CN108234488A - A kind of file tracking method and device - Google Patents

A kind of file tracking method and device Download PDF

Info

Publication number
CN108234488A
CN108234488A CN201711498631.0A CN201711498631A CN108234488A CN 108234488 A CN108234488 A CN 108234488A CN 201711498631 A CN201711498631 A CN 201711498631A CN 108234488 A CN108234488 A CN 108234488A
Authority
CN
China
Prior art keywords
client
information
server
script
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711498631.0A
Other languages
Chinese (zh)
Inventor
魏园
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Long Royal Technology Co Ltd
Original Assignee
Beijing Long Royal Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Long Royal Technology Co Ltd filed Critical Beijing Long Royal Technology Co Ltd
Priority to CN201711498631.0A priority Critical patent/CN108234488A/en
Publication of CN108234488A publication Critical patent/CN108234488A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/69Types of network addresses using geographic information, e.g. room number

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Bioethics (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of file tracking method and device, this method includes:When the confidential document of client is opened, the script being previously implanted is run;Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;The information of the client is included in the message, so that the server-side receives and records the information of the client.The device includes processor and the memory for storing processor-executable instruction;The processor is configured according to the file tracking method.Method provided by the present invention can be to file of divulging a secret into line trace, and determine confidential document flows to information, is conducive to loss caused by controlling file of divulging a secret, it helps the personal investigation that solves a case collects evidence, and determines the suspect that divulges a secret rapidly.

Description

A kind of file tracking method and device
Technical field
The present invention relates to field of information security technology, and in particular to a kind of file tracking method and device.
Background technology
In Internet era, information security is extremely important, and particularly in information enterprise, electronic bits of data is the important of enterprise Assets need great care information safety protection, but employee can occur often and intentionally or accidentally divulge a secret enterprise key data, black Phenomena such as visitor steals business data using Trojan Horse Technique.
It is that enterprise is most difficult to solve the problems, such as that file, which is divulged a secret, and particularly where flowed to after divulging a secret for file, is organized by which type of It is used with people, if these information can track to obtain, is not only able to help enterprise's control loss, can also help personnel's tune of solving a case Evidence obtaining is looked into, quickly solves the problems, such as information-leakage.
Invention content
In view of this, it is an object of the invention to overcome the deficiencies of the prior art and provide a kind of file tracking method and dresses It puts, this method can be to file of divulging a secret into line trace, and determine confidential document flows to information, is conducive to that file of divulging a secret is controlled to cause Loss, it helps the personal investigation that solves a case collect evidence, determine the suspect that divulges a secret rapidly.
In order to achieve the above object, the present invention adopts the following technical scheme that:A kind of file tracking method, including:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;
The information of the client is included in the message, so that the server-side receives and records the letter of the client Breath.
Optionally, the script includes the link address information of server-side, to pass through the chained address of the server-side Client described in information realization is established with the server-side and is connected.
Optionally, the information of the client includes:The IP address information of client.
Optionally, it is described by the script to the server-side send message before, the method further includes:
The information of the client is obtained by the script.
Optionally, the information of the client further includes:The subscriber mailbox of client and/or website log account information.
Optionally, the information that the client is obtained by the script, including:
The Cookie files of the client are accessed by the script, the client is recorded in the Cookie files Subscriber mailbox and/or website log account information, and obtain from the Cookie files subscriber mailbox of the client And/or website log account information.
Optionally, it is described that message is sent to the server-side by the script, the client is made to be established with server-side Connection, the message include:
HTTP Post requests are sent to the server-side, it is described comprising Post parameters in the HTTP Post requests Post parameters include the information of the client.
Optionally, the information of the client includes:IP address information, subscriber mailbox and/or the website log of client Account information, the method further include:
After the server-side receives the message, the information of the client is obtained from the message;
The server-side determines the geographical location information of the client, root according to the IP address of the client
Registered user's identity of mailbox and/or website is determined according to the subscriber mailbox and/or website log account information;
The server is by the IP address of the client, corresponding geographical location, mailbox and/or the registered user of website Identity preserves in a storage module as a record.
The present invention also provides a kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium by When the processor of client performs so that client is able to carry out a kind of file tracking method, the method includes:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;It is described to disappear The information of the client is included in breath, so that the server-side receives and records the information of the client.
The present invention also provides it is a kind of to file into the device of line trace, including:
Processor and the memory for storing processor-executable instruction;
Wherein, the processor is configured as:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;It is described to disappear The information of the client is included in breath, so that the server-side receives and records the information of the client.
The present invention is included using above technical scheme, the file tracking method:When the confidential document of client is beaten When opening, the script being previously implanted is run;Message is sent to the server-side by the script, makes the client and server-side Establish connection;The information of the client is included in the message, so that the server-side receives and records the client Information.After the server-side receives the message, the information of the client can be obtained from the message, finds out correspondence Client where the information such as geographical location.This method can determine the flow direction of confidential document to file of divulging a secret into line trace Information is conducive to loss caused by controlling file of divulging a secret, it helps the personal investigation that solves a case collects evidence, and determines the suspicion of divulging a secret rapidly People.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention, for those of ordinary skill in the art, without creative efforts, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of process chart of optional embodiment of the present invention;
Fig. 2 is the process chart to confidential document injection script;
Fig. 3 is the process chart of another optional embodiment of the invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, technical scheme of the present invention will be carried out below Detailed description.Obviously, described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.Base Embodiment in the present invention, those of ordinary skill in the art are obtained all under the premise of creative work is not made Other embodiment belongs to the range that the present invention is protected.
As shown in Figure 1, the present invention provides a kind of file tracking method, as a kind of optional embodiment of the present invention, This method includes:
S11:When the confidential document of client is opened, the script being previously implanted is run;
S12:Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;Institute The information that the client is included in message is stated,
S13:The server-side receives and records the information of the client.
It is understood that before this method execution, need to inject a script to confidential document;
It is specifically, as shown in Figure 2 to the processing method of confidential document injection script:
S21:Open the confidential document;
S22:Read the confidential document binary stream;
S23:Parse the confidential document binary stream;
S24:The confidential document binary stream is written into the content for script, forms new binary stream;
S25:New binary stream is saved on disk;
S26:Close the confidential document.
It is described further by taking PDF document as an example:PDF document is made of many objects, to PDF document injection script Processing method be exactly add a scripting object again in PDF document list object, the scripting object is when PDF document is opened It performs.
In order to performing the scripting object of injection when PDF document is opened, need in list object addition "/ 70 R of OpenAction " parts, it is as shown below:
1 0 obj
/Type/Catalog
/Outlines 2 0 R
/Pages 3 0 R
/OpenAction 7 0 R
Endobj
Wherein, " OpenAction " represents that this object needs are performed when opening PDF document, and 7 represent this object Number.
The scripting object content that number is 7 is as follows:
7 0 obj
/Type/Action
/S/URI
/URI(http://www.httpserver.com)
endobj
The scripting object content is website www.httpserver.com to be accessed.
The script includes the link address information of server-side, to be realized by the link address information of the server-side The client is established with the server-side and is connected.
Further, the information of the client includes:IP address (the Internet Protocol of client Address, Internet protocol address) information, client can get the IP address information of client by ping orders.
The optional embodiment of another kind as the present invention:By the script to the server-side send message it Before, the method further includes:The information of the client is obtained by the script;The information of the client further includes:Visitor The subscriber mailbox at family end and/or website log account information.
Optionally, the information that the client is obtained by the script, including:
The Cookie files of the client are accessed by the script, the client is recorded in the Cookie files Subscriber mailbox and/or website log account information, and obtain from the Cookie files subscriber mailbox of the client And/or website log account information.
Wherein, the Cookie is to preserve small text file on the client by Web server, such as user is using Behind E-mail address, in the Cookie files email address can be recorded.It accesses Cookie files and reads email address and net Logon account information of standing belongs to the prior art, and this will not be detailed here.
It should be noted that the script sends HTTP Post request messages, the HTTP Post to the server-side Include the subscriber mailbox of the client and/or website log account information comprising Post parameters, the Post parameters in request.
It should be further noted that the method further includes:
After the server-side receives the message, the information of the client is obtained from the message;
The server-side determines the geographical location information of the client according to the IP address of the client, according to described Subscriber mailbox and/or website log account information determine registered user's identity of mailbox and/or website;
The server is by the IP address of the client, corresponding geographical location, mailbox and/or the registered user of website Identity preserves in a storage module as a record.
Further, the present invention also provides a kind of non-transitorycomputer readable storage medium, when the storage medium In instruction by client processor perform when so that client is able to carry out a kind of file tracking method, the method packet It includes:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;It is described to disappear The information of the client is included in breath, so that the server-side receives and records the information of the client.
In addition, the application also provides following examples:It is a kind of to file into the device of line trace, including:
Processor and the memory for storing processor-executable instruction;
Wherein, the processor is configured as:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;It is described to disappear The information of the client is included in breath, so that the server-side receives and records the information of the client.
As shown in figure 3, in actual use, when client opens the confidential document, which performs following flow:
S31:When the confidential document of client is opened, triggering performs the script;
S32:The script accesses the Cookie files of the client;
S33:Read the subscriber mailbox and/or website log account information in the Cookie files;
S34:Using the subscriber mailbox and/or website log account information (other-end information can also be included) as POST parameters form HTTP Post requests;
S35:HTTP Post requests are sent to the HTTP server.
S36:The HTTP server receives HTTP Post and asks and obtain the IP address of the client, subscriber mailbox And/or website log account information;
S37:The server-side determines the geographical location information of the client according to the IP address of the client, according to The subscriber mailbox and/or website log account information determine registered user's identity of mailbox and/or website;
S38:The HTTP server is by the IP address of the client, corresponding geographical location and mailbox and/or net The registered user's identity stood preserves in a storage module as a record.User can be obtained by the data checked in memory module Take file of divulging a secret flows to information.
The present invention can be realized to file of divulging a secret into line trace, the information that flows to for the file that determines to divulge a secret, i.e.,:By which type of Tissue or people used, and can find the IP address of client and the enrollment status information of mailbox or website, be conducive to control It divulges a secret loss caused by file, can also help personal investigation's evidence obtaining of solving a case, determine the suspect that divulges a secret rapidly, it is quick to solve to divulge a secret to ask Topic.
About the device in above-described embodiment, wherein modules perform the concrete mode of operation in related this method Embodiment in be described in detail, explanation will be not set forth in detail herein.
It is understood that same or similar part can mutually refer in the various embodiments described above, in some embodiments Unspecified content may refer to the same or similar content in other embodiment.
It should be noted that any process described otherwise above or method description can be managed in flow chart or herein Xie Wei represents the code for including the executable instruction of one or more the step of being used to implement specific logical function or process Module, segment or part, and the range of the preferred embodiment of the application includes other realization, wherein can not press shown The sequence for going out or discussing, including according to involved function by it is basic simultaneously in the way of or in the opposite order, to perform function, This should be understood by embodiments herein person of ordinary skill in the field.
It should be appreciated that each section of the application can be realized with hardware, software, firmware or combination thereof.Above-mentioned In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage Or firmware is realized.If for example, with hardware come realize in another embodiment, can be under well known in the art Any one of row technology or their combination are realized:With for the logic gates to data-signal realization logic function Discrete logic, have suitable combinational logic gate circuit application-specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium In matter, the program when being executed, one or a combination set of the step of including embodiment of the method.
In addition, each functional unit in each embodiment of the application can be integrated in a processing module, it can also That each unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould The form that hardware had both may be used in block is realized, can also be realized in the form of software function module.The integrated module is such as Fruit is realized in the form of software function module and is independent product sale or in use, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " example ", " is specifically shown " some embodiments " The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms are not Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any One or more embodiments or example in combine in an appropriate manner.
Although embodiments herein has been shown and described above, it is to be understood that above-described embodiment is example Property, it is impossible to the limitation to the application is interpreted as, those of ordinary skill in the art within the scope of application can be to above-mentioned Embodiment is changed, changes, replacing and modification.

Claims (10)

1. a kind of file tracking method, which is characterized in that including:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;In the message The information of the client is included, so that the server-side receives and records the information of the client.
2. file tracking method according to claim 1, which is characterized in that the script includes the chain ground connection of server-side Location information is connected with realizing that the client is established with the server-side by the link address information of the server-side.
3. file tracking method according to claim 1, which is characterized in that the information of the client includes:Client IP address information.
4. file tracking method according to claim 1, which is characterized in that it is described by the script to the server-side Before sending message, the method further includes:
The information of the client is obtained by the script.
5. file tracking method according to claim 4, which is characterized in that the information of the client further includes:Client The subscriber mailbox at end and/or website log account information.
6. file tracking method according to claim 5, which is characterized in that described that the client is obtained by the script The information at end, including:
The Cookie files of the client are accessed by the script, the use of the client is recorded in the Cookie files Family mailbox and/or website log account information, and obtain from the Cookie files client subscriber mailbox and/or Website log account information.
7. file tracking method according to claim 1, which is characterized in that it is described by the script to the server-side Message is sent, the client is made to be established with server-side and is connected, the message includes:
HTTP Post requests are sent to the server-side, Post parameters, the Post ginsengs are included in the HTTP Post requests Number includes the information of the client.
8. file tracking method according to claim 1, which is characterized in that the information of the client includes:Client IP address information, subscriber mailbox and/or website log account information, the method further include:
After the server-side receives the message, the information of the client is obtained from the message;
The server-side determines the geographical location information of the client according to the IP address of the client, according to the user Mailbox and/or website log account information determine registered user's identity of mailbox and/or website;
The server is by the IP address of the client, corresponding geographical location, mailbox and/or registered user's identity of website It is preserved in a storage module as a record.
9. a kind of non-transitorycomputer readable storage medium, which is characterized in that when the instruction in the storage medium is by client When the processor at end performs so that client is able to carry out a kind of file tracking method, the method includes:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;In the message The information of the client is included, so that the server-side receives and records the information of the client.
10. it is a kind of to file into the device of line trace, which is characterized in that including:
Processor and the memory for storing processor-executable instruction;
Wherein, the processor is configured as:
When the confidential document of client is opened, the script being previously implanted is run;
Message is sent to the server-side by the script, the client is made to be established with server-side and is connected;In the message The information of the client is included, so that the server-side receives and records the information of the client.
CN201711498631.0A 2017-12-29 2017-12-29 A kind of file tracking method and device Pending CN108234488A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711498631.0A CN108234488A (en) 2017-12-29 2017-12-29 A kind of file tracking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711498631.0A CN108234488A (en) 2017-12-29 2017-12-29 A kind of file tracking method and device

Publications (1)

Publication Number Publication Date
CN108234488A true CN108234488A (en) 2018-06-29

Family

ID=62644902

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711498631.0A Pending CN108234488A (en) 2017-12-29 2017-12-29 A kind of file tracking method and device

Country Status (1)

Country Link
CN (1) CN108234488A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710633A (en) * 2012-05-29 2012-10-03 大连佳姆信息安全软件技术有限公司 Cloud security management system of security electronic documents and method
CN103440461A (en) * 2013-09-16 2013-12-11 山东省计算中心 PDF (Portable Document Format) document security auditing method
CN103618760A (en) * 2013-11-07 2014-03-05 北京奇虎科技有限公司 Processing method of cookie information in browser and browser
CN104683569A (en) * 2013-11-27 2015-06-03 菲特比特公司 Method, system and device for automatically linking activity tracking device to user equipment
CN104778419A (en) * 2015-04-15 2015-07-15 华中科技大学 User privacy data protection method based on dynamic data flow tracking under cloud environment
CN105471883A (en) * 2015-12-10 2016-04-06 中国电子科技集团公司第三十研究所 Tor network tracing system and tracing method based on web injection
CN106570407A (en) * 2016-11-14 2017-04-19 西北大学 KNN-based user position privacy self-sensing mechanism protection method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710633A (en) * 2012-05-29 2012-10-03 大连佳姆信息安全软件技术有限公司 Cloud security management system of security electronic documents and method
CN103440461A (en) * 2013-09-16 2013-12-11 山东省计算中心 PDF (Portable Document Format) document security auditing method
CN103618760A (en) * 2013-11-07 2014-03-05 北京奇虎科技有限公司 Processing method of cookie information in browser and browser
CN104683569A (en) * 2013-11-27 2015-06-03 菲特比特公司 Method, system and device for automatically linking activity tracking device to user equipment
CN104778419A (en) * 2015-04-15 2015-07-15 华中科技大学 User privacy data protection method based on dynamic data flow tracking under cloud environment
CN105471883A (en) * 2015-12-10 2016-04-06 中国电子科技集团公司第三十研究所 Tor network tracing system and tracing method based on web injection
CN106570407A (en) * 2016-11-14 2017-04-19 西北大学 KNN-based user position privacy self-sensing mechanism protection method

Similar Documents

Publication Publication Date Title
Merzdovnik et al. Block me if you can: A large-scale study of tracker-blocking tools
Nunes et al. Darknet and deepnet mining for proactive cybersecurity threat intelligence
Cohen PyFlag–An advanced network forensic framework
Rawat et al. Malevolent information crawling mechanism for forming structured illegal organisations in hidden networks
US20140230065A1 (en) Performance benchmarking for simulated phishing attacks
US10318728B2 (en) Determining permissible activity based on permissible activity rules
Salamh et al. What’s on the horizon? An in-depth forensic analysis of android and iOS applications
CN110336812A (en) Resource intercepting processing method, device, computer equipment and storage medium
Szücs et al. Introduction of the ARDS—anti-ransomware defense System model—based on the systematic review of worldwide ransomware attacks
CN108234488A (en) A kind of file tracking method and device
Azhar et al. Forensic investigations of Google Meet and Microsoft Teams–two popular conferencing tools in the Pandemic
US11831661B2 (en) Multi-tiered approach to payload detection for incoming communications
Altulyan et al. A blockchain framework data integrity enhanced recommender system
Harwood Internet security: How to defend against attackers on the web
Langford et al. Phishing faster: Implementing chatgpt into phishing campaigns
CN107743134A (en) Log-on message processing method, client, server and storage medium
Alford Current and Emerging Threats to Data-How Digital Curation and ARM Principles Can Help Us Brave this New World: A Case Study
Fehér Cybersecurity threats of on-premise systems in small and medium-sized enterprise environment
CN110109967A (en) Account querying method, system and the storage medium of identity-based information
Al-Saad Identifying internet abuse by analyzing user behavior on the internet
Wardle et al. How long does it take to get owned?
Ikhalia et al. Deploying social network security awareness through Mass Interpersonal Persuasion (MIP)
Echeverría et al. Are ecuadorian millennials prepared against a cyberattack?
Waschke et al. Misuse of Computers: When Personal Devices Break Bad
Grossman Jeremiah Grossman

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180629

RJ01 Rejection of invention patent application after publication