CN105930264A - Computer software performance test method - Google Patents
Computer software performance test method Download PDFInfo
- Publication number
- CN105930264A CN105930264A CN201610217690.5A CN201610217690A CN105930264A CN 105930264 A CN105930264 A CN 105930264A CN 201610217690 A CN201610217690 A CN 201610217690A CN 105930264 A CN105930264 A CN 105930264A
- Authority
- CN
- China
- Prior art keywords
- computer software
- data
- module
- application operating
- performance test
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3692—Test management for test results analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3696—Methods or tools to render software testable
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention discloses a computer software performance test method. The computer software performance test method includes the following steps: completing bidirectional data exchange between a computer software system and the Ethernet, and encrypting the exchanged data through an encrypting module; detecting immune characteristic fingerprints of communication data packages for data exchange, completing configurations of parameters of the computer software system to be tested and monitoring manner parameters, and deployment of a detection resource acquisition module; performing an application operation on the computer software system to be tested, recording operation information of the application operation through a script recording manner, monitoring the state of the current application operation in real time, acquiring resource data of monitoring information in real time through the resource acquisition module, sending the acquired resource data to a detection center module, and determining the performance of software to be tested according to saved application operation processes with faults. The method improves the safety of detection, is high in detection efficiency, and can improve the accuracy of a resource monitoring result.
Description
Technical field
The present invention relates to field of computer technology, be specifically related to a kind of computer software performance test methods.
Background technology
Along with the development of intelligent terminal, the amount of software of intelligent terminal and kind rapid development.And soft
While number of packages amount increases and function is gradually improved, its committed memory is also constantly increasing, and this just brings sound
The problem such as elongated, power consumption increasing between Ying Shi.And software performance is the weight that intelligent terminal effectively realizes its function
Wanting index, be also to affect the key factor that equipment normally uses, therefore the performance evaluating for software is the heaviest
Want.
In terms of intelligent terminal software performance test, detect intelligent terminal generally by recording test script
Software, but during actually detected, owing to test script needs tester's hand-coding to record, institute
Low with testing efficiency, the most existing method for testing software does not the most carry out risk assessment, whole detection to software
Process is also to expose, and is easily subject to attack, and causes the damage of detecting system, the inspection used during detection
Survey resource information pattern and mostly can take the resource of performance test server, thus reduce the essence of monitoring resource
Really property.
Summary of the invention
For solving the problems referred to above, the invention provides a kind of computer software performance test methods, to detection number
According to having carried out encryption and immune detection, improve the safety of detection, detection efficiency is high, simultaneously by providing
Source information acquisition module is deployed on monitoring object with the form of static jar bag such that it is able to achieve property
Zero consumption of energy testing service device resource, improves the accuracy of monitoring resource result.
For achieving the above object, the technical scheme that the present invention takes is:
A kind of computer software performance test methods, comprises the steps:
S1, it is connected with computer software to be measured by cable, is concurrently accessed Ethernet, completes computer
Software system and the bidirectional data exchange of Ethernet, and by encrypting module, the data exchanged are added
Close;
S2, carry out the detection of the immune characteristic fingerprint of the communication data packet of data exchange, detected is exempted from
Epidemic disease characteristic fingerprint and the characteristic fingerprint comparison in immune characteristic storehouse, and carry out computer to be measured according to comparison result
The security evaluation of software system, if assessment result is safety, has then carried out the performance test of the data of encryption,
If assessment result is dangerous, then extract the fingerprint characteristic of this computer software to be measured, enrich immunity special
Levy storehouse;
S3, complete computer software parameter to be measured and the configuration of monitoring mode parameter, and resource will be detected
Acquisition module is deployed on computer software to be measured with the form of static jar bag, after completing to dispose, right
Described computer software to be measured carries out application operating;
S4, mode of being recorded by script record the operation information of described application operating, monitor current application in real time
Mode of operation, and by the resource data of collection of resources module Real-time Collection monitoring information, will be gathered simultaneously
To resource data be sent to inspection center's module, when described computer software to be measured is grasped in described application
When breaking down during work, utilize the application operating process broken down described in script playback, and in test
The application operating process broken down described in the playback of described script is preserved, then according to described preservation on main frame
Described in the application operating process that breaks down determine the performance of tested software;
S5, complete detection after, by one key reduction by computer recover to data exchange before state.
Wherein, the data that described detection collection of resources module is gathered include the Installed System Memory of free time, and CPU uses
Family utilization rate, cpu system utilization rate, CPU wait rate, disk read rate, disk write speed, network number
According to receiving velocity, network data transmission rate, and described monitoring information is assembled into the form that JSON goes here and there, logical
Crossing SSH connection and return to inspection center's module, inspection center's module resolves JSON string, prison parsing obtained
Measurement information updates on the curve chart of front end JSP.
Wherein, described detection resource is adopted by described inspection center module for monitoring mode parameter based on configuration
Collection module calls and controlling of sampling, and exports the monitoring letter that described detection collection of resources module obtains
Breath.
Wherein, described encrypting module is encrypted by following steps:
The parameter that S11, initialization run in developing, utilizes self feed back mapping function to carry out population in developing
Initializing, stochastic generation contains the initial population that some is individual;
S12, calculate in current population for checking the frequency adaptive value of each individual frequency and each for checking
The sequence adaptive value of individual sequence;
S13, contrast the adaptive value of each individuality and its place other individualities of population, calculate in current population
The order of each individuality;
S14, according to rank value, the individuality in population is carried out descending after, carry out stochastic sampling, and divided by
The system number of key, it is thus achieved that quotient and remainder;
S15, using calculating the quotient obtained as current be-encrypted data, and continue executing with step S1, until
Calculating the quotient obtained is zero;
Extraction operational rule in S16, use key selects a specific plaintext section;
S17, using calculate acquisition every time remainder arrangement and specific plaintext section as encrypted sequence of data.
Wherein, the described application operating process broken down according to described preservation determines tested software
The step of performance include:
During obtaining described application operating, the storehouse of described tested software internal memory, thread and internal memory overflow
Parameter;
Acquired storehouse, thread and internal memory are overflowed parameter and the application operating broken down of described preservation
Process contrasts with the standard set respectively, is then analyzed the result of described contrast, according to described
The result analyzed obtains the performance of tested software.
Wherein, the described step that described tested software carries out application operating includes:
Described test main frame and described intelligent terminal is synchronized by data syn-chronization fastening means;
Test main frame carries out application operating to the described tested software of described intelligent terminal.
The method have the advantages that
Detection data are carried out encryption and immune detection, improves the safety of detection;By starting script
Record the application operating to tested software, simplify testing procedure;And when described tested software is because of described
When application operating breaks down, utilize the application operating process that breaks down described in script playback can be more preferable
Test tested software is for the highest problem of the performance of which application operating, thus improves detection effect
Rate;Simultaneously by resource information acquisition module is deployed on monitoring object with the form of static jar bag, from
And it has been capable of zero consumption to performance test server resource, improve the accurate of monitoring resource result
Property.
Detailed description of the invention
In order to make objects and advantages of the present invention clearer, below in conjunction with embodiment, the present invention is carried out
Further describe.Should be appreciated that specific embodiment described herein only in order to explain the present invention,
It is not intended to limit the present invention.
Embodiments provide a kind of computer software performance test methods, comprise the steps:
S1, it is connected with computer software to be measured by cable, is concurrently accessed Ethernet, completes computer
Software system and the bidirectional data exchange of Ethernet, and by encrypting module, the data exchanged are added
Close;
S2, carry out the detection of the immune characteristic fingerprint of the communication data packet of data exchange, detected is exempted from
Epidemic disease characteristic fingerprint and the characteristic fingerprint comparison in immune characteristic storehouse, and carry out computer to be measured according to comparison result
The security evaluation of software system, if assessment result is safety, has then carried out the performance test of the data of encryption,
If assessment result is dangerous, then extract the fingerprint characteristic of this computer software to be measured, enrich immunity special
Levy storehouse;
S3, complete computer software parameter to be measured and the configuration of monitoring mode parameter, and resource will be detected
Acquisition module is deployed on computer software to be measured with the form of static jar bag, after completing to dispose, right
Described computer software to be measured carries out application operating;
S4, mode of being recorded by script record the operation information of described application operating, monitor current application in real time
Mode of operation, and by the resource data of collection of resources module Real-time Collection monitoring information, will be gathered simultaneously
To resource data be sent to inspection center's module, when described computer software to be measured is grasped in described application
When breaking down during work, utilize the application operating process broken down described in script playback, and in test
The application operating process broken down described in the playback of described script is preserved, then according to described preservation on main frame
Described in the application operating process that breaks down determine the performance of tested software;
S5, complete detection after, by one key reduction by computer recover to data exchange before state.
The data that described detection collection of resources module is gathered include the Installed System Memory of free time, and CPU user uses
Rate, cpu system utilization rate, CPU wait rate, disk read rate, disk write speed, network data receives
Speed, network data transmission rate, and described monitoring information is assembled into the form of JSON string, pass through SSH
Connecting and return to inspection center's module, inspection center's module resolves JSON string, monitoring parsing obtained letter
Breath updates on the curve chart of front end JSP.
Described inspection center module is used for monitoring mode parameter based on configuration to described detection collection of resources mould
Block calls and controlling of sampling, and exports the monitoring information that described detection collection of resources module obtains.
Described encrypting module is encrypted by following steps:
The parameter that S11, initialization run in developing, utilizes self feed back mapping function to carry out population in developing
Initializing, stochastic generation contains the initial population that some is individual;
S12, calculate in current population for checking the frequency adaptive value of each individual frequency and each for checking
The sequence adaptive value of individual sequence;
S13, contrast the adaptive value of each individuality and its place other individualities of population, calculate in current population
The order of each individuality;
S14, according to rank value, the individuality in population is carried out descending after, carry out stochastic sampling, and divided by
The system number of key, it is thus achieved that quotient and remainder;
S15, using calculating the quotient obtained as current be-encrypted data, and continue executing with step S1, until
Calculating the quotient obtained is zero;
Extraction operational rule in S16, use key selects a specific plaintext section;
S17, using calculate acquisition every time remainder arrangement and specific plaintext section as encrypted sequence of data.
The described application operating process broken down according to described preservation determines the performance of tested software
Step include:
During obtaining described application operating, the storehouse of described tested software internal memory, thread and internal memory overflow
Parameter;
Acquired storehouse, thread and internal memory are overflowed parameter and the application operating broken down of described preservation
Process contrasts with the standard set respectively, is then analyzed the result of described contrast, according to described
The result analyzed obtains the performance of tested software.
The described step that described tested software carries out application operating includes:
Described test main frame and described intelligent terminal is synchronized by data syn-chronization fastening means;
Test main frame carries out application operating to the described tested software of described intelligent terminal.
Wherein, inspection center's module according to target capabilities testing service device IP, login account, login password,
Set up SSH with monitoring object to be connected;
Inspection center's module, by the way of remotely performing the shell script in described private directory, is called
The static jar bag of resource information acquisition module.
The cycle called and number of times determine according to user configured sampling interval duration and total sample number respectively.
The above is only the preferred embodiment of the present invention, it is noted that common for the art
For technical staff, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications,
These improvements and modifications also should be regarded as protection scope of the present invention.
Claims (6)
1. a computer software performance test methods, it is characterised in that comprise the steps:
S1, it is connected with computer software to be measured by cable, is concurrently accessed Ethernet, completes computer
Software system and the bidirectional data exchange of Ethernet, and by encrypting module, the data exchanged are added
Close;
S2, carry out the detection of the immune characteristic fingerprint of the communication data packet of data exchange, detected is exempted from
Epidemic disease characteristic fingerprint and the characteristic fingerprint comparison in immune characteristic storehouse, and carry out computer to be measured according to comparison result
The security evaluation of software system, if assessment result is safety, has then carried out the performance test of the data of encryption,
If assessment result is dangerous, then extract the fingerprint characteristic of this computer software to be measured, enrich immunity special
Levy storehouse;
S3, complete computer software parameter to be measured and the configuration of monitoring mode parameter, and resource will be detected
Acquisition module is deployed on computer software to be measured with the form of static jar bag, after completing to dispose, right
Described computer software to be measured carries out application operating;
S4, mode of being recorded by script record the operation information of described application operating, monitor current application in real time
Mode of operation, and by the resource data of collection of resources module Real-time Collection monitoring information, will be gathered simultaneously
To resource data be sent to inspection center's module, when described computer software to be measured is grasped in described application
When breaking down during work, utilize the application operating process broken down described in script playback, and in test
The application operating process broken down described in the playback of described script is preserved, then according to described preservation on main frame
Described in the application operating process that breaks down determine the performance of tested software;
S5, complete detection after, by one key reduction by computer recover to data exchange before state.
A kind of computer software performance test methods the most according to claim 1, it is characterised in that institute
State the detection data that gathered of collection of resources module and include the Installed System Memory of free time, CPU subscriber usage, CPU
System utilization rate, CPU wait rate, disk read rate, disk write speed, network data receiving velocity, net
Network data transmission rate, and described monitoring information is assembled into the form of JSON string, connected by SSH and return
To inspection center's module, inspection center's module resolves JSON string, and monitoring information parsing obtained updates
On the curve chart of front end JSP.
A kind of computer software performance test methods the most according to claim 1, it is characterised in that institute
State inspection center's module for monitoring mode parameter based on configuration, described detection collection of resources module to be carried out
Call and controlling of sampling, and export the monitoring information that described detection collection of resources module obtains.
A kind of computer software performance test methods the most according to claim 1, it is characterised in that institute
State encrypting module to be encrypted by following steps:
The parameter that S11, initialization run in developing, utilizes self feed back mapping function to carry out population in developing
Initializing, stochastic generation contains the initial population that some is individual;
S12, calculate in current population for checking the frequency adaptive value of each individual frequency and each for checking
The sequence adaptive value of individual sequence;
S13, contrast the adaptive value of each individuality and its place other individualities of population, calculate in current population
The order of each individuality;
S14, according to rank value, the individuality in population is carried out descending after, carry out stochastic sampling, and divided by
The system number of key, it is thus achieved that quotient and remainder;
S15, using calculating the quotient obtained as current be-encrypted data, and continue executing with step S1, until
Calculating the quotient obtained is zero;
Extraction operational rule in S16, use key selects a specific plaintext section;
S17, using calculate acquisition every time remainder arrangement and specific plaintext section as encrypted sequence of data.
A kind of computer software performance test methods the most according to claim 1, it is characterised in that institute
State the step that the application operating process broken down according to described preservation determines the performance of tested software
Suddenly include:
During obtaining described application operating, the storehouse of described tested software internal memory, thread and internal memory overflow
Parameter;
Acquired storehouse, thread and internal memory are overflowed parameter and the application operating broken down of described preservation
Process contrasts with the standard set respectively, is then analyzed the result of described contrast, according to described
The result analyzed obtains the performance of tested software.
A kind of computer software performance test methods the most according to claim 1, it is characterised in that institute
State and described tested software is carried out the step of application operating include:
Described test main frame and described intelligent terminal is synchronized by data syn-chronization fastening means;
Test main frame carries out application operating to the described tested software of described intelligent terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610217690.5A CN105930264A (en) | 2016-04-03 | 2016-04-03 | Computer software performance test method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610217690.5A CN105930264A (en) | 2016-04-03 | 2016-04-03 | Computer software performance test method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105930264A true CN105930264A (en) | 2016-09-07 |
Family
ID=56840358
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610217690.5A Pending CN105930264A (en) | 2016-04-03 | 2016-04-03 | Computer software performance test method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105930264A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107423210A (en) * | 2017-03-08 | 2017-12-01 | 北京数码大方科技股份有限公司 | Software performance testing method and device |
CN107491696A (en) * | 2017-08-21 | 2017-12-19 | 中国人民解放军国防科技大学 | Software security analysis method and system based on immune model |
CN107733738A (en) * | 2017-10-02 | 2018-02-23 | 衢州职业技术学院 | A kind of computer network cloud management system |
CN107832226A (en) * | 2017-11-23 | 2018-03-23 | 中国平安人寿保险股份有限公司 | Report-generating method, device, equipment and computer media based on performance test |
CN108011890A (en) * | 2017-12-20 | 2018-05-08 | 东北电力大学 | A kind of information safety of mobile electronic equipment protects system |
CN108121643A (en) * | 2016-11-28 | 2018-06-05 | 谷歌有限责任公司 | Window bias analyzer |
CN108304721A (en) * | 2018-03-21 | 2018-07-20 | 河北师范大学 | A kind of malicious code detection system |
CN108881327A (en) * | 2018-09-29 | 2018-11-23 | 德州职业技术学院(德州市技师学院) | A kind of computer internet information safety control system based on cloud computing |
CN111324547A (en) * | 2020-03-26 | 2020-06-23 | 陕西工业职业技术学院 | Computer software analysis system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130066954A1 (en) * | 2011-09-14 | 2013-03-14 | Fujifilm Corporation | Computer software analysis system, client computer, method of controlling operation of same and operation program therefor |
CN104023071A (en) * | 2014-06-13 | 2014-09-03 | 中国民航信息网络股份有限公司 | System and method of monitoring software performance test resources |
CN104182345A (en) * | 2014-08-26 | 2014-12-03 | 上海微小卫星工程中心 | Computer software testing system |
CN104317709A (en) * | 2014-10-21 | 2015-01-28 | 工业和信息化部电子第五研究所 | Method and system for testing performance of software |
CN104572426A (en) * | 2013-10-14 | 2015-04-29 | 航天信息股份有限公司 | Computer software performance testing method |
CN105429987A (en) * | 2015-11-25 | 2016-03-23 | 西安科技大学 | Security system for computer network |
-
2016
- 2016-04-03 CN CN201610217690.5A patent/CN105930264A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130066954A1 (en) * | 2011-09-14 | 2013-03-14 | Fujifilm Corporation | Computer software analysis system, client computer, method of controlling operation of same and operation program therefor |
CN104572426A (en) * | 2013-10-14 | 2015-04-29 | 航天信息股份有限公司 | Computer software performance testing method |
CN104023071A (en) * | 2014-06-13 | 2014-09-03 | 中国民航信息网络股份有限公司 | System and method of monitoring software performance test resources |
CN104182345A (en) * | 2014-08-26 | 2014-12-03 | 上海微小卫星工程中心 | Computer software testing system |
CN104317709A (en) * | 2014-10-21 | 2015-01-28 | 工业和信息化部电子第五研究所 | Method and system for testing performance of software |
CN105429987A (en) * | 2015-11-25 | 2016-03-23 | 西安科技大学 | Security system for computer network |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108121643A (en) * | 2016-11-28 | 2018-06-05 | 谷歌有限责任公司 | Window bias analyzer |
CN108121643B (en) * | 2016-11-28 | 2021-11-12 | 谷歌有限责任公司 | Method and system for determining performance decline |
CN107423210A (en) * | 2017-03-08 | 2017-12-01 | 北京数码大方科技股份有限公司 | Software performance testing method and device |
CN107491696A (en) * | 2017-08-21 | 2017-12-19 | 中国人民解放军国防科技大学 | Software security analysis method and system based on immune model |
CN107491696B (en) * | 2017-08-21 | 2020-07-10 | 中国人民解放军国防科技大学 | Software security analysis method and system based on immune model |
CN107733738A (en) * | 2017-10-02 | 2018-02-23 | 衢州职业技术学院 | A kind of computer network cloud management system |
CN107832226A (en) * | 2017-11-23 | 2018-03-23 | 中国平安人寿保险股份有限公司 | Report-generating method, device, equipment and computer media based on performance test |
CN108011890A (en) * | 2017-12-20 | 2018-05-08 | 东北电力大学 | A kind of information safety of mobile electronic equipment protects system |
CN108304721A (en) * | 2018-03-21 | 2018-07-20 | 河北师范大学 | A kind of malicious code detection system |
CN108881327A (en) * | 2018-09-29 | 2018-11-23 | 德州职业技术学院(德州市技师学院) | A kind of computer internet information safety control system based on cloud computing |
CN111324547A (en) * | 2020-03-26 | 2020-06-23 | 陕西工业职业技术学院 | Computer software analysis system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105930264A (en) | Computer software performance test method | |
US20220075869A1 (en) | Systems, methods, and apparatuses for intrusion detection and analytics using power characteristics such as side-channel information collection | |
EP3398106B1 (en) | Utilizing behavioral features to identify bot | |
US9836600B2 (en) | Method and apparatus for detecting a multi-stage event | |
Vuagnoux et al. | Compromising electromagnetic emanations of wired and wireless keyboards. | |
CN106209862B (en) | A kind of steal-number defence implementation method and device | |
WO2018009510A1 (en) | Methods and apparatuses for integrity validation of remote devices using side-channel information in a power signature analysis | |
WO2016206056A1 (en) | Circuit breaker detection method, device and system | |
CN102508135A (en) | Cable oscillation wave local discharge measuring and positioning system based on cloud computing | |
CN105471875A (en) | Computer network monitoring system | |
WO2016193060A1 (en) | Method, apparatus and system for device replacement detection and device recommendation | |
CN106803801A (en) | System and method for applying aggregated cable test result data | |
CN110209559B (en) | Non-invasive monitoring method, control equipment and storage medium | |
CN105786702A (en) | Computer software analysis system | |
WO2013147226A1 (en) | User sensory quality estimation device, terminal bottleneck determination device, similar operation extraction device, and methods and programs therefor | |
US9626265B2 (en) | Efficiency of cycle-reproducible debug processes in a multi-core environment | |
CN109635993A (en) | Operation behavior monitoring method and device based on prediction model | |
CN114244503A (en) | Performance test method for password equipment | |
CN113141547A (en) | Real-time detection of interfering devices | |
Makopa et al. | Internet of Things (IoT) Network Forensic Analysis Using the Raspberry Pi 4 Model B and Open-Source Tools | |
US20180144141A1 (en) | Method and system for detecting the vulnerability of an onboard device | |
Sun | Improved BP algorithm intrusion detection model based on KVM | |
TW200924428A (en) | An inside tracing method of the network attacking detection | |
US11354411B2 (en) | Microcontroller program instruction execution fingerprinting and intrusion detection | |
KR101131072B1 (en) | A method for classifying plural terminals by using a network time synchronization information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160907 |