CN107347079A - Computer network means of defence - Google Patents

Computer network means of defence Download PDF

Info

Publication number
CN107347079A
CN107347079A CN201710789186.7A CN201710789186A CN107347079A CN 107347079 A CN107347079 A CN 107347079A CN 201710789186 A CN201710789186 A CN 201710789186A CN 107347079 A CN107347079 A CN 107347079A
Authority
CN
China
Prior art keywords
network
computer
protection
carried out
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710789186.7A
Other languages
Chinese (zh)
Inventor
宋丹丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Dan Peng Technology Co Ltd
Original Assignee
Hefei Dan Peng Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Dan Peng Technology Co Ltd filed Critical Hefei Dan Peng Technology Co Ltd
Priority to CN201710789186.7A priority Critical patent/CN107347079A/en
Publication of CN107347079A publication Critical patent/CN107347079A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Abstract

The invention discloses a kind of computer network means of defence, specifically comprise the following steps:S1:Operating personnel open computer, S2:Network protection, S3 are carried out using encryption software:Establish multi-level backup mechanism and carry out network protection, S4:Network protection, S5 are carried out using intruding detection system:Network protection, S6 are carried out using vulnerability scanning system:Network protection, S7 are carried out by the security mechanism for improving operating system and application software:Network firewall is established to carry out network protection, S8:By carrying out network protection to packet automatic detection, the effect of multiple-protection is realized, effectively computer network is monitored, avoids illegal invasion behavior, ensure that computer is safe to use, traditional synchronous method further optimized and perfect.

Description

Computer network means of defence
Technical field
The invention belongs to computer security technique field, more specifically, more particularly to a kind of computer network protection side Method.
Background technology
With the continuous progress of technology, China Internet has formed scale, and the Internet, applications move towards diversification.Internet More and more profoundly change the study, work and life style of people, or even affect entire society's process.Network security Refer to that the data in the hardware, software and its system of network system are protected, do not meet with because of the reason for accidental or malice Destroyed, changed, revealed, system is continuously reliably normally run, and network service does not interrupt.The safety of network refers to by adopting With various technologies and control measures, make network system normal operation, so that it is guaranteed that the availability of network data, integrality and secrecy Property.With the high speed development of internet, computer network protection is increasingly valued by people.
Now lack a kind of computer network means of defence, traditional computer network means of defence has great limitation Property, do not possess the property of multiple-protection, it is necessary to which further optimization and perfect, this development to computer network security has very Important meaning.
The content of the invention
The invention aims to solve shortcoming present in prior art, and a kind of computer network proposed protects Method.
To achieve the above object, the present invention provides following technical scheme:A kind of computer network means of defence, is specifically included Following steps:
S1:Operating personnel open computer;
S2:Network protection is carried out using encryption software, encryption software is installed in a computer, in the mistake of transmission important information Cheng Zhong, using the Information hiding in encryption software, digital watermarking, data are embedded and capsule information are first hidden into text by fingerprint technique In part, then pass through network delivery again;
S3:Establish multi-level backup mechanism and carry out network protection, carry out the trouble free service of the network information, for significant data and Documentation is periodically backed up, in a network environment, by different level using network remote backup, server two-node cluster hot backup, RAID mirror image technologies and software systems automated back-up mode carry out data backup work;
S4:Network protection is carried out using intruding detection system, intruding detection system is installed in a computer, is examined using invasion Examining system detects to intrusion behavior;
S5:Network protection is carried out using vulnerability scanning system, vulnerability scanning system software is installed, utilizes vulnerability scanning system Scanning computer, system for computer vulnerability scanning is come out, and software is repaired by system and repairs computer system, adopted in time Take treatment measures to be repaired, effectively prevent the generation of intrusion event, establish walk away safety system, while establish corresponding peace Full accessory system;
S6:Network protection, the operation of more new computer are carried out by the security mechanism for improving operating system and application software System, operating system is kept renewal, rights management is carried out to network system boot disk and user data disk, utilizes network system Function in terms of safety management, network manager ensure registration security by user name, networking password, by specify authorize and Inherited rights are shielded to realize DRM operations, catalogue, file are read and write property by setting computer system to limit It is fixed;
S7:Network firewall is established to carry out network protection, access rights are limited by network firewall;
S8:By to packet automatic detection carry out network protection, automatic detection module include NESS detection modules, Strobe detection modules, SATAN detection modules and ISS detection modules, the detection content of the automatic detection module include configuration File detection, protection mechanism detection and difference test, dangerous packet is isolated, anti-so as to carry out safety to computer network Shield.
Preferably, in the step S2, DEA has DES, AES, MD5, SH-1, IDEA, RSA and PGP.
Preferably, in the step S3, Backup Data is preserved on a different storage medium, periodically by necessary backup number According to being burnt in CD, important data creating more than 2 copies and is stored in different places, ensures that data can after damage To recover in time.
Preferably, in the step S4, the intruding detection system is by collecting and analysis computer network and computer The information of key point in system, the sign for whether there is in network and system and violating the behavior of security strategy and being attacked is checked, The event that the intruding detection system constantly occurs in supervisory computer system and network system, carries out safety according to rule and examines Meter, is monitored to the operation conditions of network, system, so as to the various information with attack attempt and attack are carried out every From to ensure the confidentiality, integrity, and availability of network system resources, the intruding detection system can using record of the audit Any not dangerous information activities are identified, these activities are limited to protect the security purpose of system so as to reach.
Preferably, in the step S7, the network security of computer is protected by paying close attention to the safety of fire wall, it is all Communication flows all carries out audits and compliance and preservation by fire wall.
The technique effect and advantage of the present invention:A kind of computer network means of defence of the present invention, combine soft using encrypting Part carries out network protection, establishes multi-level backup mechanism progress network protection, utilizes intruding detection system to carry out network protection, utilize Vulnerability scanning system carries out network protection, carries out network protection by improving the security mechanism of operating system and application software, builds Vertical network firewall carries out network protection and the characteristics of by carrying out network protection to packet automatic detection, realized multiple anti- The effect of shield, is effectively monitored to computer network, avoids illegal invasion behavior, ensures that computer is safe to use, to passing The further optimization and perfect of the synchronous method of system.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, below in conjunction with specific embodiment, to this Invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, not For limiting the present invention.Based on the embodiment in the present invention, those of ordinary skill in the art are not before creative work is made The every other embodiment obtained is put, belongs to the scope of protection of the invention.
A kind of computer network means of defence provided by the invention, specifically comprises the following steps:
S1:Operating personnel open computer;
S2:Network protection is carried out using encryption software, encryption software is installed in a computer, in the mistake of transmission important information Cheng Zhong, using the Information hiding in encryption software, digital watermarking, data are embedded and capsule information are first hidden into text by fingerprint technique In part, then pass through network delivery again;
S3:Establish multi-level backup mechanism and carry out network protection, carry out the trouble free service of the network information, for significant data and Documentation is periodically backed up, in a network environment, by different level using network remote backup, server two-node cluster hot backup, RAID mirror image technologies and software systems automated back-up mode carry out data backup work;
S4:Network protection is carried out using intruding detection system, intruding detection system is installed in a computer, is examined using invasion Examining system detects to intrusion behavior;
S5:Network protection is carried out using vulnerability scanning system, vulnerability scanning system software is installed, utilizes vulnerability scanning system Scanning computer, system for computer vulnerability scanning is come out, and software is repaired by system and repairs computer system, adopted in time Take treatment measures to be repaired, effectively prevent the generation of intrusion event, establish walk away safety system, while establish corresponding peace Full accessory system;
S6:Network protection, the operation of more new computer are carried out by the security mechanism for improving operating system and application software System, operating system is kept renewal, rights management is carried out to network system boot disk and user data disk, utilizes network system Function in terms of safety management, network manager ensure registration security by user name, networking password, by specify authorize and Inherited rights are shielded to realize DRM operations, catalogue, file are read and write property by setting computer system to limit It is fixed;
S7:Network firewall is established to carry out network protection, access rights are limited by network firewall;
S8:By to packet automatic detection carry out network protection, automatic detection module include NESS detection modules, Strobe detection modules, SATAN detection modules and ISS detection modules, the detection content of the automatic detection module include configuration File detection, protection mechanism detection and difference test, dangerous packet is isolated, anti-so as to carry out safety to computer network Shield.
In the step S2, DEA has DES, AES, MD5, SH-1, IDEA, RSA and PGP, the step S3 In, Backup Data preserves on a different storage medium, periodically necessary Backup Data is burnt in CD, important data Make more than 2 and copy and be stored in different places, ensure that data can be recovered in time after damage, in the step S4, The intruding detection system by collect and analysis computer network and computer system in key point information, check network and In system computer is constantly monitored with the presence or absence of the sign violated the behavior of security strategy and attacked, the intruding detection system The event occurred in system and network system, security audit is carried out according to rule, the operation conditions of network, system is supervised Depending on, so as to isolate to the various information with attack attempt and attack, with ensure the confidentiality of network system resources, Integrality and availability, the intruding detection system can recognize that any not dangerous information activities using record of the audit, Limit these activities so as to reach to protect the security purpose of system, in the step S7, by pay close attention to the safety of fire wall come The network security of computer is protected, all communication flows all carry out audits and compliance and preservation by fire wall.
In summary:A kind of computer network means of defence of the present invention, combine using encryption software carry out network protection, Multi-level backup mechanism is established to carry out network protection, carry out network protection using intruding detection system, using vulnerability scanning system enter Row network protection, by improve operating system and application software security mechanism carry out network protection, establish network firewall come Carry out network protection and the characteristics of by carrying out network protection to packet automatic detection, realize the effect of multiple-protection, effectively Computer network is monitored, avoid illegal invasion behavior, ensure that computer is safe to use, traditional synchronous method is entered One-step optimization and perfect.
In the present invention, unless otherwise clearly defined and limited, term " installation ", " connected ", " connection ", " fixation " etc. Term should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected, or be integrally connected;It can be machine Tool connects or electrical connection;Can be joined directly together, can also be indirectly connected by intermediary, can be two members Connection inside part.For the ordinary skill in the art, above-mentioned term can be understood in this hair as the case may be Concrete meaning in bright.
Finally it should be noted that:The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, Although the present invention is described in detail with reference to the foregoing embodiments, for those skilled in the art, it still may be used To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic, Within the spirit and principles of the invention, any modification, equivalent substitution and improvements made etc., it should be included in the present invention's Within protection domain.

Claims (5)

  1. A kind of 1. computer network means of defence, it is characterised in that:Specifically comprise the following steps:
    S1:Operating personnel open computer;
    S2:Network protection is carried out using encryption software, encryption software is installed in a computer, in the process of transmission important information In, using the Information hiding in encryption software, digital watermarking, data are embedded and capsule information are first hidden into file by fingerprint technique In, then pass through network delivery again;
    S3:Establish multi-level backup mechanism and carry out network protection, the trouble free service of the network information is carried out, for significant data and file Data is periodically backed up, in a network environment, by different level using network remote backup, server two-node cluster hot backup, RAID Mirror image technology and software systems automated back-up mode carry out data backup work;
    S4:Network protection is carried out using intruding detection system, intruding detection system is installed in a computer, utilizes intrusion detection system System detects to intrusion behavior;
    S5:Network protection is carried out using vulnerability scanning system, vulnerability scanning system software is installed, scanned using vulnerability scanning system Computer, system for computer vulnerability scanning is come out, and software is repaired by system and repairs computer system, take place in time Reason measure is repaired, and effectively prevents the generation of intrusion event, establishes walk away safety system, while it is auxiliary to establish corresponding safety Auxiliary system;
    S6:By improve operating system and application software security mechanism carry out network protection, the operating system of more new computer, Operating system is kept renewal, rights management is carried out to network system boot disk and user data disk, utilizes network system security The function of management aspect, network manager ensure registration security by user name, networking password, authorize and shield by specifying Inherited rights realize DRM operations, and catalogue, file are read and write property by setting computer system to be defined;
    S7:Network firewall is established to carry out network protection, access rights are limited by network firewall;
    S8:By carrying out network protection to packet automatic detection, automatic detection module includes NESS detection modules, Strobe is examined Survey module, SATAN detection modules and ISS detection modules, the detection content of the automatic detection module include configuration file detection, Protection mechanism detects and difference test, dangerous packet is isolated, so as to carry out security protection to computer network.
  2. A kind of 2. computer network means of defence according to claim 1, it is characterised in that:In the step S2, data AES has DES, AES, MD5, SH-1, IDEA, RSA and PGP.
  3. A kind of 3. computer network means of defence according to claim 1, it is characterised in that:In the step S3, backup Data preserve on a different storage medium, periodically necessary Backup Data are burnt in CD, important data creating 2 Copy above and be stored in different places, ensure that data can be recovered in time after damage.
  4. A kind of 4. computer network means of defence according to claim 1, it is characterised in that:It is described in the step S4 Intruding detection system checks network and system by collecting the information with key point in analysis computer network and computer system In with the presence or absence of the behavior and the sign attacked for violating security strategy, the intruding detection system constantly supervisory computer system With the event occurred in network system, security audit is carried out according to rule, the operation conditions of network, system is monitored, from And the various information with attack attempt and attack are isolated, to ensure the confidentiality of network system resources, complete Property and availability, the intruding detection system can recognize that any not dangerous information activities using record of the audit, so as to Reach and limit these activities to protect the security purpose of system.
  5. A kind of 5. computer network means of defence according to claim 1, it is characterised in that:In the step S7, pass through The safety of fire wall is paid close attention to protect the network security of computer, all communication flows all pass through fire wall and carry out audits and compliance and guarantor Deposit.
CN201710789186.7A 2017-09-05 2017-09-05 Computer network means of defence Withdrawn CN107347079A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710789186.7A CN107347079A (en) 2017-09-05 2017-09-05 Computer network means of defence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710789186.7A CN107347079A (en) 2017-09-05 2017-09-05 Computer network means of defence

Publications (1)

Publication Number Publication Date
CN107347079A true CN107347079A (en) 2017-11-14

Family

ID=60257796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710789186.7A Withdrawn CN107347079A (en) 2017-09-05 2017-09-05 Computer network means of defence

Country Status (1)

Country Link
CN (1) CN107347079A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108111503A (en) * 2017-12-15 2018-06-01 安徽长泰信息安全服务有限公司 Based on the information safety protection host machine for accessing limitation
CN108337231A (en) * 2017-12-26 2018-07-27 海尔优家智能科技(北京)有限公司 Isolation network remote deployment method, apparatus, equipment and storage medium
CN108462714A (en) * 2018-03-23 2018-08-28 中国人民解放军战略支援部队信息工程大学 A kind of APT systems of defense and its defence method based on system resilience
CN108710793A (en) * 2018-05-25 2018-10-26 马鞍山市润启新材料科技有限公司 A kind of computer network means of defence and system
CN108875347A (en) * 2018-07-12 2018-11-23 上海常仁信息科技有限公司 The automatic protection method of hacker attacks and control is prevented based on robot identity card
CN109005182A (en) * 2018-08-15 2018-12-14 钟百成 A kind of computer network management system
CN109101818A (en) * 2018-08-14 2018-12-28 齐鲁工业大学 A kind of computer network security detection method
CN109450892A (en) * 2018-11-05 2019-03-08 日照职业技术学院 A kind of computer network detection method
CN109933983A (en) * 2019-01-23 2019-06-25 秦皇岛职业技术学院 A kind of information security of computer network management system
CN110460614A (en) * 2019-08-21 2019-11-15 小胡杨信息技术(武汉)有限公司 A kind of working method of computer information system auxiliary security guard system
CN113132412A (en) * 2021-04-30 2021-07-16 南京林业大学 Computer network security test and inspection method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701777A (en) * 2013-12-11 2014-04-02 长春理工大学 Remote network attack and defense virtual simulation system based on virtualization and cloud technology
US9208335B2 (en) * 2013-09-17 2015-12-08 Auburn University Space-time separated and jointly evolving relationship-based network access and data protection system
CN206164589U (en) * 2016-11-15 2017-05-10 滁州市拓海信息科技有限公司 Computer network safety monitoring device
CN206237439U (en) * 2016-12-04 2017-06-09 浙江易网科技股份有限公司 A kind of embedded webpage server selfloop detection apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9208335B2 (en) * 2013-09-17 2015-12-08 Auburn University Space-time separated and jointly evolving relationship-based network access and data protection system
CN103701777A (en) * 2013-12-11 2014-04-02 长春理工大学 Remote network attack and defense virtual simulation system based on virtualization and cloud technology
CN206164589U (en) * 2016-11-15 2017-05-10 滁州市拓海信息科技有限公司 Computer network safety monitoring device
CN206237439U (en) * 2016-12-04 2017-06-09 浙江易网科技股份有限公司 A kind of embedded webpage server selfloop detection apparatus

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108111503A (en) * 2017-12-15 2018-06-01 安徽长泰信息安全服务有限公司 Based on the information safety protection host machine for accessing limitation
CN108337231A (en) * 2017-12-26 2018-07-27 海尔优家智能科技(北京)有限公司 Isolation network remote deployment method, apparatus, equipment and storage medium
CN108337231B (en) * 2017-12-26 2021-09-24 海尔优家智能科技(北京)有限公司 Isolation network remote deployment method, device, equipment and storage medium
CN108462714A (en) * 2018-03-23 2018-08-28 中国人民解放军战略支援部队信息工程大学 A kind of APT systems of defense and its defence method based on system resilience
CN108710793A (en) * 2018-05-25 2018-10-26 马鞍山市润启新材料科技有限公司 A kind of computer network means of defence and system
CN108875347A (en) * 2018-07-12 2018-11-23 上海常仁信息科技有限公司 The automatic protection method of hacker attacks and control is prevented based on robot identity card
CN109101818A (en) * 2018-08-14 2018-12-28 齐鲁工业大学 A kind of computer network security detection method
CN109005182A (en) * 2018-08-15 2018-12-14 钟百成 A kind of computer network management system
CN109450892A (en) * 2018-11-05 2019-03-08 日照职业技术学院 A kind of computer network detection method
CN109933983A (en) * 2019-01-23 2019-06-25 秦皇岛职业技术学院 A kind of information security of computer network management system
CN110460614A (en) * 2019-08-21 2019-11-15 小胡杨信息技术(武汉)有限公司 A kind of working method of computer information system auxiliary security guard system
CN113132412A (en) * 2021-04-30 2021-07-16 南京林业大学 Computer network security test and inspection method
CN113132412B (en) * 2021-04-30 2023-07-11 南京林业大学 Computer network security test and inspection method

Similar Documents

Publication Publication Date Title
CN107347079A (en) Computer network means of defence
Greenberg et al. Mobile agents and security
CN101729545B (en) Secure consultation system
Gerić et al. Information system security threats classifications
CN101895578A (en) Document monitor and management system based on comprehensive safety audit
Siegel et al. Cyber-risk management: technical and insurance controls for enterprise-level security
EP2761528A2 (en) Secure integrated cyberspace security and situational awareness system
WO2018164503A1 (en) Context awareness-based ransomware detection
AU2012315742A1 (en) Secure integrated cyberspace security and situational awareness system
CN101098224A (en) Method for encrypting/deciphering dynamically data file
CN115314286A (en) Safety guarantee system
Xu et al. Network security
Kiser et al. Ransomware: Healthcare industry at risk
CN108881260A (en) A kind of novel computer network protection method
Belmabrouk Cyber Criminals and Data Privacy Measures
Yang et al. Analysis of Computer Network Security and Prevention Technology
Okonkwo et al. Surveying Security Policies and Infrastructure for Ransomware Attacks (2022)
EP4365742A1 (en) Computer-implemented system and method for recovering data in case of a computer network failure
Zhang et al. Design of Information Security Protection System for Cloud Business System
Li Security Management Measures for Library Computer Network
CN117714093A (en) Network security protection method and system for information management system
Thu Types of Cyber Attacks and Incident Responses
Süß et al. Data Center Security and Resiliency
Salman et al. Vulnerable Data Center and Developing of On-line Protection
Muxammadqul o‘g‘li INFORMATION SECURITY AND PREVENTION IN DIGITAL DIPLOMACY

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20171114