CN107171867A - The guard system of ddos attack - Google Patents

The guard system of ddos attack Download PDF

Info

Publication number
CN107171867A
CN107171867A CN201710525640.8A CN201710525640A CN107171867A CN 107171867 A CN107171867 A CN 107171867A CN 201710525640 A CN201710525640 A CN 201710525640A CN 107171867 A CN107171867 A CN 107171867A
Authority
CN
China
Prior art keywords
module
ddos attack
network status
data
status data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710525640.8A
Other languages
Chinese (zh)
Inventor
王超
付莹
冯方方
孙健
刘斌
付强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Universal Wisdom Technology Beijing Co Ltd
Original Assignee
Universal Wisdom Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Universal Wisdom Technology Beijing Co Ltd filed Critical Universal Wisdom Technology Beijing Co Ltd
Priority to CN201710525640.8A priority Critical patent/CN107171867A/en
Publication of CN107171867A publication Critical patent/CN107171867A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of guard system of DDOS attack, including:Acquisition module is used to gather network status data;Pretreatment module is used to be screened network status data according to the first preset rules;Judge module is used to judge whether pretreatment network status data is ddos attack data according to the second preset rules, if it is, the IP address of ddos attack data and corresponding user is sent into alarm module;Alarm module is used to judge whether current time belongs to the first preset time, if it is not, then generation warning information is sent to monitor terminal, and the IP address of ddos attack data and corresponding user is sent into lockout module;Lockout module is used to carry out block processing to ddos attack data and the IP address of corresponding user;Unsealing module is used for when current time exceeds the second preset time, and the ddos attack data and the IP address of corresponding user sent to lockout module carry out deblocking processing;Monitor terminal is used to pretreatment network status data carrying out visualization processing and is shown.

Description

The guard system of ddos attack
Technical field
The present invention relates to network technique field, more particularly to a kind of guard system of ddos attack.
Background technology
With the development of Internet technology, production, life are increasingly improved for the degree of dependence of internet, and network security is needed Ask and particularly highlight.Distributed denial of service (Distributed Denial of Service, DDoS) attack refer to one or Multiple attackers, while sending substantial amounts of data to some target, are finally led by controlling substantial amounts of computer to be used as attack source Cause a kind of network behavior of malice of target paralysis.
The implementation protected at present for DDoS, mainly there is following several ways:
(1) safeguard
By using support high bandwidth, the professional safeguard of high-throughput, realized according to prevention policies to the clear of flow Wash, the flow after cleaning is forwarded to real service.Such a solution is, it is necessary to which reserved extra high bandwidth and purchase specialty are anti- Protect equipment.
(2) cloud shield is serviced
Request flow is realized by cloud platform content distributing network (Content Delivery Network, CDN) mode Shunting, by the parsing of the domain name system (Domain Name System, DNS) of user's domain name to protection cloud network, with reverse generation Reason mode, customer flow is shared in cloud service, and flow cleaning is realized by soft prevention policies, blocks abnormal flow and asks Ask, the flow after cleaning is forwarded to user's real service.The inbound traffics that go out of such a situation request all can be by protection cloud network. Such a solution is, it is necessary to buy cloud shield service, and it also requires source station has good support to CDN service.
(3) blackhole route
In the network device, the flow in exception request source is introduced into blackhole route, request is abandoned quietly, and do not denote that original Cause, to reach protective action.Such a solution need to judge the network address of anomaly source, and need routing device, may seal Block up normal flow.
Current guard technology existing on the market, needs the extra equipment of buying or service, and need the network of specialty more Personnel are safeguarded, add purchase cost and maintenance cost.
The content of the invention
The invention provides a kind of guard system of ddos attack, to solve ddos attack protection needs of the prior art The problem of extra increase purchase cost and maintenance cost.
The embodiments of the invention provide a kind of guard system of ddos attack, including:Server and monitor terminal;
The server includes acquisition module, pretreatment module, judge module, alarm module, lockout module and deblocking mould Block;
The acquisition module is used for, and gathers network status data, the network status data comprising user accesses data and Corresponding IP address;
The pretreatment module is used for, and the network status data is screened according to the first preset rules, obtains pre- Handle network status data;
The judge module is used for, and judges whether the pretreatment network status data is DDoS according to the second preset rules Data are attacked, if it is, the IP address of the ddos attack data and corresponding user is sent into alarm module;
The alarm module is used for, and judges whether current time belongs to the first preset time, if it is not, then generation alarm letter Breath is sent to monitor terminal, and the IP address of the ddos attack data and corresponding user is sent into lockout module;
The lockout module is used for, and block processing is carried out to the ddos attack data and the IP address of corresponding user;
The deblocking module is used for, when current time exceeds the second preset time, the institute sent to the lockout module The IP address for stating ddos attack data and corresponding user carries out deblocking processing;
The monitor terminal is used for, and the pretreatment network status data that the pretreatment module is sent is received, by institute Pretreatment network status data is stated to carry out visualization processing and be shown.
Further, the system also includes memory module;
The memory module is used to the pretreatment network status data being stored in influxdb databases.
Further, the monitor terminal specifically for:
The pretreatment network status data that the pretreatment module is sent is received, using grafana by the pre- place Reason network status data carries out visualization processing and is shown.
Further, the lockout module specifically for:
Generate the block order to the ddos attack data and the IP address of corresponding user;
The block order is carried on fire wall iptables.
Further, it is described deblocking module specifically for:
When current time exceeds the second preset time, revocation is carried in the block order on the iptables.
The guard system of ddos attack provided in an embodiment of the present invention, acquisition module collection network status data is network-like State packet contains user accesses data and corresponding IP address;Pretreatment module is used for, by network status data according to One preset rules are screened, and obtain pre-processing network status data;Judge module judges to pre-process according to the second preset rules Whether network status data is ddos attack data, if it is, ddos attack data and the IP address of corresponding user are sent To alarm module;Alarm module judges whether current time belongs to the first preset time, if it is not, then generation warning information is sent Lockout module is sent to monitor terminal, and by the IP address of ddos attack data and corresponding user;Lockout module is to DDoS The IP address for attacking data and corresponding user carries out block processing;Module is unsealed when current time exceeds the second preset time When, the ddos attack data and the IP address of corresponding user sent to lockout module carry out deblocking processing;Monitor terminal is received The pretreatment network status data that pretreatment module is sent, carries out visualization processing by pretreatment network status data and carries out exhibition Show.System provided in an embodiment of the present invention, based on the linux operating systems increased income, in zero purchase cost and zero maintenance cost In the case of realize the protection of ddos attack.Directly can independently be deployed in the front end of each application service, can also support it is distributed and Concentrate displaying, it is easy to which deployment and maintenance, friendly interface, alarm mode are various.
Brief description of the drawings
Fig. 1 is the schematic diagram of the guard system of ddos attack provided in an embodiment of the present invention.
Embodiment
In order that the object, technical solutions and advantages of the present invention are clearer, below in conjunction with accompanying drawing the present invention is made into One step it is described in detail, it is clear that described embodiment is only embodiment of the invention a part of, rather than whole implementation Example.Based on the embodiment in the present invention, what those of ordinary skill in the art were obtained under the premise of creative work is not made All other embodiment, belongs to the scope of protection of the invention.
The present invention combines iptables (the integrated fire wall of linux operating system nucleus of increasing income), grafana and (increased income Measure instrument board and graphic editor), influxdb (distributed sequential of increasing income, event and achievement data storehouse), python it is (a kind of Programming language), realization can configure, can manage, visualize, can alert, the mode of clustering effectively predicts ddos attacks, Protect ddos attacks, alarm ddos attacks.
The present invention has advantages below:
1st, without reserved bandwidth:Purpose of design of the present invention is to be protected for lightweight DDoS, is detecting ddos attack row For when, use discarding or speed limit strategy.
2nd, without reverse proxy:Because the present invention is realized based on linux kernel, most of equal base of system architecture on the market at present In Linux system environment of increasing income, the system can be directly integrated in the existing application service framework front end of user.
3rd, without the network equipment:Because the system realizes that preventing principle is the iptables modules based on linux kernel, the mould Block is supported to route, the function such as fire wall.
With reference to the guard system schematic diagram of the ddos attack shown in Fig. 1, DDoS provided in an embodiment of the present invention is attacked The guard system hit is described in detail.
As shown in figure 1, the guard system for the ddos attack that the present invention is provided mainly includes:Server 1 and monitor terminal 2;
Server 1 includes acquisition module 11, pretreatment module 12, judge module 13, alarm module 14, the and of lockout module 15 Unseal module 16.
Acquisition module 11 is used for, and gathers network status data, and network status data includes user accesses data and corresponding IP address.
Specifically, previously generate configuration file, data format defined in configuration file with the addition of parameter, acquisition module The 11 rule collection network status data in configuration file.Contained in network status data all by current server Network connection data and correspondence access network connection user IP address.
Pretreatment module 12 is used for, and network status data is screened according to the first preset rules, obtains pre-processing net Network status data.
After the network status data for receiving the collection of acquisition module 11, pretreatment module 12 is according to default screening conditions Screened, the first preset rules are the screening conditions rule that those skilled in the art are set according to specific needs.
Judge module 13 is used for, and judges whether pretreatment network status data is ddos attack number according to the second preset rules According to if it is, the IP address of ddos attack data and corresponding user is sent into alarm module.
Wherein, the second preset rules are the rule that those skilled in the art define according to specific needs.It is default using second Rule is analyzed network status data, filters out abnormal network status data, then by abnormal network status data and white name Singly it is compared, goes unless ddos attack data, finally give ddos attack data.
For example, the second preset rules can be in some period, the user of some IP address initiates request 10 times, significantly Exceed default 5 times, then judged the network status data for abnormal network status number.
In addition, judge module also needs to judge current mode of operation, if listening mode, then ddos attack number is recorded According to, do not do other processing;If non-snoop mode, then the IP address of ddos attack data and corresponding user is sent to announcement Alert module is handled.
Alarm module 14 is used for, and judges whether current time belongs to the first preset time, if it is not, then generation warning information Monitor terminal is sent to, and the IP address of ddos attack data and corresponding user is sent to lockout module.
Wherein, the first preset time is the maintenance time section that those skilled in the art are set according to specific needs.
If current time belongs to maintenance time section, do not process.If belonging to non-maintenance time section, according to DDoS The content information and characteristic information generation warning information of data are attacked, and by ddos attack data and the IP address of corresponding user Lockout module is sent to be handled.
Wherein, warning information can be specifically the alarm email information or sound alarm sent to monitor terminal The warning information of the other forms such as information.
Lockout module 15 is used for, and block processing is carried out to ddos attack data and the IP address of corresponding user.
Specifically, block order of the generation to ddos attack data and the IP address of corresponding user;Block order is added It is loaded on fire wall iptables.
Other locking methods that those skilled in the art can draw without involving an inventive effort are thought to belong to this hair The protection domain of bright technical scheme.
Deblocking module 16 is used for, when current time exceeds the second preset time, the ddos attack sent to lockout module Data and the IP address of corresponding user carry out deblocking processing.
Specifically, when current time exceeds the second preset time, revocation is carried in the block order on iptables.
After ddos attack data locking preset time, if current time exceeds the blocking time section pre-set, Release the block order being carried on fire wall.
In addition, system also includes memory module 17;
Memory module 17 is used to pretreatment network status data being stored in influxdb databases.
Monitor terminal 2 is used for, and receives the pretreatment network status data that pretreatment module 12 is sent, will pre-process network-like State data carry out visualization processing and are shown.
Specifically, receiving the network status data that pretreatment module 12 is sent, network status data is entered using grafana Row visualization processing is simultaneously shown.
The guard system of ddos attack provided in an embodiment of the present invention, acquisition module collection network status data is network-like State packet contains user accesses data and corresponding IP address;Judge module judges network state according to the first preset rules Whether data are ddos attack data, if it is, the IP address of ddos attack data and corresponding user is sent into alarm mould Block;Alarm module judges whether current time belongs to the first preset time, if it is not, then generation warning information is sent to monitoring eventually End, and the IP address of ddos attack data and corresponding user is sent to lockout module;Lockout module is used for ddos attack Data and the IP address of corresponding user carry out block processing;Unsealing module is used for when current time exceeds the first preset time When, the ddos attack data and the IP address of corresponding user sent to lockout module carry out deblocking processing;Monitor terminal is used for The network status data that acquisition module is sent is received, network status data is subjected to visualization processing and is shown.The present invention The system that embodiment is provided, based on the linux operating systems increased income, is realized in the case of zero purchase cost and zero maintenance cost The protection of ddos attack.The front end of each application service directly can be independently deployed in, can also support distributed and concentrate displaying, easily In deployment and maintenance, friendly interface, alarm mode is various.
Professional should further appreciate that, each example described with reference to the embodiments described herein Unit and algorithm steps, can be realized with electronic hardware, be generally described respectively according to function in the above description The composition and step of example.Function described by being realized to each specific application using distinct methods, but this reality Now it is not considered that beyond the scope of the embodiment of the present invention.Specifically, the computing and control section can dredging collateral logic hardwares Realize, it can be the logical integrated circuit manufactured using integrated circuit technology, and the present embodiment is not construed as limiting to this.
The method that is described with reference to the embodiments described herein can use hardware, computing device the step of algorithm Software module, or the two combination are implemented.Software module can be placed in random access memory (RAM), internal memory, read-only storage (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field In any other form of storage medium well known to interior.
Above-described embodiment, purpose, technical scheme and beneficial effect to the embodiment of the present invention are carried out It is further described, should be understood that the embodiment that the foregoing is only the embodiment of the present invention, and without It is all within the spirit and principle of the embodiment of the present invention in the protection domain for limiting the embodiment of the present invention, any modification for being made, Equivalent substitution, improvement etc., should be included within the protection domain of the embodiment of the present invention.

Claims (5)

1. a kind of guard system of ddos attack, it is characterised in that the system includes:Server and monitor terminal;
The server includes acquisition module, pretreatment module, judge module, alarm module, lockout module and deblocking module;
The acquisition module is used for, and gathers network status data, the network status data is comprising user accesses data and correspondingly IP address;
The pretreatment module is used for, and the network status data is screened according to the first preset rules, pre-processed Network status data;
The judge module is used for, and judges whether the pretreatment network status data is ddos attack according to the second preset rules Data, if it is, the IP address of the ddos attack data and corresponding user is sent into alarm module;
The alarm module is used for, and judges whether current time belongs to the first preset time, if it is not, then generation warning information hair Monitor terminal is given, and the IP address of the ddos attack data and corresponding user is sent to lockout module;
The lockout module is used for, and block processing is carried out to the ddos attack data and the IP address of corresponding user;
The deblocking module is used for, when current time exceeds the second preset time, to described in lockout module transmission Ddos attack data and the IP address of corresponding user carry out deblocking processing;
The monitor terminal is used for, and receives the pretreatment network status data that the pretreatment module is sent, will be described pre- Processing network status data carries out visualization processing and is shown.
2. the guard system of ddos attack according to claim 1, it is characterised in that the system also includes storage mould Block;
The memory module is used to the pretreatment network status data being stored in influxdb databases.
3. the guard system of ddos attack according to claim 1, it is characterised in that the monitor terminal specifically for:
The pretreatment network status data that the pretreatment module is sent is received, using grafana by the pretreatment net Network status data carries out visualization processing and is shown.
4. the guard system of ddos attack according to claim 1, it is characterised in that the lockout module specifically for:
Generate the block order to the ddos attack data and the IP address of corresponding user;
The block order is carried on fire wall iptables.
5. the guard system of ddos attack according to claim 4, it is characterised in that the deblocking module specifically for:
When current time exceeds the second preset time, revocation is carried in the block order on the iptables.
CN201710525640.8A 2017-06-30 2017-06-30 The guard system of ddos attack Pending CN107171867A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710525640.8A CN107171867A (en) 2017-06-30 2017-06-30 The guard system of ddos attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710525640.8A CN107171867A (en) 2017-06-30 2017-06-30 The guard system of ddos attack

Publications (1)

Publication Number Publication Date
CN107171867A true CN107171867A (en) 2017-09-15

Family

ID=59827659

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710525640.8A Pending CN107171867A (en) 2017-06-30 2017-06-30 The guard system of ddos attack

Country Status (1)

Country Link
CN (1) CN107171867A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067770A (en) * 2018-09-05 2018-12-21 高新兴科技集团股份有限公司 The flow attacking control method and computer storage medium of Internet of things system
CN110620787A (en) * 2019-09-30 2019-12-27 怀来斯达铭数据有限公司 Method and system for preventing DDoS attack
CN111241543A (en) * 2020-01-07 2020-06-05 中国搜索信息科技股份有限公司 Method and system for intelligently resisting DDoS attack by application layer
CN111786962A (en) * 2020-06-12 2020-10-16 广州市和昊信息技术有限公司 Network security monitoring system
CN115811428A (en) * 2022-11-28 2023-03-17 济南大学 Defense method, system, equipment and storage medium for resisting DDoS attack

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588246A (en) * 2008-05-23 2009-11-25 成都市华为赛门铁克科技有限公司 Method, network equipment and network system for defending distributed denial service DDoS attack
CN101834866A (en) * 2010-05-05 2010-09-15 北京来安科技有限公司 CC (Communication Center) attack protective method and system thereof
US20150047038A1 (en) * 2013-08-09 2015-02-12 International Business Machines Corporation Techniques for validating distributed denial of service attacks based on social media content
CN105827615A (en) * 2016-04-22 2016-08-03 浪潮电子信息产业股份有限公司 Optimization method for preventing DDOS attack by Smart Rack
CN106506527A (en) * 2016-12-05 2017-03-15 国云科技股份有限公司 A kind of method of the defence connectionless flood attacks of UDP

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588246A (en) * 2008-05-23 2009-11-25 成都市华为赛门铁克科技有限公司 Method, network equipment and network system for defending distributed denial service DDoS attack
CN101834866A (en) * 2010-05-05 2010-09-15 北京来安科技有限公司 CC (Communication Center) attack protective method and system thereof
US20150047038A1 (en) * 2013-08-09 2015-02-12 International Business Machines Corporation Techniques for validating distributed denial of service attacks based on social media content
CN105827615A (en) * 2016-04-22 2016-08-03 浪潮电子信息产业股份有限公司 Optimization method for preventing DDOS attack by Smart Rack
CN106506527A (en) * 2016-12-05 2017-03-15 国云科技股份有限公司 A kind of method of the defence connectionless flood attacks of UDP

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067770A (en) * 2018-09-05 2018-12-21 高新兴科技集团股份有限公司 The flow attacking control method and computer storage medium of Internet of things system
CN109067770B (en) * 2018-09-05 2021-04-23 高新兴科技集团股份有限公司 Flow attack control method for internet of things system and computer storage medium
CN110620787A (en) * 2019-09-30 2019-12-27 怀来斯达铭数据有限公司 Method and system for preventing DDoS attack
CN111241543A (en) * 2020-01-07 2020-06-05 中国搜索信息科技股份有限公司 Method and system for intelligently resisting DDoS attack by application layer
CN111786962A (en) * 2020-06-12 2020-10-16 广州市和昊信息技术有限公司 Network security monitoring system
CN115811428A (en) * 2022-11-28 2023-03-17 济南大学 Defense method, system, equipment and storage medium for resisting DDoS attack

Similar Documents

Publication Publication Date Title
CN107171867A (en) The guard system of ddos attack
US9407602B2 (en) Methods and apparatus for redirecting attacks on a network
AU2004282937B2 (en) Policy-based network security management
CN100435513C (en) Method of linking network equipment and invading detection system
US10701076B2 (en) Network management device at network edge for INS intrusion detection based on adjustable blacklisted sources
CN108809749B (en) Performing upper layer inspection of a stream based on a sampling rate
CN103746956A (en) Virtual honeypot
CN105049450A (en) Cloud security system based on virtual network environment and deployment framework of cloud security system
US20170134400A1 (en) Method for detecting malicious activity on an aircraft network
US10567441B2 (en) Distributed security system
CN109462621A (en) Network safety protective method, device and electronic equipment
US20160294848A1 (en) Method for protection of automotive components in intravehicle communication system
CN112583850B (en) Network attack protection method, device and system
CN106789982B (en) Safety protection method and system applied to industrial control system
Khan et al. FML: A novel forensics management layer for software defined networks
US9774628B2 (en) Method for analyzing suspicious activity on an aircraft network
CN112073376A (en) Attack detection method and device based on data plane
KR20110028106A (en) Apparatus for controlling distribute denial of service attack traffic based on source ip history and method thereof
Tran et al. Challenges of and solution to the control load of stateful firewall in software defined networks
CN103795590B (en) A kind of computational methods of network traffics detection threshold value
US20100157806A1 (en) Method for processing data packet load balancing and network equipment thereof
US7594263B2 (en) Operating a communication network through use of blocking measures for responding to communication traffic anomalies
CN111683063A (en) Message processing method, system, device, storage medium and processor
Ibrahim A comprehensive study of distributed denial of service attack with the detection techniques
CN115622808B (en) Method for secure isolation, electronic device, computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170915

WD01 Invention patent application deemed withdrawn after publication