CN114584298A - Quantum security SSL protocol application method and system - Google Patents

Quantum security SSL protocol application method and system Download PDF

Info

Publication number
CN114584298A
CN114584298A CN202210200526.9A CN202210200526A CN114584298A CN 114584298 A CN114584298 A CN 114584298A CN 202210200526 A CN202210200526 A CN 202210200526A CN 114584298 A CN114584298 A CN 114584298A
Authority
CN
China
Prior art keywords
server
key
client
random number
preset random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202210200526.9A
Other languages
Chinese (zh)
Inventor
陈晖�
杜新如
陈娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Liang'an Blockchain Technology Co ltd
Original Assignee
Chengdu Liang'an Blockchain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Liang'an Blockchain Technology Co ltd filed Critical Chengdu Liang'an Blockchain Technology Co ltd
Priority to CN202210200526.9A priority Critical patent/CN114584298A/en
Publication of CN114584298A publication Critical patent/CN114584298A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a quantum security SSL protocol application method and a system, wherein the quantum security SSL protocol application method comprises the steps of distributing a CA certificate for a newly accessed client, injecting a preset random number, and creating an associated identifier of the preset random number and the CA certificate; generating a first key factor using a handshake protocol; generating a second key factor based on a preset random number; carrying out security enhancement on the two key factors to obtain an encryption key; and establishing quantum secure SSL connection by adopting an encryption key and performing secure data transmission. A quantum security SSL protocol application system comprises a client and a server. Compared with the conventional method for combining the QKD network and the SSL protocol, the method realizes the close fusion of the quantum key and the SSL protocol through a safe, efficient and flexible method, and has good application prospect.

Description

Quantum security SSL protocol application method and system
Technical Field
The invention relates to the technical field of quantum keys and SSL protocols, in particular to a quantum security SSL protocol application method and system.
Background
The SSL protocol is widely applied to the fields of electronic government affairs, financial systems and the like, but the asymmetric cryptographic algorithm adopted by the SSL protocol cannot resist quantum computing attack, and the security strength of the symmetrical cryptographic algorithm adopted by the SSL protocol has certain vulnerability under the quantum computing attack, so that the improvement of the security of the SSL protocol has very important significance. At present, the quantum key is an important technical direction to improve the security of the SSL protocol, but since the quantum key distribution (QKD for short) network is a hardware infrastructure independent of the internet, the problem of seamless adaptation between the two is the key of the QKD scale application.
Disclosure of Invention
In order to solve the problems of the key distribution and service technology in the background technology, the invention provides a quantum security SSL protocol application method, which comprises an initialization process and a key negotiation process, wherein the initialization process comprises the steps of distributing a CA certificate by a newly accessed client, injecting a preset random number, and creating an associated identifier of the preset random number and the CA certificate; in the key agreement process, the server and the client adopt an SSL handshake protocol to perform identity authentication and negotiate an encryption algorithm, and a first key factor is generated by adopting the encryption algorithm; the client and the server generate a second key factor based on a preset random number; the client and the server respectively perform security enhancement on the first key factor and the second key factor to obtain an encryption key; the client and the server establish SSL connection by using the encryption key and perform safe data transmission.
Further, the method further comprises: and updating the CA certificate and the preset random number of the client in an off-line or on-line mode.
Further, the method further comprises: and encrypting and storing the preset random number.
The invention also provides a quantum security SSL protocol application system, which comprises a client and a server, wherein the server is used for distributing the CA certificate and the preset random number for the newly accessed client and creating the association identification list of the preset random number and the CA certificate; the server and the client adopt SSL handshake protocol to carry out identity authentication and negotiation encryption algorithm, and the encryption algorithm is adopted to generate a first key factor; the client and the server generate a second key factor based on a preset random number; the client and the server respectively perform security enhancement on the first key factor and the second key factor to obtain an encryption key; the client and the server establish SSL connection by using the encryption key and perform safe data transmission.
Further, the above system further comprises: and the quantum key service device is used for distributing quantum key related parameters for the client and/or the server or distributing a shared quantum key for the client and the server.
On the basis of the conventional SSL protocol, the invention introduces the quantum secure key factor through a safe, efficient and flexible method, and is used for improving the security of the SSL protocol. Compared with the conventional method for combining the QKD network and the SSL protocol, the method has higher safety, efficiency and flexibility and good application prospect.
Drawings
Fig. 1 is a schematic diagram of a quantum secure SSL protocol application method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a quantum secure SSL protocol application system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in detail below with reference to the accompanying drawings and specific embodiments.
To facilitate an understanding of the innovations of the present invention, the following description of the related art background is provided: in general, the SSL protocol includes a recording protocol and a handshake protocol, where the SSL recording protocol provides basic functions such as data encapsulation, compression, and encryption for a higher layer protocol; the SSL recording protocol is used for identity authentication, encryption algorithm negotiation, encryption key exchange and the like of the two communication parties. The quantum key is introduced in the handshake protocol process of the SSL protocol, and the quantum key is utilized to carry out security enhancement on the encryption key negotiated in the handshake protocol without changing the integral framework of the SSL protocol. In addition, in a specific embodiment, a network connection is also required between the client or application terminal executing the SSL protocol and the server. Therefore, the present invention does not limit and specifically describe the SSL protocol, and the related art may refer to the SSL protocol related art standard or literature.
Fig. 1 shows a schematic diagram of an embodiment of a quantum secure SSL protocol application method of the present invention, which includes an initialization process 101 and a key agreement process 102, where the initialization process 101 includes a new access client distributing a CA certificate, injecting a preset random number, and creating an association identifier between the preset random number and the CA certificate (the association identifier includes, but is not limited to, ID identifiers of a server and the client or/and CA certificate identifiers, and identification information of the preset random number, which is not specifically limited by the present invention); the key agreement process 102: the server and the client adopt an SSL handshake protocol to perform identity authentication and negotiate an encryption algorithm (the encryption algorithm and the variant versions thereof are very many, but the functions in the embodiment of the invention are substantially equivalent, so the invention does not specifically limit the encryption algorithm adopted in the embodiment), and the encryption algorithm is adopted to generate a first key factor; the client and the server generate a second key factor based on a preset random number; the client and the server respectively perform security enhancement on the first key factor and the second key factor to obtain an encryption key; the client and the server establish SSL connection by using the encryption key and perform safe data transmission. The implementation method of the initialization process 101 includes, but is not limited to, distributing a CA certificate for a new access client by a third-party server or the server, injecting a preset random number, and creating an association identifier between the preset random number and the CA certificate.
In a possible embodiment, on the basis of the above embodiment, the method further comprises updating the CA certificate and the preset random number of the client in an off-line or on-line manner.
In a possible embodiment, on the basis of any of the above embodiments, the method further includes performing encrypted storage on the preset random number.
Fig. 2 shows a schematic diagram of an embodiment of a quantum secure SSL application system of the present invention, the system includes a client 201 and a server 202, where the server 202 is configured to distribute a CA certificate and a preset random number for a new access client 201, and create an association identifier list of the preset random number and the CA certificate; the server 202 and the client 201 adopt an SSL handshake protocol to perform identity authentication and negotiate an encryption algorithm, and a first key factor is generated by adopting the encryption algorithm; the client 201 and the server 202 generate a second key factor based on a preset random number; the client 201 and the server 202 respectively perform security enhancement on the first key factor and the second key factor to obtain an encryption key; the client 201 and the server 202 establish an SSL connection using the encryption key and perform secure data transmission. The implementation method of the initialization process 101 includes, but is not limited to, the third-party server or the server 202 distributing a CA certificate for the new access client, injecting a preset random number, and creating an association identifier between the preset random number and the CA certificate.
In a possible embodiment, a quantum key service device is further included on the basis of the above embodiment, and is configured to distribute quantum key-related parameters to the client and/or the server, or distribute a shared quantum key to the client and the server. The quantum key association parameter includes, but is not limited to, an exclusive or value of a key packet in the preset random number of the client and a key packet or a quantum key of the server, and an exclusive or value of a quantum key of the client and a quantum key of the server.
In any of the above embodiments, the identity authentication includes, but is not limited to, any of the following methods: a method of presetting random numbers is adopted (including but not limited to that two communication parties carry out identity authentication by comparing Hash values of preset random numbers or certain random data, namely, the two communication parties respectively calculate the Hash values of corresponding data, if the two are completely consistent, the identity authentication is passed, otherwise, the identity authentication is not passed, or, a certain random data in the preset random numbers is used for encrypting a message for identity authentication, namely, one party encrypts a message, the other party decrypts to obtain a target message, the identity authentication is passed, otherwise, the identity authentication is not passed); a method of combining a CA certificate with a preset random number is adopted (including but not limited to, a sender encrypts a message by using the preset random number or one of the groups and carries out digital signature, then encrypts the message by using a public key of a receiver, the receiver firstly decrypts the message, then verifies the signature, then decrypts the message by using the preset random number or one of the groups, and if the decrypted message is consistent with the sent message, the identity authentication is passed); the method comprises the steps of adopting an anti-quantum-computation identity authentication algorithm (the invention does not specifically limit the adopted anti-quantum-computation identity authentication algorithm), and adopting a method of combining the anti-quantum-computation identity authentication algorithm with a preset random number (including but not limited to the steps that a sender encrypts a message by using the preset random number or one of the groups and carries out digital signature, then, the public key of a receiver is used for encryption, the receiver firstly decrypts, then, verifies the signature, then, decrypts by using the preset random number or one of the groups, and if the decrypted message is consistent with the sent message, the identity authentication is passed).
In any of the above embodiments, the generating the second key factor based on the preset random number includes any one of the following methods: encrypting and sending a key packet in the preset random numbers to the server side through a third-party server (including but not limited to, the third-party server or a quantum key service platform calculating an exclusive or value of a key packet in the preset random numbers and a quantum key packet in the server side and sending the exclusive or value to the server side, the server side calculating an exclusive or value of a corresponding quantum key packet and the exclusive or value and obtaining a key packet in the preset random numbers), and the server side using the key packet as a second key factor; the server selects a key group from the preset random numbers as a second key factor (i.e., in a possible scenario, the server stores the preset random numbers of the client in advance); the server side arranges the preset random number into a plurality of key groups in the same way as the client side (that is, in a possible embodiment scenario, the server side stores the preset random number of the client side in advance), and selects one key group as the second key factor. In a possible embodiment, the method further includes repeating the above steps to obtain a plurality of second key factors, and finally using the result of security enhancement on the plurality of second key factors as a final second key factor.
In any of the above embodiments, the injecting the preset random number includes any one or more of the following manners: the off-line injection is carried out by a third-party server, the off-line injection is carried out by the server side, and the encryption on-line injection is carried out by the third-party server or the server side. Wherein, the offline injection includes but is not limited to: sending a certain number of random number sequences or data or key packets to the client device through the local data transmission interface and creating a corresponding association identifier list; encryption on-line injection: a number of random number sequences or data or key packets are encrypted and sent to the client device and a corresponding list of associated identities is created.
In any of the above embodiments, the preset random number includes, but is not limited to, any of the following: a certain number of random number sequences or data, and a certain number of quantum key groupings (i.e., a certain number of random number sequences or data are arranged into a plurality of key groupings, and the plurality of key groupings are used as preset random numbers).
In any of the above embodiments, the privacy enhancement comprises any one of: exclusive-or operation, Hash operation, cryptographic operation using symmetric cryptographic algorithm.
In a possible embodiment, the service end in the foregoing embodiment includes but is not limited to: the system comprises a first server and a second server, wherein the first server distributes a CA certificate for a client, the second server injects a preset random number for the client, and the first server or the second server creates an associated identifier of the preset random number and the CA certificate.
It should be understood that, in any of the above embodiments, the "data" protected by the "secure data transmission" includes, but is not limited to, any one or more of the following: text, picture, voice, video, and binary data files.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus (or system), or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects.
While the invention has been described in conjunction with specific features and embodiments thereof, it will be evident that various modifications and combinations can be made thereto without departing from the spirit and scope of the invention. Accordingly, the specification and figures are merely exemplary of the invention as defined in the appended claims and are intended to cover any and all modifications, variations, combinations, or equivalents within the scope of the invention. It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A quantum secure SSL protocol application method is characterized by comprising the following steps:
an initialization process: distributing a CA certificate for a newly accessed client, injecting a preset random number, and creating an associated identifier of the preset random number and the CA certificate;
and (3) key negotiation process: the server and the client adopt an SSL handshake protocol to perform identity authentication and negotiate an encryption algorithm, and a first key factor is generated by adopting the encryption algorithm; the client and the server generate a second key factor based on a preset random number; the client and the server respectively carry out security enhancement on the first key factor and the second key factor to obtain an encryption key; and the client and the server establish SSL connection by using the encryption key and perform safe data transmission.
2. The quantum secure SSL protocol application method of claim 1, comprising: and updating the CA certificate and the preset random number of the client in an off-line or on-line mode.
3. The quantum secure SSL protocol application method according to claim 1 or 2, comprising: and encrypting and storing the preset random number.
4. The quantum secure SSL protocol application method of claim 1, wherein the identity authentication comprises any one of the following methods: the method adopts a method of presetting random numbers, a method of combining CA certificates with the preset random numbers, an identity authentication algorithm of anti-quantum computation, and a method of combining the identity authentication algorithm of anti-quantum computation with the preset random numbers.
5. The quantum secure SSL protocol application method of claim 1, wherein the generating of the second key factor based on the preset random number comprises any one of the following methods: encrypting a key packet in the preset random number by a third-party server and sending the key packet to the server, wherein the server takes the key packet as a second key factor; the server side selects a key group from the preset random number as a second key factor; the server side and the client side adopt the same method to arrange the preset random numbers into a plurality of key groups, and one key group is selected from the key groups to serve as a second key factor.
6. The method of claim 1, wherein the security enhancement comprises any of: exclusive-or operation, Hash operation, cryptographic operation using symmetric cryptographic algorithm.
7. The method for applying the quantum secure SSL protocol according to claim 1, wherein the injecting the preset random number comprises any one or more of the following ways: the off-line injection is carried out by a third-party server, the off-line injection is carried out by the server side, and the encryption on-line injection is carried out by the third-party server or the server side.
8. A quantum security SSL protocol application system comprises a client and a server, and is characterized in that the server distributes a CA certificate and a preset random number for a newly accessed client, and creates an associated identification list of the preset random number and the CA certificate; the server and the client adopt an SSL handshake protocol to perform identity authentication and negotiate an encryption algorithm, and a first key factor is generated by adopting the encryption algorithm; the client and the server generate a second key factor based on a preset random number; the client and the server respectively carry out security enhancement on the first key factor and the second key factor to obtain an encryption key; and the client and the server establish SSL connection by using the encryption key and perform safe data transmission.
9. The SSL application system according to claim 8, comprising a quantum key service device for distributing quantum key associated parameters to the client and/or the server, or distributing a shared quantum key to the client and the server.
10. The SSL application system according to claim 8, wherein the server comprises: the system comprises a first server and a second server, wherein the first server distributes a CA certificate for a client, the second server injects a preset random number for the client, and the first server or the second server creates an associated identifier of the preset random number and the CA certificate.
CN202210200526.9A 2022-03-03 2022-03-03 Quantum security SSL protocol application method and system Withdrawn CN114584298A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210200526.9A CN114584298A (en) 2022-03-03 2022-03-03 Quantum security SSL protocol application method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210200526.9A CN114584298A (en) 2022-03-03 2022-03-03 Quantum security SSL protocol application method and system

Publications (1)

Publication Number Publication Date
CN114584298A true CN114584298A (en) 2022-06-03

Family

ID=81775563

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210200526.9A Withdrawn CN114584298A (en) 2022-03-03 2022-03-03 Quantum security SSL protocol application method and system

Country Status (1)

Country Link
CN (1) CN114584298A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109309570A (en) * 2018-10-15 2019-02-05 北京天融信网络安全技术有限公司 Quantum key method used in SSL VPN and relevant device and storage medium
CN110572265A (en) * 2019-10-24 2019-12-13 国网山东省电力公司信息通信公司 terminal security access gateway method, device and system based on quantum communication
CN111756528A (en) * 2019-03-28 2020-10-09 广东国盾量子科技有限公司 Quantum session key distribution method and device and communication architecture
KR20210045285A (en) * 2019-10-16 2021-04-26 고태영 Quantum Entropy Management and Distribution System
CN113489586A (en) * 2021-07-26 2021-10-08 河南国科量子通信网络有限公司 VPN network system compatible with quantum key negotiation
CN114024689A (en) * 2022-01-05 2022-02-08 华中科技大学 E-mail receiving and sending method and system based on post quantum and identity

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109309570A (en) * 2018-10-15 2019-02-05 北京天融信网络安全技术有限公司 Quantum key method used in SSL VPN and relevant device and storage medium
CN111756528A (en) * 2019-03-28 2020-10-09 广东国盾量子科技有限公司 Quantum session key distribution method and device and communication architecture
KR20210045285A (en) * 2019-10-16 2021-04-26 고태영 Quantum Entropy Management and Distribution System
CN110572265A (en) * 2019-10-24 2019-12-13 国网山东省电力公司信息通信公司 terminal security access gateway method, device and system based on quantum communication
CN113489586A (en) * 2021-07-26 2021-10-08 河南国科量子通信网络有限公司 VPN network system compatible with quantum key negotiation
CN114024689A (en) * 2022-01-05 2022-02-08 华中科技大学 E-mail receiving and sending method and system based on post quantum and identity

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
舒晓飞;蒋念平;: "基于SSLVPN的密钥分配的安全性分析", 电子科技, no. 02 *

Similar Documents

Publication Publication Date Title
US20230283457A1 (en) Methods and apparatus for quantum-resistant network communication
CN110380852B (en) Bidirectional authentication method and communication system
US7120797B2 (en) Methods for authenticating potential members invited to join a group
CN106789042B (en) Authentication key negotiation method for user in IBC domain to access resources in PKI domain
CN106878016A (en) Data is activation, method of reseptance and device
CN113612605A (en) Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology
CN110048849B (en) Multi-layer protection session key negotiation method
CN113079022B (en) Secure transmission method and system based on SM2 key negotiation mechanism
CN112087428B (en) Anti-quantum computing identity authentication system and method based on digital certificate
CN109547413B (en) Access control method of convertible data cloud storage with data source authentication
CN110493272B (en) Communication method and communication system using multiple keys
CN107635227A (en) A kind of group message encryption method and device
CN114285571A (en) Method, gateway device and system for using quantum key in IPSec protocol
JP2020532177A (en) Computer-implemented systems and methods for advanced data security, high-speed encryption, and transmission
CN117278330B (en) Lightweight networking and secure communication method for electric power Internet of things equipment network
CN118381608B (en) Noise protocol implementation method and device based on out-of-band quantum key
CN116232578A (en) Multi-party collaborative signature system, method and equipment integrating quantum key distribution
CN118018187B (en) Agent re-encryption method based on SM9 cooperative algorithm
CN111049649A (en) Zero-interaction key negotiation security enhancement protocol based on identification password
CN114338648A (en) SFTP multi-terminal file secure transmission method and system based on state cryptographic algorithm
CN114268441B (en) Quantum security application method, client device, server device and system
KR100456624B1 (en) Authentication and key agreement scheme for mobile network
CN116318654A (en) SM2 algorithm collaborative signature system, method and equipment integrating quantum key distribution
CN113839786B (en) Key distribution method and system based on SM9 key algorithm
CN112054905B (en) Secure communication method and system of mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20220603

WW01 Invention patent application withdrawn after publication