CN110505213A - A method of excavating website backstage weak password - Google Patents
A method of excavating website backstage weak password Download PDFInfo
- Publication number
- CN110505213A CN110505213A CN201910680140.0A CN201910680140A CN110505213A CN 110505213 A CN110505213 A CN 110505213A CN 201910680140 A CN201910680140 A CN 201910680140A CN 110505213 A CN110505213 A CN 110505213A
- Authority
- CN
- China
- Prior art keywords
- website
- password
- address
- excavating
- user name
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/10—Mapping addresses of different types
- H04L61/103—Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/306—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Technology Law (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a kind of methods for excavating website backstage weak password, comprising the following steps: analysis targeted website parses target ip address, obtains and targeted website address correlation;It extracts list content in target webpage and Analysis and Screening goes out website log interface;Website log interface is accessed, carries out the dismantling of user name password using password dictionary.The present invention passes through analysis targeted website, parse target ip address, in such a way that subdomain name is enumerated with C-terminal scanning, catalogue explosion etc., obtain network address relevant to targeted website, and then simultaneously Analysis and Screening goes out website log interface to list content in extraction target webpage, then Brute Force is executed using password dictionary, obtains website log user name and weak password.Entire detection process automation is realized, is not needed manually to participate in, is improved detection efficiency.
Description
Technical field
The present invention relates to website security technical field, especially a kind of method for excavating website backstage weak password.
Background technique
Website Background Management System is mainly used for the information management to website front end, as text, picture, it is audio-visual and its
The operation such as publication, update, deletion of his routine use file, while also including the system of membership information, order information, visitor information
Meter and management.It is in simple terms exactly fast operating and the management system to site databases and file, so that foreground content energy
It accesses and timely updates and adjust.
Website Background Management System is most important for a website, it may be said that and attacker obtains website backstage,
Any operation can be almost executed to website, it is very harmful.Website backstage is designed with login interface, and attacker generally attempts to pass through
The modes such as social worker, explosion obtain website backstage password, adapter tube backstage.Therefore, pass through detection website backstage, verifying backstage password peace
Quan Xing, it is most important to guarantee web portal security.
Website Background Management System type is more, and password detection spininess in current web backstage sets some specific backstage
Meter, or detected by manual configuration mode, it can automate and realize what a variety of website backstages and cipher safety were detected
Tool is less.
Summary of the invention
The object of the present invention is to provide a kind of methods for excavating website backstage weak password, are automatically performed entire detection process,
Without manually participating in, detection efficiency is improved.
To achieve the above object, the present invention adopts the following technical solutions:
A method of excavating website backstage weak password, comprising the following steps:
Targeted website is analyzed, target ip address is parsed, is obtained and targeted website address correlation;
It extracts list content in target webpage and Analysis and Screening goes out website log interface;
Website log interface is accessed, carries out the dismantling of user name password using password dictionary.
Further, the analysis targeted website parses target ip address, acquisition and targeted website address correlation, specifically
Include:
By way of the crawler collection of website and/or violence enumerates mode and obtains website subdomain name;
Network address url is parsed, IP address is converted into, saves the IP address being in same C sections with destination server.
Further, described by way of the crawler collection of website and/or violence enumerates mode and obtains website subdomain name step
Later, further includes:
Waf detection is carried out to the website subdomain name of acquisition, there are the websites waf for label;
Catalogue explosion is executed to the website subdomain name of acquisition, the accessible page that will acquire is saved.
Further, described that network address url is parsed, save the IP address step being in same C sections with destination server
Later, further includes:
Waf detection is carried out to the IP address of preservation, there are the websites waf for label;
Catalogue explosion is executed to the IP address of preservation, accessible page is saved.
Further, simultaneously Analysis and Screening goes out website log interface to list content in the extraction target webpage, specifically includes:
List title is analyzed, if title filters out the list in search box dictionary predetermined;
List content is extracted, by analyzing the keyword of list content, judges list keyword whether predetermined
In login frame dictionary, then can conclude that if it exists as login frame, i.e. website log interface, and saved.
Further, simultaneously Analysis and Screening goes out website log interface to list content in the extraction target webpage, further includes:
Analyze list content keyword, judge list keyword whether in identifying code dictionary predetermined, if
Then explanation has identifying code.
Further, the access website log interface carries out the dismantling of user name password using password dictionary, specific to wrap
It includes:
Website log interface is accessed, form data is extracted;
In conjunction with form data, POST request is constructed by user name, password dictionary, carries out the dismantling of user name password.
Further, the access website log interface, after carrying out user name password dismantling step using password dictionary,
Further include:
By analyze include response bag in whether comprising Set-Cookie, data packet length become, use the session of return
Mode including session progress re-examination card judges whether user name password disassembles success;
Request is retransmitted to the user name password of confirmation to be verified again;
The login interface successfully cracked and user name password are saved.
The effect provided in summary of the invention is only the effect of embodiment, rather than invents all whole effects, above-mentioned
A technical solution in technical solution have the following advantages that or the utility model has the advantages that
The present invention parses target ip address by analysis targeted website, is enumerated using subdomain name quick-fried with C-terminal scanning, catalogue
The modes such as broken obtain network address relevant to targeted website, and then simultaneously Analysis and Screening goes out website to list content in extraction target webpage
Then login interface executes Brute Force using password dictionary, obtain website log user name and weak password.Entire detection process
Automation is realized, is not needed manually to participate in, is improved detection efficiency.
Detailed description of the invention
Fig. 1 is one flow chart of embodiment of the present invention method;
Fig. 2 is two flow chart of embodiment of the present invention method;
Fig. 3 is three flow chart of embodiment of the present invention method;
Fig. 4 is four flow chart of embodiment of the present invention method;
Fig. 5 is five flow chart of embodiment of the present invention method.
Specific embodiment
In order to clarify the technical characteristics of the invention, below by specific embodiment, and its attached drawing is combined, to this hair
It is bright to be described in detail.Following disclosure provides many different embodiments or example is used to realize different knots of the invention
Structure.In order to simplify disclosure of the invention, hereinafter the component of specific examples and setting are described.In addition, the present invention can be with
Repeat reference numerals and/or letter in different examples.This repetition is that for purposes of simplicity and clarity, itself is not indicated
Relationship between various embodiments and/or setting is discussed.It should be noted that illustrated component is not necessarily to scale in the accompanying drawings
It draws.Present invention omits the descriptions to known assemblies and treatment technology and process to avoid the present invention is unnecessarily limiting.
Embodiment one
As shown in Figure 1, a kind of method for excavating website backstage weak password, comprising the following steps:
S1, analysis targeted website, parse target ip address, obtain and targeted website address correlation.
S2, extracting list content in target webpage, simultaneously Analysis and Screening goes out website log interface.
S3, access website log interface, carry out the dismantling of user name password using password dictionary.
Embodiment two
As shown in Fig. 2, analyzing targeted website in step S1, target ip address is parsed, is obtained and targeted website associated nets
Location specifically includes:
S11, by way of the crawler collection of website and/or violence enumerates mode and obtains website subdomain name.
In one embodiment, website crawler collects mode and mainly uses two kinds of common methods, first is that by browser
Search rule, using site:xxx.com as all subdomain names of keyword crawler capturing, second is that crawler capturing website own content, such as
Crawler capturing web site url crawls itself 3 layers of link catalogue, collects subdomain name, the subdomain name of collection is stored in
In url_temp.
In one embodiment, violence enumerates mode and obtains the mode of subdomain name mainly in conjunction with subdomain name dictionary and subdomain name
Blasting-tool completes subdomain name detection, and subdomain name blasting-tool at home and abroad has very much, to improve detection efficiency, needs before explosion
Domain transmission detection was done, the tool that subdomains etc. did domain transmission detection can be used and realized in conjunction with the dictionary of oneself
Quick subdomain name explosion, the subdomain name of collection is stored in url_temp.
S12, waf detection is carried out to the website subdomain name of acquisition, there are the websites of waf for label.
Waf, that is, web application firewall, waf detection is for judging that targeted website with the presence or absence of web firewall, can be used
Wafw00f is detected and to there are the website separate marking of waf, convenient that final detection result is analyzed and corrected.
S13, catalogue explosion is executed to the website subdomain name of acquisition, the accessible page that will acquire is saved.
In one embodiment, after getting website subdomain name, catalogue explosion is needed to be implemented, confirming may have access under each subdomain name
Webpage.Catalogue explosion mainly realizes that such as dirsearch traverses the website mesh collected using tool by catalogue blasting-tool
Dictionary is recorded to find accessible page, and is stored in file url_ALL.
Embodiment three
As shown in figure 3, analyzing targeted website in step S1, target ip address is parsed, is obtained and targeted website associated nets
Location specifically includes:
S11, network address url is parsed, is converted into IP address, save the IP address being in same C sections with destination server.
In one embodiment, network address url is parsed, is converted to the address ip, executes nmap scanning, confirmation after obtaining IP address
It is in the survival server ip in same C sections with destination server, it is then counter to these IP to look into website information, judge whether and mesh
It is related to mark server, if related, IP address is stored in file url_IP, waf detection is then equally executed to obtained ip
With catalogue explosion, accessible page is obtained, and is stored in file url_ALL.
S12, waf detection is carried out to the IP address of preservation, there are the websites of waf for label.
S13, catalogue explosion is executed to the IP address of preservation, accessible page is saved.
Example IV
As shown in figure 4, extracting list content in target webpage in step S2 and Analysis and Screening going out website log interface, have
Body includes:
S21, analysis list title, if title filters out the list in search box dictionary predetermined.
S22, list content is extracted, by analyzing the keyword of list content, judges whether list keyword is fixed in advance
In the login frame dictionary of justice, then can conclude that if it exists as login frame, i.e. website log interface, and saved.
S23, analyze list content keyword, judge list keyword whether in identifying code dictionary predetermined,
If if explanation have identifying code.
In one embodiment, access target webpage retrieves list present in the page, to promote result correctness, excludes
Distracter, such as search box, first analysis list title, if title filters out the table in search box dictionary predetermined
It is single;Then list content is extracted, by analyzing the keyword of list content, judges whether list keyword is stepped on predetermined
It records in frame dictionary, is then can conclude that if it exists as login frame, i.e. website log interface, and be stored in file url_login.For
There are the interfaces of identifying code, can not obtain username and password by Brute Force, need to individually record carry out artificial judgment, pass through
The keyword for analyzing list content judges list keyword whether in identifying code dictionary predetermined, if illustrating to have if
Corresponding url is removed from url_login, and is stored in file url_y by identifying code.
Embodiment five
As shown in figure 5, accessing website log interface in step S3, the dismantling of user name password, tool are carried out using password dictionary
Body includes:
S31, access website log interface, extract form data;
S32, the dismantling of user name password is carried out by user name, password dictionary construction POST request in conjunction with form data.
S33, by analyze include response bag in whether comprising Set-Cookie, data packet length become, use return
Mode including session session progress re-examination card judges whether user name password disassembles success.
S34, the user name password of confirmation is retransmitted and requests to be verified again.
S35, the login interface successfully cracked and user name password are saved.
Above-mentioned, although the foregoing specific embodiments of the present invention is described with reference to the accompanying drawings, not protects model to the present invention
The limitation enclosed, those skilled in the art should understand that, based on the technical solutions of the present invention, those skilled in the art are not
Need to make the creative labor the various modifications or changes that can be made still within protection scope of the present invention.
Claims (8)
1. a kind of method for excavating website backstage weak password, characterized in that the following steps are included:
Targeted website is analyzed, target ip address is parsed, is obtained and targeted website address correlation;
It extracts list content in target webpage and Analysis and Screening goes out website log interface;
Website log interface is accessed, carries out the dismantling of user name password using password dictionary.
2. excavating the method for website backstage weak password as described in claim 1, characterized in that the analysis targeted website, solution
Target ip address, acquisition and targeted website address correlation are analysed, is specifically included:
By way of the crawler collection of website and/or violence enumerates mode and obtains website subdomain name;
Network address url is parsed, IP address is converted into, saves the IP address being in same C sections with destination server.
3. excavating the method for website backstage weak password as claimed in claim 2, characterized in that described to be collected by website crawler
Mode and/or violence are enumerated after mode obtains website subdomain name step, further includes:
Waf detection is carried out to the website subdomain name of acquisition, there are the websites waf for label;
Catalogue explosion is executed to the website subdomain name of acquisition, the accessible page that will acquire is saved.
4. excavating the method for website backstage weak password as claimed in claim 2, characterized in that it is described that network address url is parsed, it protects
It deposits and is in after the IP address step in same C sections with destination server, further includes:
Waf detection is carried out to the IP address of preservation, there are the websites waf for label;
Catalogue explosion is executed to the IP address of preservation, accessible page is saved.
5. excavating the method for website backstage weak password as described in claim 1, characterized in that table in the extraction target webpage
Simultaneously Analysis and Screening goes out website log interface to single content, specifically includes:
List title is analyzed, if title filters out the list in search box dictionary predetermined;
List content is extracted, by analyzing the keyword of list content, judges list keyword whether in login predetermined
In frame dictionary, then can conclude that if it exists as login frame, i.e. website log interface, and saved.
6. excavating the method for website backstage weak password as claimed in claim 5, characterized in that table in the extraction target webpage
Simultaneously Analysis and Screening goes out website log interface to single content, further includes:
The keyword for analyzing list content judges list keyword whether in identifying code dictionary predetermined, if saying if
It is bright to have identifying code.
7. excavating the method for website backstage weak password as described in claim 1, characterized in that access website log circle
Face carries out the dismantling of user name password using password dictionary, specifically includes:
Website log interface is accessed, form data is extracted;
In conjunction with form data, POST request is constructed by user name, password dictionary, carries out the dismantling of user name password.
8. excavating the method for website backstage weak password as claimed in claim 7, characterized in that access website log circle
Face, after password dictionary progress user name password dismantling step, further includes:
By analyze include response bag in whether comprising Set-Cookie, data packet length become, use the session of return
Mode including session progress re-examination card judges whether user name password disassembles success;
Request is retransmitted to the user name password of confirmation to be verified again;
The login interface successfully cracked and user name password are saved.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910680140.0A CN110505213A (en) | 2019-07-26 | 2019-07-26 | A method of excavating website backstage weak password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910680140.0A CN110505213A (en) | 2019-07-26 | 2019-07-26 | A method of excavating website backstage weak password |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110505213A true CN110505213A (en) | 2019-11-26 |
Family
ID=68587295
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910680140.0A Pending CN110505213A (en) | 2019-07-26 | 2019-07-26 | A method of excavating website backstage weak password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110505213A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111723378A (en) * | 2020-06-17 | 2020-09-29 | 浙江网新恒天软件有限公司 | Website directory blasting method based on website map |
CN113343158A (en) * | 2021-07-09 | 2021-09-03 | 北京市顺义区妇幼保健院 | Extraction and fusion method of screening data |
CN116319089A (en) * | 2023-05-17 | 2023-06-23 | 北京源堡科技有限公司 | Dynamic weak password detection method, device, computer equipment and medium |
CN117473485A (en) * | 2023-12-28 | 2024-01-30 | 深圳万物安全科技有限公司 | Password detection method, password detection device, and computer-readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105844140A (en) * | 2016-03-21 | 2016-08-10 | 国家电网公司 | Website login brute force crack method and system capable of identifying verification code |
CN107294975A (en) * | 2017-06-27 | 2017-10-24 | 四维创智(北京)科技发展有限公司 | A kind of Web security breaches detecting system and detection method based on information |
US20180176208A1 (en) * | 2007-08-20 | 2018-06-21 | Ebay Inc. | System and methods for weak authentication data reinforcement |
US20180268074A1 (en) * | 2017-03-14 | 2018-09-20 | Canon Kabushiki Kaisha | Information processing apparatus, information processing system, and information processing method |
-
2019
- 2019-07-26 CN CN201910680140.0A patent/CN110505213A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180176208A1 (en) * | 2007-08-20 | 2018-06-21 | Ebay Inc. | System and methods for weak authentication data reinforcement |
CN105844140A (en) * | 2016-03-21 | 2016-08-10 | 国家电网公司 | Website login brute force crack method and system capable of identifying verification code |
US20180268074A1 (en) * | 2017-03-14 | 2018-09-20 | Canon Kabushiki Kaisha | Information processing apparatus, information processing system, and information processing method |
CN107294975A (en) * | 2017-06-27 | 2017-10-24 | 四维创智(北京)科技发展有限公司 | A kind of Web security breaches detecting system and detection method based on information |
Non-Patent Citations (4)
Title |
---|
JIANMING ZHAO: "Penetration Testing Automation Assessment Method", 《THE 5TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON》 * |
LOFOR: "Web弱口令通用检测方法探究", 《HTTPS://WWW.HACKBASE.NET/SECURITY/WEB/256601.HTML》 * |
PA55W0RD: "渗透测试流程", 《HTTPS://WWW.PA55W0RD.ONLINE/%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95/》 * |
浪子燕青: "信息收集[汇总]", 《HTTP://WWW.LANGZI.FUN/%E4%BF%A1%E6%81%AF%E9%87%87%E9%9B%86.HTML》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111723378A (en) * | 2020-06-17 | 2020-09-29 | 浙江网新恒天软件有限公司 | Website directory blasting method based on website map |
CN111723378B (en) * | 2020-06-17 | 2023-03-10 | 浙江网新恒天软件有限公司 | Website directory blasting method based on website map |
CN113343158A (en) * | 2021-07-09 | 2021-09-03 | 北京市顺义区妇幼保健院 | Extraction and fusion method of screening data |
CN113343158B (en) * | 2021-07-09 | 2023-07-04 | 北京市顺义区妇幼保健院 | Extraction and fusion method of screening data |
CN116319089A (en) * | 2023-05-17 | 2023-06-23 | 北京源堡科技有限公司 | Dynamic weak password detection method, device, computer equipment and medium |
CN116319089B (en) * | 2023-05-17 | 2023-08-11 | 北京源堡科技有限公司 | Dynamic weak password detection method, device, computer equipment and medium |
CN117473485A (en) * | 2023-12-28 | 2024-01-30 | 深圳万物安全科技有限公司 | Password detection method, password detection device, and computer-readable storage medium |
CN117473485B (en) * | 2023-12-28 | 2024-04-16 | 深圳万物安全科技有限公司 | Password detection method, password detection device, and computer-readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110505213A (en) | A method of excavating website backstage weak password | |
CN105933268B (en) | A kind of website back door detection method and device based on the analysis of full dose access log | |
CN103023710B (en) | A kind of safety test system and method | |
CN101924757B (en) | Method and system for reviewing Botnet | |
CN103559235B (en) | A kind of online social networks malicious web pages detection recognition methods | |
US10263868B1 (en) | User-specific policy enforcement based on network traffic fingerprinting | |
US8392963B2 (en) | Techniques for tracking actual users in web application security systems | |
DE112013000387B4 (en) | Dynamic scanning of a web application using web traffic information | |
CN110119469A (en) | A kind of data collection and transmission and method towards darknet | |
CN105491018B (en) | A kind of network data security analysis method based on DPI technology | |
CN105357195A (en) | Unauthorized web access vulnerability detecting method and device | |
CN102065147A (en) | Method and device for obtaining user login information based on enterprise application system | |
CN103067387B (en) | A kind of anti-phishing monitoring system and method | |
CN108712426A (en) | Reptile recognition methods and system a little are buried based on user behavior | |
CN115134099B (en) | Network attack behavior analysis method and device based on full flow | |
CN104753960B (en) | A kind of system configuration management method based on single-sign-on | |
CN105635064B (en) | CSRF attack detection method and device | |
WO2017063274A1 (en) | Method for automatically determining malicious-jumping and malicious-nesting offensive websites | |
CN103118035A (en) | Website access request parameter legal range analysis method and device | |
CN108768921A (en) | A kind of malicious web pages discovery method and system of feature based detection | |
Shi et al. | The penetration testing framework for large-scale network based on network fingerprint | |
CN106790073B (en) | Blocking method and device for malicious attack of Web server and firewall | |
CN109857923A (en) | A kind of news intelligent recommendation method and system based on area media | |
CN109408499B (en) | Auditing method and system for matching database access users | |
CN108282443A (en) | A kind of reptile Activity recognition method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191126 |