113518244B (en) | Digital television signal data transmission method and device based on substitute text combination | |
Ramadhan et al. | Data security using low bit encoding algorithm and rsa algorithm | |
CN114143098A (en) | Data storage method and data storage device | |
JP2005114870A (en) | Cryptocommunication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20220415 |
|
WW01 | Invention patent application withdrawn after publication |