CN108229163A - A kind of malicious application detection device and method based on Android virtual containers - Google Patents

A kind of malicious application detection device and method based on Android virtual containers Download PDF

Info

Publication number
CN108229163A
CN108229163A CN201611191242.9A CN201611191242A CN108229163A CN 108229163 A CN108229163 A CN 108229163A CN 201611191242 A CN201611191242 A CN 201611191242A CN 108229163 A CN108229163 A CN 108229163A
Authority
CN
China
Prior art keywords
application
application program
behavior
detection
malicious
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611191242.9A
Other languages
Chinese (zh)
Inventor
唐浩
冯泽
马志远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Antian Information Technology Co Ltd
Original Assignee
Wuhan Antian Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Antian Information Technology Co Ltd filed Critical Wuhan Antian Information Technology Co Ltd
Priority to CN201611191242.9A priority Critical patent/CN108229163A/en
Publication of CN108229163A publication Critical patent/CN108229163A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Abstract

The present invention provides a kind of malicious application detection device based on Android virtual containers, in virtual container, the virtual container is located at Android application layers and is isolated with true system environments, and the present apparatus includes application management module, for the routing information of records application program;Application launch module, for the routing information loading application programs according to application program;Behavior record and detection module, in the operational process of application program, the sensitive behavior of records application program, and malicious act is given a warning.The present invention has taken over part system service, and behavior and the detection of data during based on application operation can be realized under the true use environment of non-root user, effectively solves the lag sex chromosome mosaicism of static Malicious Code Detection.The present invention can not only tell sensitive behavior, additionally it is possible to identify the content in sensitive behavior, improve accuracy of detection and accuracy.

Description

A kind of malicious application detection device and method based on Android virtual containers
Technical field
The present invention relates to malicious code of mobile terminal detection techniques, and in particular to a kind of based on Android virtual containers Malicious application detection device and method.
Background technology
With increasing for mobile equipment, the burning hot development of mobile terminal application.The application of various functions is multifarious, source canal The safety in road can not also be completely secured.Exploding for mobile terminal application also causes malicious application, hazardous applications to be on the increase.It is right User moves equipment safety and information security causes greatly to threaten.User is soft using more mobile security detection at present Part, the mostly behavioral value based on virus base, have the disadvantages that:First, the behavioral value of application is based primarily upon existing The accuracy of knowledge base completeness and detection algorithm, it is desirable that higher;Two, it is directed to which privacy leakage problem can not determine completely Information is leaked or steals;Three, the detectability of part behavior monitoring software is preferable, but due to the use of hook technologies, The equipment of user is caused to be in high risk state, advanced root authority is easily utilized the risk for causing bigger.
Invention content
The technical problem to be solved by the present invention is to:A kind of malicious application detection dress based on Android virtual containers is provided It puts and method, with dynamic operation behavior record and the method for detection, tells malicious application and malicious act, ensure the peace of equipment Entirely.
The technical solution taken by the invention to solve the above technical problem is:One kind is performed based on Android virtualizations Malicious application detection device, it is characterised in that:In Android application layers and with true system environments to establish middle layer controllable Code provides performing environment for intended application, using dynamic replacement technology and interface model technology, establishes user API and system The middle service layer of frame, with Classloader technical operation intended applications, behavior record analysis module carries out behavioural analysis. The present apparatus includes:
Application management module, for the routing information of records application program;
Application launch module, for the routing information loading application programs according to application program;
Behavior record and detection module, in the operational process of application program, the sensitive behavior of records application program, and it is right Malicious act gives a warning.
By above device, the present apparatus further includes application schedules management module, for manage the operating status of application program with And the trustship interface of system service is provided, provide scheduling for behavior record and detection.
By above device, list of application is equipped in the application management module, application is record in list of application The appInfo of program, the appInfo of application program include application code path, the opt codes road using dalvik-cache Diameter and lib dynamic bases storage path.
By above device, the application launch module is used for when the application program started is in the list of application When, obtain the appInfo of the application program, the code and resource of loading application programs.
By above device, the behavior record and detection module include:
Sensitive behavior set library, for storing sensitive behavior for calling;
Sensitive behavior judges logging modle, and the behavior for working as application program is present in sensitive behavior set library, then record should The behavior of application program, and record the content of sensitive behavior;
Alert module, for issuing the user with the warning for the content for carrying sensitive behavior.
By above device, the application schedules management module operates in independent process, inherits IActivityManager interfaces, realize independent AMS, and starting in independent AMS has multiple ActivityStub, respectively from should With obtaining the application program of startup in starting module, and be managed.
By above device, using the path of intended application and resource construction Classloader, and dynamic replacement skill is used Art, loading destination application code
It is original for transparent replacement system using the generation of template class technology and the original class of system interface of the same name by above device Interface is provided using peer system API.
By above device, in application schedules module, it can quickly be generated and supplied according to information such as the path of intended application, resources Accomplish the function of multiplexing application program launching module with the system service of calling
Beneficial effects of the present invention are:
1st, part system service has been taken over, transparent system call capability is provided for intended application, it can be true in non-root user Behavior and the detection of data during based on application operation are realized under real use environment, effectively solves the lag of static Malicious Code Detection Sex chromosome mosaicism.
2nd, by increasing application schedules management module, managing the operating status of application program and providing the support of system service Interface tube carries out fast resource switching, improves using the efficiency for starting and analyzing, and is the inspection of behavior record and detection module It surveys object and scheduling is provided, so as to program is widely applied to carry out orderly quick processing.
3rd, the present invention can not only tell sensitive behavior, additionally it is possible to identify the content in sensitive behavior, improve detection essence Degree and accuracy.
Description of the drawings
Fig. 1 is in some embodiments, the structure of the malicious application detection device of middle layer is performed based on Android program Schematic diagram.
Fig. 2 is in further embodiments, the flow of the malicious application detection method based on Android virtual containers is illustrated Figure.
Specific embodiment
With reference to specific example and attached drawing, the present invention will be further described.
The present invention provides a kind of malicious application detection device that middle layer is performed based on Android program, as shown in Figure 1, It is isolated in Android application layers and with true system environments, matching program management module, application schedules module, behavior record Analysis module carries out comprehensive behavior record and analysis to application.The present apparatus includes:
Application management module 01, for the routing information of records application program.Application is equipped in application management module List, the appInfo of application program is record in list of application, and the appInfo of application program includes application code path, application Opt code paths and lib dynamic bases the storage path of dalvik-cache.
Application launch module 02, for the routing information loading application programs according to application program.Application launch module is used When the application program when startup is in the list of application, the appInfo of the application program is obtained, loading application programs Code and resource.
The present apparatus further includes application schedules management module 03, for managing the operating status of application program and providing system The trustship interface of service, scheduling is provided for behavior record and detection.Application schedules management module operates in independent process, inherits IActivityManager interfaces, realize independent AMS, and starting in independent AMS has multiple ActivityStub, respectively from should With obtaining the application program of startup in starting module, and be managed.
Behavior record and detection module 04, in the operational process of application program, the sensitive row of records application program For, and malicious act is given a warning.Behavior record and detection module include:Sensitive behavior set library, for storing sensitive row For for calling;Sensitive behavior judges logging modle, and the behavior for working as application program is present in sensitive behavior set library, then remembers The behavior of the application program is recorded, and records the content of sensitive behavior;Alert module carries sensitive behavior for issuing the user with The warning of content.
The present invention has taken over part system service, and transparent system call capability is provided for intended application, can be non- Behavior and the detection of data during based on application operation are realized under the true use environment of root user, effectively solves static malicious code The lag sex chromosome mosaicism of detection.By increasing application schedules management module, managing the operating status of application program and providing system The trustship interface of service carries out fast resource switching, improves using the efficiency for starting and analyzing, and is behavior record and detection The detection object of module provides scheduling, so as to program is widely applied to carry out orderly quick processing.The present invention can not only Enough tell sensitive behavior, additionally it is possible to identify the content in sensitive behavior, improve accuracy of detection and accuracy.
A kind of malicious application detection method based on Android virtual containers, positioned at Android application layers and with it is true System environments is isolated, and this method includes:
Application program management:The routing information of records application program.List of application is equipped in application program management, in list of application The appInfo of application program is record, the appInfo of application program includes application code path, using dalvik-cache's Opt code paths and lib dynamic bases storage path.
Using startup:According to the routing information loading application programs of application program.Using in startup, when the application journey of startup When sequence is in the list of application, the appInfo of the application program, the code and resource of loading application programs are obtained.
Behavior record and detection module:In the operational process of application program, the sensitive behavior of records application program, and it is right Malicious act gives a warning.Behavior record and detection include:Sensitive behavior set library, for storing sensitive behavior for calling;It is quick Sense behavior judges record:When the behavior of application program is present in sensitive behavior set library, then the behavior of the application program is recorded, And record the content of sensitive behavior;Warning:Issue the user with the warning of the content with sensitive behavior.
This method can also include application management:It manages the operating status of application program and the trustship of system service is provided Interface, the detection object for behavior record and detection module provide scheduling.Application management step operates in independent process, inherits IActivityManager interfaces realize independent AMS, and starting in independent AMS has multiple ActivityStub, is answering respectively With obtaining the application program of startup in starting step, and be managed.
It is the specific embodiment of one embodiment of the invention below.
S01:Starter core application
Core application sheet is as a common App, upon actuation with the mode of dynamic proxy by some system services in process Relevant interface, replace with the interface of this virtual container service, interface and ability provided for application management below.Starting in this way should After program, the relevant interface used is all the interface for using virtual middle layer.
As shown in Fig. 2,
S101, ActivityManagerService is obtained;
S102, getService obtain service;
GetService interfaces are provided in the Context environmental interfaces used in application program.For obtaining system service.
S103, the sCache for inquiring ServiceManager;
The remote interface that includes of inquiry system service returns to and caches acquisition.What the sCache of ServiceManager was preserved is slow The service deposited.
S104, the gDefault for returning to ActivityManagerNative.
GDefault is the unique object of an ActivityManagerNative.
ActivityManagerService inherits and realizes IActivityManager interfaces.It is realized with dynamic proxy Interfaces all IActivityManager, and sCache and gDefault are replaced, what so intended application was got All it is the management interface of this app.And independent processing is done to interfaces such as startActivity in call back function, is disposed The original IActivityManager interfaces of system are recalled later.The interface for being so supplied to intended application one transparent calls Layer.
S02:Application program management
Application management module maintains a list of application, and the inside records the appInfo of application program, including applying journey The code path of sequence stores path using the opt code paths and lib dynamic bases of dalvik-cache.When what will be started Application program then directly returns to the application program in the list of application.
Due to android system security restriction, dalvik-cache, lib catalogue of application program are recorded as virtually holding Catalogue under device, and the code path generation appInfo of fit applications program.
Obtain installation package file concrete mode be:Pass through system function Environment.getExternalStorageDirectory () getAbsolutePath () obtain external storage Catalogue, the file of the entitled apk of suffix in searching loop catalogue;Parsing installation package file concrete mode be:Pass through system function Installation package file is resolved into PackageInfo objects, and the PackageInfo objects after parsing are deposited into a list In.
S03:Using startup
Other paths such as code path, dalvik-cache paths and lib are obtained according to the appInfo that previous step obtains.
The PackageInfo objects of application will be taken out from list before;Obtain institute in PackageInfo objects The path of installation package file is directed toward, and system function parsePackage is passed to as parameter()Continue to parse installation kit text Part according to the packet name parsed, creates corresponding file directory in virtual container, and this document catalogue is that simulation application is normal The file directory generated after system is installed to, in virtual container catalogue, there are several file directorys, i.e., apk packets name to be measured is treated Survey apk packet names;Include several files again in each apk packets name to be measured, such as apk packets to be measured apk, lib under one's name, Apk, lib, dalvik-cache and the cache of dalvik-cache and cache and apk packets to be measured under one's name.
The method of resource loading includes:The resource path of apk files is passed in AsserManager AddAssertPath functions create Resources objects with AssertManager, the resource of apk files are loaded into In Resources objects;
Using DexFile.loaddex loading object code file generation DexFile, while generate dexopt files.And make Classloader is generated with above-mentioned introductory path.Above-mentioned DexFile is associated with Classloader.Using this in this way Classloader can find the information such as target Application and Activity when searching class.Create intended application The objects such as Application.
S04:Application schedules management
Application schedules management module operates in independent process.IActivityManager interfaces are inherited, are realized independent ActivityManagerService, abbreviation AMS.And replace the original service of the system.As calling startActivity When the service that gets be the AMS in the application schedules management module.
For the ease of resource management, acquiescence starts multiple ActivityStub in AMS.When need start one When Activity, an object is obtained from the ActivityStub of generation.And startActivity is passed to The information such as appInfo, Classloader replace the attribute in ActivityStub.Then by the Application of application program Start.The application program can be provided by Classloader loading classes and resource by application schedules management module in this way The interface function of system AMS, and manage the Application of application program.
Program scheduler process:When some application execution finishes, we will enter application detect into.Our meetings in the middle Application launch module is called to replace Application information, is multiplexed current process.Directly initiate new application program.In this way Detection can be rapidly entered.
S05:Behavior record and detection
Other than AMS has been taken over by application schedules management module, behavior interface service, such as SmsManager have also been taken over Deng.In this way when application program calls sensitive behavior in the virtual container, such as sends privacy and steal short message.It can be in the present invention SmsManager in get short message content.Behavior logging modle function includes the short message behavior record work(of SmsManager Can, but it is not limited only to short message registering capacity.
Detection function marks according to sensitive data by the intended application behavior got and sensitive behavior is qualitative.Judge Go out with the presence or absence of malicious act, and user is warned to pay attention to the security risk applied.
The present invention realizes the virtual container environment of a non-root, for the dry run of application, and based on system Service take-over captures the sensitive behavior of application;It is replaced based on the system interface that java layers of dynamic proxy ability are realized, Function is easy to extend;The container environment of the present invention simulates true application execution environment substantially, and it is smaller that possibility is failed to report in behavior.
This hair can realize behavior and the detection of data during based on application operation under the true use environment of non-root user, The lag sex chromosome mosaicism of static Malicious Code Detection is effectively solved, improves the efficiency using startup and analysis, it can be to a large amount of Application program carries out orderly quick processing.The present invention can not only tell sensitive behavior, additionally it is possible to identify in sensitive behavior Content, improve accuracy of detection and accuracy.In addition, user's warning based on present aspect, can also carry out providing disposition and resistance The designs such as disconnected action, preferably to protect user security.
Above example is merely to illustrate the design philosophy and feature of the present invention, and its object is to make technology in the art Personnel can understand present disclosure and implement according to this, and protection scope of the present invention is not limited to the above embodiments.So it is all according to The equivalent variations made according to disclosed principle, mentality of designing or modification, within protection scope of the present invention.

Claims (12)

1. a kind of malicious application detection device based on Android virtual containers, it is characterised in that:In virtual container, institute It states virtual container to be located at Android application layers and with true system environments be isolated, the present apparatus includes:
Application management module, for the routing information of records application program;
Application launch module, for the routing information loading application programs according to application program;
Behavior record and detection module, in the operational process of application program, the sensitive behavior of records application program, and it is right Malicious act gives a warning.
2. the malicious application detection device according to claim 1 based on Android virtual containers, it is characterised in that:This Device further includes application schedules management module, is connect for managing the operating status of application program and providing the trustship of system service Mouthful, provide scheduling for behavior record and detection.
3. the malicious application detection device according to claim 1 or 2 based on Android virtual containers, it is characterised in that: List of application is equipped in the application management module, the appInfo of application program is record in list of application, using journey The appInfo of sequence includes application code path, stores road using the opt code paths and lib dynamic bases of dalvik-cache Diameter.
4. the malicious application detection device according to claim 3 based on Android virtual containers, it is characterised in that:Institute The application launch module stated is used for when the application program of startup is in the list of application, obtains the application program AppInfo, the code and resource of loading application programs.
5. the malicious application detection device according to claim 1 or 2 based on Android virtual containers, it is characterised in that: The behavior record and detection module includes:
Sensitive behavior set library, for storing sensitive behavior for calling;
Sensitive behavior judges logging modle, and the behavior for working as application program is present in sensitive behavior set library, then record should The behavior of application program, and record the content of sensitive behavior;
Alert module, for issuing the user with the warning for the content for carrying sensitive behavior.
6. the malicious application detection device according to claim 2 based on Android virtual containers, it is characterised in that:Institute The application schedules management module stated operates in independent process, inherits IActivityManager interfaces, realizes independent AMS, Starting in independent AMS has multiple ActivityStub, obtains the application program of startup from application launch module respectively, goes forward side by side Row management.
7. a kind of malicious application detection method based on Android virtual containers, it is characterised in that:Positioned at Android application layers And be isolated with true system environments, this method includes:
Application program management:The routing information of records application program;
Using startup:According to the routing information loading application programs of application program;
Behavior record and detection module:In the operational process of application program, the sensitive behavior of records application program, and to malice Behavior gives a warning.
8. the malicious application detection method according to claim 7 based on Android virtual containers, it is characterised in that:This Method further includes application schedules management:It manages the operating status of application program and the trustship interface of system service is provided, for row Detection object to record with detection module provides scheduling.
9. the malicious application detection method according to claim 7 or 8 based on Android virtual containers, it is characterised in that: List of application is equipped in the application program management, the appInfo of application program is record in list of application, application program AppInfo includes application code path, stores path using the opt code paths and lib dynamic bases of dalvik-cache.
10. the malicious application detection method according to claim 9 based on Android virtual containers, it is characterised in that:Institute During the application stated starts, when the application program of startup is in the list of application, the appInfo of the application program is obtained, The code and resource of loading application programs.
11. the malicious application detection method according to claim 7 or 8 based on Android virtual containers, feature exist In:The behavior record and detection includes:
Sensitive behavior set library, for storing sensitive behavior for calling;
Sensitive behavior judges record:When the behavior of application program is present in sensitive behavior set library, then the application program is recorded Behavior, and record the content of sensitive behavior;
Warning:Issue the user with the warning of the content with sensitive behavior.
12. the malicious application detection method according to claim 8 based on Android virtual containers, it is characterised in that:It should Independent process is operated in management and running step, IActivityManager interfaces is inherited, realizes independent AMS, it is independent Starting in AMS has multiple ActivityStub, obtains the application program of startup, and carry out pipe in application starting step respectively Reason.
CN201611191242.9A 2016-12-21 2016-12-21 A kind of malicious application detection device and method based on Android virtual containers Pending CN108229163A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611191242.9A CN108229163A (en) 2016-12-21 2016-12-21 A kind of malicious application detection device and method based on Android virtual containers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611191242.9A CN108229163A (en) 2016-12-21 2016-12-21 A kind of malicious application detection device and method based on Android virtual containers

Publications (1)

Publication Number Publication Date
CN108229163A true CN108229163A (en) 2018-06-29

Family

ID=62650815

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611191242.9A Pending CN108229163A (en) 2016-12-21 2016-12-21 A kind of malicious application detection device and method based on Android virtual containers

Country Status (1)

Country Link
CN (1) CN108229163A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113032129A (en) * 2021-04-22 2021-06-25 北京小佑科技有限公司 Method for generating process designated by user by blocking container

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761479A (en) * 2014-01-09 2014-04-30 北京奇虎科技有限公司 Scanning method and scanning device for malicious programs
CN104375494A (en) * 2014-12-02 2015-02-25 北京奇虎科技有限公司 Security sandbox construction method and security sandbox construction device
US20160048683A1 (en) * 2013-01-30 2016-02-18 Palo Alto Networks, Inc. Malware family identification using profile signatures
CN106096395A (en) * 2016-06-16 2016-11-09 北京奇虎科技有限公司 A kind of protection treating method and apparatus of Android application
CN106156611A (en) * 2015-03-25 2016-11-23 北京奇虎科技有限公司 The dynamic analysing method of smart mobile phone application program and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160048683A1 (en) * 2013-01-30 2016-02-18 Palo Alto Networks, Inc. Malware family identification using profile signatures
CN103761479A (en) * 2014-01-09 2014-04-30 北京奇虎科技有限公司 Scanning method and scanning device for malicious programs
CN104375494A (en) * 2014-12-02 2015-02-25 北京奇虎科技有限公司 Security sandbox construction method and security sandbox construction device
CN106156611A (en) * 2015-03-25 2016-11-23 北京奇虎科技有限公司 The dynamic analysing method of smart mobile phone application program and system
CN106096395A (en) * 2016-06-16 2016-11-09 北京奇虎科技有限公司 A kind of protection treating method and apparatus of Android application

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113032129A (en) * 2021-04-22 2021-06-25 北京小佑科技有限公司 Method for generating process designated by user by blocking container

Similar Documents

Publication Publication Date Title
CN107943486B (en) Multi-language code compiling method, multi-language code distributing method, multi-language code compiling device, multi-language code distributing device and multi-language code system
Yang et al. Leakminer: Detect information leakage on android with static taint analysis
US10491453B2 (en) Correlating computing network events
EP2791850B1 (en) Identifying application resources through implicit application models
US9229758B2 (en) Passive monitoring of virtual systems using extensible indexing
WO2021147282A1 (en) Method, apparatus and device for detecting malicious file, and storage medium
Luo et al. System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation
CN111880987A (en) Dynamic monitoring method and device of application program, storage medium and electronic device
US20130111018A1 (en) Passive monitoring of virtual systems using agent-less, offline indexing
CN111753294A (en) Behavior detection of malicious scripts
Song et al. Towards transparent and stealthy android os sandboxing via customizable container-based virtualization
Zungur et al. Borderpatrol: Securing byod using fine-grained contextual information
CN108229163A (en) A kind of malicious application detection device and method based on Android virtual containers
CN105787359B (en) Process guard method and device
Faruki et al. Platform neutral sandbox for analyzing malware and resource hogger apps
US20230118838A1 (en) Advanced agent instrumentation for opentelemetry implementations
JP5828457B2 (en) API execution control device and program
Schmieders et al. Architectural runtime models for privacy checks of cloud applications
CN115495731A (en) Container host platform-oriented lightweight attack detection method and device
CN114385318A (en) Parallel testing method, device and equipment based on kubernets
CN112231697A (en) Third-party SDK behavior detection method, device, medium and electronic equipment
Mourlin et al. Monitoring architecture for fog and mobile cloud
Alam et al. Context-aware multi-agent based framework for securing Android
Rastogi et al. Towards least privilege containers with cimplifier
CN106657151A (en) Website information leakage protection method, apparatus and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180629