This application is based upon and claims the benefit of priority of the prior Japanese Patent Application No. 2019-12786, filed on Jan. 29, 2019, the entire contents of which are incorporated herein by reference.
The embodiments discussed herein are related to an information processing device and a terminal.
A load balancing technique using an edge computer has been proposed as a technique for inhibiting a load which occurs due to intensive access to data stored in a cloud server. This load balancing is realized by caching a copy of the data in an edge computer to which a terminal located near uses the cache instead of using the original data in the cloud server.
In this case, since the edge computer may be set in a room where anyone can enter and leave, there is a risk that the edge computer or a hard disk drive (HDD) installed in it may be stolen. If the edge computer or its HDD is stolen, the cache data, i.e., the original data stored in the cloud server, may be leaked.
As a technique for preventing the leakage, secret sharing is known by which an electronic document (file data) is encoded and divided into multiple encoded data items and distributed into different servers.
Related techniques are disclosed in, for example, Japanese Laid-open Patent Publication No. 2008-198016 and Japanese Laid-open Patent Publication No. 2008-152593.
However, even if the file data is divided into the multiple encoded data items, when the terminal uses the file data, the file data must be decoded from the encoded data items and exist in the terminal. Thus, if the file data is not immediately used and the terminal is left unused, the terminal may be stolen and the file data may be leaked. To prevent the leakage, the file data should be transmitted to the terminal immediately before the use of the file data. However, since a communication load is large, it takes time to completely transmit the file data. Therefore, a time period before the file data becomes available may be long and the convenience of users may be reduced.
According to an aspect of the embodiments, an information processing device includes a memory; and a processor coupled to the memory and the processor configured to: acquire file data to be used by a terminal; generate multiple tallies from the file data; transmit at least one tally among the multiple tallies to an external device; generate attribute information including information of the file data and information of the external device; transmit, to the terminal, the generated attribute information and the multiple tallies except for the at least one tally transmitted to the external device; and transmit the attribute information to the external device.
The object and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention.
A first embodiment of a distributed processing system is described below in detail with reference to
The cloud server 10 is an information processing device installed in a data center or other facilities and holds data for users in a company. The edge computer 20 is, for example, an information processing device installed in each of rooms (e.g., meeting room) in the company. A terminal 70 authenticated by the edge computer 20 is permitted to communicate with the edge computer 20 via an access point 68. Thus, the terminal 70 is permitted to use data held in the edge computer 20. The terminal 70 is a portable information processing device, such as a laptop personal computer (PC) or a tablet PC.
In the first embodiment, file data (hereinafter referred to as a “file”), such as a document to be used for a meeting, is transmitted from any of cloud servers 10 to the edge computer 20 set in the meeting room before the meeting is held in the company. The edge computer 20 executes tally generation process to generate tallies from the file. The tallies are a set of encoded information items to be used to restore the file data. The original file data may be restored by collecting all the tallies distributed to computers or some storages. Distributing the tallies generated in the same tally generation process to different locations may prevent the file from leaking even if the edge computer 20 is stolen.
When the file is used by the terminal 70, since there is some periods for which the file exists in the terminal 70, the file may be leaked if the terminal 70 is stolen. To shorten the time period for which the file exists in the terminal 70, the file should be transmitted to the terminal 70 immediately before the usage of the file. However, in this case, since a communication load increases immediately before the use of the file, a time period before the file becomes available may increase and the convenience of users may be reduced. Thus, in the first embodiment, it is important to prevent the leakage of the file while inhibiting the communication load.
In the first embodiment, a cloud server that holds the file to be used by the terminal 70, among the cloud servers 10, is referred to as a “cloud server 10a”. In the first embodiment, one of the cloud servers 10 is used as an external device (remote device) that holds at least one tally among the multiple tallies generated from the file by the edge computer 20. The one of the cloud servers 10 is referred to as a “remote computer 10b”.
The edge computer 20, the remote computer 10b, and the terminal 70 are described below in detail.
(Edge Computer 20)
After a file held in the cloud server 10a is transmitted from the cloud server 10a, the file receiver 21 receives the file and gives the file to the encoder 22. It is assumed that the cloud server 10a transmits the file to the edge computer 20 based on information registered by a user. The registered information includes, for example, information of the terminal that uses the file (terminal identifier (ID)), information of the user (user name), information of time when the file is used by the terminal 70 (e.g., meeting start time), and information of the file to be used (file ID and file name). Thus, the cloud server 10a transmits the file registered in the cloud server 10a to the edge computer 20 along with the information of the terminal and the user before a predetermined time when the registered file is used.
The encoder 22 executes the tally generation process for the file received by the file receiver 21. In the first embodiment, the encoder 22 executes the tally generation process, which encodes and divides the file into two types of tallies: a large tally (also referred to as L-tally) and a small tally (also referred to as S-tally). The amount of data in the large tally is larger than the amount of data in the small tally. The encoder 22 gives the large tally to the L-tally storage unit 38. The encoder 22 gives the small tally to the S-tally transmitter 28.
The S-tally transmitter 28 transmits the small tally to the remote computer 10b. The S-tally transmitter 28 causes an address of a storage destination (i.e., an S-tally storage unit 12 of the remote computer 10b) of the small tally, the information (file ID and file name) of the file, the information of the terminal, and the information of the user to be held in a file information table 34. The file information table 34 has a data structure as illustrated in
Returning to
Upon receiving a login request from a user who uses the terminal 70, the authenticator 24 executes authentication on the user. For example upon receiving a user name, a password, biological information, and other information about the user from the terminal 70, the authenticator 24 crosschecks the received items with data registered for authentication, thereby executing the authentication on the user. When the authentication of the user is successful, the authenticator 24 transmits information of the user (i.e., the user name) to the metadata generator 25.
The metadata generator 25 reads information associated with the authenticated user from the file information table 34 and generates metadata (refer to
The metadata generator 25 transmits the generated metadata to the authenticator 14 of the remote computer 10b via the authentication information transmitter 27. The metadata generator 25 also transmits the generated metadata to the L-tally transmitter 26.
The L-tally transmitter 26 references the metadata generated by the metadata generator 25 and reads the large tally corresponding to the file described in the metadata from the L-tally storage unit 38. The L-tally transmitter 26 transmits the read large tally and the metadata to the terminal 70 that is used by the user described in the metadata.
The authentication information transmitter 27 transmits the results of the detection by the terminal detector 23 and the metadata generated by the metadata generator 25 to the authenticator 14 of the remote computer 10b.
In the first embodiment, the L-tally transmitter 26 and the authentication information transmitter 27 transmit the metadata and the large tally to the terminal 70 to enable a function as a second transmitter for transmitting the metadata to the remote computer 10b.
(Terminal 70)
Next, the terminal 70 is described. The terminal 70 has a hardware configuration as illustrated in
The terminal 70 causes the CPU 190 to execute the program, thereby operating as a decoder 72 and an S-tally requester 74, which are illustrated in
Upon receiving the large tally and the metadata from the L-tally transmitter 26 of the edge computer 20, the decoder 72 gives the received metadata to the S-tally requester 74. When the S-tally requester 74 receives the small tally from the remote computer 10b, the decoder 72 to restores (decodes) the file by using the small tally and the large tally.
Upon receiving a request to use the file from the user, the S-tally requester 74 accesses the remote computer 10b by using the metadata and requests the remote computer 10b to transmit the small tally. Upon acquiring the small tally from the remote computer 10b, the S-tally requester 74 gives the acquired small tally to the decoder 72.
In the first embodiment, the decoder 72 enables functions as an acquirer for acquiring the large tally and the metadata and a restorer for restoring the file from the large tally and the small tally.
(Remote Computer 10b)
Next, the remote computer 10b is described. The remote computer 10b has a hardware configuration as illustrated in
The S-tally receiver 18 associates the small tally received from the S-tally transmitter 28 of the edge computer 20 with the file ID of the original file and causes the small tally to be stored in the S-tally storage unit 12.
The authenticator 14 causes the metadata received from the edge computer 20 to be stored in the S-tally storage unit 12. When the metadata is transmitted by the terminal 70 and reaches the authenticator 14, the authenticator 14 confirms whether the terminal 70 exists in the vicinity of the edge computer 20. The authenticator 14 confirms whether the token included in the metadata received from the terminal 70 is included in tokens included in metadata stored in the S-tally storage unit 12. The authenticator 14 executes authentication on the user based on the results of the confirmations. When the authentication is successful, the authenticator 14 transmits, to the S-tally transmitter 16, information indicating that the authentication is successful. When the authentication is failed, the authenticator 14 notifies information indicating that the authentication is failed to the S-tally requester 74 of the terminal 70.
Upon receiving, from the authenticator 14, the information indicating that the authentication is successful, the S-tally transmitter 16 acquires, from the S-tally storage unit 12, the small tally corresponding to the file ID described in the metadata received from the terminal 70 and transmits the acquired small tally to the S-tally requester 74 of the terminal 70.
(Processes of Distributed Processing System 100)
Next, processes of the distributed processing system 100 are described in detail with reference to flowcharts and other drawings.
In the first embodiment, “advance preparation”, a “terminal coupling process”, a “terminal detection process”, and a “file usage process” are executed. The processes are described below.
(Advance Preparation)
First, the advance preparation is described with reference to flowcharts of
In the advance preparation, the edge computer 20 executes processing in accordance with the flowchart of
In the processing of
In step S14, the encoder 22 executes the tally generation on the file to generate tallies from the file (refer to T2 in
In step S16, the S-tally transmitter 28 transmits the small tally to the remote computer 10b (refer to T4 in
In step S18, the encoder 22 causes the large tally to be stored in the L-tally storage unit 38 (refer to T5 in
In the processing of
In step S22, the S-tally receiver 18 receives the small tally (refer to T4 in
In step S24, the S-tally receiver 18 associates the received small tally with the file ID of the original file and causes the small tally to be stored in the S-tally storage unit 12 (refer to T6 in
(Terminal Coupling Process)
Next, the terminal coupling process is described with reference to flowcharts of
In the terminal coupling process, the edge computer 20 executes processing in accordance with the flowchart of
In the processing of
When the processing proceeds to step S32, the authenticator 24 executes an authentication process. In this case, the authenticator 24 executes authentication using the user name, the password, the biological information, and other information about the user, which are input by the user into the terminal 70.
In step S34, the authenticator 24 determines whether the authentication by the authenticator 24 is successful. When the result of the determination of step S34 is positive, the processing proceeds to step S36 and the metadata generator 25 references the file information table 34 (
In step S38, the metadata generator 25 generates metadata by using authentication information (user name) and information of the file. For example, when the file ID of the file identified in step S36 is “1a3b4d5e”, the metadata generator 25 generates metadata illustrated in
In step S40, the authentication information transmitter 27 transmits the metadata generated in step S38 to the authenticator 14 of the remote computer 10b (refer to T12 in
In step S42, the L-tally transmitter 26 reads, from the L-tally storage unit 38, the large tally of the file described in the metadata (refer to T13 in
When the authenticator 24 determines that the authentication is failed in step S34, the result of the determination of step S34 is negative and the processing proceeds to step S44.
When the processing proceeds to step S44, the authenticator 24 notifies information indicating that the authentication is failed to the terminal 70. Then, the processing by the edge computer 20 in the terminal coupling process is terminated.
While the processing of
In the processing of
While the processing of
In the processing of
In step S66 and S68, the decoder 72 stands by until either the large tally and the metadata are transmitted by the L-tally transmitter 26 of the edge computer 20 and reach the decoder 72 (step S66) or information indicating that the authentication is failed is transmitted and reaches the decoder 72 (step S68). When the large tally and the metadata are transmitted and reach the decoder 72, the result of the determination of step S66 is positive and the decoder 72 causes the processing to proceed to step S70.
When the processing proceeds to step S70, the decoder 72 receives the transmitted large tally and the transmitted metadata. The decoder 72 gives the received metadata to the S-tally requester 74 (refer to T16 in
When the information indicating that the authentication is failed is transmitted and reaches the decoder 72 while the decoder 72 stands by in step S66 and S68, the result of the determination of step S68 is positive and the decoder 72 causes the processing to proceed to step S72. In this case, the decoder 72 causes the display unit 193 to display the information indicating that the authentication is failed, and the processing by the terminal 70 in the terminal coupling process is terminated.
In the first embodiment, since the above-described terminal coupling process is executed, the large tally with a large amount of data is transmitted in advance to the terminal 70 that uses the file.
(Terminal Detection Process)
Next, the terminal detection process is described with reference to a flowchart of
In the processing of
When the processing proceeds to step S82, the terminal detector 23 detects a terminal existing in the vicinity of the edge computer 20 (for example, in the meeting room) by using the sensor 93.
In step S84, the terminal detector 23 transmits information of the detected terminal to the authenticator 14 of the remote computer 10b via the authentication information transmitter 27. The information of the detected terminal is a terminal ID of the detected terminal or the user name of a user who uses the detected terminal. Then, the processing returns to step S80 to repeatedly execute steps S82 and S84 in each of the predetermined time periods.
(File Usage Process)
Next, the file usage process is described with reference to flowcharts of
In the file usage process, the terminal 70 executes processing in accordance with the flowchart of
In the processing of
In the processing of
In step S122, the authenticator 14 receives the transmitted metadata. In step S123, the authenticator 14 determines whether the authenticator 14 receives the metadata from the terminal detected by the terminal detector 23 immediately before, or from the user of the terminal. When the result of the determination of step S123 is positive, the processing proceeds to step S124 and the authenticator 14 crosschecks the token included in the received metadata with the tokens included in the metadata stored in the S-tally storage unit 12. In step S126, the authenticator 14 determines whether the crosschecking is successful. When the result of the determination of step S126 is positive, the authenticator 14 causes the processing to proceed to step S128. When the processing proceeds to step S128, the authenticator 14 provides an instruction to the S-tally transmitter 16, to read the small tally corresponding to the file ID included in the metadata from the S-tally storage unit 12, and transmit the small tally to the terminal 70 (refer to T21 in
After step S102 illustrated in
In step S110, the decoder 72 decodes (restores) the original file from the small tally and the large tally. Accordingly, the file is available to the user of the terminal 70. In this case, since the terminal 70 receives only the small tally with a small amount of data immediately before using the file, the communication load of the terminal 70 immediately before the use of the file may be reduced.
When the information indicating that the crosschecking is failed is transmitted and reaches the S-tally requester 74 while the S-tally requester 74 stands by in step S104 and S106, the result of the determination of step S106 is positive. In this case, the S-tally requester 74 causes the processing to proceed to step S112. When the processing proceeds to step S112, the S-tally requester 74 causes the display unit 193 of the terminal 70 to display the information indicating that the crosschecking is failed.
After step S110 or S112 is executed, the processing by the terminal 70 in the file usage process is terminated.
The above-described processes (flowcharts) are repeatedly executed even after the processes are terminated (ended).
As described above in detail, according to the first embodiment, the edge computer 20 includes the encoder 22 and the S-tally transmitter 28. The encoder 22 acquires the file to be used by the terminal 70 and generates the large tally and the small tally from the file. The S-tally transmitter 28 transmits the small tally to the remote computer 10b. The edge computer 20 also includes the metadata generator 25, the L-tally transmitter 26, and the authentication information transmitter 27. The metadata generator 25 generates the metadata including the information of the file and the information of the storage destination of the small tally. The L-tally transmitter 26 transmits the generated metadata and the large tally to the terminal 70. The authentication information transmitter 27 transmits the metadata to the remote computer 10b. In the first embodiment, the large tally and the small tally are held in the different devices. Thus, even if any of the devices is stolen, it is possible to prevent the file from leaking. The terminal 70 to which the large tally has been transmitted in advance acquires the small tally from the remote computer 10b by using the metadata to decode the file. Thus, after the terminal 70 acquires the small tally immediately before using the file, the file becomes available to the terminal 70. In this case, it is sufficient if the terminal 70 acquires the small tally with a small amount of data immediately before using the file. Thus, even when the file has a large amount of data, the communication load immediately before the use of the file may be reduced. Thus, since it is possible to shorten a waiting period between the time when a request to use the file is provided by the user and the time when the file becomes available, the convenience of users may be improved.
In the first embodiment, the decoder 72 of the terminal 70 acquires the large tally and the metadata from the edge computer 20. When a request to use the file is provided by the user, the S-tally requester 74 accesses the remote computer 10b by using the metadata to receive the small tally. Then, the decoder 72 restores the file from the large tally and the small tally. In this case, since the terminal 70 decodes the file by using the small tally received immediately before the use of the file, it is possible to shorten a time period for which the file exists in the terminal 70 and the file is not used. Thus, it is possible to prevent the leakage of the file. In the first embodiment, since the decoder 72 of the terminal 70 restores the file by using the large tally and the small tally, the edge computer 20 does not need to restore the file. This may reduce a load of the edge computer 20.
According to the first embodiment, the metadata includes the token that indicates authentication information to be used to authenticate the terminal 70 in the remote computer 10b. Thus, the acquisition of the small tally by a malicious third party who impersonates the user may be prevented.
According to the first embodiment, the edge computer 20 includes the terminal detector 23 that detects a terminal existing in the vicinity of the edge computer 20, and the authentication information transmitter 27 transmits a result of the detection by the terminal detector 23 to the remote computer 10b. Upon receiving metadata from the terminal existing in the vicinity of the edge computer 20, the remote computer 10b executes authentication using the metadata. This may prevent the small tally from being transmitted to a terminal not existing in the vicinity of the edge computer 20 (for example, a terminal not existing in the meeting room). Thus, security may be improved.
In the first embodiment, since the small tally is stored in the S-tally storage unit 12 of the remote computer 10b, the remote computer 10b transmits the small tally with a small amount of data to the terminal immediately before the use of the file. This may reduce the communication load, compared to the case where the edge computer 20 transmits the large tally to the terminal immediately before the use of the file.
Although the first embodiment describes the case where the small tally is transmitted to the remote computer 10b, the first embodiment is not limited to this. For example, the large tally may be transmitted to the remote computer 10b.
Although the first embodiment describes the case where the encoder 22 generates the two tallies from the file in the tally generation, the first embodiment is not limited to this. For example, the encoder 22 may generate three or more tallies from the file in the tally generation. In this case, one or multiple tallies among the generated tallies may be transmitted to the remote computer 10b. Multiple tallies among the generated tallies may be transmitted to different remote computers. In this case, the metadata generator 25 may generate metadata corresponding to the multiple tallies and transmit the metadata to the terminal 70.
Next, a second embodiment is described with reference to
Functions of devices that are different from the functions described in the first embodiment are mainly described below using functional configurations illustrated in
An edge computer 20 according to the second embodiment includes an encryption key generator 129, as illustrated in
A terminal 70 according to the second embodiment includes an encryption key requester 174 as the receiver, instead of the S-tally requester 74 described in the first embodiment. A remote computer 10b according to the second embodiment also includes an encryption key storage unit 112, an encryption key transmitter 116, and an encryption key receiver 118, instead of the S-tally storage unit 12, the S-tally transmitter 16, and the S-tally receiver 18, respectively, which are described in the first embodiment.
Processes according to the second embodiment that are “advance preparation”, a “terminal coupling process”, a “terminal detection process”, and a “file usage process” are described below.
(Advance Preparation)
In the second embodiment, a process illustrated in
Then, the encryption key transmitter 128 transmits the encryption key to the encryption key receiver 118 of the remote computer 10b (refer to T4 in
Then, the processing by the remote computer 10b in the advance preparation is terminated. When the advance preparation is terminated, the encrypted data is already stored in the encrypted data storage unit 138 of the edge computer 20 and the encryption key is already stored in the encryption key storage unit 112 of the remote computer 10b. In the second embodiment, the encrypted data and the encryption key are stored in the storage units of the different devices. Thus, for example, even if the device storing the encrypted data is stolen, it is possible to prevent the file from leaking.
(Terminal Coupling Process)
As is apparent from the comparison of
(Terminal Detection Process)
The terminal detection process according to the second embodiment is the same as or similar to the terminal detection process described in the first embodiment.
(File Usage Process)
As illustrated in
In the flowcharts of
As is apparent from the above description, in the second embodiment, the encrypted data transmitter 126 and the authentication information transmitter 27 transmit the metadata and the encrypted data to the terminal 70 and enable functions as the second transmitter for transmitting the metadata to the remote computer 10b. The decoder 72 enables functions as an acquirer for acquiring the encrypted data and the metadata and a decryptor for decrypting the encrypted data to the file by using the encryption key.
According to the second embodiment, the edge computer 20 includes the encoder 22 that acquires the file to be used by the terminal 70 and uses the encryption key to generate the encrypted data, and the encryption key transmitter 128 that transmits the encryption key to the remote computer 10b. The edge computer 20 also includes the metadata generator 25 that generates the metadata including the information of the file and the information of the storage destination of the encryption key, the encrypted data transmitter 126 that transmits the generated metadata and the encrypted data to the terminal 70, and the authentication information transmitter 27 that transmits the metadata to the remote computer 10b. In the second embodiment, the encryption key and the encrypted data are held in the different devices. Thus, even if any of the devices is stolen, it is possible to prevent the file from leaking. The terminal 70 to which the encrypted data has been transmitted in advance acquires the encryption key from the remote computer 10b by using the metadata. Thereafter, the terminal 70 may decode (decrypt) the encrypted data to the file. Thus, after the terminal 70 acquires the encryption key immediately before using the file, the file becomes available to the terminal 70. It is sufficient that the terminal 70 acquires the encryption key with a small amount of data immediately before using the file. Thus, even when the file has a large amount of data, the communication load immediately before the use of the file may be reduced. Since it is possible to shorten a waiting period between the time when the user provides a request to use the file and the time when the file becomes available, the convenience of users may be improved.
In the second embodiment, the decoder 72 of the terminal 70 acquires the encrypted data and the metadata from the edge computer 20. When a request to use the file is provided from the user, the encryption key requester 174 accesses the remote computer 10b by using the metadata to receive the encryption key. Then, the decoder 72 decrypts the encrypted data into the file by using the encryption key. Since the terminal 70 decrypts the encrypted data into the file by using the encryption key received immediately before the user uses the file, it is possible to shorten a time period for which the file exists in the terminal 70 and the file is not used. It is, therefore, possible to prevent the leakage of the file. In the second embodiment, since the decoder 72 of the terminal 70 decrypts the encrypted data, the edge computer 20 does not need to decrypt the encrypted data. This may reduce the load of the edge computer 20.
Although the second embodiment describes the case where the edge computer 20 transmits the encrypted data to the terminal 70 in advance and the encryption key is stored in the remote computer 10b, the second embodiment is not limited to this. For example, the edge computer 20 may transmit the encryption key to the terminal 70 in advance and the encrypted data may be stored in the remote computer 10b.
Although the embodiments describe the case where the authenticator 14 determines whether the terminal 70 exists in the vicinity of the edge computer 20 before the authenticator 14 executes the authentication, the embodiments are not limited to this. For example, the authenticator 14 may execute the authentication regardless of whether the terminal 70 exists in the vicinity of the edge computer 20. In this case, the edge computer 20 does not need to include the terminal detector 23.
Although the embodiments describe the case where the distributed processing system 100 is used in the company, the embodiments are not limited to this. For example, the distributed processing system 100 may be used in a school or other public facilities. In the school case, the large tally or the encrypted data may be transmitted to the terminal 70 used by a teacher before the start of a class, and the terminal 70 may request the remote computer 10b to transmit the small tally or the encryption key when the teacher indicates the start of the class.
The above-described processing functions may be enabled by a computer. In that case, a program is provided, which describes the processing details of the functions that the processing devices are supposed to have is provided. The above-described processing functions are enabled in the computer by causing the computer to execute the program. The program that describes the processing details may be stored in a computer-readable storage medium (excluding a carrier wave).
To distribute the program, a portable storage medium storing the program is marketed, for example. The portable storage medium is a digital versatile disc (DVD), a compact disc read-only memory (CD-ROM), or the like. The program may be stored in a storage device of a server computer and transferred from the server computer to another computer via a network.
The computer configured to execute the program stores, in a storage device of the computer, the program stored in the portable storage medium or transferred from the server computer. Then, the computer reads the program from the storage device of the computer and executes the processes in accordance with the program. The computer may read the program directly from the portable storage medium and execute the processes in accordance with the program. Every time the program is transferred to the computer from the server computer, the computer may sequentially execute the processes in accordance with the program.
According to an aspect of the embodiments, it is possible to achieve measures against information leakage while reducing the communication load.
All examples and conditional language provided herein are intended for the pedagogical purposes of aiding the reader in understanding the invention and the concepts contributed by the inventor to further the art, and are not to be construed as limitations to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although one or more embodiments of the present invention have been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
2019-012786 | Jan 2019 | JP | national |