CN105656943A - Application data interception system and method - Google Patents
Application data interception system and method Download PDFInfo
- Publication number
- CN105656943A CN105656943A CN201610147276.1A CN201610147276A CN105656943A CN 105656943 A CN105656943 A CN 105656943A CN 201610147276 A CN201610147276 A CN 201610147276A CN 105656943 A CN105656943 A CN 105656943A
- Authority
- CN
- China
- Prior art keywords
- application data
- data
- application
- service end
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses an application data interception system and method and belongs to the technical field of application program running. The system comprises a client and a server, wherein the client comprises an application unit, an agency unit and a driving unit. The method includes the steps that S1, the application unit arranged in the client is adopted, and application data relevant to an application program in the client is output; S2, the agency unit arranged in the client is adopted, and a data intercepting rule preset in the server is acquired; S3, the driving unit arranged in the client is adopted, interception is performed on the application data output by the application unit according to the data intercepting rule, and the intercepted application data is sent to the agency unit; S4, the intercepted application is forwarded to the server by the agency unit. The technical scheme has the advantages that a destination address does not change when the application data is redirected, and it is avoided that normal running of the whole system is affected when interception of the application program is executed.
Description
Technical field
The present invention relates to application program running technology field, relate in particular to a kind of application data intercepting system andMethod.
Background technology
The current client that realizes application data interception at windows platform, in order to support that transport layer shouldWith, conventionally adopt the mode of LSP or TDI to tackle data, but the problem of this interception modeBe:
1) when the interception of existing application data for system-wide, once go out in the process of application data interceptionShow mistake, easily had influence on whole system, caused system crash;
2) for application program, intercept process is difficult to accomplish transparent, for example common after data interceptionConnection can be forwarded to the agent of the machine, the destination address that now application program is seen is not just original sending outGive the address of service end, and may be a such as 127.0.0.1 of unified destination address, this be for someThe application program that sends the machine or peer IP address port in packet just cannot be supported its applicationData interception operation;
3) existing Interception Technology is more outmoded, Windows system (for example Vista of for example more recent versionWindows system more than version) just do not support TDI technology.
Summary of the invention
According to the above-mentioned problems in the prior art, now provide a kind of application data intercepting system and methodTechnical scheme, be intended to accomplish application data be redirected time destination address constant, avoid carry out application journeyWhen order interception, affect the problem of the normal operation of whole system.
Technique scheme specifically comprises:
A kind of application data intercepting system, wherein, comprises client and service end, described client and instituteState the long-range connection of service end;
Described client comprises:
Applying unit, corresponding to the application program setting in a described client, is associated with for outputThe application data of described application program;
Agent unit, connects described applying unit, and described agent unit is for obtain from described service end in advanceThe data interception rule first arranging;
Driver element, connects respectively described applying unit and described agent unit, and described driver element obtainsDescribed data interception rule, and should to the described of described applying unit output according to described data interception ruleTackle by data, described driver element filters platform based on Windows system and is set up;
The described application data of intercepting is sent to described agent unit by described driver element, and described in warpAgent unit is forwarded to described service end.
Preferably, this application data intercepting system, wherein, described driver element is ALE driver element.
Preferably, this application data intercepting system, wherein, described application data comprises:
Formulate the connection of the process of described application program; And/or
Preserve the memory address of the data that described application program is relevant.
Preferably, this application data intercepting system, wherein, described agent unit obtain intercept described inAfter application data, described application data is packed and be transmitted to described service end.
Preferably, this application data intercepting system, wherein, described service end is based on SSLThe server of VPN.
A kind of application data hold-up interception method, wherein, comprises client and service end, described client and instituteState the long-range connection of service end, also comprise:
Step S1, adopts an applying unit being arranged in described client, and output is associated with described clientHold the application data of an interior application program;
Step S2, adopts an agent unit being arranged in described client, obtains described service end defaultData interception rule;
Step S3, adopts a driver element being arranged in described client, according to described data interception ruleThe described application data of described applying unit output is tackled the described application data quilt of interceptingBe sent to described agent unit;
Step S4, the described application data of intercepting is forwarded to described service end by described agent unit;
Described driver element filters platform based on Windows system and is set up.
Preferably, this application data hold-up interception method, wherein, described driver element is ALE driver element.
Preferably, this application data hold-up interception method, wherein, described application data comprises:
Formulate the connection of the process of described application program; And/or
Preserve the memory address of the data that described application program is relevant.
Preferably, this application data hold-up interception method, wherein, and in described step S4, described agent unitObtain after the described application data of intercepting, described application data is packed and be transmitted to described service end.
Preferably, this application data hold-up interception method, wherein, described service end is based on SSLThe server of VPN.
The beneficial effect of technique scheme is:
1) provide a kind of application data intercepting system, can accomplish application data be redirected time destination address notBecome, avoid affecting the problem of the normal operation of whole system in the time that executive utility is tackled;
2) provide a kind of application data hold-up interception method, can support the normal work of above-mentioned application data intercepting systemDo.
Brief description of the drawings
Fig. 1 is in preferred embodiment of the present invention, a kind of structural representation of application data intercepting system;
Fig. 2 is in preferred embodiment of the present invention, a kind of schematic flow sheet of application data hold-up interception method.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried outDescribe clearly and completely, obviously, described embodiment is only the present invention's part embodiment, andNot whole embodiment. Based on the embodiment in the present invention, those of ordinary skill in the art are not doingGo out the every other embodiment obtaining under the prerequisite of creative work, all belong to the scope of protection of the invention.
It should be noted that, in the situation that not conflicting, the spy in embodiment and embodiment in the present inventionLevy and can mutually combine.
Below in conjunction with the drawings and specific embodiments, the invention will be further described, but not as of the present inventionLimit.
In preferred embodiment of the present invention, based on the above-mentioned problems in the prior art, now provide onePlant application data intercepting system, the concrete structure of this system as shown in Figure 1, comprises customer end A and serviceEnd B, customer end A is connected with service end B is long-range. Further, customer end A comprises:
Applying unit 1, corresponding to the application program setting in a customer end A, is associated with for outputThe application data of application program;
Agent unit 2, connects applying unit 1, and agent unit 2 sets in advance for obtaining from service endData interception rule;
Driver element 3, connects respectively applying unit 1 and agent unit 2, and driver element 3 obtains data and blocksCut rule, and according to data interception rule, the application data of applying unit output is tackled, drive singleUnit 3 filters platform based on Windows system and is set up;
The application data of intercepting is sent to agent unit 2 by driver element 3, and turn through agent unit 2Send to service end B.
In a specific embodiment, can be for applying unit 1 of an application setting, alsoCan be for different application settings same applying unit 1. The effect of this applying unit 1 isBe responsible for a series of application datas that produce in output application program running.
In this embodiment, applying unit 1 is exported after application data, and this application data drived unit 3 blocksCut. Driver element 3 tackles that the rule of application data foundation obtains from service end B from agent unit 2Preset rules. In other words, set in advance the data interception rule of application data at service end B, to blockCut service end and want the application data of obtaining. The agent unit 2 an of the machine is set subsequently in client,This agent unit 2 is above-mentioned in the predefined data interception rule of service end B for obtaining, and by thisA little rules are issued in driver element 3.
With rear drive unit 3 according to these data interception rules, the application data that applying unit 1 is exportedTackle, agent unit 2 obtains these application datas of intercepting, and is forwarded to service end,Thereby complete the interception operation of transport layer application data.
In this embodiment, 2 moment of agent unit are monitored driver element 3, and obtain in time its outputThrough the application data of interception.
In preferred embodiment of the present invention, above-mentioned driver element 3 is based on WFP (WindowsFilteringPlatform, WFP) arrange, further, above-mentioned driver element 3 is ALE drivingUnit.
In preferred embodiment of the present invention, above-mentioned data interception rule specifically can comprise that service end B is uncommonHope customer end A tackle the rule of which data, for example, may open three in customer end A simultaneously browseDevice (browser A, browser B and browser C), and service end B only wish client send browseThe relevant browsing data of device A, now service end B only can be preset as data interception rule and tackle and browseThe relevant browsing data that device A sends.
In preferred embodiment of the present invention, above-mentioned driver element 3 can be preformed in clientBsp driver, correspondingly, above-mentioned agent unit 2 can be the machine generation generating in advance in clientReason.
In preferred embodiment of the present invention, above-mentioned application data can comprise:
Formulate the connection of the process of application program; And/or
Preserve the memory address of the data that application program is relevant.
In preferred embodiment of the present invention, above-mentioned agent unit 3 by monitoring get through interceptionAfter application data, these application data packings are sent to above-mentioned service end B.
In preferred embodiment of the present invention, above-mentioned service end B is the virtual private based on SSLThe server of network, particularly, this service end B is SSLVPN.
In sum, in technical solution of the present invention, in client, the machine agency is set, this agency usesIn obtain default data interception rule from service end, and this rule is handed down to bottom writes in advanceALE drives. Driving can, according to above-mentioned data interception rule, produce in application programs runningApplication data is tackled, and the machine agents listen is carried out the connection of self-driven forwarding and obtained above-mentioned interceptingApplication data, is forwarded to service end by these application datas subsequently, thereby completes a complete application numberAccording to intercept process.
In preferred embodiment of the present invention, based on above described application data intercepting system, now carryFor a kind of application data hold-up interception method, in the method, comprise equally client and service end, its step is as figureShown in 2, comprising:
Step S1, adopts an applying unit being arranged in client, and output is associated with interior one of clientThe application data of application program;
Step S2, adopts an agent unit being arranged in client, obtains the default data of service end and blocksCut rule;
Step S3, adopt a driver element being arranged in client, according to data interception rule to applicationThe application data of unit output is tackled, and the application data of intercepting is sent to agent unit;
Step S4, the application data of intercepting is forwarded to service end by agent unit;
Above-mentioned driver element filters platform based on Windows system and is set up.
In preferred embodiment of the present invention, as noted before, above-mentioned driver element is that ALE drives listUnit.
In preferred embodiment of the present invention, as noted before, above-mentioned application data comprises:
Formulate the connection of the process of application program; And/or
Preserve the memory address of the data that application program is relevant.
In preferred embodiment of the present invention, in above-mentioned steps S4, agent unit obtains answering of interceptingWith after data, application data is packed and be transmitted to service end.
In preferred embodiment of the present invention, as noted before, above-mentioned service end is SSLVPN.
The foregoing is only preferred embodiment of the present invention, not thereby limit embodiments of the present invention andProtection domain, to those skilled in the art, should recognize all utilizations description of the present inventionAnd being equal to of having done of diagramatic content replace and the scheme that obtains of apparent variation, all should compriseIn protection scope of the present invention.
Claims (10)
1. an application data intercepting system, is characterized in that, comprises client and service end, described visitorFamily end is connected with described service end is long-range;
Described client comprises:
Applying unit, corresponding to the application program setting in a described client, is associated with for outputThe application data of described application program;
Agent unit, connects described applying unit, and described agent unit is for obtain from described service end in advanceThe data interception rule first arranging;
Driver element, connects respectively described applying unit and described agent unit, and described driver element obtainsDescribed data interception rule, and should to the described of described applying unit output according to described data interception ruleTackle by data, described driver element filters platform based on Windows system and is set up;
The described application data of intercepting is sent to described agent unit by described driver element, and described in warpAgent unit is forwarded to described service end.
2. application data intercepting system as claimed in claim 1, is characterized in that, described driver elementFor ALE driver element.
3. application data intercepting system as claimed in claim 1, is characterized in that, described application dataComprise:
Formulate the connection of the process of described application program; And/or
Preserve the memory address of the data that described application program is relevant.
4. application data intercepting system as claimed in claim 1, is characterized in that, described agent unitObtain after the described application data of intercepting, described application data is packed and be transmitted to described service end.
5. application data intercepting system as claimed in claim 1, is characterized in that, described service end isThe server of the VPN based on SSL.
6. an application data hold-up interception method, is characterized in that, comprises client and service end, described visitorFamily end is connected with described service end is long-range, also comprises:
Step S1, adopts an applying unit being arranged in described client, and output is associated with described clientHold the application data of an interior application program;
Step S2, adopts an agent unit being arranged in described client, obtains described service end defaultData interception rule;
Step S3, adopts a driver element being arranged in described client, according to described data interception ruleThe described application data of described applying unit output is tackled the described application data quilt of interceptingBe sent to described agent unit;
Step S4, the described application data of intercepting is forwarded to described service end by described agent unit;
Described driver element filters platform based on Windows system and is set up.
7. application data hold-up interception method as claimed in claim 6, is characterized in that, described driver elementFor ALE driver element.
8. application data hold-up interception method as claimed in claim 6, is characterized in that, described application dataComprise:
Formulate the connection of the process of described application program; And/or
Preserve the memory address of the data that described application program is relevant.
9. application data hold-up interception method as claimed in claim 6, is characterized in that, described step S4In, described agent unit obtains after the described application data of intercepting, and described application data is packed and turnedIssue described service end.
10. application data hold-up interception method as claimed in claim 6, is characterized in that, described service endFor the server of the VPN based on SSL.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610147276.1A CN105656943B (en) | 2016-03-15 | 2016-03-15 | A kind of application data interception system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610147276.1A CN105656943B (en) | 2016-03-15 | 2016-03-15 | A kind of application data interception system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105656943A true CN105656943A (en) | 2016-06-08 |
CN105656943B CN105656943B (en) | 2019-07-05 |
Family
ID=56493750
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610147276.1A Active CN105656943B (en) | 2016-03-15 | 2016-03-15 | A kind of application data interception system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105656943B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453309A (en) * | 2016-10-11 | 2017-02-22 | 北京天融信网络安全技术有限公司 | Safety audit method and PC (Personal Computer) terminal |
CN106713355A (en) * | 2017-01-23 | 2017-05-24 | 绿网天下(福建)网络科技股份有限公司 | PC-based network filtering method and client PC |
CN106936846A (en) * | 2017-04-10 | 2017-07-07 | 北京明朝万达科技股份有限公司 | A kind of method for network access control and device based on WFP platforms |
CN108566358A (en) * | 2017-12-22 | 2018-09-21 | 广州赛意信息科技股份有限公司 | A kind of iOS system network traffic interception method and system under the mobile phone based on iPhone |
CN109088844A (en) * | 2017-06-13 | 2018-12-25 | 腾讯科技(深圳)有限公司 | Information intercepting method, terminal, server and system |
CN109587269A (en) * | 2018-12-27 | 2019-04-05 | 迅雷计算机(深圳)有限公司 | A kind of hold-up interception method, unit, system and the storage medium of downloading behavior |
CN110120895A (en) * | 2019-04-11 | 2019-08-13 | 北京字节跳动网络技术有限公司 | Test method, apparatus, medium and the electronic equipment of mobile terminal communication |
CN112491927A (en) * | 2020-12-15 | 2021-03-12 | 厦门市美亚柏科信息股份有限公司 | Method and system for bypassing network port shielding |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090279547A1 (en) * | 2008-05-08 | 2009-11-12 | Nortel Networks Limited | Network-aware adapter for applications |
CN101636998A (en) * | 2006-08-03 | 2010-01-27 | 思杰系统有限公司 | Systems and methods for application based interception ssi/vpn traffic |
CN102195972A (en) * | 2011-03-24 | 2011-09-21 | 北京思创银联科技股份有限公司 | Method for intercepting network data by using WFP (Windows Filter Platform) |
CN103840994A (en) * | 2012-11-23 | 2014-06-04 | 华耀(中国)科技有限公司 | System and method for user side to access intranet through VPN |
CN104683295A (en) * | 2013-11-27 | 2015-06-03 | 中兴通讯股份有限公司 | Data packet filtering rule configuration method, device and system |
CN105337831A (en) * | 2014-08-08 | 2016-02-17 | 华为技术有限公司 | Virtual private network implementation method and client device |
-
2016
- 2016-03-15 CN CN201610147276.1A patent/CN105656943B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101636998A (en) * | 2006-08-03 | 2010-01-27 | 思杰系统有限公司 | Systems and methods for application based interception ssi/vpn traffic |
US20090279547A1 (en) * | 2008-05-08 | 2009-11-12 | Nortel Networks Limited | Network-aware adapter for applications |
CN102195972A (en) * | 2011-03-24 | 2011-09-21 | 北京思创银联科技股份有限公司 | Method for intercepting network data by using WFP (Windows Filter Platform) |
CN103840994A (en) * | 2012-11-23 | 2014-06-04 | 华耀(中国)科技有限公司 | System and method for user side to access intranet through VPN |
CN104683295A (en) * | 2013-11-27 | 2015-06-03 | 中兴通讯股份有限公司 | Data packet filtering rule configuration method, device and system |
CN105337831A (en) * | 2014-08-08 | 2016-02-17 | 华为技术有限公司 | Virtual private network implementation method and client device |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453309A (en) * | 2016-10-11 | 2017-02-22 | 北京天融信网络安全技术有限公司 | Safety audit method and PC (Personal Computer) terminal |
CN106453309B (en) * | 2016-10-11 | 2020-04-17 | 北京天融信网络安全技术有限公司 | Security audit method and PC terminal |
CN106713355A (en) * | 2017-01-23 | 2017-05-24 | 绿网天下(福建)网络科技股份有限公司 | PC-based network filtering method and client PC |
CN106713355B (en) * | 2017-01-23 | 2020-02-21 | 绿网天下(福建)网络科技股份有限公司 | Network filtering method based on PC (personal computer) terminal and client PC |
CN106936846A (en) * | 2017-04-10 | 2017-07-07 | 北京明朝万达科技股份有限公司 | A kind of method for network access control and device based on WFP platforms |
CN109088844B (en) * | 2017-06-13 | 2021-03-19 | 腾讯科技(深圳)有限公司 | Information interception method, terminal, server and system |
CN109088844A (en) * | 2017-06-13 | 2018-12-25 | 腾讯科技(深圳)有限公司 | Information intercepting method, terminal, server and system |
CN108566358A (en) * | 2017-12-22 | 2018-09-21 | 广州赛意信息科技股份有限公司 | A kind of iOS system network traffic interception method and system under the mobile phone based on iPhone |
CN108566358B (en) * | 2017-12-22 | 2021-03-26 | 广州赛意信息科技股份有限公司 | iOS system network communication interception method and system based on iPhone mobile phone |
CN109587269A (en) * | 2018-12-27 | 2019-04-05 | 迅雷计算机(深圳)有限公司 | A kind of hold-up interception method, unit, system and the storage medium of downloading behavior |
CN110120895A (en) * | 2019-04-11 | 2019-08-13 | 北京字节跳动网络技术有限公司 | Test method, apparatus, medium and the electronic equipment of mobile terminal communication |
CN110120895B (en) * | 2019-04-11 | 2023-01-17 | 北京字节跳动网络技术有限公司 | Method, device, medium and electronic equipment for testing communication of mobile terminal |
CN112491927A (en) * | 2020-12-15 | 2021-03-12 | 厦门市美亚柏科信息股份有限公司 | Method and system for bypassing network port shielding |
Also Published As
Publication number | Publication date |
---|---|
CN105656943B (en) | 2019-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105656943A (en) | Application data interception system and method | |
US20200213342A1 (en) | Rule-Based Network-Threat Detection | |
US11729059B2 (en) | Dynamic service device integration | |
US10432426B2 (en) | Port mirroring in a virtualized computing environment | |
CN108111619B (en) | Data distribution method and device, computer equipment and storage medium | |
RU2646343C1 (en) | Objects of virtual network interface | |
US9104460B2 (en) | Inter-cloud live migration of virtualization systems | |
US20070162595A1 (en) | System and method for tracking network resources | |
US9525648B2 (en) | Method for acquiring physical address of virtual machine | |
US10893006B2 (en) | System and method for implementing virtual platform media access control (MAC) address-based layer 3 network switching | |
CA2746341A1 (en) | Secure remote access public communication environment | |
DE112011103289T5 (en) | Merging Mobile Broadband Network Interfaces | |
EP3588859B1 (en) | Network device configuration versioning | |
CN103905510A (en) | Processing method and background server for data package | |
CN107995321A (en) | A kind of VPN client acts on behalf of the method and device of DNS | |
CN105939267A (en) | Out-of-band management method and device | |
CN116915852B (en) | Transparent proxy method and system for linux application program | |
US9621632B2 (en) | Scaling of stateful enterprise services | |
CN103685536A (en) | Monopolized type virtual desktop management method | |
EP3474497B1 (en) | Aggregating virtual local area networks | |
CN103312594B (en) | A kind of method and device entering Chatroom | |
US8260932B2 (en) | Using broadcast domains to manage virtual local area networks | |
WO2020264323A1 (en) | Provider network connectivity management for provider network substrate extensions | |
CN106789873B (en) | Inspection method for level protection safety boundary | |
US7941741B1 (en) | Dynamically manipulating content to force web browsers to open more connections |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |