CN104348850A - System utilizing transparent technology to access data of cloud database - Google Patents

System utilizing transparent technology to access data of cloud database Download PDF

Info

Publication number
CN104348850A
CN104348850A CN201310316757.7A CN201310316757A CN104348850A CN 104348850 A CN104348850 A CN 104348850A CN 201310316757 A CN201310316757 A CN 201310316757A CN 104348850 A CN104348850 A CN 104348850A
Authority
CN
China
Prior art keywords
database
address
application program
servo
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310316757.7A
Other languages
Chinese (zh)
Other versions
CN104348850B (en
Inventor
莊景如
胡佩芬
胡书渊
邱坤廷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SYSCOM GROUP
Syscom Computer Engineering Co
Original Assignee
SYSCOM GROUP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SYSCOM GROUP filed Critical SYSCOM GROUP
Priority to CN201310316757.7A priority Critical patent/CN104348850B/en
Publication of CN104348850A publication Critical patent/CN104348850A/en
Application granted granted Critical
Publication of CN104348850B publication Critical patent/CN104348850B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls

Abstract

The invention relates to a system utilizing the transparent technology to access data of a cloud database. The system comprises at least one channel servo unit and at least one cloud database end. When an application program end outputs a connection notification, a first servo address and a first database address in an HTTP data format are detected by a user channel unit, a super file transmission protocol tunnel is utilized to connect the corresponding channel servo unit to transmit a database request, so the channel servo unit is enabled to connect with the corresponding database end after the first database address in the HTTP data format is converted into one of TCP/IP data formats, so the application program end can access data of the database after a firewall through the Internet without program code modification.

Description

Utilize the system of logical technology access cloud database data thoroughly
Technical field
The present invention is the technical field belonging to access cloud database data, particularly about a kind of system utilizing logical technology access cloud database data, make TCP/IP(Transmission Control Protocol, transmission control protocol/Internet Protocol, interconnection protocol) after the data transaction of form becomes HTTP form, a servo unit is sent to through a passage, return TCP/IP form from HTTP format conversion again and be sent to the database side in high in the clouds, transmitting data smoothly to break through the stop of fire compartment wall.
Background technology
Build on the ODBC on client/server, Open Data Base Connectivity(open database inter connection interface) there is provided a kind of API(Application Programming Interface of standard, application programming interface) transmit SQL(Structured Query Language) instruction and accessed the data in remote data storehouse by communication layers (Network Layer).ODBC has started the use possibility of Open database connectivity, and its framework roughly can divide into Unit four such as application program (Application), driven management person (Driver Manager), driver (Driver) and Data Source (Data Source).This application program externally provides user to talk interface, internally performs preparation and the calling ODBC program function of data, transmits SQL instruction, and receives and show the result that database returns.This driven management person and this driver are Dynamic link library program shelves, this driven management person unloads into this source driver for assisting this application program and connects this Data Source, and this driver mainly performs the relative function of ODBC, and link up with corresponding Data Source (Data Source), when this application program calling ODBC function, such as during SQLConnect or SQLDriverConnect, this driven management person will be loaded into relative driver and echo with this application program, this application program is made not need why lie in Data Source, as long as utilize this corresponding driver can complete the function of linking.
It can thus be appreciated that ODBC creates the autonomous behavior between this application program and database.But, in above-mentioned master-slave architecture, this application program completes (Commit) in operation, return (Rollback) or time-out (Timeout) is front must keep and the unimpeded and not interruptible price of link between database, now, if when database is hidden in order to network security problem and is located at after a fire compartment wall, this application program cannot directly utilize this original driver to carry out database connections, VB6 or PHP language must be first utilized to compile the function etc. of establishing in the procedure code of this driver and this driven management person, after setting up out another layer of communication port by Internet protocol (TCP/IP), link is completed after can breaking through this fire compartment wall, so, namely the difficulty in use and inconvenience is caused, moreover, if database is cloud system, more intensification procedure code and repairing of function compile complicated degree, and then affect the data access quality of database.
For solving the problem, how to utilize existing Hypertext Transport Protocol logical technology (HTTP Tunneling) additional implementations one passage being thoroughly usually used in breaking through district's net fire compartment wall, for this application program in need not update routine code and function when can firewall-penetrating link cloud database, be the present invention desire most ardently the problem of probing into.
Summary of the invention
Because the problem of prior art, the object of the present invention is to provide a kind of system utilizing logical technology access cloud database data, cloud database after it utilizes Hypertext Transport Protocol tunnel (HTTP Tunnel) to be attached to fire compartment wall, and allow user can carry out the access of data without the need to the procedure code revising application program, promote operation ease and the user satisfaction of application program.
According to object of the present invention, this utilization thoroughly logical technology accesses the system of cloud database data for having at least one database side in an application program end and high in the clouds in master-slave architecture, for allowing this application program end without the need to update routine code namely by internet these database access data after a fire compartment wall, this application program end performs one first database setting shelves in advance, and this utilization system that logical technology accesses cloud database data is thoroughly provided with a subscriber channel unit and at least one passage servo unit, this subscriber channel unit performs one second database setting shelves in advance and obtains an address inventory and link this application program end, this address inventory at least at least one first servo address of internal memory and at least one first database address again, this subscriber channel unit receive that this application program end exports one when linking notice, this the first servo address and this first database address of HTTP data format is known according to this link notice this address inventory of inquiry, and utilize a Hypertext Transport Protocol tunnel (HTTP Tunnel) to link should this passage servo unit of the first servo address through this fire compartment wall, a database request of this first database address is established to give this passage servo unit in transmission, this passage servo unit is made to analyze this database request and after converting this first database address of HTTP data format one of to TCP/IP data format, this the first database address according to TCP/IP data format links this corresponding database side, complete the line between this application program end and this database side.
Wherein, this application program end supports open database inter connection interface (Open Data Base Connectivity, ODBC) driver and can being simultaneously connected with multiple database side, and this subscriber channel unit and this passage servo unit utilize SOHT(Socket Over Http Tunneling) technology sets up this Hypertext Transport Protocol tunnel.This application program end performs this first database setting shelves in advance and specifies for giving the connector linking this subscriber channel unit, make this subscriber channel unit in time receiving this link notice by this application program end of this connector network connections, so, user need not revise the complicated procedure code of this application program end, but performs by the installation of setting shelves the data access action can carried out and between this database side.
When this database side is multiple use kenel, this utilization system that logical technology accesses cloud database data thoroughly is more provided with a chain pipe servo unit (Connection Management Server), and it links this subscriber channel unit by this Hypertext Transport Protocol tunnel through this fire compartment wall.This chain pipe servo unit performs one the 3rd database setting shelves in advance, records this first servo address and this first database address to obtain this address inventory.A return instruction is exported when this subscriber channel unit receives this link notice, when making this chain pipe servo unit detect the using state of respectively this database side and know this database side that can provide optimal service, this chain pipe servo unit intercepts this corresponding the first servo address and this first database address from this address inventory and forms this second servo address and this second database address respectively, feedback gives this subscriber channel unit, exporting this database request and this second database address for this subscriber channel unit by this HTTP Tunnel gives should this passage servo unit of the second servo address.This passage servo unit analyzes this database request and after converting this second database address of HTTP data format one of to TCP/IP data format, link this corresponding database side according to this second database address, complete the line between this application program end and this database side.
In sum, the present invention is that technology of thoroughly being led to by existing HTTP is applied in data base management system, carry out the conversion of data format while making to utilize this subscriber channel unit and this passage servo unit to set up this HTTP Tunnel, data be sent to cloud database with the transmission characteristic being easier to break through this fire compartment wall by the data of HTTP form or read data from database.So, no matter whether cloud database is provided with this fire compartment wall in order to network security, the present invention all allow user in complete these setting shelves settings and without the need to revise this application program end procedure code after, get final product these database side data of direct access, reach effect of person's operation easy to use while guaranteeing data bank network fail safe.Moreover when the non-Tibetan of this database side is located at after this fire compartment wall, the present invention still allows this application program end directly to link this database side by former TCP/IP.
Accompanying drawing explanation
Fig. 1 is the configuration diagram that one of present pre-ferred embodiments implements aspect.
Fig. 2 is the flow chart that one of present pre-ferred embodiments implements aspect.
Fig. 3 is the procedure code that one of present pre-ferred embodiments implements the subscriber channel unit of aspect.
Fig. 4 is the configuration diagram that two of present pre-ferred embodiments implements aspect.
Fig. 5 is the flow chart that two of present pre-ferred embodiments implements aspect.
Fig. 6 is the procedure code that two of present pre-ferred embodiments implements the subscriber channel unit of aspect.
Description of reference numerals: 1-system; 10-application program end; 100-links notice; 11-subscriber channel unit; 110-address inventory; 1100-first servo address; 1101-first database address; 1102-database request; 1103-returns instruction; 12-passage servo unit; 13-database side; 14-fire compartment wall; 15-chain pipe servo unit; S10 ~ S27-step.
Embodiment
For making your juror can have a clear understanding of content of the present invention, sincerely arranging in pairs or groups in the following instructions graphic, please consult.
Refer to Fig. 1,2, it is respectively configuration diagram and flow chart that one of present pre-ferred embodiments implements aspect.As shown in the figure, the system 1 of these saturating logical technology access cloud database data for having at least one database side 13 in application program end 10, subscriber channel unit 11, at least one passage servo unit 12 and high in the clouds in master-slave architecture, and has a fire compartment wall 14 between this subscriber channel unit 11 and this passage servo unit 12.This application program end 10 is supported ODBC driver and is linked this subscriber channel unit 11 by TCP/IP.This subscriber channel unit 11 utilizes SOHT technology in setting up a HTTP Tunnel to each other with this passage servo unit 12, is provided with breaking through this fire compartment wall 14 connected to each other.This passage servo unit 12 links this database side 13 by TCP/IP.This system 1, by comprising the motion flow as following step, realizes making this application program end 10 without the need to update routine code namely by the function of this database 13 access data of internet after this fire compartment wall 14.
First, step S10, this application program end 10 performs one first database setting shelves in advance:
DB_CLOUD=1
DB_CLOUDSVR=172.16.220.116:8085
DB_PTNUM=12345
DB_SVADR=127.0.0.1
DB_USRID=SYSADM,
To specify for giving the connector linking this subscriber channel unit 11: 12345.Meanwhile, this subscriber channel unit 11 performs one second database setting shelves:
client.port=12345
soht.server=http://172.16.220.116:8085/soht/service
remote.db=DBSAMPL5
remote.address=172.16.220.114
remote.port=2455
soht.user=dbmaker
soht.password=172134047079015245178043176118152139186000155185142087242084
soht.server=http://127.0.0.1:8080/soht/service
remote.db=TESTDB
remote.address=172.16.220.56
remote.port=33557
soht.user=dbmaker,
To know the connector of this application program end 10 and to obtain an address inventory 110, this address inventory 110 at least in have one first servo address 1100, such as 172.16.220.116:8085 and 127.0.0.1:8080, and one first database address 1101, as 172.16.220.114:2455 and 172.16.220.56:33557.
When this application program end 10 is for linking this database side 13, step S11: the link exporting TCP/IP data format notifies that 100 give this subscriber channel unit 11, and this subscriber channel unit 11 is performed:
java-Dclouddb.properties=’c:/…/clouddb.properties’-jar cloud-client.jar
Operating state is entered after instruction.
In step s 12, this subscriber channel unit 11 is as shown in Figure 3, receive this link to notify after 100 by fixing this application program end 10 of this connector network connections, and step S13: notify this address inventory 110 of 100 inquiries according to this link and after this first servo address 1100 of knowing corresponding HTTP data format and this first database address 1101, utilize this HTTP Tunnel to link should this passage servo unit 12 of the first servo address 1100 through this fire compartment wall 14.
Then, step S14, this subscriber channel unit 11 transmits a database request 1102 and gives this passage servo unit 12, is provided with this first database address 1101 in this database request 1102.
In step S15, this passage servo unit 12 receives and analyzes this database request 1102, after converting this first database address 1101 of HTTP data format one of to TCP/IP data format, this first database address 1101 according to TCP/IP data format links this corresponding database side 13.
After completing the line between this application program end 10 and this database side 13, step S16, this subscriber channel unit 11 changes the data transmitted from this application program end 10, this database side 13 is given to transmit through this passage servo unit 12, or the database data that sends through this passage servo unit 12 of conversion and transmit and give this application program end 10.
Hold, when this database side 13 is multiple use kenels, and when considering that respectively this database side 13 has the using states such as different data load amount, network transmission speed and operation efficiency further, this system 1 is provided with a chain pipe servo unit 15 as shown in Figure 4.This chain pipe servo unit 15 also utilizes SOHT technology to set up and another HTTP Tunnel between this subscriber channel unit 11, and be provided with breaking through this fire compartment wall 14 and connected to each other, so, the motion flow of this system 1 will as shown in Figure 5.
In step S20, this application program end 10 performs this first database setting shelves in advance and specifies for giving this connector linking this subscriber channel unit 11, this subscriber channel unit 11 performs this second database setting shelves and knows the connector of this application program end 10 and obtain this address inventory 110, meanwhile, this chain pipe servo unit 15 performs one the 3rd database setting shelves:
soht.server=http://172.16.220.116:8085/soht/service
remote.db=DBSAMPL5
remote.address=172.16.220.114
remote.port=2455
soht.server=http://127.0.0.1:8080/soht/service
remote.db=TESTDB
remote.address=172.16.220.56
remote.port=33557
This first servo address 1100 and this first database address 1101 is recorded to obtain this address inventory 110.
When this application program end 10 is for linking this database side 13, step S21: export this link and notify that 100 give this subscriber channel unit 11, this subscriber channel unit 11 is performed:
java-Dclient.port=12345-jar cloud-client.jar
Operating state is entered after rear instruction.
Step S22, this subscriber channel unit 11 is as shown in Figure 6, by fixing this application program end 10 of this connector network connections, and export a return instruction 1103 and give this chain pipe servo unit 15, this chain pipe servo unit 15 is made to enter step S23: the using state detecting respectively this database side 13, with calculate obtain this database side 13 of better service can be provided after, intercept this corresponding the first servo address 1100 and this first database address 1101 from this address inventory 110 and form one second servo address and one second database address respectively, and feed back a link data and give this subscriber channel unit 11, this link data includes the device name of this database side 13 that can provide better service, this the second database address and this second servo address, and this second database address and this second servo address are HTTP data format.
Then, step S24, this subscriber channel unit 11 directly utilizes this second servo address to link this corresponding passage servo unit 12 through this HTTP Tunnel according to this link data.Further, step S25, this subscriber channel unit 11 transmits this database request 1102 and gives this passage servo unit 12, this database request 1102 according to the reception result of this link data in be provided with this second database address.In step S26, this passage servo unit 12 receives and analyzes this database request 1102, after converting this second database address of HTTP data format one of to TCP/IP data format, links this corresponding database side 13 according to this second database address.After completing the line between this application program end 10 and this database side 13, step S27, this subscriber channel unit 11 changes the data transmitted from this application program end 10, this database side 13 is given to transmit through this passage servo unit 12, or the database data that sends through this passage servo unit 12 of conversion and transmit and give this application program end 10.
In the present embodiment, when this database side 13 be not Tibetan be located at this fire compartment wall 14 rear time, this application program end 10 still can directly utilize former TCP/IP inter-connection links to link this corresponding database side 13.
The foregoing is only the preferred embodiment of illustrative, but not be restricted person.Anyly do not depart from spirit of the present invention and category, and to its equivalent modifications of carrying out or change, all should be contained in accompanying claim.

Claims (7)

1. one kind utilizes the system of logical technology access cloud database data thoroughly, it is at least one database side for having an application program end and high in the clouds in master-slave architecture, this application program end of confession permission, is characterized in that namely by internet these database access data after a fire compartment wall without the need to update routine code:
This application program end performs one first database setting shelves in advance, and this utilization system that logical technology accesses cloud database data is thoroughly provided with a subscriber channel unit and at least one passage servo unit, this subscriber channel unit performs one second database setting shelves in advance and obtains an address inventory and link this application program end, this address inventory at least at least one first servo address of internal memory and at least one first database address again, this subscriber channel unit receive that this application program end exports one when linking notice, this the first servo address and this first database address of HTTP data format is known according to this link notice this address inventory of inquiry, and utilize a Hypertext Transport Protocol tunnel to link should this passage servo unit of the first servo address through this fire compartment wall, a database request of this first database address is established to give this passage servo unit in transmission, this passage servo unit is made to analyze this database request and after converting this first database address of HTTP data format one of to TCP/IP data format, this the first database address according to TCP/IP data format links this corresponding database side, complete the line between this application program end and this database side.
2. the system of technology access cloud database data is led in utilization according to claim 1 thoroughly, and it is characterized in that, this application program end supports open database inter connection interface driver.
3. the system of technology access cloud database data is led in utilization according to claim 2 thoroughly, it is characterized in that, this application program end performs this first database setting shelves in advance and specifies for giving the connector linking this subscriber channel unit, makes this subscriber channel unit in time receiving this link notice by this application program end of this connector network connections.
4. the system of technology access cloud database data is led in utilization according to claim 3 thoroughly, it is characterized in that, more be provided with a chain pipe servo unit, and this database side is multiple use kenels, this chain pipe servo unit links this subscriber channel unit by this Hypertext Transport Protocol tunnel through this fire compartment wall, this subscriber channel unit exports a return instruction when receiving this link notice, this chain pipe servo unit is made to detect the using state of respectively this database side and feed back one second servo address and the one second database address of HTTP data format, exporting this database request and this second database address for this subscriber channel unit by this Hypertext Transport Protocol tunnel gives should this passage servo unit of the second servo address, this passage servo unit analyzes this database request and after converting this second database address of HTTP data format one of to TCP/IP data format, this corresponding database side is linked according to this second database address, complete the line between this application program end and this database side.
5. the system of technology access cloud database data is led in utilization according to claim 4 thoroughly, it is characterized in that, this chain pipe servo unit performs one the 3rd database setting shelves in advance, this the first servo address and this first database address is recorded to obtain this address inventory, when this chain pipe servo unit detects the using state of respectively this database side and knows this database side that can provide optimal service, intercept this corresponding the first servo address and this first database address from this address inventory and form this second servo address and this second database address respectively, feedback gives this subscriber channel unit.
6. the system of technology access cloud database data is led in utilization according to claim 5 thoroughly, and it is characterized in that, this subscriber channel unit and this passage servo unit utilize SOHT technology to set up this Hypertext Transport Protocol tunnel.
7. the system of technology access cloud database data is led in utilization according to claim 1 thoroughly, and it is characterized in that, when the non-Tibetan of this database side is located at after this fire compartment wall, this application program end directly links this database side by former TCP/IP.
CN201310316757.7A 2013-07-25 2013-07-25 The system for accessing cloud database data using saturating logical technology Active CN104348850B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310316757.7A CN104348850B (en) 2013-07-25 2013-07-25 The system for accessing cloud database data using saturating logical technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310316757.7A CN104348850B (en) 2013-07-25 2013-07-25 The system for accessing cloud database data using saturating logical technology

Publications (2)

Publication Number Publication Date
CN104348850A true CN104348850A (en) 2015-02-11
CN104348850B CN104348850B (en) 2017-10-20

Family

ID=52503645

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310316757.7A Active CN104348850B (en) 2013-07-25 2013-07-25 The system for accessing cloud database data using saturating logical technology

Country Status (1)

Country Link
CN (1) CN104348850B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1053989A (en) * 1990-02-13 1991-08-28 埃兹拉.C.隆达尔有限公司 Improved crop processor
US20080301305A1 (en) * 2007-05-31 2008-12-04 Shih-Yung Huang Method and related system for building up a network connection between clients and servers through a stream fork by utilizing http protocol
CN102447718A (en) * 2010-10-12 2012-05-09 上尚科技股份有限公司 Network service providing system with high reliability
US20120179904A1 (en) * 2011-01-11 2012-07-12 Safenet, Inc. Remote Pre-Boot Authentication
CN102804687A (en) * 2009-06-22 2012-11-28 微软公司 Using Hypertext Transfer Protocol As A Transport For Bi-directional Data Streams
CN102916983A (en) * 2012-11-22 2013-02-06 北京奇虎科技有限公司 Protection system for network access behavior

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1053989A (en) * 1990-02-13 1991-08-28 埃兹拉.C.隆达尔有限公司 Improved crop processor
US20080301305A1 (en) * 2007-05-31 2008-12-04 Shih-Yung Huang Method and related system for building up a network connection between clients and servers through a stream fork by utilizing http protocol
CN102804687A (en) * 2009-06-22 2012-11-28 微软公司 Using Hypertext Transfer Protocol As A Transport For Bi-directional Data Streams
CN102447718A (en) * 2010-10-12 2012-05-09 上尚科技股份有限公司 Network service providing system with high reliability
US20120179904A1 (en) * 2011-01-11 2012-07-12 Safenet, Inc. Remote Pre-Boot Authentication
CN102916983A (en) * 2012-11-22 2013-02-06 北京奇虎科技有限公司 Protection system for network access behavior

Also Published As

Publication number Publication date
CN104348850B (en) 2017-10-20

Similar Documents

Publication Publication Date Title
US8589365B2 (en) Data access layer
EP2947569A1 (en) Hybrid applications operating between on-premise and cloud platforms
US20180247244A1 (en) Service and Resource Orchestration System and Method, and Apparatus
CN103685269B (en) A kind of web browser carries out the method and system of both-way communication with server
US20110047204A1 (en) System and method for facilitating secure integration and communication of cloud services and enterprise applications
CN105164677B (en) The method and system of storing process is executed at parallel database
CN102253855B (en) A kind of method and apparatus transmitting shared drive
WO2020186807A1 (en) System and method for power data linking based on blockchain technology
CN101808051B (en) Application integration gateway and control method thereof
CN103051716A (en) Method and system for redirecting network-oriented serial device
WO2020259515A1 (en) Method and device for obtaining calling chain of tcp application
CN102664952B (en) Method for managing and monitoring embedded equipment cluster
CN110011875A (en) Dial testing method, device, equipment and computer readable storage medium
CN109639804A (en) Monitoring method, system and the production equipment of production system, terminal, server
US9148404B2 (en) System for accessing data of cloud database using transparent technology
CN108400913B (en) Medical institution intelligent access system with timed task function
CN109981748A (en) A kind of positive supply method realized based on Kong gateway
CN102710518B (en) The method and system that NAT penetrates are realized under wide area network
CN202798801U (en) Universal communication system for achieving distributed data interaction
CN109814973A (en) A kind of implementation method of desktop cloud platform, system and server
CN103995736A (en) Method and device for transmitting shared memory
CN104348850A (en) System utilizing transparent technology to access data of cloud database
CN116016255A (en) Universal blockchain performance evaluation method based on dynamic proxy and intelligent contract
CN101834902A (en) Front-end processor system and method for comprehensive management of remote power distribution room
WO2021203343A1 (en) Web request processing method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant