CN108234488A - A kind of file tracking method and device - Google Patents
A kind of file tracking method and device Download PDFInfo
- Publication number
- CN108234488A CN108234488A CN201711498631.0A CN201711498631A CN108234488A CN 108234488 A CN108234488 A CN 108234488A CN 201711498631 A CN201711498631 A CN 201711498631A CN 108234488 A CN108234488 A CN 108234488A
- Authority
- CN
- China
- Prior art keywords
- client
- information
- server
- script
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/69—Types of network addresses using geographic information, e.g. room number
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Bioethics (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of file tracking method and device, this method includes:When the confidential document of client is opened, the script being previously implanted is run;Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;The information of the client is included in the message, so that the server-side receives and records the information of the client.The device includes processor and the memory for storing processor-executable instruction;The processor is configured according to the file tracking method.Method provided by the present invention can be to file of divulging a secret into line trace, and determine confidential document flows to information, is conducive to loss caused by controlling file of divulging a secret, it helps the personal investigation that solves a case collects evidence, and determines the suspect that divulges a secret rapidly.
Description
Technical field
The present invention relates to field of information security technology, and in particular to a kind of file tracking method and device.
Background technology
In Internet era, information security is extremely important, and particularly in information enterprise, electronic bits of data is the important of enterprise
Assets need great care information safety protection, but employee can occur often and intentionally or accidentally divulge a secret enterprise key data, black
Phenomena such as visitor steals business data using Trojan Horse Technique.
It is that enterprise is most difficult to solve the problems, such as that file, which is divulged a secret, and particularly where flowed to after divulging a secret for file, is organized by which type of
It is used with people, if these information can track to obtain, is not only able to help enterprise's control loss, can also help personnel's tune of solving a case
Evidence obtaining is looked into, quickly solves the problems, such as information-leakage.
Invention content
In view of this, it is an object of the invention to overcome the deficiencies of the prior art and provide a kind of file tracking method and dresses
It puts, this method can be to file of divulging a secret into line trace, and determine confidential document flows to information, is conducive to that file of divulging a secret is controlled to cause
Loss, it helps the personal investigation that solves a case collect evidence, determine the suspect that divulges a secret rapidly.
In order to achieve the above object, the present invention adopts the following technical scheme that:A kind of file tracking method, including:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;
The information of the client is included in the message, so that the server-side receives and records the letter of the client
Breath.
Optionally, the script includes the link address information of server-side, to pass through the chained address of the server-side
Client described in information realization is established with the server-side and is connected.
Optionally, the information of the client includes:The IP address information of client.
Optionally, it is described by the script to the server-side send message before, the method further includes:
The information of the client is obtained by the script.
Optionally, the information of the client further includes:The subscriber mailbox of client and/or website log account information.
Optionally, the information that the client is obtained by the script, including:
The Cookie files of the client are accessed by the script, the client is recorded in the Cookie files
Subscriber mailbox and/or website log account information, and obtain from the Cookie files subscriber mailbox of the client
And/or website log account information.
Optionally, it is described that message is sent to the server-side by the script, the client is made to be established with server-side
Connection, the message include:
HTTP Post requests are sent to the server-side, it is described comprising Post parameters in the HTTP Post requests
Post parameters include the information of the client.
Optionally, the information of the client includes:IP address information, subscriber mailbox and/or the website log of client
Account information, the method further include:
After the server-side receives the message, the information of the client is obtained from the message;
The server-side determines the geographical location information of the client, root according to the IP address of the client
Registered user's identity of mailbox and/or website is determined according to the subscriber mailbox and/or website log account information;
The server is by the IP address of the client, corresponding geographical location, mailbox and/or the registered user of website
Identity preserves in a storage module as a record.
The present invention also provides a kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium by
When the processor of client performs so that client is able to carry out a kind of file tracking method, the method includes:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;It is described to disappear
The information of the client is included in breath, so that the server-side receives and records the information of the client.
The present invention also provides it is a kind of to file into the device of line trace, including:
Processor and the memory for storing processor-executable instruction;
Wherein, the processor is configured as:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;It is described to disappear
The information of the client is included in breath, so that the server-side receives and records the information of the client.
The present invention is included using above technical scheme, the file tracking method:When the confidential document of client is beaten
When opening, the script being previously implanted is run;Message is sent to the server-side by the script, makes the client and server-side
Establish connection;The information of the client is included in the message, so that the server-side receives and records the client
Information.After the server-side receives the message, the information of the client can be obtained from the message, finds out correspondence
Client where the information such as geographical location.This method can determine the flow direction of confidential document to file of divulging a secret into line trace
Information is conducive to loss caused by controlling file of divulging a secret, it helps the personal investigation that solves a case collects evidence, and determines the suspicion of divulging a secret rapidly
People.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention, for those of ordinary skill in the art, without creative efforts, can be with
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of process chart of optional embodiment of the present invention;
Fig. 2 is the process chart to confidential document injection script;
Fig. 3 is the process chart of another optional embodiment of the invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, technical scheme of the present invention will be carried out below
Detailed description.Obviously, described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.Base
Embodiment in the present invention, those of ordinary skill in the art are obtained all under the premise of creative work is not made
Other embodiment belongs to the range that the present invention is protected.
As shown in Figure 1, the present invention provides a kind of file tracking method, as a kind of optional embodiment of the present invention,
This method includes:
S11:When the confidential document of client is opened, the script being previously implanted is run;
S12:Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;Institute
The information that the client is included in message is stated,
S13:The server-side receives and records the information of the client.
It is understood that before this method execution, need to inject a script to confidential document;
It is specifically, as shown in Figure 2 to the processing method of confidential document injection script:
S21:Open the confidential document;
S22:Read the confidential document binary stream;
S23:Parse the confidential document binary stream;
S24:The confidential document binary stream is written into the content for script, forms new binary stream;
S25:New binary stream is saved on disk;
S26:Close the confidential document.
It is described further by taking PDF document as an example:PDF document is made of many objects, to PDF document injection script
Processing method be exactly add a scripting object again in PDF document list object, the scripting object is when PDF document is opened
It performs.
In order to performing the scripting object of injection when PDF document is opened, need in list object addition "/
70 R of OpenAction " parts, it is as shown below:
1 0 obj
/Type/Catalog
/Outlines 2 0 R
/Pages 3 0 R
/OpenAction 7 0 R
Endobj
Wherein, " OpenAction " represents that this object needs are performed when opening PDF document, and 7 represent this object
Number.
The scripting object content that number is 7 is as follows:
7 0 obj
/Type/Action
/S/URI
/URI(http://www.httpserver.com)
endobj
The scripting object content is website www.httpserver.com to be accessed.
The script includes the link address information of server-side, to be realized by the link address information of the server-side
The client is established with the server-side and is connected.
Further, the information of the client includes:IP address (the Internet Protocol of client
Address, Internet protocol address) information, client can get the IP address information of client by ping orders.
The optional embodiment of another kind as the present invention:By the script to the server-side send message it
Before, the method further includes:The information of the client is obtained by the script;The information of the client further includes:Visitor
The subscriber mailbox at family end and/or website log account information.
Optionally, the information that the client is obtained by the script, including:
The Cookie files of the client are accessed by the script, the client is recorded in the Cookie files
Subscriber mailbox and/or website log account information, and obtain from the Cookie files subscriber mailbox of the client
And/or website log account information.
Wherein, the Cookie is to preserve small text file on the client by Web server, such as user is using
Behind E-mail address, in the Cookie files email address can be recorded.It accesses Cookie files and reads email address and net
Logon account information of standing belongs to the prior art, and this will not be detailed here.
It should be noted that the script sends HTTP Post request messages, the HTTP Post to the server-side
Include the subscriber mailbox of the client and/or website log account information comprising Post parameters, the Post parameters in request.
It should be further noted that the method further includes:
After the server-side receives the message, the information of the client is obtained from the message;
The server-side determines the geographical location information of the client according to the IP address of the client, according to described
Subscriber mailbox and/or website log account information determine registered user's identity of mailbox and/or website;
The server is by the IP address of the client, corresponding geographical location, mailbox and/or the registered user of website
Identity preserves in a storage module as a record.
Further, the present invention also provides a kind of non-transitorycomputer readable storage medium, when the storage medium
In instruction by client processor perform when so that client is able to carry out a kind of file tracking method, the method packet
It includes:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;It is described to disappear
The information of the client is included in breath, so that the server-side receives and records the information of the client.
In addition, the application also provides following examples:It is a kind of to file into the device of line trace, including:
Processor and the memory for storing processor-executable instruction;
Wherein, the processor is configured as:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;It is described to disappear
The information of the client is included in breath, so that the server-side receives and records the information of the client.
As shown in figure 3, in actual use, when client opens the confidential document, which performs following flow:
S31:When the confidential document of client is opened, triggering performs the script;
S32:The script accesses the Cookie files of the client;
S33:Read the subscriber mailbox and/or website log account information in the Cookie files;
S34:Using the subscriber mailbox and/or website log account information (other-end information can also be included) as
POST parameters form HTTP Post requests;
S35:HTTP Post requests are sent to the HTTP server.
S36:The HTTP server receives HTTP Post and asks and obtain the IP address of the client, subscriber mailbox
And/or website log account information;
S37:The server-side determines the geographical location information of the client according to the IP address of the client, according to
The subscriber mailbox and/or website log account information determine registered user's identity of mailbox and/or website;
S38:The HTTP server is by the IP address of the client, corresponding geographical location and mailbox and/or net
The registered user's identity stood preserves in a storage module as a record.User can be obtained by the data checked in memory module
Take file of divulging a secret flows to information.
The present invention can be realized to file of divulging a secret into line trace, the information that flows to for the file that determines to divulge a secret, i.e.,:By which type of
Tissue or people used, and can find the IP address of client and the enrollment status information of mailbox or website, be conducive to control
It divulges a secret loss caused by file, can also help personal investigation's evidence obtaining of solving a case, determine the suspect that divulges a secret rapidly, it is quick to solve to divulge a secret to ask
Topic.
About the device in above-described embodiment, wherein modules perform the concrete mode of operation in related this method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
It is understood that same or similar part can mutually refer in the various embodiments described above, in some embodiments
Unspecified content may refer to the same or similar content in other embodiment.
It should be noted that any process described otherwise above or method description can be managed in flow chart or herein
Xie Wei represents the code for including the executable instruction of one or more the step of being used to implement specific logical function or process
Module, segment or part, and the range of the preferred embodiment of the application includes other realization, wherein can not press shown
The sequence for going out or discussing, including according to involved function by it is basic simultaneously in the way of or in the opposite order, to perform function,
This should be understood by embodiments herein person of ordinary skill in the field.
It should be appreciated that each section of the application can be realized with hardware, software, firmware or combination thereof.Above-mentioned
In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage
Or firmware is realized.If for example, with hardware come realize in another embodiment, can be under well known in the art
Any one of row technology or their combination are realized:With for the logic gates to data-signal realization logic function
Discrete logic, have suitable combinational logic gate circuit application-specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries
Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium
In matter, the program when being executed, one or a combination set of the step of including embodiment of the method.
In addition, each functional unit in each embodiment of the application can be integrated in a processing module, it can also
That each unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould
The form that hardware had both may be used in block is realized, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized in the form of software function module and is independent product sale or in use, can also be stored in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " example ", " is specifically shown " some embodiments "
The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description
Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms are not
Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any
One or more embodiments or example in combine in an appropriate manner.
Although embodiments herein has been shown and described above, it is to be understood that above-described embodiment is example
Property, it is impossible to the limitation to the application is interpreted as, those of ordinary skill in the art within the scope of application can be to above-mentioned
Embodiment is changed, changes, replacing and modification.
Claims (10)
1. a kind of file tracking method, which is characterized in that including:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;In the message
The information of the client is included, so that the server-side receives and records the information of the client.
2. file tracking method according to claim 1, which is characterized in that the script includes the chain ground connection of server-side
Location information is connected with realizing that the client is established with the server-side by the link address information of the server-side.
3. file tracking method according to claim 1, which is characterized in that the information of the client includes:Client
IP address information.
4. file tracking method according to claim 1, which is characterized in that it is described by the script to the server-side
Before sending message, the method further includes:
The information of the client is obtained by the script.
5. file tracking method according to claim 4, which is characterized in that the information of the client further includes:Client
The subscriber mailbox at end and/or website log account information.
6. file tracking method according to claim 5, which is characterized in that described that the client is obtained by the script
The information at end, including:
The Cookie files of the client are accessed by the script, the use of the client is recorded in the Cookie files
Family mailbox and/or website log account information, and obtain from the Cookie files client subscriber mailbox and/or
Website log account information.
7. file tracking method according to claim 1, which is characterized in that it is described by the script to the server-side
Message is sent, the client is made to be established with server-side and is connected, the message includes:
HTTP Post requests are sent to the server-side, Post parameters, the Post ginsengs are included in the HTTP Post requests
Number includes the information of the client.
8. file tracking method according to claim 1, which is characterized in that the information of the client includes:Client
IP address information, subscriber mailbox and/or website log account information, the method further include:
After the server-side receives the message, the information of the client is obtained from the message;
The server-side determines the geographical location information of the client according to the IP address of the client, according to the user
Mailbox and/or website log account information determine registered user's identity of mailbox and/or website;
The server is by the IP address of the client, corresponding geographical location, mailbox and/or registered user's identity of website
It is preserved in a storage module as a record.
9. a kind of non-transitorycomputer readable storage medium, which is characterized in that when the instruction in the storage medium is by client
When the processor at end performs so that client is able to carry out a kind of file tracking method, the method includes:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;In the message
The information of the client is included, so that the server-side receives and records the information of the client.
10. it is a kind of to file into the device of line trace, which is characterized in that including:
Processor and the memory for storing processor-executable instruction;
Wherein, the processor is configured as:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;In the message
The information of the client is included, so that the server-side receives and records the information of the client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711498631.0A CN108234488A (en) | 2017-12-29 | 2017-12-29 | A kind of file tracking method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711498631.0A CN108234488A (en) | 2017-12-29 | 2017-12-29 | A kind of file tracking method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108234488A true CN108234488A (en) | 2018-06-29 |
Family
ID=62644902
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711498631.0A Pending CN108234488A (en) | 2017-12-29 | 2017-12-29 | A kind of file tracking method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108234488A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102710633A (en) * | 2012-05-29 | 2012-10-03 | 大连佳姆信息安全软件技术有限公司 | Cloud security management system of security electronic documents and method |
CN103440461A (en) * | 2013-09-16 | 2013-12-11 | 山东省计算中心 | PDF (Portable Document Format) document security auditing method |
CN103618760A (en) * | 2013-11-07 | 2014-03-05 | 北京奇虎科技有限公司 | Processing method of cookie information in browser and browser |
CN104683569A (en) * | 2013-11-27 | 2015-06-03 | 菲特比特公司 | Method, system and device for automatically linking activity tracking device to user equipment |
CN104778419A (en) * | 2015-04-15 | 2015-07-15 | 华中科技大学 | User privacy data protection method based on dynamic data flow tracking under cloud environment |
CN105471883A (en) * | 2015-12-10 | 2016-04-06 | 中国电子科技集团公司第三十研究所 | Tor network tracing system and tracing method based on web injection |
CN106570407A (en) * | 2016-11-14 | 2017-04-19 | 西北大学 | KNN-based user position privacy self-sensing mechanism protection method |
-
2017
- 2017-12-29 CN CN201711498631.0A patent/CN108234488A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102710633A (en) * | 2012-05-29 | 2012-10-03 | 大连佳姆信息安全软件技术有限公司 | Cloud security management system of security electronic documents and method |
CN103440461A (en) * | 2013-09-16 | 2013-12-11 | 山东省计算中心 | PDF (Portable Document Format) document security auditing method |
CN103618760A (en) * | 2013-11-07 | 2014-03-05 | 北京奇虎科技有限公司 | Processing method of cookie information in browser and browser |
CN104683569A (en) * | 2013-11-27 | 2015-06-03 | 菲特比特公司 | Method, system and device for automatically linking activity tracking device to user equipment |
CN104778419A (en) * | 2015-04-15 | 2015-07-15 | 华中科技大学 | User privacy data protection method based on dynamic data flow tracking under cloud environment |
CN105471883A (en) * | 2015-12-10 | 2016-04-06 | 中国电子科技集团公司第三十研究所 | Tor network tracing system and tracing method based on web injection |
CN106570407A (en) * | 2016-11-14 | 2017-04-19 | 西北大学 | KNN-based user position privacy self-sensing mechanism protection method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Merzdovnik et al. | Block me if you can: A large-scale study of tracker-blocking tools | |
Nunes et al. | Darknet and deepnet mining for proactive cybersecurity threat intelligence | |
Cohen | PyFlag–An advanced network forensic framework | |
Rawat et al. | Malevolent information crawling mechanism for forming structured illegal organisations in hidden networks | |
US20140230065A1 (en) | Performance benchmarking for simulated phishing attacks | |
US10318728B2 (en) | Determining permissible activity based on permissible activity rules | |
Salamh et al. | What’s on the horizon? An in-depth forensic analysis of android and iOS applications | |
CN110336812A (en) | Resource intercepting processing method, device, computer equipment and storage medium | |
Szücs et al. | Introduction of the ARDS—anti-ransomware defense System model—based on the systematic review of worldwide ransomware attacks | |
CN108234488A (en) | A kind of file tracking method and device | |
Azhar et al. | Forensic investigations of Google Meet and Microsoft Teams–two popular conferencing tools in the Pandemic | |
US11831661B2 (en) | Multi-tiered approach to payload detection for incoming communications | |
Altulyan et al. | A blockchain framework data integrity enhanced recommender system | |
Harwood | Internet security: How to defend against attackers on the web | |
Langford et al. | Phishing faster: Implementing chatgpt into phishing campaigns | |
CN107743134A (en) | Log-on message processing method, client, server and storage medium | |
Alford | Current and Emerging Threats to Data-How Digital Curation and ARM Principles Can Help Us Brave this New World: A Case Study | |
Fehér | Cybersecurity threats of on-premise systems in small and medium-sized enterprise environment | |
CN110109967A (en) | Account querying method, system and the storage medium of identity-based information | |
Al-Saad | Identifying internet abuse by analyzing user behavior on the internet | |
Wardle et al. | How long does it take to get owned? | |
Ikhalia et al. | Deploying social network security awareness through Mass Interpersonal Persuasion (MIP) | |
Echeverría et al. | Are ecuadorian millennials prepared against a cyberattack? | |
Waschke et al. | Misuse of Computers: When Personal Devices Break Bad | |
Grossman | Jeremiah Grossman |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180629 |
|
RJ01 | Rejection of invention patent application after publication |