CN108111342A - Based on visual threat warning methods of exhibiting - Google Patents
Based on visual threat warning methods of exhibiting Download PDFInfo
- Publication number
- CN108111342A CN108111342A CN201711351278.3A CN201711351278A CN108111342A CN 108111342 A CN108111342 A CN 108111342A CN 201711351278 A CN201711351278 A CN 201711351278A CN 108111342 A CN108111342 A CN 108111342A
- Authority
- CN
- China
- Prior art keywords
- threat
- information
- node
- exhibiting
- chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0677—Localisation of faults
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses one kind to be based on visual threat warning methods of exhibiting, including:Real-time threat monitoring is carried out to the assets information chain using Key Asset as node in system;When threatening event trigger alert, determine to threaten the position in assets information chain;With the threat level that the analysis of default basis for estimation threatens, the security score threatened is calculated with default computational methods;The identification information of threat and threat level and security score are shown in network topological diagram;When detecting that identification information is clicked, the specific nodal information of triggering display threat.By technical scheme, the logicality for threatening the accuracy showed and related information has been ensured, be effectively improved the treatment effeciency and accuracy of threat warning event, so as to improve the security of industrial control system operation.
Description
Technical field
The present invention relates to Information Visualization Technology fields more particularly to one kind to be based on visual threat warning displaying side
Method.
Background technology
It is to be in real time to industrial control system field network safe condition based on visual threat warning methods of exhibiting
The existing and alarm to unexpected abnormality event.Once alerting, scene prison screen personnel can notify that field maintenance person is real immediately
Ground overhauls, and active threat scene is handled.But in a practical situation, which still has several drawbacks, mainly
Including:
(1) degree of association is low.The core of field network safety is each equipment, the safety of each subregion under networking state,
So want the safe condition for showing network, it is necessary to which the safe condition of equipment, subregion is showed.But existing system for
There may be not comprehensive, imperfect for field device statistics.It is upper to each subregion, it is small to each accessory, only display does not embody, overall logic
The degree of association is low.When especially facing substantial amounts of field device, threat treatment effeciency is greatly reduced.Directly hinder the processing effect of problem
Fruit.
(2) it is not directly perceived enough.Even if in the case of completely statistics field device subregion, the alarm display information of existing system
Sometimes excessively redundancy or excessively specialty.User needs to take a significant amount of time study in the starting stage and receives training, once hair
Raw threat event, displaying result is not also directly perceived, is unfavorable for the threat of user's quick lock in emphasis so that treatment effeciency reduces, user
It is not high to experience satisfaction.
The content of the invention
Shortcoming present in regarding to the issue above is shown the present invention provides one kind based on visual threat warning
Method forms linear assets information chain as core by the typing to Key Asset information, and using Key Asset node,
When threat event occurs, pinpoint threat is shown in the position of assets chain in network opens up complement, and displaying is threatened also simultaneously
It is shown with high, normal, basic class, is related to equipment or subregion and safe coefficient is embodied with security score, to current threat node message depth point
Analysis, with nodal information before and after five-tuple information matches chain, and is shown with notable identification information, clicks on mark node, threat can
It is accurately positioned depending on changing, ensures the logicality for threatening the accuracy showed and related information, be effectively improved threat warning event
Treatment effeciency and accuracy, so as to improve industrial control system operation security.
To achieve the above object, the present invention provides one kind to be based on visual threat warning methods of exhibiting, including:To being
Assets information chain in system using Key Asset as node carries out real-time threat monitoring;When threatening event trigger alert, really
It is fixed to threaten the position in the assets information chain;The threat level of the threat is analyzed with default basis for estimation, with pre-
If computational methods calculate the security score of the threat;Identification information and the institute of the threat are shown in network topological diagram
State threat level and the security score;When detecting that the identification information is clicked, triggering shows the specific of the threat
Nodal information.
In the above-mentioned technical solutions, it is preferable that it is described when threatening event trigger alert, it determines to threaten and believe in the assets
Position in breath chain specifically includes:When threatening event trigger alert, depth analysis is carried out to node message and judges exception
Node message;According to the five-tuple of abnormal nodes message as a result, determining and the associated nodal information of five-tuple result;Root
It determines to threaten the position in the assets information chain according to nodal information.
In the above-mentioned technical solutions, it is preferable that the threat level that the threat is analyzed with default basis for estimation, with
The security score that default computational methods calculate the threat specifically includes:The equipment of node or region according to where the threat
Attribute and default equipment or region attribute and threat level correspondence, determine the threat level of the threat;
The equipment of node or the attribute in region according to where the threat calculate the weighted average of the different attribute of the region or equipment
Value is as security score.
In the above-mentioned technical solutions, it is preferable that the equipment of the Key Asset including the advance input system of user, area under one's jurisdiction and
Plant area, the assets information chain are the relation defined according to live borderless logic, and the nodal information is the advance typing of user
The corresponding equipment of the node, area under one's jurisdiction or the specifying information of plant area of system.
In the above-mentioned technical solutions, it is preferable that the network topological diagram is to be believed according to the node of the assets information chain
Cease the topology diagram of generation.
In the above-mentioned technical solutions, it is preferable that further included based on visual threat warning methods of exhibiting:It is determining to threaten
Behind position in the assets information chain, to described the equipment of corresponding node or region is threatened to send warning information.
In the above-mentioned technical solutions, it is preferable that further included based on visual threat warning methods of exhibiting:The institute that will be determined
Nodal information where stating the threat level of threat and security score and the threat is stored.
Compared with prior art, beneficial effects of the present invention are:It is provided by the typing to Key Asset information, and with key
Production node forms linear assets information chain for core, when the event of threat occurs, pinpoint threat in the position of assets chain,
And shown in network opens up complement, it threatens displaying that can also be shown simultaneously with high, normal, basic class, is related to equipment or subregion with security score
Safe coefficient is embodied, to current threat node message depth analysis, with nodal information before and after five-tuple information matches chain, and with
Significantly mark display clicks on mark node, visualization is threatened to be accurately positioned, and ensures and threatens the accuracy that shows and related information
Logicality is effectively improved the treatment effeciency and accuracy of threat warning event, so as to improve industrial control system operation
Security.
Description of the drawings
Fig. 1 flow diagrams based on visual threat warning methods of exhibiting disclosed in an embodiment of the present invention.
Specific embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
The part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people
Member's all other embodiments obtained on the premise of creative work is not made, belong to the scope of protection of the invention.
The present invention is described in further detail below in conjunction with the accompanying drawings:
As shown in Figure 1, a kind of embodiment based on visual threat warning methods of exhibiting provided according to the present invention, bag
It includes:Step S101 carries out real-time threat monitoring to the assets information chain using Key Asset as node in system;Step
S102 when threatening event trigger alert, determines to threaten the position in assets information chain;Step S103 is sentenced with default
The disconnected threat level threatened according to analysis calculates the security score threatened with default computational methods;Step S104, is opened up in network
The identification information for showing threat and threat level and security score are flutterred in figure;Step S105 is detecting identification information by point
When hitting, the specific nodal information of triggering display threat.
In such an embodiment, it is preferable when threatening event trigger alert, determine to threaten the position in assets information chain
It puts and specifically includes:When threatening event trigger alert, depth analysis is carried out to node message and judges abnormal node message;Root
According to the five-tuple of abnormal nodes message as a result, determining and the associated nodal information of five-tuple result;Prestige is determined according to nodal information
Coerce the position in assets information chain.
In such an embodiment, it is preferable with the threat level that the analysis of default basis for estimation threatens, with default calculating side
Method calculates the security score threatened and specifically includes:It the equipment of node or the attribute in region and default is set according to where threatening
The correspondence of standby or region attribute and threat level determines the threat level threatened;The equipment of node according to where threatening
Or the attribute in region, the weighted average of the different attribute of zoning or equipment is as security score.
In the above embodiment, it is preferable that Key Asset includes equipment, area under one's jurisdiction and the plant area of the advance input system of user,
Assets information chain is the relation defined according to live borderless logic, and nodal information corresponds to for the node of the advance input system of user
Equipment, area under one's jurisdiction or the specifying information of plant area.
In the above embodiment, it is preferable that network topological diagram is to be opened up according to what the nodal information of assets information chain generated
Flutter structure chart.
In this embodiment, specifically, assets information essentially from user's early period to the typing of Key Asset information and
The confirmation and amended record of later stage system discovery assets.Key node chain meets live borderless logic, and non-new introducing concept, chain is also
Non-actual existence is a kind of relation that system is defined according to live borderless logic.Once obtaining nodal information, system will be automatic
Generate network topological diagram.Wherein, the accuracy of assets information needs to be confirmed by user side and ensured.
Specifically, when system is in original state, user manually imports Key Asset information, i.e. equipment, area under one's jurisdiction and factory
The information such as area form assets information chain using the node of the Key Assets such as equipment, area under one's jurisdiction and plant area construction as core.When in system
During due to threatening event trigger alert, i.e., when certain equipment or certain region are abnormal event, system can be at once to threatening in assets
Position in information chain is positioned, and is shown in network topological diagram, and threatening can also be shown simultaneously with high, normal, basic class, be related to
Equipment or subregion embody safe coefficient with security score, and at the same time, system is to current threat node message depth analysis, five yuan
Nodal information before and after group information matching chain, determines with threatening associated default facility information, control loop, switchgear house or control
The information such as area processed, and linked according to the information of more than successful match in rapid position in backstage, it is shown with significant identification information.When
After user clicks on identified node, can accurately it be found in the network topological diagram of corresponding region where threatening.
The method proposed in the above embodiment of the present invention uses service logic key information match mechanism, with a large amount of complete
Chain information is database, ensures the accuracy for threatening and showing, and as tracing to the source before and after core expansion chain, ensures association
The logicality of information.Alarm event is shown by the way of security score, threat classification and network topological diagram, preferably
Cognitive ability of the user for known element and unknown threat has been bonded, has realized stable transition, compared to introducing professional term, skill
Art and cause system use complexity promoted situation, the convenience that user uses can be significantly improved.Based on chain information,
It realizes that the visualization for industrial control network is built, the space representation of chain information is furthermore achieved.Compared to tradition without figure
Or only the pattern of figure, image marking are more advantageous to directly discovery, summarize threat introductory path.Support security score,
The big known element of classification, network topological diagram three is threatened, the effective bridge for threatening and perceiving is formed, drastically increases user for prestige
The cognitive ability and treatment effeciency of the side of body.
In the above embodiment, it is preferable that it is further included based on visual threat warning methods of exhibiting:It is determining to threaten
Behind position in assets information chain, warning information is sent to the equipment or region for threatening corresponding node.
In this embodiment, after determining to threaten the position in assets information chain, shown incessantly in network topological diagram
The identification information of the demonstration side of body, also sends a warning message to equipment, area under one's jurisdiction or the subregion of node where the threat, to remind user's prestige
The generation of side of body event.Warning information is shown including screen identification, sound-light alarm etc..
In the above embodiment, it is preferable that it is further included based on visual threat warning methods of exhibiting:By definite threat
Threat level and security score and threaten where nodal information stored.
In this embodiment, will calculate or the threat level of threat that analysis obtains, security score and where threatening
Nodal information stores, so that the later stage consults the details of this threat event.
The above is embodiments of the present invention, it is contemplated that the degree of association of threat warning method is low, no in the prior art
The technical issues of enough directly perceived, the present invention proposes one kind based on visual threat warning methods of exhibiting, by Key Asset
The typing of information, and linear assets information chain is formed as core using Key Asset node, when the event of threat occurs, positioning
It threatens in the position of assets chain, and is shown in network opens up complement, threaten displaying that can also be shown simultaneously with high, normal, basic class, be related to
Equipment or subregion embody safe coefficient with security score, to current threat node message depth analysis, with five-tuple information matches
Nodal information before and after chain, and shown with notable identification information, mark node is clicked on, visualization is threatened to be accurately positioned, ensures prestige
The accuracy showed and the logicality of related information are coerced, is effectively improved the treatment effeciency and accuracy of threat warning event,
So as to improve the security of industrial control system operation.
It these are only the preferred embodiment of the present invention, be not intended to limit the invention, for those skilled in the art
For member, the invention may be variously modified and varied.Any modification within the spirit and principles of the invention, being made,
Equivalent substitution, improvement etc., should all be included in the protection scope of the present invention.
Claims (7)
1. one kind is based on visual threat warning methods of exhibiting, which is characterized in that including:
Real-time threat monitoring is carried out to the assets information chain using Key Asset as node in system;
When threatening event trigger alert, determine to threaten the position in the assets information chain;
The threat level of the threat is analyzed with default basis for estimation, the safety of the threat is calculated with default computational methods
Fraction;
The identification information of the threat and the threat level and the security score are shown in network topological diagram;
When detecting that node corresponding to the identification information is clicked, triggering shows the specific nodal information of the threat.
2. according to claim 1 be based on visual threat warning methods of exhibiting, which is characterized in that described when threat thing
During part triggering alarm, determine that the position in the assets information chain is threatened to specifically include:
When threatening event trigger alert, depth analysis is carried out to node message and judges abnormal node message;
According to the five-tuple of abnormal nodes message as a result, determining and the associated nodal information of five-tuple result;
It is determined to threaten the position in the assets information chain according to nodal information.
3. according to claim 1 be based on visual threat warning methods of exhibiting, which is characterized in that described with default
Basis for estimation analyzes the threat level of the threat, and the security score that the threat is calculated with default computational methods specifically wraps
It includes:
The equipment of node or the attribute in region and the attribute in default equipment or region and threat etc. according to where the threat
The correspondence of grade determines the threat level of the threat;
The equipment of node or the attribute in region, calculate the weighting of the different attribute of the region or equipment according to where the threat
Average value is as security score.
4. according to claim 1 be based on visual threat warning methods of exhibiting, which is characterized in that the Key Asset
Equipment, area under one's jurisdiction and plant area including the advance input system of user, the assets information chain are to be defined according to live borderless logic
Relation, the nodal information be the advance input system of user the corresponding equipment of the node, area under one's jurisdiction or the specific letter of plant area
Breath.
5. according to claim 1 be based on visual threat warning methods of exhibiting, which is characterized in that the network topology
Figure is the topology diagram generated according to the nodal information of the assets information chain.
6. according to claim 1 be based on visual threat warning methods of exhibiting, which is characterized in that further includes:
After determining to threaten the position in the assets information chain, the equipment for threatening corresponding node or region are sent out
Go out warning information.
7. according to claim 1 be based on visual threat warning methods of exhibiting, which is characterized in that further includes:It will be true
Nodal information where the threat level and security score of the fixed threat and the threat is stored.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711351278.3A CN108111342B (en) | 2017-12-15 | 2017-12-15 | Visualization-based threat alarm display method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711351278.3A CN108111342B (en) | 2017-12-15 | 2017-12-15 | Visualization-based threat alarm display method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108111342A true CN108111342A (en) | 2018-06-01 |
CN108111342B CN108111342B (en) | 2021-08-27 |
Family
ID=62217278
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711351278.3A Active CN108111342B (en) | 2017-12-15 | 2017-12-15 | Visualization-based threat alarm display method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108111342B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110753039A (en) * | 2019-09-29 | 2020-02-04 | 苏州浪潮智能科技有限公司 | Method and device for remote login safety protection |
CN111880708A (en) * | 2020-07-31 | 2020-11-03 | 北京微步在线科技有限公司 | Interaction method and storage medium for network attack event graph |
WO2020233251A1 (en) * | 2019-05-17 | 2020-11-26 | 深圳前海微众银行股份有限公司 | Data management method and device |
CN112202764A (en) * | 2020-09-28 | 2021-01-08 | 中远海运科技股份有限公司 | Network attack link visualization system, method and server |
CN113472725A (en) * | 2020-03-31 | 2021-10-01 | 阿里巴巴集团控股有限公司 | Data processing method and device |
CN114338110A (en) * | 2021-12-20 | 2022-04-12 | 上海纽盾科技股份有限公司 | Prediction defense method, device and system for threat information in situation awareness |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101436967A (en) * | 2008-12-23 | 2009-05-20 | 北京邮电大学 | Method and system for evaluating network safety situation |
WO2010034060A1 (en) * | 2008-09-24 | 2010-04-01 | Iintegrate Systems Pty Ltd | Alert generation system and method |
CN102170431A (en) * | 2011-03-25 | 2011-08-31 | 中国电子科技集团公司第三十研究所 | Host risk evaluation method and device |
CN103166794A (en) * | 2013-02-22 | 2013-06-19 | 中国人民解放军91655部队 | Information security management method with integration security control function |
CN104348667A (en) * | 2014-11-11 | 2015-02-11 | 上海新炬网络技术有限公司 | Fault positioning method based on warning information |
CN106254137A (en) * | 2016-08-30 | 2016-12-21 | 广州汇通国信信息科技有限公司 | The alarm root-cause analysis system and method for supervisory systems |
CN106357470A (en) * | 2016-11-15 | 2017-01-25 | 中国电子科技集团公司第四十研究所 | Quick sensing method for network threat based on SDN controller |
-
2017
- 2017-12-15 CN CN201711351278.3A patent/CN108111342B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010034060A1 (en) * | 2008-09-24 | 2010-04-01 | Iintegrate Systems Pty Ltd | Alert generation system and method |
CN101436967A (en) * | 2008-12-23 | 2009-05-20 | 北京邮电大学 | Method and system for evaluating network safety situation |
CN102170431A (en) * | 2011-03-25 | 2011-08-31 | 中国电子科技集团公司第三十研究所 | Host risk evaluation method and device |
CN103166794A (en) * | 2013-02-22 | 2013-06-19 | 中国人民解放军91655部队 | Information security management method with integration security control function |
CN104348667A (en) * | 2014-11-11 | 2015-02-11 | 上海新炬网络技术有限公司 | Fault positioning method based on warning information |
CN106254137A (en) * | 2016-08-30 | 2016-12-21 | 广州汇通国信信息科技有限公司 | The alarm root-cause analysis system and method for supervisory systems |
CN106357470A (en) * | 2016-11-15 | 2017-01-25 | 中国电子科技集团公司第四十研究所 | Quick sensing method for network threat based on SDN controller |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020233251A1 (en) * | 2019-05-17 | 2020-11-26 | 深圳前海微众银行股份有限公司 | Data management method and device |
CN110753039A (en) * | 2019-09-29 | 2020-02-04 | 苏州浪潮智能科技有限公司 | Method and device for remote login safety protection |
CN113472725A (en) * | 2020-03-31 | 2021-10-01 | 阿里巴巴集团控股有限公司 | Data processing method and device |
CN111880708A (en) * | 2020-07-31 | 2020-11-03 | 北京微步在线科技有限公司 | Interaction method and storage medium for network attack event graph |
CN112202764A (en) * | 2020-09-28 | 2021-01-08 | 中远海运科技股份有限公司 | Network attack link visualization system, method and server |
CN114338110A (en) * | 2021-12-20 | 2022-04-12 | 上海纽盾科技股份有限公司 | Prediction defense method, device and system for threat information in situation awareness |
CN114338110B (en) * | 2021-12-20 | 2024-05-10 | 上海纽盾科技股份有限公司 | Method, device and system for predicting and defending threat information in situation awareness |
Also Published As
Publication number | Publication date |
---|---|
CN108111342B (en) | 2021-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108111342A (en) | Based on visual threat warning methods of exhibiting | |
CN105163091B (en) | Pump station engineering management integrated linkage system | |
CN108174165A (en) | Electric power safety operation and O&M intelligent monitoring system and method | |
CN110087099A (en) | A kind of monitoring method and system for protecting privacy | |
CN106899691A (en) | A kind of Intelligent internet of things monitoring system and method based on cloud platform | |
CN103617699A (en) | Intelligent safety monitor system of electric power working site | |
US11729597B2 (en) | Digital twin disaster management system customized for underground public areas | |
CN111814601A (en) | Video analysis method combining target detection and human body posture estimation | |
CN106572329A (en) | Precise recognition system for video monitoring image | |
CN110705482A (en) | Personnel behavior alarm prompt system based on video AI intelligent analysis | |
CN104484836B (en) | A kind of electric network fault aid decision visualization system and its method | |
CN109164780A (en) | A kind of industrial field device control method based on edge calculations, apparatus and system | |
CN111811516A (en) | Factory personnel positioning and safety early warning system | |
CN110674790A (en) | Abnormal scene processing method and system in video monitoring | |
CN111476979A (en) | Intelligent security and stability maintenance method and system based on multi-model analysis | |
CN115100813B (en) | Intelligent community system based on digital twins | |
CN115567690A (en) | Intelligent monitoring system capable of automatically identifying dangerous points of field operation | |
CN110379121A (en) | A kind of hazard alarm method and server | |
CN108711256A (en) | The energy saving intellectual analysis of the personal safety by all kinds of means alarm method of one kind and system | |
CN109977856B (en) | Method for identifying complex behaviors in multi-source video | |
Xu et al. | Green social CPS based e-healthcare systems to control the spread of infectious diseases | |
CN107920224B (en) | Abnormity warning method, abnormity warning equipment and video monitoring system | |
CN111228706A (en) | GIS-based building interior fire fighting equipment control method and device | |
CN112887594B (en) | Method and system for improving video conference security | |
CN106507037A (en) | Intelligent control method and system that personnel invade/cross the border |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Hou Zhanying Inventor after: Zhou Wenjun Inventor before: Zhou Lei Inventor before: Zhou Wenjun Inventor before: Jiang Shuanglin |
|
GR01 | Patent grant | ||
GR01 | Patent grant |