CN108566358B - iOS system network communication interception method and system based on iPhone mobile phone - Google Patents

iOS system network communication interception method and system based on iPhone mobile phone Download PDF

Info

Publication number
CN108566358B
CN108566358B CN201711398735.4A CN201711398735A CN108566358B CN 108566358 B CN108566358 B CN 108566358B CN 201711398735 A CN201711398735 A CN 201711398735A CN 108566358 B CN108566358 B CN 108566358B
Authority
CN
China
Prior art keywords
data
virtual network
network card
ios system
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711398735.4A
Other languages
Chinese (zh)
Other versions
CN108566358A (en
Inventor
张成康
张承超
黄良迅
彭炜凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sie Consulting Co ltd
Original Assignee
Sie Consulting Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sie Consulting Co ltd filed Critical Sie Consulting Co ltd
Priority to CN201711398735.4A priority Critical patent/CN108566358B/en
Publication of CN108566358A publication Critical patent/CN108566358A/en
Application granted granted Critical
Publication of CN108566358B publication Critical patent/CN108566358B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/308Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content

Abstract

The invention discloses an iOS system network communication interception method and system based on an iPhone mobile phone, wherein the method comprises the following steps: step one, receiving a starting-up request, and creating a virtual network card suitable for an iOS system according to a request instruction; step two, rewriting and cracking the routing table injected into the iOS system, and completely draining the original normally received data through the virtual network card; intercepting the data through a virtual network card, and implementing integration processing; and step four, selectively sending the data after the integration processing. The mechanism of the iOS system can be bypassed, all TCP/UDP communication flows of the iPhone mobile phone can be fully taken over, and the communication content in the iPhone mobile phone can be modified randomly. And transmitting and receiving message channels of one-line APPs such as WeChat, microblog and QQ can be transferred to the private server, and data communication information can be obtained from the private server. Sensitive words can also be analyzed and the communication can be discarded as long as they are included.

Description

iOS system network communication interception method and system based on iPhone mobile phone
Technical Field
The invention relates to the technical field of communication internet, in particular to an iOS system network communication interception method and system based on an iPhone mobile phone.
Background
At present time. Based on the mechanism that the iOS system cannot be intercepted by network communication under the iPhone mobile phone and cannot bypass the iOS system, all TCP/UDP communication flows of the iPhone mobile phone can be fully taken over, and the communication content in the iPhone mobile phone cannot be modified randomly. Meanwhile, the message receiving and sending channels of one-line APPs such as WeChat, microblog and QQ cannot be switched to the private server, and data communication information can be obtained from the private server. Sensitive words cannot be analyzed, and the communication information cannot be removed as long as the sensitive words are contained. The function of realizing network communication interception modification on an Android mobile phone system is widely used, but the function is not available on an iOS system of an iPhone mobile phone at present.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention aims to provide an iOS system network communication interception method and system based on an iPhone mobile phone, which can bypass the mechanism of the iOS system, take over all TCP/UDP communication flows of the iPhone mobile phone in full authority, and can modify the communication contents in the iOS system network communication interception method and system.
In order to achieve the above and other objects, the present invention provides an iOS system network communication interception method based on an iPhone handset, which specifically comprises the following steps:
s1, receiving a starting request, and creating a virtual network card suitable for the iOS system according to the request instruction;
s2, acquiring a virtual network card data packet, rewriting and cracking a routing table injected into the iOS system, and completely guiding the original normally received data to pass through the virtual network card;
s3, intercepting the data through the virtual network card, and implementing integration processing;
and S4, selectively transmitting the data after the integration processing.
Further, before step S3, data is encapsulated and unpacking is performed on the sent data set packet or the received data;
in step S3, the integration processing, screening, recombining, analyzing and filtering of the intercepted data are completed in the transit server, including intercepting and capturing the received data, or filtering and modifying the transmitted data;
in step S4, the data after the integration process is sent to the server or the client.
Further, the reassembly resolution filtering includes regular expression, find replacement, and duplicate modification.
Furthermore, the virtual network card acquires a bottom layer data structure of the system in a cracking and decompiling mode, and then the bottom layer data is injected, modified and created;
the virtual network card has the functions of holding websites and recording behaviors;
in order to achieve the above object, the present invention further provides an iOS system network communication interception system based on the iPhone handset, which specifically includes:
the virtual network card creating unit is used for receiving the starting request and creating a virtual network card suitable for the iOS system according to the request instruction;
the rewriting injection unit is used for acquiring the data packet of the virtual network card creation unit, rewriting and cracking the routing table injected into the iOS system, and guiding all the data which is normally received originally to pass through the virtual network card;
the data integration processing unit intercepts data and implements integration processing through the virtual network card and a routing table which is rewritten and cracked and injected into the iOS system;
and the sending unit is used for selectively sending the data integrated and processed by the data integration processing unit.
Further, the system further comprises:
the packaging module is used for packaging data and unpacking the sent data set packet or the received data;
the transfer processing module is used for completing integration processing, screening, recombination analysis and filtering of the intercepted data in the transfer server, including intercepting and capturing the received data or filtering and modifying the sent data;
the clamping module is used for clamping the website and the data information;
and the memory module is used for performing trace memory on the system operation behavior.
Compared with the prior art, the invention has the following beneficial effects:
the invention intercepts the iOS system in the iPhone, can bypass the mechanism of the iOS system, takes over all TCP/UDP communication flows of the iPhone in full right, and can modify the communication content in the iPhone at will. And transmitting and receiving message channels of one-line APPs such as WeChat, microblog and QQ can be transferred to the private server, and data communication information can be obtained from the private server. Sensitive words can also be analyzed and the communication can be discarded as long as they are included. The rule can be set according to the actual requirements of enterprises, can also be used for secondary encryption, and is suitable for secondary development and use of the enterprises.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flowchart illustrating steps of an iOS system network communication interception method based on an iPhone handset according to the present invention;
fig. 2 is a flow chart of an embodiment of an iOS system network communication interception method based on an iPhone mobile phone according to the present invention;
fig. 3 is a system architecture diagram of an iOS system network communication interception system based on an iPhone handset.
Detailed Description
To make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention are described below with reference to specific embodiments and accompanying drawings, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and its several details are capable of modification in various other respects, all without departing from the spirit and scope of the present invention.
Fig. 1 is a flowchart illustrating steps of an iOS system network communication interception method based on an iPhone handset according to an embodiment of the present invention.
As shown in fig. 1, the method for intercepting an iOS system network communication based on an iPhone phone of the present invention specifically includes the following steps:
s1, receiving a starting request, and creating a virtual network card suitable for the iOS system according to the request instruction;
s2, acquiring a virtual network card data packet, rewriting and cracking a routing table injected into the iOS system, and completely guiding the original normally received data to pass through the virtual network card;
s3, intercepting the data through the virtual network card, and implementing integration processing;
and S4, selectively transmitting the data after the integration processing.
In the embodiment of the present invention, before step S3, data is encapsulated and unpacking of the transmitted data set packet or the received data is performed;
in step S3, the relay server completes the integration processing, screening, recombining, analyzing and filtering of the intercepted data, including intercepting and capturing the received data, or filtering and modifying the transmitted data.
The interception and capture operations in the invention are packet analysis by checking the communication packets in the virtual network card. Unpacking the content of the packet, screening the byte stream after unpacking, filtering the screened sensitive content, or forwarding the content to a specified server transfer server.
The forwarding to the designated server transit server only needs to be carried out on ip, and the forwarding is directed to a certain ip. For example: i set up a server ip 123.123.123.123 in Ali cloud, and I can forward data to the address of the server. I can build one server 111.33.44.55 for the cloud in hua, and can also forward 2 servers at the same time.
For example, the servers that the wechat originally sends and receives data are: the method comprises the steps of intercepting mp.wx.qq.com, diverting all data leading to the mp.wx.qq.com to an abc.com server, processing the information by the server, retransmitting the information to the mp.wx.qq.com, and performing a capturing action in the middle.
In step S4, the data after the integration process is sent to the server or the client.
Specifically, the recombining, parsing and filtering includes regular expression, find replacement and copy modification.
Preferably, the virtual network card is created by acquiring a bottom layer data structure of the system in a cracking and decompiling manner and then injecting and modifying the bottom layer data; specifically, the method for requesting the jump is realized by rewriting the routing table of the iOS system, and the routing table data belongs to the low-level data of the IOS system, is decompiled and then is processed and modified.
In the specific embodiment of the invention, the bottom layer data structure of the system is obtained by cracking and decompiling, then injection modification is carried out on the bottom layer data, namely bottom layer injection, two lines of receiving data and sending data are established, the data is received to carry out interception and capture operation on the data for the communication layer, and the data is sent to carry out filtering and modification operation on the data for the communication layer.
As shown in fig. 2, for an embodiment of the present invention, a plurality of APPs may be intercepted simultaneously, or message contents of a plurality of APPs may be modified. Example (c): the method can realize that users are prohibited from sending friend circles by WeChat and paying with a Paibao, and the QQ sends group messages to start to install the APP plug-in developed by the method in the iPhone mobile phone, and the APP is called as the APP in the following. After the plug-in is started once, the plug-in automatically runs in the background of the iPhone mobile phone, the APP state can be closed or finished, but the APP cannot be unloaded. After the APP is started, the iphone mobile phone is normally operated, and if the iphone mobile phone uses common software such as WeChat APP and QQAPP at the moment, the App can capture all communication data including chat characters, pictures and the like of WeChat and corresponding common APP at the background. This chat information may be forwarded to the designated transit server after capture. Before the WeChat and the corresponding common APP receive the message, the data can be intercepted in real time, and an administrator can configure the WeChat and the corresponding common APP at the background and can add and delete sensitive words. For example, if a sensitive word is received, the APP can automatically filter the message, and the WeChat and the corresponding common APP cannot receive the message. Before the user sends the message through the wireless network, for example, the user sends a 'sensitive word eye', the APP immediately intercepts and fails to send the message. The wireless network comprises wireless networks of three operators, including wireless WiFi, 4G, 3G and 2G networks.
The invention is suitable for interception by various communication protocol technologies, including HTTP: URLSession, AFNetworking and the like, and a TCP \ UDP protocol: AsyncSocket, AsyncUdpSocket, GCDAsyncUdpSocket and the like, and the SOCKET protocol comprises the following components in parts by weight: AsyncSocket, cocoasyncsocket and the like, the connection of POP3, FTP and SMTP can also realize interception, and the interception can also be customized according to the protocol of the actual situation.
The virtual network card of the invention also has the function of holding websites, for example, some companies on the market, mobile phones and computers need to install an authentication client for logging in before being used for browsing websites normally. At the moment, the invention is integrated at the authentication client, so that the online behavior of the employee mobile phone can be controlled, the mobile phone self-contained browser accesses www.youku.com video network, and then my virtual network card checks: com cannot be opened if he uses the company's network to save the company's network bandwidth. Meanwhile, the mobile phone access www.163.com can be switched to www.21cn.com, and according to the actual situation of the enterprise, unhealthy web pages or flow consumption web pages are filtered.
The invention has a behavior recording function, and the following assumptions are made: the invention integrates the Taobao APP, all mobile phones with the Taobao APP need to be operated once and do not need to be opened later, and the mobile phones can be recorded by the virtual network card as long as the mobile phones have network requests. Any APP, including the browser of the system itself, will also be recorded. And when the number of the user behavior data is recorded, the user behavior data is forwarded to a specified server for counting the user behavior data. It can count when the user visits what website, what content is input, how long the user stays, etc.
The method and the system are very suitable for enterprises, and the rules can be set according to the actual requirements of the enterprises. For example, some enterprises with high requirements for confidential information can completely intercept the communication of any software. For example: an express company installs an addressee APP on a mobile phone matched with a courier, at the moment, the software can integrate the technology, and as long as an Iphone mobile phone of the addressee APP is installed, the IP phone can only use the addressee APP due to the function of the invention for intercepting the network, and all other APPs cannot be completely blocked by using network connection.
The invention can also be used for secondary encryption and is suitable for secondary development and use of enterprises. For example: some OA system chat IM content is not encrypted, need encryption function to formulate the development, use this invention can be captured chat content, encrypt, then send out. The server can decrypt the data according to the appointed encryption method.
Fig. 3 is a system architecture diagram of an embodiment of an iOS system network communication interception system based on an iPhone handset.
As shown in fig. 3, to achieve the above object, the present invention further provides an iOS system network communication intercepting system based on an iPhone mobile phone, which specifically includes:
the virtual network card creating unit is used for receiving the starting request and creating a virtual network card suitable for the iOS system according to the request instruction;
the rewriting injection unit is used for acquiring the data packet of the virtual network card creation unit, rewriting and cracking the routing table injected into the iOS system, and guiding all the data which is normally received originally to pass through the virtual network card;
the data integration processing unit intercepts data and implements integration processing through the virtual network card and a routing table which is rewritten and cracked and injected into the iOS system;
and the sending unit is used for selectively sending the data integrated and processed by the data integration processing unit.
Preferably, the system further comprises:
the packaging module is used for packaging data and unpacking the sent data set packet or the received data;
the transfer processing module is used for completing integration processing, screening, recombination analysis and filtering of the intercepted data in the transfer server, including intercepting and capturing the received data or filtering and modifying the sent data;
the clamping module is used for clamping the website and the data information;
and the memory module is used for performing trace memory on the system operation behavior.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (5)

1. An iOS system network communication interception method based on an iPhone mobile phone is characterized by comprising the following steps:
s1, receiving a starting request, and creating a virtual network card suitable for the iOS system according to the request instruction;
s2, acquiring a virtual network card data packet, rewriting and cracking a routing table injected into the iOS system, and completely guiding the original normally received data to pass through the virtual network card;
s3, intercepting the data through the virtual network card, and implementing integration processing;
s4, selectively sending the data after the integration processing;
the virtual network card acquires a bottom layer data structure of the system in a cracking and decompiling mode, and then the bottom layer data is injected, modified and created;
the virtual network card has the functions of holding websites and recording behaviors.
2. The iOS system network communication interception method based on the iPhone mobile phone according to claim 1, wherein:
before step S3, data is encapsulated and unpacking of the transmitted data set packet or the received data is performed;
in step S3, the integration processing, screening, recombining, analyzing and filtering of the intercepted data are completed in the transit server, including intercepting and capturing the received data, or filtering and modifying the transmitted data;
in step S4, the data after the integration process is sent to the server or the client.
3. The iOS system network communication interception method based on the iPhone handset according to claim 2, wherein the re-composition parsing filtering includes regular expression, search replacement, and copy modification.
4. An iOS system network communication interception system based on an iPhone mobile phone, the system comprising:
the virtual network card creating unit is used for receiving the starting request and creating a virtual network card suitable for the iOS system according to the request instruction;
the rewriting injection unit is used for acquiring the data packet of the virtual network card creation unit, rewriting and cracking the routing table injected into the iOS system, and guiding all the data which is normally received originally to pass through the virtual network card;
the data integration processing unit intercepts data and implements integration processing through the virtual network card and a routing table which is rewritten and cracked and injected into the iOS system;
the sending unit is used for selectively sending the data integrated and processed by the data integration processing unit;
the virtual network card acquires a bottom layer data structure of the system in a cracking and decompiling mode, and then the bottom layer data is injected, modified and created;
the virtual network card has the functions of holding websites and recording behaviors.
5. The iOS system network communication interception system based on an iPhone handset according to claim 4, wherein said system further comprises:
the packaging module is used for packaging data and unpacking the sent data set packet or the received data;
the transfer processing module is used for completing integration processing, screening, recombination analysis and filtering of the intercepted data in the transfer server, including intercepting and capturing the received data or filtering and modifying the sent data;
the clamping module is used for clamping the website and the data information;
and the memory module is used for performing trace memory on the system operation behavior.
CN201711398735.4A 2017-12-22 2017-12-22 iOS system network communication interception method and system based on iPhone mobile phone Active CN108566358B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711398735.4A CN108566358B (en) 2017-12-22 2017-12-22 iOS system network communication interception method and system based on iPhone mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711398735.4A CN108566358B (en) 2017-12-22 2017-12-22 iOS system network communication interception method and system based on iPhone mobile phone

Publications (2)

Publication Number Publication Date
CN108566358A CN108566358A (en) 2018-09-21
CN108566358B true CN108566358B (en) 2021-03-26

Family

ID=63529442

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711398735.4A Active CN108566358B (en) 2017-12-22 2017-12-22 iOS system network communication interception method and system based on iPhone mobile phone

Country Status (1)

Country Link
CN (1) CN108566358B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109446086A (en) * 2018-10-29 2019-03-08 北京酷我科技有限公司 A kind of method of App inside packet capturing
CN110740093B (en) * 2019-10-24 2020-09-15 北京大学 Data forwarding device based on virtual host
CN111490939A (en) * 2020-03-30 2020-08-04 苏州瑞立思科技有限公司 High-performance windows network card driving method supporting advanced strategy configuration
CN115499402A (en) * 2022-08-23 2022-12-20 北京天空卫士网络安全技术有限公司 Instant messaging information processing method, terminal and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7657011B1 (en) * 2006-03-16 2010-02-02 Juniper Networks, Inc. Lawful intercept trigger support within service provider networks
CN103916405A (en) * 2014-04-25 2014-07-09 厦门享游网络科技有限公司 Method for guiding flow of TCP/UDP of App on IOS
CN104506545A (en) * 2014-12-30 2015-04-08 北京奇虎科技有限公司 Data leakage prevention method and data leakage prevention device
CN105656943A (en) * 2016-03-15 2016-06-08 上海缔安科技股份有限公司 Application data interception system and method
CN105721419A (en) * 2014-12-19 2016-06-29 卡巴斯基实验室股份制公司 System and method for selecting means for intercepting network transmissions
CN106209838A (en) * 2016-07-08 2016-12-07 杭州迪普科技有限公司 The IP cut-in method of SSL VPN and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7941562B2 (en) * 2006-03-30 2011-05-10 Red Aril, Inc. Network device for monitoring and modifying network traffic between an end user and a content provider

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7657011B1 (en) * 2006-03-16 2010-02-02 Juniper Networks, Inc. Lawful intercept trigger support within service provider networks
CN103916405A (en) * 2014-04-25 2014-07-09 厦门享游网络科技有限公司 Method for guiding flow of TCP/UDP of App on IOS
CN105721419A (en) * 2014-12-19 2016-06-29 卡巴斯基实验室股份制公司 System and method for selecting means for intercepting network transmissions
CN104506545A (en) * 2014-12-30 2015-04-08 北京奇虎科技有限公司 Data leakage prevention method and data leakage prevention device
CN105656943A (en) * 2016-03-15 2016-06-08 上海缔安科技股份有限公司 Application data interception system and method
CN106209838A (en) * 2016-07-08 2016-12-07 杭州迪普科技有限公司 The IP cut-in method of SSL VPN and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ios charles proxy教程;颐和园;《https://blog.csdn.net/kmyhy/article/details/74389070》;20170705;全文 *
mitmproxy的使用;Mrpeak;《https://www.jianshu.com/p/29647028989d》;20161123;全文 *

Also Published As

Publication number Publication date
CN108566358A (en) 2018-09-21

Similar Documents

Publication Publication Date Title
CN108566358B (en) iOS system network communication interception method and system based on iPhone mobile phone
US20220060518A1 (en) Inline secret sharing
US11303647B1 (en) Synthetic request injection to disambiguate bypassed login events for cloud policy enforcement
US11757944B2 (en) Network intermediary with network request-response mechanism
US11831683B2 (en) Cloud object security posture management
US20150156183A1 (en) System and method for filtering network communications
US11831685B2 (en) Application-specific data flow for synthetic request injection
US11184403B1 (en) Synthetic request injection to generate metadata at points of presence for cloud security enforcement
US11700239B2 (en) Split tunneling based on content type to exclude certain network traffic from a tunnel
US11888902B2 (en) Object metadata-based cloud policy enforcement using synthetic request injection
CN108243143B (en) Web agent-based gatekeeper penetration method and system
JP2016530814A (en) Gateway device to block a large number of VPN connections
US11336698B1 (en) Synthetic request injection for cloud policy enforcement
US11647052B2 (en) Synthetic request injection to retrieve expired metadata for cloud policy enforcement
US10601777B2 (en) Data inspection system and method
CN103401885A (en) Network file authorization control method, device and system
US10057390B2 (en) Method and system for modifying HTTP request headers without terminating the connection
CN103067389A (en) High safety file transfer method based on short website
WO2022226202A1 (en) Synthetic request injection to retrieve object metadata for cloud policy enforcement
WO2022226208A1 (en) Synthetic request injection to improve object security posture for cloud security enforcement
US20200021563A1 (en) Software Defined Network Routing For Secured Communications and Information Security
US11985168B2 (en) Synthetic request injection for secure access service edge (SASE) cloud architecture
US20230422040A1 (en) 5g lan security
Texon et al. Fingerprinting: Tiktok Analysis of Network Traffic Using Data Capture Tools
WO2022226210A1 (en) Synthetic request injection for cloud policy enforcement

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant