CN110149236A - WEB application firewall management system - Google Patents
WEB application firewall management system Download PDFInfo
- Publication number
- CN110149236A CN110149236A CN201910466227.8A CN201910466227A CN110149236A CN 110149236 A CN110149236 A CN 110149236A CN 201910466227 A CN201910466227 A CN 201910466227A CN 110149236 A CN110149236 A CN 110149236A
- Authority
- CN
- China
- Prior art keywords
- unit
- web application
- management system
- application firewall
- detection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0246—Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/046—Network management architectures or arrangements comprising network management agents or mobile agents therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Abstract
The invention discloses a kind of WEB application firewall management systems, including data processing unit interconnected, abnormality detecting unit, exception processing unit, management service unit, log unit, packet check unit, configuration unit, application proxies block and heartbeat unit;Data processing unit concentrates data for acquiring firewall rule, and carries out sieve series and modeling to data characteristics;Abnormality detecting unit is used to carry out the foundation and abnormal detection of rule model;Exception processing unit is for carrying out risk assessment and abnormal domain processing;Management service unit is used to carry out the management service of log, abnormality processing result and system interface;Log unit is used to receive and manage the log information that each module of the WEB application firewall management internal system is submitted;Packet check unit is detected for access control rule and packet state-detection.The demand that the present invention has multiple functions, can solve various problems, is able to satisfy numerous users.
Description
Technical field
The present invention relates to firewall field, in particular to a kind of WEB application firewall management system.
Background technique
Firewall management system belongs to network and safe operation management class product, it can be achieved that firewall, routing is deployed in
The access control policy of switching equipment, Internet resources etc. carries out the function such as security risk analysis and automatic flow management
Can, assist firewall administrator to excavate potential security risk present in access control policy, cleaning and the corresponding rule of optimization,
Compliance audit report is automatically generated, and intelligent implementation strategy is changed and automated, potential risk present in active protection change,
Actively redundancy is rubbed present in optimization change.Existing firewall management system function is more single, problem-solving ability
It is limited, it is not able to satisfy the demand of numerous users.
Summary of the invention
The technical problem to be solved in the present invention is that in view of the above drawbacks of the prior art, providing a kind of with a variety of function
Can, it can solve various problems, the WEB application firewall management system for the demand for being able to satisfy numerous users.
The technical solution adopted by the present invention to solve the technical problems is: a kind of WEB application firewall management system is constructed,
Include:
Data processing unit: data are concentrated for acquiring firewall rule, and sieve series and modeling are carried out to data characteristics;
Abnormality detecting unit: for carrying out the foundation and abnormal detection of rule model;
Exception processing unit: for carrying out risk assessment and abnormal domain processing;
Management service unit: for carrying out the management service of log, abnormality processing result and system interface;
Log unit: the log submitted for receiving and managing each module of the WEB application firewall management internal system
Information;
Packet check unit: the detection of rule and the detection of bag-like state are controlled for accessing;
Configuration unit: it is used for configuration message filtering rule, and is submitted to the packet check unit;
Application proxies block: the legal message submitted for receiving the packet check unit, and transparent transfer application layer
The request and response of agreement;
Heartbeat unit: for periodically reporting the health information of WEB application firewall management system to server;
The data processing unit, abnormality detecting unit, exception processing unit, management service unit, log unit, message
Detection unit, configuration unit, application proxies block and heartbeat unit are connected with each other.
In WEB application firewall management system of the present invention, the data processing unit further comprises:
Rule model establishes module: for carrying out data modeling for Outlier Detection Algorithm;
Exception rules detection module: for being detected to exception rules;
The rule model establishes module and exception rules detection module is connected with each other.
In WEB application firewall management system of the present invention, the exception processing unit further comprises:
Risk evaluation module: for realizing risk evaluation model, by the way that abnormal rule are added in the risk evaluation model
Feature then realizes the risk assessment to abnormal domain;
Abnormal domain processing module: for realizing abnormality processing algorithm, abnormal domain is split and handles exception;
The risk evaluation module and abnormal domain processing module are connected with each other.
In WEB application firewall management system of the present invention, further includes:
Anti-virus unit: for viral diagnosis and cleaning;
Intrusion detecting unit: for carrying out network intrusions;
Information filtering unit: for carrying out the detection and filtering of message content;
The anti-virus unit, intrusion detecting unit and information filtering unit are connected with each other with the heartbeat unit.
In WEB application firewall management system of the present invention, further includes:
Policy management element: response processing is carried out for instructing fixed risk case to be based on predetermined manner;
Event management unit: it is assessed for event risk, and by determining risk case according to the policy management element
Instruction carry out response processing;
The policy management element and event management unit are connected with each other with the heartbeat unit.
In WEB application firewall management system of the present invention, further includes:
Vulnerability scanning unit: for scanning the vulnerability data of specified assets;
Report unit: for providing safe operation report;
The vulnerability scanning unit and report unit are connected with each other with the heartbeat unit.
Implement WEB application firewall management system of the invention, has the advantages that due to being equipped with data processing list
Member, abnormality detecting unit, exception processing unit, management service unit, log unit, packet check unit, configuration unit, application
Agent unit and heartbeat unit, the present invention are provided with more functional units compared with traditional firewall management system, can be with
The function of the WEB application firewall management system is enriched, therefore the present invention has multiple functions, can solve various problems, can expire
The demand of the numerous users of foot.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is the structural schematic diagram in WEB application firewall management system one embodiment of the present invention;
Fig. 2 is the structural schematic diagram of data processing unit in the embodiment;
Fig. 3 is the structural schematic diagram of exception processing unit in the embodiment.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
In WEB application firewall management system embodiment of the present invention, the structure of the WEB application firewall management system is shown
It is intended to as shown in Figure 1.In Fig. 1, which includes data processing unit 1, abnormality detecting unit 2, different
Normal processing unit 3, management service unit 4, log unit 5, packet check unit 6, configuration unit 7, application proxies block 8 and the heart
Jump unit 9.
Wherein, data processing unit 1 concentrates data for acquiring firewall rule, and carries out sieve series to data characteristics and build
Mould;Abnormality detection list 2 is used to carry out the foundation and abnormal detection of rule model;Exception processing unit 3 is commented for carrying out risk
Estimate and abnormal domain is handled;Management service unit 4 is used to carry out the management service of log, abnormality processing result and system interface;Day
Will unit 5 is used to receive and manage the log information that each module of WEB application firewall management internal system is submitted.
Packet check unit 6, which is used to access, controls the detection of rule and the detection of bag-like state.Specifically, message is examined
It surveys unit 6 to be used to detect the message for entering and leaving the WEB application firewall management system, including the access control based on agreement
The detection of rule and the detection of message status.In kernel mode, the data that network interface card driver is submitted are received
After message, firstly, parsing IP header field, the IP packet format that rule and IP agreement according to configured in advance are arranged, abandon and disobey
The IP packet of anti-rule and message format mistake;Secondly, TCP, UDP for being required and being configured based on transport layer protocol protect rule
Then, the detection of state and the detection of rule, directly discarding invalid packet are carried out to message in transport layer;Finally by message according to thing
The rule first configured is indicated.
Configuration unit 7 is used for configuration message filtering rule, and is submitted to packet check unit 6.Specifically, configuration unit
7 for carrying out the running configuration of the WEB application firewall management system, including the configuration of packet filtering rule, message redirecting ginseng
The global operating parameter configuration of number configuration, VPN parameter configuration, safety service platform communication configuration and firewall system M1, such as
Network interface configuration, NAT configuration and credible management terminal information configuration.Configuration unit 7 receives the configuration parameter of operator, and
It is submitted to log unit 5, packet check unit 6, application proxies block 8 and heartbeat unit 9.
Application proxies block 8 is used to receive the legal message of packet check unit submission, and transparent transfer application layer protocol
Request and response.Application proxies block 8 carries out Transparent Proxy to application layer protocol for WEB application firewall management system,
And further progress application protocol grade detects, including message format detection, state-detection and sensitive content based on protocol specification
Filtering.The message that target is WEB application firewall management system is directly submitted to WEB application firewall by application proxies block 8
The application of management system;Meanwhile for the message for needing transfer, transparent transfer is directed to request message, as server-side, eventually
The only request of applications client, meanwhile, it sends and requests to true server-side;It is terminated true for response message as client
The response of real server-side, meanwhile, as server-side, respond the request of raw client.
Heartbeat unit 9 is for periodically reporting the health information of WEB application firewall management system to server.Heartbeat
Unit 9 is used for the health information of the timing acquiring WEB application firewall management system, including disk size and utilization rate,
Cpu load, memory load, active process title and process number, the file information, network interface MAC Address and IP address, static rule
Then number, dynamic rules number, active session number and network interface counting messages number etc., and will be submitted after collected information Regularization
To Cloud Server.
The present invention is provided with more functional units, can enrich the WEB and answer compared with traditional firewall management system
With the function of firewall management system, therefore the present invention has multiple functions, can solve various problems, is able to satisfy numerous users'
Demand.
In the present embodiment, which further includes anti-virus unit 10,11 and of intrusion detecting unit
Information filtering unit 12, anti-virus unit 10, intrusion detecting unit 11 and information filtering unit 12 are interconnected with 9 phase of heartbeat unit
It connects.
Wherein, anti-virus unit 10 is for viral diagnosis and cleaning.Specifically, anti-virus unit 10 is used for Cloud Server
Anti-virus processing is carried out to redirection message, receives the message that application proxies block 8 is submitted, and processing result is fed back to application
Agent unit 8.
Intrusion detecting unit 11 is for carrying out network intrusions.Specifically, intrusion detecting unit 11 is used for Cloud Server pair
Redirection message performs intrusion detection processing, receives the message that application proxies block 8 is submitted, and processing result is submitted to application
Agent unit 8.
Information filtering unit 12 is used to carry out the detection and filtering of message content.Specifically, information filtering unit 12 is used
Information filtering, including key object, URL object and login Title object mistake are carried out to redirection message in Cloud Server
Filter;Information filtering unit 12 receives the message that application proxies block 8 is submitted, and processing result is submitted to application proxies block 8.
In the present embodiment, which further includes policy management element 13 and event management unit
14, policy management element 13 and event management unit 14 are connected with each other with heartbeat unit 9.Policy management element 13 is for instructing
Fixed risk case is based on predetermined manner and carries out response processing.Specifically, policy management element 13 is used for Cloud Server
Preset Message processing strategy required for all kinds of strategies, including Capital operation status safety benchmark, application protocol agency, at event
Analysis strategy required for managing and response policy.Policy management element 13 receives customized strategy, and is submitted to answers respectively
With agent unit 8 and event management unit 14.
Event management unit 14 is assessed for event risk, and the finger by determining risk case according to policy management element
Show and carries out response processing.Event management unit 14 receives all kinds of security incidents and handles, including the association of event loophole, event assets
Association and event chain association, and the Risk Results after being analyzed;By treated, event is saved in event management unit 14
Database, so as to the processing of report unit 16;The response policy configured according to policy management element 13 responds event, such as logical
Know administrator.
In the present embodiment, which further includes vulnerability scanning unit 15 and report unit 16, leakage
Hole scanning element 15 and report unit 16 are connected with each other with heartbeat unit 9.Wherein, vulnerability scanning unit 15 is specified for scanning
The vulnerability data of assets.Specifically, vulnerability scanning unit 15 is for Cloud Server in WEB application firewall management system
Portion's network carries out Vulnerability Scan, and vulnerability scanning unit 15 is directly deployed on Cloud Server, by active scan to obtain network
And/or the vulnerability information of equipment.
Report unit 16 is for providing safe operation report.Specifically, report unit 16 is used for the report of Cloud Server
Processing, provides safety service platform grade report, such report reflects the operation conditions of all firewall systems.Report unit 16 is also
For firewall system grade report, such report only reflects the operation situation of specific firewall and its Intranet;Report management is provided
Member's authority managing and controlling is only capable of browsing and the WEB application firewall management with the administrator of the WEB application firewall management system binding
System and its relevant report of Intranet assets.
Fig. 2 is the structural schematic diagram of data processing unit in the present embodiment, and in Fig. 2, data processing unit 1 further comprises
Rule model interconnected establishes module 11 and exception rules detection module 12, wherein rule model establishes 11 conduct of module
The basis of exception rules detection module 12, for carrying out data modeling for Outlier Detection Algorithm.Exception rules detection module 12 is used
It is detected in exception rules, establishes module 11 with rule model and separate, improve the scalability of system, when needing to system
Method when improving, it is only necessary to change exception rules detection module 12.
Fig. 3 is the structural schematic diagram of exception processing unit in the present embodiment, and in Fig. 3, which includes mutual
The risk evaluation module 31 of connection and abnormal domain processing module 32.Wherein, risk evaluation module 31 is for realizing risk assessment mould
Type, the feature by the way that exception rules are added in risk evaluation model realize that the risk assessment to abnormal domain, quantization illustrate
The risk class in abnormal domain.Abnormal domain processing module 32 is split and handles for realizing abnormality processing algorithm, to abnormal domain
It is abnormal.
In short, the present invention is provided with more function lists compared with traditional firewall management system in the present embodiment
Member can enrich the function of the WEB application firewall management system, therefore the present invention has multiple functions, can solve a variety of ask
Inscribe, be able to satisfy the demand of numerous users.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Within mind and principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (6)
1. a kind of WEB application firewall management system characterized by comprising
Data processing unit: data are concentrated for acquiring firewall rule, and sieve series and modeling are carried out to data characteristics;
Abnormality detecting unit: for carrying out the foundation and abnormal detection of rule model;
Exception processing unit: for carrying out risk assessment and abnormal domain processing;
Management service unit: for carrying out the management service of log, abnormality processing result and system interface;
Log unit: the log information submitted for receiving and managing each module of the WEB application firewall management internal system;
Packet check unit: the detection of rule and the detection of bag-like state are controlled for accessing;
Configuration unit: it is used for configuration message filtering rule, and is submitted to the packet check unit;
Application proxies block: the legal message submitted for receiving the packet check unit, and transparent transfer application layer protocol
Request and response;
Heartbeat unit: for periodically reporting the health information of WEB application firewall management system to server;
The data processing unit, abnormality detecting unit, exception processing unit, management service unit, log unit, packet check
Unit, configuration unit, application proxies block and heartbeat unit are connected with each other.
2. WEB application firewall management system according to claim 1, which is characterized in that the data processing unit into
One step includes:
Rule model establishes module: for carrying out data modeling for Outlier Detection Algorithm;
Exception rules detection module: for being detected to exception rules;
The rule model establishes module and exception rules detection module is connected with each other.
3. WEB application firewall management system according to claim 2, which is characterized in that the exception processing unit into
One step includes:
Risk evaluation module: for realizing risk evaluation model, by the way that exception rules are added in the risk evaluation model
Feature realizes the risk assessment to abnormal domain;
Abnormal domain processing module: for realizing abnormality processing algorithm, abnormal domain is split and handles exception;
The risk evaluation module and abnormal domain processing module are connected with each other.
4. according to claim 1 to WEB application firewall management system described in 3 any one, which is characterized in that further include:
Anti-virus unit: for viral diagnosis and cleaning;
Intrusion detecting unit: for carrying out network intrusions;
Information filtering unit: for carrying out the detection and filtering of message content;
The anti-virus unit, intrusion detecting unit and information filtering unit are connected with each other with the heartbeat unit.
5. WEB application firewall management system according to claim 4, which is characterized in that further include:
Policy management element: response processing is carried out for instructing fixed risk case to be based on predetermined manner;
Event management unit: it is assessed for event risk, and the finger by determining risk case according to the policy management element
Show and carries out response processing;
The policy management element and event management unit are connected with each other with the heartbeat unit.
6. WEB application firewall management system according to claim 5, which is characterized in that further include:
Vulnerability scanning unit: for scanning the vulnerability data of specified assets;
Report unit: for providing safe operation report;
The vulnerability scanning unit and report unit are connected with each other with the heartbeat unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910466227.8A CN110149236A (en) | 2019-05-31 | 2019-05-31 | WEB application firewall management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910466227.8A CN110149236A (en) | 2019-05-31 | 2019-05-31 | WEB application firewall management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110149236A true CN110149236A (en) | 2019-08-20 |
Family
ID=67589980
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910466227.8A Withdrawn CN110149236A (en) | 2019-05-31 | 2019-05-31 | WEB application firewall management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110149236A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110881044A (en) * | 2019-12-05 | 2020-03-13 | 北京宏达隆和科技有限公司 | Computer firewall dynamic defense security platform |
CN111083011A (en) * | 2019-12-18 | 2020-04-28 | 北京网太科技发展有限公司 | Automatic testing method and device for routing security firewall and management platform |
-
2019
- 2019-05-31 CN CN201910466227.8A patent/CN110149236A/en not_active Withdrawn
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110881044A (en) * | 2019-12-05 | 2020-03-13 | 北京宏达隆和科技有限公司 | Computer firewall dynamic defense security platform |
CN110881044B (en) * | 2019-12-05 | 2022-08-09 | 北京宏达隆和科技有限公司 | Computer firewall dynamic defense security platform |
CN111083011A (en) * | 2019-12-18 | 2020-04-28 | 北京网太科技发展有限公司 | Automatic testing method and device for routing security firewall and management platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yan et al. | Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges | |
KR101010302B1 (en) | Security management system and method of irc and http botnet | |
Gowadia et al. | Paid: A probabilistic agent-based intrusion detection system | |
Helmer et al. | Lightweight agents for intrusion detection | |
US8230505B1 (en) | Method for cooperative intrusion prevention through collaborative inference | |
Ficco et al. | Intrusion detection in cloud computing | |
US20050256935A1 (en) | System and method for managing a network | |
RU2480937C2 (en) | System and method of reducing false responses when detecting network attack | |
US20050188080A1 (en) | Methods, systems and computer program products for monitoring user access for a server application | |
KR101282297B1 (en) | The apparatus and method of unity security with transaction pattern analysis and monitoring in network | |
CN109074456A (en) | The computer attack blocking method of two-stage filtering and the device for using this method | |
Chen et al. | FCM technique for efficient intrusion detection system for wireless networks in cloud environment | |
US20120272319A1 (en) | Apparatus, and system for determining and cautioning users of Internet connected clients of potentially malicious software and method for operating such | |
CN113240116B (en) | Wisdom fire prevention cloud system based on class brain platform | |
JP4120415B2 (en) | Traffic control computer | |
CN110149236A (en) | WEB application firewall management system | |
Benabbou et al. | Security in OpenFlow-based SDN, opportunities and challenges | |
Baláž et al. | ModSecurity IDMEF module | |
Sukiasyan et al. | Secure data exchange in Industrial Internet of Things | |
CN102299926B (en) | Data exchange prepositioning subsystem of multistage safe interconnection platform | |
Sangwan et al. | A classification of misbehavior detection schemes for VANETs: a survey | |
Kamal et al. | Privacy and security federated reference architecture for Internet of Things | |
CN101217369B (en) | A method and device to update the access rights of the users in network topology | |
CN101729544B (en) | Method and system for security capacity negotiation | |
KR101084681B1 (en) | Behavior pattern modelling system of network traffic for botnet detecting and behavior pattern modelling method of network traffic for botnet detecting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190820 |
|
WW01 | Invention patent application withdrawn after publication |