[go: up one dir, main page]

CN111311790A - Rapid matching method and system for passwords - Google Patents

Rapid matching method and system for passwords Download PDF

Info

Publication number
CN111311790A
CN111311790A CN202010054932.XA CN202010054932A CN111311790A CN 111311790 A CN111311790 A CN 111311790A CN 202010054932 A CN202010054932 A CN 202010054932A CN 111311790 A CN111311790 A CN 111311790A
Authority
CN
China
Prior art keywords
matching
password
character
preset
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010054932.XA
Other languages
Chinese (zh)
Inventor
徐宏
李涛
高永会
苏钉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Tuya Information Technology Co Ltd
Original Assignee
Hangzhou Tuya Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Tuya Information Technology Co Ltd filed Critical Hangzhou Tuya Information Technology Co Ltd
Priority to CN202010054932.XA priority Critical patent/CN111311790A/en
Publication of CN111311790A publication Critical patent/CN111311790A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application discloses a rapid password matching method, which comprises the following steps: the device receives a first password character; the equipment compares the first password character with a preset character; and when the matching relation between the first password character and the preset character meets a first preset rule, unlocking the equipment. Compared with the prior art, the method has the following beneficial effects: the password matching method has the advantages that the password is input and matched in the password inputting process, a user directly outputs a matching result when inputting is completed or after clicking a submit key, and the problems that in the prior art, the matching speed is low and the user experience is not good are solved.

Description

Rapid matching method and system for passwords
Technical Field
The application relates to the field of intelligent locks, in particular to a quick password matching method.
Background
Smart locks are gaining increasing consumer popularity with their more convenient, and more secure advanced capabilities. The unlocking mode of the intelligent lock has various modes, and password unlocking is the most basic unlocking mode.
Traditional intelligence lock, password input design is comparatively simple, as long as need input all assorted passwords alright unblock promptly. However, in the prior art, matching is started only after the user inputs the password and clicks the submit key. Therefore, the problem of long matching time exists inevitably, and the experience of the user is poor. Furthermore, if the operation performance of a master control of the intelligent lock is poor and simultaneously supports a password (such as an apartment door lock) capable of creating 1000+, there is a serious hysteresis in matching the input result.
Disclosure of Invention
The main objective of the present application is to provide a method for quickly matching a password, which includes:
the device receives a first password character;
the equipment compares the first password character with a preset character;
and when the matching relation between the first password character and the preset character meets a first preset rule, unlocking the equipment.
Optionally, the first password character is a 1-bit first password character, the device continuously compares the 1-bit first password character for multiple times, and when the comparison result of multiple times meets a preset condition, the device is unlocked.
Optionally, the preset character is multiple sets of first password information pre-stored in the device, and each set of the first password information includes: the password comprises a first password, a first password length and a first password state, wherein the first password comprises all the 1-bit first password characters.
Optionally, the first cryptographic state comprises: active or activated, inactive or deactivated, and null states.
Optionally, the comparing, by the device, the first password character with a preset character includes:
the device compares the first password character with a preset character according to a preset matching format, wherein the matching format comprises: the first password, the matching state, the matching digit and the first password length;
when the equipment receives 1-bit first password character, comparing the 1-bit first password character with first passwords in all the first password information, wherein the first passwords are valid or corresponding to activation;
when the matching is successful, the matching digit changes according to a second preset rule, otherwise, the matching digit is reset;
when the relation between the matching digit and the first password length accords with a third preset rule, changing the matching state to a first matching success state;
and when the matching state is a first matching success state, the equipment is unlocked.
Optionally, when the matching relationship between the first password character and the preset character satisfies a first preset rule, the unlocking the device includes:
the matching state is a first matching success state;
the device receives an unlocking request;
the device is unlocked.
Optionally, when the matching relationship between the first password character and the preset character satisfies a first preset rule, the unlocking the device includes:
the matching state is a first matching success state;
the device continues to receive a second password character, and the matching state is changed into a second matching success state;
the device receives the unlocking request;
the device is unlocked.
Optionally, when the device receives the unlocking request, the data of which the matching state is the first matching success state and the second matching success state is called.
According to another aspect of the present application, there is also provided a system for fast matching of passwords, comprising:
a receiving module for receiving a first password character by a device;
the comparison module is used for comparing the first password character with a preset character by the equipment;
and the unlocking module is used for unlocking the equipment when the matching relation between the first password character and the preset character meets a first preset rule.
The application also discloses a computer device, which comprises a memory, a processor and a computer program stored in the memory and capable of being executed by the processor, wherein the processor realizes the method of any one of the above items when executing the computer program.
Compared with the prior art, the method has the following beneficial effects:
the password matching method has the advantages that the password is input and matched in the password inputting process, a user directly outputs a matching result when inputting is completed or after clicking a submit key, and the problems that in the prior art, the matching speed is low and the user experience is not good are solved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
FIG. 1 is a flow diagram of a method for rapid matching of passwords according to one embodiment of the present application;
FIG. 2 is a diagram of a cryptographic storage data format according to one embodiment of the present application;
FIG. 3 is a table 2. a diagram of a cryptographic storage data format, according to one embodiment of the present application;
FIG. 4 is a stored list of 100 sets of passwords according to one embodiment of the present application;
FIG. 5 is a list of matching data loaded in memory according to one embodiment of the present application;
FIG. 6 is a schematic diagram of a computer device according to one embodiment of the present application;
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Referring to fig. 1, an embodiment of the present application provides a method for fast matching a password, including:
s2: the device receives a first password character;
s4: the equipment compares the first password character with a preset character;
s6: and when the matching relation between the first password character and the preset character meets a first preset rule, unlocking the equipment.
The present application uses a door lock as an example, but not limited thereto, and any device that needs to input a password to open is within the scope of the present application. In addition, the password in the present application is exemplified by numbers, and is not limited thereto, and any character or byte or character string that can be used for inputting the password is within the scope of the present application.
In order to save the comparison time, the user can start the correct comparison operation when inputting the password. For example, the password of the door lock has six digits, which is 123456. In this embodiment, the comparison is performed every time two passwords are input. When a user inputs 1 and 2 on the door lock, the door lock starts comparison work, the 1 and 2 are compared with the first bit and the second bit of the prestored password, and when the comparison is successful, the first bit is marked to be successfully matched, and the second bit is marked to be successfully matched. When the comparison is unsuccessful, the door lock does nothing or is marked as unsuccessful. The user inputs 1, 2, 3, 4, 5, 6. When all the input passwords are successfully matched with the prestored passwords, the door lock is opened, or when one or more passwords are successfully matched, the door lock is opened. The coded lock does not need to wait until all six passwords are input and then starts the comparison work, but the comparison work is completed by dividing the comparison work for several times. Therefore, the information amount of the coded lock processed at one time is reduced, namely, the time of single comparison is shortened, and the time of waiting for opening the door by a user after all the codes are input is shortened.
However, this is not a limitation. The skilled person in the art can set the number of password characters compared each time according to actual conditions, two or three digits can be compared each time, and even an indefinite number of password characters can be compared each time. Therefore, the first password character described in the present embodiment does not refer to a single character, but one of the components of the entire password. The number of the bits of the whole password is reduced, and the aim of grouping and comparing the whole password can be achieved. All falling within the scope of the claims of the present application.
In an embodiment of the application, the first password character is a 1-bit first password character, the device continuously compares the 1-bit first password character for multiple times, and when the comparison result of the multiple times meets a preset condition, the device is unlocked.
In this embodiment, there is only a 1-bit password in the composition. For example, when a user inputs 1 on the door lock, the door lock starts comparison work, 1 is compared with the first digit of the pre-stored password, and when the comparison is successful, the first digit is marked to be successfully matched. When the comparison is unsuccessful, the door lock does nothing or is marked as unsuccessful. The user inputs 1, 2, 3, 4, 5, 6. When all the input passwords are successfully matched with the prestored passwords, the door lock is opened, or when one or more passwords are successfully matched, the door lock is opened.
As shown in fig. 2, in an embodiment of the present application, the preset characters are multiple sets of first password information pre-stored in the device, where each set of the first password information includes: the password comprises a first password, a first password length and a first password state, wherein the first password comprises all the 1-bit first password characters. Where StorePwd represents the storage format of the password.
The first password bit stores the password itself (e.g. 123456), the first password length stores the number of bits occupied by the password (e.g. 6 bits), and the first password status is various statuses (e.g. valid or activated, invalid or deactivated and null) of the password itself stored in the first password.
When the password lock receives the password for inputting, the password input by the user is compared with the password stored in the first password, and when the matching is successful, the password lock is unlocked.
In an embodiment of the present application, the comparing, by the device, the first password character with a preset character includes:
the device compares the first password character with a preset character according to a preset matching format, wherein the matching format comprises: the first password, the matching state, the matching bit number, and the first password length (see fig. 3). The matching format of the password is represented by MatchPwd.
When the equipment receives 1-bit first password character, comparing the 1-bit first password character with first passwords in all the first password information, wherein the first passwords are valid or corresponding to activation;
when the matching is successful, the matching digit changes according to a second preset rule, otherwise, the matching digit is reset;
when the relation between the matching digit and the first password length accords with a third preset rule, changing the matching state to a first matching success state;
and when the matching state is a first matching success state, the equipment is unlocked.
For example, the current combination lock supports the storage of 100 sets of cryptographic data (as shown in FIG. 4), and the device currently stores cryptographic information as shown in the table below, where StorePwd0, 2, 97, 99 are valid and none are otherwise valid.
The cipher lock loads the stored ciphers into the memory and converts the ciphers into MatchPwd format, if the cipher state is valid, the matching state is set to 0, otherwise, the matching state is set to an invalid/forbidden state 0xFF, and meanwhile, the number of the matching bits is cleared to 0. And loading the matching data list in the memory according to the algorithm rule, as shown in fig. 5.
When a user types a password, the input number is compared with the password with a non-invalid matching state in the MatchPwd 1-n list every time, the number of digits of the matched password corresponds to a matching digit field (if the current matching digit is 0, the number of digits of the matched password is 1 st digit of the compared password), if the matching is successful, the number of the matched digit is increased by 1, otherwise, the number of digits is clear by 0. However, this is not a limitation, i.e. the time is not always counted from 0, and 1 is added every time the pairing is successful. The rules may be varied by those skilled in the art depending on the actual situation. For example, 2 or another number at a time, or an indefinite number at a time, and may even start with a number (e.g., 10) and decrease by 1 every time it succeeds. All falling within the scope of the claims of the present application.
And (3) adding 1 to the matching state value when the matching digit is equal to the password length as the user sequentially keys in the password, and clearing 0 the matching digit. The combination lock is then unlocked. However, it is not limited thereto, and those skilled in the art can change the rule according to actual requirements. For example, when one or more of the user-entered passwords are the same as the preset password, the unlocking is performed. In addition, other numbers may be added to or otherwise changed in the matching state value. That is, the matching state value can distinguish the state when the unlocking condition is reached and the state when the unlocking condition is not reached. Likewise, the matching bit number may or may not be clear of 0. When the value is not clear from 0, the counting can be continued or the recording mode can be changed to other recording modes, as long as the value can trigger to change the matching state value when the next number (for example, 12) meeting the unlocking condition is reached. All of which are intended to be encompassed by the present application.
In an embodiment of the present application, when a matching relationship between the first password character and the preset character satisfies a first preset rule, the unlocking the device includes:
the matching state is a first matching success state;
the device receives an unlocking request;
the device is unlocked.
For example, after the user has input all the passwords, the password lock executes the unlocking action only when the user needs to click the submit button to request triggering of the unlocking action.
In an embodiment of the present application, when a matching relationship between the first password character and the preset character satisfies a first preset rule, the unlocking the device includes:
the matching state is a first matching success state;
the device continues to receive a second password character, and the matching state is changed into a second matching success state;
the device receives the unlocking request;
the device is unlocked.
For example, when the user has finished entering 123456, the user does not stop, but continues to enter other numbers (e.g., 78) before clicking on the submit button. The code actually received by the combination lock at this time comprises two parts: the actual password (123456, i.e., the first password) + the interference password (78, the second password). At which point the match status changes from 1 to 2 (i.e., adds 1 to the status value that has been successfully matched). At this time, the user clicks the submit button, and the coded lock retrieves the data related to the number corresponding to the matching state values 1 and 2 (greater than 0). Therefore, the user can be ensured not to know what the real password of the user is even if someone peeps when inputting the password.
According to an embodiment of the present application, there is also provided a system for quickly matching a password, including:
a receiving module for receiving a first password character by a device;
the comparison module is used for comparing the first password character with a preset character by the equipment;
and the unlocking module is used for unlocking the equipment when the matching relation between the first password character and the preset character meets a first preset rule.
Compared with the prior art, the method has the following beneficial effects:
the password matching method has the advantages that the password is input and matched in the password inputting process, a user directly outputs a matching result when inputting is completed or after clicking a submit key, and the problems that in the prior art, the matching speed is low and the user experience is not good are solved.
Referring to fig. 6, the present application further provides a computer device including a memory, a processor, and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of the above methods when executing the computer program.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. A quick matching method for passwords is characterized by comprising the following steps:
the device receives a first password character;
the equipment compares the first password character with a preset character;
and when the matching relation between the first password character and the preset character meets a first preset rule, unlocking the equipment.
2. The method for matching passwords rapidly as claimed in claim 1, wherein the first password character is a 1-bit first password character, the device continuously compares the 1-bit first password character for a plurality of times, and when the comparison result of the plurality of times meets a preset condition, the device is unlocked.
3. The method for matching passwords quickly as claimed in claim 2, wherein the preset characters are a plurality of groups of first password information pre-stored by the device, and each group of the first password information includes: the password comprises a first password, a first password length and a first password state, wherein the first password comprises all the 1-bit first password characters.
4. The method for fast matching of passwords according to claim 3, wherein the first password state comprises: active or activated, inactive or deactivated, and null states.
5. The method of claim 4, wherein the comparing the first password character with a predetermined character by the device comprises:
the device compares the first password character with a preset character according to a preset matching format, wherein the matching format comprises: the first password, the matching state, the matching digit and the first password length;
when the equipment receives 1-bit first password character, comparing the 1-bit first password character with first passwords in all the first password information, wherein the first passwords are valid or corresponding to activation;
when the matching is successful, the matching digit changes according to a second preset rule, otherwise, the matching digit is reset;
when the relation between the matching digit and the first password length accords with a third preset rule, changing the matching state to a first matching success state;
and when the matching state is a first matching success state, the equipment is unlocked.
6. The method for rapidly matching passwords according to claim 5, wherein when the matching relationship between the first password character and the preset character meets a first preset rule, the unlocking of the device comprises:
the matching state is a first matching success state;
the device receives an unlocking request;
the device is unlocked.
7. The method for rapidly matching passwords according to claim 6, wherein when the matching relationship between the first password character and the preset character meets a first preset rule, the unlocking of the device comprises:
the matching state is a first matching success state;
the device continues to receive a second password character, and the matching state is changed into a second matching success state;
the device receives the unlocking request;
the device is unlocked.
8. The method for matching passwords rapidly as claimed in claim 7, wherein when the device receives the unlock request, the data of which the matching states are a first matching success state and a second matching success state is invoked.
9. A system for rapid matching of passwords, comprising:
a receiving module for receiving a first password character by a device;
the comparison module is used for comparing the first password character with a preset character by the equipment;
and the unlocking module is used for unlocking the equipment when the matching relation between the first password character and the preset character meets a first preset rule.
10. A computer device comprising a memory, a processor and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of claims 1-8 when executing the computer program.
CN202010054932.XA 2020-01-17 2020-01-17 Rapid matching method and system for passwords Pending CN111311790A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010054932.XA CN111311790A (en) 2020-01-17 2020-01-17 Rapid matching method and system for passwords

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010054932.XA CN111311790A (en) 2020-01-17 2020-01-17 Rapid matching method and system for passwords

Publications (1)

Publication Number Publication Date
CN111311790A true CN111311790A (en) 2020-06-19

Family

ID=71150947

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010054932.XA Pending CN111311790A (en) 2020-01-17 2020-01-17 Rapid matching method and system for passwords

Country Status (1)

Country Link
CN (1) CN111311790A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113535987A (en) * 2021-09-13 2021-10-22 杭州涂鸦信息技术有限公司 Linkage rule matching method and related device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051454A (en) * 2012-12-19 2013-04-17 天地融科技股份有限公司 Electronic equipment and password authentication method thereof
CN104182678A (en) * 2014-04-24 2014-12-03 东莞盛世科技电子实业有限公司 Password verification device and password verification method
CN106096385A (en) * 2016-06-24 2016-11-09 Tcl移动通信科技(宁波)有限公司 A kind of unlocking processing method based on mobile terminal and system
CN109257747A (en) * 2018-11-19 2019-01-22 Tcl移动通信科技(宁波)有限公司 Mobile terminal WIFI connection processing method, mobile terminal and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051454A (en) * 2012-12-19 2013-04-17 天地融科技股份有限公司 Electronic equipment and password authentication method thereof
CN104182678A (en) * 2014-04-24 2014-12-03 东莞盛世科技电子实业有限公司 Password verification device and password verification method
CN106096385A (en) * 2016-06-24 2016-11-09 Tcl移动通信科技(宁波)有限公司 A kind of unlocking processing method based on mobile terminal and system
CN109257747A (en) * 2018-11-19 2019-01-22 Tcl移动通信科技(宁波)有限公司 Mobile terminal WIFI connection processing method, mobile terminal and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113535987A (en) * 2021-09-13 2021-10-22 杭州涂鸦信息技术有限公司 Linkage rule matching method and related device
CN113535987B (en) * 2021-09-13 2022-01-21 杭州涂鸦信息技术有限公司 Linkage rule matching method and related device

Similar Documents

Publication Publication Date Title
US12328382B2 (en) Method for controlling the flow execution of a generated script of a blockchain transaction
Zuckerman Simulating BPP using a general weak random source
Volpano et al. Verifying secrets and relative secrecy
Millen Finite-state noiseless covert channels
US10715320B2 (en) Password generation with key and derivation parameter
US20130298223A1 (en) Methods and computing devices for password verification
CN107181600B (en) Password login authentication method and system, user equipment and authentication server
Ciaramella et al. Neural network techniques for proactive password checking
EP0543304B1 (en) Method and system for access validation in a computer system
CN111311790A (en) Rapid matching method and system for passwords
CN116527258B (en) Unlocking method, device, equipment and storage medium of coded lock
US20140047555A1 (en) Method and system for securing a software program
KR20190122430A (en) Method of de-mixing for Bitcoin mixing services
CN109858229A (en) Terminal and its dynamic unlocking method, memory
Tao et al. From online to non-iid batch learning
CN116132977A (en) Mouse safety encryption authentication method
CN107577927A (en) A kind of unlocking screen method, the device and intelligent terminal with store function
CN113742672A (en) Information security protection method and device
CN117556411B (en) Password generation method, password generation device, and readable storage medium
Mowbray Causal security
CN110766840A (en) Access control password setting method and device
CN113158165B (en) Method and device for rapidly locking application of Android terminal
JP2007310819A (en) Password generation method with improved resistance to password analysis and authentication device using this password
CN114285552B (en) N-th voting method and device based on block chain
CN109639882A (en) Screen locking control method, screen locking control device and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200619