CN110225018A - A method of based on more equipment evaluation web application fragility - Google Patents
A method of based on more equipment evaluation web application fragility Download PDFInfo
- Publication number
- CN110225018A CN110225018A CN201910469084.6A CN201910469084A CN110225018A CN 110225018 A CN110225018 A CN 110225018A CN 201910469084 A CN201910469084 A CN 201910469084A CN 110225018 A CN110225018 A CN 110225018A
- Authority
- CN
- China
- Prior art keywords
- web application
- evaluation
- factor
- vulnerability
- fragility
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of methods based on more equipment evaluation web application fragility, including multiple vulnerability scanning equipments;It establishes the vulnerability database of multiple equipment and is associated with unified vulnerability library, establish equipment loophole and unified vulnerability library mapping relations;Multiple equipment is scanned web application, summarizes scanning result;The assessment models based on fuzzy evaluation are established, the fragility score value of web application is obtained.Entropy weight is introduced in the assessment models, the entropy weight is combined with fuzzy evaluation, is determined the weight vectors in safety evaluation set of factors using E-government Network, is assessed web application vulnerability class.The accuracy of the method for carrying out assessment web application fragility using assessment models of the invention, drain sweep result is high, and website vulnerability is comprehensive, scores authoritative high.
Description
Technical field
The present invention relates to network safety filed more particularly to a kind of methods based on more equipment evaluation web application fragility.
Background technique
Vulnerability-scanning technology is a kind of important network security technology.It and firewall, intruding detection system are worked in coordination,
The safety of network can be effectively improved.By the scanning to network, network administrator will appreciate that the security setting and fortune of network
Capable application service finds security breaches, objective evaluation network risks grade in time.Network administrator can be according to the result of scanning
The mistake setting in cyberspace vulnerability and system is corrected, is taken precautions against before hacker attack.If firewall and network prison
Viewing system is that passively mean of defense then security sweep is exactly a kind of precautionary measures of active can effectively avoid hacker attack
Behavior is accomplished to prevent trouble before it happens.
It is intricate for web application platform on the market at present, each there is it to be good at the field of loophole ability of discovery.Needle
To the same web application loophole, the standards of grading of different vendor are also not quite identical.Cause user comprehensive, accurately to certain
A assets, which are made, clearly to be judged.
Drain sweep tool scores both for single web application, can not be all for some region as supervision unit
Assets weaker overall scores;Can not determine that scanning device scans the loophole ability of discovery ability of practice under special scenes can
The assessment of letter property.
Summary of the invention
For disadvantages described above, the present invention provide it is a kind of using based on more equipment to web application carry out vulnerability scanning after multidimensional
The method of degree assessment web application fragility.
The technical solution of the present invention is as follows:
A method of based on more equipment evaluation web application fragility, including multiple vulnerability scanning equipments;Establish multiple leakages
The vulnerability database of hole scanning device is simultaneously associated with unified vulnerability library, establishes equipment loophole and unified vulnerability library mapping relations;Multiple loopholes
Scanning device is scanned web application, summarizes scanning result;The assessment models based on fuzzy evaluation are established, web application is obtained
Fragility score value.
Further, entropy weight is introduced in the assessment models, the entropy weight is combined with fuzzy evaluation, utilizes entropic coefficient
Method determines the weight vectors in safety evaluation set of factors, assesses web application vulnerability class.
Further, the method that the assessment models are assessed includes:
It determines the set of factors U of web application security evaluation and judges collection V;The set of factors is by multiple safety-related with system
Factor;It is described to judge the set collected to be constituted with web using a variety of evaluations of safety-related each factor;
It determines fuzzy evaluating matrix R, evaluation is made to the set of factors U, establishes fuzzy relation, determines factor uiTo evaluation
Collect the value of V;
According to factor uiSignificance level entropy, obtain factor uiEntropy weight wi, determine set of factors weight vectors w;
Fuzzy overall evaluation vector b=wR is calculated, Comprehensive Evaluation processing is carried out.
Further, for the uncertainty of gauging system, such as minor function is introduced:
Wherein, HnFor comentropy;In the state set S that system is likely to occur, the probability that every kind of state occurs is p, if certain
The Probability p of stateiIt is 1, then HnPerseverance is 0, and illustrating the system, there is no uncertainties;If each state probability of occurrence is equal, HnIt reaches
To maximum value, system has maximum uncertainty at this time.
Further, the composition for judging collection pays the utmost attention to the risk registration feature and/or judge of evaluation security breaches
Element of set prime number is the principle of radix.
Further, factor u is measurediThe entropy of relative importance are as follows:
Wherein, a is score value, aijThe score value that object is i-th of assessment factor is assessed for j-th.
Further, factor uiEntropy it is bigger, lower to the significance level of assessment, significance level is represented by 1-
Hi, so as to obtain factor uiEntropy weight wiAre as follows:
Further, when carrying out vulnerability scanning to web application, security breaches risk is determined using maximum membership grade principle
Grade.
The invention has the benefit that a kind of method based on more equipment evaluation web application fragility of the present invention passes through collection
It is scanned at multiple equipment, is applied for the same web and carry out vulnerability analysis based on more equipment, most in conjunction with current international and national
Comprehensive drain sweep java standard library, unified basis loophole impact fraction, carries out data cleansing by big data platform, using based on setting more
It is standby to establish assessment models.Using assessment models of the invention carry out assessment web application fragility method, drain sweep result it is accurate
Property it is high, website vulnerability is comprehensive, scores authoritative high.
Detailed description of the invention
Fig. 1 is kind of the method schematic diagram based on more equipment evaluation web application fragility of the invention.
Specific embodiment
Further describe technical solution of the present invention with reference to the accompanying drawing:
As shown in Figure 1, a kind of method based on more equipment evaluation web application fragility, including multiple vulnerability scanning equipments;
It establishes the vulnerability database of multiple vulnerability scanning equipments and is associated with unified vulnerability library, establish equipment loophole and the mapping of unified vulnerability library is closed
System;Multiple vulnerability scanning equipments are scanned web application, summarize scanning result;The assessment models based on fuzzy evaluation are established,
Obtain the fragility score value of web application.
Because being scanned assessment using multiple vulnerability scanning equipments, entropy weight, the entropy weight are introduced in the assessment models
It is combined with fuzzy evaluation, determines the weight vectors in safety evaluation set of factors using E-government Network, assessment web application is fragile
Property grade.
The method that the assessment models are assessed comprises determining that the set of factors U of web application security evaluation and judges collection V;
The set of factors is by the multiple and safety-related factor of system;It is described to judge collection to apply safety-related each factor with web
The constituted set of a variety of evaluations;It determines fuzzy evaluating matrix R, evaluation is made to the set of factors U, establishes fuzzy relation, really
Determine factor uiTo the value of evaluate collection V;According to factor uiSignificance level entropy, obtain factor uiEntropy weight wi, determine set of factors
Weight vectors w;Fuzzy overall evaluation vector b=wR is calculated, Comprehensive Evaluation processing is carried out.
The determination of set of factors weight plays an important role in Comprehensive Evaluation processing, utilizes statistic law and expert graded knot
It closes and determines weight vectors with E-government Network, enhance the objectivity of evaluation result, selection is closely related safely multiple with system
Because of a possibility that usually constituting the set of factors of model, being potential hazard, recycling respectively, the degree of difficulty, impacted utilized
The complexity of user scope and discovery,
The method of assessment is in detail in a kind of method based on more equipment evaluation web application fragility of the present invention, determines and judges
Collect V={ v1,v2,...,vk, it is that constituted set is evaluated in view of evaluation by the k kind to the safe each factor of Web application
The risk class feature and judge element of set prime number of security breaches are the principle of radix, and the judge collection V of this model selects 3 etc.
Grade, is high, medium and low, i.e. V={ high v respectively1, middle v2, low v3}。
By above-mentioned identified set of factors and judge collection, use for reference the standards vulnerability database description such as CVE, can provide factor of evaluation and
Risk class evaluates description standard, as shown in table 1.
1 factor of evaluation of table and risk class evaluation description table
Then the foundation of fuzzy evaluating matrix is carried out, establishing fuzzy evaluating matrix need to be to the factor of Web application security evaluation
Collect each factor u in UiIt judges, i.e., according to FUZZY MAPPING, determines factor uiTo the value of evaluate collection V.First to each factor ui
It scores respectively by each v in judge collection V;Then each factor u is calculatediTo j-th of element v in evaluate collection VjValue r, calculate
Formula is r=dij/ d, wherein dijFor to i-th of factor u in set of factorsiThe software number of j-th of opinion rating is made, d is
For the software sum scanned.
It can thus be concluded that factor u outiFuzzy evaluation vector r1=(r11,r12,...,r1k), then m because being known as m evaluation
Vector r1,r2,…,rm, can determine a fuzzy relation R=(r in this way1,r2,…,rm), referred to as fuzzy evaluating matrix:
Further determine that set of factors weight vectors, introduce information entropy theory: comentropy (Entropy) concept is Shannon
(Shannon) it proposes, it is the concept measured to information content.Assuming that the possible state collection of system S is { s1,
s2,…,sn, the probability that every kind of state P occurs is (p1,p2,…,pn), for the uncertainty of gauging system, Shannon is introduced such as
Minor function:
Wherein HnReferred to as comentropy, also referred to as Shannon entropy.In system S, if the Probability p of certain state is 1, HnPerseverance is 0,
There is no uncertainties for the system;If each state probability of occurrence is equal, HnUp to maximum value, system has maximum uncertain at this time
Property.
The set of factors weight vectors based on entropy weight are determined in next step, utilize the factor u of Web application security evaluation set of factorsi
Entropy weight as its weight, thereby determine that set of factors weight vectors w.According to comentropy concept, assessment factor uiSignificance level
Can be indicated by its entropy for having m assessment factor, the evaluation problem of n assessment object, if j-th of assessment object is i-th
The score value of a assessment factor is a ', then the rating matrix A ' of the evaluation problem are as follows:
Then A=(a is obtained as standardization to A 'ij)m×n, wherein
It is defined by shannon entropy, i-th of assessment factor uiIt can be by u to the uncertainty of assessment result different degreeiEntropy
To measure.U can be obtained according to formula (2)iEntropy are as follows:
As each aijWhen equal, e reaches maximum value lnn. and formula (3) is normalized with it, obtains measurement factor
uiThe entropy of relative importance are as follows:
In this model, assessment object is used each scanning system.By formula (4) it is found that factor uiEntropy get over
Greatly, therefore, significance level is represented by 1-H to lower to the significance level of assessmenti, so as to obtain factor uiEntropy weight wi
Are as follows:
Therefore set of factors weight vectors W=(w1,w2,…,wn)。
Overall merit processing is finally carried out, so-called overall merit processing is that it is fuzzy to find out decision vector by blurring mapping
Overall merit vector b, determines the process of evaluation result.Due to factor u each in set of factorsiFor the important of security risk assessment
Degree is discrepant, therefore should comprehensively consider influence of each factor to Web safety, obtains more reasonable evaluation result.
Fuzzy overall evaluation vector can be calculated by w and fuzzy evaluating matrix R:
B=wR=(b1,b2,…,bk)
Wherein: " ... " is the composite operator of blurring mapping, bjIndicate that Web application security breaches risk is cited as vjMould
Paste degree of membership.Composite operator has 4 kinds of selections: M (∨, ∧) type, M (, ∧), M () type and M (,+) type, wherein after 2 kinds
Type composite operator can take into account various factors, and retain all information of each factor evaluation.In view of this assessment models should be simultaneous
It caring for each factor, retains whole factor evaluation information, calculating is easy again, thus selection M (,+) and type composite operator.
To fuzzy overall evaluation vector b, this model is handled using maximum membership grade principle, i.e., highest with degree of membership
Grade, the risk class as judged Web application security breaches.
Claims (8)
1. a kind of method based on more equipment evaluation web application fragility, it is characterised in that: including multiple vulnerability scanning equipments;
It establishes the vulnerability database of multiple vulnerability scanning equipments and is associated with unified vulnerability library, establish equipment loophole and unified vulnerability library maps
Relationship;
Multiple vulnerability scanning equipments are scanned web application, summarize scanning result;
The assessment models based on fuzzy evaluation are established, the fragility score value of web application is obtained.
2. a kind of method based on more equipment evaluation web application fragility according to claim 1, it is characterised in that: institute
It states and introduces entropy weight in assessment models, the entropy weight is combined with fuzzy evaluation, determines safety evaluation factor using E-government Network
The weight vectors of concentration assess web application vulnerability class.
3. a kind of method based on more equipment evaluation web application fragility according to claim 2, it is characterised in that: institute
Stating the method that assessment models are assessed includes:
It determines the set of factors U of web application security evaluation and judges collection V;The set of factors includes multiple safety-related with system
Factor;It is described to judge the set collected to be constituted with web using a variety of evaluations of safety-related each factor;
It determines fuzzy evaluating matrix R, evaluation is made to the set of factors U, establishes fuzzy relation, determines factor uiTo evaluate collection V's
Value;
According to factor uiSignificance level entropy, obtain factor uiEntropy weight wi, determine set of factors weight vectors w;
Fuzzy overall evaluation vector b=wR is calculated, Comprehensive Evaluation processing is carried out.
4. a kind of method based on more equipment evaluation web application fragility according to claim 3, it is characterised in that: be
The uncertainty of gauging system introduces such as minor function:
Wherein, HnFor comentropy;In the state set S that system is likely to occur, the probability that every kind of state occurs is p, if certain state
Probability piIt is 1, then HnPerseverance is 0, and illustrating the system, there is no uncertainties;If each state probability of occurrence is equal, HnReach maximum
Value, system has maximum uncertainty at this time.
5. a kind of method based on more equipment evaluation web application fragility according to claim 3, it is characterised in that: institute
Commentary sentences the composition integrated and pays the utmost attention to the risk registration feature of evaluation security breaches and/or judge element of set prime number as the original of radix
Then.
6. a kind of method based on more equipment evaluation web application fragility according to claim 3, it is characterised in that: weighing apparatus
Amount factor uiThe entropy of relative importance are as follows:
Wherein, a is score value, aijThe score value that object is i-th of assessment factor is assessed for j-th.
7. a kind of method based on more equipment evaluation web application fragility according to claim 3, it is characterised in that: because
Plain uiEntropy it is bigger, lower to the significance level of assessment, significance level is represented by 1-Hi, so as to obtain factor ui's
Entropy weight wiFor
8. a kind of -7 any method based on more equipment evaluation web application fragility, feature exist according to claim 1
In: when carrying out vulnerability scanning to web application, security breaches risk class is determined using maximum membership grade principle.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910469084.6A CN110225018A (en) | 2019-05-31 | 2019-05-31 | A method of based on more equipment evaluation web application fragility |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910469084.6A CN110225018A (en) | 2019-05-31 | 2019-05-31 | A method of based on more equipment evaluation web application fragility |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110225018A true CN110225018A (en) | 2019-09-10 |
Family
ID=67818796
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910469084.6A Pending CN110225018A (en) | 2019-05-31 | 2019-05-31 | A method of based on more equipment evaluation web application fragility |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110225018A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110866259A (en) * | 2019-11-14 | 2020-03-06 | 杭州安恒信息技术股份有限公司 | Method and system for calculating potential safety hazard score based on multi-dimensional data |
CN111800427A (en) * | 2020-07-08 | 2020-10-20 | 华北电力科学研究院有限责任公司 | Internet of things equipment evaluation method, device and system |
CN112565298A (en) * | 2020-12-25 | 2021-03-26 | 北京知道创宇信息技术股份有限公司 | Vulnerability scanning method and device and electronic equipment |
CN113221108A (en) * | 2021-05-28 | 2021-08-06 | 西安热工研究院有限公司 | Comprehensive evaluation method for industrial control system vulnerability scanning tool |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1425234A (en) * | 2000-02-08 | 2003-06-18 | 哈里公司 | System and method for assessing security vulnerability of network using fuzzy logic rules |
US20080092237A1 (en) * | 2006-10-13 | 2008-04-17 | Jun Yoon | System and method for network vulnerability analysis using multiple heterogeneous vulnerability scanners |
CN102082659A (en) * | 2009-12-01 | 2011-06-01 | 厦门市美亚柏科信息股份有限公司 | Vulnerability scanning system oriented to safety assessment and processing method thereof |
CN102394886A (en) * | 2011-11-09 | 2012-03-28 | 无锡南理工科技发展有限公司 | Mobile node vulnerability discrimination method by using reliability vector projection decomposition |
CN102457411A (en) * | 2011-10-14 | 2012-05-16 | 中国人民解放军国防科学技术大学 | Network security situation fuzzy evaluation method based on uncertain data |
US8495746B2 (en) * | 2009-12-18 | 2013-07-23 | Verizon Patent And Licensing Inc. | Apparatuses, methods and systems of an application security management platform |
CN106453432A (en) * | 2016-12-20 | 2017-02-22 | 国网江西省电力公司信息通信分公司 | Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform |
CN109257329A (en) * | 2017-07-13 | 2019-01-22 | 国网浙江省电力公司电力科学研究院 | A kind of website risk index computing system and method based on magnanimity Web log |
-
2019
- 2019-05-31 CN CN201910469084.6A patent/CN110225018A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1425234A (en) * | 2000-02-08 | 2003-06-18 | 哈里公司 | System and method for assessing security vulnerability of network using fuzzy logic rules |
US20080092237A1 (en) * | 2006-10-13 | 2008-04-17 | Jun Yoon | System and method for network vulnerability analysis using multiple heterogeneous vulnerability scanners |
CN102082659A (en) * | 2009-12-01 | 2011-06-01 | 厦门市美亚柏科信息股份有限公司 | Vulnerability scanning system oriented to safety assessment and processing method thereof |
US8495746B2 (en) * | 2009-12-18 | 2013-07-23 | Verizon Patent And Licensing Inc. | Apparatuses, methods and systems of an application security management platform |
CN102457411A (en) * | 2011-10-14 | 2012-05-16 | 中国人民解放军国防科学技术大学 | Network security situation fuzzy evaluation method based on uncertain data |
CN102394886A (en) * | 2011-11-09 | 2012-03-28 | 无锡南理工科技发展有限公司 | Mobile node vulnerability discrimination method by using reliability vector projection decomposition |
CN106453432A (en) * | 2016-12-20 | 2017-02-22 | 国网江西省电力公司信息通信分公司 | Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform |
CN109257329A (en) * | 2017-07-13 | 2019-01-22 | 国网浙江省电力公司电力科学研究院 | A kind of website risk index computing system and method based on magnanimity Web log |
Non-Patent Citations (2)
Title |
---|
张爱琴: "《工程技术项目中群体创新方法集成研究》", 31 May 2014 * |
徐洋: "《信息安全等级保护测评量化模型》", 31 August 2017 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110866259A (en) * | 2019-11-14 | 2020-03-06 | 杭州安恒信息技术股份有限公司 | Method and system for calculating potential safety hazard score based on multi-dimensional data |
CN111800427A (en) * | 2020-07-08 | 2020-10-20 | 华北电力科学研究院有限责任公司 | Internet of things equipment evaluation method, device and system |
CN111800427B (en) * | 2020-07-08 | 2022-04-29 | 华北电力科学研究院有限责任公司 | Internet of things equipment evaluation method, device and system |
CN112565298A (en) * | 2020-12-25 | 2021-03-26 | 北京知道创宇信息技术股份有限公司 | Vulnerability scanning method and device and electronic equipment |
CN113221108A (en) * | 2021-05-28 | 2021-08-06 | 西安热工研究院有限公司 | Comprehensive evaluation method for industrial control system vulnerability scanning tool |
CN113221108B (en) * | 2021-05-28 | 2023-02-07 | 西安热工研究院有限公司 | Comprehensive evaluation method for industrial control system vulnerability scanning tool |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110225018A (en) | A method of based on more equipment evaluation web application fragility | |
CN104077396B (en) | Method and device for detecting phishing website | |
Leroy et al. | Without quality presence–absence data, discrimination metrics such as TSS can be misleading measures of model performance | |
Juang et al. | First-order reliability method for probabilistic liquefaction triggering analysis using CPT | |
Younis et al. | Using attack surface entry points and reachability analysis to assess the risk of software vulnerability exploitability | |
CN106027559A (en) | Network session statistical characteristic based large-scale network scanning detection method | |
CN106453386A (en) | Automatic internet asset monitoring and risk detecting method based on distributed technology | |
CN107547552B (en) | Website reputation degree evaluation method and device based on website feature identification and relationship topology | |
CN106973047A (en) | A kind of anomalous traffic detection method and device | |
CN105718805A (en) | Cloud-computing trust management method based on evaluation confidence degree | |
CN108595655A (en) | A kind of abnormal user detection method of dialogue-based characteristic similarity fuzzy clustering | |
CN103095728A (en) | Network security marking system based on behavioral data fusion and method | |
CN110222513B (en) | Abnormality monitoring method and device for online activities and storage medium | |
CN116842531B (en) | Code vaccine-based vulnerability real-time verification method, device, equipment and medium | |
CN104320271B (en) | A kind of network equipment safety evaluation method and device | |
CN109145585A (en) | There are the method and devices of weak passwurd for a kind of detection website | |
CN115622738A (en) | RBF neural network-based safety emergency disposal system and method | |
CN116861446A (en) | Data security assessment method and system | |
CN111787002A (en) | Method and system for analyzing service data network security | |
CN110011976B (en) | Network attack destruction capability quantitative evaluation method and system | |
Zukran et al. | Performance comparison on SQL injection and XSS detection using open source vulnerability scanners | |
CN110311888A (en) | A kind of Web anomalous traffic detection method, device, equipment and medium | |
CN116248393A (en) | Intranet data transmission loophole scanning device and system | |
Zieger et al. | The β-time-to-compromise metric for practical cyber security risk estimation | |
Tung et al. | W-VST: A testbed for evaluating web vulnerability scanner |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190910 |