CN109960937B - Method and system for constructing vulnerability drilling environment - Google Patents

Method and system for constructing vulnerability drilling environment Download PDF

Info

Publication number
CN109960937B
CN109960937B CN201910260401.3A CN201910260401A CN109960937B CN 109960937 B CN109960937 B CN 109960937B CN 201910260401 A CN201910260401 A CN 201910260401A CN 109960937 B CN109960937 B CN 109960937B
Authority
CN
China
Prior art keywords
vulnerability
information
software
drilling environment
establishing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910260401.3A
Other languages
Chinese (zh)
Other versions
CN109960937A (en
Inventor
范文庆
黄玮
安靖
巩微
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Communication University of China
Original Assignee
Communication University of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Communication University of China filed Critical Communication University of China
Priority to CN201910260401.3A priority Critical patent/CN109960937B/en
Publication of CN109960937A publication Critical patent/CN109960937A/en
Application granted granted Critical
Publication of CN109960937B publication Critical patent/CN109960937B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a method and a system for constructing a vulnerability drilling environment. The construction method comprises the following steps: acquiring vulnerability information in a computer security system; extracting vulnerability information in the vulnerability information, wherein the vulnerability information comprises a software manufacturer, a software name and a software version; and establishing a vulnerability drilling environment according to the vulnerability information. The vulnerability information is obtained through the vulnerability information, the accuracy of the vulnerability information is improved, and then the vulnerability drilling environment is established according to the vulnerability information, so that the establishment efficiency of the vulnerability drilling environment and the accuracy of the drilling environment are further improved.

Description

Method and system for constructing vulnerability drilling environment
Technical Field
The invention relates to the field of computer security, in particular to a method and a system for constructing a vulnerability drilling environment.
Background
Honeypot and honeynet technologies are used to collect intelligence and prevent intrusion, disguising as a vulnerable target system. The method includes the steps that a hacker is attracted to attack in the future, after the attack is started, an attack sample is captured to be used for analyzing malicious behaviors by controlling the whole attack link process, attack tracing is conducted to search the hacker, a sandbox technology is used for conducting static or dynamic analysis on a target sample to be analyzed, whether the sample has the malicious behaviors or not is judged by analyzing specific behavior characteristics of the sample, and a target environment is simulated by combining a virtual environment and real equipment by a target technology and is used for safe talent education training. However, the target technology has hysteresis, and after a security event occurs, information security practitioners restore an attack scene in a manual construction mode aiming at vulnerabilities in existing security events to complete research and learning of related vulnerabilities.
From the perspective of safe talent education and cultivation, compared with a simulated or simulated target training environment, the practical significance of a real environment is more important, a real bug is applied to attack and defense training education, a higher-specification talent training cultivation mode is realized, the cultivation period can be shortened by using the real bug environment as the cultivation environment, an early warning can be sent to information security management personnel after the bug information is found, for the information security management personnel, after the early warning is received, a large amount of time and experience are spent to finish investigation and research of the bug information, and the related bug principle and the existence of the bug are learned. If the requirements of the drilling of the loophole environment exist, a loophole reproducible environment needs to be set up, desensitization of related business data is guaranteed, and the workload of information security management personnel is increased.
The method for constructing the vulnerability drilling environment in the prior art often has hysteresis, and cannot quickly respond and quickly build a real vulnerability drilling environment.
Disclosure of Invention
The invention aims to provide a method for building a real vulnerability drilling environment.
In order to achieve the purpose, the invention provides the following scheme:
a construction method of a vulnerability drilling environment comprises the following steps:
acquiring vulnerability information in a computer security system;
extracting vulnerability information in the vulnerability information, wherein the vulnerability information comprises a software manufacturer, a software name, a software version, software construction parameters, simulation service data required by software operation, a software vulnerability existence scanning/verification code, a concept verification code required by triggering a software vulnerability and an expected effect generated by software vulnerability triggering;
the simulation service data required by the software operation are test data of a system in a database and a test account number of a remote access system;
the software vulnerability existence scanning/verifying code is used for automatically verifying whether the vulnerability really exists after the drilling environment is built;
and establishing a vulnerability drilling environment according to the vulnerability information.
Optionally, the construction method further includes:
and verifying the running state of the vulnerability drilling environment by adopting the real computer security system.
Optionally, the establishing of the vulnerability drilling environment according to the vulnerability information specifically includes:
obtaining a binary information group (S) from the vulnerability informationnV), said binary information set (S)nV) is a mirror image maintained by a software vendor in container technology, where SnIs the software name, and V is the software version;
grouping the binary information (S)nV) expanding the information into a quaternary information group to obtain the quaternary information group;
and establishing a vulnerability drilling environment by adopting a container technology according to the quaternary information group.
Optionally, the obtaining vulnerability intelligence in the computer security system specifically includes:
threat information is obtained through a threat information obtaining platform;
converting the format of the threat information into a standard information format to obtain standard information;
acquiring a vulnerability number C1, a database name C2 and a software name S of the vulnerability from the standard intelligencenSoftware version SvSoftware type StThe method comprises the following steps of utilizing a vulnerability U, monitoring a port P by the affected software, a run-time dependency list L, utilizing effect I of the vulnerability and version O of an operating systemvAnd an expandable field ExObtaining the vulnerability information VI ═ (C1, C2, S)n,Sv,St,U,P,L,I,Ov,Ex)。
In order to achieve the above object, the present invention further provides the following solutions:
a construction system of a vulnerability drill environment, the construction system comprising:
the vulnerability information acquisition module is used for acquiring vulnerability information in the computer security system;
the vulnerability information extraction module is used for extracting vulnerability information in the vulnerability information, wherein the vulnerability information comprises a software manufacturer, a software name and a software version;
and the vulnerability drilling environment establishing module is used for establishing a vulnerability drilling environment according to the vulnerability information.
Optionally, the building system further includes:
and the verification module is used for verifying the running state of the vulnerability drilling environment by adopting the real computer security system.
Optionally, the vulnerability drilling environment establishing module specifically includes:
a binary information group acquisition unit for acquiring a binary information group (S) according to the vulnerability informationnV), said binary information set (S)nV) is a mirror image maintained by a software vendor in container technology, where SnIs the software name, and V is the software version;
a drilling environment establishing unit for establishing a drilling environment based on the binary information set (S)nAnd V) adopting a container technology to establish a vulnerability drilling environment.
Optionally, the vulnerability information obtaining module specifically includes:
the threat information acquisition unit is used for acquiring threat information through the threat information acquisition platform;
the format standard unit is used for converting the format of the threat information into a standard information format to obtain standard information;
a vulnerability information obtaining unit for obtaining the vulnerability number C1, the database name C2 and the software name S of the vulnerability from the standard informationnSoftware version SvSoftware type StThe method comprises the following steps of utilizing a vulnerability U, monitoring a port P by the affected software, a run-time dependency list L, utilizing effect I of the vulnerability and version O of an operating systemvAnd an expandable field ExObtaining the vulnerability information
VI=(C1,C2,Sn,Sv,St,U,P,L,I,Ov,Ex)。
Optionally, the building system further includes a verification module, configured to supplement the newly added automatic verification that the built drilling system really has a bug and verifies expected damage of the bug, where the scanning/verification code for existence of the software bug, the concept verification code required for triggering the software bug, and the expected effect generated by triggering the software bug are all analyzed and extracted from threat information, and a provider with the bug information adds the bug information by itself.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects: the invention provides a method and a system for constructing a vulnerability drilling environment. The construction method comprises the following steps: acquiring vulnerability information in a computer security system; extracting vulnerability information in the vulnerability information, wherein the vulnerability information comprises a software manufacturer, a software name and a software version; and establishing a vulnerability drilling environment according to the vulnerability information. The vulnerability information is obtained through the vulnerability information, the accuracy of the vulnerability information is improved, and then the vulnerability drilling environment is established according to the vulnerability information, so that the establishment efficiency of the vulnerability drilling environment and the accuracy of the drilling environment are further improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
FIG. 1 is a flowchart of a method for constructing a vulnerability drilling environment provided by the present invention;
fig. 2 is a block diagram of a system for constructing a vulnerability drilling environment according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a method for building a real vulnerability drilling environment.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
As shown in fig. 1, the present invention provides a method for constructing a vulnerability drilling environment, where the method includes:
step 100: acquiring vulnerability information in a computer security system;
step 200: extracting vulnerability information in the vulnerability information, wherein the vulnerability information comprises a software manufacturer, a software name and a software version; the method comprises the following steps of firstly, establishing parameters of software, simulation service data required by software operation, scanning/verifying codes for existence of software bugs, concept verifying codes required by triggering the software bugs, and expected effects generated by triggering the software bugs; the simulation service data required by the software operation are test data of a system in a database and a test account number of a remote access system; the software vulnerability existence scanning/verifying code is used for automatically verifying whether the vulnerability really exists after the drilling environment is built;
step 300: and establishing a vulnerability drilling environment according to the vulnerability information.
The step 300 is as follows: establishing a vulnerability drilling environment according to the vulnerability information further comprises:
step 400: and verifying the running state of the vulnerability drilling environment by adopting the real computer security system.
The step 300 is as follows: the establishing of the vulnerability drilling environment according to the vulnerability information specifically comprises the following steps:
obtaining a binary information group (S) from the vulnerability informationnV), said binary information set (S)nV) is a mirror image maintained by a software vendor in container technology, where SnIs the software name, and V is the software version;
grouping the binary information (S)nV) expanding the information into a quaternary information group to obtain the quaternary information group;
and establishing a vulnerability drilling environment by adopting a container technology according to the quaternary information group.
The step 100: the method for acquiring vulnerability information in the computer security system specifically comprises the following steps:
threat information is obtained through a threat information obtaining platform;
converting the format of the threat information into a standard information format to obtain standard information;
acquiring vulnerability number C1 of vulnerability and database of vulnerability from standard intelligenceName C2, software name SnSoftware version SvSoftware type StThe method comprises the following steps of utilizing a vulnerability U, monitoring a port P by the affected software, a run-time dependency list L, utilizing effect I of the vulnerability and version O of an operating systemvAnd an expandable field ExObtaining the vulnerability information VI ═ (C1, C2, S)n,Sv,St,U,P,L,I,Ov,Ex)。
As shown in fig. 2, in order to achieve the above object, the present invention further provides the following solutions:
a construction system of a vulnerability drill environment, the construction system comprising:
the vulnerability information acquisition module 1 is used for acquiring vulnerability information in the computer security system;
the vulnerability information extraction module 2 is used for extracting vulnerability information in the vulnerability information, wherein the vulnerability information comprises a software manufacturer, a software name and a software version;
and the vulnerability drilling environment establishing module 3 is used for establishing a vulnerability drilling environment according to the vulnerability information.
The construction system further includes:
and the verification module 4 is used for verifying the running state of the vulnerability drilling environment by adopting the real computer security system.
The vulnerability drilling environment establishing module 3 specifically comprises:
a binary information group acquisition unit for acquiring a binary information group (S) according to the vulnerability informationnV), said binary information set (S)nV) is a mirror image maintained by a software vendor in container technology, where SnIs the software name, and V is the software version;
a drilling environment establishing unit for establishing a drilling environment based on the binary information set (S)nAnd V) adopting a container technology to establish a vulnerability drilling environment.
The vulnerability information acquisition module 1 specifically includes:
the threat information acquisition unit is used for acquiring threat information through the threat information acquisition platform;
the format standard unit is used for converting the format of the threat information into a standard information format to obtain standard information;
a vulnerability information obtaining unit for obtaining the vulnerability number C1, the database name C2 and the software name S of the vulnerability from the standard informationnSoftware version SvSoftware type StThe method comprises the following steps of utilizing a vulnerability U, monitoring a port P by the affected software, a run-time dependency list L, utilizing effect I of the vulnerability and version O of an operating systemvAnd an expandable field ExObtaining the vulnerability information
VI=(C1,C2,Sn,Sv,St,U,P,L,I,Ov,Ex)。
The building system further comprises a verification module which is used for supplementing the fact that the newly-added automatic verification built drilling system really has a bug and verifying expected damage of the bug, wherein scanning/verification codes of software bug existence, concept verification codes required by triggering the software bug and expected effects generated by triggering the software bug are analyzed and extracted from threat information, and providers with the bug information add the bug information by themselves.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the system disclosed by the embodiment, the description is relatively simple because the system corresponds to the method disclosed by the embodiment, and the relevant points can be referred to the method part for description.
The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.

Claims (5)

1. A construction method of a vulnerability drilling environment is characterized by comprising the following steps:
acquiring vulnerability information in a computer security system; the method specifically comprises the following steps:
threat information is obtained through a threat information obtaining platform;
converting the format of the threat information into a standard information format to obtain standard information;
acquiring a vulnerability number C1 of a vulnerability, a database name C2 of the vulnerability, a software name Sn, a software version Sv, a software type St, a utilization mode U of the vulnerability, an affected software monitoring port P, a runtime dependency list L, a utilization effect I of the vulnerability, an operating system version Ov and an expandable field Ex from the standard intelligence to obtain vulnerability intelligence VI (C1, C2, Sn, Sv, St, U, P, L, I, Ov, Ex);
extracting vulnerability information in the vulnerability information, wherein the vulnerability information comprises a software manufacturer, a software name, a software version, software construction parameters, simulation service data required by software operation, a software vulnerability existence scanning/verification code, a concept verification code required by triggering a software vulnerability and an expected effect generated by software vulnerability triggering;
the simulation service data required by the software operation are test data of a system in a database and a test account number of a remote access system;
the software vulnerability existence scanning/verifying code is used for automatically verifying whether the vulnerability really exists after the drilling environment is built;
establishing a vulnerability drilling environment according to the vulnerability information, which specifically comprises the following steps:
acquiring a binary information group (Sn, Sv) according to the vulnerability information, wherein the binary information group (Sn, Sv) is a mirror image maintained by a software manufacturer in a container technology;
expanding the binary information group (Sn, Sv) into a quaternary information group to obtain a quaternary information group;
and establishing a vulnerability drilling environment by adopting a container technology according to the quaternary information group.
2. The method for constructing the vulnerability drilling environment according to claim 1, further comprising:
and verifying the running state of the vulnerability drilling environment by adopting the real computer security system.
3. A building system of a vulnerability drill environment, the building system comprising:
the vulnerability information acquisition module is used for acquiring vulnerability information in the computer security system; the method specifically comprises the following steps:
the threat information acquisition unit is used for acquiring threat information through the threat information acquisition platform;
the format standard unit is used for converting the format of the threat information into a standard information format to obtain standard information;
a vulnerability information obtaining unit, which is used for obtaining the vulnerability number C1 of the vulnerability, the database name C2 of the vulnerability, the software name Sn, the software version Sv, the software type St, the utilization mode U of the vulnerability, the affected software monitoring port P, the runtime dependency list L, the utilization effect I of the vulnerability, the operating system version Ov and the expandable field Ex from the standard information to obtain the vulnerability information
VI=(C1,C2,Sn,Sv,St,U,P,L,I,Ov,Ex);
The vulnerability information extraction module is used for extracting vulnerability information in the vulnerability information, wherein the vulnerability information comprises a software manufacturer, a software name and a software version;
the vulnerability drilling environment establishing module is used for establishing a vulnerability drilling environment according to the vulnerability information, and specifically comprises the following steps:
the binary information group acquisition unit is used for acquiring a binary information group (Sn, Sv) according to the vulnerability information, wherein the binary information group (Sn, Sv) is a mirror image maintained by a software manufacturer in a container technology;
and the drilling environment establishing unit is used for establishing the vulnerability drilling environment by adopting a container technology according to the binary information group (Sn, Sv).
4. The system for building the vulnerability drilling environment according to claim 3, further comprising:
and the verification module is used for verifying the running state of the vulnerability drilling environment by adopting the real computer security system.
5. The system for constructing a drilling environment for vulnerabilities according to claim 3, further comprising a verification module for supplementing a newly added automation verification that the drilling system constructed by the new automation verification has a vulnerability and verifying expected damage of the vulnerability, wherein the scanning/verification code for existence of the software vulnerability, the concept verification code required for triggering the software vulnerability, and the expected effect generated by triggering the software vulnerability are analyzed and extracted from threat information and are added by a provider of the vulnerability information.
CN201910260401.3A 2019-04-02 2019-04-02 Method and system for constructing vulnerability drilling environment Active CN109960937B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910260401.3A CN109960937B (en) 2019-04-02 2019-04-02 Method and system for constructing vulnerability drilling environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910260401.3A CN109960937B (en) 2019-04-02 2019-04-02 Method and system for constructing vulnerability drilling environment

Publications (2)

Publication Number Publication Date
CN109960937A CN109960937A (en) 2019-07-02
CN109960937B true CN109960937B (en) 2020-10-27

Family

ID=67025590

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910260401.3A Active CN109960937B (en) 2019-04-02 2019-04-02 Method and system for constructing vulnerability drilling environment

Country Status (1)

Country Link
CN (1) CN109960937B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110569648B (en) * 2019-09-16 2021-07-27 杭州安恒信息技术股份有限公司 Method and device for organizing version cave library
US11765131B2 (en) * 2019-10-07 2023-09-19 Schlumberger Technology Corporation Security system and method for pressure control equipment
CN111259406B (en) * 2020-01-14 2022-06-07 中国传媒大学 Automatic construction method and system for cloud native application vulnerability reproduction environment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853175A (en) * 2009-03-31 2010-10-06 甲骨文美国公司 The self check that promotes in the virtualized environment
CN103701777A (en) * 2013-12-11 2014-04-02 长春理工大学 Remote network attack and defense virtual simulation system based on virtualization and cloud technology
CN104077532A (en) * 2014-06-20 2014-10-01 中标软件有限公司 Linux virtualization platform safety detection method and system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060101519A1 (en) * 2004-11-05 2006-05-11 Lasswell Kevin W Method to provide customized vulnerability information to a plurality of organizations
US8819832B2 (en) * 2011-08-26 2014-08-26 Rapid7, Llc Systems and methods for performing vulnerability scans on virtual machines
CN106295347B (en) * 2015-05-28 2019-06-18 国家计算机网络与信息安全管理中心 For building the method and device of validating vulnerability environment
CN106203126B (en) * 2016-07-15 2019-07-09 国家计算机网络与信息安全管理中心 A kind of validating vulnerability method and system based on simulated environment
CN107480531A (en) * 2017-07-18 2017-12-15 北京计算机技术及应用研究所 Automated software validating vulnerability system and method based on vulnerability database
CN107977225B (en) * 2017-12-06 2020-11-10 国网江苏省电力有限公司电力科学研究院 Unified description method and description system for security vulnerabilities

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853175A (en) * 2009-03-31 2010-10-06 甲骨文美国公司 The self check that promotes in the virtualized environment
CN103701777A (en) * 2013-12-11 2014-04-02 长春理工大学 Remote network attack and defense virtual simulation system based on virtualization and cloud technology
CN104077532A (en) * 2014-06-20 2014-10-01 中标软件有限公司 Linux virtualization platform safety detection method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"SecDr:一种内容安全的Docker 镜像仓库";魏兴慎,苏大威,屠正伟 等;《计算机与现代化》;20180531;全文 *

Also Published As

Publication number Publication date
CN109960937A (en) 2019-07-02

Similar Documents

Publication Publication Date Title
Tian et al. A real-time correlation of host-level events in cyber range service for smart campus
CN107659543B (en) Protection method for APT (android packet) attack of cloud platform
Spreitzenbarth et al. Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques
CN109960937B (en) Method and system for constructing vulnerability drilling environment
CN112685737A (en) APP detection method, device, equipment and storage medium
CN101699815B (en) Network attack automatic execution/exhibition system and method
CN107222515B (en) Honeypot deployment method and device and cloud server
KR101972825B1 (en) Method and apparatus for automatically analyzing vulnerable point of embedded appliance by using hybrid analysis technology, and computer program for executing the method
CA2691666A1 (en) System and method for simulating computer network attacks
Xiao et al. VulHunter: A Discovery for unknown Bugs based on Analysis for known patches in Industry Internet of Things
CN114969760A (en) Vulnerability detection method and device, computer readable medium and electronic equipment
Zamiri-Gourabi et al. Gas what? i can see your gaspots. studying the fingerprintability of ics honeypots in the wild
CN109818972B (en) Information security management method and device for industrial control system and electronic equipment
CN111339535A (en) Vulnerability prediction method and system for intelligent contract codes, computer equipment and storage medium
CN113935041A (en) Vulnerability detection system and method for real-time operating system equipment
US20220245260A1 (en) Method for checking the security of a technical unit
Jiang et al. Pandora: A cyber range environment for the safe testing and deployment of autonomous cyber attack tools
CN111767548A (en) Vulnerability capturing method, device, equipment and storage medium
Redwood Cyber physical system vulnerability research
CN115515139A (en) Vulnerability security detection method, device, equipment and storage medium
CN114579457A (en) Novel power system firmware operation simulation platform and simulation method
CN111190813B (en) Android application network behavior information extraction system and method based on automatic testing
CN109714371B (en) Industrial control network safety detection system
KR102134357B1 (en) System for testing cyber security of nuclear power plant and method thereof
CN109408194B (en) System and method for simulating execution of file

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant