CN107832621A - The weighing computation method of Behavior trustworthiness evidence based on AHP - Google Patents
The weighing computation method of Behavior trustworthiness evidence based on AHP Download PDFInfo
- Publication number
- CN107832621A CN107832621A CN201711136107.9A CN201711136107A CN107832621A CN 107832621 A CN107832621 A CN 107832621A CN 201711136107 A CN201711136107 A CN 201711136107A CN 107832621 A CN107832621 A CN 107832621A
- Authority
- CN
- China
- Prior art keywords
- information security
- current information
- security environment
- weighing computation
- computation method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of weighing computation method of the Behavior trustworthiness evidence based on AHP, according to the grade of current information security environment, from suitable weighing computation method, in the case where meeting actual demand, speed up processing as far as possible, the computational space taken is reduced, preferably builds the networks congestion control characteristic model based on AHP.
Description
Technical field
The present invention relates to IDC/ISP information security fields, more particularly to the weight calculation of the Behavior trustworthiness evidence based on AHP
Method.
Background technology
Develop fast traffic lane with broadband is entered in China Internet, it is vulgar while network is brought convenience to people's lives
Increasingly spread unchecked with flame, society and the public are negatively affected.Networks and information security problem seems more and more prominent,
Event of network breaking laws and commit crime increases, and runs counter to the theme built a Harmonious Society, and strengthens monitoring to internet information, and gesture is must
OK.Centers of the IDC as internet information spreading, it dominates the acquisition of internet information and propagation, and interested regulatory authorities are compeled
Cut and want to set up Internet surveillance information base data storehouse, statistical analysis is carried out to violation information, there is provided efficient internet letter
Breath monitoring is with managing the technological means such as control, and under this demand, IDC/ISP suppliers start active construction IDC/ISP information
Safety management system.
In actual monitoring audit process, objective objects that safety management system faces are multi-user (natural person) to more industry
The various operation behaviors of business system, it, which exists, combines the features such as various, flow is complicated.Will be to so complicated and diversified user behavior
Carry out feature extraction and simultaneously establish one-to-one fingerprint base, the problems such as be difficult to extract, model is difficult to set up be present.
Analytic hierarchy process (AHP) (Analytia1 Hierarchy Process, abbreviation AHP) is Univ. of Pittsburgh professor
A kind of systematic analytic method that A.L.Saaty proposes the 1970s.AHP is that one kind can be by qualitative analysis and quantitative point
The systematic analytic method that phase separation combines.AHP be analyze multiple target, multiple criteria complex large system powerful.It, which has, thinks
The features such as road is clear, method is easy, widely applicable, systemic strong, is most appropriate to solve those to be difficult to quantitative approach be entered completely
The decision problem of row analysis, is easy to popularize, and can turn into people and work and pondered a problem in living, solve one kind side of problem
Method.
AHP algorithms can solve to be difficult to the problems such as extract, model is difficult to set up in the application that actual monitoring is audited, but such as
What, which combines to be actually needed, is better achieved AHP algorithms, is still a problem for needing to solve.
The content of the invention
In order to solve the above problems, the present invention proposes a kind of weighing computation method of the Behavior trustworthiness evidence based on AHP, its
It is characterised by, the weighing computation method is used to build the networks congestion control characteristic model based on AHP, builds based on AHP's
Networks congestion control characteristic model includes Judgement Matricies, Mode of Level Simple Sequence and total hierarchial sorting, the weighing computation method
Behavior trustworthiness evidence is provided using database mining technology, and evaluates the grade of current information security environment, is worked as based on described
The grade of preceding information security environment, the choosing of weighing computation method is carried out in the Mode of Level Simple Sequence and the total hierarchial sorting
Select.
Further, it is described to provide Behavior trustworthiness evidence using database mining technology, and evaluate current information security
The grade of environment specifically includes the internet content progress data mining analysis for a large number of users, for flame or improper visit
Ask and detected, detected for much information carrier, the auxiliary information with reference to caused by user's operation, database mining technology
The current information security issue mainly faced can be analyzed, obtained conclusion will be analyzed as important level highest behavior letter
Appoint evidence, and evaluate the grade of current information security environment.
Further, the flame or improper access include porns, gambling and drugs relevant information, sham publicity, rubbish harassing and wrecking letter
Breath, reaction publicity and violation Operational Visit record, the much information carrier includes word, picture, video and Streaming Media, described
Auxiliary information caused by user's operation includes service code, business code, reference address, access time and Subscriber Number.
Further, the grade of described information security context includes very good, good, normal, serious and very serious.
Further, the grade based on the current information security environment, in the Mode of Level Simple Sequence and the layer
The selection that weighing computation method is carried out in secondary total sequence specifically includes:
If the rating of current information security environment is very good, used in Mode of Level Simple Sequence and total hierarchial sorting
Specification column average method calculates characteristic vector;
If the rating of current information security environment is good or normal, selected in Mode of Level Simple Sequence and total hierarchial sorting
Select code requirement column average method or geometric average method calculates characteristic vector;
If the rating of current information security environment is serious, geometric average method meter can only be selected in Mode of Level Simple Sequence
Characteristic vector is calculated, selects code requirement column average method or geometric average method to calculate characteristic vector in total hierarchial sorting;
If the rating of current information security environment is very serious, selected in Mode of Level Simple Sequence and total hierarchial sorting
Select and characteristic vector is calculated using geometric average method.
Embodiment
In order to which technical characteristic, purpose and the effect of the present invention is more clearly understood, now to the specific reality of the present invention
The mode of applying is specifically described.
Using AHP solve problem thinking be:First, it is to be solved the problem of layered serial, i.e., according to the property of problem
Matter and the target to be reached, are different compositing factors by PROBLEM DECOMPOSITION, according to influencing each other between factor and membership
Its hierarchical cluster is combined, one is formed and passs rank, orderly hierarchy Model;Then, to each level factor in model
Relative importance, give quantificational expression to extension judgement according to people, then mathematically determine that each level is complete
The weights of portion's factor relative importance order;Finally, by the weights of each layer factor relative importance of COMPREHENSIVE CALCULATING, obtain minimum
Layer (solution layer) in this, as evaluation and selects relative to the Combining weights of the relative importance order of top (general objective)
The foundation of decision scheme.
According to the guidance of above-mentioned thinking, build the networks congestion control characteristic model based on AHP and mainly include the following steps that:
1) hierarchy Model is established
After the problem of studying is analysed in depth, the factor included in problem is divided into different levels and (such as forbidden
Behavior, abnormal behaviour, non-fulfilling behavior etc.), and draw hierarchical chart expression hierarchical structure and adjacent two layers factor from
Category relation.
2) Judgement Matricies
The value of matrix element represents policymaker to understanding of each factor on the relative importance of target.At adjacent two
In level, high-level is target, and low level is factor.Policymaker does ratio with tournament method to the significance level of multiple evidences
Compared with.
3) Mode of Level Simple Sequence and consistency check
The characteristic vector W of judgment matrix is the weight order value of the relative importance of each factor after normalization.Root
Corresponding consistency check is carried out according to concrete condition.
4) total hierarchial sorting and consistency check
The weight order value that each factor of a certain level is calculated with respect to the relative importance of all factors of last layer time is referred to as layer
Secondary total sequence.Because total hierarchial sorting process is to be carried out from top to lowermost layer, and top is general objective, so, layer
Secondary total sequence is also to calculate relative importance sequencing weight of each factor with respect to your lip-syncing high-rise (general objective).As the case may be
Carry out corresponding consistency check.
It can see from the step of AHP solution problems, the root problem that analytic hierarchy process (AHP) calculates is to ask judgment matrix corresponding
Characteristic vector, i.e., the weight order value of the relative importance of each factor.
The method of calculating weighted value is in the present embodiment:
(1) judgment matrix constructed using database mining technology for policymaker is adjusted.For a large number of users
Internet content carries out data mining analysis, is detected for flame or improper access, such as porns, gambling and drugs relevant information, void
False advertisement, rubbish harassing and wrecking information, reaction publicity, violation Operational Visit record etc., the information carrier detected includes word, figure
Piece, video, Streaming Media etc., with reference to auxiliary informations such as service code, business code, reference address, access time, Subscriber Numbers,
Database mining technology can analyze the current main information safety problem mainly faced.The conclusion obtained analyzing is as weight
Want grade highest Behavior trustworthiness evidence to submit to policymaker, be easy to policymaker to optimize and revise judgment matrix, at the same time, be based on
Current information security environment is assessed as very good, good, normal, serious or very serious by the conclusion that analysis obtains.
(2) calculating of characteristic vector can select geometric average method, and this method calculates space money that is accurate, but needing more
Source, calculating speed is slower, or specification column average method, this method carry out approximate calculation, it is necessary to space resources it is less, calculating speed
Faster.According to the rating of current information security environment, specific algorithms selection is carried out, selection rule is as follows:
If the rating of current information security environment is very good, it is contemplated that now safety coefficient is very high, calculation error
Policymaker will not be caused to ignore more serious safety problem, can simplify calculating, speed up processing, in Mode of Level Simple Sequence and
Equal code requirement column average method calculates characteristic vector in total hierarchial sorting;
If the rating of current information security environment is good or normal, it is contemplated that now safety coefficient is in general water
Flat, calculation error may cause policymaker to ignore more serious safety problem, but this possibility is relatively small, and policymaker can
To consider according to the risk of itself, code requirement column average method or geometric average are selected in Mode of Level Simple Sequence and total hierarchial sorting
Method calculates characteristic vector;
If the rating of current information security environment is serious, it is contemplated that now safety coefficient is in less optimistic water
Flat, calculation error may cause policymaker to ignore serious safety problem, and this possibility is relatively large, single in level
Geometric average method can only be selected to calculate characteristic vector in sequence, itself can be considered according to policymaker in total hierarchial sorting, choosing
Select code requirement column average method or geometric average method calculates characteristic vector;
If the rating of current information security environment is very serious, it is contemplated that now safety coefficient is in very severe
Level, calculation error is likely to result in policymaker and ignores more serious safety problem, total in Mode of Level Simple Sequence and level
Selection calculates characteristic vector using geometric average method in sequence.
If judgment matrix is the positive reciprocal matrix A=(α of n ranksij)n×n, then maximal eigenvector is sought with specification column average method
It is as follows with the method for characteristic root:
Row specification is pressed to A
Judgment matrix after standardization is added by row
To vectorStandardization
Then W=(w1,w2,...,wn)TThe as approximation of maximal eigenvector.
Judgment matrix is that policymaker compares to obtain with tournament method to the significance level of multiple evidences, when user's row
When more for the evidence of trust, it may occur that judge inconsistent situation.Because judgment matrix is provided according to expertise
Subjective judgement, so inconsistency can hardly be avoided, consistency check is exactly to judge the method for inconsistent degree.
The relevant coherency index that AHP algorithms provide is as follows:
Coincident indicator is defined asWherein λmaxFor the Maximum characteristic root of maximal eigenvector.When complete
When consistent, CI=0.When inconsistent, general CIBigger, uniformity is also poorer, so introducing Aver-age Random Consistency Index RI
With random index rate
Average homogeneity index RI:For specific n, the positive and negative matrix A of random configuration n ranks, wherein αijIt is from 1,2 ...,
Randomly selected in 9,1/2,1/3 ..., 1/9, the A so obtained is probably inconsistent.Take fully big increment (such as 1000
Sample), obtain the average value of A Maximum characteristic root.Define Aver-age Random Consistency IndexRIIntroducing exist
Consistency check index C is overcome to a certain extentIThe drawbacks of increasing with matrix exponent number and significantly increasing.
When carrying out the consistency check of total hierarchial sorting, CrComputational methods it is otherwise varied, it is assumed that B level a number of factors
For a certain factor Aj of last layer time single sequence consistency check index CI, corresponding random index is RI, then B layers
The secondary random Consistency Ratio that always sorts is
In view of passing through random index rate CrCheck consistency is relatively harsh, it is necessary to could expire by repeatedly adjustment
Foot requires, and by level of significance α check consistency relative loose, can meet the requirement under particular case, in this programme
By random index rate CrIt is combined with level of significance α, realizes the flexible judgement of uniformity, specific judgment rule is such as
Under:
If the rating of current information security environment is very good, it is contemplated that now safety coefficient is very high, does not meet one
The defects of cause property is brought will not cause policymaker to ignore more serious safety problem, can be with processing procedure, speed up processing,
Consistency check is abandoned after Mode of Level Simple Sequence and after total hierarchial sorting;
If the rating of current information security environment is good or normal, it is contemplated that now safety coefficient is in general water
Flat, not meeting the defects of uniformity is brought may cause policymaker to ignore more serious safety problem, but this possibility phase
To smaller, policymaker can consider according to the risk of itself, can be selected after Mode of Level Simple Sequence and after total hierarchial sorting
Using coincident indicator rate CrCarry out consistency check or using coincident indicator rate CrCarry out one is combined with level of significance α
Cause property is examined;
If the rating of current information security environment is serious, it is contemplated that now safety coefficient is in less optimistic water
Flat, not meeting the defects of uniformity is brought may cause policymaker to ignore serious safety problem, and this possibility is relative
It is larger, coincident indicator rate C can only be used after Mode of Level Simple SequencerConsistency check is carried out, can after total hierarchial sorting
With itself considering according to policymaker, selection uses coincident indicator rate CrCarry out consistency check or use coincident indicator rate
CrCarry out consistency check is combined with level of significance α;
If the rating of current information security environment is very serious, it is contemplated that now safety coefficient is in very severe
Level, calculation error is likely to result in policymaker and ignores more serious safety problem, total in Mode of Level Simple Sequence and level
Selection uses coincident indicator rate C after sequencerCarry out consistency check.
It is so-called to use coincident indicator rate CrIt is when carrying out consistency checking, if correction value C to carry out consistency checkr<
0.1, then it is assumed that inconsistency can be received, if Cr>=0.1, it is believed that inconsistent to receive, it is necessary to change judgment matrix.
It is so-called to use coincident indicator rate CrIt is to carry out uniformity to be combined with level of significance α and carry out consistency check
During judgement, if correction value Cr<0.1, then it is assumed that inconsistency can be received, if Cr>=0.1, continue conspicuousness water
Flat α is examined, if α<0.1, then it is assumed that inconsistency can be received, if α >=0.1, now CrIt is all higher than being equal to 0.1 with α, then recognizes
It can not receive, it is necessary to change judgment matrix to be inconsistent.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with
The hardware of correlation is instructed to complete by computer program, described program can be stored in computer read/write memory medium
In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic
Dish, CD, ROM, RAM etc..
Above disclosure is only preferred embodiment of present invention, can not limit the right model of the present invention with this certainly
Enclose, therefore the equivalent variations made according to the claims in the present invention, still belong to the scope that the present invention is covered.
Claims (5)
1. a kind of weighing computation method of the Behavior trustworthiness evidence based on AHP, it is characterised in that the weighing computation method is used for
The networks congestion control characteristic model based on AHP is built, the networks congestion control characteristic model based on AHP is built and sentences including construction
Disconnected matrix, Mode of Level Simple Sequence and total hierarchial sorting, the weighing computation method provide Behavior trustworthiness using database mining technology
Evidence, and the grade of current information security environment is evaluated, based on the grade of the current information security environment, in the level
The selection of weighing computation method is carried out in single sequence and the total hierarchial sorting.
2. weighing computation method according to claim 1, it is characterised in that described to provide row using database mining technology
To trust evidence, and the internet content that the grade for evaluating current information security environment is specifically included for a large number of users enters line number
According to mining analysis, detect for flame or improper access, detected for much information carrier, grasped with reference to user
Auxiliary information caused by work, database mining technology can analyze the current information security issue mainly faced, will analyze
The conclusion arrived evaluates the grade of current information security environment as important level highest Behavior trustworthiness evidence.
3. weighing computation method according to claim 2, it is characterised in that the flame or improper access include Huang
Malicious relevant information, sham publicity, rubbish harassing and wrecking information, reaction publicity and violation Operational Visit record, the much information is gambled to carry
Body includes word, picture, video and Streaming Media, auxiliary information caused by user's operation include service code, business code,
Reference address, access time and Subscriber Number.
4. weighing computation method according to claim 2, it is characterised in that the grade of described information security context includes non-
It is Chang Hao, good, normal, serious and very serious.
5. weighing computation method according to claim 4, it is characterised in that described to be based on the current information security environment
Grade, in the Mode of Level Simple Sequence and the total hierarchial sorting carry out weighing computation method selection specifically include:
If the rating of current information security environment is very good, the equal code requirement in Mode of Level Simple Sequence and total hierarchial sorting
Column average method calculates characteristic vector;
If the rating of current information security environment is good or normal, select to adopt in Mode of Level Simple Sequence and total hierarchial sorting
Characteristic vector is calculated with specification column average method or geometric average method;
If the rating of current information security environment is serious, geometric average method can only be selected to calculate in Mode of Level Simple Sequence special
Sign vector, code requirement column average method or geometric average method is selected to calculate characteristic vector in total hierarchial sorting;
If the rating of current information security environment is very serious, selection is adopted in Mode of Level Simple Sequence and total hierarchial sorting
Characteristic vector is calculated with geometric average method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711136107.9A CN107832621B (en) | 2017-11-16 | 2017-11-16 | AHP-based weight calculation method for behavior trust evidence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711136107.9A CN107832621B (en) | 2017-11-16 | 2017-11-16 | AHP-based weight calculation method for behavior trust evidence |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107832621A true CN107832621A (en) | 2018-03-23 |
CN107832621B CN107832621B (en) | 2021-01-05 |
Family
ID=61651892
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711136107.9A Expired - Fee Related CN107832621B (en) | 2017-11-16 | 2017-11-16 | AHP-based weight calculation method for behavior trust evidence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107832621B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111654855A (en) * | 2020-06-04 | 2020-09-11 | 河海大学常州校区 | Authority updating method in underwater wireless sensor network based on AHP |
CN111859377A (en) * | 2020-07-27 | 2020-10-30 | 成都安恒信息技术有限公司 | In-business safety auditing method based on user behavior analysis |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103268450A (en) * | 2013-06-06 | 2013-08-28 | 成都浩博依科技有限公司 | Mobile intelligent terminal system safety evaluation system model and method based on test |
CN104243478A (en) * | 2014-09-19 | 2014-12-24 | 中国联合网络通信集团有限公司 | Safety protection capability assessment method and equipment of network equipment |
CN106850613A (en) * | 2017-01-24 | 2017-06-13 | 中国科学院信息工程研究所 | A kind of user behavior method for evaluating trust and system based on advanced AHP |
US20170279692A1 (en) * | 2016-03-24 | 2017-09-28 | Ca, Inc. | Deploying a service from a selected cloud service provider based on an evaluation of migration ability using graph analytics |
CN107231345A (en) * | 2017-05-03 | 2017-10-03 | 成都国腾实业集团有限公司 | Networks congestion control methods of risk assessment based on AHP |
-
2017
- 2017-11-16 CN CN201711136107.9A patent/CN107832621B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103268450A (en) * | 2013-06-06 | 2013-08-28 | 成都浩博依科技有限公司 | Mobile intelligent terminal system safety evaluation system model and method based on test |
CN104243478A (en) * | 2014-09-19 | 2014-12-24 | 中国联合网络通信集团有限公司 | Safety protection capability assessment method and equipment of network equipment |
US20170279692A1 (en) * | 2016-03-24 | 2017-09-28 | Ca, Inc. | Deploying a service from a selected cloud service provider based on an evaluation of migration ability using graph analytics |
CN106850613A (en) * | 2017-01-24 | 2017-06-13 | 中国科学院信息工程研究所 | A kind of user behavior method for evaluating trust and system based on advanced AHP |
CN107231345A (en) * | 2017-05-03 | 2017-10-03 | 成都国腾实业集团有限公司 | Networks congestion control methods of risk assessment based on AHP |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111654855A (en) * | 2020-06-04 | 2020-09-11 | 河海大学常州校区 | Authority updating method in underwater wireless sensor network based on AHP |
CN111859377A (en) * | 2020-07-27 | 2020-10-30 | 成都安恒信息技术有限公司 | In-business safety auditing method based on user behavior analysis |
Also Published As
Publication number | Publication date |
---|---|
CN107832621B (en) | 2021-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zargari et al. | Feature Selection in the Corrected KDD-dataset | |
CN111292008A (en) | Privacy protection data release risk assessment method based on knowledge graph | |
CN103796183B (en) | A kind of refuse messages recognition methods and device | |
CN114124460B (en) | Industrial control system intrusion detection method and device, computer equipment and storage medium | |
CN110909195A (en) | Picture labeling method and device based on block chain, storage medium and server | |
CN109634820A (en) | A kind of fault early warning method, relevant device and the system of the collaboration of cloud mobile terminal | |
CN107832621A (en) | The weighing computation method of Behavior trustworthiness evidence based on AHP | |
CN115630221A (en) | Terminal application interface display data processing method and device and computer equipment | |
CN111491300A (en) | Risk detection method, device, equipment and storage medium | |
Bleka et al. | Database extraction strategies for low-template evidence | |
CN111683107A (en) | Internet-oriented security audit method and system | |
CN107992754A (en) | The consistency check method of Behavior trustworthiness evidence weight based on AHP | |
CN109190997A (en) | The hierarchical parsing of Chinese address and specification handles method and system | |
Tsai et al. | Simulation optimization in security screening systems subject to budget and waiting time constraints | |
CN115310091A (en) | Target security level identification method and device based on fusion model and electronic equipment | |
CN111625720B (en) | Method, device, equipment and medium for determining execution strategy of data decision item | |
CN105893397A (en) | Video recommendation method and apparatus | |
CN107463845A (en) | A kind of detection method, system and the computer-processing equipment of SQL injection attack | |
CN113672703A (en) | User information updating method, device, equipment and storage medium | |
CN112529319A (en) | Grading method and device based on multi-dimensional features, computer equipment and storage medium | |
CN111737319A (en) | User cluster prediction method and device, computer equipment and storage medium | |
CN110033031A (en) | Group's detection method, calculates equipment and machine readable storage medium at device | |
TWI798719B (en) | Violation detection system, violation detection method and program product | |
CN110738165A (en) | Dormitory clustering management method and system under Gaussian mixture models | |
Chen | Data transmission security in computer network communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210105 Termination date: 20211116 |