CN105930264A - Computer software performance test method - Google Patents

Computer software performance test method Download PDF

Info

Publication number
CN105930264A
CN105930264A CN201610217690.5A CN201610217690A CN105930264A CN 105930264 A CN105930264 A CN 105930264A CN 201610217690 A CN201610217690 A CN 201610217690A CN 105930264 A CN105930264 A CN 105930264A
Authority
CN
China
Prior art keywords
computer software
data
module
application operating
performance test
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610217690.5A
Other languages
Chinese (zh)
Inventor
王芳
乔木
汪伟
徐鲁辉
陈道贺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Sheng Da Economic Trade Management Institute
Henan Institute of Engineering
Original Assignee
Zhengzhou Sheng Da Economic Trade Management Institute
Henan Institute of Engineering
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Sheng Da Economic Trade Management Institute, Henan Institute of Engineering filed Critical Zhengzhou Sheng Da Economic Trade Management Institute
Priority to CN201610217690.5A priority Critical patent/CN105930264A/en
Publication of CN105930264A publication Critical patent/CN105930264A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3612Software analysis for verifying properties of programs by runtime analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3692Test management for test results analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3696Methods or tools to render software testable

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a computer software performance test method. The computer software performance test method includes the following steps: completing bidirectional data exchange between a computer software system and the Ethernet, and encrypting the exchanged data through an encrypting module; detecting immune characteristic fingerprints of communication data packages for data exchange, completing configurations of parameters of the computer software system to be tested and monitoring manner parameters, and deployment of a detection resource acquisition module; performing an application operation on the computer software system to be tested, recording operation information of the application operation through a script recording manner, monitoring the state of the current application operation in real time, acquiring resource data of monitoring information in real time through the resource acquisition module, sending the acquired resource data to a detection center module, and determining the performance of software to be tested according to saved application operation processes with faults. The method improves the safety of detection, is high in detection efficiency, and can improve the accuracy of a resource monitoring result.

Description

A kind of computer software performance test methods
Technical field
The present invention relates to field of computer technology, be specifically related to a kind of computer software performance test methods.
Background technology
Along with the development of intelligent terminal, the amount of software of intelligent terminal and kind rapid development.And soft While number of packages amount increases and function is gradually improved, its committed memory is also constantly increasing, and this just brings sound The problem such as elongated, power consumption increasing between Ying Shi.And software performance is the weight that intelligent terminal effectively realizes its function Wanting index, be also to affect the key factor that equipment normally uses, therefore the performance evaluating for software is the heaviest Want.
In terms of intelligent terminal software performance test, detect intelligent terminal generally by recording test script Software, but during actually detected, owing to test script needs tester's hand-coding to record, institute Low with testing efficiency, the most existing method for testing software does not the most carry out risk assessment, whole detection to software Process is also to expose, and is easily subject to attack, and causes the damage of detecting system, the inspection used during detection Survey resource information pattern and mostly can take the resource of performance test server, thus reduce the essence of monitoring resource Really property.
Summary of the invention
For solving the problems referred to above, the invention provides a kind of computer software performance test methods, to detection number According to having carried out encryption and immune detection, improve the safety of detection, detection efficiency is high, simultaneously by providing Source information acquisition module is deployed on monitoring object with the form of static jar bag such that it is able to achieve property Zero consumption of energy testing service device resource, improves the accuracy of monitoring resource result.
For achieving the above object, the technical scheme that the present invention takes is:
A kind of computer software performance test methods, comprises the steps:
S1, it is connected with computer software to be measured by cable, is concurrently accessed Ethernet, completes computer Software system and the bidirectional data exchange of Ethernet, and by encrypting module, the data exchanged are added Close;
S2, carry out the detection of the immune characteristic fingerprint of the communication data packet of data exchange, detected is exempted from Epidemic disease characteristic fingerprint and the characteristic fingerprint comparison in immune characteristic storehouse, and carry out computer to be measured according to comparison result The security evaluation of software system, if assessment result is safety, has then carried out the performance test of the data of encryption, If assessment result is dangerous, then extract the fingerprint characteristic of this computer software to be measured, enrich immunity special Levy storehouse;
S3, complete computer software parameter to be measured and the configuration of monitoring mode parameter, and resource will be detected Acquisition module is deployed on computer software to be measured with the form of static jar bag, after completing to dispose, right Described computer software to be measured carries out application operating;
S4, mode of being recorded by script record the operation information of described application operating, monitor current application in real time Mode of operation, and by the resource data of collection of resources module Real-time Collection monitoring information, will be gathered simultaneously To resource data be sent to inspection center's module, when described computer software to be measured is grasped in described application When breaking down during work, utilize the application operating process broken down described in script playback, and in test The application operating process broken down described in the playback of described script is preserved, then according to described preservation on main frame Described in the application operating process that breaks down determine the performance of tested software;
S5, complete detection after, by one key reduction by computer recover to data exchange before state.
Wherein, the data that described detection collection of resources module is gathered include the Installed System Memory of free time, and CPU uses Family utilization rate, cpu system utilization rate, CPU wait rate, disk read rate, disk write speed, network number According to receiving velocity, network data transmission rate, and described monitoring information is assembled into the form that JSON goes here and there, logical Crossing SSH connection and return to inspection center's module, inspection center's module resolves JSON string, prison parsing obtained Measurement information updates on the curve chart of front end JSP.
Wherein, described detection resource is adopted by described inspection center module for monitoring mode parameter based on configuration Collection module calls and controlling of sampling, and exports the monitoring letter that described detection collection of resources module obtains Breath.
Wherein, described encrypting module is encrypted by following steps:
The parameter that S11, initialization run in developing, utilizes self feed back mapping function to carry out population in developing Initializing, stochastic generation contains the initial population that some is individual;
S12, calculate in current population for checking the frequency adaptive value of each individual frequency and each for checking The sequence adaptive value of individual sequence;
S13, contrast the adaptive value of each individuality and its place other individualities of population, calculate in current population The order of each individuality;
S14, according to rank value, the individuality in population is carried out descending after, carry out stochastic sampling, and divided by The system number of key, it is thus achieved that quotient and remainder;
S15, using calculating the quotient obtained as current be-encrypted data, and continue executing with step S1, until Calculating the quotient obtained is zero;
Extraction operational rule in S16, use key selects a specific plaintext section;
S17, using calculate acquisition every time remainder arrangement and specific plaintext section as encrypted sequence of data.
Wherein, the described application operating process broken down according to described preservation determines tested software The step of performance include:
During obtaining described application operating, the storehouse of described tested software internal memory, thread and internal memory overflow Parameter;
Acquired storehouse, thread and internal memory are overflowed parameter and the application operating broken down of described preservation Process contrasts with the standard set respectively, is then analyzed the result of described contrast, according to described The result analyzed obtains the performance of tested software.
Wherein, the described step that described tested software carries out application operating includes:
Described test main frame and described intelligent terminal is synchronized by data syn-chronization fastening means;
Test main frame carries out application operating to the described tested software of described intelligent terminal.
The method have the advantages that
Detection data are carried out encryption and immune detection, improves the safety of detection;By starting script Record the application operating to tested software, simplify testing procedure;And when described tested software is because of described When application operating breaks down, utilize the application operating process that breaks down described in script playback can be more preferable Test tested software is for the highest problem of the performance of which application operating, thus improves detection effect Rate;Simultaneously by resource information acquisition module is deployed on monitoring object with the form of static jar bag, from And it has been capable of zero consumption to performance test server resource, improve the accurate of monitoring resource result Property.
Detailed description of the invention
In order to make objects and advantages of the present invention clearer, below in conjunction with embodiment, the present invention is carried out Further describe.Should be appreciated that specific embodiment described herein only in order to explain the present invention, It is not intended to limit the present invention.
Embodiments provide a kind of computer software performance test methods, comprise the steps:
S1, it is connected with computer software to be measured by cable, is concurrently accessed Ethernet, completes computer Software system and the bidirectional data exchange of Ethernet, and by encrypting module, the data exchanged are added Close;
S2, carry out the detection of the immune characteristic fingerprint of the communication data packet of data exchange, detected is exempted from Epidemic disease characteristic fingerprint and the characteristic fingerprint comparison in immune characteristic storehouse, and carry out computer to be measured according to comparison result The security evaluation of software system, if assessment result is safety, has then carried out the performance test of the data of encryption, If assessment result is dangerous, then extract the fingerprint characteristic of this computer software to be measured, enrich immunity special Levy storehouse;
S3, complete computer software parameter to be measured and the configuration of monitoring mode parameter, and resource will be detected Acquisition module is deployed on computer software to be measured with the form of static jar bag, after completing to dispose, right Described computer software to be measured carries out application operating;
S4, mode of being recorded by script record the operation information of described application operating, monitor current application in real time Mode of operation, and by the resource data of collection of resources module Real-time Collection monitoring information, will be gathered simultaneously To resource data be sent to inspection center's module, when described computer software to be measured is grasped in described application When breaking down during work, utilize the application operating process broken down described in script playback, and in test The application operating process broken down described in the playback of described script is preserved, then according to described preservation on main frame Described in the application operating process that breaks down determine the performance of tested software;
S5, complete detection after, by one key reduction by computer recover to data exchange before state.
The data that described detection collection of resources module is gathered include the Installed System Memory of free time, and CPU user uses Rate, cpu system utilization rate, CPU wait rate, disk read rate, disk write speed, network data receives Speed, network data transmission rate, and described monitoring information is assembled into the form of JSON string, pass through SSH Connecting and return to inspection center's module, inspection center's module resolves JSON string, monitoring parsing obtained letter Breath updates on the curve chart of front end JSP.
Described inspection center module is used for monitoring mode parameter based on configuration to described detection collection of resources mould Block calls and controlling of sampling, and exports the monitoring information that described detection collection of resources module obtains.
Described encrypting module is encrypted by following steps:
The parameter that S11, initialization run in developing, utilizes self feed back mapping function to carry out population in developing Initializing, stochastic generation contains the initial population that some is individual;
S12, calculate in current population for checking the frequency adaptive value of each individual frequency and each for checking The sequence adaptive value of individual sequence;
S13, contrast the adaptive value of each individuality and its place other individualities of population, calculate in current population The order of each individuality;
S14, according to rank value, the individuality in population is carried out descending after, carry out stochastic sampling, and divided by The system number of key, it is thus achieved that quotient and remainder;
S15, using calculating the quotient obtained as current be-encrypted data, and continue executing with step S1, until Calculating the quotient obtained is zero;
Extraction operational rule in S16, use key selects a specific plaintext section;
S17, using calculate acquisition every time remainder arrangement and specific plaintext section as encrypted sequence of data.
The described application operating process broken down according to described preservation determines the performance of tested software Step include:
During obtaining described application operating, the storehouse of described tested software internal memory, thread and internal memory overflow Parameter;
Acquired storehouse, thread and internal memory are overflowed parameter and the application operating broken down of described preservation Process contrasts with the standard set respectively, is then analyzed the result of described contrast, according to described The result analyzed obtains the performance of tested software.
The described step that described tested software carries out application operating includes:
Described test main frame and described intelligent terminal is synchronized by data syn-chronization fastening means;
Test main frame carries out application operating to the described tested software of described intelligent terminal.
Wherein, inspection center's module according to target capabilities testing service device IP, login account, login password, Set up SSH with monitoring object to be connected;
Inspection center's module, by the way of remotely performing the shell script in described private directory, is called The static jar bag of resource information acquisition module.
The cycle called and number of times determine according to user configured sampling interval duration and total sample number respectively.
The above is only the preferred embodiment of the present invention, it is noted that common for the art For technical staff, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications, These improvements and modifications also should be regarded as protection scope of the present invention.

Claims (6)

1. a computer software performance test methods, it is characterised in that comprise the steps:
S1, it is connected with computer software to be measured by cable, is concurrently accessed Ethernet, completes computer Software system and the bidirectional data exchange of Ethernet, and by encrypting module, the data exchanged are added Close;
S2, carry out the detection of the immune characteristic fingerprint of the communication data packet of data exchange, detected is exempted from Epidemic disease characteristic fingerprint and the characteristic fingerprint comparison in immune characteristic storehouse, and carry out computer to be measured according to comparison result The security evaluation of software system, if assessment result is safety, has then carried out the performance test of the data of encryption, If assessment result is dangerous, then extract the fingerprint characteristic of this computer software to be measured, enrich immunity special Levy storehouse;
S3, complete computer software parameter to be measured and the configuration of monitoring mode parameter, and resource will be detected Acquisition module is deployed on computer software to be measured with the form of static jar bag, after completing to dispose, right Described computer software to be measured carries out application operating;
S4, mode of being recorded by script record the operation information of described application operating, monitor current application in real time Mode of operation, and by the resource data of collection of resources module Real-time Collection monitoring information, will be gathered simultaneously To resource data be sent to inspection center's module, when described computer software to be measured is grasped in described application When breaking down during work, utilize the application operating process broken down described in script playback, and in test The application operating process broken down described in the playback of described script is preserved, then according to described preservation on main frame Described in the application operating process that breaks down determine the performance of tested software;
S5, complete detection after, by one key reduction by computer recover to data exchange before state.
A kind of computer software performance test methods the most according to claim 1, it is characterised in that institute State the detection data that gathered of collection of resources module and include the Installed System Memory of free time, CPU subscriber usage, CPU System utilization rate, CPU wait rate, disk read rate, disk write speed, network data receiving velocity, net Network data transmission rate, and described monitoring information is assembled into the form of JSON string, connected by SSH and return To inspection center's module, inspection center's module resolves JSON string, and monitoring information parsing obtained updates On the curve chart of front end JSP.
A kind of computer software performance test methods the most according to claim 1, it is characterised in that institute State inspection center's module for monitoring mode parameter based on configuration, described detection collection of resources module to be carried out Call and controlling of sampling, and export the monitoring information that described detection collection of resources module obtains.
A kind of computer software performance test methods the most according to claim 1, it is characterised in that institute State encrypting module to be encrypted by following steps:
The parameter that S11, initialization run in developing, utilizes self feed back mapping function to carry out population in developing Initializing, stochastic generation contains the initial population that some is individual;
S12, calculate in current population for checking the frequency adaptive value of each individual frequency and each for checking The sequence adaptive value of individual sequence;
S13, contrast the adaptive value of each individuality and its place other individualities of population, calculate in current population The order of each individuality;
S14, according to rank value, the individuality in population is carried out descending after, carry out stochastic sampling, and divided by The system number of key, it is thus achieved that quotient and remainder;
S15, using calculating the quotient obtained as current be-encrypted data, and continue executing with step S1, until Calculating the quotient obtained is zero;
Extraction operational rule in S16, use key selects a specific plaintext section;
S17, using calculate acquisition every time remainder arrangement and specific plaintext section as encrypted sequence of data.
A kind of computer software performance test methods the most according to claim 1, it is characterised in that institute State the step that the application operating process broken down according to described preservation determines the performance of tested software Suddenly include:
During obtaining described application operating, the storehouse of described tested software internal memory, thread and internal memory overflow Parameter;
Acquired storehouse, thread and internal memory are overflowed parameter and the application operating broken down of described preservation Process contrasts with the standard set respectively, is then analyzed the result of described contrast, according to described The result analyzed obtains the performance of tested software.
A kind of computer software performance test methods the most according to claim 1, it is characterised in that institute State and described tested software is carried out the step of application operating include:
Described test main frame and described intelligent terminal is synchronized by data syn-chronization fastening means;
Test main frame carries out application operating to the described tested software of described intelligent terminal.
CN201610217690.5A 2016-04-03 2016-04-03 Computer software performance test method Pending CN105930264A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610217690.5A CN105930264A (en) 2016-04-03 2016-04-03 Computer software performance test method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610217690.5A CN105930264A (en) 2016-04-03 2016-04-03 Computer software performance test method

Publications (1)

Publication Number Publication Date
CN105930264A true CN105930264A (en) 2016-09-07

Family

ID=56840358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610217690.5A Pending CN105930264A (en) 2016-04-03 2016-04-03 Computer software performance test method

Country Status (1)

Country Link
CN (1) CN105930264A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107423210A (en) * 2017-03-08 2017-12-01 北京数码大方科技股份有限公司 Software performance testing method and device
CN107491696A (en) * 2017-08-21 2017-12-19 中国人民解放军国防科技大学 Software security analysis method and system based on immune model
CN107733738A (en) * 2017-10-02 2018-02-23 衢州职业技术学院 A kind of computer network cloud management system
CN107832226A (en) * 2017-11-23 2018-03-23 中国平安人寿保险股份有限公司 Report-generating method, device, equipment and computer media based on performance test
CN108011890A (en) * 2017-12-20 2018-05-08 东北电力大学 A kind of information safety of mobile electronic equipment protects system
CN108121643A (en) * 2016-11-28 2018-06-05 谷歌有限责任公司 Window bias analyzer
CN108304721A (en) * 2018-03-21 2018-07-20 河北师范大学 A kind of malicious code detection system
CN108881327A (en) * 2018-09-29 2018-11-23 德州职业技术学院(德州市技师学院) A kind of computer internet information safety control system based on cloud computing
CN111324547A (en) * 2020-03-26 2020-06-23 陕西工业职业技术学院 Computer software analysis system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130066954A1 (en) * 2011-09-14 2013-03-14 Fujifilm Corporation Computer software analysis system, client computer, method of controlling operation of same and operation program therefor
CN104023071A (en) * 2014-06-13 2014-09-03 中国民航信息网络股份有限公司 System and method of monitoring software performance test resources
CN104182345A (en) * 2014-08-26 2014-12-03 上海微小卫星工程中心 Computer software testing system
CN104317709A (en) * 2014-10-21 2015-01-28 工业和信息化部电子第五研究所 Method and system for testing performance of software
CN104572426A (en) * 2013-10-14 2015-04-29 航天信息股份有限公司 Computer software performance testing method
CN105429987A (en) * 2015-11-25 2016-03-23 西安科技大学 Security system for computer network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130066954A1 (en) * 2011-09-14 2013-03-14 Fujifilm Corporation Computer software analysis system, client computer, method of controlling operation of same and operation program therefor
CN104572426A (en) * 2013-10-14 2015-04-29 航天信息股份有限公司 Computer software performance testing method
CN104023071A (en) * 2014-06-13 2014-09-03 中国民航信息网络股份有限公司 System and method of monitoring software performance test resources
CN104182345A (en) * 2014-08-26 2014-12-03 上海微小卫星工程中心 Computer software testing system
CN104317709A (en) * 2014-10-21 2015-01-28 工业和信息化部电子第五研究所 Method and system for testing performance of software
CN105429987A (en) * 2015-11-25 2016-03-23 西安科技大学 Security system for computer network

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108121643A (en) * 2016-11-28 2018-06-05 谷歌有限责任公司 Window bias analyzer
CN108121643B (en) * 2016-11-28 2021-11-12 谷歌有限责任公司 Method and system for determining performance decline
CN107423210A (en) * 2017-03-08 2017-12-01 北京数码大方科技股份有限公司 Software performance testing method and device
CN107491696A (en) * 2017-08-21 2017-12-19 中国人民解放军国防科技大学 Software security analysis method and system based on immune model
CN107491696B (en) * 2017-08-21 2020-07-10 中国人民解放军国防科技大学 Software security analysis method and system based on immune model
CN107733738A (en) * 2017-10-02 2018-02-23 衢州职业技术学院 A kind of computer network cloud management system
CN107832226A (en) * 2017-11-23 2018-03-23 中国平安人寿保险股份有限公司 Report-generating method, device, equipment and computer media based on performance test
CN108011890A (en) * 2017-12-20 2018-05-08 东北电力大学 A kind of information safety of mobile electronic equipment protects system
CN108304721A (en) * 2018-03-21 2018-07-20 河北师范大学 A kind of malicious code detection system
CN108881327A (en) * 2018-09-29 2018-11-23 德州职业技术学院(德州市技师学院) A kind of computer internet information safety control system based on cloud computing
CN111324547A (en) * 2020-03-26 2020-06-23 陕西工业职业技术学院 Computer software analysis system

Similar Documents

Publication Publication Date Title
CN105930264A (en) Computer software performance test method
US20220075869A1 (en) Systems, methods, and apparatuses for intrusion detection and analytics using power characteristics such as side-channel information collection
EP3398106B1 (en) Utilizing behavioral features to identify bot
US9836600B2 (en) Method and apparatus for detecting a multi-stage event
Vuagnoux et al. Compromising electromagnetic emanations of wired and wireless keyboards.
CN106209862B (en) A kind of steal-number defence implementation method and device
WO2018009510A1 (en) Methods and apparatuses for integrity validation of remote devices using side-channel information in a power signature analysis
WO2016206056A1 (en) Circuit breaker detection method, device and system
CN102508135A (en) Cable oscillation wave local discharge measuring and positioning system based on cloud computing
CN105471875A (en) Computer network monitoring system
WO2016193060A1 (en) Method, apparatus and system for device replacement detection and device recommendation
CN106803801A (en) System and method for applying aggregated cable test result data
CN110209559B (en) Non-invasive monitoring method, control equipment and storage medium
CN105786702A (en) Computer software analysis system
WO2013147226A1 (en) User sensory quality estimation device, terminal bottleneck determination device, similar operation extraction device, and methods and programs therefor
US9626265B2 (en) Efficiency of cycle-reproducible debug processes in a multi-core environment
CN109635993A (en) Operation behavior monitoring method and device based on prediction model
CN114244503A (en) Performance test method for password equipment
CN113141547A (en) Real-time detection of interfering devices
Makopa et al. Internet of Things (IoT) Network Forensic Analysis Using the Raspberry Pi 4 Model B and Open-Source Tools
US20180144141A1 (en) Method and system for detecting the vulnerability of an onboard device
Sun Improved BP algorithm intrusion detection model based on KVM
TW200924428A (en) An inside tracing method of the network attacking detection
US11354411B2 (en) Microcontroller program instruction execution fingerprinting and intrusion detection
KR101131072B1 (en) A method for classifying plural terminals by using a network time synchronization information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160907