CN103345530B - A kind of social networks blacklist automatic fitration model based on semantic net - Google Patents

A kind of social networks blacklist automatic fitration model based on semantic net Download PDF

Info

Publication number
CN103345530B
CN103345530B CN201310318042.5A CN201310318042A CN103345530B CN 103345530 B CN103345530 B CN 103345530B CN 201310318042 A CN201310318042 A CN 201310318042A CN 103345530 B CN103345530 B CN 103345530B
Authority
CN
China
Prior art keywords
information
malice
value
fallacious message
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310318042.5A
Other languages
Chinese (zh)
Other versions
CN103345530A (en
Inventor
孙国梓
哈乐
杨涛
杨一涛
姜雪晴
黄斯琪
刘力颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201310318042.5A priority Critical patent/CN103345530B/en
Publication of CN103345530A publication Critical patent/CN103345530A/en
Application granted granted Critical
Publication of CN103345530B publication Critical patent/CN103345530B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of social networks blacklist automatic fitration model based on semantic net, the malice junk information of the model can be labeled as junk information by automatic shield, ability visible this type of information when only user actively checks;Fallacious message publisher can be also automatically flagged as in the blacklist of information receiver, shield the fallacious message of its transmission;The model is also provided with User Defined mask information, and this type of information is marked as fallacious message weights highest, that is the least patient information of user, once it is judged to this type of information, then the probability of sender and recipient's friend relation back to normal is with regard to very little, the characteristics of this just inherits traditional blacklist, on this basis, the model also has the relatively low info class of some malice weights, when being judged as this type of information, if recipient has actively carried out data interaction with sender, the user for being then judged as malice publisher is then possible to recover blacklist by system, the two is set to turn into normal relation.

Description

A kind of social networks blacklist automatic fitration model based on semantic net
Technical field
The present invention relates to information security and Computer Applied Technology field, more particularly to a kind of social network based on semantic net Network blacklist automatic fitration model.
Technical background
Social networks(SNS)By promoting on the line between people exchange and information sharing, have become a kind of main Applied on line, obtain very huge customer group quantity.At the same time, in order to provide good Consumer's Experience to so a large amount of User, the function of social networks itself also becomes increasingly to tend to complicated, interactive information text message single since most, Have turned to more digital contents, such as video.This to social networks security and privacy protection propose new challenge.
According to investigations, some criminals utilize the opening and the information of exposure during user's use of social networks, such as Interactive information of photo and friend etc., by targetedly propagating fraud information, the safety to social network user is caused Serious to threaten, social networks has become a kind of main path that wealth is invaded in criminal's fraud.Social networks mistake is used in user Cheng Zhong, can more or less receive the fallacious message of some criminals, and to some obvious fraud informations, user has the ability certainly Row judges, but to some through camouflage it is hidden, show unconspicuous information, then its directly endanger people the person, Property safety.Although some social networks, such as Renren Network have provided the user the function of some controls of authority, these controls Function processed is all fairly simple, underaction.
In recent years, with the development of semantic net, increasing body is used to set up the representation of knowledge in specific area Model, but it is huge due to knowledge knowledge network, also there are many white spaces and be not related to, particularly with current emerging application Security fields, semantic network technology is also seldom employed.
By analysis, dynamic, personalized using semantic net itself the, characteristic such as take the initiative in offering a hand, is especially suitable for solving to work as It is preceding it is proposed that the problem of.And the present invention the problem of can solve above well.
The content of the invention
Present invention aims at the problem of above-mentioned prior art is present is solved, there is provided a kind of social activity based on semantic net Network blacklist automatic fitration model.The model is extracted and the scheme of integrated management and its related based on potential fallacious message What supporting mechanism was realized.
The technical solution adopted for the present invention to solve the technical problems is:The present invention is to existing social network ontologies model On the basis of improved, devise a kind of interactive information to user in social networks and carry out analysis judgement, extract possible crime The automatic fitration model of membership credentials.The model is divided into information analysis extraction module, information malice index scoring module, score knot Fruit blacklist relating module, it specifically includes as follows:
First, information analysis extraction module
The present invention proposes a kind of information analysis extraction module, it can be seen that in information stream part, will believe in the module Breath is divided for two parts, and a portion is normal, harmless information, and another part is fallacious message (Viciousness), according to the analysis to fallacious message feature, now it is divided into 4 classes by fallacious message is abstract, is respectively:
● meaningless information (meaningless):This category information is mainly the alphabetical additional character of shape such as random alignment, mistake Filter those and be likely to be the harassing and wrecking content that machine is issued at random, if malice publisher is taken a walk letter in large quantities using issue machine Breath, not only brings flow pressure to social networks itself, invisible puzzlement is also brought to user.
● fraud information (fraud):Fraud information is mainly what is extracted in the typical case counted by public security department Some are accused of the feature sentence of fraud, such as inquiry passport NO., home address etc..
● violence information (violence):Violence information refer to the sentence that social safety is endangered comprising vocabulary is abused and It is accused of too drastic speech of spirit harassing and wrecking etc..Filtering this category information can avoid causing dyadic conflict, be that social networks builds one Good " ecological environment ".
● customized information (user defined):Customized information can allow user individual to set The content for the content received, such as maskable advertisement and non-malicious push of oneself being unwilling so that middleware mentioned above Function is more perfect.
In summary, the present invention proposes fallacious message ontology model, and the model is the extension to social networks model, is Clearer description model, introduces the concept of sensitive semantic base, sensitive semantic base is exactly that 4 described above are big here The set of category information composition, when information, which is detected, meets the rule in the semantic base, is then classified as in fallacious message A certain class, namely fallacious message.Even if but be now classified as fallacious message, this would not be received by also not representing user Information, the judge simply rough division to the information of this step, by the analyze data stream both sides always information record in later stage, It can just further determine whether to shield this information completely.
2nd, information malice index scoring module
The method for the identification fallacious message that the present invention is provided, has considered not only the malice degree of information itself, has also combined Send the malice record of the user of fallacious message.For clearer this process of description, the present invention proposes following general Read:
The malice factor:Represented with fa, represent the malice degree for the infobit that user sends.The value of the malice factor such as table Shown in 1:
Table 1
The above-mentioned value of table 1 is a reference, and such value, which is mainly, makes whole system more flexible, and a user issued Fallacious message, but this user is not represented with that can not possibly constitute friend relation after information receiver, routine information value is 0.99, so it is multiplied every time with malice record index, malice record index is less than 1, if both sides repeatedly carry out conventional interaction, Then malice record index is consistently less than 1.If system detectio is to fallacious message, according to upper table rule, fa values are according to fallacious message Malice degree, record exponent arithmetic with existing malice, it is in increase tendency to make malice record index, such as current malice record refers to Number is 0.5, as long as then sender retransmits a fallacious message, such as violence information, so that it may so that malice index is more than 1, then had Safe range may be crossed, as malice sender.
Malice record index:R, S, V represent recipient, sender, malice record index respectively, then triple can be used (R,S,V)Identify a data and sender, the relation of recipient and determine that can this data stream connect from sender's flow direction Receipts person.The initial value of malice record index is 1, represents that both sides did not had data exchange also.Malice record index is smaller also indirect The level of intimate of both sides is reflected, then the probability for constituting malice relation is also just smaller.
Malice records the safe range of index:This scope can determine according to system to the acceptance level of fallacious message, if Put a value more than 1.View of the above, it will be seen that routine information makes malice record index tend to 0, fallacious message makes evil Meaning record index tends to be infinitely great, makes it away from 1, if the information flow of both sides includes both the above, malice record index All the time swung around 1, system will not be such that sender is in forever in blacklist, and the value of routine information directly influences transmission Person departs from the difficulty of blacklist.
In summary, if regarding whole process as a function, the usable sentence described function formalized as follows Input and output valve.It is user's set in social networks to define Usns first, and T represents the safe threshold that system is set, S, R, V It is defined as above, then what this process can be vivider is expressed as S->R=V, namely sender, the current malice record product of recipient Tired value is V, it is possible to use P (S, R)=V represents that the domain of definition of input value is represented by here:I={r:R,s:S|r,s∈Usns, R ≠ s }, output valve can then be divided into virtual value and masking value scope, and valid value range is represented by:Z={v:V|0<v<T }, shielding The scope of value is thenZ.
Following predicate logic can be used to represent for the condition of system mask:If
F(r,s):R and s is friend relation
C(x):The Msg that r is sent includes fallacious message
V(r,s,x):The information this time sent and the calculated value of malice record index are more than system safe threshold.
B(r,s):System mask s->R information.
U(r,s):System update V (r, s, x) value.
Then have:
If the fa values of routine information and fallacious message are respectively far, fav, active user a, b malice record exponential representation For (a, b, base), then sender will make that oneself information is not needed then by system mask and recipient carries out n=-logfarBase times Routine information is interacted.Here is the reasonability that one group of data represents data above, if current base values are that 20, far values are 0.99, Then sender needs to interact with recipient's 300 effective routine informations of progress, and also even user has only issued 4 times and connect at the beginning The information of receipts person's filtering, just makes fallacious message index quite big.
3rd, score result blacklist relating module
Need exist for introducing the concept of a safe threshold, this threshold values needs to rely on number present in existing social networks According to by statistics, calculating obtains a rational value, this value not immutable, fixed value, but is answered according to different Demand, is rational as long as maintaining within the scope of one.
By the judged result of network analysis previous step, if the safe threshold that information is set beyond system, by information Be filtered into junk information, and the user of this information will be sent and add in the blacklist of recipient, the next sender again to When secondary recipient sends information, information can be junk information by automatic fitration, and recipient can only look into junk information Xiang Zhongcai See this type of information.
The information that only shielding person user is actively checked in rubbish, with being interacted certain normal information amount by shielding person Afterwards, shielded this to be possible to be returned to outside blacklist by system, system will be considered that the two has recovered friend relation.
Beneficial effect:
1st, the present invention can carry out judge score to the malice degree of information flow, and automatic fitration exceeds the information of safe range Stream, and related information sender and recipient, its is constituted potential isolated relation.
2nd, the present invention can make system automatically terminate two in the user in blacklist by improving the relation with recipient Person's shielding relation.
3rd, The present invention gives a set of method more reasonably scored to fallacious message.
Brief description of the drawings
Fig. 1 is social network ontologies illustraton of model.
Fig. 2 is fallacious message ontology model figure.
Fig. 3 is system framework figure.
Embodiment
The invention is described in further detail below in conjunction with Figure of description.
Whole system framework is based on an existing social networks open platform, namely the SNS in Fig. 3 Infrastructure, the optional middleware that main functionality of the present invention belongs in this network platform, in this Between part by the sensitive semantic base of maintenance management, information malice degree scoring rule, be responsible for customer relationship and interacted with information flow Between association analysis.The embodiment of each part is just described from the following aspects here.
1st, the interception classification of information
The exchange of substantial amounts of data is there is in social networks, the data interception stream between certain two data terminal can join The file classification method using Naive Bayes Classifier is examined, the rule defined with reference to sensitive semantic base is carried out to data content Classification.When being detected as normal flow, then it is cleared and passes through, and then by information persistence and recipient can be pointed out this information, If not passing through, malice exponential integral module is sent to, score computing is carried out to this information, with reference to(Recipient, sends Person, accumulates malice exponential quantity)Triple, the malice fraction with current information judges that can fallacious message be intercepted by system, if Malice degree is not obvious, does not reach the safe threshold of system setting, then this information of letting pass.Filter criteria, refers to fire wall Filter type, be divided into two kinds, Yi Zhongwei:Every information being located in sensitive semantic base is shielded without exception, it is another for it is every not The information defined by information bank is all shielded, and the system uses the first, then needs the support of a sensitive semantic base.
2nd, sensitive semantic base
User needs to go out a whole set of letter according to the frequency of occurrences analysis and summary of the malicious data of daily flowing in website Storehouse is ceased, with reference to classifying rules proposed by the present invention, these information is loaded into sensitive semantic base, used for system.Sensitive semantic base Structure directly affect the significant degree of whole system, if the information content that sensitive semantic base is defined is few, or not comprehensively, then The use practical significance of system is not then obvious, so needing the special expert for field of social network to put forward information Take, be rule of thumb put in storage classification information.Similar with the domain expert of semantic net, the assistance that domain expert is needed also exist for here is determined Justice.
3rd, information malice index scoring module
Present system is not merely simply to be compared the information extracted with the key vocabularies in sensitive semantic base Compared with can also utilize scoring module, carry out comprehensive analysis to the information that extracts, provide an analysis result, determine to believe for system The relation of the user at breath stream two ends.System is responsible for safeguarding one(Information transmitter, information receiver, fallacious message accumulation index) Triple data, a finger of flag information sender and information receiver always fallacious message present in interactive information The real relation of number, indirectly the reflection end subscriber of information flow two.Information malice index scoring module will inquire this in score Triple data, and the different malice weights set according to various fallacious message systems, by the score of obtained new data Value, with the value computing, updates triple data, and returns to score result, judges for system.
4th, blacklist management module
Blacklist management module is the result set of whole system analysis, and the module can be responsible for the operation pipe of lasting layer data Reason.Oracle database can be used, facilitates the use of system.System can provide one for each user in social networks There are three kinds of relations between any two user in customer relationship in black list user's table, mark social networks, network: Friend relation(isFriendOf), strange relation(notFriendOf), and shielding relation(isInBlacklistOf), the system Concern is primarily with the 3rd shielding relation, namely blacklist.

Claims (3)

1. a kind of social networks blacklist automatic filtering unit based on semantic net, it is characterised in that:Described device is divided into information Analyze extraction module, information malice index scoring module, score result blacklist relating module;Information analysis extraction module will be believed It is two parts to cease flow point, and a part is normal, harmless information;Another part is fallacious message;
Described information analyzes extraction module according to the analysis to fallacious message feature, is divided into 4 classes by fallacious message is abstract, respectively For:
1) meaningless information (meaningless):This category information refers to the alphabetical additional character of shape such as random alignment, filters those It is likely to be the harassing and wrecking content that machine is issued at random;
2) fraud information (fraud):Fraud information is mainly some extracted in the typical case counted by public security department It is accused of the feature sentence of fraud, including inquiry passport NO., home address;
3) violence information (violence):Violence information refers to, comprising vocabulary is abused, endanger the sentence of social safety and be accused of The too drastic speech of spirit harassing and wrecking, filters this category information and avoids causing dyadic conflict, is that social networks builds a good " ecology Environment ";
4) customized information (user defined):Customized information sets some oneself to be reluctant by user individual The content that the content received, i.e. shielding advertisement and the non-malicious of anticipating are pushed;
Fallacious message ontology model is the extension to social networks model, for clearer description model, is introduced here The concept of sensitive semantic base, sensitive semantic base is exactly the set of the big category information composition in 4 described above, when information is detected When meeting the rule in the semantic base, then a certain class in fallacious message, namely fallacious message are classified as, even if but now Fallacious message is classified as, this information would not be received by also not representing user, and the judge of this step is simply to the information It is rough to divide, by the analyze data stream both sides always information record in later stage, it can just further determine whether to shield this completely Information;
Described information malice index scoring module includes the method for the identification fallacious message provided, has considered not only information itself Malice degree, also combine send fallacious message user malice record, in order to it is clearer description this process, it is proposed that Following concept, including:
The malice factor:Represented with fa, represent the malice degree for the infobit that user sends;The value of the malice factor such as institute of table 1 Show:
Table 1
One user issued fallacious message, but did not represented this user with that can not possibly constitute good friend pass after information receiver System, routine information value is 0.99, is so multiplied every time with malice record index, malice record index is less than 1, if both sides Conventional interaction is repeatedly carried out, then malice record index is consistently less than 1;If system detectio is to fallacious message, according to upper table rule, Fa values record exponent arithmetic according to the malice degree of fallacious message with existing malice, and it is in increase tendency to make malice record index, It is 0.5 as current malice records index, as long as then sender retransmits a fallacious message, allows for malice index more than 1, then Safe range is crossed, as malice sender;
Malice record index:R, S, V represent recipient, sender, malice record index respectively, then using triple (R, S, V) Identify a data and sender, the relation of recipient and determine that can this data stream flow to recipient from sender, dislike The initial value of meaning record index is 1, represents that both sides did not had data exchange also;Malice record index is smaller also reflect indirectly it is double The level of intimate of side, the then probability for constituting malice relation is also just smaller;
Malice records the safe range of index:This scope is determined according to system to the acceptance level of fallacious message, sets one Value more than 1;Routine information makes malice record index tend to 0, and fallacious message makes malice record index tend to be infinitely great, makes it Away from 1, if the information flow of both sides includes both the above, malice record index is swung around 1 all the time, and system will not make transmission Person is in blacklist forever, and the value of routine information directly influences the difficulty that sender departs from blacklist;
In summary, regard whole process as a function, use the input and output of the sentence described function formalized as follows Value;It is user's set in social networks to define Usns first, and T represents the safe threshold that system is set, and S, R, V definition is same On, then what this process was vivider is expressed as S->R=V, namely sender, the current malice record accumulating value of recipient is V, Also represent that the domain of definition of input value is expressed as here using P (S, R)=V:I={ r:R,s:S | r, s ∈ Usns, r ≠ s }, output Value is then divided into virtual value and masking value scope, and valid value range is expressed as:Z={ v:V|0<v<T }, the scope of masking value then for- Z;
The condition of system mask is represented using following predicate logic:If:
F(r,s):R and s is friend relation;
C(x):The Msg that r is sent includes fallacious message;
V(r,s,x):The information this time sent and the calculated value of malice record index are more than system safe threshold;
B(r,s):System mask s->R information;
U(r,s):System update V (r, s, x) value;
Then have:
If the fa values of routine information and fallacious message are respectively far, fav, active user a, b malice record exponential representation are (a, b, base), then sender to make oneself information do not needed then by system mask and recipient carry out n=-logfarBase times Routine information is interacted;
The score result blacklist relating module introduces the concept of a safe threshold, and this threshold values needs to rely on existing social activity Data present in network, by statistics, calculating obtains a rational value, this value not immutable, fixed value, But be rational as long as maintaining within the scope of one according to the demand of different application;
By the judged result of network analysis previous step, if the safe threshold that information is set beyond system, by information filtering For junk information, and the user of this information will be sent add in the blacklist of recipient, the next sender connects to this again When receipts person sends information, information can be junk information by automatic fitration, and recipient only views this in junk information Xiang Zhongcai Category information;
The information that only shielding person user is actively checked in rubbish, is interacted after certain normal information amount, quilt with by shielding person Shielding person could be returned to outside blacklist by system, and system will be considered that the two has recovered friend relation.
2. a kind of social networks blacklist automatic filtering unit based on semantic net according to claim 1, its feature exists In:The every same shielding being located in sensitive semantic base of described information stream.
3. a kind of social networks blacklist automatic filtering unit based on semantic net according to claim 1, its feature exists In:Described information malice index scoring module will inquire this triple data in score, and according to various fallacious messages The different malice weights that system is set, by the scoring value of obtained new data, with the value computing, update triple data, And return to score result.
CN201310318042.5A 2013-07-25 2013-07-25 A kind of social networks blacklist automatic fitration model based on semantic net Expired - Fee Related CN103345530B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310318042.5A CN103345530B (en) 2013-07-25 2013-07-25 A kind of social networks blacklist automatic fitration model based on semantic net

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310318042.5A CN103345530B (en) 2013-07-25 2013-07-25 A kind of social networks blacklist automatic fitration model based on semantic net

Publications (2)

Publication Number Publication Date
CN103345530A CN103345530A (en) 2013-10-09
CN103345530B true CN103345530B (en) 2017-07-14

Family

ID=49280325

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310318042.5A Expired - Fee Related CN103345530B (en) 2013-07-25 2013-07-25 A kind of social networks blacklist automatic fitration model based on semantic net

Country Status (1)

Country Link
CN (1) CN103345530B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103813020A (en) * 2014-02-28 2014-05-21 联想(北京)有限公司 Information processing method and electronic device
CN105491542B (en) * 2015-12-01 2018-12-18 小米科技有限责任公司 number identification method and device
CN105450510B (en) * 2015-12-18 2019-03-01 小米科技有限责任公司 Friend management method, device and server for social network-i i-platform
CN106095755B (en) * 2016-06-12 2019-02-26 北京师范大学 A kind of fake monitoring and method for early warning based on semantic temporal figure
CN106649672B (en) * 2016-12-14 2020-08-11 华南师范大学 Secure data semantic analysis method and system based on semantic network
US11575715B2 (en) 2019-10-28 2023-02-07 International Business Machines Corporation Dynamically customized cognitive security filter

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6539430B1 (en) * 1997-03-25 2003-03-25 Symantec Corporation System and method for filtering data received by a computer system
CN101114907B (en) * 2006-07-28 2010-08-11 腾讯科技(深圳)有限公司 Method and system for managing and filtering black list
CN101996203A (en) * 2009-08-13 2011-03-30 阿里巴巴集团控股有限公司 Web information filtering method and system
CN102208992B (en) * 2010-06-13 2015-09-02 天津海量信息技术有限公司 The malicious information filtering system of Internet and method thereof
CN102567340B (en) * 2010-12-09 2016-02-24 腾讯科技(深圳)有限公司 A kind of method and device filtering micro-blog information
CN102098332B (en) * 2010-12-30 2014-04-16 北京新媒传信科技有限公司 Method and device for examining and verifying contents
CN102880636A (en) * 2012-08-03 2013-01-16 深圳证券信息有限公司 Bad information detection method and server

Also Published As

Publication number Publication date
CN103345530A (en) 2013-10-09

Similar Documents

Publication Publication Date Title
CN103345530B (en) A kind of social networks blacklist automatic fitration model based on semantic net
Resende et al. Analyzing textual (mis) information shared in WhatsApp groups
CN106570144B (en) The method and apparatus of recommendation information
Heidari et al. Bert model for fake news detection based on social bot activities in the covid-19 pandemic
Verma et al. Semantic feature selection for text with application to phishing email detection
CN101784022A (en) Method and system for filtering and classifying short messages
CN103853841A (en) Method for analyzing abnormal behavior of user in social networking site
CN103037339A (en) Short message filtering method based on user creditworthiness and short message spam degree
CN103793503A (en) Opinion mining and classification method based on web texts
CN108765179A (en) A kind of credible social networks analysis method calculated based on figure
Xu et al. Characterizing the roles of bots on Twitter during the COVID-19 infodemic
Apte et al. Frauds in online social networks: A review
Bera et al. Towards a thematic dimensional framework of online fraud: An exploration of fraudulent email attack tactics and intentions
Dutta et al. A system for intergroup prejudice detection: The case of microblogging under terrorist attacks
Karimi et al. Automated detection of doxing on twitter
Takuro et al. Codewords detection in microblogs focusing on differences in word use between two corpora
Desai Social media, misinformation and Covid-19
Kikerpill Crime-as-communication: detecting diagnostically useful information from the content and context of social engineering attacks
Cristani et al. The Spider-man Behavior Protocol: Exploring Both Public and Dark Social Networks for Fake Identity Detection in Terrorism Informatics.
Kim et al. Scam detection assistant: Automated protection from scammers
Rozo et al. Cyber democracy in the digital age: Characterizing hate networks in the 2022 US midterm elections
Kågström Improving naive bayesian spam filtering
Wright Towards a response to epistemic nihilism
Zhu et al. Building of safer urban hubs: Insights from a comparative study on cyber telecom scams and early warning design
Cao et al. Ontology-based spam detection filtering system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170714

CF01 Termination of patent right due to non-payment of annual fee