Nothing Special   »   [go: up one dir, main page]

CN102945352A - Method for analyzing and implementing action information in computer system - Google Patents

Method for analyzing and implementing action information in computer system Download PDF

Info

Publication number
CN102945352A
CN102945352A CN201210437591XA CN201210437591A CN102945352A CN 102945352 A CN102945352 A CN 102945352A CN 201210437591X A CN201210437591X A CN 201210437591XA CN 201210437591 A CN201210437591 A CN 201210437591A CN 102945352 A CN102945352 A CN 102945352A
Authority
CN
China
Prior art keywords
information
action
query
action message
analysis result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210437591XA
Other languages
Chinese (zh)
Other versions
CN102945352B (en
Inventor
王媛媛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
STATE GRID SHANDONG LINQU POWER SUPPLY Co Ltd
State Grid Corp of China SGCC
Weifang Power Supply Co of State Grid Shandong Electric Power Co Ltd
Original Assignee
Suzhou Yiyuan Hongda Intellectual Property Agency Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Yiyuan Hongda Intellectual Property Agency Co Ltd filed Critical Suzhou Yiyuan Hongda Intellectual Property Agency Co Ltd
Priority to CN201210437591.XA priority Critical patent/CN102945352B/en
Publication of CN102945352A publication Critical patent/CN102945352A/en
Application granted granted Critical
Publication of CN102945352B publication Critical patent/CN102945352B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention provides a method for analyzing and implementing action information in a computer system. The method comprises the following steps of: receiving the action information; analyzing the action information and generating result analysis information; judging the category of the action information according to the result analysis information; if the category of the action information is setting, implementing the action of setting, and returning to setting completion information after the action of setting is finished; if the category of the action information is calculation, implementing the action of calculation, and returning to calculation completion information after the action of calculation is finished; and if the category of the action information is inquiry, implementing the action of inquiry, and returning to inquiry completion information after the action of inquiry is finished.

Description

In computer system, analyze the also method of execution action information
Technical field
The present invention relates generally to computer system, relates in particular to a kind of also method of execution action information of analyzing in computer system.
Background technology
The processing of present age computer system, demonstration and communication capacity all significantly strengthen, the more and more tasks of carrying out larger quantity with these computer system devices of such computer system user.For example, except function of voice communication and internet browsing function, even navigation feature and satellite positioning functions, and the based on network application service of various complexity.Yet, although the processing of computer system, communication and display capabilities so that such task becomes possibility, it is only owing to often need to remain unpractical by the quantity of information of user by computer system data input mechanism input.
In addition, enterprise usually with one group of discrete feature binding to software product, satisfy particular customer group's needs and software product be distinguished from each other attempting.Yet the client mostly just needs to ask the relatively small subset of these these features, and the purposes of all the other features is less or do not have for the client.In addition, these supplementary features have increased the complicacy of user interface and use in the given software product usually, and may reduce thus the overall customer experience of software product.
Summary of the invention
The invention provides a kind of also method of execution action information of analyzing in computer system, described method comprises: receive action message; Analyze described action message and generate analysis result information; Judge the type of described action message according to analysis result information; If the type of described action message for arranging, is then carried out action is set, release is set returns the information of finishing that arranges; If the type of described action message for calculating, is then carried out and calculated action, calculate release and return result of calculation information; If the type of described action message is then carried out query actions for inquiry, query actions finishes to return Query Result information.
Preferably, wherein, if the type of described action message is for calculating, then carry out and calculate action, further judge the security strategy classification according to described analysis result after calculating release, if security strategy is senior, then after calculating release, result of calculation information is carried out buffer memory return simultaneously to calculate and finish information, and do not return result of calculation information; If security strategy is rudimentary, then after calculating release, returns to calculate and finish information and return simultaneously result of calculation information.
Preferably, wherein, if the type of described action message is inquiry, then carry out query actions, query actions is further judged the security strategy classification according to described analysis result after finishing, if security strategy is senior: carry out security verification according to analysis result, if by the checking return Query Result information, if not by the checking return failure; If security strategy is rudimentary: return Query Result information.
Preferably, search an object information according to analysis result, carry out that based on described object information action, calculating action or query actions being set.Wherein, according to analysis result identification one link, search described object information according to described link.
Preferably, the action message that receives is encrypted action message, and the encrypted action message that first deciphering receives before analyzing described action message.
The present invention provides a kind of also method of execution action information of analyzing simultaneously in computer system, described method comprises: receive the first action message; Analyze described the first action message and generate the first analysis result information; Resolve the first analysis result acquisition of information computing information, and carry out the calculating action according to described computing information, after the calculating release, buffer memory result of calculation information is also returned the information of finishing of calculating; Receive the second action message; Analyze described the second action message and generate the second analysis result information; Resolve the second analysis result acquisition of information Query Information, and carry out query actions according to described Query Information, poll-final returns Query Result information.Wherein before resolving the first analysis result acquisition of information computing information, also comprise: resolve the first analysis result acquisition of information configuration information, and according to described configuration information execution action is set.
Preferably, wherein said Query Result information is described result of calculation information, and the described result of calculation information of buffer memory is to an impact damper, and described query actions is the described impact damper of inquiry.
Preferably, wherein, resolve the second analysis result acquisition of information Query Information, and according to described Query Information execution query actions, further resolve the second analysis result behind the poll-final to obtain the security strategy classification information, if the security strategy classification information is senior: further resolve the second analysis result and obtain security verification information and verify, then return if the verification passes Query Result information, if checking not by return failure; If security strategy is rudimentary: return Query Result information.
Preferably, search respectively an object information according to the first analysis result information or the second analysis result information, carry out that based on described object information action, calculating action or query actions being set.Wherein, according to the first analysis result information or the second analysis result information identification one link, search described object information according to described link.
Preferably, the first action message that receives or the second action message are encrypted action messages, and first deciphering receives before analyzing described the first action message or the second action message encrypted the first action message or the second action message.
Description of drawings
Fig. 1 analyzes the also process flow diagram of the method for execution action information in computer system in the preferred embodiment of the present invention.
Fig. 2 analyzes the also process flow diagram of the method for execution action information in computer system in another preferred embodiment of the present invention.
Embodiment
Provide hereinafter instructions and be in order to make those skilled in the art can make and use the present invention, and instructions is to provide in the context of application-specific and demand thereof.Various modifications for disclosed embodiment easily see to those skilled in the art, and can be applied to other embodiments and application in the General Principle of this definition, and do not break away from the spirit and scope of the present invention.Thus, the present invention is intended to be limited to shown embodiment, but meets the most widely scope consistent with principle disclosed herein and feature.
These technology that the present invention relates to can be implemented as independent utility, perhaps are embodied as subroutine or functional module in the Another Application.In addition, function at least part of can be configured to client computer (such as, personal computer, laptop computer, cell phone, PDA or other equipment that can the operating computer readable data) the upper execution, perhaps by network (such as, the combination of internet, Intranet, LAN, WAN, MAN or network or be supported in the other technologies of communicating by letter between the computing system) via the computing system that is associated from the long-range execution of client computer.Thus, purchase information, software product and configuration-direct can local be stored (for example, on local computer) and/or remotely storage (for example, on computing machine or server via access to netwoks).
Generally speaking, functional module comprises the routine carrying out particular task or realize particular abstract data type, program, object, assembly, data structure etc.In addition, those skilled in the art will recognize that: computer system may not be limited to conventional personal computer, and comprising other calculating configuration, this comprises handheld device, multicomputer system, based on electronic equipment for consumption microprocessor or programmable, network PC, microcomputer, mainframe computer etc.Similarly, computing equipment is not necessarily limited to independent computing equipment, because these mechanism also can realize in distributed computing environment, executes the task and utilize in distributed computing environment by the teleprocessing equipment of communication network link.In distributed computing environment, functional module can be arranged in local and remote memory storage devices the two.
With reference to figure 1, computer system receives action message; Action message can come from user's operation, can come from network request, perhaps the request of inside computer system parts.Receive after the action message, analyze described action message and generate analysis result information by analysis module; Described analysis result information comprises type information, security policy information, link information, object information, process information etc.; Analysis module is recorded in it in record sheet after analyzing described analysis result information, so that inquiry and access.The analysis result information that computer system obtains after according to above-mentioned analysis is judged the type of described action message; Search record sheet when for example needing and determine the corresponding type information of corresponding actions information.Further described type information is judged, if the type of described action message for arranging, is then carried out action is set, release is set returns the information of finishing that arranges; It is webpage setting, page setup, window setting, application setting etc. that action wherein is set.If the type of described action message for calculating, is then carried out and calculated action, calculate release and return result of calculation information; Described calculating action is flow rate calculation, power consumption calculation, calculation of capacity, computation etc.If the type of described action message is inquiry, then to transfer and carry out query actions, query actions finishes to return Query Result information; Wherein query actions is access queries, information inquiry, network inquiry, caching query etc.
According to one preferred embodiment of the present invention, for security consideration, wherein, if the type of described action message is to calculate, then carry out and calculate action, further judge the security strategy classification according to described analysis result after the calculating release, if security strategy is senior, then after calculating release, result of calculation information is carried out buffer memory return simultaneously to calculate and finish information, and do not return result of calculation information; If security strategy is rudimentary, then after calculating release, return to calculate and finish information and return simultaneously result of calculation information, wherein the result of calculation information cache is to impact damper.Wherein, if the type of described action message is inquiry, then carry out query actions, query actions is further judged the security strategy classification according to described analysis result after finishing, if security strategy is senior: carry out security verification according to analysis result, if by the checking return Query Result information, if not by the checking return failure; If security strategy is rudimentary: return Query Result information.
According to one preferred embodiment of the present invention, after analysis module is analyzed described action message, computer system is determined an object information or search an object information in record sheet according to analysis result information, and action is set, calculates action or query actions based on described object information execution.According to another embodiment of the present invention, described computer system is according to analysis result information identification one link or search a link in record sheet, search described object information according to described link, particularly, memory location or document location according to the address location object information of described link, and search object information in this memory location or document location, then carry out action being set, calculating and move or query actions based on the object information that finds.Wherein for carrying out at described object action is set, calculates action or query actions based on described object information.One of ordinary skill in the art will readily recognize that above-mentioned object can be various hardware resources or software resource or function or the class etc. in the computer system.Above-mentioned process information can be various address informations, function pointer, function, data message etc.The above-mentioned setting can be various settings to window, as maximizing, minimize, close, open, create example etc., also can be to using, as open, close etc., and also can be to webpage, such as rollback, advance etc.Above-mentioned calculating can be computational resource, computing time, computing power, calculating power consumption, computation period etc.Above-mentioned inquiry can be query buffer, query webpage information, data query base resource, inquiry system resource, query text, inquiry hardware resource etc.Sometimes for security, the action message that receives is encrypted action message, and the encrypted action message that first deciphering receives before analyzing described action message, and described decryption oprerations can be carried out according to PKI or private key.
With reference to figure 2, computer system receives the first action message; The first action message can come from user's operation, can come from network request, perhaps the request of inside computer system parts.Receive after the first action message, analyze described the first action message and generate the first analysis result information by analysis module; The first analysis result information comprises type information, security policy information, link information, object information, process information etc.; Analysis module is recorded in it in record sheet after analyzing described the first analysis result information, so that inquiry and access; Resolve the first analysis result acquisition of information computing information, and carry out calculating according to described computing information and move, after calculating release, buffer memory result of calculation information is also returned the information of finishing of calculating, and described calculating action is flow rate calculation, power consumption calculation, calculation of capacity, computation etc.; Receive the second action message, the second action message can come from user's operation, can come from network request, perhaps the request of inside computer system parts; Analyze described the second action message and generate the second analysis result information, the second analysis result information comprises type information, security policy information, link information, object information, process information etc.; Analysis module is recorded in it in described record sheet after analyzing described the second analysis result information, so that inquiry and access; Resolve the second analysis result acquisition of information Query Information, and carry out query actions according to described Query Information, poll-final returns Query Result information, and wherein query actions is access queries, information inquiry, network inquiry, caching query etc.Wherein said Query Result information is described result of calculation information, and the described result of calculation information of buffer memory is to an impact damper, and described query actions is the described impact damper of inquiry.Wherein before resolving the first analysis result acquisition of information computing information, also comprise: resolve the first analysis result acquisition of information configuration information, and carry out according to described configuration information action is set, action wherein is set is webpage setting, page setup, window setting, use and arrange etc.
According to one preferred embodiment of the present invention, for security consideration, wherein, resolve the second analysis result acquisition of information Query Information, and according to described Query Information execution query actions, further resolve the second analysis result behind the poll-final to obtain the security strategy classification information, if the security strategy classification information is senior: further resolve the second analysis result and obtain security verification information and verify, then return if the verification passes Query Result information, if checking does not have by then returns failure; If security strategy is rudimentary: return Query Result information.Wherein obtaining security verification information comprises, obtain user right information, digital signature information or encrypted message etc., utilize authentication module to carry out described checking this security verification information after obtaining security verification information, for example, whether authentication module inquiring and authenticating table is verified that user right information is legal, verifies whether digital signature matches success, whether is verified that password is correct etc.Those skilled in the art can know that above-mentioned proof procedure only is exemplary illustration, and checking herein can be adopted all solutions that can realize described checking.
According to one preferred embodiment of the present invention, after analysis module is analyzed described the first action message or the second action message, generate the first analysis result information or the second analysis result information, then, computer system is determined an object information or search an object information in record sheet according to the first analysis result information or the second analysis result information, and action is set, calculates action or query actions based on described object information execution.According to another embodiment of the present invention, described computer system is according to the first analysis result information or the second analysis result information identification one link, search described object information according to described link, particularly, memory location or document location according to the address location object information of described link, and search object information in this memory location or document location, then carry out action being set, calculating and move or query actions based on the object information that finds.Wherein for carrying out at described object action is set, calculates action or query actions based on described object information.One of ordinary skill in the art will readily recognize that above-mentioned object can be various hardware resources or software resource or function or the class etc. in the computer system.Above-mentioned process information can be various address informations, function pointer, function, data message etc.The above-mentioned setting can be various settings to window, as maximizing, minimize, close, open, create example etc., also can be to using, as open, close etc., and also can be to webpage, such as rollback, advance etc.Above-mentioned calculating can be computational resource, computing time, computing power, calculating power consumption, computation period etc.Above-mentioned inquiry can be query buffer, query webpage information, data query base resource, inquiry system resource, query text, inquiry hardware resource etc.Sometimes for security, the first action message that receives and/or the second action message are encrypted action messages, and first deciphering receives before analyzing described the first action message and/or the second action message encrypted the first action message and/or the second action message, described decryption oprerations can be carried out according to PKI or private key.It will be understood by those skilled in the art that the processing to the first action action message can equally be applied to the second action message, similarly, can equally be applied to the second analysis result information to the processing of the first analysis result information.
When the present invention allows various improvement and alternative structure, shown the embodiment of some explanation of the present invention in the accompanying drawing and be described in detail.But, should be appreciated that this is not to attempt the present invention is limited to the form of appointment or disclosed form, and on the contrary, the present invention covers all improvement and substitutes and various merging and combination, and all equivalents all within the spirit and scope of the present invention.

Claims (10)

1. analyze the also method of execution action information for one kind in computer system, described method comprises:
A) receive action message;
B) analyze described action message and generate described analysis result information;
C) analytic results information is judged the type of described action message;
D) if the type of described action message for arranging, is then carried out action is set, release is set returns the information of finishing that arranges;
E) if the type of described action message for calculating, is then carried out and calculated action, calculate release and return result of calculation information;
F) if the type of described action message for inquiry, is then carried out query actions, query actions finishes to return Query Result information.
2. the method for claim 1, wherein, described step e) specifically may further comprise the steps: if the type of described action message is for calculating, then carry out and calculate action, further judge the security strategy classification according to described analysis result after calculating release, if security strategy is senior, then after calculating release, result of calculation information is carried out buffer memory return simultaneously to calculate and finish information, and do not return result of calculation information; If security strategy is rudimentary, then after calculating release, returns to calculate and finish information and return simultaneously result of calculation information.
3. such as the described method of claim 1-2, wherein, described step f) specifically may further comprise the steps: if the type of described action message is inquiry, then carry out query actions, query actions is further judged the security strategy classification according to described analysis result after finishing, if security strategy is senior: carry out security verification according to analysis result, if by the checking return Query Result information, if not by the checking return failure; If security strategy is rudimentary: return Query Result information.
4. the method for claim 1 also comprises, searches an object information according to analysis result, carries out that based on described object information action, calculating action or query actions being set.
5. method as claimed in claim 4 also comprises, according to analysis result identification one link, searches described object information according to described link.
6. the method for claim 1 also comprises, the action message that receives is encrypted action message, and the encrypted action message that first deciphering receives before analyzing described action message.
7. analyze the also method of execution action information for one kind in computer system, described method comprises:
A) receive the first action message;
B) analyze described the first action message and generate described the first analysis result information;
C) resolve the first analysis result acquisition of information computing information, and carry out the calculating action according to described computing information, after the calculating release, buffer memory result of calculation information is also returned the information of finishing of calculating;
D) receive the second action message;
E) analyze described the second action message and generate described the second analysis result information;
F) resolve the second analysis result acquisition of information Query Information, and carry out query actions according to described Query Information, poll-final returns Query Result information.
8. method as claimed in claim 7, wherein said Query Result information is described result of calculation information.
9. method as claimed in claim 9, wherein said query actions is the described impact damper of inquiry.
10. method as claimed in claim 10, described step f) specifically comprises: resolve the second analysis result acquisition of information Query Information, and according to described Query Information execution query actions, further resolve the second analysis result behind the poll-final to obtain the security strategy classification information, if the security strategy classification information is senior: further resolve the second analysis result and obtain security verification information and verify, then return if the verification passes Query Result information, if checking does not have by then returns failure; If security strategy is rudimentary: return Query Result information.
CN201210437591.XA 2012-11-06 2012-11-06 Analyze in computer systems, which and the method for the information that performs an action Expired - Fee Related CN102945352B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210437591.XA CN102945352B (en) 2012-11-06 2012-11-06 Analyze in computer systems, which and the method for the information that performs an action

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210437591.XA CN102945352B (en) 2012-11-06 2012-11-06 Analyze in computer systems, which and the method for the information that performs an action

Publications (2)

Publication Number Publication Date
CN102945352A true CN102945352A (en) 2013-02-27
CN102945352B CN102945352B (en) 2016-04-13

Family

ID=47728293

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210437591.XA Expired - Fee Related CN102945352B (en) 2012-11-06 2012-11-06 Analyze in computer systems, which and the method for the information that performs an action

Country Status (1)

Country Link
CN (1) CN102945352B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1109400A1 (en) * 1999-12-16 2001-06-20 CANAL+ Société Anonyme Transmission of a command to a receiver or to a decoder
CN101562622A (en) * 2009-06-05 2009-10-21 杭州华三通信技术有限公司 Method for executing user request and corresponding server thereof
CN102457565A (en) * 2010-11-03 2012-05-16 中国电信股份有限公司 Method for mobile terminal to access network and proxy server
CN102594899A (en) * 2011-12-31 2012-07-18 成都市华为赛门铁克科技有限公司 Storage service method and storage server using the same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1109400A1 (en) * 1999-12-16 2001-06-20 CANAL+ Société Anonyme Transmission of a command to a receiver or to a decoder
CN101562622A (en) * 2009-06-05 2009-10-21 杭州华三通信技术有限公司 Method for executing user request and corresponding server thereof
CN102457565A (en) * 2010-11-03 2012-05-16 中国电信股份有限公司 Method for mobile terminal to access network and proxy server
CN102594899A (en) * 2011-12-31 2012-07-18 成都市华为赛门铁克科技有限公司 Storage service method and storage server using the same

Also Published As

Publication number Publication date
CN102945352B (en) 2016-04-13

Similar Documents

Publication Publication Date Title
AU2017316312B2 (en) Remote usage of locally stored biometric authentication data
US10664613B2 (en) Virtualization input component
CN110084007B (en) Method, device and terminal for constructing risk control model
CN111164632A (en) Information processing method and device based on block chain and block chain network
CN111917773A (en) Service data processing method and device and server
CN107852412A (en) For phishing and the system and method for brand protection
CN110784450A (en) Single sign-on method and device based on browser
EP3042335B1 (en) Automatically generating certification documents
CN112328486A (en) Interface automation test method and device, computer equipment and storage medium
US20210303190A1 (en) Modular data processing and storage system
WO2022093353A1 (en) Using multi-factor and/or inherence-based authentication to selectively enable performance of an operation prior to or during release of code
US11037146B2 (en) Managing product returns associated with a user device
CN111935107B (en) Identity authentication method, device, system, electronic equipment and storage medium
AU2018217220A1 (en) Methods and systems for capturing biometric data
CN102945352B (en) Analyze in computer systems, which and the method for the information that performs an action
KR101679183B1 (en) Server and method for electronic signature
CN111611473A (en) Information push processing method and device, storage medium and terminal
CN107517177B (en) Interface authorization method and device
WO2019062184A1 (en) Bank insurance policy data interfacing method and insurance policy data server
US11704709B2 (en) Systems and methods for proactively informing users of an age of a merchant during online transactions
US20240220593A1 (en) User authentication with biometric data in conjunction with autofill assistance
CN113138999A (en) Data processing method and device, computer storage medium and electronic equipment
CN115510493A (en) Resource data processing method and device based on block chain and server
CN114221782A (en) Authentication method, equipment, chip and storage medium
CN114240608A (en) Information input method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
DD01 Delivery of document by public notice

Addressee: Suzhou Yiyuan Hongda Intellectual Property Agency Co., Ltd.

Document name: Notification of Passing Preliminary Examination of the Application for Invention

C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
DD01 Delivery of document by public notice

Addressee: Suzhou Yiyuan Hongda Intellectual Property Agency Co., Ltd.

Document name: Notification of Publication and of Entering the Substantive Examination Stage of the Application for Invention

DD01 Delivery of document by public notice

Addressee: Suzhou Yiyuan Hongda Intellectual Property Agency Co., Ltd.

Document name: the First Notification of an Office Action

C41 Transfer of patent application or patent right or utility model
CB03 Change of inventor or designer information

Inventor after: Ma Huajie

Inventor after: Qiu Mei

Inventor after: Pang Zhanxing

Inventor after: Zhao Xiaoxue

Inventor after: Lang Xudong

Inventor after: Gao Jixuan

Inventor after: Chen Wanqiang

Inventor after: Liu Gang

Inventor after: Wang Xiaoshuai

Inventor before: Wang Yuanyuan

COR Change of bibliographic data
TA01 Transfer of patent application right

Effective date of registration: 20160129

Address after: 262000, No. 4 Mi River Road, Linqu County, Weifang, Shandong

Applicant after: STATE GRID SHANDONG LINQU POWER SUPPLY CO., LTD.

Address before: Suzhou City, Jiangsu province 215100 Songjiang Road, Suzhou Industrial Park, No. 208 Building 8 Room 112

Applicant before: Suzhou Yiyuan Hongda Intellectual Property Agency Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20160623

Address after: 262600, 4 Shandong Road, Linqu County, China

Patentee after: STATE GRID SHANDONG LINQU POWER SUPPLY CO., LTD.

Patentee after: State Grid Shandong Electric Power Company Weifang Power Supply Company

Patentee after: State Grid Corporation of China

Address before: No. 4 Mi River Road, Linqu County

Patentee before: STATE GRID SHANDONG LINQU POWER SUPPLY CO., LTD.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160413

Termination date: 20171106