![]() APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF DNS DATA AND DOMAIN NAMES.
专利摘要:
公开号:BE1020923A4 申请号:E201300318 申请日:2013-05-08 公开日:2014-09-02 发明作者: 申请人:Register Nv; IPC主号:
专利说明:
Title: Application for efficiently configuring and managing j DNS data and domain names A. Description A.l. Technical domain The present invention relates to an IT system for an efficient installation and management of IT systems for DNS and domain names, which are made available to users via a physical, virtual or wireless network. In particular, it concerns a specific set-up of an IT environment from which administrators of such systems are allowed to manage DNS data and applications, including domain names simultaneously or separately, as well as to both buyers and users of domain names and DNS applications and data to efficiently manage and use such domain names, as well as DNS applications and data. A.2. Background Art 1. To date, most of the internet-based applications are installed and data stored on a computer connected to an internal network and / or to the internet, from where they are made accessible to and made available to all or certain users of these applications and data. In most cases this concerns one or a limited number of physical machines that is or are capable of controlling or managing various applications and processes. 2. Various applications and processes are usually housed and controlled from these physical machines (commonly referred to as "servers"), such as receiving, storing and sending e-mails, storing and making websites available, etc. In both For example, individual software applications are installed on one physical machine (in both cases a mail server and a Web server) that the administrator (s) of the installed applications must configure, manage and maintain separately. 3. These physical machines can be owned by a company that specializes in providing such data and applications (a so-called "hosting company"). If the machines are also the property of the owner of the data and the applications, but are located at a hosting company because of the fact that it has a suitable environment, this is called "housing". 4. In order to be able to easily locate and assign the data and the applications made available via the network to the owner [and users] thereof, this data and applications, both of which can be intrinsically different in nature, are often placed on a single machine. 5. Such an arrangement intrinsically entails a number of significant limitations and risks, including: [i] the failure of the physical machine automatically means that the various software applications, processes and data are no longer made available to users , and in the worst case are even permanently lost. Such failures can be the result of a technical problem inside the machine itself, or an external factor such as fire, power outages, etc .; For such situations or incidents, different solutions are traditionally possible, which entail all technical difficulties, human intervention and increased costs: making backup copies (so-called backups) of the applications and data installed on the physical machine at different times. made available, which should be placed on another physical server in the event of the failure of the physical server, and thus be made available again to users. This solution has several disadvantages: the data must be copied at repeated times; the copies must be kept at a different location; if the physical machine fails, the last backups must be retrieved and installed on a new physical machine to be configured such as the initial physical machine, etc. Such acts also entail intrinsically that additional costs must be incurred by the manager or owner of the server no longer functioning, the temporary unavailability of potentially critical applications and data for users, and in most cases also the loss of the latter version of this data [namely those created since the creation of the last backup]. Another possible solution is to permanently have another physical machine available at a different location that always has a complete copy of the applications, processes and data made available on the initial server. It goes without saying that such an arrangement may entail considerable additional costs for the owner or manager of these servers, since it is not only necessary to invest in one but in two or even several physical machines, the purchase of multiple applications licenses and the provided with a permanent network connection between the different servers. Ideally, these physical machines should also be placed at different physical locations, to cope with the impact of major disasters (eg devastating company fire). (ii) Since the physical server must be connected to the Internet or to another network in order to perform the above tasks, the failure of the network connection also means that the applications, processes and data available on the Web server - albeit temporarily , until the time when the connection is restored - no longer available to users. Hence also the reason why the different physical servers are connected to different information society service providers, and in particular those companies that provide access to the internet or install and make private networks available to users, which also entails significant additional costs for the owner or managers of the servers; 6. In all cases mentioned above, the owner or managers of the various physical machines / servers must be responsible for the installation, configuration and permanent management of not only the physical machines (eg the replacement of network connections, hard disks, memory modules, edm] but also the software applications, processes and data that are installed on the machines and made available to users, which often entails - in particular for mission-critical applications - the need for permanent personnel to carry out technical interventions (both on In addition, such personnel must always be aware of the latest developments in hardware, applications and processes offered by the service providers, but at the same time they may also have highly outdated technology that continue to be supported by users. 7. The ubiquitous availability of high-capacity networks, the fact that costs for computers and storage devices are coming under increasing pressure, as well as the widespread introduction of virtualization of hardware, IT-based architecture, autonomous and utility computing to a huge growth in cloud computing. 8. This virtualization means that keeping an IT system (platform, applications, processes and data) available does not depend on being available to a single physical machine (server), but that tasks are divided between different physical machines. In this way the so-called "single point of failure" risk is taken care of: in such a case the failure of the machine on which all platforms, applications, processes and data are housed would result in none of these elements being accessible anymore . 9. In autonomous computing (or "autonomy computing"), system administrators install applications on the various physical machines, allowing these machines to autonomously manage the various components required for the processes being monitored (e.g., storage space, connectivity, processor capacity, computer memory ). In this way these different processes and sources can be used in a more efficient way. 10. Utility computing involves the provision of various IT services as individual products, whereby users do not pay for hardware, but only for the actual sources that they use. Hereby, customers of such service packages are paid for the processes and resources that are used, rather than for (the rent of) physical machines. Utility computing therefore formed the basis on which cloud computing was developed. 11. The evolution that cloud computing has entailed therefore essentially involves the virtualization of physical equipment, network connectivity and software applications and processes, as well as data that can be created, consulted and modified with the help of these applications and processes. In the context of cloud computing, the various applications, processes and data are not hosted or controlled on a single server, but on different (physical) servers. 12. These physical servers are housed in a network that is therefore configured to make decisions on the basis of the demand for specific data or processes regarding the number of locations where this data is stored, the number of copies made of this data, and the way in which this data is made available. For example, a data file that is frequently consulted (but not modified) will be made available on different physical machines in the network. 13. Therefore, every time a service of the information society is set up that involves the management and making available of data, a distinction must always be made between the above three elements in the service, usually referred to as "layers": an infrastructure layer , a platform layer, and an application layer. 14. In the first place, the service provider must make a choice about which infrastructure he or she offers. This is often a combination of hardware (servers, network connections, etc.) and software that is installed and configured on this hardware. The choice of the infrastructure often determines the choice of the platform to be placed on top of this infrastructure. 15. The platform usually involves the so-called management system of the systems to be set up, in addition to the interfaces used by managers of these systems to install, configure and manage computer applications. The platform is therefore usually this layer in a computer infrastructure that is used to make applications available to users. In turn, the chosen platform is often determining for the applications that can be installed on the IT system, in which programming language these applications should be written, etc. 16. It is mainly the applications that are relevant to users, since they come into direct contact with these elements, work, create data, change them and make them available to others if necessary. In most cases, users only sporadically or only indirectly come into contact with the actual platform or infrastructure, since these last two layers have a critical but purely supportive function for the correct and permanent functioning of the applications. 17. The most important common feature of each of the above categories of information society services is that they are all based on the concept that IT infrastructures, platforms, applications, processes and data directly or indirectly related to them upon request can be made available to the user via secure or non-secured channels, such as the internet, or otherwise, remotely (ie without the service provider and the user having to be at the same physical location). 18. From the above categories, certain specific applications, functions and functionalities can also be supplied separately as a service, in some cases even independent of the way in which the infrastructure or platform is managed and used. 19. The invention described and claimed herein relates to an IT system that manages domain names and related DNS applications and data. 20. However, since there are different IT infrastructures, managers of such infrastructures have to make choices between the different systems and applications used to manage these domain names and the related DNS applications and data. In particular, when these system administrators manage different types of systems and applications, they must take into account important constraints imposed by the infrastructures, platforms, systems and applications they set up. 21. The choices made by an administrator are mainly inspired by the fact that different recipients of domain names wish to set up specific and consequently separate configurations of such domain names and the related DNS applications and data, which the administrators and / or require customers to provide separate installations of the same systems and applications. 22. The consequence of this is that a single IT infrastructure contains several installations of the same systems and applications, each with their own specific characteristics, functions and functionalities. This also entails various problems for its manager, who, for example when a new update or version of a certain system or application is made available by the manufacturer, must not only offer all its customers the option of to install this new release or version, but must also perform separate installations of this release or update for every customer who wishes to use it. 23. This logically has the consequence that - over time - the management of the various systems and applications becomes unclear, both for the system administrator and for its customers. 24. In view of this problem, system administrators therefore offer their customers a limited choice of systems and applications, which naturally does not benefit the flexibility in the supply. 25. One of the solutions offered for this is to offer a multitude of systems on different IT infrastructures, but this usually has a negative impact on the (efficient) management of the systems offered: flexibility in the scalability of each individual system is limited, migration from one system to another system is often difficult, administrators often risk losing sight of which customers and users are using which system, administrators are difficult to respond to changing needs of customers and users by rigid configurations of such systems, etc. 26. The objective of the invention described herein is to allow a system administrator to offer different systems and applications for domain name management and related DNS applications and data to customers and users with different needs and technical needs. backgrounds, eliminating the inefficiencies described above. A.3. Description of the Invention 27. The invention described herein relates to an IT system that provides for a more efficient and personalized installation, configuration and management of one or more systems and applications for the management of domain names and related DNS applications and data, and this applies both to the manager of such systems, to the customers and to their users. 28. This system consists of a set of interdependent and independent processes with the aim of: (i) eliminating certain disadvantages and difficulties of the technologies used and commercialized today, whereby users, based on their own level of knowledge , can make certain adjustments to the chosen IT infrastructure, platforms, applications, and processes in order to make optimal use of the services purchased; (ii) make the management of these IT infrastructures, platforms, applications, processes and data more efficient for system administrators; (iii) facilitate the expansion of these IT infrastructures, platforms, applications, processes, limiting "down-time" and, in some cases, eliminating them completely; (iv) interdependence between the different IT platforms, - eliminate applications and processes that are managed and made available to users on a single IT infrastructure and give individual users or groups of users the opportunity to create individualized solutions and configurations of such platforms, applications, and - select and use processes independently of the underlying IT infrastructure (v) improve the functionality of the various processes, applications and data made available (vi) the speed of processing the various processes, applications and data made available to increase. 29. The IT system is an integrated set of physical machines and hardware and software components that detect changes to the IT system and autonomously optimizes the IT system in terms of operation, maintenance, security and use based on the parameters indicated by the system administrator . These changes to the IT system may consist of the expansion or curtailment of the physical machines and components by the system administrator, as well as the provision by that administrator of additional (new) versions of computer programs that are managed on the IT system and / or used. In view of the technical possibilities and limitations that these changes imply, the system, if appropriate instructed by the manager, will detect these changes to the system (autonomously) and provide them with the most optimal configuration possible based on these new elements. This optimization may involve moving to new physical machines certain (frequently used) data or applications (such as websites) in order to relieve the existing physical machines from which these data and applications were made available. The IT system can also autonomously decide on new versions of management systems, computer programs that control hardware (so-called "drivers"), databases, etc. that are made available to the system administrator or the customer via the management interface, without the need for separate interventions on the individual machines that are part of the IT system. 30. One of the most important components that form part of the invention therefore involves existing and future users of one or more components that are related to the hosting and provision of systems and applications for the registration and management of domain names and the related DNS applications, data and processes using a single (graphical) interface. Using this interface, an authorized user can in the first place make his own choices about the application (s), functionality (s) and / or process (s) for registering and managing domain names and the related DNS names. applications and data that he wishes to use. It is thus possible for the user to make detailed choices himself about the necessary IT infrastructure, the platforms, applications, functionalities and processes to be used that are either offered as standard or can be adjusted by himself or third parties at the user's request. or parameterized. 31. In addition, based on parameters that can be set by the system administrator, the system will autonomously make suggestions and possibly even decide which application (s), functionality (s) and / or process (s) for registering and managing domain names and related DNS applications and data are either the most suitable for the user. The system will take into account the specific profile of the user, his needs and knowledge, or autonomously add additional IT applications and / or functionalities to the configuration based on the parameters mentioned above. These parameters include in particular the following: the total volume of data traffic that is processed and managed by the system administrator infrastructures, platforms, applications, functionalities and data; the total volume of data traffic reserved for the specific user; - the applications, functionalities and nature of the data processed and made available by the system administrator and selected by the user; the applications, functionalities and data provided by the system administrator and used by the user from third parties that have been integrated by the user into their own environment. Moreover, via the interface it can be determined when creating a new user for (a) specific application (s) on which IT infrastructure and / or platform this user and his application (s) can be served in the most optimal way , respectively managed and used. 32. If one or more limits set by the system administrator for a particular user or category of users are exceeded, the system will also be able to autonomously decide on one or more of the IT infrastructure employed by this user or users (u) r ( and), platform (s), application (s), functionality (s), process (s) and / or transfer data to other physical machines. This functionality has a number of advantages, both for the user (s) and the system administrator, namely: the services provided by the user are not interrupted during the migration; - the system administrator will only have to make limited changes to the existing IT infrastructure, namely the addition of physical machines, since the entire level is taken over by the level of the control and management system; - the system administrator will not have to configure the added physical machines, nor provide the necessary software, since the control and management system is responsible for the actual installation and parameterization of the newly added physical machine (s). 33. The benefits of this application are the following: (i) In the first place, the user and the application (s) activated or installed by him or her will always be able to enjoy the latest new versions, releases and functionalities provided by the system administrator is offered to all users simultaneously without having to perform individual installations or configurations per user; 00 Secondly, this application offers the IT infrastructure manager (s) on which one or more different systems and / or applications for registering and managing domain names and the related DNS applications and - data is managed and uses the ability and flexibility to add additional or other servers to the server network, or to replace certain servers without affecting the settings or configurations of the other servers. With the help of this application, the server network administrator can manage his server network more optimally and efficiently. [iii) Thirdly, this application allows the server network administrator to move certain servers or the entire network gradually to one or more other physical locations in the event of any hardware problems, without this having a negative impact on the server network. data, applications and processes made available by the network to its users; [iv) Fourth, the system administrator is enabled to receive certain processes critical to the provision of domain name registration and management systems and related DNS applications and data, such as user authentication, , storing and sending data and making and making security copies of this data to be allocated to one or more servers within the infrastructure (s) described above, which benefits the speed of processing of these processes , guarantees a higher availability, in view of the specialization, and a faster return of data in the event of errors in the data, systems and / or applications; [v) All this under a central management for the system administrator, whereby the recipient of the service is offered the possibility of carrying out self-determined interventions within the limitations imposed by the system administrator [and not necessarily only the infrastructure or the systems offered on it) are indicated. 34. This system also autonomously determines how incoming and outgoing data traffic should be managed, which data flows and instructions should be given priority, and which specific processes should be controlled. Such a system has several advantages. 35. In the first place, the system will steer autonomously incoming data traffic [for the use or delivery of applications, processes or data) in such a way that the different servers within the network are burdened in an even way. Since users have the possibility to link priorities to certain data, processes and applications, the system also takes these preferences and qualifications into account and will manage and control the various data, processes and applications based on these parameters. . However, if it should appear that a particular server would be overloaded - which could be the case, for example, in an unlawful attempt to gain access to or make the infrastructure unavailable (a so-called "distributed déniai of service attack" or "DDoS"), then the system will autonomously ensure that the data traffic is evenly distributed over a number of other points that provide access to the system, the applications, the processes and / or the data, or that it is isolated and directed to a server within the network specifically set up to combat such unlawful attacks, and to centralize and answer (or not respond to) these requests. In this way, the entire infrastructure is never overloaded, nor is it possible to make this infrastructure completely or partially unavailable in such a way that legitimate users are hindered by this attack. 36. Secondly, the system decides autonomously, on the basis of the nature of incoming requests, to query certain specific systems managed and made available by the service provider and the systems, applications made available by them , processes and data to the applicant. Examples of such requests may have the following characteristics: electronic mail, search or inclusion of data in a database, requesting a web page, etc. 37. The application can also identify certain instructions given to the IT system and - in the event of an attempt to unlawfully break into the IT system, consult, delete or modify data - autonomously isolate this instruction and not execute it. The advantage of this application is that the management of security applications is considerably more efficient, that security incidents are avoided, and that human intervention in the event of a security incident is limited. 38. Subsequently, this arrangement offers the possibility of bundling the range of IT infrastructures, platforms, applications, functionalities and / or processes. As a result, different service packages can be developed that are aligned with one or more specific target groups or users, and this on the basis of the specific needs, needs and requests of these target groups and / or users. 39. This arrangement also offers the possibility to third parties who do not have the necessary IT infrastructure, hardware and software to, in their own name and for their own account, general or specific IT infrastructures, platforms, applications, bundle functionalities and / or processes and offer them to customers. 40. The service packages put together by system operators or resellers in accordance with marginal 39 and 40 may include one or more specific information society services, which in turn can also be individually configured and parameterised. These specific services may include the provision of storage space, one or more websites, databases, e-mail addresses and storage space for emails, caching, etc. The configurations and parameters that can be set by the customer can include data volume, storage capacity, as well as specific functionalities, software, and hardware.
权利要求:
Claims (15) [1] 1. A system that is responsible for the configuration and management of: a. A group of computers, each containing at least one memory module, network interface, and one or more central processing units ("CPUs"), and which all are able to receive and answer orders for processing data; b. a network that includes the connection between the above computers; c. which have the purpose and function of registering and managing domain names and related DNS applications and data (collectively referred to as "environment"); wherein this system autonomously makes decisions about the way in which data flows are received, passed on and answered, as well as the initiation and answering of orders to receive, send, process and store data relating to domain names, and this in the broadest sense meaning of the word, and the renewal or modification thereof, as well as the execution of these assignments and the storage of data; [2] 2. The system mentioned in Claim 1, which offers the possibility for the administrators of such systems to manage and offer different systems and applications for registering and managing domain names and the related DNS applications; [3] 3. The system mentioned in Claim 1, which offers the possibility to configure, adapt and adapt different platforms, applications, processes and protocols that are related to the registration and management of domain names and the related DNS applications and data. make users available; [4] 4. The system mentioned in Claim 1, which offers the possibility for the administrators of the environment mentioned in Claim 1 to adjust, increase or reduce the number of computers, processing units, storage media, memory modules, etc. that are part of the environment without this having a negative impact on the environment as a whole or the individual components in particular, and without further human intervention being required in the configuration of the environment; [5] 5. The system mentioned in Claim 1, which offers the possibility for the administrators of the environment mentioned in Claim 1 to change or expand the network used by the administrator, without further human intervention being required at the configuration of the environment; [6] 6. The system mentioned in Claim 1, which offers the possibility for the administrators and users of the environment to add, change or modify applications offered through the environment to the environment without further human intervention is necessary for the configuration of the environment; [7] 7. The system stated in Claim 1, which autonomously determines on the basis of the parameters indicated by the administrator and the users of the environment, the infrastructure (s), platforms), applications and processes used in such a way. to focus and configure that the environment is designed and used in the most efficient way possible, which efficiency is expressed in reduced energy consumption, faster response times of the various elements that make up the environment, limitation of the capacity of the storage media and network, etc. . [8] 8. An application, integrated or not integrated into the environment described in Claim 1, that allows the user to extend the network security applications of the environment provided by the information society service provider to the user's IT environment, including the ability to make adjustments to the settings of these applications; [9] 9. An application, integrated or not integrated into the environment described in Claim 1, that allows the user to use the caching applications used by the information society service provider in his or her own environment (being the temporary storage and quickly making available certain data that is repeatedly and frequently requested in the short term) to be extended to the user's IT environment, including the possibility to make adjustments to the settings of these applications; [10] 10. An application that offers the possibility of making the environment described in Claim 1, whether or not extended with the applications described in Claim 7 and / or 8, available to other information society service providers, whereby they have the option of autonomously to compile service packages, including one or more elements included in the environment and applications described in Claims 1, 7 and 8, and to configure and offer these environments. [11] 11. An application that makes it possible for information society service providers who configure, manage and offer autonomous environments within the framework of an environment managed by another service provider as described in Claim 1, offering the possibility of making such an offer in their own the name and for its own account of the former service providers, and whereby any reference to the name of the actual manager / service provider can be removed from the technical and operational specifications and arrangement of the environments offered. [12] 12. An IT application that makes it possible to configure services packages based on the system stated in Claim 1, including the IT infrastructures, platforms, applications, processes and protocols made available through this system, and adjust; [13] 13. The IT application mentioned in Claim 12, on the basis of which the composite service packages as well as the underlying IT infrastructures, platforms, applications, processes and protocols can be managed; [14] 14. The IT application specified in Claims 12 and 13 that collectively or individually manage the IT applications, processes and protocols made available by the administrator and / or user; [15] 15. The IT application stated in Claim 12 that manages IT applications, processes and protocols based on availability and load of the configured IT applications, processes and protocols, whereby the IT application is autonomous, but taking into account the settings stated in Claim 14, autonomously controls such processes in the most efficient manner.
类似技术:
公开号 | 公开日 | 专利标题 CN101449559B|2013-08-21|Distributed storage RU2666475C1|2018-09-07|Control and containers dispatching system US7584282B2|2009-09-01|Object-based service oriented architecture method, apparatus and media TWI473029B|2015-02-11|Extensible and programmable multi-tenant service architecture US20110282909A1|2011-11-17|Secregating anonymous access to dynamic content on a web server, with cached logons US7444395B2|2008-10-28|Method and apparatus for event handling in an enterprise US8019872B2|2011-09-13|Systems, methods and computer program products for performing remote data storage for client devices JP5584910B2|2014-09-10|Distributed storage US20180322141A1|2018-11-08|Distributed file systems on content delivery networks US20090144183A1|2009-06-04|Managing user accounts for storage delivery network CN102985919B|2016-03-02|For the system and method for serialized data service AU2020220160B2|2021-07-01|System, method and computer-readable storage medium for customizable event-triggered computation at edge locations WO2019005400A1|2019-01-03|Access control manager configuration based on log files mining US20160292601A1|2016-10-06|Delegation of tasks to other personnel in an erp application US9231957B2|2016-01-05|Monitoring and controlling a storage environment and devices thereof BE1020923A4|2014-09-02|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF DNS DATA AND DOMAIN NAMES. BE1020921A4|2014-09-02|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF DATABASES. BE1020920A4|2014-09-02|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF ELECTRONIC MAIL. US10250440B2|2019-04-02|Managing a generation and delivery of digital identity documents CN102112978B|2017-04-12|Resource deployment management BE1020922A4|2014-09-02|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF A SHARED HOSTING SYSTEM. BE1020919A4|2014-09-02|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF A INFORMATION SYSTEM FOR INFORMATION SOCIETY SERVICES. US20130086623A1|2013-04-04|Systems and methods for establishing isolation between content hosting services executing on common support server US9612927B1|2017-04-04|Managing server processes with proxy files CN110198346A|2019-09-03|Method for reading data, device, electronic equipment and readable storage medium storing program for executing
同族专利:
公开号 | 公开日 BE1020923B1|2019-09-16|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US20090313363A1|2008-06-17|2009-12-17|The Go Daddy Group, Inc.|Hosting a remote computer in a hosting data center| US8280952B1|2009-12-11|2012-10-02|Go Daddy Operating Company, LLC|Methods implementing a preferred placement service for domain registration websites| WO2011146217A1|2010-05-18|2011-11-24|Amazon Technologies, Inc.|Validating updates to domain name system records|
法律状态:
2021-07-19| NE| Restoration requested|Effective date: 20160523 | 2021-07-19| NF| Patent restored after lapse|Effective date: 20170511 | 2021-07-19| PD| Change of ownership|Owner name: COMBELL NV; BE Free format text: DETAILS ASSIGNMENT: CHANGE OF OWNER(S), MERGE; FORMER OWNER NAME: REGISTER NV Effective date: 20210609 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 BE20130318A|BE1020923B1|2013-05-08|2013-05-08|APPLICATION FOR EFFICIENT CONFIGURATION AND MANAGEMENT OF DNS DATA AND DOMAIN NAMES.| BE201300318|2013-05-08|BE20130318A| BE1020923B1|2013-05-08|2013-05-08|APPLICATION FOR EFFICIENT CONFIGURATION AND MANAGEMENT OF DNS DATA AND DOMAIN NAMES.| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|