CN107171867A - The guard system of ddos attack - Google Patents
The guard system of ddos attack Download PDFInfo
- Publication number
- CN107171867A CN107171867A CN201710525640.8A CN201710525640A CN107171867A CN 107171867 A CN107171867 A CN 107171867A CN 201710525640 A CN201710525640 A CN 201710525640A CN 107171867 A CN107171867 A CN 107171867A
- Authority
- CN
- China
- Prior art keywords
- module
- ddos attack
- network status
- data
- status data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/22—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of guard system of DDOS attack, including:Acquisition module is used to gather network status data;Pretreatment module is used to be screened network status data according to the first preset rules;Judge module is used to judge whether pretreatment network status data is ddos attack data according to the second preset rules, if it is, the IP address of ddos attack data and corresponding user is sent into alarm module;Alarm module is used to judge whether current time belongs to the first preset time, if it is not, then generation warning information is sent to monitor terminal, and the IP address of ddos attack data and corresponding user is sent into lockout module;Lockout module is used to carry out block processing to ddos attack data and the IP address of corresponding user;Unsealing module is used for when current time exceeds the second preset time, and the ddos attack data and the IP address of corresponding user sent to lockout module carry out deblocking processing;Monitor terminal is used to pretreatment network status data carrying out visualization processing and is shown.
Description
Technical field
The present invention relates to network technique field, more particularly to a kind of guard system of ddos attack.
Background technology
With the development of Internet technology, production, life are increasingly improved for the degree of dependence of internet, and network security is needed
Ask and particularly highlight.Distributed denial of service (Distributed Denial of Service, DDoS) attack refer to one or
Multiple attackers, while sending substantial amounts of data to some target, are finally led by controlling substantial amounts of computer to be used as attack source
Cause a kind of network behavior of malice of target paralysis.
The implementation protected at present for DDoS, mainly there is following several ways:
(1) safeguard
By using support high bandwidth, the professional safeguard of high-throughput, realized according to prevention policies to the clear of flow
Wash, the flow after cleaning is forwarded to real service.Such a solution is, it is necessary to which reserved extra high bandwidth and purchase specialty are anti-
Protect equipment.
(2) cloud shield is serviced
Request flow is realized by cloud platform content distributing network (Content Delivery Network, CDN) mode
Shunting, by the parsing of the domain name system (Domain Name System, DNS) of user's domain name to protection cloud network, with reverse generation
Reason mode, customer flow is shared in cloud service, and flow cleaning is realized by soft prevention policies, blocks abnormal flow and asks
Ask, the flow after cleaning is forwarded to user's real service.The inbound traffics that go out of such a situation request all can be by protection cloud network.
Such a solution is, it is necessary to buy cloud shield service, and it also requires source station has good support to CDN service.
(3) blackhole route
In the network device, the flow in exception request source is introduced into blackhole route, request is abandoned quietly, and do not denote that original
Cause, to reach protective action.Such a solution need to judge the network address of anomaly source, and need routing device, may seal
Block up normal flow.
Current guard technology existing on the market, needs the extra equipment of buying or service, and need the network of specialty more
Personnel are safeguarded, add purchase cost and maintenance cost.
The content of the invention
The invention provides a kind of guard system of ddos attack, to solve ddos attack protection needs of the prior art
The problem of extra increase purchase cost and maintenance cost.
The embodiments of the invention provide a kind of guard system of ddos attack, including:Server and monitor terminal;
The server includes acquisition module, pretreatment module, judge module, alarm module, lockout module and deblocking mould
Block;
The acquisition module is used for, and gathers network status data, the network status data comprising user accesses data and
Corresponding IP address;
The pretreatment module is used for, and the network status data is screened according to the first preset rules, obtains pre-
Handle network status data;
The judge module is used for, and judges whether the pretreatment network status data is DDoS according to the second preset rules
Data are attacked, if it is, the IP address of the ddos attack data and corresponding user is sent into alarm module;
The alarm module is used for, and judges whether current time belongs to the first preset time, if it is not, then generation alarm letter
Breath is sent to monitor terminal, and the IP address of the ddos attack data and corresponding user is sent into lockout module;
The lockout module is used for, and block processing is carried out to the ddos attack data and the IP address of corresponding user;
The deblocking module is used for, when current time exceeds the second preset time, the institute sent to the lockout module
The IP address for stating ddos attack data and corresponding user carries out deblocking processing;
The monitor terminal is used for, and the pretreatment network status data that the pretreatment module is sent is received, by institute
Pretreatment network status data is stated to carry out visualization processing and be shown.
Further, the system also includes memory module;
The memory module is used to the pretreatment network status data being stored in influxdb databases.
Further, the monitor terminal specifically for:
The pretreatment network status data that the pretreatment module is sent is received, using grafana by the pre- place
Reason network status data carries out visualization processing and is shown.
Further, the lockout module specifically for:
Generate the block order to the ddos attack data and the IP address of corresponding user;
The block order is carried on fire wall iptables.
Further, it is described deblocking module specifically for:
When current time exceeds the second preset time, revocation is carried in the block order on the iptables.
The guard system of ddos attack provided in an embodiment of the present invention, acquisition module collection network status data is network-like
State packet contains user accesses data and corresponding IP address;Pretreatment module is used for, by network status data according to
One preset rules are screened, and obtain pre-processing network status data;Judge module judges to pre-process according to the second preset rules
Whether network status data is ddos attack data, if it is, ddos attack data and the IP address of corresponding user are sent
To alarm module;Alarm module judges whether current time belongs to the first preset time, if it is not, then generation warning information is sent
Lockout module is sent to monitor terminal, and by the IP address of ddos attack data and corresponding user;Lockout module is to DDoS
The IP address for attacking data and corresponding user carries out block processing;Module is unsealed when current time exceeds the second preset time
When, the ddos attack data and the IP address of corresponding user sent to lockout module carry out deblocking processing;Monitor terminal is received
The pretreatment network status data that pretreatment module is sent, carries out visualization processing by pretreatment network status data and carries out exhibition
Show.System provided in an embodiment of the present invention, based on the linux operating systems increased income, in zero purchase cost and zero maintenance cost
In the case of realize the protection of ddos attack.Directly can independently be deployed in the front end of each application service, can also support it is distributed and
Concentrate displaying, it is easy to which deployment and maintenance, friendly interface, alarm mode are various.
Brief description of the drawings
Fig. 1 is the schematic diagram of the guard system of ddos attack provided in an embodiment of the present invention.
Embodiment
In order that the object, technical solutions and advantages of the present invention are clearer, below in conjunction with accompanying drawing the present invention is made into
One step it is described in detail, it is clear that described embodiment is only embodiment of the invention a part of, rather than whole implementation
Example.Based on the embodiment in the present invention, what those of ordinary skill in the art were obtained under the premise of creative work is not made
All other embodiment, belongs to the scope of protection of the invention.
The present invention combines iptables (the integrated fire wall of linux operating system nucleus of increasing income), grafana and (increased income
Measure instrument board and graphic editor), influxdb (distributed sequential of increasing income, event and achievement data storehouse), python it is (a kind of
Programming language), realization can configure, can manage, visualize, can alert, the mode of clustering effectively predicts ddos attacks,
Protect ddos attacks, alarm ddos attacks.
The present invention has advantages below:
1st, without reserved bandwidth:Purpose of design of the present invention is to be protected for lightweight DDoS, is detecting ddos attack row
For when, use discarding or speed limit strategy.
2nd, without reverse proxy:Because the present invention is realized based on linux kernel, most of equal base of system architecture on the market at present
In Linux system environment of increasing income, the system can be directly integrated in the existing application service framework front end of user.
3rd, without the network equipment:Because the system realizes that preventing principle is the iptables modules based on linux kernel, the mould
Block is supported to route, the function such as fire wall.
With reference to the guard system schematic diagram of the ddos attack shown in Fig. 1, DDoS provided in an embodiment of the present invention is attacked
The guard system hit is described in detail.
As shown in figure 1, the guard system for the ddos attack that the present invention is provided mainly includes:Server 1 and monitor terminal 2;
Server 1 includes acquisition module 11, pretreatment module 12, judge module 13, alarm module 14, the and of lockout module 15
Unseal module 16.
Acquisition module 11 is used for, and gathers network status data, and network status data includes user accesses data and corresponding
IP address.
Specifically, previously generate configuration file, data format defined in configuration file with the addition of parameter, acquisition module
The 11 rule collection network status data in configuration file.Contained in network status data all by current server
Network connection data and correspondence access network connection user IP address.
Pretreatment module 12 is used for, and network status data is screened according to the first preset rules, obtains pre-processing net
Network status data.
After the network status data for receiving the collection of acquisition module 11, pretreatment module 12 is according to default screening conditions
Screened, the first preset rules are the screening conditions rule that those skilled in the art are set according to specific needs.
Judge module 13 is used for, and judges whether pretreatment network status data is ddos attack number according to the second preset rules
According to if it is, the IP address of ddos attack data and corresponding user is sent into alarm module.
Wherein, the second preset rules are the rule that those skilled in the art define according to specific needs.It is default using second
Rule is analyzed network status data, filters out abnormal network status data, then by abnormal network status data and white name
Singly it is compared, goes unless ddos attack data, finally give ddos attack data.
For example, the second preset rules can be in some period, the user of some IP address initiates request 10 times, significantly
Exceed default 5 times, then judged the network status data for abnormal network status number.
In addition, judge module also needs to judge current mode of operation, if listening mode, then ddos attack number is recorded
According to, do not do other processing;If non-snoop mode, then the IP address of ddos attack data and corresponding user is sent to announcement
Alert module is handled.
Alarm module 14 is used for, and judges whether current time belongs to the first preset time, if it is not, then generation warning information
Monitor terminal is sent to, and the IP address of ddos attack data and corresponding user is sent to lockout module.
Wherein, the first preset time is the maintenance time section that those skilled in the art are set according to specific needs.
If current time belongs to maintenance time section, do not process.If belonging to non-maintenance time section, according to DDoS
The content information and characteristic information generation warning information of data are attacked, and by ddos attack data and the IP address of corresponding user
Lockout module is sent to be handled.
Wherein, warning information can be specifically the alarm email information or sound alarm sent to monitor terminal
The warning information of the other forms such as information.
Lockout module 15 is used for, and block processing is carried out to ddos attack data and the IP address of corresponding user.
Specifically, block order of the generation to ddos attack data and the IP address of corresponding user;Block order is added
It is loaded on fire wall iptables.
Other locking methods that those skilled in the art can draw without involving an inventive effort are thought to belong to this hair
The protection domain of bright technical scheme.
Deblocking module 16 is used for, when current time exceeds the second preset time, the ddos attack sent to lockout module
Data and the IP address of corresponding user carry out deblocking processing.
Specifically, when current time exceeds the second preset time, revocation is carried in the block order on iptables.
After ddos attack data locking preset time, if current time exceeds the blocking time section pre-set,
Release the block order being carried on fire wall.
In addition, system also includes memory module 17;
Memory module 17 is used to pretreatment network status data being stored in influxdb databases.
Monitor terminal 2 is used for, and receives the pretreatment network status data that pretreatment module 12 is sent, will pre-process network-like
State data carry out visualization processing and are shown.
Specifically, receiving the network status data that pretreatment module 12 is sent, network status data is entered using grafana
Row visualization processing is simultaneously shown.
The guard system of ddos attack provided in an embodiment of the present invention, acquisition module collection network status data is network-like
State packet contains user accesses data and corresponding IP address;Judge module judges network state according to the first preset rules
Whether data are ddos attack data, if it is, the IP address of ddos attack data and corresponding user is sent into alarm mould
Block;Alarm module judges whether current time belongs to the first preset time, if it is not, then generation warning information is sent to monitoring eventually
End, and the IP address of ddos attack data and corresponding user is sent to lockout module;Lockout module is used for ddos attack
Data and the IP address of corresponding user carry out block processing;Unsealing module is used for when current time exceeds the first preset time
When, the ddos attack data and the IP address of corresponding user sent to lockout module carry out deblocking processing;Monitor terminal is used for
The network status data that acquisition module is sent is received, network status data is subjected to visualization processing and is shown.The present invention
The system that embodiment is provided, based on the linux operating systems increased income, is realized in the case of zero purchase cost and zero maintenance cost
The protection of ddos attack.The front end of each application service directly can be independently deployed in, can also support distributed and concentrate displaying, easily
In deployment and maintenance, friendly interface, alarm mode is various.
Professional should further appreciate that, each example described with reference to the embodiments described herein
Unit and algorithm steps, can be realized with electronic hardware, be generally described respectively according to function in the above description
The composition and step of example.Function described by being realized to each specific application using distinct methods, but this reality
Now it is not considered that beyond the scope of the embodiment of the present invention.Specifically, the computing and control section can dredging collateral logic hardwares
Realize, it can be the logical integrated circuit manufactured using integrated circuit technology, and the present embodiment is not construed as limiting to this.
The method that is described with reference to the embodiments described herein can use hardware, computing device the step of algorithm
Software module, or the two combination are implemented.Software module can be placed in random access memory (RAM), internal memory, read-only storage
(ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field
In any other form of storage medium well known to interior.
Above-described embodiment, purpose, technical scheme and beneficial effect to the embodiment of the present invention are carried out
It is further described, should be understood that the embodiment that the foregoing is only the embodiment of the present invention, and without
It is all within the spirit and principle of the embodiment of the present invention in the protection domain for limiting the embodiment of the present invention, any modification for being made,
Equivalent substitution, improvement etc., should be included within the protection domain of the embodiment of the present invention.
Claims (5)
1. a kind of guard system of ddos attack, it is characterised in that the system includes:Server and monitor terminal;
The server includes acquisition module, pretreatment module, judge module, alarm module, lockout module and deblocking module;
The acquisition module is used for, and gathers network status data, the network status data is comprising user accesses data and correspondingly
IP address;
The pretreatment module is used for, and the network status data is screened according to the first preset rules, pre-processed
Network status data;
The judge module is used for, and judges whether the pretreatment network status data is ddos attack according to the second preset rules
Data, if it is, the IP address of the ddos attack data and corresponding user is sent into alarm module;
The alarm module is used for, and judges whether current time belongs to the first preset time, if it is not, then generation warning information hair
Monitor terminal is given, and the IP address of the ddos attack data and corresponding user is sent to lockout module;
The lockout module is used for, and block processing is carried out to the ddos attack data and the IP address of corresponding user;
The deblocking module is used for, when current time exceeds the second preset time, to described in lockout module transmission
Ddos attack data and the IP address of corresponding user carry out deblocking processing;
The monitor terminal is used for, and receives the pretreatment network status data that the pretreatment module is sent, will be described pre-
Processing network status data carries out visualization processing and is shown.
2. the guard system of ddos attack according to claim 1, it is characterised in that the system also includes storage mould
Block;
The memory module is used to the pretreatment network status data being stored in influxdb databases.
3. the guard system of ddos attack according to claim 1, it is characterised in that the monitor terminal specifically for:
The pretreatment network status data that the pretreatment module is sent is received, using grafana by the pretreatment net
Network status data carries out visualization processing and is shown.
4. the guard system of ddos attack according to claim 1, it is characterised in that the lockout module specifically for:
Generate the block order to the ddos attack data and the IP address of corresponding user;
The block order is carried on fire wall iptables.
5. the guard system of ddos attack according to claim 4, it is characterised in that the deblocking module specifically for:
When current time exceeds the second preset time, revocation is carried in the block order on the iptables.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710525640.8A CN107171867A (en) | 2017-06-30 | 2017-06-30 | The guard system of ddos attack |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710525640.8A CN107171867A (en) | 2017-06-30 | 2017-06-30 | The guard system of ddos attack |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107171867A true CN107171867A (en) | 2017-09-15 |
Family
ID=59827659
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710525640.8A Pending CN107171867A (en) | 2017-06-30 | 2017-06-30 | The guard system of ddos attack |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107171867A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109067770A (en) * | 2018-09-05 | 2018-12-21 | 高新兴科技集团股份有限公司 | The flow attacking control method and computer storage medium of Internet of things system |
CN110620787A (en) * | 2019-09-30 | 2019-12-27 | 怀来斯达铭数据有限公司 | Method and system for preventing DDoS attack |
CN111241543A (en) * | 2020-01-07 | 2020-06-05 | 中国搜索信息科技股份有限公司 | Method and system for intelligently resisting DDoS attack by application layer |
CN111786962A (en) * | 2020-06-12 | 2020-10-16 | 广州市和昊信息技术有限公司 | Network security monitoring system |
CN115811428A (en) * | 2022-11-28 | 2023-03-17 | 济南大学 | Defense method, system, equipment and storage medium for resisting DDoS attack |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101588246A (en) * | 2008-05-23 | 2009-11-25 | 成都市华为赛门铁克科技有限公司 | Method, network equipment and network system for defending distributed denial service DDoS attack |
CN101834866A (en) * | 2010-05-05 | 2010-09-15 | 北京来安科技有限公司 | CC (Communication Center) attack protective method and system thereof |
US20150047038A1 (en) * | 2013-08-09 | 2015-02-12 | International Business Machines Corporation | Techniques for validating distributed denial of service attacks based on social media content |
CN105827615A (en) * | 2016-04-22 | 2016-08-03 | 浪潮电子信息产业股份有限公司 | Optimization method for preventing DDOS attack by Smart Rack |
CN106506527A (en) * | 2016-12-05 | 2017-03-15 | 国云科技股份有限公司 | A kind of method of the defence connectionless flood attacks of UDP |
-
2017
- 2017-06-30 CN CN201710525640.8A patent/CN107171867A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101588246A (en) * | 2008-05-23 | 2009-11-25 | 成都市华为赛门铁克科技有限公司 | Method, network equipment and network system for defending distributed denial service DDoS attack |
CN101834866A (en) * | 2010-05-05 | 2010-09-15 | 北京来安科技有限公司 | CC (Communication Center) attack protective method and system thereof |
US20150047038A1 (en) * | 2013-08-09 | 2015-02-12 | International Business Machines Corporation | Techniques for validating distributed denial of service attacks based on social media content |
CN105827615A (en) * | 2016-04-22 | 2016-08-03 | 浪潮电子信息产业股份有限公司 | Optimization method for preventing DDOS attack by Smart Rack |
CN106506527A (en) * | 2016-12-05 | 2017-03-15 | 国云科技股份有限公司 | A kind of method of the defence connectionless flood attacks of UDP |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109067770A (en) * | 2018-09-05 | 2018-12-21 | 高新兴科技集团股份有限公司 | The flow attacking control method and computer storage medium of Internet of things system |
CN109067770B (en) * | 2018-09-05 | 2021-04-23 | 高新兴科技集团股份有限公司 | Flow attack control method for internet of things system and computer storage medium |
CN110620787A (en) * | 2019-09-30 | 2019-12-27 | 怀来斯达铭数据有限公司 | Method and system for preventing DDoS attack |
CN111241543A (en) * | 2020-01-07 | 2020-06-05 | 中国搜索信息科技股份有限公司 | Method and system for intelligently resisting DDoS attack by application layer |
CN111786962A (en) * | 2020-06-12 | 2020-10-16 | 广州市和昊信息技术有限公司 | Network security monitoring system |
CN115811428A (en) * | 2022-11-28 | 2023-03-17 | 济南大学 | Defense method, system, equipment and storage medium for resisting DDoS attack |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107171867A (en) | The guard system of ddos attack | |
US9407602B2 (en) | Methods and apparatus for redirecting attacks on a network | |
AU2004282937B2 (en) | Policy-based network security management | |
CN100435513C (en) | Method of linking network equipment and invading detection system | |
US10701076B2 (en) | Network management device at network edge for INS intrusion detection based on adjustable blacklisted sources | |
CN108809749B (en) | Performing upper layer inspection of a stream based on a sampling rate | |
CN103746956A (en) | Virtual honeypot | |
CN105049450A (en) | Cloud security system based on virtual network environment and deployment framework of cloud security system | |
US20170134400A1 (en) | Method for detecting malicious activity on an aircraft network | |
US10567441B2 (en) | Distributed security system | |
CN109462621A (en) | Network safety protective method, device and electronic equipment | |
US20160294848A1 (en) | Method for protection of automotive components in intravehicle communication system | |
CN112583850B (en) | Network attack protection method, device and system | |
CN106789982B (en) | Safety protection method and system applied to industrial control system | |
Khan et al. | FML: A novel forensics management layer for software defined networks | |
US9774628B2 (en) | Method for analyzing suspicious activity on an aircraft network | |
CN112073376A (en) | Attack detection method and device based on data plane | |
KR20110028106A (en) | Apparatus for controlling distribute denial of service attack traffic based on source ip history and method thereof | |
Tran et al. | Challenges of and solution to the control load of stateful firewall in software defined networks | |
CN103795590B (en) | A kind of computational methods of network traffics detection threshold value | |
US20100157806A1 (en) | Method for processing data packet load balancing and network equipment thereof | |
US7594263B2 (en) | Operating a communication network through use of blocking measures for responding to communication traffic anomalies | |
CN111683063A (en) | Message processing method, system, device, storage medium and processor | |
Ibrahim | A comprehensive study of distributed denial of service attack with the detection techniques | |
CN115622808B (en) | Method for secure isolation, electronic device, computer readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170915 |
|
WD01 | Invention patent application deemed withdrawn after publication |