CN108111342A - Based on visual threat warning methods of exhibiting - Google Patents

Based on visual threat warning methods of exhibiting Download PDF

Info

Publication number
CN108111342A
CN108111342A CN201711351278.3A CN201711351278A CN108111342A CN 108111342 A CN108111342 A CN 108111342A CN 201711351278 A CN201711351278 A CN 201711351278A CN 108111342 A CN108111342 A CN 108111342A
Authority
CN
China
Prior art keywords
threat
information
node
exhibiting
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711351278.3A
Other languages
Chinese (zh)
Other versions
CN108111342B (en
Inventor
周磊
周文军
姜双林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Huachuang Network Security Polytron Technologies Inc
Original Assignee
Beijing Huachuang Network Security Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Huachuang Network Security Polytron Technologies Inc filed Critical Beijing Huachuang Network Security Polytron Technologies Inc
Priority to CN201711351278.3A priority Critical patent/CN108111342B/en
Publication of CN108111342A publication Critical patent/CN108111342A/en
Application granted granted Critical
Publication of CN108111342B publication Critical patent/CN108111342B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0677Localisation of faults
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses one kind to be based on visual threat warning methods of exhibiting, including:Real-time threat monitoring is carried out to the assets information chain using Key Asset as node in system;When threatening event trigger alert, determine to threaten the position in assets information chain;With the threat level that the analysis of default basis for estimation threatens, the security score threatened is calculated with default computational methods;The identification information of threat and threat level and security score are shown in network topological diagram;When detecting that identification information is clicked, the specific nodal information of triggering display threat.By technical scheme, the logicality for threatening the accuracy showed and related information has been ensured, be effectively improved the treatment effeciency and accuracy of threat warning event, so as to improve the security of industrial control system operation.

Description

Based on visual threat warning methods of exhibiting
Technical field
The present invention relates to Information Visualization Technology fields more particularly to one kind to be based on visual threat warning displaying side Method.
Background technology
It is to be in real time to industrial control system field network safe condition based on visual threat warning methods of exhibiting The existing and alarm to unexpected abnormality event.Once alerting, scene prison screen personnel can notify that field maintenance person is real immediately Ground overhauls, and active threat scene is handled.But in a practical situation, which still has several drawbacks, mainly Including:
(1) degree of association is low.The core of field network safety is each equipment, the safety of each subregion under networking state, So want the safe condition for showing network, it is necessary to which the safe condition of equipment, subregion is showed.But existing system for There may be not comprehensive, imperfect for field device statistics.It is upper to each subregion, it is small to each accessory, only display does not embody, overall logic The degree of association is low.When especially facing substantial amounts of field device, threat treatment effeciency is greatly reduced.Directly hinder the processing effect of problem Fruit.
(2) it is not directly perceived enough.Even if in the case of completely statistics field device subregion, the alarm display information of existing system Sometimes excessively redundancy or excessively specialty.User needs to take a significant amount of time study in the starting stage and receives training, once hair Raw threat event, displaying result is not also directly perceived, is unfavorable for the threat of user's quick lock in emphasis so that treatment effeciency reduces, user It is not high to experience satisfaction.
The content of the invention
Shortcoming present in regarding to the issue above is shown the present invention provides one kind based on visual threat warning Method forms linear assets information chain as core by the typing to Key Asset information, and using Key Asset node, When threat event occurs, pinpoint threat is shown in the position of assets chain in network opens up complement, and displaying is threatened also simultaneously It is shown with high, normal, basic class, is related to equipment or subregion and safe coefficient is embodied with security score, to current threat node message depth point Analysis, with nodal information before and after five-tuple information matches chain, and is shown with notable identification information, clicks on mark node, threat can It is accurately positioned depending on changing, ensures the logicality for threatening the accuracy showed and related information, be effectively improved threat warning event Treatment effeciency and accuracy, so as to improve industrial control system operation security.
To achieve the above object, the present invention provides one kind to be based on visual threat warning methods of exhibiting, including:To being Assets information chain in system using Key Asset as node carries out real-time threat monitoring;When threatening event trigger alert, really It is fixed to threaten the position in the assets information chain;The threat level of the threat is analyzed with default basis for estimation, with pre- If computational methods calculate the security score of the threat;Identification information and the institute of the threat are shown in network topological diagram State threat level and the security score;When detecting that the identification information is clicked, triggering shows the specific of the threat Nodal information.
In the above-mentioned technical solutions, it is preferable that it is described when threatening event trigger alert, it determines to threaten and believe in the assets Position in breath chain specifically includes:When threatening event trigger alert, depth analysis is carried out to node message and judges exception Node message;According to the five-tuple of abnormal nodes message as a result, determining and the associated nodal information of five-tuple result;Root It determines to threaten the position in the assets information chain according to nodal information.
In the above-mentioned technical solutions, it is preferable that the threat level that the threat is analyzed with default basis for estimation, with The security score that default computational methods calculate the threat specifically includes:The equipment of node or region according to where the threat Attribute and default equipment or region attribute and threat level correspondence, determine the threat level of the threat; The equipment of node or the attribute in region according to where the threat calculate the weighted average of the different attribute of the region or equipment Value is as security score.
In the above-mentioned technical solutions, it is preferable that the equipment of the Key Asset including the advance input system of user, area under one's jurisdiction and Plant area, the assets information chain are the relation defined according to live borderless logic, and the nodal information is the advance typing of user The corresponding equipment of the node, area under one's jurisdiction or the specifying information of plant area of system.
In the above-mentioned technical solutions, it is preferable that the network topological diagram is to be believed according to the node of the assets information chain Cease the topology diagram of generation.
In the above-mentioned technical solutions, it is preferable that further included based on visual threat warning methods of exhibiting:It is determining to threaten Behind position in the assets information chain, to described the equipment of corresponding node or region is threatened to send warning information.
In the above-mentioned technical solutions, it is preferable that further included based on visual threat warning methods of exhibiting:The institute that will be determined Nodal information where stating the threat level of threat and security score and the threat is stored.
Compared with prior art, beneficial effects of the present invention are:It is provided by the typing to Key Asset information, and with key Production node forms linear assets information chain for core, when the event of threat occurs, pinpoint threat in the position of assets chain, And shown in network opens up complement, it threatens displaying that can also be shown simultaneously with high, normal, basic class, is related to equipment or subregion with security score Safe coefficient is embodied, to current threat node message depth analysis, with nodal information before and after five-tuple information matches chain, and with Significantly mark display clicks on mark node, visualization is threatened to be accurately positioned, and ensures and threatens the accuracy that shows and related information Logicality is effectively improved the treatment effeciency and accuracy of threat warning event, so as to improve industrial control system operation Security.
Description of the drawings
Fig. 1 flow diagrams based on visual threat warning methods of exhibiting disclosed in an embodiment of the present invention.
Specific embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is The part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people Member's all other embodiments obtained on the premise of creative work is not made, belong to the scope of protection of the invention.
The present invention is described in further detail below in conjunction with the accompanying drawings:
As shown in Figure 1, a kind of embodiment based on visual threat warning methods of exhibiting provided according to the present invention, bag It includes:Step S101 carries out real-time threat monitoring to the assets information chain using Key Asset as node in system;Step S102 when threatening event trigger alert, determines to threaten the position in assets information chain;Step S103 is sentenced with default The disconnected threat level threatened according to analysis calculates the security score threatened with default computational methods;Step S104, is opened up in network The identification information for showing threat and threat level and security score are flutterred in figure;Step S105 is detecting identification information by point When hitting, the specific nodal information of triggering display threat.
In such an embodiment, it is preferable when threatening event trigger alert, determine to threaten the position in assets information chain It puts and specifically includes:When threatening event trigger alert, depth analysis is carried out to node message and judges abnormal node message;Root According to the five-tuple of abnormal nodes message as a result, determining and the associated nodal information of five-tuple result;Prestige is determined according to nodal information Coerce the position in assets information chain.
In such an embodiment, it is preferable with the threat level that the analysis of default basis for estimation threatens, with default calculating side Method calculates the security score threatened and specifically includes:It the equipment of node or the attribute in region and default is set according to where threatening The correspondence of standby or region attribute and threat level determines the threat level threatened;The equipment of node according to where threatening Or the attribute in region, the weighted average of the different attribute of zoning or equipment is as security score.
In the above embodiment, it is preferable that Key Asset includes equipment, area under one's jurisdiction and the plant area of the advance input system of user, Assets information chain is the relation defined according to live borderless logic, and nodal information corresponds to for the node of the advance input system of user Equipment, area under one's jurisdiction or the specifying information of plant area.
In the above embodiment, it is preferable that network topological diagram is to be opened up according to what the nodal information of assets information chain generated Flutter structure chart.
In this embodiment, specifically, assets information essentially from user's early period to the typing of Key Asset information and The confirmation and amended record of later stage system discovery assets.Key node chain meets live borderless logic, and non-new introducing concept, chain is also Non-actual existence is a kind of relation that system is defined according to live borderless logic.Once obtaining nodal information, system will be automatic Generate network topological diagram.Wherein, the accuracy of assets information needs to be confirmed by user side and ensured.
Specifically, when system is in original state, user manually imports Key Asset information, i.e. equipment, area under one's jurisdiction and factory The information such as area form assets information chain using the node of the Key Assets such as equipment, area under one's jurisdiction and plant area construction as core.When in system During due to threatening event trigger alert, i.e., when certain equipment or certain region are abnormal event, system can be at once to threatening in assets Position in information chain is positioned, and is shown in network topological diagram, and threatening can also be shown simultaneously with high, normal, basic class, be related to Equipment or subregion embody safe coefficient with security score, and at the same time, system is to current threat node message depth analysis, five yuan Nodal information before and after group information matching chain, determines with threatening associated default facility information, control loop, switchgear house or control The information such as area processed, and linked according to the information of more than successful match in rapid position in backstage, it is shown with significant identification information.When After user clicks on identified node, can accurately it be found in the network topological diagram of corresponding region where threatening.
The method proposed in the above embodiment of the present invention uses service logic key information match mechanism, with a large amount of complete Chain information is database, ensures the accuracy for threatening and showing, and as tracing to the source before and after core expansion chain, ensures association The logicality of information.Alarm event is shown by the way of security score, threat classification and network topological diagram, preferably Cognitive ability of the user for known element and unknown threat has been bonded, has realized stable transition, compared to introducing professional term, skill Art and cause system use complexity promoted situation, the convenience that user uses can be significantly improved.Based on chain information, It realizes that the visualization for industrial control network is built, the space representation of chain information is furthermore achieved.Compared to tradition without figure Or only the pattern of figure, image marking are more advantageous to directly discovery, summarize threat introductory path.Support security score, The big known element of classification, network topological diagram three is threatened, the effective bridge for threatening and perceiving is formed, drastically increases user for prestige The cognitive ability and treatment effeciency of the side of body.
In the above embodiment, it is preferable that it is further included based on visual threat warning methods of exhibiting:It is determining to threaten Behind position in assets information chain, warning information is sent to the equipment or region for threatening corresponding node.
In this embodiment, after determining to threaten the position in assets information chain, shown incessantly in network topological diagram The identification information of the demonstration side of body, also sends a warning message to equipment, area under one's jurisdiction or the subregion of node where the threat, to remind user's prestige The generation of side of body event.Warning information is shown including screen identification, sound-light alarm etc..
In the above embodiment, it is preferable that it is further included based on visual threat warning methods of exhibiting:By definite threat Threat level and security score and threaten where nodal information stored.
In this embodiment, will calculate or the threat level of threat that analysis obtains, security score and where threatening Nodal information stores, so that the later stage consults the details of this threat event.
The above is embodiments of the present invention, it is contemplated that the degree of association of threat warning method is low, no in the prior art The technical issues of enough directly perceived, the present invention proposes one kind based on visual threat warning methods of exhibiting, by Key Asset The typing of information, and linear assets information chain is formed as core using Key Asset node, when the event of threat occurs, positioning It threatens in the position of assets chain, and is shown in network opens up complement, threaten displaying that can also be shown simultaneously with high, normal, basic class, be related to Equipment or subregion embody safe coefficient with security score, to current threat node message depth analysis, with five-tuple information matches Nodal information before and after chain, and shown with notable identification information, mark node is clicked on, visualization is threatened to be accurately positioned, ensures prestige The accuracy showed and the logicality of related information are coerced, is effectively improved the treatment effeciency and accuracy of threat warning event, So as to improve the security of industrial control system operation.
It these are only the preferred embodiment of the present invention, be not intended to limit the invention, for those skilled in the art For member, the invention may be variously modified and varied.Any modification within the spirit and principles of the invention, being made, Equivalent substitution, improvement etc., should all be included in the protection scope of the present invention.

Claims (7)

1. one kind is based on visual threat warning methods of exhibiting, which is characterized in that including:
Real-time threat monitoring is carried out to the assets information chain using Key Asset as node in system;
When threatening event trigger alert, determine to threaten the position in the assets information chain;
The threat level of the threat is analyzed with default basis for estimation, the safety of the threat is calculated with default computational methods Fraction;
The identification information of the threat and the threat level and the security score are shown in network topological diagram;
When detecting that node corresponding to the identification information is clicked, triggering shows the specific nodal information of the threat.
2. according to claim 1 be based on visual threat warning methods of exhibiting, which is characterized in that described when threat thing During part triggering alarm, determine that the position in the assets information chain is threatened to specifically include:
When threatening event trigger alert, depth analysis is carried out to node message and judges abnormal node message;
According to the five-tuple of abnormal nodes message as a result, determining and the associated nodal information of five-tuple result;
It is determined to threaten the position in the assets information chain according to nodal information.
3. according to claim 1 be based on visual threat warning methods of exhibiting, which is characterized in that described with default Basis for estimation analyzes the threat level of the threat, and the security score that the threat is calculated with default computational methods specifically wraps It includes:
The equipment of node or the attribute in region and the attribute in default equipment or region and threat etc. according to where the threat The correspondence of grade determines the threat level of the threat;
The equipment of node or the attribute in region, calculate the weighting of the different attribute of the region or equipment according to where the threat Average value is as security score.
4. according to claim 1 be based on visual threat warning methods of exhibiting, which is characterized in that the Key Asset Equipment, area under one's jurisdiction and plant area including the advance input system of user, the assets information chain are to be defined according to live borderless logic Relation, the nodal information be the advance input system of user the corresponding equipment of the node, area under one's jurisdiction or the specific letter of plant area Breath.
5. according to claim 1 be based on visual threat warning methods of exhibiting, which is characterized in that the network topology Figure is the topology diagram generated according to the nodal information of the assets information chain.
6. according to claim 1 be based on visual threat warning methods of exhibiting, which is characterized in that further includes:
After determining to threaten the position in the assets information chain, the equipment for threatening corresponding node or region are sent out Go out warning information.
7. according to claim 1 be based on visual threat warning methods of exhibiting, which is characterized in that further includes:It will be true Nodal information where the threat level and security score of the fixed threat and the threat is stored.
CN201711351278.3A 2017-12-15 2017-12-15 Visualization-based threat alarm display method Active CN108111342B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711351278.3A CN108111342B (en) 2017-12-15 2017-12-15 Visualization-based threat alarm display method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711351278.3A CN108111342B (en) 2017-12-15 2017-12-15 Visualization-based threat alarm display method

Publications (2)

Publication Number Publication Date
CN108111342A true CN108111342A (en) 2018-06-01
CN108111342B CN108111342B (en) 2021-08-27

Family

ID=62217278

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711351278.3A Active CN108111342B (en) 2017-12-15 2017-12-15 Visualization-based threat alarm display method

Country Status (1)

Country Link
CN (1) CN108111342B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110753039A (en) * 2019-09-29 2020-02-04 苏州浪潮智能科技有限公司 Method and device for remote login safety protection
CN111880708A (en) * 2020-07-31 2020-11-03 北京微步在线科技有限公司 Interaction method and storage medium for network attack event graph
WO2020233251A1 (en) * 2019-05-17 2020-11-26 深圳前海微众银行股份有限公司 Data management method and device
CN112202764A (en) * 2020-09-28 2021-01-08 中远海运科技股份有限公司 Network attack link visualization system, method and server
CN113472725A (en) * 2020-03-31 2021-10-01 阿里巴巴集团控股有限公司 Data processing method and device
CN114338110A (en) * 2021-12-20 2022-04-12 上海纽盾科技股份有限公司 Prediction defense method, device and system for threat information in situation awareness

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101436967A (en) * 2008-12-23 2009-05-20 北京邮电大学 Method and system for evaluating network safety situation
WO2010034060A1 (en) * 2008-09-24 2010-04-01 Iintegrate Systems Pty Ltd Alert generation system and method
CN102170431A (en) * 2011-03-25 2011-08-31 中国电子科技集团公司第三十研究所 Host risk evaluation method and device
CN103166794A (en) * 2013-02-22 2013-06-19 中国人民解放军91655部队 Information security management method with integration security control function
CN104348667A (en) * 2014-11-11 2015-02-11 上海新炬网络技术有限公司 Fault positioning method based on warning information
CN106254137A (en) * 2016-08-30 2016-12-21 广州汇通国信信息科技有限公司 The alarm root-cause analysis system and method for supervisory systems
CN106357470A (en) * 2016-11-15 2017-01-25 中国电子科技集团公司第四十研究所 Quick sensing method for network threat based on SDN controller

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010034060A1 (en) * 2008-09-24 2010-04-01 Iintegrate Systems Pty Ltd Alert generation system and method
CN101436967A (en) * 2008-12-23 2009-05-20 北京邮电大学 Method and system for evaluating network safety situation
CN102170431A (en) * 2011-03-25 2011-08-31 中国电子科技集团公司第三十研究所 Host risk evaluation method and device
CN103166794A (en) * 2013-02-22 2013-06-19 中国人民解放军91655部队 Information security management method with integration security control function
CN104348667A (en) * 2014-11-11 2015-02-11 上海新炬网络技术有限公司 Fault positioning method based on warning information
CN106254137A (en) * 2016-08-30 2016-12-21 广州汇通国信信息科技有限公司 The alarm root-cause analysis system and method for supervisory systems
CN106357470A (en) * 2016-11-15 2017-01-25 中国电子科技集团公司第四十研究所 Quick sensing method for network threat based on SDN controller

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020233251A1 (en) * 2019-05-17 2020-11-26 深圳前海微众银行股份有限公司 Data management method and device
CN110753039A (en) * 2019-09-29 2020-02-04 苏州浪潮智能科技有限公司 Method and device for remote login safety protection
CN113472725A (en) * 2020-03-31 2021-10-01 阿里巴巴集团控股有限公司 Data processing method and device
CN111880708A (en) * 2020-07-31 2020-11-03 北京微步在线科技有限公司 Interaction method and storage medium for network attack event graph
CN112202764A (en) * 2020-09-28 2021-01-08 中远海运科技股份有限公司 Network attack link visualization system, method and server
CN114338110A (en) * 2021-12-20 2022-04-12 上海纽盾科技股份有限公司 Prediction defense method, device and system for threat information in situation awareness
CN114338110B (en) * 2021-12-20 2024-05-10 上海纽盾科技股份有限公司 Method, device and system for predicting and defending threat information in situation awareness

Also Published As

Publication number Publication date
CN108111342B (en) 2021-08-27

Similar Documents

Publication Publication Date Title
CN108111342A (en) Based on visual threat warning methods of exhibiting
CN105163091B (en) Pump station engineering management integrated linkage system
CN108174165A (en) Electric power safety operation and O&M intelligent monitoring system and method
CN110087099A (en) A kind of monitoring method and system for protecting privacy
CN106899691A (en) A kind of Intelligent internet of things monitoring system and method based on cloud platform
CN103617699A (en) Intelligent safety monitor system of electric power working site
US11729597B2 (en) Digital twin disaster management system customized for underground public areas
CN111814601A (en) Video analysis method combining target detection and human body posture estimation
CN106572329A (en) Precise recognition system for video monitoring image
CN110705482A (en) Personnel behavior alarm prompt system based on video AI intelligent analysis
CN104484836B (en) A kind of electric network fault aid decision visualization system and its method
CN109164780A (en) A kind of industrial field device control method based on edge calculations, apparatus and system
CN111811516A (en) Factory personnel positioning and safety early warning system
CN110674790A (en) Abnormal scene processing method and system in video monitoring
CN111476979A (en) Intelligent security and stability maintenance method and system based on multi-model analysis
CN115100813B (en) Intelligent community system based on digital twins
CN115567690A (en) Intelligent monitoring system capable of automatically identifying dangerous points of field operation
CN110379121A (en) A kind of hazard alarm method and server
CN108711256A (en) The energy saving intellectual analysis of the personal safety by all kinds of means alarm method of one kind and system
CN109977856B (en) Method for identifying complex behaviors in multi-source video
Xu et al. Green social CPS based e-healthcare systems to control the spread of infectious diseases
CN107920224B (en) Abnormity warning method, abnormity warning equipment and video monitoring system
CN111228706A (en) GIS-based building interior fire fighting equipment control method and device
CN112887594B (en) Method and system for improving video conference security
CN106507037A (en) Intelligent control method and system that personnel invade/cross the border

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Hou Zhanying

Inventor after: Zhou Wenjun

Inventor before: Zhou Lei

Inventor before: Zhou Wenjun

Inventor before: Jiang Shuanglin

GR01 Patent grant
GR01 Patent grant