CN104618092A - Information encryption method and system - Google Patents
Information encryption method and system Download PDFInfo
- Publication number
- CN104618092A CN104618092A CN201510003877.0A CN201510003877A CN104618092A CN 104618092 A CN104618092 A CN 104618092A CN 201510003877 A CN201510003877 A CN 201510003877A CN 104618092 A CN104618092 A CN 104618092A
- Authority
- CN
- China
- Prior art keywords
- output valve
- module
- value
- score value
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 230000008569 process Effects 0.000 claims description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000015556 catabolic process Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000006731 degradation reaction Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
本发明提供一种信息加密方法及系统,上述方法包括以下步骤:根据密钥生成器生成的子密钥及右部分值,通过预设函数进行运算后,获得第一输出值;将所述第一输出值与左部分值进行异或运算,获得第二输出值;将所述右部分值替换左部分值,将所述第二输出值替换右部分值,重复上述步骤,直至预设循环次数,获得左部分目标值及右部分目标值;组合左部分目标值及右部分目标值,输出目标密文;其中,预先将明文划分为位数相等的左右两部分;本发明采用不同明文生成不同密钥的方法,来实现真实密钥的不可预测性,大大提高了其加密算法的安全性,同时,在性能方面也不会有太多的降低。
The present invention provides an information encryption method and system. The above method includes the following steps: according to the subkey and the right part value generated by the key generator, the first output value is obtained after operation through a preset function; the first output value is obtained by the second An XOR operation is performed between an output value and the left part value to obtain a second output value; the right part value is replaced by the left part value, the second output value is replaced by the right part value, and the above steps are repeated until the preset number of cycles , to obtain the target value of the left part and the target value of the right part; combine the target value of the left part and the target value of the right part, and output the target ciphertext; wherein, the plaintext is divided into left and right parts with equal digits in advance; the present invention uses different plaintexts to generate different The key method is used to realize the unpredictability of the real key, which greatly improves the security of its encryption algorithm, and at the same time, there will not be too much reduction in performance.
Description
技术领域technical field
本发明属于通信安全领域,尤其涉及一种信息加密方法及系统。The invention belongs to the field of communication security, in particular to an information encryption method and system.
背景技术Background technique
DES加密算法是应计算机科学技术的快速发展而生成的产物,而在计算能力卓越的今天,DES算法的加密强度已经不符合我们的要求,容易受到穷举攻击的破解,在历史上,DES算法被破解的案例也屡见不鲜,在现代社会中也出现了很多替代DES算法的产物,除了选择DES的替代物之外,还可以选择改进该算法,以加强它的加密强度,使得不那么容易被破解。The DES encryption algorithm is a product generated in response to the rapid development of computer science and technology. Today, with excellent computing power, the encryption strength of the DES algorithm does not meet our requirements, and it is easily cracked by exhaustive attacks. In history, the DES algorithm The cases of being cracked are not uncommon. In modern society, there are many products that replace the DES algorithm. In addition to choosing a substitute for DES, you can also choose to improve the algorithm to strengthen its encryption strength and make it less easy to be cracked. .
原有加密算法的局限性:Limitations of the original encryption algorithm:
在DES加密算法中,只要原始密钥不变,则每一轮所产生的轮密钥也会是一样的,这样就给攻击者带了一个很大的安全漏洞,可以通过明文攻击方法,轻松地获取到加密密钥。In the DES encryption algorithm, as long as the original key remains unchanged, the round key generated in each round will also be the same, which brings a big security hole to the attacker, and the plaintext attack method can be used to easily to obtain the encryption key.
现有的DES算法改进:Improvements to the existing DES algorithm:
1、一重DES加密可以很轻易地被破解,那么就多加几重加密,比如现在常用的三重DES加密算法,虽然较好地抵制了明文方法的攻击,但是却付出了运算的代码,其加密难度相比起普通的DES加密算法来说,将增加n-1倍(n为n重加密算法,比如3重加密算法将比普通DES加密算法增加2倍的难度)。1. One-layer DES encryption can be easily cracked, so add several more layers of encryption, such as the commonly used triple-DES encryption algorithm, although it can better resist the attack of the plaintext method, but it pays for the calculation code, and its encryption difficulty Compared with the ordinary DES encryption algorithm, it will increase by n-1 times (n is the n-fold encryption algorithm, for example, the 3-fold encryption algorithm will increase the difficulty by 2 times compared with the ordinary DES encryption algorithm).
2、改变每轮变换时所使用的子密钥,让子密钥的生成不仅仅与初始密钥有关,还与明文有关。其实现是在普通DES算法的基础上,在生成子密钥的那一步,改变子密钥生成函数,将原来生成的子密钥与上一轮生成的明文进行相关操作,使子密钥变得不可预测,这样将有效地抵制明文攻击方法,将猜密钥的方法变得没有可能,其缺点也是显而易见的,由于每一次的轮变换都将重新生成一个子密钥,其运算复杂度也是会有所增加的。2. Change the subkey used in each round of transformation, so that the generation of the subkey is not only related to the initial key, but also related to the plaintext. Its implementation is based on the ordinary DES algorithm, at the step of generating the subkey, change the subkey generation function, and perform correlation operations between the original generated subkey and the plaintext generated in the previous round, so that the subkey becomes Unpredictable, this will effectively resist the plaintext attack method, and the method of guessing the key becomes impossible. Its disadvantages are also obvious. Since each round transformation will regenerate a subkey, its computational complexity will increase.
发明内容Contents of the invention
本发明提供一种信息加密方法及系统,以解决上述问题。The present invention provides an information encryption method and system to solve the above problems.
本发明提供一种信息加密方法,上述方法包括以下步骤:The present invention provides a kind of information encryption method, and above-mentioned method comprises the following steps:
根据密钥生成器生成的子密钥及右部分值,通过预设函数进行运算后,获得第一输出值;According to the sub-key and the right part value generated by the key generator, the first output value is obtained after the operation is performed through the preset function;
将所述第一输出值与左部分值进行异或运算,获得第二输出值;performing an XOR operation on the first output value and the left partial value to obtain a second output value;
将所述右部分值替换左部分值,将所述第二输出值替换右部分值,重复上述步骤,直至预设循环次数,获得左部分目标值及右部分目标值;replacing the left partial value with the right partial value, replacing the right partial value with the second output value, and repeating the above steps until the preset number of cycles to obtain the left partial target value and the right partial target value;
组合左部分目标值及右部分目标值,输出目标密文;其中,预先将明文划分为位数相等的左右两部分。Combining the target value of the left part and the target value of the right part, the target ciphertext is output; wherein, the plaintext is divided into two parts with the same number of digits in advance.
本发明还提供一种信息加密系统,包括划分模块、第一输出值模块、第二输出值模块、目标部分获取模块、目标密文输出模块;The present invention also provides an information encryption system, including a division module, a first output value module, a second output value module, a target part acquisition module, and a target ciphertext output module;
其中,所述划分模块通过所述第一输出值模块与所述第二输出值模块相连;所述第一输出值模块通过所述第二输出值模块与所述目标部分获取模块相连;所述第二输出值模块通过所述目标部分获取模块与所述目标密文输出模块相连;所述划分模块还与所述目标部分获取模块相连;Wherein, the division module is connected to the second output value module through the first output value module; the first output value module is connected to the target part acquisition module through the second output value module; The second output value module is connected to the target ciphertext output module through the target part acquisition module; the division module is also connected to the target part acquisition module;
所述划分模块,用于预先将明文划分为位数相等的左右两部分并将划分结果通知所述第一输出值模块、所述目标部分获取模块The division module is used to divide the plaintext into left and right parts with equal number of digits in advance and notify the first output value module and the target part acquisition module of the division result
所述第一输出值模块,用于根据密钥生成器生成的子密钥及右部分值,通过预设函数进行运算后,获得第一输出值并将所述第一输出值发送至所述第二输出值模块;The first output value module is configured to obtain a first output value after performing operations through a preset function according to the subkey and the right part value generated by the key generator, and send the first output value to the the second output value module;
所述第二输出值模块,用于将所述第一输出值与左部分值进行异或运算,获得第二输出值;The second output value module is configured to perform an XOR operation on the first output value and the left partial value to obtain a second output value;
所述目标部分获取模块,用于将所述右部分值替换左部分值,将所述第二输出值替换右部分值,重复上述步骤,直至预设循环次数,获得左部分目标值及右部分目标值并将所述左部分目标值及右部分目标值发送至所述目标密文输出模块;The target part acquisition module is used to replace the right part value with the left part value, replace the second output value with the right part value, repeat the above steps until the preset number of cycles, and obtain the left part target value and the right part target value and send the left part target value and the right part target value to the target ciphertext output module;
所述目标密文输出模块,用于组合左部分目标值及右部分目标值,输出目标密文。The target ciphertext output module is used to combine the left part of the target value and the right part of the target value to output the target ciphertext.
相较于之前技术,本发明提供的一种信息加密方法及系统,采用不同明文生成不同密钥的方法,来实现真实密钥的不可预测性,大大提高了其加密算法的安全性,同时,在性能方面也不会有太多的降低。Compared with the previous technology, the information encryption method and system provided by the present invention adopts the method of generating different keys from different plaintexts to realize the unpredictability of the real key, which greatly improves the security of the encryption algorithm. At the same time, In terms of performance, there will not be much degradation.
附图说明Description of drawings
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The accompanying drawings described here are used to provide a further understanding of the present invention and constitute a part of the application. The schematic embodiments of the present invention and their descriptions are used to explain the present invention and do not constitute improper limitations to the present invention. In the attached picture:
图1所示为本发明实施例1的信息加密方法流程图;Fig. 1 shows the flow chart of the information encryption method of Embodiment 1 of the present invention;
图2所示为本发明实施例2的信息加密方法流程图;Fig. 2 shows the flow chart of the information encryption method of Embodiment 2 of the present invention;
图3所示为本发明实施例3的信息加密系统结构图。FIG. 3 is a structural diagram of an information encryption system according to Embodiment 3 of the present invention.
具体实施方式Detailed ways
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.
DES加密算法是由IBM开发的一种对称加密算法,是一个16轮的Feis tel型结构密码,它的分组长度为64bi ts,密钥长度也为64bi ts,实用56bi ts,其中有8位作为奇偶校验。The DES encryption algorithm is a symmetric encryption algorithm developed by IBM. It is a 16-round Feis tel structure cipher. Its block length is 64bits, and the key length is also 64bits. parity.
图1所示为本发明实施例1的信息加密方法流程图,包括以下步骤:Fig. 1 shows the flow chart of the information encryption method of embodiment 1 of the present invention, comprises the following steps:
步骤101:预先将明文划分为位数相等的左右两部分;Step 101: pre-dividing the plaintext into left and right parts with equal number of digits;
步骤102:根据密钥生成器生成的子密钥及右部分值,通过预设函数进行运算后,获得第一输出值;Step 102: According to the sub-key and the right partial value generated by the key generator, the first output value is obtained after operation through the preset function;
步骤103:将所述第一输出值与左部分值进行异或运算,获得第二输出值;Step 103: performing XOR operation on the first output value and the left partial value to obtain a second output value;
步骤104:将所述右部分值替换左部分值,将所述第二输出值替换右部分值,重复上述步:202-204,直至预设循环次数,获得左部分目标值及右部分目标值;Step 104: replace the left part value with the right part value, replace the right part value with the second output value, repeat the above steps: 202-204, until the preset number of cycles, and obtain the left part target value and the right part target value ;
步骤105:组合左部分目标值及右部分目标值,输出目标密文。Step 105: Combine the left part of the target value and the right part of the target value, and output the target ciphertext.
图2所示为本发明实施例2的信息加密方法流程图,包括以下步骤:Fig. 2 shows the flow chart of the information encryption method of embodiment 2 of the present invention, comprises the following steps:
步骤201:将明文划分为左右两部分,左部分值为L0,右部分值为R0,其中,L0位数和R0位数相同。Step 201: Divide the plaintext into left and right parts, the value of the left part is L0, and the value of the right part is R0, wherein the number of digits in L0 is the same as that in R0.
例如:将明文的64bi ts划分为左右两部分,分别为L0和R0,其中,L0位数和R0位数均为32bi ts。For example: Divide the 64bits of the plaintext into left and right parts, L0 and R0 respectively, where the number of digits in L0 and R0 are both 32bits.
这样是为了打乱明文组的排序,相当于是一个初始的简单加密过程。This is to disrupt the ordering of plaintext groups, which is equivalent to an initial simple encryption process.
步骤202:将所述R0与密钥生成器生成的子密钥k1进行f函数运算后,获得f(R0,k1);Step 202: After performing the f function operation on the R0 and the subkey k1 generated by the key generator, f(R0, k1) is obtained;
步骤203:将所述f(R0,k1)与所述L0进行异或运算,获得 Step 203: XOR operation is performed on the f(R0, k1) and the L0 to obtain
步骤204:将所述R0记为L1替换左部分值,同时把记为R1替换右部分值,从而完成第一轮迭代运算;Step 204: Record the R0 as L1 to replace the left partial value, and at the same time write Record it as R1 to replace the right partial value, thus completing the first round of iterative operation;
步骤205:重复步骤102-105,直至循环16次,获得左部分目标值R16、右部分目标值L16;Step 205: Repeat steps 102-105 until the cycle is repeated 16 times to obtain the target value of the left part R16 and the target value of the right part L16;
步骤206:将获得的R16、L16分组结合并进行排序加密,输出目标密文。Step 206: Combining the obtained R16 and L16 packets, sorting and encrypting them, and outputting the target ciphertext.
图3所示为本发明实施例3的信息加密系统结构图,包括划分模块、第一输出值模块、第二输出值模块、目标部分获取模块、目标密文输出模块;Fig. 3 shows the structure diagram of the information encryption system according to Embodiment 3 of the present invention, including a division module, a first output value module, a second output value module, a target part acquisition module, and a target ciphertext output module;
其中,所述划分模块通过所述第一输出值模块与所述第二输出值模块相连;所述第一输出值模块通过所述第二输出值模块与所述目标部分获取模块相连;所述第二输出值模块通过所述目标部分获取模块与所述目标密文输出模块相连;所述划分模块还与所述目标部分获取模块相连;Wherein, the division module is connected to the second output value module through the first output value module; the first output value module is connected to the target part acquisition module through the second output value module; The second output value module is connected to the target ciphertext output module through the target part acquisition module; the division module is also connected to the target part acquisition module;
所述划分模块,用于预先将明文划分为位数相等的左右两部分并将划分结果通知所述第一输出值模块、所述目标部分获取模块The division module is used to divide the plaintext into left and right parts with equal number of digits in advance and notify the first output value module and the target part acquisition module of the division result
所述第一输出值模块,用于根据密钥生成器生成的子密钥及右部分值,通过预设函数进行运算后,获得第一输出值并将所述第一输出值发送至所述第二输出值模块;The first output value module is configured to obtain a first output value after performing operations through a preset function according to the subkey and the right part value generated by the key generator, and send the first output value to the the second output value module;
所述第二输出值模块,用于将所述第一输出值与左部分值进行异或运算,获得第二输出值;The second output value module is configured to perform an XOR operation on the first output value and the left partial value to obtain a second output value;
所述目标部分获取模块,用于将所述右部分值替换左部分值,将所述第二输出值替换右部分值,重复上述步骤,直至预设循环次数,获得左部分目标值及右部分目标值并将所述左部分目标值及右部分目标值发送至所述目标密文输出模块;The target part acquisition module is used to replace the right part value with the left part value, replace the second output value with the right part value, repeat the above steps until the preset number of cycles, and obtain the left part target value and the right part target value and send the left part target value and the right part target value to the target ciphertext output module;
所述目标密文输出模块,用于组合左部分目标值及右部分目标值,输出目标密文。The target ciphertext output module is used to combine the left part of the target value and the right part of the target value to output the target ciphertext.
相较于之前技术,本发明提供的一种信息加密方法及系统,采用不同明文生成不同密钥的方法,来实现真实密钥的不可预测性,大大提高了其加密算法的安全性,同时,在性能方面也不会有太多的降低。Compared with the previous technology, the information encryption method and system provided by the present invention adopts the method of generating different keys from different plaintexts to realize the unpredictability of the real key, which greatly improves the security of the encryption algorithm. At the same time, In terms of performance, there will not be much degradation.
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. For those skilled in the art, the present invention may have various modifications and changes. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present invention shall be included within the protection scope of the present invention.
Claims (7)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510003877.0A CN104618092A (en) | 2015-01-05 | 2015-01-05 | Information encryption method and system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510003877.0A CN104618092A (en) | 2015-01-05 | 2015-01-05 | Information encryption method and system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN104618092A true CN104618092A (en) | 2015-05-13 |
Family
ID=53152387
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510003877.0A Pending CN104618092A (en) | 2015-01-05 | 2015-01-05 | Information encryption method and system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN104618092A (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108933655A (en) * | 2018-07-12 | 2018-12-04 | 江苏慧学堂系统工程有限公司 | A kind of computer network authentication system |
| CN109617681A (en) * | 2018-12-06 | 2019-04-12 | 成都卫士通信息产业股份有限公司 | Encryption and decryption method and device, electronic equipment, computer readable storage medium |
| CN111865591A (en) * | 2020-09-21 | 2020-10-30 | 北京华云安信息技术有限公司 | Symmetric encryption method, device, equipment and storage medium |
| CN112866288A (en) * | 2021-03-01 | 2021-05-28 | 上海海事大学 | Data symmetric encryption method for double-plaintext transmission |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6570989B1 (en) * | 1998-04-27 | 2003-05-27 | Matsushita Electric Industrial Co., Ltd. | Cryptographic processing apparatus, cryptographic processing method, and storage medium storing cryptographic processing program for realizing high-speed cryptographic processing without impairing security |
| CN101262341A (en) * | 2008-02-22 | 2008-09-10 | 北京航空航天大学 | A Hybrid Encryption Method in Conference System |
| CN101952870A (en) * | 2008-01-21 | 2011-01-19 | 索尼公司 | Data converter, data conversion method and computer program |
| CN103905181A (en) * | 2014-03-22 | 2014-07-02 | 哈尔滨工程大学 | Improved RC5 encryption algorithm for secret key encryption |
-
2015
- 2015-01-05 CN CN201510003877.0A patent/CN104618092A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6570989B1 (en) * | 1998-04-27 | 2003-05-27 | Matsushita Electric Industrial Co., Ltd. | Cryptographic processing apparatus, cryptographic processing method, and storage medium storing cryptographic processing program for realizing high-speed cryptographic processing without impairing security |
| CN101952870A (en) * | 2008-01-21 | 2011-01-19 | 索尼公司 | Data converter, data conversion method and computer program |
| CN101262341A (en) * | 2008-02-22 | 2008-09-10 | 北京航空航天大学 | A Hybrid Encryption Method in Conference System |
| CN103905181A (en) * | 2014-03-22 | 2014-07-02 | 哈尔滨工程大学 | Improved RC5 encryption algorithm for secret key encryption |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108933655A (en) * | 2018-07-12 | 2018-12-04 | 江苏慧学堂系统工程有限公司 | A kind of computer network authentication system |
| CN109617681A (en) * | 2018-12-06 | 2019-04-12 | 成都卫士通信息产业股份有限公司 | Encryption and decryption method and device, electronic equipment, computer readable storage medium |
| CN111865591A (en) * | 2020-09-21 | 2020-10-30 | 北京华云安信息技术有限公司 | Symmetric encryption method, device, equipment and storage medium |
| CN112866288A (en) * | 2021-03-01 | 2021-05-28 | 上海海事大学 | Data symmetric encryption method for double-plaintext transmission |
| CN112866288B (en) * | 2021-03-01 | 2022-09-06 | 上海海事大学 | A Symmetric Data Encryption Method for Double Plaintext Transmission |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN107070630B (en) | A Fast and Safe Hardware Structure of AES Algorithm | |
| EP3154217B1 (en) | Scrambled tweak mode of block ciphers for differential power analysis resistant encryption | |
| US8369516B2 (en) | Encryption apparatus having common key encryption function and embedded apparatus | |
| Hussain et al. | Construction of S8 Liu J S-boxes and their applications | |
| US11546135B2 (en) | Key sequence generation for cryptographic operations | |
| CN107147487B (en) | Symmetric key random block cipher | |
| TW201918926A (en) | Methods for constructing secure hash functions from bit-mixers | |
| CN110572255B (en) | Encryption method and device based on lightweight block cipher algorithm Shadow and computer readable medium | |
| CN107947916B (en) | An Integrated Encryption and Decryption Module Based on DES Algorithm | |
| CN113098675A (en) | Binary data encryption system and method based on polynomial complete homomorphism | |
| CN104618092A (en) | Information encryption method and system | |
| CN112787820B (en) | Lightweight authentication encryption and decryption implementation method suitable for hardware implementation | |
| Bhattacharyya et al. | Secure message authentication against related-key attack | |
| CN108234108B (en) | High-efficiency de-ordering encryption method for weak leakage | |
| CN114513298B (en) | Lightweight encryption method capable of accepting arbitrary plaintext length | |
| CN111262685A (en) | Novel method and device for realizing Shield block cipher generated by secret key and readable storage medium | |
| Shoukat et al. | Randomized substitution method for effectively secure block ciphers in IOT environment | |
| CN107835070B (en) | Simple embedded encryption method | |
| KR20080044150A (en) | Apparatus and method for designing compression function of block cipher hash operation mode | |
| TWI731770B (en) | Computer system | |
| CN106788971A (en) | A kind of sub-key generation method based on stream cipher arithmetic | |
| TW202242692A (en) | Circuit module of single round advanced encryption standard | |
| Murtaza et al. | Fortification of aes with dynamic mix-column transformation | |
| Khalil et al. | Modify PRESENT Algorithm by New technique and key Generator by External unit | |
| Jean et al. | Analysis of the CAESAR candidate Silver |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150513 |
|
| WD01 | Invention patent application deemed withdrawn after publication |