CN110225018A - A method of based on more equipment evaluation web application fragility - Google Patents

A method of based on more equipment evaluation web application fragility Download PDF

Info

Publication number
CN110225018A
CN110225018A CN201910469084.6A CN201910469084A CN110225018A CN 110225018 A CN110225018 A CN 110225018A CN 201910469084 A CN201910469084 A CN 201910469084A CN 110225018 A CN110225018 A CN 110225018A
Authority
CN
China
Prior art keywords
web application
evaluation
factor
vulnerability
fragility
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910469084.6A
Other languages
Chinese (zh)
Inventor
张振伟
邬鹏程
陈可义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Baida Wisdom Network Technology Co Ltd
Original Assignee
Jiangsu Baida Wisdom Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Baida Wisdom Network Technology Co Ltd filed Critical Jiangsu Baida Wisdom Network Technology Co Ltd
Priority to CN201910469084.6A priority Critical patent/CN110225018A/en
Publication of CN110225018A publication Critical patent/CN110225018A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of methods based on more equipment evaluation web application fragility, including multiple vulnerability scanning equipments;It establishes the vulnerability database of multiple equipment and is associated with unified vulnerability library, establish equipment loophole and unified vulnerability library mapping relations;Multiple equipment is scanned web application, summarizes scanning result;The assessment models based on fuzzy evaluation are established, the fragility score value of web application is obtained.Entropy weight is introduced in the assessment models, the entropy weight is combined with fuzzy evaluation, is determined the weight vectors in safety evaluation set of factors using E-government Network, is assessed web application vulnerability class.The accuracy of the method for carrying out assessment web application fragility using assessment models of the invention, drain sweep result is high, and website vulnerability is comprehensive, scores authoritative high.

Description

A method of based on more equipment evaluation web application fragility
Technical field
The present invention relates to network safety filed more particularly to a kind of methods based on more equipment evaluation web application fragility.
Background technique
Vulnerability-scanning technology is a kind of important network security technology.It and firewall, intruding detection system are worked in coordination, The safety of network can be effectively improved.By the scanning to network, network administrator will appreciate that the security setting and fortune of network Capable application service finds security breaches, objective evaluation network risks grade in time.Network administrator can be according to the result of scanning The mistake setting in cyberspace vulnerability and system is corrected, is taken precautions against before hacker attack.If firewall and network prison Viewing system is that passively mean of defense then security sweep is exactly a kind of precautionary measures of active can effectively avoid hacker attack Behavior is accomplished to prevent trouble before it happens.
It is intricate for web application platform on the market at present, each there is it to be good at the field of loophole ability of discovery.Needle To the same web application loophole, the standards of grading of different vendor are also not quite identical.Cause user comprehensive, accurately to certain A assets, which are made, clearly to be judged.
Drain sweep tool scores both for single web application, can not be all for some region as supervision unit Assets weaker overall scores;Can not determine that scanning device scans the loophole ability of discovery ability of practice under special scenes can The assessment of letter property.
Summary of the invention
For disadvantages described above, the present invention provide it is a kind of using based on more equipment to web application carry out vulnerability scanning after multidimensional The method of degree assessment web application fragility.
The technical solution of the present invention is as follows:
A method of based on more equipment evaluation web application fragility, including multiple vulnerability scanning equipments;Establish multiple leakages The vulnerability database of hole scanning device is simultaneously associated with unified vulnerability library, establishes equipment loophole and unified vulnerability library mapping relations;Multiple loopholes Scanning device is scanned web application, summarizes scanning result;The assessment models based on fuzzy evaluation are established, web application is obtained Fragility score value.
Further, entropy weight is introduced in the assessment models, the entropy weight is combined with fuzzy evaluation, utilizes entropic coefficient Method determines the weight vectors in safety evaluation set of factors, assesses web application vulnerability class.
Further, the method that the assessment models are assessed includes:
It determines the set of factors U of web application security evaluation and judges collection V;The set of factors is by multiple safety-related with system Factor;It is described to judge the set collected to be constituted with web using a variety of evaluations of safety-related each factor;
It determines fuzzy evaluating matrix R, evaluation is made to the set of factors U, establishes fuzzy relation, determines factor uiTo evaluation Collect the value of V;
According to factor uiSignificance level entropy, obtain factor uiEntropy weight wi, determine set of factors weight vectors w;
Fuzzy overall evaluation vector b=wR is calculated, Comprehensive Evaluation processing is carried out.
Further, for the uncertainty of gauging system, such as minor function is introduced:
Wherein, HnFor comentropy;In the state set S that system is likely to occur, the probability that every kind of state occurs is p, if certain The Probability p of stateiIt is 1, then HnPerseverance is 0, and illustrating the system, there is no uncertainties;If each state probability of occurrence is equal, HnIt reaches To maximum value, system has maximum uncertainty at this time.
Further, the composition for judging collection pays the utmost attention to the risk registration feature and/or judge of evaluation security breaches Element of set prime number is the principle of radix.
Further, factor u is measurediThe entropy of relative importance are as follows:
Wherein, a is score value, aijThe score value that object is i-th of assessment factor is assessed for j-th.
Further, factor uiEntropy it is bigger, lower to the significance level of assessment, significance level is represented by 1- Hi, so as to obtain factor uiEntropy weight wiAre as follows:
Further, when carrying out vulnerability scanning to web application, security breaches risk is determined using maximum membership grade principle Grade.
The invention has the benefit that a kind of method based on more equipment evaluation web application fragility of the present invention passes through collection It is scanned at multiple equipment, is applied for the same web and carry out vulnerability analysis based on more equipment, most in conjunction with current international and national Comprehensive drain sweep java standard library, unified basis loophole impact fraction, carries out data cleansing by big data platform, using based on setting more It is standby to establish assessment models.Using assessment models of the invention carry out assessment web application fragility method, drain sweep result it is accurate Property it is high, website vulnerability is comprehensive, scores authoritative high.
Detailed description of the invention
Fig. 1 is kind of the method schematic diagram based on more equipment evaluation web application fragility of the invention.
Specific embodiment
Further describe technical solution of the present invention with reference to the accompanying drawing:
As shown in Figure 1, a kind of method based on more equipment evaluation web application fragility, including multiple vulnerability scanning equipments; It establishes the vulnerability database of multiple vulnerability scanning equipments and is associated with unified vulnerability library, establish equipment loophole and the mapping of unified vulnerability library is closed System;Multiple vulnerability scanning equipments are scanned web application, summarize scanning result;The assessment models based on fuzzy evaluation are established, Obtain the fragility score value of web application.
Because being scanned assessment using multiple vulnerability scanning equipments, entropy weight, the entropy weight are introduced in the assessment models It is combined with fuzzy evaluation, determines the weight vectors in safety evaluation set of factors using E-government Network, assessment web application is fragile Property grade.
The method that the assessment models are assessed comprises determining that the set of factors U of web application security evaluation and judges collection V; The set of factors is by the multiple and safety-related factor of system;It is described to judge collection to apply safety-related each factor with web The constituted set of a variety of evaluations;It determines fuzzy evaluating matrix R, evaluation is made to the set of factors U, establishes fuzzy relation, really Determine factor uiTo the value of evaluate collection V;According to factor uiSignificance level entropy, obtain factor uiEntropy weight wi, determine set of factors Weight vectors w;Fuzzy overall evaluation vector b=wR is calculated, Comprehensive Evaluation processing is carried out.
The determination of set of factors weight plays an important role in Comprehensive Evaluation processing, utilizes statistic law and expert graded knot It closes and determines weight vectors with E-government Network, enhance the objectivity of evaluation result, selection is closely related safely multiple with system Because of a possibility that usually constituting the set of factors of model, being potential hazard, recycling respectively, the degree of difficulty, impacted utilized The complexity of user scope and discovery,
The method of assessment is in detail in a kind of method based on more equipment evaluation web application fragility of the present invention, determines and judges Collect V={ v1,v2,...,vk, it is that constituted set is evaluated in view of evaluation by the k kind to the safe each factor of Web application The risk class feature and judge element of set prime number of security breaches are the principle of radix, and the judge collection V of this model selects 3 etc. Grade, is high, medium and low, i.e. V={ high v respectively1, middle v2, low v3}。
By above-mentioned identified set of factors and judge collection, use for reference the standards vulnerability database description such as CVE, can provide factor of evaluation and Risk class evaluates description standard, as shown in table 1.
1 factor of evaluation of table and risk class evaluation description table
Then the foundation of fuzzy evaluating matrix is carried out, establishing fuzzy evaluating matrix need to be to the factor of Web application security evaluation Collect each factor u in UiIt judges, i.e., according to FUZZY MAPPING, determines factor uiTo the value of evaluate collection V.First to each factor ui It scores respectively by each v in judge collection V;Then each factor u is calculatediTo j-th of element v in evaluate collection VjValue r, calculate Formula is r=dij/ d, wherein dijFor to i-th of factor u in set of factorsiThe software number of j-th of opinion rating is made, d is For the software sum scanned.
It can thus be concluded that factor u outiFuzzy evaluation vector r1=(r11,r12,...,r1k), then m because being known as m evaluation Vector r1,r2,…,rm, can determine a fuzzy relation R=(r in this way1,r2,…,rm), referred to as fuzzy evaluating matrix:
Further determine that set of factors weight vectors, introduce information entropy theory: comentropy (Entropy) concept is Shannon (Shannon) it proposes, it is the concept measured to information content.Assuming that the possible state collection of system S is { s1, s2,…,sn, the probability that every kind of state P occurs is (p1,p2,…,pn), for the uncertainty of gauging system, Shannon is introduced such as Minor function:
Wherein HnReferred to as comentropy, also referred to as Shannon entropy.In system S, if the Probability p of certain state is 1, HnPerseverance is 0, There is no uncertainties for the system;If each state probability of occurrence is equal, HnUp to maximum value, system has maximum uncertain at this time Property.
The set of factors weight vectors based on entropy weight are determined in next step, utilize the factor u of Web application security evaluation set of factorsi Entropy weight as its weight, thereby determine that set of factors weight vectors w.According to comentropy concept, assessment factor uiSignificance level Can be indicated by its entropy for having m assessment factor, the evaluation problem of n assessment object, if j-th of assessment object is i-th The score value of a assessment factor is a ', then the rating matrix A ' of the evaluation problem are as follows:
Then A=(a is obtained as standardization to A 'ij)m×n, wherein
It is defined by shannon entropy, i-th of assessment factor uiIt can be by u to the uncertainty of assessment result different degreeiEntropy To measure.U can be obtained according to formula (2)iEntropy are as follows:
As each aijWhen equal, e reaches maximum value lnn. and formula (3) is normalized with it, obtains measurement factor uiThe entropy of relative importance are as follows:
In this model, assessment object is used each scanning system.By formula (4) it is found that factor uiEntropy get over Greatly, therefore, significance level is represented by 1-H to lower to the significance level of assessmenti, so as to obtain factor uiEntropy weight wi Are as follows:
Therefore set of factors weight vectors W=(w1,w2,…,wn)。
Overall merit processing is finally carried out, so-called overall merit processing is that it is fuzzy to find out decision vector by blurring mapping Overall merit vector b, determines the process of evaluation result.Due to factor u each in set of factorsiFor the important of security risk assessment Degree is discrepant, therefore should comprehensively consider influence of each factor to Web safety, obtains more reasonable evaluation result.
Fuzzy overall evaluation vector can be calculated by w and fuzzy evaluating matrix R:
B=wR=(b1,b2,…,bk)
Wherein: " ... " is the composite operator of blurring mapping, bjIndicate that Web application security breaches risk is cited as vjMould Paste degree of membership.Composite operator has 4 kinds of selections: M (∨, ∧) type, M (, ∧), M () type and M (,+) type, wherein after 2 kinds Type composite operator can take into account various factors, and retain all information of each factor evaluation.In view of this assessment models should be simultaneous It caring for each factor, retains whole factor evaluation information, calculating is easy again, thus selection M (,+) and type composite operator.
To fuzzy overall evaluation vector b, this model is handled using maximum membership grade principle, i.e., highest with degree of membership Grade, the risk class as judged Web application security breaches.

Claims (8)

1. a kind of method based on more equipment evaluation web application fragility, it is characterised in that: including multiple vulnerability scanning equipments;
It establishes the vulnerability database of multiple vulnerability scanning equipments and is associated with unified vulnerability library, establish equipment loophole and unified vulnerability library maps Relationship;
Multiple vulnerability scanning equipments are scanned web application, summarize scanning result;
The assessment models based on fuzzy evaluation are established, the fragility score value of web application is obtained.
2. a kind of method based on more equipment evaluation web application fragility according to claim 1, it is characterised in that: institute It states and introduces entropy weight in assessment models, the entropy weight is combined with fuzzy evaluation, determines safety evaluation factor using E-government Network The weight vectors of concentration assess web application vulnerability class.
3. a kind of method based on more equipment evaluation web application fragility according to claim 2, it is characterised in that: institute Stating the method that assessment models are assessed includes:
It determines the set of factors U of web application security evaluation and judges collection V;The set of factors includes multiple safety-related with system Factor;It is described to judge the set collected to be constituted with web using a variety of evaluations of safety-related each factor;
It determines fuzzy evaluating matrix R, evaluation is made to the set of factors U, establishes fuzzy relation, determines factor uiTo evaluate collection V's Value;
According to factor uiSignificance level entropy, obtain factor uiEntropy weight wi, determine set of factors weight vectors w;
Fuzzy overall evaluation vector b=wR is calculated, Comprehensive Evaluation processing is carried out.
4. a kind of method based on more equipment evaluation web application fragility according to claim 3, it is characterised in that: be The uncertainty of gauging system introduces such as minor function:
Wherein, HnFor comentropy;In the state set S that system is likely to occur, the probability that every kind of state occurs is p, if certain state Probability piIt is 1, then HnPerseverance is 0, and illustrating the system, there is no uncertainties;If each state probability of occurrence is equal, HnReach maximum Value, system has maximum uncertainty at this time.
5. a kind of method based on more equipment evaluation web application fragility according to claim 3, it is characterised in that: institute Commentary sentences the composition integrated and pays the utmost attention to the risk registration feature of evaluation security breaches and/or judge element of set prime number as the original of radix Then.
6. a kind of method based on more equipment evaluation web application fragility according to claim 3, it is characterised in that: weighing apparatus Amount factor uiThe entropy of relative importance are as follows:
Wherein, a is score value, aijThe score value that object is i-th of assessment factor is assessed for j-th.
7. a kind of method based on more equipment evaluation web application fragility according to claim 3, it is characterised in that: because Plain uiEntropy it is bigger, lower to the significance level of assessment, significance level is represented by 1-Hi, so as to obtain factor ui's Entropy weight wiFor
8. a kind of -7 any method based on more equipment evaluation web application fragility, feature exist according to claim 1 In: when carrying out vulnerability scanning to web application, security breaches risk class is determined using maximum membership grade principle.
CN201910469084.6A 2019-05-31 2019-05-31 A method of based on more equipment evaluation web application fragility Pending CN110225018A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910469084.6A CN110225018A (en) 2019-05-31 2019-05-31 A method of based on more equipment evaluation web application fragility

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910469084.6A CN110225018A (en) 2019-05-31 2019-05-31 A method of based on more equipment evaluation web application fragility

Publications (1)

Publication Number Publication Date
CN110225018A true CN110225018A (en) 2019-09-10

Family

ID=67818796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910469084.6A Pending CN110225018A (en) 2019-05-31 2019-05-31 A method of based on more equipment evaluation web application fragility

Country Status (1)

Country Link
CN (1) CN110225018A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110866259A (en) * 2019-11-14 2020-03-06 杭州安恒信息技术股份有限公司 Method and system for calculating potential safety hazard score based on multi-dimensional data
CN111800427A (en) * 2020-07-08 2020-10-20 华北电力科学研究院有限责任公司 Internet of things equipment evaluation method, device and system
CN112565298A (en) * 2020-12-25 2021-03-26 北京知道创宇信息技术股份有限公司 Vulnerability scanning method and device and electronic equipment
CN113221108A (en) * 2021-05-28 2021-08-06 西安热工研究院有限公司 Comprehensive evaluation method for industrial control system vulnerability scanning tool

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1425234A (en) * 2000-02-08 2003-06-18 哈里公司 System and method for assessing security vulnerability of network using fuzzy logic rules
US20080092237A1 (en) * 2006-10-13 2008-04-17 Jun Yoon System and method for network vulnerability analysis using multiple heterogeneous vulnerability scanners
CN102082659A (en) * 2009-12-01 2011-06-01 厦门市美亚柏科信息股份有限公司 Vulnerability scanning system oriented to safety assessment and processing method thereof
CN102394886A (en) * 2011-11-09 2012-03-28 无锡南理工科技发展有限公司 Mobile node vulnerability discrimination method by using reliability vector projection decomposition
CN102457411A (en) * 2011-10-14 2012-05-16 中国人民解放军国防科学技术大学 Network security situation fuzzy evaluation method based on uncertain data
US8495746B2 (en) * 2009-12-18 2013-07-23 Verizon Patent And Licensing Inc. Apparatuses, methods and systems of an application security management platform
CN106453432A (en) * 2016-12-20 2017-02-22 国网江西省电力公司信息通信分公司 Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform
CN109257329A (en) * 2017-07-13 2019-01-22 国网浙江省电力公司电力科学研究院 A kind of website risk index computing system and method based on magnanimity Web log

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1425234A (en) * 2000-02-08 2003-06-18 哈里公司 System and method for assessing security vulnerability of network using fuzzy logic rules
US20080092237A1 (en) * 2006-10-13 2008-04-17 Jun Yoon System and method for network vulnerability analysis using multiple heterogeneous vulnerability scanners
CN102082659A (en) * 2009-12-01 2011-06-01 厦门市美亚柏科信息股份有限公司 Vulnerability scanning system oriented to safety assessment and processing method thereof
US8495746B2 (en) * 2009-12-18 2013-07-23 Verizon Patent And Licensing Inc. Apparatuses, methods and systems of an application security management platform
CN102457411A (en) * 2011-10-14 2012-05-16 中国人民解放军国防科学技术大学 Network security situation fuzzy evaluation method based on uncertain data
CN102394886A (en) * 2011-11-09 2012-03-28 无锡南理工科技发展有限公司 Mobile node vulnerability discrimination method by using reliability vector projection decomposition
CN106453432A (en) * 2016-12-20 2017-02-22 国网江西省电力公司信息通信分公司 Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform
CN109257329A (en) * 2017-07-13 2019-01-22 国网浙江省电力公司电力科学研究院 A kind of website risk index computing system and method based on magnanimity Web log

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张爱琴: "《工程技术项目中群体创新方法集成研究》", 31 May 2014 *
徐洋: "《信息安全等级保护测评量化模型》", 31 August 2017 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110866259A (en) * 2019-11-14 2020-03-06 杭州安恒信息技术股份有限公司 Method and system for calculating potential safety hazard score based on multi-dimensional data
CN111800427A (en) * 2020-07-08 2020-10-20 华北电力科学研究院有限责任公司 Internet of things equipment evaluation method, device and system
CN111800427B (en) * 2020-07-08 2022-04-29 华北电力科学研究院有限责任公司 Internet of things equipment evaluation method, device and system
CN112565298A (en) * 2020-12-25 2021-03-26 北京知道创宇信息技术股份有限公司 Vulnerability scanning method and device and electronic equipment
CN113221108A (en) * 2021-05-28 2021-08-06 西安热工研究院有限公司 Comprehensive evaluation method for industrial control system vulnerability scanning tool
CN113221108B (en) * 2021-05-28 2023-02-07 西安热工研究院有限公司 Comprehensive evaluation method for industrial control system vulnerability scanning tool

Similar Documents

Publication Publication Date Title
CN110225018A (en) A method of based on more equipment evaluation web application fragility
CN104077396B (en) Method and device for detecting phishing website
Leroy et al. Without quality presence–absence data, discrimination metrics such as TSS can be misleading measures of model performance
Juang et al. First-order reliability method for probabilistic liquefaction triggering analysis using CPT
Younis et al. Using attack surface entry points and reachability analysis to assess the risk of software vulnerability exploitability
CN106027559A (en) Network session statistical characteristic based large-scale network scanning detection method
CN106453386A (en) Automatic internet asset monitoring and risk detecting method based on distributed technology
CN107547552B (en) Website reputation degree evaluation method and device based on website feature identification and relationship topology
CN106973047A (en) A kind of anomalous traffic detection method and device
CN105718805A (en) Cloud-computing trust management method based on evaluation confidence degree
CN108595655A (en) A kind of abnormal user detection method of dialogue-based characteristic similarity fuzzy clustering
CN103095728A (en) Network security marking system based on behavioral data fusion and method
CN110222513B (en) Abnormality monitoring method and device for online activities and storage medium
CN116842531B (en) Code vaccine-based vulnerability real-time verification method, device, equipment and medium
CN104320271B (en) A kind of network equipment safety evaluation method and device
CN109145585A (en) There are the method and devices of weak passwurd for a kind of detection website
CN115622738A (en) RBF neural network-based safety emergency disposal system and method
CN116861446A (en) Data security assessment method and system
CN111787002A (en) Method and system for analyzing service data network security
CN110011976B (en) Network attack destruction capability quantitative evaluation method and system
Zukran et al. Performance comparison on SQL injection and XSS detection using open source vulnerability scanners
CN110311888A (en) A kind of Web anomalous traffic detection method, device, equipment and medium
CN116248393A (en) Intranet data transmission loophole scanning device and system
Zieger et al. The β-time-to-compromise metric for practical cyber security risk estimation
Tung et al. W-VST: A testbed for evaluating web vulnerability scanner

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190910