CN105184177A - Process hiding method and apparatus - Google Patents

Process hiding method and apparatus Download PDF

Info

Publication number
CN105184177A
CN105184177A CN201510537436.9A CN201510537436A CN105184177A CN 105184177 A CN105184177 A CN 105184177A CN 201510537436 A CN201510537436 A CN 201510537436A CN 105184177 A CN105184177 A CN 105184177A
Authority
CN
China
Prior art keywords
target process
variable
task
target
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510537436.9A
Other languages
Chinese (zh)
Inventor
张新亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TVMining Beijing Media Technology Co Ltd
Original Assignee
TVMining Beijing Media Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TVMining Beijing Media Technology Co Ltd filed Critical TVMining Beijing Media Technology Co Ltd
Priority to CN201510537436.9A priority Critical patent/CN105184177A/en
Publication of CN105184177A publication Critical patent/CN105184177A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention discloses a process hiding method and apparatus. The method comprising: generating a process module in a Linux system; saving, in the process module by using a first variable, a target process number of a target process to be hidden; running the process module, and obtaining an associated target work task of the target process according to the target process number; determining whether the target work task is empty; and when the target work task is not empty, saving the target process number of the first variable by using a second variable, and assigning a value of 0 to the first variable that is used to represent the target process number. According to the technical solutions of the present invention, a value of 0 is assigned to a target process number of a target process that is not to be viewed or modified by others, and these target processes can be hidden, so as to ensure usage security of these target processes.

Description

A kind of process hiding method and device
Technical field
The present invention relates to management of process technical field, particularly a kind of process hiding method and device.
Background technology
At present, when user wishes to check all processes under linux system, all by system command as ps order or top command lookup are arrived; This just makes anyone to find easily needs the process of checking, and modifies easily.This causes the security of process to be guaranteed, especially for important process, user does not usually wish that other users arbitrarily check or revise, and this easily brings very large puzzlement to user.
Summary of the invention
The invention provides a kind of process hiding method and device, by by not wishing that the process number assignment of the process checked by other people or revise is zero, these processes can be hidden, thus guaranteeing the safety in utilization of these processes.
The invention provides a kind of process hiding method, comprising: under linux system, generate scheduler module;
The target process number of the target process using the first variable to hide is kept in described scheduler module;
Run described scheduler module, and obtain the said target task of described target process according to described target process number;
Judge whether described target operation task is empty;
When described target operation task is not empty, the target process of described first variable number is preserved with the second variable, and be zero by the first variable assignments being used for representing described target process number.
In one embodiment, described method also comprises:
When unloading described scheduler module, by use described second variable save described target process number again assignment to described first variable.
In one embodiment, described method also comprises:
The target process title of the target process using ternary to hide is kept in described scheduler module.
In one embodiment, described when unloading described scheduler module, by use the described target process of described second variable save number again assignment to described first variable, comprising:
Obtain the system chained list of described scheduler module;
Obtain the title of each task in described system chained list and each described task;
The title of each described task and the target process title of described ternary are compared;
Determine the target process in described system chained list according to comparative result, and by use described second variable save described target process number again assignment to described first variable.
In one embodiment, the described target process determined according to comparative result in described system chained list, comprising:
When the title of a task is identical with the target process title of ternary, determine that a described task is described target process.
The present invention also provides a kind of process hiding device, comprising: generation module, under linux system, generates scheduler module;
First preserves module, and the target process number of the target process need hidden for using the first variable is kept in described scheduler module;
First processing module, for running described scheduler module, and obtains the said target task of described target process according to described target process number;
Judge module, for judging whether described target operation task is empty;
Second processing module, during for not being empty when described target operation task, preserves the target process of described first variable number with the second variable, and is zero by the first variable assignments being used for representing described target process number.
In one embodiment, described device also comprises:
Assignment module, for when unloading described scheduler module, by use described second variable save described target process number again assignment to described first variable.
In one embodiment, described device also comprises:
Second preserves module, and the target process title of the target process need hidden for using ternary is kept in described scheduler module.
In one embodiment, described assignment module comprises:
First obtains submodule, for obtaining the system chained list of described scheduler module;
Second obtains submodule, for obtaining the title of each task in described system chained list and each described task;
Comparison sub-module, for comparing the title of each described task and the target process title of described ternary;
First process submodule, for determining the target process in described system chained list according to comparative result, and by use described second variable save described target process number again assignment to described first variable.
In one embodiment, described first process submodule also for:
When the title of a task is identical with the target process title of ternary, determine that a described task is described target process.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect:
When not wishing the said target task of the target process checked by other people or revise not for sky, being zero by the target process assignment by this target process, these target process can being hidden, thus guaranteeing the safety in utilization of these target process.
Other features and advantages of the present invention will be set forth in the following description, and, partly become apparent from instructions, or understand by implementing the present invention.Object of the present invention and other advantages realize by structure specifically noted in write instructions, claims and accompanying drawing and obtain.
Below by drawings and Examples, technical scheme of the present invention is described in further detail.
Accompanying drawing explanation
Accompanying drawing is used to provide a further understanding of the present invention, and forms a part for instructions, together with embodiments of the present invention for explaining the present invention, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the process flow diagram of a kind of process hiding method according to an exemplary embodiment.
Fig. 2 is the process flow diagram of the another kind of process hiding method according to an exemplary embodiment.
Fig. 3 is the process flow diagram of another the process hiding method according to an exemplary embodiment.
Fig. 4 is the process flow diagram of another the process hiding method according to an exemplary embodiment.
Fig. 5 is the block diagram of a kind of process hiding device according to an exemplary embodiment.
Fig. 6 is the block diagram of the another kind of process hiding device according to an exemplary embodiment.
Fig. 7 is the block diagram of another the process hiding device according to an exemplary embodiment.
Fig. 8 is the block diagram of another the process hiding device according to an exemplary embodiment.
Embodiment
Below in conjunction with accompanying drawing, the preferred embodiments of the present invention are described, should be appreciated that preferred embodiment described herein is only for instruction and explanation of the present invention, is not intended to limit the present invention.
In correlation technique, when user wishes to check all processes under linux system, all by system command as ps order or top command lookup are arrived; This just makes anyone to find easily needs the process of checking, and modifies easily.This causes the security of process to be guaranteed, especially for important process, user does not more wish that other users arbitrarily check or revise.
In order to solve the problems of the technologies described above, disclosure embodiment provides a kind of process hiding method, and the method is applicable in process hiding program, system or device, as shown in Figure 1,
Step S101, under linux system, generates scheduler module; Wherein, the operation generating scheduler module is as follows:
#include<linux/kernel.h>//quote linux system kernel header file
#include<linux/module.h>
#include<linux/init.h>
#include<linux/sched.h>
#include<linux/list.h>
MODULE_LICENSE (" GPL "); // " GPL " specifies any version that this is GNUGeneralPublicLicense
MODULE_AUTHOR (" zxl "); // module author
Initialization first variable pid and its said target task task, and generate scheduler module module_param:
Staticpid_tpid=0; The variable of // statement pid_t structure type, wherein pid i.e. the first variable, for preserving the target process number of target process;
staticpid_told_pid=0;
Staticstructtask_struct*task=NULL; // statement task_struct structure categorical variable, task is the said target task of this target process;
//staticstructtask_struct*old_task=NULL;
Staticchar*mystring=NULL; // statement char pointer type variable
Module_param (pid, int, 0); // module parameter is arranged, and wherein, module_param is the scheduler module of generation;
MODULE_PARM_DESC (pid, " Thepidtohide "); // module parameter is described
MODULE_PARM_DESC (mystring, " Theprocess'sname "); Mystring is the ternary hereafter mentioned, and is used for preserving the process title of target process.
Step S102, the target process number of the target process using the first variable to hide is kept in described scheduler module;
Under linux system, after generating scheduler module module_param, can will the target process assignment of the target process run hidden being needed to the first variable, then using the first variable to be kept at needing the target process number of the target process hidden in this scheduler module.Generate scheduler module, following program can being used by the target process assignment of target process run to the first variable pid, being kept in this scheduler module to use the first variable pid by needing the target process number of the target process hidden:
MODULE_PARM_DESC (pid, " Thepidtohide "); // module parameter is described
Step S103, runs described scheduler module, and obtains the said target task of described target process according to described target process number;
Step S104, judges whether described target operation task is empty;
Because target process may can not be present in linux system always, likely run and closed, or there is abnormal closedown, therefore, be kept at needing the target process number of the target process hidden after in this scheduler module at use first variable, need to start this scheduler module, this scheduler module is normally run, and the target process of the target process hidden as required number obtains the said target task of this target process, thus by judging whether this target operation task is empty, judge that this target operation task is current whether just to run in linux system, certainly, if this target operation task is empty, this is described target operation task is current and do not run in linux system, target process also just closes naturally, then current any user can not search this target process, then can exit this scheduler module, need not again for this target process carries out arranging deliberately hiding this target process, thus reduce unnecessary operation, reduce system burden.Certainly, this scheduler module can be run by following program, and whether be that sky judges to target operation task:
Step S105, when described target operation task is not empty, preserves the target process of described first variable number with the second variable, and is zero by the first variable assignments being used for representing described target process number.
In addition, if this target operation task is not empty, this is then described target operation task is current and just run in linux system, therefore, the target process of its correspondence also runs just in systems in which, now, the second variable can be given by the target process assignment that represents with the first variable, to use the real target process number of second this target process of variable save, and be zero by being originally used for the first variable assignments of the real goal process number representing target process, like this, the process number needing the target process hidden has been all just zero, this just make user cannot again by linux system order as ps order or top order inquire this target process, more cannot modify to this target process without authorization, thus this target process is hidden, and the safety in utilization of the target process needing to be hidden can be guaranteed.
As shown in Figure 2, in one embodiment, described method also comprises:
In step s 201, when unloading described scheduler module, by use described second variable save described target process number again assignment to described first variable.
When unloading this scheduler module, can by the target process preserved with the second variable old_pid number again assignment to the first variable task->pid, like this, just the process number of the target process hidden before can be reduced, so that user can carry out normal queries, then modify this target process, guarantee the normal use of user.
As shown in Figure 3, in one embodiment, described method also comprises:
In step S301, the target process title of the target process using ternary to hide is kept in described scheduler module.
When hiding this target process, also can the title of this target process and Theprocess'sname be kept in scheduler module module_param by ternary mystring as required, particularly, can be comprised by following program:
MODULE_PARM_DESC(mystring,"Theprocess'sname")。
As shown in Figure 4, in one embodiment, above-mentioned steps S201 can be performed as:
In steps A 1, obtain the system chained list of described scheduler module;
In steps A 2, obtain the title of each task in described system chained list and each described task;
In steps A 3, the title of each described task and the target process title of described ternary are compared;
In steps A 4, determine the target process in described system chained list according to comparative result, and by use described second variable save described target process number again assignment to described first variable.
Because each scheduler module can exist a corresponding system chained list in system bottom, the ruuning situation of the process in this scheduler module is stored in this chained list, be equivalent to a running log of this scheduler module, therefore, when unloading this scheduler module, this system chained list can be traveled through and search each task one by one, and title, the process title of the target process then hidden by the needs preserved before the name character string of the title of each task and each task and ternary compares, whether completely the same with the string name length both judging, whether content is completely the same, when the Name Length of both character strings and content completely the same time, illustrate process that task that this finds out is corresponding be exactly before the target process hidden, the target process then use second variable old_pid can preserved number again assignment to the first variable task->pid, thus the process number of the target process hidden before has been carried out reducing namely unhide, so that user can carry out normal queries to this target process, then modify, guarantee the normal use of user.Wherein, the program unloading scheduler module is as follows:
In one embodiment, the described target process determined according to comparative result in described system chained list, comprising:
When the title of a task is identical with the target process title of ternary, determine that a described task is described target process.
When the title of the task found out i.e. both string name length identical with the target process title of ternary is completely the same, content is completely the same, can accurately determine process that task that this finds out is corresponding be exactly before the target process hidden.
As shown in Figure 5, the present invention also provides a kind of process hiding device, comprising:
Generation module 501, under linux system, generates scheduler module;
First preserves module 502, and the target process number of the target process need hidden for using the first variable is kept in described scheduler module;
First processing module 503, for running described scheduler module, and obtains the said target task of described target process according to described target process number;
Judge module 504, for judging whether described target operation task is empty;
Second processing module 505, during for not being empty when described target operation task, preserves the target process of described first variable number with the second variable, and is zero by the first variable assignments being used for representing described target process number.
As shown in Figure 6, in one embodiment, described device also comprises:
Assignment module 601, for when unloading described scheduler module, by use described second variable save described target process number again assignment to described first variable.
As shown in Figure 7, in one embodiment, described device also comprises:
Second preserves module 701, and the target process title of the target process need hidden for using ternary is kept in described scheduler module.
As shown in Figure 8, in one embodiment, described assignment module 601 comprises:
First obtains submodule 6011, for obtaining the system chained list of described scheduler module;
Second obtains submodule 6012, for obtaining the title of each task in described system chained list and each described task;
Comparison sub-module 6013, for comparing the title of each described task and the target process title of described ternary;
First process submodule 6014, for determining the target process in described system chained list according to comparative result, and by use described second variable save described target process number again assignment to described first variable.
In one embodiment, described first process submodule 6014 also for:
When the title of a task is identical with the target process title of ternary, determine that a described task is described target process.
About the device in above-described embodiment, wherein the concrete mode of unit executable operations has been described in detail in about the embodiment of the method, will not elaborate explanation herein.
Finally, the process hiding device in the present invention is applicable to terminal device.Such as, can be mobile phone, computing machine, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disk memory and optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the process flow diagram of the method for the embodiment of the present invention, equipment (system) and computer program and/or block scheme.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block scheme and/or square frame and process flow diagram and/or block scheme and/or square frame.These computer program instructions can being provided to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computing machine or other programmable data processing device produce device for realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be loaded in computing machine or other programmable data processing device, make on computing machine or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computing machine or other programmable devices is provided for the step realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
Obviously, those skilled in the art can carry out various change and modification to the present invention and not depart from the spirit and scope of the present invention.Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.

Claims (10)

1. a process hiding method, is characterized in that, comprising:
Under linux system, generate scheduler module;
The target process number of the target process using the first variable to hide is kept in described scheduler module;
Run described scheduler module, and obtain the said target task of described target process according to described target process number;
Judge whether described target operation task is empty;
When described target operation task is not empty, the target process of described first variable number is preserved with the second variable, and be zero by the first variable assignments being used for representing described target process number.
2. method according to claim 1, is characterized in that, described method also comprises:
When unloading described scheduler module, by use described second variable save described target process number again assignment to described first variable.
3. method according to claim 1 and 2, is characterized in that, described method also comprises:
The target process title of the target process using ternary to hide is kept in described scheduler module.
4. method according to claim 3, is characterized in that,
Described when unloading described scheduler module, by use the described target process of described second variable save number again assignment to described first variable, comprising:
Obtain the system chained list of described scheduler module;
Obtain the title of each task in described system chained list and each described task;
The title of each described task and the target process title of described ternary are compared;
Determine the target process in described system chained list according to comparative result, and by use described second variable save described target process number again assignment to described first variable.
5. method according to claim 4, is characterized in that,
The described target process determined according to comparative result in described system chained list, comprising:
When the title of a task is identical with the target process title of ternary, determine that a described task is described target process.
6. a process hiding device, is characterized in that, comprising:
Generation module, under linux system, generates scheduler module;
First preserves module, and the target process number of the target process need hidden for using the first variable is kept in described scheduler module;
First processing module, for running described scheduler module, and obtains the said target task of described target process according to described target process number;
Judge module, for judging whether described target operation task is empty;
Second processing module, during for not being empty when described target operation task, preserves the target process of described first variable number with the second variable, and is zero by the first variable assignments being used for representing described target process number.
7. device according to claim 6, is characterized in that, described device also comprises:
Assignment module, for when unloading described scheduler module, by use described second variable save described target process number again assignment to described first variable.
8. the device according to claim 6 or 7, is characterized in that, described device also comprises:
Second preserves module, and the target process title of the target process need hidden for using ternary is kept in described scheduler module.
9. device according to claim 8, is characterized in that,
Described assignment module comprises:
First obtains submodule, for obtaining the system chained list of described scheduler module;
Second obtains submodule, for obtaining the title of each task in described system chained list and each described task;
Comparison sub-module, for comparing the title of each described task and the target process title of described ternary;
First process submodule, for determining the target process in described system chained list according to comparative result, and by use described second variable save described target process number again assignment to described first variable.
10. device according to claim 9, is characterized in that,
Described first process submodule also for:
When the title of a task is identical with the target process title of ternary, determine that a described task is described target process.
CN201510537436.9A 2015-08-27 2015-08-27 Process hiding method and apparatus Pending CN105184177A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510537436.9A CN105184177A (en) 2015-08-27 2015-08-27 Process hiding method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510537436.9A CN105184177A (en) 2015-08-27 2015-08-27 Process hiding method and apparatus

Publications (1)

Publication Number Publication Date
CN105184177A true CN105184177A (en) 2015-12-23

Family

ID=54906250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510537436.9A Pending CN105184177A (en) 2015-08-27 2015-08-27 Process hiding method and apparatus

Country Status (1)

Country Link
CN (1) CN105184177A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107066879A (en) * 2017-03-22 2017-08-18 山东中创软件商用中间件股份有限公司 A kind of method and system hidden for computer application program process
CN107180189A (en) * 2016-03-11 2017-09-19 无锡天脉聚源传媒科技有限公司 A kind of method and device of concealing program process
CN111027055A (en) * 2019-03-19 2020-04-17 哈尔滨安天科技集团股份有限公司 Method and device for hiding android system process and storage device

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
SANBAILIUSHILIUYE: "linux下如何隐藏进程(ps/top)", 《HTTP://BLOG.CSDN.NET/SANBAILIUSHILIUYE/ARTICLE/DETAILS/7561869》 *
SANBAILIUSHILIUYE: "linux下如何隐藏进程(ps/top)", 《HTTP://WWW.ITKEYWORD.COM/DOC/3857607646384718X526/MODULE-STRUCT-LISTEACHLINUXBLOG》 *
刘霞林 等: "Linux中实现进程隐藏的一种新方法", 《西安邮电学院学报》 *
邹秋艳 等: "基于Linux2.6的进程隐藏机制的实现", 《重庆理工大学学报(自然科学)》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107180189A (en) * 2016-03-11 2017-09-19 无锡天脉聚源传媒科技有限公司 A kind of method and device of concealing program process
CN107180189B (en) * 2016-03-11 2020-06-09 无锡天脉聚源传媒科技有限公司 Method and device for hiding program process
CN107066879A (en) * 2017-03-22 2017-08-18 山东中创软件商用中间件股份有限公司 A kind of method and system hidden for computer application program process
CN111027055A (en) * 2019-03-19 2020-04-17 哈尔滨安天科技集团股份有限公司 Method and device for hiding android system process and storage device

Similar Documents

Publication Publication Date Title
US11334671B2 (en) Adding adversarial robustness to trained machine learning models
US11663337B2 (en) Methods and systems for system call reduction
CN109726004B (en) Data processing method and device
CN109657177A (en) The generation method of the page, device, storage medium and computer equipment after upgrading
CN105184177A (en) Process hiding method and apparatus
CN113239386A (en) API (application program interface) permission control method and device
CN105930058A (en) Application starting method and apparatus for mobile terminal and mobile terminal
US9407523B2 (en) Increasing performance of a streaming application by running experimental permutations
CN105739956A (en) Method and system for constructing intelligent rule model of computer system
CN113296786A (en) Data processing method and device, electronic equipment and storage medium
US9729466B2 (en) Information technology resource management
CN113448545B (en) Method, apparatus, storage medium and program product for machine learning model servitization
CN106716998B (en) Multiple operating system multi-medium data decoding method, device and electronic equipment
CN115454576B (en) Virtual machine process management method and system and electronic equipment
CN113835748B (en) Packaging method, system and readable medium for application program based on HTML5
CN112214287B (en) Service control method and device of application software and electronic equipment
US10264061B2 (en) User service access allocation method and system
US20210279621A1 (en) Methods and systems for graph computing with hybrid reasoning
CN115599533A (en) Task processing method, device, equipment and storage medium
CN113849686A (en) Video data acquisition method and device, electronic equipment and storage medium
CN113448585A (en) Optimization method and device for thread pool, electronic equipment and storage medium
US9189633B2 (en) Download management method and device based on android browser
CN106304410A (en) A kind of data migration method and mobile terminal
CN111399818A (en) Recommendation engine design method, recommendation engine design device, server and storage medium
CN104573504B (en) A kind of method and apparatus for running application in iOS related systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20151223

RJ01 Rejection of invention patent application after publication