CN105577701A - Web crawler recognition method and system - Google Patents

Web crawler recognition method and system Download PDF

Info

Publication number
CN105577701A
CN105577701A CN201610134556.9A CN201610134556A CN105577701A CN 105577701 A CN105577701 A CN 105577701A CN 201610134556 A CN201610134556 A CN 201610134556A CN 105577701 A CN105577701 A CN 105577701A
Authority
CN
China
Prior art keywords
key value
server
client
script
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610134556.9A
Other languages
Chinese (zh)
Other versions
CN105577701B (en
Inventor
崔广宇
李巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ctrip Computer Technology Shanghai Co Ltd
Original Assignee
Ctrip Computer Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ctrip Computer Technology Shanghai Co Ltd filed Critical Ctrip Computer Technology Shanghai Co Ltd
Priority to CN201610134556.9A priority Critical patent/CN105577701B/en
Publication of CN105577701A publication Critical patent/CN105577701A/en
Application granted granted Critical
Publication of CN105577701B publication Critical patent/CN105577701B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment

Abstract

The invention discloses a web crawler recognition method and system. The recognition method comprises the steps that: a client sends a request of a preset URL link to a server; the server generates a first key value according to the request and sends the encrypted first key value and a generated JS decryption script to the client; the client generates a second key value according to the encrypted first key value and the JS decryption script and sends the second key value to the server; the server judges whether a first key value the same as the second key value exists, and if not, determines a user corresponding to the client as a web crawler. Compared with the prior art, the web crawler recognition method and system disclosed by the invention can be used for recognizing the web crawler during the first access of the server without large amount of access frequency detection, thereby saving the CPU resources and improving the recognition efficiency. Meanwhile, the first key values of the requests of different URL links do not need to be stored, thereby greatly saving the storage space of the server.

Description

The recognition methods of web crawlers and system
Technical field
The present invention relates to field of computer technology, particularly a kind of recognition methods of web crawlers and system.
Background technology
Along with the development of the Internet, reptile amount on current the Internet increases day by day, reptile can forge user behavior, constantly access services device thus obtaining information, greatly can drag the speed of service of slow server like this, especially, when the link of asking needs a large amount of calculating just can draw time, the information that simultaneously also has is by the risk obtained in batches.
The anti-reptile means of current main flow are according to access frequency, carry out certain restriction to the client ip address of high-frequency access.This way has following shortcoming: first, needs to record a large amount of data, has high requirement to the memory space of server; Secondly, there is certain hysteresis quality, needed reptile to access the regular hour and just can determine that the other side is reptile, and reptile took enough information this time; Finally, because amount of calculation is frequent, also need constantly computing even without reptile, the pressure caused server is very large.
Summary of the invention
The technical problem to be solved in the present invention take server storage in order to overcome in prior art according to the existence of access frequency recognition network reptile, have hysteresis quality and amount of calculation defect frequently, provides a kind of web crawlers to access web spider identification method and the system that just can be identified and save server storage first.
The present invention solves above-mentioned technical problem by following technical proposals:
A recognition methods for web crawlers, its feature is, comprises the following steps:
S 1, client presets the request that links of URL (UniformResourceLocator, URL(uniform resource locator)) by one and is sent to server;
S 2, this server generates one first key value according to the request of this default URL link, in the process that this first key value is encrypted, generate a JS (JavaScript) decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption;
S 3, this client deciphers script according to the first key value after this encryption and this JS and generates one second key value, and this second key value is sent to this server;
S 4, this server judges whether to there is first key value identical with this second key value, if not, then determines that user corresponding to this client is web crawlers.
In this programme, user corresponding to the client sent request to server can be normal users, also can be web crawlers.
Step S 3in, when the user that client is corresponding is normal users, client is run JS deciphering script based on the first key value after encryption and is generated the second key value, and this second key value is identical with this first key value; When the user that client is corresponding is web crawlers, client nonrecognition JS deciphers script, second key value of now client generation is not identical with the first key value that server generates, or the second key value is empty, therefore can prove that the request of the default URL link that user end to server sends is forged.
The second key value that this programme is generated by the first key value of being generated by server and client compares, and the identification of web crawlers is realized according to comparative result, web crawlers can be made just to be identified when access services device first, compared with prior art, without the need to carrying out the detection of a large amount of access frequency, save CPU (central processing unit) resource, improve recognition efficiency.
In this programme, the request of the default URL link that server receives at every turn can be identical, also can be different, but server all can regenerate the first key value based on default URL link when receiving default URL link at every turn, therefore server is without the need to carrying out the storage of the first key value for the request of different URL link, has greatly saved the memory space of server.
Wherein, default URL link can sets itself as required, and such as can be set to/domestic/cas/key, particularly, in mvc website, need the controller of a newly-increased cas, and increase an action, name is key.
Preferably, by step S 2replace with step S 2':
S 2', this server generates first key value according to the request of this default URL link every a time period, in the process that current first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption.
In this programme, in order to avoid causing accidentally injuring normal users due to network delay, server generates multiple first key value, step S 4middle server judges whether there is first key value identical with this second key value in multiple first key value.Wherein, can be set according to the concrete condition of network this time period.Such as, when the speed of network, the time period can be arranged longer, as 5 minutes; When the speed of network is slower, the time period can be arranged shorter, as 3 minutes.
Preferably, step S 4also comprise: this server is when judging there is not first key value identical with this second key value, and all requests this client sent are tackled, or, send a deceptive information to this client.
In this programme, when server judges there is not first key value identical with this second key value, determine that user corresponding to this client is for web crawlers, all requests that at this moment client can be sent are tackled, or deceptive information can be sent to client, with honeypot reptile.Wherein, deceptive information can sets itself as required.
Preferably, step S 3also comprise: the request of a target URL link is sent to this server by this client;
Step S 4also comprise: this server, when judging to there is first key value identical with this second key value, is searched and the target information corresponding to this target URL link according to the request of this target URL link, and this target information is sent to this client.
In this programme, want to obtain the target information on server, client needs the request sending corresponding target URL link to server.When the user that server determination client is corresponding is not web crawlers, just can be sent to client by with the target information corresponding to target URL link, effectively prevent the information leakage of server.
Preferably, the first key value and the second key value are pseudorandom values.In this programme, server can utilize random function to generate the first key value, client also can utilize random function to generate the second key value, because the random function in computer produces according to certain algorithm simulation, consequently determining, is visible, and the probability that this foreseeable result occurs is 100%, therefore the random value produced with computer random function is random, is pseudorandom values.That is, the first key value in this programme and the second key value are pseudorandom values.
The present invention also provides a kind of recognition system of web crawlers, and its feature is, comprises a client and a server;
The request that this client is used for one presets URL link is sent to this server;
This server is used for generating one first key value according to the request of this default URL link, in the process that this first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption;
This client is used for deciphering script according to the first key value after this encryption and this JS and generates one second key value, and this second key value is sent to this server;
There is first key value identical with this second key value for judging whether in this server, if not, then determines that user corresponding to this client is web crawlers.
Preferably, this server also generates first key value for the request according to this default URL link every a time period, in the process that current first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption.
Preferably, this server is also for when judging there is not first key value identical with this second key value, and all requests this client sent are tackled, or, send a deceptive information to this client.
Preferably, this client is also for being sent to this server by the request of a target URL link;
This server also for when judging to there is first key value identical with this second key value, being searched and the target information corresponding to this target URL link according to the request of this target URL link, and this target information is sent to this client.
Preferably, the first key value and the second key value are pseudorandom values.
On the basis meeting this area general knowledge, above-mentioned each optimum condition, can combination in any, obtains the preferred embodiments of the invention.
Positive progressive effect of the present invention is: compared with prior art, the second key value that the present invention is generated by the first key value of being generated by server and client compares, and the identification of web crawlers is realized according to comparative result, web crawlers can be made just to be identified when access services device first, without the need to carrying out the detection of a large amount of access frequency, save cpu resource, improve recognition efficiency.Meanwhile, server, without the need to carrying out the storage of the first key value for the request of different URL link, has saved the memory space of server greatly.
Accompanying drawing explanation
Fig. 1 is the recognition methods flow chart of the web crawlers of the embodiment of the present invention 1.
Fig. 2 is the recognition methods flow chart of the web crawlers of the embodiment of the present invention 2.
Embodiment
Mode below by embodiment further illustrates the present invention, but does not therefore limit the present invention among described scope of embodiments.
Embodiment 1
The present embodiment provides a kind of recognition methods of web crawlers, as shown in Figure 1, comprises the following steps:
The request of default URL link is sent to server by step 101, client;
Step 102, this server generate one first key value according to the request of this default URL link, in the process that this first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption;
Step 103, this client are deciphered script according to the first key value after this encryption and this JS and are generated one second key value, and the request of this second key value and target URL link is sent to this server;
Step 104, this server judge whether to there is first key value identical with this second key value, if so, then perform step 105, if not, then perform step 106;
Step 105, this server are searched and the target information corresponding to this target URL link according to the request of this target URL link, and this target information are sent to this client, process ends;
Step 106, determine that user corresponding to this client is for web crawlers.
In the present embodiment, the first key value and the second key value are the pseudorandom values utilizing random function to produce.
Give a concrete illustration the recognition methods that web crawlers in the present embodiment is described below.
Server receive customer end A send /domestic/cas/key request after, a key is generated according to solicited message, and key is repeatedly encrypted, dynamically generate one section of JS simultaneously and decipher script to client, code sample is: Response.Write (encode (md5 (DateTime.Now))); In the realization of encode, wherein comprise this decryption method corresponding, for client;
Customer end A is deciphered script according to key and JS after the encryption received and is generated key1, and key1 and/price request is sent to server, code sample is: varevalCode=window.eval simultaneously;
Server judge key1 with/whether key that domestic/cas/key issues identical, code sample is: varcheckResult=(Request [" key "]==md5 (DateTime.Now)), checkResult is testing result.Wherein, key and key1 is the random value produced.
If judge identical, then server searches corresponding price according to/price request, and sends it to customer end A.If judge not identical, then prove that customer end A sends/domestic/cas/key request is forged, and determines that user corresponding to customer end A is for web crawlers.
In above-mentioned example, the key1 generated by the key that generated by server and customer end A is compared, and the identification of web crawlers is realized according to comparative result, web crawlers can be made just to be identified when access services device first, compared with prior art, without the need to carrying out the detection of a large amount of access frequency, saving cpu resource, having improve recognition efficiency.Meanwhile, server, without the need to carrying out the storage of the first key value for the request of different URL link, has saved the memory space of server greatly.
The present embodiment also provides a kind of recognition system of web crawlers, comprises a client and a server.
The request that this client is used for one presets URL link is sent to this server;
This server is used for generating one first key value according to the request of this default URL link, in the process that this first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption;
This client is used for deciphering script according to the first key value after this encryption and this JS and generates one second key value, and the request of this second key value and target URL link is sent to this server;
First key value identical with this second key value is there is in this server for judging whether, if not, then determine that user corresponding to this client is for web crawlers, if, then search and the target information corresponding to this target URL link according to the request of this target URL link, and this target information is sent to this client.
Embodiment 2
The present embodiment provides a kind of recognition methods of web crawlers, be with the difference of the recognition methods of web crawlers in embodiment 1: as shown in Figure 2, the step 102 in embodiment 1 replaced with following step 202, the step 106 in embodiment 1 is replaced with following step 206:
Step 202, this server generated first key value according to the request of this default URL link every 3 minutes, in the process that current first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption;
Step 206, determine that user corresponding to this client is for web crawlers, and all requests this client sent are tackled.
In the present embodiment, in order to avoid causing accidentally injuring normal users due to network delay, server generates multiple first key value, and in step 104, server needs to judge whether there is first key value identical with this second key value in multiple first key value.Such as when execution becomes 3 the first key values to server symbiosis during step 104, comprise key10, key11, key12, key10, key11, key12 and key20 compare by server respectively, if all not identical, then determine that user corresponding to client is web crawlers.
In addition, when determining that user corresponding to client is for after web crawlers, can adopt the mode in step 206 to tackle, the mode sending deceptive information to client can also be adopted to cheat.
The present embodiment also provides a kind of recognition system of web crawlers, on the basis of embodiment 1, server also generates first key value for the request according to this default URL link every a time period, in the process that current first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client; And when judging there is not first key value identical with this second key value, all requests this client sent are tackled, or, send a deceptive information to this client.
Although the foregoing describe the specific embodiment of the present invention, it will be understood by those of skill in the art that these only illustrate, protection scope of the present invention is defined by the appended claims.Those skilled in the art, under the prerequisite not deviating from principle of the present invention and essence, can make various changes or modifications to these execution modes, but these change and amendment all falls into protection scope of the present invention.

Claims (10)

1. a recognition methods for web crawlers, is characterized in that, comprises the following steps:
S 1, client presets the request of URL link by one and is sent to server;
S 2, this server generates one first key value according to the request of this default URL link, in the process that this first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption;
S 3, this client deciphers script according to the first key value after this encryption and this JS and generates one second key value, and this second key value is sent to this server;
S 4, this server judges whether to there is first key value identical with this second key value, if not, then determines that user corresponding to this client is web crawlers.
2. recognition methods as claimed in claim 1, is characterized in that, by step S 2replace with step S 2':
S 2', this server generates first key value according to the request of this default URL link every a time period, in the process that current first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption.
3. recognition methods as claimed in claim 1 or 2, is characterized in that, step S 4also comprise: this server is when judging there is not first key value identical with this second key value, and all requests this client sent are tackled, or, send a deceptive information to this client.
4. recognition methods as claimed in claim 3, is characterized in that,
Step S 3also comprise: the request of a target URL link is sent to this server by this client;
Step S 4also comprise: this server, when judging to there is first key value identical with this second key value, is searched and the target information corresponding to this target URL link according to the request of this target URL link, and this target information is sent to this client.
5. recognition methods as claimed in claim 1, it is characterized in that, the first key value and the second key value are pseudorandom values.
6. a recognition system for web crawlers, is characterized in that, comprises a client and a server;
The request that this client is used for one presets URL link is sent to this server;
This server is used for generating one first key value according to the request of this default URL link, in the process that this first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption;
This client is used for deciphering script according to the first key value after this encryption and this JS and generates one second key value, and this second key value is sent to this server;
There is first key value identical with this second key value for judging whether in this server, if not, then determines that user corresponding to this client is web crawlers.
7. recognition system as claimed in claim 6, it is characterized in that, this server also generates first key value for the request according to this default URL link every a time period, in the process that current first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption.
8. recognition system as claimed in claims 6 or 7, it is characterized in that, this server is also for when judging there is not first key value identical with this second key value, and all requests this client sent are tackled, or, send a deceptive information to this client.
9. recognition system as claimed in claim 8, is characterized in that,
This client is also for being sent to this server by the request of a target URL link;
This server also for when judging to there is first key value identical with this second key value, being searched and the target information corresponding to this target URL link according to the request of this target URL link, and this target information is sent to this client.
10. recognition system as claimed in claim 6, it is characterized in that, the first key value and the second key value are pseudorandom values.
CN201610134556.9A 2016-03-09 2016-03-09 The recognition methods of web crawlers and system Active CN105577701B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610134556.9A CN105577701B (en) 2016-03-09 2016-03-09 The recognition methods of web crawlers and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610134556.9A CN105577701B (en) 2016-03-09 2016-03-09 The recognition methods of web crawlers and system

Publications (2)

Publication Number Publication Date
CN105577701A true CN105577701A (en) 2016-05-11
CN105577701B CN105577701B (en) 2018-11-09

Family

ID=55887356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610134556.9A Active CN105577701B (en) 2016-03-09 2016-03-09 The recognition methods of web crawlers and system

Country Status (1)

Country Link
CN (1) CN105577701B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106534193A (en) * 2016-12-16 2017-03-22 携程计算机技术(上海)有限公司 Request data processing method and request data processing system
CN106960158A (en) * 2017-03-22 2017-07-18 福建中金在线信息科技有限公司 A kind of method and apparatus for preventing blog from being retrieved by web crawlers
CN107426148A (en) * 2017-03-30 2017-12-01 成都优易数据有限公司 A kind of anti-reptile method and system based on running environment feature recognition
CN107800684A (en) * 2017-09-20 2018-03-13 贵州白山云科技有限公司 A kind of low frequency reptile recognition methods and device
CN108429757A (en) * 2018-03-26 2018-08-21 成都睿码科技有限责任公司 A kind of the counter of guarding website resource climbs method
CN108429785A (en) * 2018-01-17 2018-08-21 广东智媒云图科技股份有限公司 A kind of generation method, reptile recognition methods and the device of reptile identification encryption string
CN108769037A (en) * 2018-06-04 2018-11-06 厦门集微科技有限公司 A kind of method, apparatus of data processing, computer storage media and terminal
CN110012023B (en) * 2019-04-15 2020-06-09 重庆天蓬网络有限公司 Poison-throwing type anti-climbing method, system, terminal and medium
CN115037526A (en) * 2022-05-19 2022-09-09 咪咕文化科技有限公司 Anti-crawler method, device, equipment and computer storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090094372A1 (en) * 2007-10-05 2009-04-09 Nyang Daehun Secret user session managing method and system under web environment, recording medium recorded program executing it
CN103279516A (en) * 2013-05-27 2013-09-04 百度在线网络技术(北京)有限公司 Web spider identification method
CN105306473A (en) * 2015-11-05 2016-02-03 北京奇虎科技有限公司 Method, client, server and system for preventing injection attacks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090094372A1 (en) * 2007-10-05 2009-04-09 Nyang Daehun Secret user session managing method and system under web environment, recording medium recorded program executing it
CN103279516A (en) * 2013-05-27 2013-09-04 百度在线网络技术(北京)有限公司 Web spider identification method
CN105306473A (en) * 2015-11-05 2016-02-03 北京奇虎科技有限公司 Method, client, server and system for preventing injection attacks

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106534193A (en) * 2016-12-16 2017-03-22 携程计算机技术(上海)有限公司 Request data processing method and request data processing system
CN106960158A (en) * 2017-03-22 2017-07-18 福建中金在线信息科技有限公司 A kind of method and apparatus for preventing blog from being retrieved by web crawlers
CN107426148A (en) * 2017-03-30 2017-12-01 成都优易数据有限公司 A kind of anti-reptile method and system based on running environment feature recognition
CN107800684A (en) * 2017-09-20 2018-03-13 贵州白山云科技有限公司 A kind of low frequency reptile recognition methods and device
CN108429785A (en) * 2018-01-17 2018-08-21 广东智媒云图科技股份有限公司 A kind of generation method, reptile recognition methods and the device of reptile identification encryption string
CN108429757A (en) * 2018-03-26 2018-08-21 成都睿码科技有限责任公司 A kind of the counter of guarding website resource climbs method
CN108769037A (en) * 2018-06-04 2018-11-06 厦门集微科技有限公司 A kind of method, apparatus of data processing, computer storage media and terminal
CN108769037B (en) * 2018-06-04 2020-11-10 厦门集微科技有限公司 Data processing method and device, computer storage medium and terminal
CN110012023B (en) * 2019-04-15 2020-06-09 重庆天蓬网络有限公司 Poison-throwing type anti-climbing method, system, terminal and medium
CN115037526A (en) * 2022-05-19 2022-09-09 咪咕文化科技有限公司 Anti-crawler method, device, equipment and computer storage medium
CN115037526B (en) * 2022-05-19 2024-04-19 咪咕文化科技有限公司 Anticreeper method, device, equipment and computer storage medium

Also Published As

Publication number Publication date
CN105577701B (en) 2018-11-09

Similar Documents

Publication Publication Date Title
CN105577701A (en) Web crawler recognition method and system
US10341093B2 (en) Method, apparatus and system for device identification
US10943010B2 (en) Generation of a random value for a child process
CN110958249B (en) Information processing method, information processing device, electronic equipment and storage medium
JP2019525350A (en) Authentication method, apparatus and authentication client
CN111597567B (en) Data processing method, data processing device, node equipment and storage medium
CN105447113A (en) Big data based informatiion analysis method
CN105141605A (en) Session method, web server and browser
CN111258602A (en) Information updating method and device
JP2019519849A (en) Method and device for preventing attacks on servers
CN111510442A (en) User verification method and device, electronic equipment and storage medium
CN108282551B (en) Message identification processing method and device, monitoring equipment and readable storage medium
CN108322449B (en) Method, storage medium, equipment and system for preventing video stream from being stolen
CN110191203B (en) Method for realizing dynamic access of server and electronic equipment
CN104468771A (en) Method and device for determining geographical position
CN113497827B (en) Information sharing method and equipment
CN111917787A (en) Request detection method and device, electronic equipment and computer-readable storage medium
CN113098880A (en) Method, system, equipment and readable storage medium for identifying replay attack
CN108055286B (en) Method, client, computer-readable storage medium and computer device for generating user identity information
CN107959691B (en) Method for detecting user identity information, server, computer-readable storage medium and computer equipment
CN108156144B (en) Access authentication method and corresponding device
CN114449514B (en) Key generation method, device, equipment and medium
CN111756771B (en) Detection method and device for cross-site scripting attack
CN106470195B (en) Message signature method and domain name server
CN112104615B (en) IPv6 address-based file credibility judgment processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant