CN201994961U - Dispersion-oriented cloud-storage security architecture - Google Patents

Dispersion-oriented cloud-storage security architecture Download PDF

Info

Publication number
CN201994961U
CN201994961U CN2011200343836U CN201120034383U CN201994961U CN 201994961 U CN201994961 U CN 201994961U CN 2011200343836 U CN2011200343836 U CN 2011200343836U CN 201120034383 U CN201120034383 U CN 201120034383U CN 201994961 U CN201994961 U CN 201994961U
Authority
CN
China
Prior art keywords
storage
data
memory device
cloud storage
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2011200343836U
Other languages
Chinese (zh)
Inventor
邵必林
边根庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Architecture and Technology
Original Assignee
Xian University of Architecture and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Architecture and Technology filed Critical Xian University of Architecture and Technology
Priority to CN2011200343836U priority Critical patent/CN201994961U/en
Application granted granted Critical
Publication of CN201994961U publication Critical patent/CN201994961U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The utility model discloses a dispersion-oriented cloud-storage security architecture, which comprises a cloud storage server, one or more than one scatter storage managers and at least one storage device, wherein the scatter storage managers and the cloud storage server are connected through a fiber channel or a routing switch, the scatter storage managers and the storage devices are connected through an FC (family computer) or an ISCSI (internet small computer system interface), and the storage devices are connected through an NAS (network attached storage) or an SAN (storage area network). According to the utility model, virtual view can be provided for a user, and the timely access for data is facilitated; the storage devices are stored in different places and are mutually redundant, and the fault-tolerant capability and the optimum storage use ratio of the devices are improved; stored information is segmented, so that the data becomes data segments which can not be identified by other non-certified systems, and the data after being segmented has relative confidentiality and safety during network transmission and data storage; and the storage and the server which are adopted are devices with higher cost performance, and thus the cost is low.

Description

A kind of towards distributed cloud storage security framework
Technical field
The utility model belongs to computer realm, relates to a kind of cloud storage security framework, and is particularly a kind of towards distributed cloud storage security framework.Can be used for medical image and medical treatment, Aero-Space, national defence, mapping, urban construction, petrochemical industry, seismic prospecting, intelligence channel, radio and television, telecommunications, finance etc. to data fail safe, the higher field of availability requirement, application is wide.
Background technology
The network storage has become the third wave after computer tide and the Internet tide.Along with fields such as all trades and professions amount of information explosive increase, particularly government bodies, military and national defense, mapping, research institute, oil exploration and new industry all produce a large amount of classified informations inevitably.The information of how effectively important by the network storage, concerning security matters prevents that it from divulging a secret, spreading, and becomes the information security issue that enterprise and institution pays close attention to the most.In present domestic and international research, also seldom to the research of cloud storage security aspect.Wherein, Bowers has proposed distributed encryption system (HAIL), and people such as Cachin solve data integrity and consistency problem by using Encryption Tool.Research institutions such as domestic Tsing-Hua University, the Central China University of Science and Technology, the National University of Defense technology also begin to carry out basic research work in cloud memory technology association area.Flexibility, wieldy service and to be easy to share infrastructure be the advantage of cloud computing, however data transmit between each layer by the Internet and store, the user can't directly control risk during for the sensitive data access.
Amount of literature data both domestic and external shows that the disappearance of safe storage and administrative model is the significant deficiency in the research of current network storage security.In order to realize the security strategy of level storage, need to satisfy the demand of user storage mass data in the cloud storage, storage system scale and memory capacity are all in continuous growth, and the error rate relevant with storage will be more and more higher.The present diversity that the research of storage security is used owing to storage system and storage, and sector application has caused the complexity of information stores and safety management to the different requirements of fail safe.But there are two kinds of methods in the research to this aspect in general: (1) uses for reference the C.I.A characteristic (confidentiality, integrality, availability) of information security, for a certain application-specific proposes special realization thinking (directly visiting the authentication mechanism of disk etc. as the fail safe that strengthens file server, client encrypt file system, to the overall static encryption of disk tape, client), be about to be applicable to that the safety measure (as encryption technology, integrity techniques) of information security is transplanted in the storage system; Safe implantation technique is static management mode, needs extra hardware supports, tends to cause the reduction of systematic function.(2) start with from the architecture of storage system, seek a kind of safe, network storage efficiently and safety management mode.If, still may not cause new safety problem from the angle research and the design safety solution of system and storage administration control.
Summary of the invention
In order to overcome the deficiencies in the prior art or defective, the purpose of this utility model is, provide a kind of towards distributed cloud storage security framework, layering realizes safe transmission, storage and the management of storage data in the cloud storage, guarantees the high availability and the reliability of storage in the cloud storage security system.
To achieve these goals, the utility model adopts following technical solution:
A kind ofly it is characterized in that towards distributed cloud storage security framework comprise the cloud storage server, one or more disperse storage manager, at least one memory device, wherein:
Described cloud storage server is in order to carry out security credential to the user; Receive data and deciphering that the user sends, set up the user profile index, and decrypted data and user profile index are sent to the dispersion storage manager;
Described dispersion storage manager is in order to receive data and the user profile index that the cloud storage server sends; Data are carried out burst and stored data slice into memory device; For the user sets up virtual view;
Described memory device, the data slice in order to storage receives returns to the dispersion storage manager with data storage information; Regularly detect the integrality of data; When data are destroyed, repair damaged data;
Wherein, described dispersion storage manager is connected by optical-fibre channel or multi-layer switches with described cloud storage server, and described dispersion storage manager is connected by FC or Iscsi with memory device, is connected by NAS or SAN between each memory device.
Further, described framework also comprises client, is connected with described dispersion storage manager, cloud storage server by Internet/LAN, in order to send access request to described cloud storage server; Visit described memory device by described dispersion storage manager.
Further, described data storage information is the store path of storaging state information, memory device number, data slice.
Further, described cloud storage server, dispersion storage manager are universal server.
Further, described memory device is used for externally providing the file access interface, and described memory device is FC fibre channel storage, IP memory device or DAS memory device or SAN storage networking.
Further, if described in this framework have a plurality of dispersion storage managers, the common network of forming of described a plurality of dispersion storage managers and cloud storage server is the DHT distributed network.
Further, described cloud storage server is used for user safety authentication and control of authority management, load balancing and user metadata management for the user provides the general-purpose accessing interface; Also be used for routing management and replica management.
The utility model layering realizes safe transmission, storage and the management of storage data in the cloud storage, guarantees the high availability and the reliability of storage in the cloud storage security system.Compared with prior art, the utlity model has following advantage:
1) logic of disperseing storage manager to utilize virtual view to carry out data is preserved, and is convenient to the user data are carried out access application.
2) adopt to disperse storage mode, memory device is that the strange land is deposited and is redundant each other, has improved equipment fault-tolerant ability and optimal storage utilance.
3) disperse storage manager that data are carried out burst, data are become can't be by other non-Verification System recognition data fragment, just has relative confidentiality and fail safe during with storage in Network Transmission behind the burst.
4) when the user need expand system, can carry out dynamic-configuration to system, realize the expansion of memory capacity or bandwidth;
5) disperse storage manager to check available and recomputate data all in the data segment, recover damaged data according to intact data in other redundant each other memory device, the mean free error time of raising system, the data of having avoided single hardware damage to bring are unavailable.
Description of drawings
Fig. 1 is the structural representation of security architecture of the present utility model.Each symbolic significance among the figure: 1-client; 2-disperses storage manager; 3-cloud storage server; The 4-memory device.
Fig. 2 is an example structure schematic diagram of the present utility model.
Fig. 3 is the flow chart of date storage method of the present utility model.
Fig. 4 is the flow chart of method for reading data of the present utility model.
Below in conjunction with the drawings and specific embodiments the utility model is further explained explanation.
Embodiment
The iSCSI interfacing that the utility model relates to, the Chinese meaning is based on the small computer system interface of IP, be a kind of by IBM Corporation research and development, it is the SCSI instruction set that can move on the upper strata of IP agreement for the hardware device use, this instruction set can be implemented on the IP network operation SCSI agreement, make its can such as the enterprising walking along the street of high speed gigabit Ethernet by selection.Iscsi technology is a kind of new memory technology, and this technology is that existing scsi interface is combined with Ethernet (Ethernet) technology, make server can with the memory device communication that uses IP network.
The FC(optical-fibre channel) be applied to the SAN(storage area network the earliest), in exploitation in 1988, be used for improving the transmission bandwidth of memory device agreement, lay particular emphasis on quick, efficient, the reliable transmission of data.FC has the protocol layer of oneself, comprising: FC-0: the interface of connection physical medium, cable etc.; The standard of definition Code And Decode.FC-1: transmission protocol layer or data link layer, coding or decoded signal.FC-2: network layer, the core of optical-fibre channel has defined frame, current control and service quality etc.FC-3: defined service commonly used, encrypted and compression as data.FC-4: the agreement mapping layer, defined the interface between optical-fibre channel and the upper layer application, upper layer application such as: serial SCSI agreement, the driving of HBA provides the interface function of FC-4.FC-4 supports multi-protocols, as: FCP-SCSI, FC-IP, FC-VI.The major part of optical-fibre channel is actually FC-2.Wherein from FC-0 to FC-2, be called as FC-PH, just " physical layer ".Optical-fibre channel is mainly transmitted by FC-2, and therefore, optical-fibre channel is also often become " two-layer protocol " or " class Ethernet protocol ".
Referring to Fig. 1, of the present utility modelly a kind ofly comprise the cloud storage server towards distributed cloud storage security framework, one or more disperse storage manager, at least one memory device, wherein:
The cloud storage server is in order to carry out security credential to the user; Receive data and deciphering that the user sends, set up the user profile index, and decrypted data and user profile index are sent to the dispersion storage manager; The cloud storage server is used for user safety authentication and control of authority management, load balancing and user metadata management for the user provides the general-purpose accessing interface; Also be used for routing management and replica management.The cloud storage server is universal server.
Disperse storage manager, in order to receive data and the user profile index that the cloud storage server sends; Data are carried out burst and stored data slice into memory device; For the user sets up virtual view, be convenient to that the user reads and data are used; Disperseing storage manager is universal server.
Described memory device, the data slice in order to storage receives returns to the dispersion storage manager with data storage information; Data storage information is the store path of storaging state information, memory device number, data slice.Regularly detect the integrality of data; When data are destroyed, repair damaged data; Memory device is used for externally providing the file access interface, and described memory device is FC fibre channel storage, IP memory device (as NAS, iSCSI) or DAS memory device (as SCSI, SAS) or SAN storage networking.
Also comprise client, in order to send access request to described cloud storage server; Visit described memory device by described dispersion storage manager.
Wherein, described dispersion storage manager is connected by optical-fibre channel or multi-layer switches with described cloud storage server, and described dispersion storage manager is connected by FC or Iscsi with memory device, is connected by NAS or SAN between each memory device.Client is connected with described dispersion storage manager, cloud storage server by Internet/LAN.
If described in this framework have a plurality of dispersion storage managers, the common network of forming of described a plurality of dispersion storage managers and cloud storage server is the DHT distributed network.
Each memory device strange land is provided with, and redundant each other.
As shown in Figure 2, be an embodiment of cloud storage security framework of the present utility model:
A kind ofly comprise the cloud storage server towards distributed cloud storage security framework, a plurality of dispersion storage managers, a plurality of memory devices, wherein:
The cloud storage server is in order to carry out security credential to the user; Receive data and deciphering that the user sends, set up the user profile index, and decrypted data and user profile index are sent to the dispersion storage manager; The cloud storage server also provides the general-purpose accessing interface for the user, is used for user safety authentication and control of authority management, load balancing and user metadata management; Also be used for routing management and replica management.The cloud storage server is universal server.
Disperse storage manager, in order to receive data and the user profile index that the cloud storage server sends; Data are carried out burst and stored data slice into memory device; For the user sets up virtual view, be convenient to that the user reads and data are used.Disperseing storage manager is universal server.
Memory device, the data slice in order to storage receives returns to the dispersion storage manager with data storage information; Data storage information comprises the store path of storaging state information (success or wrong), memory device number, data slice; Regularly detect the integrality of data; When data are destroyed, repair damaged data; Memory device is used for externally providing the file access interface, and memory device is the SAN storage networking.
Also comprise client, in order to send access request to described cloud storage server; Visit described memory device by described dispersion storage manager.
Wherein, a plurality of dispersion storage managers and cloud storage server composition network is the DHT distributed network.
Disperse storage manager to be connected by optical-fibre channel or multi-layer switches with the cloud storage server, the DHT distributed network is connected by Iscsi with memory device, and client is connected with described dispersion storage manager, cloud storage server by Internet/LAN.A plurality of memory devices strange land is provided with and is redundant each other, forms the SAN storage area network by the SAN switch between the memory device.
As shown in Figure 3, use above-mentioned date storage method, comprise the steps: towards distributed cloud storage security framework
When user storage data, send data storage request by client to the cloud storage server, the cloud storage server carries out safety certification to the user, and client is carried out data the SSL encryption and is sent to the cloud storage server by Internet; The cloud storage server receives enciphered data and the deciphering that client sends, and utilizes to arrange literal and set up the user profile index, and the data of cloud storage server after with user profile index and deciphering send to the dispersion storage manager; Disperse storage manager to receive data and user profile index that the cloud storage server sends, the data that receive are carried out burst, obtain one or more data slice, data slice is assigned in the memory device by the load balancing strategy according to the IDA algorithm; Memory device is the storage of the data slice that receives, and the store path of the data slice of self storage is returned to the dispersion storage manager; Disperse storage manager each data slice to be identified it with unique changeless 64 handles according to the store path of data slice, and set up and to be used for the virtual view of storing metadata, this virtual view comprises the filename of the data of user storage, the handle number and the file size of this document correspondence, and the handle number of described file correspondence is the set of handle number of all data slice of this document.
As shown in Figure 4, use above-mentioned method for reading data, comprise the steps: towards distributed cloud storage security framework
The user sends data read request by client to the cloud storage server, includes the filename that the user need read in this data read request, and the cloud storage server carries out safety certification to the user; The cloud storage server allows the request of reading, this user to allow to include in the request of reading the filename that the user need read to disperseing storage manager to send; Disperse storage manager to read request according to the memory device transmission file of handle number to the data slice place that file comprised of the filename in the virtual view, file correspondence; Memory device disperses storage manager according to the reverse computing of IDA algorithm the data slice that receives to be synthesized to disperseing storage manager to submit data slice to, and check and correction, at last complete data file is returned to client.
Disperse storage manager to utilize the IDA algorithm that the storage data are carried out burst, data are become can't be by other non-Verification System institute recognition data sheet.Each independent data slice is not have in all senses, if data are intercepted and captured by other people in network transmission process or are stolen by accident on memory device, because intercepting side is the partial data sheet of acquired information just, the information of intercepting does not have any physical meaning, so just can guarantee that behind the data fragmentation be to produce security information leakage or diffusion.In addition, the data behind these bursts are put into the different memory device in geographical position, even if when being extracted by other user misoperation, can guarantee that also the information that needs protection can be not analyzed do not come out.
In order to ensure the high availability and the reliability of storage in the cloud storage security framework, configuration strange land memory device, and each memory device is redundant each other.In the physical sense, data disperse to be stored in strange land and each redundant each other memory device, therefore disperse; On logical meaning, disperse storage manager to set up the corresponding virtual view of data slice in data and the memory device.When the user conducted interviews to the data in the cloud or operates, the data slice of these dispersions was transparent for the user, disperseed storage manager according to virtual view data to be created, retrieved and operation such as deletion.The dispersion storage of data also makes storage system possess certain fault-tolerant, disaster tolerance ability, has improved the availability of information.
System uses the Reed-Solomon sign indicating number to provide any height fault-tolerant recovery technology, and the assurance system can be detected rapidly after pinpointing the problems.If the corrupted data on the memory device, lose, memory automation testing process can be found this problem, recomputates data all in the data segment by detecting available, recovers ruined data according to data intact in other memory device.Recover by such data bootstrapping, significantly improved the Mean Time Between Failures of cloud storage security framework.
Characteristic of the present utility model:
1) transmission security
The cloud storage is transmitted data by network, cause that service disruption, data corruption, information are stolen etc. comprising malicious attack in the network etc., the diffusion of information method makes data just have relative confidentiality and fail safe during with storage in Network Transmission behind the burst.By disperseing storage manager that stored information is carried out burst, data are become can't be by other non-Verification System institute recognition data fragment.Because intercepting side is the burst of acquired information just, the information of intercepting does not have any physical meaning, so just can guarantee can not produce leakage behind the data fragmentation.
2) high availability
In order to ensure the high availability and the reliability of storage in the cloud storage security system, deposit in the equipment strange land in the accumulation layer of system, and redundant each other, improves equipment fault-tolerant ability and optimum memory by using rate.Use the Reed-Solomon sign indicating number that any high error recovery technique is provided.Corrupted data on the equipment, lose, the automation testing process can be found and check available and recomputate data all in the data segment in the storage system, recovers ruined data by other memory device, improves the mean free error time of system.The dispersion storage of data makes storage system possess certain fault-tolerant, disaster tolerance ability, makes data have high availability.
3) comprehensive protection of data
According to safety of data analysis in the cloud storage, from the transfer of data to the storage, all set up the corresponding protection measure carry out layer with layer between strick precaution.According to the hierarchical structure of cloud storage, control and authentication by conducting interviews to interface layer in client, use encryption technology SSL to protect user data to user storage data, data are protected in Network Transmission; In management level, after disperseing storage manager with data fragmentation, the storage of data still all disperses in the memory device in terms of content, after like this can data being prevented from accident and stealing, still can not draw the effective information of information; In accumulation layer, equipment all is to be stored in strange land and redundant each other, has certain fault-tolerant ability and optimum memory by using rate.Successively the data of needs storage are protected by these protection strategies, realized the comprehensive protection from the transfer of data to the memory location.

Claims (7)

1. one kind towards distributed cloud storage security framework, it is characterized in that comprise the cloud storage server, one or more disperse storage manager, at least one memory device, wherein:
Described cloud storage server is in order to carry out security credential to the user; Receive data and deciphering that the user sends, set up the user profile index, and decrypted data and user profile index are sent to the dispersion storage manager;
Described dispersion storage manager is in order to receive data and the user profile index that the cloud storage server sends; Data are carried out burst and stored data slice into memory device; For the user sets up virtual view;
Described memory device, the data slice in order to storage receives returns to the dispersion storage manager with data storage information; Regularly detect the integrality of data; When data are destroyed, repair damaged data;
Wherein, described dispersion storage manager is connected by optical-fibre channel or multi-layer switches with described cloud storage server, and described dispersion storage manager is connected by FC or Iscsi with memory device, is connected by NAS or SAN between each memory device.
2. as claimed in claim 1 towards distributed cloud storage security framework, it is characterized in that described framework also comprises:
Client is connected with described dispersion storage manager, cloud storage server by Internet/LAN, in order to send access request to described cloud storage server; Visit described memory device by described dispersion storage manager.
3. as claimed in claim 1ly it is characterized in that described data storage information is the store path of storaging state information, memory device number, data slice towards distributed cloud storage security framework.
4. as claimed in claim 1ly it is characterized in that described cloud storage server, to disperse storage manager be universal server towards distributed cloud storage security framework.
5. as claimed in claim 1 towards distributed cloud storage security framework, it is characterized in that, described memory device is used for externally providing the file access interface, and described memory device is FC fibre channel storage, IP memory device or DAS memory device or SAN storage networking.
6. as claimed in claim 1 towards distributed cloud storage security framework, it is characterized in that, if described in this framework have a plurality of dispersion storage managers, the common network of forming of described a plurality of dispersion storage managers and cloud storage server is the DHT distributed network.
7. as claimed in claim 1ly it is characterized in that described cloud storage server is used for user safety authentication and control of authority management, load balancing and user metadata management for the user provides the general-purpose accessing interface towards distributed cloud storage security framework; Also be used for routing management and replica management.
CN2011200343836U 2011-02-01 2011-02-01 Dispersion-oriented cloud-storage security architecture Expired - Fee Related CN201994961U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011200343836U CN201994961U (en) 2011-02-01 2011-02-01 Dispersion-oriented cloud-storage security architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011200343836U CN201994961U (en) 2011-02-01 2011-02-01 Dispersion-oriented cloud-storage security architecture

Publications (1)

Publication Number Publication Date
CN201994961U true CN201994961U (en) 2011-09-28

Family

ID=44671435

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011200343836U Expired - Fee Related CN201994961U (en) 2011-02-01 2011-02-01 Dispersion-oriented cloud-storage security architecture

Country Status (1)

Country Link
CN (1) CN201994961U (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103259762A (en) * 2012-02-16 2013-08-21 中兴通讯股份有限公司 File encryption and decryption method and system based on cloud storage
CN103281400A (en) * 2013-06-18 2013-09-04 清华大学 Data segmenting, coding and recovering method used for cloud storage gateway
CN103838522A (en) * 2014-03-06 2014-06-04 中国石油集团川庆钻探工程有限公司地球物理勘探公司 Method for visiting magnetic tape
CN104009864A (en) * 2014-04-11 2014-08-27 重庆纳跃信息科技有限公司 Clouded management platform

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103259762A (en) * 2012-02-16 2013-08-21 中兴通讯股份有限公司 File encryption and decryption method and system based on cloud storage
CN103259762B (en) * 2012-02-16 2016-09-28 中兴通讯股份有限公司 A kind of file encryption based on cloud storage, decryption method and system
CN103281400A (en) * 2013-06-18 2013-09-04 清华大学 Data segmenting, coding and recovering method used for cloud storage gateway
CN103838522A (en) * 2014-03-06 2014-06-04 中国石油集团川庆钻探工程有限公司地球物理勘探公司 Method for visiting magnetic tape
CN104009864A (en) * 2014-04-11 2014-08-27 重庆纳跃信息科技有限公司 Clouded management platform
CN104009864B (en) * 2014-04-11 2018-02-16 重庆纳跃信息科技有限公司 A kind of cloud management platform

Similar Documents

Publication Publication Date Title
CN102088491B (en) Distributed storage oriented cloud storage security architecture and data access method thereof
AU2018236850B2 (en) Storage and retrieval of crytographically-split data blocks to/from multiple storage devices
US8386798B2 (en) Block-level data storage using an outstanding write list
US8719594B2 (en) Storage availability using cryptographic splitting
US7149858B1 (en) Synchronous replication for system and data security
EP2201461B1 (en) Block based access to a dispersed data storage network
AU2016203740B2 (en) Simultaneous state-based cryptographic splitting in a secure storage appliance
US20100125730A1 (en) Block-level data storage security system
US10007807B2 (en) Simultaneous state-based cryptographic splitting in a secure storage appliance
US8347184B2 (en) Cloud storage data access method, apparatus and system
US20100162002A1 (en) Virtual tape backup arrangement using cryptographically split storage
CN102667727B (en) For realizing the N road parity technique from nearly N number of memory device failure recovery
US9384149B2 (en) Block-level data storage security system
US20100162032A1 (en) Storage availability using cryptographic splitting
US8135980B2 (en) Storage availability using cryptographic splitting
US20100162004A1 (en) Storage of cryptographically-split data blocks at geographically-separated locations
US20100162003A1 (en) Retrieval of cryptographically-split data blocks from fastest-responding storage devices
US20100162001A1 (en) Secure network attached storage device using cryptographic settings
US20100153740A1 (en) Data recovery using error strip identifiers
US20140108796A1 (en) Storage of cryptographically-split data blocks at geographically-separated locations
US20100169662A1 (en) Simultaneous state-based cryptographic splitting in a secure storage appliance
CN201994961U (en) Dispersion-oriented cloud-storage security architecture
Uehara Security framework in a virtual large-scale disk system
AU2016203806A1 (en) Data recovery using error strip identifiers
Raj et al. Review of Data Recovery of Different Sectors

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110928

Termination date: 20130201