CN105471875A - Computer network monitoring system - Google Patents

Computer network monitoring system Download PDF

Info

Publication number
CN105471875A
CN105471875A CN201510863181.5A CN201510863181A CN105471875A CN 105471875 A CN105471875 A CN 105471875A CN 201510863181 A CN201510863181 A CN 201510863181A CN 105471875 A CN105471875 A CN 105471875A
Authority
CN
China
Prior art keywords
module
network
computer
data
attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510863181.5A
Other languages
Chinese (zh)
Inventor
冯健
王雅姣
田红鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Science and Technology
Original Assignee
Xian University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Science and Technology filed Critical Xian University of Science and Technology
Priority to CN201510863181.5A priority Critical patent/CN105471875A/en
Publication of CN105471875A publication Critical patent/CN105471875A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a computer network monitoring system, and the system comprises a transparent firewall disposed between a computer and a server, a timing inspection tour module, an emergency module, a restoration module, and a data transfer module. The system achieves the monitoring and audit of network flow, maintains the good network state, improves the network immune capability through the analysis and memorizing of unknown behaviors, can effectively control the danger range after invasion, and guarantees the smooth network and normal providing of services. The system has the capability of autonomous restoration, maintains the stable operation of the network, has a capability of data protection, and also prevents information from being lost because a user is not in front of a computer.

Description

A kind of computer network monitoring system
Technical field
The present invention relates to computer network field, be specifically related to a kind of computer network monitoring system.
Background technology
Along with the fast development of computer technology and network, computer is made to have become people's indispensable instrument in work, studying and living.Equally, the development of computer network, also bring the potential safety hazard of subscriber computer information, the network information is stolen, information attack, virus are propagated etc. exists all the time and occurs.
Network security is the key issue always studied in computer network and application thereof, but traditional network security theory and technology also exist following three defects that cannot overcome.First, central controlled method seems unable to do what one wishes for current distributed network environment; Secondly, network has homoorganicity, cannot stop suspected intruder and virus wide-scale distribution rapidly; Again, current network threatens makes rapid progress, and the nature static of legacy network safety theory and technology and passivity cannot adapt to badly changeable network environment.
At present, make a general survey of domestic and international research, biological treatability research is mainly still in theoretical research stage, and absorb fault-tolerant, tolerant invading constantly, reshuffling ability or redundant ability can survival ability to what improve system.But in these solutions, to attacking, abnormal detection, the execution assessing and reconfigure, all need artificial intervention, there is time delay in various degree.Enhancing for the automated response of survivability network system, recovery and developmental capacity does not also relate to.
Summary of the invention
For solving the problem, the invention provides a kind of computer network monitoring system, carry out monitoring to network traffics and audit, maintaining network kilter, by the analysis of unknown intrusion behavior and memory, improves network immunocompetence, effectively damaging range can be controlled after invasion, guarantee a network connections and normally providing of serving, this system possesses independently repairs reducing power, and the operation of maintaining network is stablized.
For achieving the above object, the technical scheme that the present invention takes is:
A kind of computer network monitoring system, comprises
Setting and the transparent fireproof wall between computer and server, for analyzing and extracting scanning feature and stop outer net to scan;
Timing polling module, also monitor for auditing at a fixed time and enter net flow, abnormal flow treatment advice is proposed, and utilize analog service and the main-machine communication producing abnormal flow, extracting attack fingerprint characteristic, enrich immune characteristic storehouse, carry out the judge of Network health simultaneously according to the data real-time monitored, and evaluation result is sent to computer and data batchmove module;
Emergent module, being captured the user of main frame for pointing out, operational environment being adjourned to escape truck and works on, need not interruption of work process safety problem;
Recovery module, when leaving computer for finishing the work until user, sent to the designated mobile phone of user by short message editor module, thus there is potential safety hazard and provide the suggestion of accurate recovery time in prompting user, help user select that computer returned to invasion before safe condition;
Data batchmove module, for the network security assessment result made according to timing polling module, uploads to the safe email of specifying by the data packing in computer.
Wherein, described timing polling module comprises
Immune characteristic matching module, for calculating the immune characteristic fingerprint of monitored main-machine communication packet, records comparison with in immune characteristic storehouse, and comparing result is sent to graphic plotting module;
Traffic statistics module, raw data packets header information is utilized to carry out traffic statistics, traffic statistics are carried out in units of each connection that main frame is external, by extracting communicating pair IP and the computing of port numbers characteristic information participation hash function, hash-collision is solved with the algorithm of step-length multiplication, and the integrated flow connected belonging to upgrading with the message length field value in packet header, and statistics is sent to graphic plotting module;
Graphic plotting module, the various curve charts that the Plotting data for monitoring according to immune characteristic matching module and traffic statistics module draws;
Returning computing module, calculating for carrying out recurrence by different function to drawn data and curves;
Forecast analysis module, for according to the comparative analysis with former measured curve, predicts, judges stability and the fail safe of network;
Network health discrimination module, by setting up polymorphic response to network anomaly assessment model, and after detected data and assessment models are contrasted, choose tool characteristic parameter when network attack occurs and carry out quantification investigation, draw the health degree of network and be sent to computer, and providing different response and treatment advice to threatening in various degree;
Secure isolation module, utilizes analog service and the main-machine communication producing abnormal flow, extracting attack fingerprint characteristic, enriches immune characteristic storehouse.
Wherein, described graphic plotting module is according to the Monitoring Data of input, generate in time, the tau-effect curve of spatial variations and three-dimensional effect curve, described tau-effect curve shows initial data or the transferring data situation over time of each monitoring point, and described three-dimensional effect curve highlights the Changing Pattern of monitoring result with computer difference dish of same time different measuring points.
Wherein, described timing polling module also comprises time block, for according to different need to set different patrol and examine interval time.
Wherein, described Secure isolation module comprises
Virtual responder module, by providing virtual response and providing corresponding Virtual Service, makes opponent continue to attack to obtain attack traffic;
Analog service module, by performing analog service script, the main frame being redirected to immune isolation unit with flow carries out alternately, the reciprocal process of simulation normal service, makes threat main frame continue to attack;
Attack is put on record module, and record security isolation module and having threatens the communication information between main frame and write into Databasce, and the described communication information comprises call duration time, the IP of communicating pair and port information and assailant's operation system fingerprint information;
Data-mining module, when to arrive the flow of immune isolation unit if assert be dangerous flow, system intelligence extracting attack fingerprint characteristic by described feature stored in immune characteristic storehouse.
The present invention has following beneficial effect:
Carry out monitoring to network traffics and audit; maintaining network kilter; by to the analysis of unknown intrusion behavior and memory; improve network immunocompetence, effectively can control damaging range after invasion, guarantee a network connections and normally providing of serving; this system possesses independently repairs reducing power; the operation of maintaining network is stablized, and possesses data protection ability simultaneously, it also avoid the generation of the situation not causing information dropout due to user before computer.
Accompanying drawing explanation
Fig. 1 is the structural representation of a kind of computer network monitoring system of the embodiment of the present invention.
Embodiment
In order to make objects and advantages of the present invention clearly understand, below in conjunction with embodiment, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
As shown in Figure 1, embodiments provide a kind of computer network monitoring system, comprise
Setting and the transparent fireproof wall between computer and server, for analyzing and extracting scanning feature and stop outer net to scan; Transparent fireproof wall comprises entrance network interface card, exports network interface card and is arranged at the control network interface card between described entrance network interface card and outlet network interface card, bridge is formed between described entrance network interface card and outlet network interface card, realize intranet and extranet transparent communication, configuration of IP address on described control network interface card, is used for realizing network manager's Remote Visit and Control fire compartment wall and early warning information is carried out log recording at intranet Web server by fire compartment wall;
Timing polling module, also monitor for auditing at a fixed time and enter net flow, abnormal flow treatment advice is proposed, and utilize analog service and the main-machine communication producing abnormal flow, extracting attack fingerprint characteristic, enrich immune characteristic storehouse, carry out the judge of Network health simultaneously according to the data real-time monitored, and evaluation result is sent to computer and data batchmove module;
Emergent module, being captured the user of main frame for pointing out, operational environment being adjourned to escape truck and works on, need not interruption of work process safety problem;
Recovery module, when leaving computer for finishing the work until user, sent to the designated mobile phone of user by short message editor module, thus there is potential safety hazard and provide the suggestion of accurate recovery time in prompting user, help user select that computer returned to invasion before safe condition;
Data batchmove module, for the network security assessment result made according to timing polling module, uploads to the safe email of specifying by the data packing in computer.
Wherein, described timing polling module comprises
Immune characteristic matching module, for calculating the immune characteristic fingerprint of monitored main-machine communication packet, records comparison with in immune characteristic storehouse, and comparing result is sent to graphic plotting module;
Traffic statistics module, raw data packets header information is utilized to carry out traffic statistics, traffic statistics are carried out in units of each connection that main frame is external, by extracting communicating pair IP and the computing of port numbers characteristic information participation hash function, hash-collision is solved with the algorithm of step-length multiplication, and the integrated flow connected belonging to upgrading with the message length field value in packet header, and statistics is sent to graphic plotting module;
Graphic plotting module, the various curve charts that the Plotting data for monitoring according to immune characteristic matching module and traffic statistics module draws;
Returning computing module, calculating for carrying out recurrence by different function to drawn data and curves;
Forecast analysis module, for according to the comparative analysis with former measured curve, predicts, judges stability and the fail safe of network;
Network health discrimination module, by setting up polymorphic response to network anomaly assessment model, and after detected data and assessment models are contrasted, choose tool characteristic parameter when network attack occurs and carry out quantification investigation, draw the health degree of network and be sent to computer, and providing different response and treatment advice to threatening in various degree;
Secure isolation module, utilizes analog service and the main-machine communication producing abnormal flow, extracting attack fingerprint characteristic, enriches immune characteristic storehouse.
Wherein, described graphic plotting module is according to the Monitoring Data of input, generate in time, the tau-effect curve of spatial variations and three-dimensional effect curve, described tau-effect curve shows initial data or the transferring data situation over time of each monitoring point, and described three-dimensional effect curve highlights the Changing Pattern of monitoring result with computer difference dish of same time different measuring points.
Described timing polling module also comprises time block, for according to different need to set different patrol and examine interval time.
Described Secure isolation module comprises
Virtual responder module, by providing virtual response and providing corresponding Virtual Service, makes opponent continue to attack to obtain attack traffic;
Analog service module, by performing analog service script, the main frame being redirected to immune isolation unit with flow carries out alternately, the reciprocal process of simulation normal service, makes threat main frame continue to attack;
Attack is put on record module, and record security isolation module and having threatens the communication information between main frame and write into Databasce, and the described communication information comprises call duration time, the IP of communicating pair and port information and assailant's operation system fingerprint information;
Data-mining module, when to arrive the flow of immune isolation unit if assert be dangerous flow, system intelligence extracting attack fingerprint characteristic by described feature stored in immune characteristic storehouse.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (5)

1. a computer network monitoring system, is characterized in that, comprises
Setting and the transparent fireproof wall between computer and server, for analyzing and extracting scanning feature and stop outer net to scan;
Timing polling module, also monitor for auditing at a fixed time and enter net flow, abnormal flow treatment advice is proposed, and utilize analog service and the main-machine communication producing abnormal flow, extracting attack fingerprint characteristic, enrich immune characteristic storehouse, carry out the judge of Network health simultaneously according to the data real-time monitored, and evaluation result is sent to computer and data batchmove module;
Emergent module, being captured the user of main frame for pointing out, operational environment being adjourned to escape truck and works on, need not interruption of work process safety problem;
Recovery module, when leaving computer for finishing the work until user, sent to the designated mobile phone of user by short message editor module, thus there is potential safety hazard and provide the suggestion of accurate recovery time in prompting user, help user select that computer returned to invasion before safe condition;
Data batchmove module, for the network security assessment result made according to timing polling module, uploads to the safe email of specifying by the data packing in computer.
2. a kind of computer network monitoring system according to claim 1, is characterized in that, described timing polling module comprises
Immune characteristic matching module, for calculating the immune characteristic fingerprint of monitored main-machine communication packet, records comparison with in immune characteristic storehouse, and comparing result is sent to graphic plotting module;
Traffic statistics module, raw data packets header information is utilized to carry out traffic statistics, traffic statistics are carried out in units of each connection that main frame is external, by extracting communicating pair IP and the computing of port numbers characteristic information participation hash function, hash-collision is solved with the algorithm of step-length multiplication, and the integrated flow connected belonging to upgrading with the message length field value in packet header, and statistics is sent to graphic plotting module;
Graphic plotting module, the various curve charts that the Plotting data for monitoring according to immune characteristic matching module and traffic statistics module draws;
Returning computing module, calculating for carrying out recurrence by different function to drawn data and curves;
Forecast analysis module, for according to the comparative analysis with former measured curve, predicts, judges stability and the fail safe of network;
Network health discrimination module, by setting up polymorphic response to network anomaly assessment model, and after detected data and assessment models are contrasted, choose tool characteristic parameter when network attack occurs and carry out quantification investigation, draw the health degree of network and be sent to computer, and providing different response and treatment advice to threatening in various degree;
Secure isolation module, utilizes analog service and the main-machine communication producing abnormal flow, extracting attack fingerprint characteristic, enriches immune characteristic storehouse.
3. a kind of computer network monitoring system according to claim 2, it is characterized in that, described graphic plotting module is according to the Monitoring Data of input, generate in time, the tau-effect curve of spatial variations and three-dimensional effect curve, described tau-effect curve shows initial data or the transferring data situation over time of each monitoring point, and described three-dimensional effect curve highlights the Changing Pattern of monitoring result with computer difference dish of same time different measuring points.
4. a kind of computer network monitoring system according to claim 2, is characterized in that, described timing polling module also comprises time block, for according to different need to set different patrol and examine interval time.
5. a kind of computer network monitoring system according to claim 2, is characterized in that, described Secure isolation module comprises
Virtual responder module, by providing virtual response and providing corresponding Virtual Service, makes opponent continue to attack to obtain attack traffic:
Analog service module, by performing analog service script, the main frame being redirected to immune isolation unit with flow carries out alternately, the reciprocal process of simulation normal service, makes threat main frame continue to attack;
Attack is put on record module, and record security isolation module and having threatens the communication information between main frame and write into Databasce, and the described communication information comprises call duration time, the IP of communicating pair and port information and assailant's operation system fingerprint information;
Data-mining module, when to arrive the flow of immune isolation unit if assert be dangerous flow, system intelligence extracting attack fingerprint characteristic by described feature stored in immune characteristic storehouse.
CN201510863181.5A 2015-11-25 2015-11-25 Computer network monitoring system Pending CN105471875A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510863181.5A CN105471875A (en) 2015-11-25 2015-11-25 Computer network monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510863181.5A CN105471875A (en) 2015-11-25 2015-11-25 Computer network monitoring system

Publications (1)

Publication Number Publication Date
CN105471875A true CN105471875A (en) 2016-04-06

Family

ID=55609145

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510863181.5A Pending CN105471875A (en) 2015-11-25 2015-11-25 Computer network monitoring system

Country Status (1)

Country Link
CN (1) CN105471875A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105847291A (en) * 2016-05-13 2016-08-10 内蒙古工业大学 Computer network defense decision system
CN106027495A (en) * 2016-04-24 2016-10-12 蚌埠学院 Multi-network selection type computer network monitor
CN106209901A (en) * 2016-08-01 2016-12-07 黑河学院 A kind of intelligent computer remote interactive system
CN106200838A (en) * 2016-06-26 2016-12-07 宋传东 A kind of computer control system based on Internet of Things
CN106485229A (en) * 2016-10-14 2017-03-08 黑龙江科技大学 Agricultural ecotone remote sensing monitoring and early warning fire system
CN106603517A (en) * 2016-12-03 2017-04-26 新乡学院 Computer network information security monitoring system
CN107347067A (en) * 2017-07-07 2017-11-14 深信服科技股份有限公司 A kind of network risks monitoring method, system and safety network system
CN107493300A (en) * 2017-09-20 2017-12-19 河北师范大学 Network security protection system
CN107818261A (en) * 2017-09-12 2018-03-20 王振铎 A kind of computer information safe stocking system
CN107967331A (en) * 2017-11-27 2018-04-27 国家海洋环境预报中心 It is matched with the data preparation method of high-performance computer structure
CN107995163A (en) * 2017-10-31 2018-05-04 无锡港湾网络科技有限公司 Computer network monitoring device
CN108011890A (en) * 2017-12-20 2018-05-08 东北电力大学 A kind of information safety of mobile electronic equipment protects system
CN108600178A (en) * 2018-03-28 2018-09-28 深圳市银之杰科技股份有限公司 A kind of method for protecting and system, reference platform of collage-credit data
CN109818958A (en) * 2019-01-28 2019-05-28 西安航空学院 A kind of computer network intelligent monitor system
CN110475227A (en) * 2019-07-26 2019-11-19 上海帆一尚行科技有限公司 The method, apparatus of car networking protecting information safety, system, electronic equipment
CN110990900A (en) * 2019-12-24 2020-04-10 南通理工学院 Computer network intelligent monitoring system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6973577B1 (en) * 2000-05-26 2005-12-06 Mcafee, Inc. System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state
CN103106542A (en) * 2012-12-13 2013-05-15 长安大学 Data analyzing and processing system
CN103227798A (en) * 2013-04-23 2013-07-31 西安电子科技大学 Immunological network system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6973577B1 (en) * 2000-05-26 2005-12-06 Mcafee, Inc. System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state
CN103106542A (en) * 2012-12-13 2013-05-15 长安大学 Data analyzing and processing system
CN103227798A (en) * 2013-04-23 2013-07-31 西安电子科技大学 Immunological network system

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106027495A (en) * 2016-04-24 2016-10-12 蚌埠学院 Multi-network selection type computer network monitor
CN105847291A (en) * 2016-05-13 2016-08-10 内蒙古工业大学 Computer network defense decision system
CN106200838A (en) * 2016-06-26 2016-12-07 宋传东 A kind of computer control system based on Internet of Things
CN106209901A (en) * 2016-08-01 2016-12-07 黑河学院 A kind of intelligent computer remote interactive system
CN106485229A (en) * 2016-10-14 2017-03-08 黑龙江科技大学 Agricultural ecotone remote sensing monitoring and early warning fire system
CN106603517A (en) * 2016-12-03 2017-04-26 新乡学院 Computer network information security monitoring system
CN107347067A (en) * 2017-07-07 2017-11-14 深信服科技股份有限公司 A kind of network risks monitoring method, system and safety network system
CN107818261A (en) * 2017-09-12 2018-03-20 王振铎 A kind of computer information safe stocking system
CN107493300A (en) * 2017-09-20 2017-12-19 河北师范大学 Network security protection system
CN107995163A (en) * 2017-10-31 2018-05-04 无锡港湾网络科技有限公司 Computer network monitoring device
CN107967331A (en) * 2017-11-27 2018-04-27 国家海洋环境预报中心 It is matched with the data preparation method of high-performance computer structure
CN108011890A (en) * 2017-12-20 2018-05-08 东北电力大学 A kind of information safety of mobile electronic equipment protects system
CN108600178A (en) * 2018-03-28 2018-09-28 深圳市银之杰科技股份有限公司 A kind of method for protecting and system, reference platform of collage-credit data
CN109818958A (en) * 2019-01-28 2019-05-28 西安航空学院 A kind of computer network intelligent monitor system
CN110475227A (en) * 2019-07-26 2019-11-19 上海帆一尚行科技有限公司 The method, apparatus of car networking protecting information safety, system, electronic equipment
CN110475227B (en) * 2019-07-26 2022-03-22 上海帆一尚行科技有限公司 Method, device and system for protecting information security of Internet of vehicles and electronic equipment
CN110990900A (en) * 2019-12-24 2020-04-10 南通理工学院 Computer network intelligent monitoring system

Similar Documents

Publication Publication Date Title
CN105471875A (en) Computer network monitoring system
US11323471B2 (en) Advanced cybersecurity threat mitigation using cyberphysical graphs with state changes
CN108494810B (en) Attack-oriented network security situation prediction method, device and system
CN106790186B (en) Multi-step attack detection method based on multi-source abnormal event correlation analysis
US10432660B2 (en) Advanced cybersecurity threat mitigation for inter-bank financial transactions
CN114584405B (en) Electric power terminal safety protection method and system
CN105847291A (en) Computer network defense decision system
CN105429987A (en) Security system for computer network
CN107493300A (en) Network security protection system
CN107295021B (en) Security detection method and system of host based on centralized management
CN105743880A (en) Data analysis system
CN107579986B (en) Network security detection method in complex network
CN105491055B (en) A kind of network host accident detection method based on mobile agent
CN107347047A (en) Attack guarding method and device
CN107864676A (en) System and method for detecting unknown leak in calculating process
CN104008332A (en) Intrusion detection system based on Android platform
CN109040130A (en) Mainframe network behavior pattern measure based on attributed relational graph
CN109104438A (en) Botnet method for early warning and device in a kind of narrowband Internet of Things
CN111126153A (en) Safety monitoring method, system, server and storage medium based on deep learning
KR101281456B1 (en) Apparatus and method for anomaly detection in SCADA network using self-similarity
CN106209902A (en) A kind of network safety system being applied to intellectual property operation platform and detection method
CN110061854A (en) A kind of non-boundary network intelligence operation management method and system
CN110618977B (en) Login anomaly detection method, device, storage medium and computer equipment
WO2019018829A1 (en) Advanced cybersecurity threat mitigation using behavioral and deep analytics
CN115378711A (en) Industrial control network intrusion detection method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160406