CN100407199C - Lookup method of protecting consistency of contour based on information technology products of relational database - Google Patents

Lookup method of protecting consistency of contour based on information technology products of relational database Download PDF

Info

Publication number
CN100407199C
CN100407199C CN2005100946211A CN200510094621A CN100407199C CN 100407199 C CN100407199 C CN 100407199C CN 2005100946211 A CN2005100946211 A CN 2005100946211A CN 200510094621 A CN200510094621 A CN 200510094621A CN 100407199 C CN100407199 C CN 100407199C
Authority
CN
China
Prior art keywords
assembly
demand
security
component
database table
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2005100946211A
Other languages
Chinese (zh)
Other versions
CN1760863A (en
Inventor
曾庆凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University
Original Assignee
Nanjing University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University filed Critical Nanjing University
Priority to CN2005100946211A priority Critical patent/CN100407199C/en
Publication of CN1760863A publication Critical patent/CN1760863A/en
Application granted granted Critical
Publication of CN100407199C publication Critical patent/CN100407199C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to a consistency checking method for the information technology product protection profiles, which is based on a relational data base. The method comprises: (1) the security requirements of the information technology product protection profiles are input; when the protection profiles are input, input data items as units are input one by one and stored in a data table in a memory; (2) the product security requirements are structuralized and stored in every database table, and data item groups in the memory are respectively stored in the respective database tables according to the contents; (3) the containment of security requirement components is checked; the completeness of the dependency relationship of the security components in the protection profiles is verified by contrasting component dependency relationship tables of the security component; (4) the mutual exclusiveness of the security requirement components is checked; the redundancy of the security requirement components in the protection profiles is verified by contrasting component subordination relationship tables; (5) a consistency checking report is formed; (6) the processing is completed. The present invention enhances the assessment efficiency of safety assessment equipment and specifies the assessment processing.

Description

Consistency checking method based on relational database information technical products protection profile
Technical field
The present invention relates to IT product safety detection assessment apparatus, particularly a kind of to IT product protection profile carry out pardon and alternative assessment, based on the consistency checking method of relational database.
Background technology
CN129852 discloses the method that is used for type safe attribute coupling in the database in the prior art, database comprises a plurality of clauses and subclauses, each clauses and subclauses is by the class type definition and comprise a plurality of type fields, and described method comprises: class type template is provided, template definition one group of attribute; The corresponding field of template attribute and one or more a plurality of clauses and subclauses is compared; Whether mate clauses and subclauses according to relatively determining template; And according to definite identification and matching clauses and subclauses.
CN1396527 discloses in database the method for the important information that storage important information and safety management store, comprise step: synchronizing information that will whenever it just changes when at least one important information is updated in database is stored with important information, and encrypts described synchronizing information; The synchronizing information of encrypting is stored in a plurality of predetermined place with being distributed formula; Be stored in the synchronizing information of a plurality of predetermined place with combination and deciphering, and the synchronizing information of check combination and deciphering whether be stored in database in synchronizing information identical.
A kind of method of Chinese patent CN1398481 assessment security vulnerability of network, may further comprise the steps: produce the System Object Model database of certain network of expression, this System Object Model database is supported the information data demand of diverse network vulnerability routine analyzer; The System Object Model database of exporting this network is to diverse network vulnerability/venture analysis program; With each this network of network vulnerability parser analysis, to produce the data result of each program; And the data result of these network vulnerability routine analyzers is correlated with, to determine the safe attitude of this network.
Said method does not relate to the protection outline definition of IT product security.Safety assessment is that IT product comes into operation, the important evidence of selected employing in infosystem.It is the vitals that extensively adopts in the safety estimation system that IT product detects assessment apparatus, can be widely used in design, exploitation, the operation and maintenance process of the important information system in politics, national defence, commerce, culture or the like the application.Has vital role for the safety assurance ability that improves system.The protection profile is the accurate definition and the description of IT product security target.Safety evaluation to it is the basis of Product Safety assessment and guarantees.At present, the assessment of protection profile depends on experience and manual operations mostly.Evaluation process, method and result lack strict standard and consistance.Patent of the present invention is according to the inner principle and the rule of protection profile, and the assessment requirement, proposes the automatic mode that the protection profile is carried out the consistance assessment.
Summary of the invention
Fundamental purpose of the present invention is at dependence experience and manual operations in the evaluation process of present protection profile; evaluation process, method lack strict standard; be difficult to guarantee problems such as assessment result consistance and science; a kind of protection consistency of contour inspection method based on relational database is provided; to improve the assess effectiveness of safety assessment equipment; the design code evaluation process, the correctness of assurance assessment result.
The technology of the present invention solution is; Protection consistency of contour inspection method based on the relational database information technical products is characterized in that may further comprise the steps: the step 11 of 1) carrying out the input of evaluated protection profile: the protection profile comprises protection profile sign, description, environment, security purpose, demand for security and principle part; Relevant with the method for originally checking and verifying is the demand for security part; The data that assessment is relevant will deposit in the relational database: data organization becomes the table in the database, i.e. the demand for security database table; The structure of database table comprises sign, explanation, treatment state attribute field, and is index with the character string identification of representative data item; A data item represented in each record, represents a demand for security; When the demand for security of input protection profile, be unit typing item by item with the input data item, and leave in the internal memory; After the input data item identifier,, then can revise if imported data item; If import first, then distribute the buffer zone of this record, for depositing the input content, treatment state is initialized as sky; Demand for security is according to the hierarchical relationship tissue of " class-family-assembly ", but the just component level demand for security relevant with checking; The collection of data items of input is temporarily stored in the database table in the internal memory; 2) the demand for security structuring treatment step 12 of standardizing to the product protection profile; Respectively the data in EMS memory item is gathered the database table that deposits in separately according to content, comprise the threat strategy database table, security purpose database table and demand for security database table; 3) step 13 that the pardon inspection of demand for security assembly is handled comprises: by the component dependencies table according to security component, whether the security component dependence in the checking protection profile is complete; Component record all is changed to and is untreated in all component database table, gets a untreated demand assembly step 131 from the component database table; Judging to get does not have step 132, if do not get, finishes the pardon inspection of demand for security assembly and handles, and forwards end step 139 to; Otherwise still do not check the demand for security assembly, then carry out next step; Look into component dependencies table step 133; Judge that finding new dependence assembly does not have step 134, if do not find, then this demand component inspection finishes, and the state of this component record is changed to be handled, and forwards to get new demand assembly step 131; If find, then change next step, whether this dependence assembly of dependence component verification that obtains with inquiry is present in the component database table of protecting profile; To rely on assembly inquiring and authenticating component database table step 135; Judge whether find step 136, if do not find, then the component database table is incomplete if relying on assembly, change record protection profile demand for security assembly and contain wrong step 137; If find, other relies on assembly step 133 then to transfer to further inquiry; The wrong step 137 of registration component pardon, and write down this dependence assembly; The dependence assembly that adds pardon mistake step 138 in the component database table; Add a new component record, state is for being untreated, and other relies on assembly step 133 to change inquiry; End step 139; 4) step 14 that the alternative inspection of demand for security assembly is handled by according to assembly subordinate relation table, verifies whether the demand for security assembly in the protection profile exists redundancy; Comprising untreated demand assembly step 141 in the fetch protection profile assembly database table; Judging to get does not have step 142, if do not get, the alternative inspection of demand assembly is finished dealing with, and forwards end step 149 to; Otherwise still do not check the demand for security assembly, then carry out next step; Look into assembly subordinate relation table step 143; Judge that finding new subordinate assembly does not have step 144, if do not find, then this demand component inspection finishes, and forwards to and gets new demand assembly step 141; If find, then change next step, inquire about this subordinate assembly with the subordinate assembly that obtains and whether be present in the component database table of protecting profile; With subordinate assembly enquiring component database table step 145; Judge whether the subordinate assembly finds step 146,, then protect the profile assembly database table not redundant, then transfer to and continue other subordinate assembly step 143 of inquiry,, then protect the profile assembly database table redundant wrong, change next step if find if do not find; Registration component redundancy, the wrong step 147 of alternative, and write down this subordinate assembly; From protection profile assembly database table, remove the recording step 148 of redundant component, change and look into assembly subordinate relation table step 143, end step 149; 5) form checking audit report step 15; The enrollment results of checking and verifying in the step 14 that the step 13 that the pardon inspection of demand for security assembly is handled and the alternative inspection of demand for security assembly are handled merges, and forms the consistency check report; 6) finish.
Characteristics of the present invention are: a kind of protection consistency of contour inspection method based on relational database is provided, has improved the assess effectiveness of safety assessment equipment, design code evaluation process, the problems such as correctness, consistance and science of assurance assessment result.Below in conjunction with accompanying drawing most preferred embodiment is elaborated.
Description of drawings
Fig. 1 is a safety detection assessment apparatus workflow diagram of the present invention
Fig. 2 is the process flow diagram of the inventive method of the present invention
Fig. 3, the 4th, the process flow diagram of threat of the present invention and security purpose integrity verification
Embodiment
As shown in Figure 1; IT product safety detection assessment apparatus is by the protection profile of keyboard input needs assessment; and utilize normalization module will protect profile to convert structurized information organization to; comprise general datas such as environmental analysis, security purpose and demand for security, and deposit and relational database (abbreviation database) in.By the checking checking mechanism consistency check is carried out in the demand for security of protection profile then, will be carried out the inquiry and the comparison of component dependencies table and assembly subordinate relation table in the checking process.
Method of the present invention as shown in Figure 2.Step 10 is initial actuatings.Step 11 is carried out the input of evaluated protection profile.The protection profile comprises parts such as protection profile sign, description, environment, security purpose, demand for security and principle.Relevant with the method for originally checking and verifying is the demand for security part.The data that assessment is relevant will deposit in the relational database (hereinafter to be referred as database).Data organization becomes the table in the database: the demand for security tables of data.Structure of data table comprises fields such as sign, explanation, treatment state sign, and is index with the character string identification of representative data item.A data item represented in each record, represents a demand for security.Protection profile sign can be used as the part of data table name, as represent the demand data table of os1 with req-os1.Step 11 is unit typing item by item with the input data item, and leaves in the internal memory when the demand for security of input protection profile.After the input data item identifier,, then can revise if oneself imports data item; If import first, then distribute the buffer zone of this record, for depositing the input content, treatment state is initialized as sky.Demand for security is according to the hierarchical relationship tissue of " class-family-assembly ", but the just component level demand for security relevant with checking.Therefore, when input, the data item of typing demand for security assembly comprises sign and explanation successively.As, the demand for security sign: FDP_ACC.1.1 illustrates: TSF reply name user carries out autonomous access control policy to the visit of each object.The collection of data items of input is temporarily stored in the tables of data in the internal memory.The step 12 pair product protection profile demand for security structuring of standardizing is handled.Deposit demand for security collection of data items in the internal memory in database table: the demand for security tables of data.
Step 13 is carried out the pardon inspection of demand for security assembly and is handled.By the component dependencies table (being called for short the dependence table) according to security component, whether the security component dependence in the checking protection profile is complete.The alternative inspection of step 14 demand for security assembly is handled.By according to assembly subordinate relation table (being called for short the subordinate relation table), verify
Whether the demand for security assembly in the protection profile exists redundancy.Step 15 forms the checking audit report: the enrollment results of checking and verifying in step 13, the step 14 is merged, and form audit report according to form.Step 16 is done states.
Component dependencies table and assembly subordinate relation table are the knowledge rule storehouses, are the tables in the database, can constantly expand.The component dependencies table is used for representing the dependence between the assembly, comprises fields such as demand assembly, sequence number, dependence assembly.The demand assembly is an index key, also comprises 1 demand component field that it relied on.A component dependencies of each record proxy component.Deposit all direct component dependencies in the dependence storehouse.Therefore, an assembly can have a plurality of dependence component records, represents a plurality of dependences, is distinguished with sequence number field.Assembly subordinate relation table is used for representing the subordinate relation between the assembly, comprises fields such as demand assembly, sequence number, subordinate assembly.The demand assembly is an index key, also comprises the demand component field of 1 its institute's subordinate.An assembly subordinate relation of each record proxy component.Deposit all direct, indirect assembly subordinate relation in the subordinate relation table.An assembly can have a plurality of subordinate component records, represents a plurality of subordinate relation, is distinguished with sequence number field.For example, FAU_SAA.4 (complex attack detection) is subordinated to FAU_SAA.3 and 2 assemblies of FAU_SAA.1 (potential infringement analysis).
Fig. 3 describes Fig. 2 step 13 in detail, and its effect is that the pardon inspection of demand for security assembly is handled.The step 130 of Fig. 3 is initial states.Component record all is changed to and is untreated in all component tables of data.Step 131 is got a untreated demand assembly from the module data table.Step 132 is judged to get not to be had.If do not get, finish the pardon inspection of demand for security assembly and handle, forward step 139 to; Otherwise still do not check the demand for security assembly, then execution in step 133.Step 133 is looked into the component dependencies table.Step 134 judges that finding new dependence assembly does not have.If do not find, then this demand component inspection finishes, and the state of this component record is changed to be handled, and forwards step 131 to and gets the new demand assembly; If find, then change step 135, whether this dependence assembly of dependence component verification that obtains with inquiry is present in the module data table of protecting profile library.Step 135 is to rely on assembly inquiring and authenticating module data table.Step 136 judges whether rely on assembly finds.If do not find, then the module data table is incomplete, changes step 137, and record protection profile demand for security assembly contains wrong; If find, then change step 133 and make other dependence assembly of further inquiry.Step 137 registration component pardon mistake, and write down this dependence assembly.Step 138 adds the dependence assembly of pardon mistake in the module data table.Add a new component record, state is for being untreated.Change step 133.The step 139 of Fig. 3 is done states.
Fig. 4 describes Fig. 2 step 14 in detail, and its effect is that the alternative inspection of demand for security assembly is handled.Step 140 is initial states.Component record all is changed to and is untreated in all component tables of data.Untreated demand assembly in the step 141 fetch protection profile assembly tables of data.Step 142 is judged to get not to be had.If do not get, the alternative inspection of demand assembly is finished dealing with, and forwards step 149 to; Otherwise still do not check the demand for security assembly, then execution in step 143.Step 143 is looked into assembly subordinate relation storehouse.Step 144 judges that finding new subordinate assembly does not have.If do not find, then this demand component inspection finishes, and the state of this component record is changed to be handled, and forwards step 141 to and gets new demand assembly; If find, then change step 145, inquire about this subordinate assembly with the subordinate assembly that obtains and whether be present in the module data table of protecting profile.Step 145 is with subordinate assembly enquiring component tables of data.Step 146 judges whether the subordinate assembly is found.If do not find, then protect the profile assembly tables of data not redundant, then change step 143 and make to continue other subordinate assembly of inquiry.If find, then protect the profile assembly tables of data redundant wrong, change step 147.Step 147 registration component redundancy, alternative mistake, and write down this subordinate assembly.Step 148 is removed the record of redundant component from protection profile assembly tables of data.Change step 143.The step 149 of Fig. 4 is done states.

Claims (1)

1. the protection consistency of contour inspection method based on the relational database information technical products is characterized in that may further comprise the steps: the step (11) of 1) carrying out the input of evaluated protection profile: protect profile to comprise protection profile sign, description, environment, security purpose, demand for security and principle part; Relevant with the method for originally checking and verifying is the demand for security part; The data that assessment is relevant will deposit in the relational database: data organization becomes the table in the database, i.e. the demand for security database table; The structure of database table comprises sign, explanation, treatment state attribute field, and is index with the character string identification of representative data item; A data item represented in each record, represents a demand for security; When the demand for security of input protection profile, be unit typing item by item with the input data item, and leave in the internal memory; After the input data item identifier,, then can revise if imported data item; If import first, then distribute the buffer zone of this record, for depositing the input content, treatment state is initialized as sky; Demand for security is according to the hierarchical relationship tissue of " class-family-assembly ", but the just component level demand for security relevant with checking; The collection of data items of input is temporarily stored in the database table in the internal memory; 2) the demand for security structuring treatment step (12) of standardizing to the product protection profile; Respectively the data in EMS memory item is gathered the database table that deposits in separately according to content, comprise the threat strategy database table, security purpose database table and demand for security database table; 3) step (13) that the pardon inspection of demand for security assembly is handled comprising: by the component dependencies table according to security component, whether the security component dependence in the checking protection profile is complete; Component record all is changed to and is untreated in all component database table, gets a untreated demand assembly step (131) from the component database table; Judging to get does not have step (132), if do not get, finishes the pardon inspection of demand for security assembly and handles, and forwards end step (139) to; Otherwise still do not check the demand for security assembly, then carry out next step; Look into component dependencies table step (133); Judge that finding new dependence assembly does not have step (134), if do not find, then this demand component inspection finishes, and the state of this component record is changed to be handled, and forwards to get new demand assembly step (131); If find, then change next step, whether this dependence assembly of dependence component verification that obtains with inquiry is present in the component database table of protecting profile; To rely on assembly inquiring and authenticating component database table step (135); Judge whether find step (136), if do not find, then the component database table is incomplete if relying on assembly, change record protection profile demand for security assembly and contain wrong step (137); If find, other relies on assembly step (133) then to transfer to further inquiry; The wrong step (137) of registration component pardon, and write down this dependence assembly; The dependence assembly that adds pardon mistake step (138) in the component database table; Add a new component record, state is for being untreated, and other relies on assembly step (133) to change inquiry; End step (139); 4) step (14) that the alternative inspection of demand for security assembly is handled by according to assembly subordinate relation table, verifies whether the demand for security assembly in the protection profile exists redundancy; Comprising a untreated demand assembly step (141) in the fetch protection profile assembly database table; Judging to get does not have step (142), if do not get, the alternative inspection of demand assembly is finished dealing with, and forwards end step (149) to; Otherwise still do not check the demand for security assembly, then carry out next step; Look into assembly subordinate relation table step (143); Judge that finding new subordinate assembly does not have step (144), if do not find, then this demand component inspection finishes, and forwards to and gets new demand assembly step (141); If find, then change next step, inquire about this subordinate assembly with the subordinate assembly that obtains and whether be present in the component database table of protecting profile; With subordinate assembly enquiring component database table step (145); Judge whether the subordinate assembly finds step (146),, then protect the profile assembly database table not redundant, then transfer to and continue other subordinate assembly step (143) of inquiry,, then protect the profile assembly database table redundant wrong, change next step if find if do not find; Registration component redundancy, the wrong step (147) of alternative, and write down this subordinate assembly; From protection profile assembly database table, remove the recording step (148) of redundant component, change and look into assembly subordinate relation table step (143), end step (149); 5) form checking audit report step (15); The enrollment results of checking and verifying in the step (14) that the step (13) that the pardon inspection of demand for security assembly is handled and the alternative inspection of demand for security assembly are handled merges, and forms consistency check report; 6) finish.
CN2005100946211A 2005-09-30 2005-09-30 Lookup method of protecting consistency of contour based on information technology products of relational database Expired - Fee Related CN100407199C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2005100946211A CN100407199C (en) 2005-09-30 2005-09-30 Lookup method of protecting consistency of contour based on information technology products of relational database

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2005100946211A CN100407199C (en) 2005-09-30 2005-09-30 Lookup method of protecting consistency of contour based on information technology products of relational database

Publications (2)

Publication Number Publication Date
CN1760863A CN1760863A (en) 2006-04-19
CN100407199C true CN100407199C (en) 2008-07-30

Family

ID=36706940

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2005100946211A Expired - Fee Related CN100407199C (en) 2005-09-30 2005-09-30 Lookup method of protecting consistency of contour based on information technology products of relational database

Country Status (1)

Country Link
CN (1) CN100407199C (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100423494C (en) * 2006-06-13 2008-10-01 南京大学 Method for forming safety guarantee estimation flow of information technology product based on dependency relationship
US8316441B2 (en) 2007-11-14 2012-11-20 Lockheed Martin Corporation System for protecting information
CN107291951B (en) * 2017-07-24 2020-09-29 北京都在哪智慧城市科技有限公司 Data processing method, device, storage medium and processor

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1201949A (en) * 1997-05-09 1998-12-16 美国电报电话公司 Apparatus and method for maintaining integrated data consistency across multiple databases
EP1324218A1 (en) * 2001-12-11 2003-07-02 Abb Research Ltd. System for categorising data objects and method of checking the consistency of the designation of categories to the data objects
US20030187864A1 (en) * 2002-04-02 2003-10-02 Mcgoveran David O. Accessing and updating views and relations in a relational database
CN1534520A (en) * 2003-03-28 2004-10-06 微软公司 System and method for preocedding high speed buffer storage and invalid to data base result and derivation target
CN1561497A (en) * 2001-09-28 2005-01-05 甲骨文国际公司 Providing a consistent hierarchical abstraction of relational data
WO2005088474A1 (en) * 2004-03-17 2005-09-22 Abb Research Ltd Service for verifying consistency of replicated data

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1201949A (en) * 1997-05-09 1998-12-16 美国电报电话公司 Apparatus and method for maintaining integrated data consistency across multiple databases
CN1561497A (en) * 2001-09-28 2005-01-05 甲骨文国际公司 Providing a consistent hierarchical abstraction of relational data
EP1324218A1 (en) * 2001-12-11 2003-07-02 Abb Research Ltd. System for categorising data objects and method of checking the consistency of the designation of categories to the data objects
US20030187864A1 (en) * 2002-04-02 2003-10-02 Mcgoveran David O. Accessing and updating views and relations in a relational database
CN1534520A (en) * 2003-03-28 2004-10-06 微软公司 System and method for preocedding high speed buffer storage and invalid to data base result and derivation target
WO2005088474A1 (en) * 2004-03-17 2005-09-22 Abb Research Ltd Service for verifying consistency of replicated data

Also Published As

Publication number Publication date
CN1760863A (en) 2006-04-19

Similar Documents

Publication Publication Date Title
Lohar et al. Improving trace accuracy through data-driven configuration and composition of tracing features
Chen et al. Towards graph containment search and indexing
Bekrar et al. Finding software vulnerabilities by smart fuzzing
CN112035491B (en) Data storage method based on block chain, electronic integral processing method and system
CN107729371B (en) Data indexing and querying method, device, equipment and storage medium of block chain
CN114095273A (en) Deep learning-based internet vulnerability mining method and big data mining system
Li et al. A mining approach to obtain the software vulnerability characteristics
Wei et al. Deephunter: A graph neural network based approach for robust cyber threat hunting
Yuan et al. Retrieving relevant CAPEC attack patterns for secure software development
CN100407199C (en) Lookup method of protecting consistency of contour based on information technology products of relational database
Beutner et al. AutoHyper: Explicit-state model checking for HyperLTL
Zhang et al. Flow Chart Generation‐Based Source Code Similarity Detection Using Process Mining
Brizzio et al. Automated repair of unrealisable LTL specifications guided by model counting
CN101060396B (en) An event detection method and device
CN100401294C (en) Checkig method for protecting integrality of outline based on products of information technology of relational database
CN113449034B (en) Intelligent contract data security management method, system and storage medium based on blockchain network
CN116074092A (en) Attack scene reconstruction system based on heterogram attention network
CN101833505A (en) Method for detecting security bugs of software system
Sun et al. Contradictions Identification of Safety and Security Requirements for Industrial Cyber-Physical Systems
Whitehurst et al. The SeaView verification
Adedayo et al. Schema reconstruction in database forensics
Reina et al. Modeling and enforcing integrity constraints on graph databases
Boxin Research on Dynamic Detection of Vulnerabilities in Smart Contracts Based on Machine Learning
Silva et al. Assisting Data Warehousing Populating Processes Design through Modelling using Coloured Petri Nets.
CN111464516B (en) Safety network computer for effectively blocking attack from internal network system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080730

Termination date: 20120930