CN115688106A - Method and device for detecting Java agent non-file-injection memory horse - Google Patents

Method and device for detecting Java agent non-file-injection memory horse Download PDF

Info

Publication number
CN115688106A
CN115688106A CN202211436170.5A CN202211436170A CN115688106A CN 115688106 A CN115688106 A CN 115688106A CN 202211436170 A CN202211436170 A CN 202211436170A CN 115688106 A CN115688106 A CN 115688106A
Authority
CN
China
Prior art keywords
file
memory
proc
read
self
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211436170.5A
Other languages
Chinese (zh)
Inventor
姜向前
张晓瑞
鲍春杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anxin Wangdun Beijing Technology Co ltd
Original Assignee
Anxin Wangdun Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anxin Wangdun Beijing Technology Co ltd filed Critical Anxin Wangdun Beijing Technology Co ltd
Priority to CN202211436170.5A priority Critical patent/CN115688106A/en
Publication of CN115688106A publication Critical patent/CN115688106A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a device for detecting a Java agent non-file injection memory horse, which comprise the following steps: analyzing a/proc/self/maps file in the JAVA system to obtain a loading range of libjvm.so; detecting the/proc/self/mem file in the JAVA system in real time; judging whether the writing range of the read-write operation of the proc/self/mem file in the memory is the loading range of libjvm.so; if yes, judging the read-write operation as a malicious memory operation, and intercepting; if not, the read-write operation is judged to be normal memory operation. Malicious shellcode writing is detected by monitoring the memory operation of/proc/self/mem of the Java web container program, and malicious injection memory horse is found and intercepted in time, so that the safety and the stability are improved.

Description

Method and device for detecting Java agent non-file-injection memory horse
Technical Field
The invention relates to the technical field of computers, in particular to a method and a device for detecting a Java agent non-file-injection memory horse.
Background
Java Agent is a technology introduced in JDK1.5 that can modify bytecode without affecting normal compilation, i.e. dynamically modify loaded or unloaded classes, including attributes and methods of the classes. Some malicious Webshell attack behaviors can modify the classes such as http servlet and the like by using the technology without falling to the ground of a file, so as to achieve the behavior of injecting the memory horse. The technology only carries out class modification and residence in a memory, and files are not stored on a disk in a ground mode, so that the technology is difficult to discover by conventional security software.
Disclosure of Invention
The invention aims to provide a method and a device for detecting a Java agent non-file injection memory horse.
In order to solve the above technical problem, a first aspect of the embodiments of the present invention provides a method for detecting a Java agent non-file-injection memory horse, including the following steps:
the method comprises the steps of analyzing a/proc/self/maps file in a JAVA system to obtain a loading range of libjvm.so;
detecting the/proc/self/mem file in the JAVA system in real time;
judging whether the writing range of the read-write operation of the/proc/self/mem file in the memory is the loading range of the libjvm.so;
if so, judging the read-write operation as a malicious memory operation, and intercepting;
if not, the read-write operation is judged to be normal memory operation.
Further, the detecting the/proc/self/mem file in the JAVA system in real time includes:
HOOK hooking is carried out on the read-write file function of the/proc/self/mem file;
and detecting the read-write operation of the memory of the/proc/self/mem file in real time in the HOOK function.
Further, after determining that the read-write operation is a malicious memory operation and intercepting the malicious memory operation, the method further includes:
and sending alarm information to the JAVA system, wherein the alarm information comprises the file name related to the read-write operation and the write-in range in the memory.
Further, the loading range of libjvm.so includes: so, base address and size of said libjvm.
Accordingly, a second aspect of the embodiments of the present invention provides a device for detecting a Java agent non-file-injection memory horse, including:
the analysis module is used for analyzing/proc/self/maps files in the JAVA system to obtain the loading range of libjvm.so;
the detection module is used for detecting the/proc/self/mem file in the JAVA system in real time;
the judging module is used for judging whether the writing range of the read-write operation of the/proc/self/mem file in the memory is the loading range of libjvm.so;
the control module is used for judging that the read-write operation is malicious memory operation when the write-in range of the read-write operation of the/proc/self/mem file in the memory is the loading range of the libjvm.so, intercepting and sending alarm information;
the control module is further configured to determine that the read-write operation is a normal memory operation when a write-in range of the read-write operation of the/proc/self/mem file in the memory is outside the load range of the libjvm.
Further, the detection module includes:
a HOOK function executing unit, which is used for HOOK to the read-write file function of the/proc/self/mem file;
and the detection execution unit is used for detecting the read-write operation of the memory of the/proc/self/mem file in the HOOK function in real time.
Further, the apparatus for detecting that the Java agent does not have the file to be injected into the memory horse further includes: an alarm module;
the warning module is used for sending warning information to the JAVA system, and the warning information comprises file names related to the read-write operation and a write-in range in the memory.
So, the loading range of libjvm includes: so, base address and size of said libjvm.
Accordingly, a third aspect of an embodiment of the present invention provides an electronic device, including: at least one processor; and a memory coupled to the at least one processor; the storage stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the method for detecting the Java agent no-file-injection memory horse.
Accordingly, a fourth aspect of the embodiments of the present invention provides a computer-readable storage medium, on which computer instructions are stored, and when the computer instructions are executed by a processor, the method for detecting Java agent non-file injection into a memory horse is implemented.
The technical scheme of the embodiment of the invention has the following beneficial technical effects:
malicious shellcode writing is detected by monitoring the memory operation of/proc/self/mem of the Java web container program, the behavior of maliciously injecting a memory horse is found in time and intercepted, and the safety and the stability of the system are improved.
Drawings
FIG. 1 is a flowchart of a method for detecting a Java agent non-file-injected memory horse according to an embodiment of the present invention;
FIG. 2 is a schematic diagram illustrating a method for detecting a Java agent non-file-injection memory horse according to an embodiment of the present invention;
FIG. 3 is a block diagram of a module of a detection apparatus for Java agent no-file injection into a memory horse according to an embodiment of the present invention;
fig. 4 is a block diagram of a determining module according to an embodiment of the present invention.
Reference numerals:
1. the device comprises an analysis module 2, a detection module 21, a HOOK function execution unit 22, a detection execution unit 3, a judgment module 4, a control module 5 and an alarm module.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the accompanying drawings in combination with the embodiments. It is to be understood that these descriptions are only illustrative and are not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
Java Agent is a technology introduced in JDK1.5 that can modify bytecode without affecting normal compilation, i.e. dynamically modify loaded or unloaded classes, including attributes and methods of the classes. Some malicious webshells, such as ice scorpions, provide the AgentNoFile memory horse injection function in order to hide themselves, and the attack behavior of the webshells can modify http servlet and other classes by using the following technology without landing a file, so as to achieve the behavior of memory horse injection. The attack method comprises the following steps:
1. analyzing/proc/self/maps to obtain a loading base address and a loading path of libjvm.so as to analyze an ELF head of libjvm.so as to obtain offsets of java _ io _ RandomessFile _ length and JNI _ GetCreatedJava VMs, and obtaining the addresses of functions of java _ io _ RandomessFile _ length and JNI _ GetCreatedJava VMs in the memory through the base address and the offsets.
2. The shellcode is written and the JNI _ GetCreatedJavaVMs are called to obtain the pointer of the JVM IEnV object.
3. And backing up a java _ io _ RandomAccess File _ length function body through reading/proc/self/mem.
4. And writing the shellcode in the step 2 into a java _ io _ Rando Maccessfile _ length address through writing/proc/self/mem.
5. Calling Java _ io _ random access file _ length at the Java layer to obtain a long return value, namely a pointer of the JVMTIEnv object.
6. And recovering the java _ io _ RandomAccess File _ length code.
7. JPLISAgents are constructed using pointers to JVMTEIEnv objects.
8. With the JPLISAgent object, a java, lang, instruction, and then class modification and HOOK can be performed through the instruction, redefineConslass, and memory horse residence is realized.
Malicious Webshells such as ice scorpions can modify and reside in the memory through the steps, files are not stored in a magnetic disk in a landing manner, and conventional security software is difficult to find and intercept, so that the system has large potential safety hazards.
In order to solve the above problems, a system is detected and defended in real time for behaviors of injecting memory horses into malicious webshells such as ice scorpions, and referring to fig. 1 and fig. 2, a first aspect of an embodiment of the present invention provides a method for detecting a Java agent file-free injected memory horse, including the following steps:
and S100, analyzing the/proc/self/maps file in the JAVA system to obtain the loading range of libjvm.
So, the loading range of libjvm includes: so base address and size. Analyzing/proc/self/maps to obtain a loading base address and a loading path of libjvm.so as to analyze an ELF head of libjvm.so as to obtain offsets of java _ io _ RandomessFile _ length and JNI _ GetCreatedJavaVMs, and obtaining addresses of functions of java _ io _ RandomessFile _ length and JNI _ GetCreatedJavaVMs in the memory through the base address and the offsets.
S200, detecting the/proc/self/mem file in the JAVA system in real time.
S300, judging whether the writing range of the read-write operation of the/proc/self/mem file in the memory is the loading range of libjvm.
S400, if the writing range of the read-write operation of the/proc/self/mem file in the memory is the loading range of libjvm.
And S500, if the writing range of the read-write operation of the/proc/self/mem file in the memory is beyond the loading range of libjvm.
According to the technical scheme, malicious shellcode writing is detected by monitoring the memory operation of/proc/self/mem of the Java web container program, malicious shellcode writing is found in time, malicious Webshell ice scorpions and the like are written in through/proc/self/mem, behaviors of memory horses are injected and intercepted, and the safety and the stability of the system are improved.
Specifically, in step S300, the real-time detection of the/proc/self/mem file in the JAVA system further includes the following steps:
s310, HOOK is carried out on the read-write file function of the/proc/self/mem file.
S320, detecting the read-write operation of the memory of the/proc/self/mem file in HOOK in real time.
Further, after the step S500 of determining that the read-write operation is a malicious memory operation and intercepting the malicious memory operation, the method further includes:
s600, sending alarm information to the JAVA system, wherein the alarm information comprises file names related to read-write operation and a write-in range in a memory.
Accordingly, referring to fig. 3, a second aspect of the present invention provides a device for detecting a Java agent no-file-injection memory horse, including:
the analysis module 1 is used for analyzing/proc/self/maps files in the JAVA system to obtain a loading range of libjvm.so;
the detection module 2 is used for detecting the/proc/self/mem file in the JAVA system in real time;
the judging module 3 is used for judging whether the writing range of the read-write operation of the/proc/self/mem file in the memory is the loading range of libjvm.so;
the control module 4 is used for judging that the read-write operation is malicious memory operation when the write-in range of the read-write operation of the/proc/self/mem file in the memory is the loading range of libjvm.so, intercepting and sending warning information;
the control module 4 is further configured to determine that the read-write operation is a normal memory operation when the write-in range of the read-write operation of the/proc/self/mem file in the memory is outside the load range of libjvm.
Further, referring to fig. 4, the detecting module 2 further includes:
a HOOK execution unit 21 for HOOK of read-write file function of/proc/self/mem file;
and the detection execution unit 22 is used for detecting the read-write operation of the memory of the/proc/self/mem file in the HOOK in real time.
In addition, the detection device for Java agent to inject no file into the memory horse further comprises: and an alarm module 5. The alarm module 5 is configured to send alarm information to the JAVA system, where the alarm information includes a file name related to the read-write operation and a write-in range in the memory.
So, the loading range of libjvm includes: so, base address and size.
The detection device for the Java agent non-file injection memory horse detects malicious shellcode writing by monitoring the memory operation of/proc/self/mem of a Java web container program, finds out the behavior of maliciously injecting the memory horse in time and intercepts the behavior, and improves the safety and stability of the system.
Accordingly, a third aspect of embodiments of the present invention provides an electronic device, comprising: at least one processor; and a memory coupled to the at least one processor; the storage stores instructions which can be executed by at least one processor, and the instructions are executed by the at least one processor, so that the at least one processor executes the method for detecting the Java agent non-file-injection-into-memory horse.
Accordingly, a fourth aspect of the embodiments of the present invention provides a computer-readable storage medium, on which computer instructions are stored, and when the computer instructions are executed by a processor, the method for detecting Java agent non-file-injection memory horse is implemented.
The embodiment of the invention aims to protect a detection method for Java agent non-file injection memory horse, which comprises the following steps: the method comprises the steps of analyzing a/proc/self/maps file in a JAVA system to obtain a loading range of libjvm.so; detecting the/proc/self/mem file in the JAVA system in real time; judging whether the writing range of the read-write operation of the proc/self/mem file in the memory is the loading range of libjvm.so; if so, judging the read-write operation as a malicious memory operation, and intercepting; if not, the read-write operation is judged to be normal memory operation. The technical scheme has the following effects:
by monitoring the memory operation of the/proc/self/mem of the Java web container program, malicious shellcode writing is found, the behavior of maliciously injecting a memory horse is found in time and intercepted, and the safety and the stability of the system are improved.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting the same, and although the present invention is described in detail with reference to the above embodiments, those of ordinary skill in the art should understand that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.

Claims (10)

1. A detection method for Java agent non-file injection memory horse is characterized by comprising the following steps:
the method comprises the steps of analyzing a/proc/self/maps file in a JAVA system to obtain a loading range of libjvm.so;
detecting the/proc/self/mem file in the JAVA system in real time;
judging whether the writing range of the read-write operation of the/proc/self/mem file in the memory is the loading range of the libjvm.so;
if so, judging the read-write operation as a malicious memory operation, and intercepting;
if not, the read-write operation is judged to be normal memory operation.
2. The method for detecting Java agent non-file-injection memory horse according to claim 1, wherein the detecting/proc/self/mem file in the Java system in real time comprises:
HOOK is carried out on the read-write file function of the/proc/self/mem file;
and detecting the read-write operation of the memory of the/proc/self/mem file in real time in the HOOK function.
3. The method for detecting a Java agent non-file injection memory horse according to claim 1, wherein after determining that the read-write operation is a malicious memory operation and intercepting the operation, the method further comprises:
and sending alarm information to the JAVA system, wherein the alarm information comprises the file name related to the read-write operation and the write-in range in the memory.
4. The method for Java agent non-file injection into Marble horse detection according to any of claims 1-3,
so, the loading range of the libjvm includes: so, base address and size of said libjvm.
5. A detection device for Java agent to inject a memory horse without a file is characterized by comprising:
the analysis module (1) is used for analyzing/proc/self/maps files in the JAVA system to obtain the loading range of libjvm.so;
a detection module (2) for detecting the/proc/self/mem file in the JAVA system in real time;
a judging module (3) for judging whether the write-in range of the read-write operation of the/proc/self/mem file in the memory is the load range of libjvm.so;
the control module (4) is used for judging that the read-write operation is malicious memory operation when the write-in range of the read-write operation of the/proc/self/mem file in the memory is the loading range of the libjvm.so, intercepting and sending alarm information;
the control module (4) is further configured to determine that the read-write operation is a normal memory operation when a write-in range of the read-write operation of the/proc/self/mem file in the memory is outside the load range of the libjvm.
6. The apparatus for detecting Java agent no-file-injection memory horse according to claim 5, wherein the detection module (2) comprises:
a HOOK function execution unit (21) for HOOK of the read-write file function of the/proc/self/mem file;
and the detection execution unit (22) is used for detecting the read-write operation of the memory of the/proc/self/mem file in real time in the HOOK function.
7. The apparatus for detecting Java agent non-file-injection memory horse according to claim 5, further comprising: an alarm module (5);
the alarm module (5) is used for sending alarm information to the JAVA system, wherein the alarm information comprises file names related to the read-write operation and a write-in range in the memory.
8. The apparatus for Java agent non-file injection into Marble horse detection according to any of claims 5-7,
so, the loading range of the libjvm includes: so, base address and size of said libjvm.
9. An electronic device, comprising: at least one processor; and a memory coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the method for Java agent no file injection into memory horse claimed in any of claims 1-4.
10. A computer readable storage medium having stored thereon computer instructions which, when executed by a processor, implement the Java agent no file injection memory horse detection method as claimed in any of claims 1 to 4.
CN202211436170.5A 2022-11-16 2022-11-16 Method and device for detecting Java agent non-file-injection memory horse Pending CN115688106A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211436170.5A CN115688106A (en) 2022-11-16 2022-11-16 Method and device for detecting Java agent non-file-injection memory horse

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211436170.5A CN115688106A (en) 2022-11-16 2022-11-16 Method and device for detecting Java agent non-file-injection memory horse

Publications (1)

Publication Number Publication Date
CN115688106A true CN115688106A (en) 2023-02-03

Family

ID=85053851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211436170.5A Pending CN115688106A (en) 2022-11-16 2022-11-16 Method and device for detecting Java agent non-file-injection memory horse

Country Status (1)

Country Link
CN (1) CN115688106A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116318941A (en) * 2023-03-09 2023-06-23 安芯网盾(北京)科技有限公司 Method and device for detecting injected TomcatUpgrade memory horse
CN117792805A (en) * 2024-02-28 2024-03-29 北京长亭科技有限公司 Network security detection method and device based on memory horse simulation

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112069499A (en) * 2020-09-15 2020-12-11 北京微步在线科技有限公司 Detection method, detection device, storage medium and electronic equipment
CN113312624A (en) * 2021-06-21 2021-08-27 厦门服云信息科技有限公司 Java Web application memory Trojan detection method, terminal device and storage medium
CN114065196A (en) * 2021-09-30 2022-02-18 奇安信科技集团股份有限公司 Java memory horse detection method and device, electronic equipment and storage medium
CN114065204A (en) * 2021-11-29 2022-02-18 中国工商银行股份有限公司 File-free Trojan horse searching and killing method and device
US20220253528A1 (en) * 2021-02-09 2022-08-11 National Central University System and method of fileless malware detection and non-transitory computer readable medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112069499A (en) * 2020-09-15 2020-12-11 北京微步在线科技有限公司 Detection method, detection device, storage medium and electronic equipment
US20220253528A1 (en) * 2021-02-09 2022-08-11 National Central University System and method of fileless malware detection and non-transitory computer readable medium
CN113312624A (en) * 2021-06-21 2021-08-27 厦门服云信息科技有限公司 Java Web application memory Trojan detection method, terminal device and storage medium
CN114065196A (en) * 2021-09-30 2022-02-18 奇安信科技集团股份有限公司 Java memory horse detection method and device, electronic equipment and storage medium
CN114065204A (en) * 2021-11-29 2022-02-18 中国工商银行股份有限公司 File-free Trojan horse searching and killing method and device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
姚纪卫 等: ""基于内存保护技术的二进制内存破坏型漏洞攻击防护方法研究"" *
张金莉 等: ""面向JAVA的高对抗内存型Webshell检测技术"" *
黑客技术: ""Linux下无文件Java agent探究"" *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116318941A (en) * 2023-03-09 2023-06-23 安芯网盾(北京)科技有限公司 Method and device for detecting injected TomcatUpgrade memory horse
CN116318941B (en) * 2023-03-09 2023-10-10 安芯网盾(北京)科技有限公司 Method and device for detecting injected TomcatUpgrade memory horse
CN117792805A (en) * 2024-02-28 2024-03-29 北京长亭科技有限公司 Network security detection method and device based on memory horse simulation
CN117792805B (en) * 2024-02-28 2024-05-24 北京长亭科技有限公司 Network security detection method and device based on memory horse simulation

Similar Documents

Publication Publication Date Title
CN115688106A (en) Method and device for detecting Java agent non-file-injection memory horse
US7631356B2 (en) System and method for foreign code detection
US9223964B2 (en) Detecting JAVA sandbox escaping attacks based on JAVA bytecode instrumentation and JAVA method hooking
US6698016B1 (en) Method for injecting code into another process
US7797702B1 (en) Preventing execution of remotely injected threads
CN113569246B (en) Vulnerability detection method, vulnerability detection device, computer equipment and storage medium
US11675905B2 (en) System and method for validating in-memory integrity of executable files to identify malicious activity
JPWO2005024630A1 (en) Method and program for preventing illegal code
JP2009129451A (en) Apparatus and method for detecting dynamic link library inserted by malicious code
CN103632088A (en) Method and device for detecting Trojan horses
KR101064164B1 (en) Kernel integrity inspection and the recovery method on linux kernel based smart platform
CN108898012B (en) Method and apparatus for detecting illegal program
CN111259386A (en) Kernel security detection method, device, equipment and storage medium
CN109933986B (en) Malicious code detection method and device
US11151247B2 (en) System and method for detecting malware injected into memory of a computing device
CN112214267A (en) Android shelling acceleration method and device, storage medium and computer equipment
CN111428240B (en) Method and device for detecting illegal access of memory of software
CN111931191A (en) Dynamic detection method and system for binary software stack overflow leakage hole of Linux platform
CN114936368A (en) Java memory Trojan detection method, terminal device and storage medium
JP4898823B2 (en) Application information alteration monitoring device and method
US8607348B1 (en) Process boundary isolation using constrained processes
CN116775147B (en) Executable file processing method, device, equipment and storage medium
US20240020140A1 (en) Computer system enabled with runtime software module tracking
CN112347499B (en) Program self-protection method
CN110610086B (en) Illegal code identification method, system, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20230203