CN108229163A - A kind of malicious application detection device and method based on Android virtual containers - Google Patents
A kind of malicious application detection device and method based on Android virtual containers Download PDFInfo
- Publication number
- CN108229163A CN108229163A CN201611191242.9A CN201611191242A CN108229163A CN 108229163 A CN108229163 A CN 108229163A CN 201611191242 A CN201611191242 A CN 201611191242A CN 108229163 A CN108229163 A CN 108229163A
- Authority
- CN
- China
- Prior art keywords
- application
- application program
- behavior
- detection
- malicious
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Abstract
The present invention provides a kind of malicious application detection device based on Android virtual containers, in virtual container, the virtual container is located at Android application layers and is isolated with true system environments, and the present apparatus includes application management module, for the routing information of records application program;Application launch module, for the routing information loading application programs according to application program;Behavior record and detection module, in the operational process of application program, the sensitive behavior of records application program, and malicious act is given a warning.The present invention has taken over part system service, and behavior and the detection of data during based on application operation can be realized under the true use environment of non-root user, effectively solves the lag sex chromosome mosaicism of static Malicious Code Detection.The present invention can not only tell sensitive behavior, additionally it is possible to identify the content in sensitive behavior, improve accuracy of detection and accuracy.
Description
Technical field
The present invention relates to malicious code of mobile terminal detection techniques, and in particular to a kind of based on Android virtual containers
Malicious application detection device and method.
Background technology
With increasing for mobile equipment, the burning hot development of mobile terminal application.The application of various functions is multifarious, source canal
The safety in road can not also be completely secured.Exploding for mobile terminal application also causes malicious application, hazardous applications to be on the increase.It is right
User moves equipment safety and information security causes greatly to threaten.User is soft using more mobile security detection at present
Part, the mostly behavioral value based on virus base, have the disadvantages that:First, the behavioral value of application is based primarily upon existing
The accuracy of knowledge base completeness and detection algorithm, it is desirable that higher;Two, it is directed to which privacy leakage problem can not determine completely
Information is leaked or steals;Three, the detectability of part behavior monitoring software is preferable, but due to the use of hook technologies,
The equipment of user is caused to be in high risk state, advanced root authority is easily utilized the risk for causing bigger.
Invention content
The technical problem to be solved by the present invention is to:A kind of malicious application detection dress based on Android virtual containers is provided
It puts and method, with dynamic operation behavior record and the method for detection, tells malicious application and malicious act, ensure the peace of equipment
Entirely.
The technical solution taken by the invention to solve the above technical problem is:One kind is performed based on Android virtualizations
Malicious application detection device, it is characterised in that:In Android application layers and with true system environments to establish middle layer controllable
Code provides performing environment for intended application, using dynamic replacement technology and interface model technology, establishes user API and system
The middle service layer of frame, with Classloader technical operation intended applications, behavior record analysis module carries out behavioural analysis.
The present apparatus includes:
Application management module, for the routing information of records application program;
Application launch module, for the routing information loading application programs according to application program;
Behavior record and detection module, in the operational process of application program, the sensitive behavior of records application program, and it is right
Malicious act gives a warning.
By above device, the present apparatus further includes application schedules management module, for manage the operating status of application program with
And the trustship interface of system service is provided, provide scheduling for behavior record and detection.
By above device, list of application is equipped in the application management module, application is record in list of application
The appInfo of program, the appInfo of application program include application code path, the opt codes road using dalvik-cache
Diameter and lib dynamic bases storage path.
By above device, the application launch module is used for when the application program started is in the list of application
When, obtain the appInfo of the application program, the code and resource of loading application programs.
By above device, the behavior record and detection module include:
Sensitive behavior set library, for storing sensitive behavior for calling;
Sensitive behavior judges logging modle, and the behavior for working as application program is present in sensitive behavior set library, then record should
The behavior of application program, and record the content of sensitive behavior;
Alert module, for issuing the user with the warning for the content for carrying sensitive behavior.
By above device, the application schedules management module operates in independent process, inherits
IActivityManager interfaces, realize independent AMS, and starting in independent AMS has multiple ActivityStub, respectively from should
With obtaining the application program of startup in starting module, and be managed.
By above device, using the path of intended application and resource construction Classloader, and dynamic replacement skill is used
Art, loading destination application code
It is original for transparent replacement system using the generation of template class technology and the original class of system interface of the same name by above device
Interface is provided using peer system API.
By above device, in application schedules module, it can quickly be generated and supplied according to information such as the path of intended application, resources
Accomplish the function of multiplexing application program launching module with the system service of calling
Beneficial effects of the present invention are:
1st, part system service has been taken over, transparent system call capability is provided for intended application, it can be true in non-root user
Behavior and the detection of data during based on application operation are realized under real use environment, effectively solves the lag of static Malicious Code Detection
Sex chromosome mosaicism.
2nd, by increasing application schedules management module, managing the operating status of application program and providing the support of system service
Interface tube carries out fast resource switching, improves using the efficiency for starting and analyzing, and is the inspection of behavior record and detection module
It surveys object and scheduling is provided, so as to program is widely applied to carry out orderly quick processing.
3rd, the present invention can not only tell sensitive behavior, additionally it is possible to identify the content in sensitive behavior, improve detection essence
Degree and accuracy.
Description of the drawings
Fig. 1 is in some embodiments, the structure of the malicious application detection device of middle layer is performed based on Android program
Schematic diagram.
Fig. 2 is in further embodiments, the flow of the malicious application detection method based on Android virtual containers is illustrated
Figure.
Specific embodiment
With reference to specific example and attached drawing, the present invention will be further described.
The present invention provides a kind of malicious application detection device that middle layer is performed based on Android program, as shown in Figure 1,
It is isolated in Android application layers and with true system environments, matching program management module, application schedules module, behavior record
Analysis module carries out comprehensive behavior record and analysis to application.The present apparatus includes:
Application management module 01, for the routing information of records application program.Application is equipped in application management module
List, the appInfo of application program is record in list of application, and the appInfo of application program includes application code path, application
Opt code paths and lib dynamic bases the storage path of dalvik-cache.
Application launch module 02, for the routing information loading application programs according to application program.Application launch module is used
When the application program when startup is in the list of application, the appInfo of the application program is obtained, loading application programs
Code and resource.
The present apparatus further includes application schedules management module 03, for managing the operating status of application program and providing system
The trustship interface of service, scheduling is provided for behavior record and detection.Application schedules management module operates in independent process, inherits
IActivityManager interfaces, realize independent AMS, and starting in independent AMS has multiple ActivityStub, respectively from should
With obtaining the application program of startup in starting module, and be managed.
Behavior record and detection module 04, in the operational process of application program, the sensitive row of records application program
For, and malicious act is given a warning.Behavior record and detection module include:Sensitive behavior set library, for storing sensitive row
For for calling;Sensitive behavior judges logging modle, and the behavior for working as application program is present in sensitive behavior set library, then remembers
The behavior of the application program is recorded, and records the content of sensitive behavior;Alert module carries sensitive behavior for issuing the user with
The warning of content.
The present invention has taken over part system service, and transparent system call capability is provided for intended application, can be non-
Behavior and the detection of data during based on application operation are realized under the true use environment of root user, effectively solves static malicious code
The lag sex chromosome mosaicism of detection.By increasing application schedules management module, managing the operating status of application program and providing system
The trustship interface of service carries out fast resource switching, improves using the efficiency for starting and analyzing, and is behavior record and detection
The detection object of module provides scheduling, so as to program is widely applied to carry out orderly quick processing.The present invention can not only
Enough tell sensitive behavior, additionally it is possible to identify the content in sensitive behavior, improve accuracy of detection and accuracy.
A kind of malicious application detection method based on Android virtual containers, positioned at Android application layers and with it is true
System environments is isolated, and this method includes:
Application program management:The routing information of records application program.List of application is equipped in application program management, in list of application
The appInfo of application program is record, the appInfo of application program includes application code path, using dalvik-cache's
Opt code paths and lib dynamic bases storage path.
Using startup:According to the routing information loading application programs of application program.Using in startup, when the application journey of startup
When sequence is in the list of application, the appInfo of the application program, the code and resource of loading application programs are obtained.
Behavior record and detection module:In the operational process of application program, the sensitive behavior of records application program, and it is right
Malicious act gives a warning.Behavior record and detection include:Sensitive behavior set library, for storing sensitive behavior for calling;It is quick
Sense behavior judges record:When the behavior of application program is present in sensitive behavior set library, then the behavior of the application program is recorded,
And record the content of sensitive behavior;Warning:Issue the user with the warning of the content with sensitive behavior.
This method can also include application management:It manages the operating status of application program and the trustship of system service is provided
Interface, the detection object for behavior record and detection module provide scheduling.Application management step operates in independent process, inherits
IActivityManager interfaces realize independent AMS, and starting in independent AMS has multiple ActivityStub, is answering respectively
With obtaining the application program of startup in starting step, and be managed.
It is the specific embodiment of one embodiment of the invention below.
S01:Starter core application
Core application sheet is as a common App, upon actuation with the mode of dynamic proxy by some system services in process
Relevant interface, replace with the interface of this virtual container service, interface and ability provided for application management below.Starting in this way should
After program, the relevant interface used is all the interface for using virtual middle layer.
As shown in Fig. 2,
S101, ActivityManagerService is obtained;
S102, getService obtain service;
GetService interfaces are provided in the Context environmental interfaces used in application program.For obtaining system service.
S103, the sCache for inquiring ServiceManager;
The remote interface that includes of inquiry system service returns to and caches acquisition.What the sCache of ServiceManager was preserved is slow
The service deposited.
S104, the gDefault for returning to ActivityManagerNative.
GDefault is the unique object of an ActivityManagerNative.
ActivityManagerService inherits and realizes IActivityManager interfaces.It is realized with dynamic proxy
Interfaces all IActivityManager, and sCache and gDefault are replaced, what so intended application was got
All it is the management interface of this app.And independent processing is done to interfaces such as startActivity in call back function, is disposed
The original IActivityManager interfaces of system are recalled later.The interface for being so supplied to intended application one transparent calls
Layer.
S02:Application program management
Application management module maintains a list of application, and the inside records the appInfo of application program, including applying journey
The code path of sequence stores path using the opt code paths and lib dynamic bases of dalvik-cache.When what will be started
Application program then directly returns to the application program in the list of application.
Due to android system security restriction, dalvik-cache, lib catalogue of application program are recorded as virtually holding
Catalogue under device, and the code path generation appInfo of fit applications program.
Obtain installation package file concrete mode be:Pass through system function
Environment.getExternalStorageDirectory () getAbsolutePath () obtain external storage
Catalogue, the file of the entitled apk of suffix in searching loop catalogue;Parsing installation package file concrete mode be:Pass through system function
Installation package file is resolved into PackageInfo objects, and the PackageInfo objects after parsing are deposited into a list
In.
S03:Using startup
Other paths such as code path, dalvik-cache paths and lib are obtained according to the appInfo that previous step obtains.
The PackageInfo objects of application will be taken out from list before;Obtain institute in PackageInfo objects
The path of installation package file is directed toward, and system function parsePackage is passed to as parameter()Continue to parse installation kit text
Part according to the packet name parsed, creates corresponding file directory in virtual container, and this document catalogue is that simulation application is normal
The file directory generated after system is installed to, in virtual container catalogue, there are several file directorys, i.e., apk packets name to be measured is treated
Survey apk packet names;Include several files again in each apk packets name to be measured, such as apk packets to be measured apk, lib under one's name,
Apk, lib, dalvik-cache and the cache of dalvik-cache and cache and apk packets to be measured under one's name.
The method of resource loading includes:The resource path of apk files is passed in AsserManager
AddAssertPath functions create Resources objects with AssertManager, the resource of apk files are loaded into
In Resources objects;
Using DexFile.loaddex loading object code file generation DexFile, while generate dexopt files.And make
Classloader is generated with above-mentioned introductory path.Above-mentioned DexFile is associated with Classloader.Using this in this way
Classloader can find the information such as target Application and Activity when searching class.Create intended application
The objects such as Application.
S04:Application schedules management
Application schedules management module operates in independent process.IActivityManager interfaces are inherited, are realized independent
ActivityManagerService, abbreviation AMS.And replace the original service of the system.As calling startActivity
When the service that gets be the AMS in the application schedules management module.
For the ease of resource management, acquiescence starts multiple ActivityStub in AMS.When need start one
When Activity, an object is obtained from the ActivityStub of generation.And startActivity is passed to
The information such as appInfo, Classloader replace the attribute in ActivityStub.Then by the Application of application program
Start.The application program can be provided by Classloader loading classes and resource by application schedules management module in this way
The interface function of system AMS, and manage the Application of application program.
Program scheduler process:When some application execution finishes, we will enter application detect into.Our meetings in the middle
Application launch module is called to replace Application information, is multiplexed current process.Directly initiate new application program.In this way
Detection can be rapidly entered.
S05:Behavior record and detection
Other than AMS has been taken over by application schedules management module, behavior interface service, such as SmsManager have also been taken over
Deng.In this way when application program calls sensitive behavior in the virtual container, such as sends privacy and steal short message.It can be in the present invention
SmsManager in get short message content.Behavior logging modle function includes the short message behavior record work(of SmsManager
Can, but it is not limited only to short message registering capacity.
Detection function marks according to sensitive data by the intended application behavior got and sensitive behavior is qualitative.Judge
Go out with the presence or absence of malicious act, and user is warned to pay attention to the security risk applied.
The present invention realizes the virtual container environment of a non-root, for the dry run of application, and based on system
Service take-over captures the sensitive behavior of application;It is replaced based on the system interface that java layers of dynamic proxy ability are realized,
Function is easy to extend;The container environment of the present invention simulates true application execution environment substantially, and it is smaller that possibility is failed to report in behavior.
This hair can realize behavior and the detection of data during based on application operation under the true use environment of non-root user,
The lag sex chromosome mosaicism of static Malicious Code Detection is effectively solved, improves the efficiency using startup and analysis, it can be to a large amount of
Application program carries out orderly quick processing.The present invention can not only tell sensitive behavior, additionally it is possible to identify in sensitive behavior
Content, improve accuracy of detection and accuracy.In addition, user's warning based on present aspect, can also carry out providing disposition and resistance
The designs such as disconnected action, preferably to protect user security.
Above example is merely to illustrate the design philosophy and feature of the present invention, and its object is to make technology in the art
Personnel can understand present disclosure and implement according to this, and protection scope of the present invention is not limited to the above embodiments.So it is all according to
The equivalent variations made according to disclosed principle, mentality of designing or modification, within protection scope of the present invention.
Claims (12)
1. a kind of malicious application detection device based on Android virtual containers, it is characterised in that:In virtual container, institute
It states virtual container to be located at Android application layers and with true system environments be isolated, the present apparatus includes:
Application management module, for the routing information of records application program;
Application launch module, for the routing information loading application programs according to application program;
Behavior record and detection module, in the operational process of application program, the sensitive behavior of records application program, and it is right
Malicious act gives a warning.
2. the malicious application detection device according to claim 1 based on Android virtual containers, it is characterised in that:This
Device further includes application schedules management module, is connect for managing the operating status of application program and providing the trustship of system service
Mouthful, provide scheduling for behavior record and detection.
3. the malicious application detection device according to claim 1 or 2 based on Android virtual containers, it is characterised in that:
List of application is equipped in the application management module, the appInfo of application program is record in list of application, using journey
The appInfo of sequence includes application code path, stores road using the opt code paths and lib dynamic bases of dalvik-cache
Diameter.
4. the malicious application detection device according to claim 3 based on Android virtual containers, it is characterised in that:Institute
The application launch module stated is used for when the application program of startup is in the list of application, obtains the application program
AppInfo, the code and resource of loading application programs.
5. the malicious application detection device according to claim 1 or 2 based on Android virtual containers, it is characterised in that:
The behavior record and detection module includes:
Sensitive behavior set library, for storing sensitive behavior for calling;
Sensitive behavior judges logging modle, and the behavior for working as application program is present in sensitive behavior set library, then record should
The behavior of application program, and record the content of sensitive behavior;
Alert module, for issuing the user with the warning for the content for carrying sensitive behavior.
6. the malicious application detection device according to claim 2 based on Android virtual containers, it is characterised in that:Institute
The application schedules management module stated operates in independent process, inherits IActivityManager interfaces, realizes independent AMS,
Starting in independent AMS has multiple ActivityStub, obtains the application program of startup from application launch module respectively, goes forward side by side
Row management.
7. a kind of malicious application detection method based on Android virtual containers, it is characterised in that:Positioned at Android application layers
And be isolated with true system environments, this method includes:
Application program management:The routing information of records application program;
Using startup:According to the routing information loading application programs of application program;
Behavior record and detection module:In the operational process of application program, the sensitive behavior of records application program, and to malice
Behavior gives a warning.
8. the malicious application detection method according to claim 7 based on Android virtual containers, it is characterised in that:This
Method further includes application schedules management:It manages the operating status of application program and the trustship interface of system service is provided, for row
Detection object to record with detection module provides scheduling.
9. the malicious application detection method according to claim 7 or 8 based on Android virtual containers, it is characterised in that:
List of application is equipped in the application program management, the appInfo of application program is record in list of application, application program
AppInfo includes application code path, stores path using the opt code paths and lib dynamic bases of dalvik-cache.
10. the malicious application detection method according to claim 9 based on Android virtual containers, it is characterised in that:Institute
During the application stated starts, when the application program of startup is in the list of application, the appInfo of the application program is obtained,
The code and resource of loading application programs.
11. the malicious application detection method according to claim 7 or 8 based on Android virtual containers, feature exist
In:The behavior record and detection includes:
Sensitive behavior set library, for storing sensitive behavior for calling;
Sensitive behavior judges record:When the behavior of application program is present in sensitive behavior set library, then the application program is recorded
Behavior, and record the content of sensitive behavior;
Warning:Issue the user with the warning of the content with sensitive behavior.
12. the malicious application detection method according to claim 8 based on Android virtual containers, it is characterised in that:It should
Independent process is operated in management and running step, IActivityManager interfaces is inherited, realizes independent AMS, it is independent
Starting in AMS has multiple ActivityStub, obtains the application program of startup, and carry out pipe in application starting step respectively
Reason.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611191242.9A CN108229163A (en) | 2016-12-21 | 2016-12-21 | A kind of malicious application detection device and method based on Android virtual containers |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611191242.9A CN108229163A (en) | 2016-12-21 | 2016-12-21 | A kind of malicious application detection device and method based on Android virtual containers |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108229163A true CN108229163A (en) | 2018-06-29 |
Family
ID=62650815
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611191242.9A Pending CN108229163A (en) | 2016-12-21 | 2016-12-21 | A kind of malicious application detection device and method based on Android virtual containers |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108229163A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113032129A (en) * | 2021-04-22 | 2021-06-25 | 北京小佑科技有限公司 | Method for generating process designated by user by blocking container |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103761479A (en) * | 2014-01-09 | 2014-04-30 | 北京奇虎科技有限公司 | Scanning method and scanning device for malicious programs |
CN104375494A (en) * | 2014-12-02 | 2015-02-25 | 北京奇虎科技有限公司 | Security sandbox construction method and security sandbox construction device |
US20160048683A1 (en) * | 2013-01-30 | 2016-02-18 | Palo Alto Networks, Inc. | Malware family identification using profile signatures |
CN106096395A (en) * | 2016-06-16 | 2016-11-09 | 北京奇虎科技有限公司 | A kind of protection treating method and apparatus of Android application |
CN106156611A (en) * | 2015-03-25 | 2016-11-23 | 北京奇虎科技有限公司 | The dynamic analysing method of smart mobile phone application program and system |
-
2016
- 2016-12-21 CN CN201611191242.9A patent/CN108229163A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160048683A1 (en) * | 2013-01-30 | 2016-02-18 | Palo Alto Networks, Inc. | Malware family identification using profile signatures |
CN103761479A (en) * | 2014-01-09 | 2014-04-30 | 北京奇虎科技有限公司 | Scanning method and scanning device for malicious programs |
CN104375494A (en) * | 2014-12-02 | 2015-02-25 | 北京奇虎科技有限公司 | Security sandbox construction method and security sandbox construction device |
CN106156611A (en) * | 2015-03-25 | 2016-11-23 | 北京奇虎科技有限公司 | The dynamic analysing method of smart mobile phone application program and system |
CN106096395A (en) * | 2016-06-16 | 2016-11-09 | 北京奇虎科技有限公司 | A kind of protection treating method and apparatus of Android application |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113032129A (en) * | 2021-04-22 | 2021-06-25 | 北京小佑科技有限公司 | Method for generating process designated by user by blocking container |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107943486B (en) | Multi-language code compiling method, multi-language code distributing method, multi-language code compiling device, multi-language code distributing device and multi-language code system | |
Yang et al. | Leakminer: Detect information leakage on android with static taint analysis | |
US10491453B2 (en) | Correlating computing network events | |
EP2791850B1 (en) | Identifying application resources through implicit application models | |
US9229758B2 (en) | Passive monitoring of virtual systems using extensible indexing | |
WO2021147282A1 (en) | Method, apparatus and device for detecting malicious file, and storage medium | |
Luo et al. | System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation | |
CN111880987A (en) | Dynamic monitoring method and device of application program, storage medium and electronic device | |
US20130111018A1 (en) | Passive monitoring of virtual systems using agent-less, offline indexing | |
CN111753294A (en) | Behavior detection of malicious scripts | |
Song et al. | Towards transparent and stealthy android os sandboxing via customizable container-based virtualization | |
Zungur et al. | Borderpatrol: Securing byod using fine-grained contextual information | |
CN108229163A (en) | A kind of malicious application detection device and method based on Android virtual containers | |
CN105787359B (en) | Process guard method and device | |
Faruki et al. | Platform neutral sandbox for analyzing malware and resource hogger apps | |
US20230118838A1 (en) | Advanced agent instrumentation for opentelemetry implementations | |
JP5828457B2 (en) | API execution control device and program | |
Schmieders et al. | Architectural runtime models for privacy checks of cloud applications | |
CN115495731A (en) | Container host platform-oriented lightweight attack detection method and device | |
CN114385318A (en) | Parallel testing method, device and equipment based on kubernets | |
CN112231697A (en) | Third-party SDK behavior detection method, device, medium and electronic equipment | |
Mourlin et al. | Monitoring architecture for fog and mobile cloud | |
Alam et al. | Context-aware multi-agent based framework for securing Android | |
Rastogi et al. | Towards least privilege containers with cimplifier | |
CN106657151A (en) | Website information leakage protection method, apparatus and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180629 |