CN110505213A - A method of excavating website backstage weak password - Google Patents

A method of excavating website backstage weak password Download PDF

Info

Publication number
CN110505213A
CN110505213A CN201910680140.0A CN201910680140A CN110505213A CN 110505213 A CN110505213 A CN 110505213A CN 201910680140 A CN201910680140 A CN 201910680140A CN 110505213 A CN110505213 A CN 110505213A
Authority
CN
China
Prior art keywords
website
password
address
excavating
user name
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910680140.0A
Other languages
Chinese (zh)
Inventor
牛彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Wave Intelligent Technology Co Ltd
Original Assignee
Suzhou Wave Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Wave Intelligent Technology Co Ltd filed Critical Suzhou Wave Intelligent Technology Co Ltd
Priority to CN201910680140.0A priority Critical patent/CN110505213A/en
Publication of CN110505213A publication Critical patent/CN110505213A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/10Mapping addresses of different types
    • H04L61/103Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Technology Law (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of methods for excavating website backstage weak password, comprising the following steps: analysis targeted website parses target ip address, obtains and targeted website address correlation;It extracts list content in target webpage and Analysis and Screening goes out website log interface;Website log interface is accessed, carries out the dismantling of user name password using password dictionary.The present invention passes through analysis targeted website, parse target ip address, in such a way that subdomain name is enumerated with C-terminal scanning, catalogue explosion etc., obtain network address relevant to targeted website, and then simultaneously Analysis and Screening goes out website log interface to list content in extraction target webpage, then Brute Force is executed using password dictionary, obtains website log user name and weak password.Entire detection process automation is realized, is not needed manually to participate in, is improved detection efficiency.

Description

A method of excavating website backstage weak password
Technical field
The present invention relates to website security technical field, especially a kind of method for excavating website backstage weak password.
Background technique
Website Background Management System is mainly used for the information management to website front end, as text, picture, it is audio-visual and its The operation such as publication, update, deletion of his routine use file, while also including the system of membership information, order information, visitor information Meter and management.It is in simple terms exactly fast operating and the management system to site databases and file, so that foreground content energy It accesses and timely updates and adjust.
Website Background Management System is most important for a website, it may be said that and attacker obtains website backstage, Any operation can be almost executed to website, it is very harmful.Website backstage is designed with login interface, and attacker generally attempts to pass through The modes such as social worker, explosion obtain website backstage password, adapter tube backstage.Therefore, pass through detection website backstage, verifying backstage password peace Quan Xing, it is most important to guarantee web portal security.
Website Background Management System type is more, and password detection spininess in current web backstage sets some specific backstage Meter, or detected by manual configuration mode, it can automate and realize what a variety of website backstages and cipher safety were detected Tool is less.
Summary of the invention
The object of the present invention is to provide a kind of methods for excavating website backstage weak password, are automatically performed entire detection process, Without manually participating in, detection efficiency is improved.
To achieve the above object, the present invention adopts the following technical solutions:
A method of excavating website backstage weak password, comprising the following steps:
Targeted website is analyzed, target ip address is parsed, is obtained and targeted website address correlation;
It extracts list content in target webpage and Analysis and Screening goes out website log interface;
Website log interface is accessed, carries out the dismantling of user name password using password dictionary.
Further, the analysis targeted website parses target ip address, acquisition and targeted website address correlation, specifically Include:
By way of the crawler collection of website and/or violence enumerates mode and obtains website subdomain name;
Network address url is parsed, IP address is converted into, saves the IP address being in same C sections with destination server.
Further, described by way of the crawler collection of website and/or violence enumerates mode and obtains website subdomain name step Later, further includes:
Waf detection is carried out to the website subdomain name of acquisition, there are the websites waf for label;
Catalogue explosion is executed to the website subdomain name of acquisition, the accessible page that will acquire is saved.
Further, described that network address url is parsed, save the IP address step being in same C sections with destination server Later, further includes:
Waf detection is carried out to the IP address of preservation, there are the websites waf for label;
Catalogue explosion is executed to the IP address of preservation, accessible page is saved.
Further, simultaneously Analysis and Screening goes out website log interface to list content in the extraction target webpage, specifically includes:
List title is analyzed, if title filters out the list in search box dictionary predetermined;
List content is extracted, by analyzing the keyword of list content, judges list keyword whether predetermined In login frame dictionary, then can conclude that if it exists as login frame, i.e. website log interface, and saved.
Further, simultaneously Analysis and Screening goes out website log interface to list content in the extraction target webpage, further includes:
Analyze list content keyword, judge list keyword whether in identifying code dictionary predetermined, if Then explanation has identifying code.
Further, the access website log interface carries out the dismantling of user name password using password dictionary, specific to wrap It includes:
Website log interface is accessed, form data is extracted;
In conjunction with form data, POST request is constructed by user name, password dictionary, carries out the dismantling of user name password.
Further, the access website log interface, after carrying out user name password dismantling step using password dictionary, Further include:
By analyze include response bag in whether comprising Set-Cookie, data packet length become, use the session of return Mode including session progress re-examination card judges whether user name password disassembles success;
Request is retransmitted to the user name password of confirmation to be verified again;
The login interface successfully cracked and user name password are saved.
The effect provided in summary of the invention is only the effect of embodiment, rather than invents all whole effects, above-mentioned A technical solution in technical solution have the following advantages that or the utility model has the advantages that
The present invention parses target ip address by analysis targeted website, is enumerated using subdomain name quick-fried with C-terminal scanning, catalogue The modes such as broken obtain network address relevant to targeted website, and then simultaneously Analysis and Screening goes out website to list content in extraction target webpage Then login interface executes Brute Force using password dictionary, obtain website log user name and weak password.Entire detection process Automation is realized, is not needed manually to participate in, is improved detection efficiency.
Detailed description of the invention
Fig. 1 is one flow chart of embodiment of the present invention method;
Fig. 2 is two flow chart of embodiment of the present invention method;
Fig. 3 is three flow chart of embodiment of the present invention method;
Fig. 4 is four flow chart of embodiment of the present invention method;
Fig. 5 is five flow chart of embodiment of the present invention method.
Specific embodiment
In order to clarify the technical characteristics of the invention, below by specific embodiment, and its attached drawing is combined, to this hair It is bright to be described in detail.Following disclosure provides many different embodiments or example is used to realize different knots of the invention Structure.In order to simplify disclosure of the invention, hereinafter the component of specific examples and setting are described.In addition, the present invention can be with Repeat reference numerals and/or letter in different examples.This repetition is that for purposes of simplicity and clarity, itself is not indicated Relationship between various embodiments and/or setting is discussed.It should be noted that illustrated component is not necessarily to scale in the accompanying drawings It draws.Present invention omits the descriptions to known assemblies and treatment technology and process to avoid the present invention is unnecessarily limiting.
Embodiment one
As shown in Figure 1, a kind of method for excavating website backstage weak password, comprising the following steps:
S1, analysis targeted website, parse target ip address, obtain and targeted website address correlation.
S2, extracting list content in target webpage, simultaneously Analysis and Screening goes out website log interface.
S3, access website log interface, carry out the dismantling of user name password using password dictionary.
Embodiment two
As shown in Fig. 2, analyzing targeted website in step S1, target ip address is parsed, is obtained and targeted website associated nets Location specifically includes:
S11, by way of the crawler collection of website and/or violence enumerates mode and obtains website subdomain name.
In one embodiment, website crawler collects mode and mainly uses two kinds of common methods, first is that by browser Search rule, using site:xxx.com as all subdomain names of keyword crawler capturing, second is that crawler capturing website own content, such as Crawler capturing web site url crawls itself 3 layers of link catalogue, collects subdomain name, the subdomain name of collection is stored in In url_temp.
In one embodiment, violence enumerates mode and obtains the mode of subdomain name mainly in conjunction with subdomain name dictionary and subdomain name Blasting-tool completes subdomain name detection, and subdomain name blasting-tool at home and abroad has very much, to improve detection efficiency, needs before explosion Domain transmission detection was done, the tool that subdomains etc. did domain transmission detection can be used and realized in conjunction with the dictionary of oneself Quick subdomain name explosion, the subdomain name of collection is stored in url_temp.
S12, waf detection is carried out to the website subdomain name of acquisition, there are the websites of waf for label.
Waf, that is, web application firewall, waf detection is for judging that targeted website with the presence or absence of web firewall, can be used Wafw00f is detected and to there are the website separate marking of waf, convenient that final detection result is analyzed and corrected.
S13, catalogue explosion is executed to the website subdomain name of acquisition, the accessible page that will acquire is saved.
In one embodiment, after getting website subdomain name, catalogue explosion is needed to be implemented, confirming may have access under each subdomain name Webpage.Catalogue explosion mainly realizes that such as dirsearch traverses the website mesh collected using tool by catalogue blasting-tool Dictionary is recorded to find accessible page, and is stored in file url_ALL.
Embodiment three
As shown in figure 3, analyzing targeted website in step S1, target ip address is parsed, is obtained and targeted website associated nets Location specifically includes:
S11, network address url is parsed, is converted into IP address, save the IP address being in same C sections with destination server.
In one embodiment, network address url is parsed, is converted to the address ip, executes nmap scanning, confirmation after obtaining IP address It is in the survival server ip in same C sections with destination server, it is then counter to these IP to look into website information, judge whether and mesh It is related to mark server, if related, IP address is stored in file url_IP, waf detection is then equally executed to obtained ip With catalogue explosion, accessible page is obtained, and is stored in file url_ALL.
S12, waf detection is carried out to the IP address of preservation, there are the websites of waf for label.
S13, catalogue explosion is executed to the IP address of preservation, accessible page is saved.
Example IV
As shown in figure 4, extracting list content in target webpage in step S2 and Analysis and Screening going out website log interface, have Body includes:
S21, analysis list title, if title filters out the list in search box dictionary predetermined.
S22, list content is extracted, by analyzing the keyword of list content, judges whether list keyword is fixed in advance In the login frame dictionary of justice, then can conclude that if it exists as login frame, i.e. website log interface, and saved.
S23, analyze list content keyword, judge list keyword whether in identifying code dictionary predetermined, If if explanation have identifying code.
In one embodiment, access target webpage retrieves list present in the page, to promote result correctness, excludes Distracter, such as search box, first analysis list title, if title filters out the table in search box dictionary predetermined It is single;Then list content is extracted, by analyzing the keyword of list content, judges whether list keyword is stepped on predetermined It records in frame dictionary, is then can conclude that if it exists as login frame, i.e. website log interface, and be stored in file url_login.For There are the interfaces of identifying code, can not obtain username and password by Brute Force, need to individually record carry out artificial judgment, pass through The keyword for analyzing list content judges list keyword whether in identifying code dictionary predetermined, if illustrating to have if Corresponding url is removed from url_login, and is stored in file url_y by identifying code.
Embodiment five
As shown in figure 5, accessing website log interface in step S3, the dismantling of user name password, tool are carried out using password dictionary Body includes:
S31, access website log interface, extract form data;
S32, the dismantling of user name password is carried out by user name, password dictionary construction POST request in conjunction with form data.
S33, by analyze include response bag in whether comprising Set-Cookie, data packet length become, use return Mode including session session progress re-examination card judges whether user name password disassembles success.
S34, the user name password of confirmation is retransmitted and requests to be verified again.
S35, the login interface successfully cracked and user name password are saved.
Above-mentioned, although the foregoing specific embodiments of the present invention is described with reference to the accompanying drawings, not protects model to the present invention The limitation enclosed, those skilled in the art should understand that, based on the technical solutions of the present invention, those skilled in the art are not Need to make the creative labor the various modifications or changes that can be made still within protection scope of the present invention.

Claims (8)

1. a kind of method for excavating website backstage weak password, characterized in that the following steps are included:
Targeted website is analyzed, target ip address is parsed, is obtained and targeted website address correlation;
It extracts list content in target webpage and Analysis and Screening goes out website log interface;
Website log interface is accessed, carries out the dismantling of user name password using password dictionary.
2. excavating the method for website backstage weak password as described in claim 1, characterized in that the analysis targeted website, solution Target ip address, acquisition and targeted website address correlation are analysed, is specifically included:
By way of the crawler collection of website and/or violence enumerates mode and obtains website subdomain name;
Network address url is parsed, IP address is converted into, saves the IP address being in same C sections with destination server.
3. excavating the method for website backstage weak password as claimed in claim 2, characterized in that described to be collected by website crawler Mode and/or violence are enumerated after mode obtains website subdomain name step, further includes:
Waf detection is carried out to the website subdomain name of acquisition, there are the websites waf for label;
Catalogue explosion is executed to the website subdomain name of acquisition, the accessible page that will acquire is saved.
4. excavating the method for website backstage weak password as claimed in claim 2, characterized in that it is described that network address url is parsed, it protects It deposits and is in after the IP address step in same C sections with destination server, further includes:
Waf detection is carried out to the IP address of preservation, there are the websites waf for label;
Catalogue explosion is executed to the IP address of preservation, accessible page is saved.
5. excavating the method for website backstage weak password as described in claim 1, characterized in that table in the extraction target webpage Simultaneously Analysis and Screening goes out website log interface to single content, specifically includes:
List title is analyzed, if title filters out the list in search box dictionary predetermined;
List content is extracted, by analyzing the keyword of list content, judges list keyword whether in login predetermined In frame dictionary, then can conclude that if it exists as login frame, i.e. website log interface, and saved.
6. excavating the method for website backstage weak password as claimed in claim 5, characterized in that table in the extraction target webpage Simultaneously Analysis and Screening goes out website log interface to single content, further includes:
The keyword for analyzing list content judges list keyword whether in identifying code dictionary predetermined, if saying if It is bright to have identifying code.
7. excavating the method for website backstage weak password as described in claim 1, characterized in that access website log circle Face carries out the dismantling of user name password using password dictionary, specifically includes:
Website log interface is accessed, form data is extracted;
In conjunction with form data, POST request is constructed by user name, password dictionary, carries out the dismantling of user name password.
8. excavating the method for website backstage weak password as claimed in claim 7, characterized in that access website log circle Face, after password dictionary progress user name password dismantling step, further includes:
By analyze include response bag in whether comprising Set-Cookie, data packet length become, use the session of return Mode including session progress re-examination card judges whether user name password disassembles success;
Request is retransmitted to the user name password of confirmation to be verified again;
The login interface successfully cracked and user name password are saved.
CN201910680140.0A 2019-07-26 2019-07-26 A method of excavating website backstage weak password Pending CN110505213A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910680140.0A CN110505213A (en) 2019-07-26 2019-07-26 A method of excavating website backstage weak password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910680140.0A CN110505213A (en) 2019-07-26 2019-07-26 A method of excavating website backstage weak password

Publications (1)

Publication Number Publication Date
CN110505213A true CN110505213A (en) 2019-11-26

Family

ID=68587295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910680140.0A Pending CN110505213A (en) 2019-07-26 2019-07-26 A method of excavating website backstage weak password

Country Status (1)

Country Link
CN (1) CN110505213A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111723378A (en) * 2020-06-17 2020-09-29 浙江网新恒天软件有限公司 Website directory blasting method based on website map
CN113343158A (en) * 2021-07-09 2021-09-03 北京市顺义区妇幼保健院 Extraction and fusion method of screening data
CN116319089A (en) * 2023-05-17 2023-06-23 北京源堡科技有限公司 Dynamic weak password detection method, device, computer equipment and medium
CN117473485A (en) * 2023-12-28 2024-01-30 深圳万物安全科技有限公司 Password detection method, password detection device, and computer-readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844140A (en) * 2016-03-21 2016-08-10 国家电网公司 Website login brute force crack method and system capable of identifying verification code
CN107294975A (en) * 2017-06-27 2017-10-24 四维创智(北京)科技发展有限公司 A kind of Web security breaches detecting system and detection method based on information
US20180176208A1 (en) * 2007-08-20 2018-06-21 Ebay Inc. System and methods for weak authentication data reinforcement
US20180268074A1 (en) * 2017-03-14 2018-09-20 Canon Kabushiki Kaisha Information processing apparatus, information processing system, and information processing method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180176208A1 (en) * 2007-08-20 2018-06-21 Ebay Inc. System and methods for weak authentication data reinforcement
CN105844140A (en) * 2016-03-21 2016-08-10 国家电网公司 Website login brute force crack method and system capable of identifying verification code
US20180268074A1 (en) * 2017-03-14 2018-09-20 Canon Kabushiki Kaisha Information processing apparatus, information processing system, and information processing method
CN107294975A (en) * 2017-06-27 2017-10-24 四维创智(北京)科技发展有限公司 A kind of Web security breaches detecting system and detection method based on information

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
JIANMING ZHAO: "Penetration Testing Automation Assessment Method", 《THE 5TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON》 *
LOFOR: "Web弱口令通用检测方法探究", 《HTTPS://WWW.HACKBASE.NET/SECURITY/WEB/256601.HTML》 *
PA55W0RD: "渗透测试流程", 《HTTPS://WWW.PA55W0RD.ONLINE/%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95/》 *
浪子燕青: "信息收集[汇总]", 《HTTP://WWW.LANGZI.FUN/%E4%BF%A1%E6%81%AF%E9%87%87%E9%9B%86.HTML》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111723378A (en) * 2020-06-17 2020-09-29 浙江网新恒天软件有限公司 Website directory blasting method based on website map
CN111723378B (en) * 2020-06-17 2023-03-10 浙江网新恒天软件有限公司 Website directory blasting method based on website map
CN113343158A (en) * 2021-07-09 2021-09-03 北京市顺义区妇幼保健院 Extraction and fusion method of screening data
CN113343158B (en) * 2021-07-09 2023-07-04 北京市顺义区妇幼保健院 Extraction and fusion method of screening data
CN116319089A (en) * 2023-05-17 2023-06-23 北京源堡科技有限公司 Dynamic weak password detection method, device, computer equipment and medium
CN116319089B (en) * 2023-05-17 2023-08-11 北京源堡科技有限公司 Dynamic weak password detection method, device, computer equipment and medium
CN117473485A (en) * 2023-12-28 2024-01-30 深圳万物安全科技有限公司 Password detection method, password detection device, and computer-readable storage medium
CN117473485B (en) * 2023-12-28 2024-04-16 深圳万物安全科技有限公司 Password detection method, password detection device, and computer-readable storage medium

Similar Documents

Publication Publication Date Title
CN110505213A (en) A method of excavating website backstage weak password
CN105933268B (en) A kind of website back door detection method and device based on the analysis of full dose access log
CN103023710B (en) A kind of safety test system and method
CN101924757B (en) Method and system for reviewing Botnet
CN103559235B (en) A kind of online social networks malicious web pages detection recognition methods
US10263868B1 (en) User-specific policy enforcement based on network traffic fingerprinting
US8392963B2 (en) Techniques for tracking actual users in web application security systems
DE112013000387B4 (en) Dynamic scanning of a web application using web traffic information
CN110119469A (en) A kind of data collection and transmission and method towards darknet
CN105491018B (en) A kind of network data security analysis method based on DPI technology
CN105357195A (en) Unauthorized web access vulnerability detecting method and device
CN102065147A (en) Method and device for obtaining user login information based on enterprise application system
CN103067387B (en) A kind of anti-phishing monitoring system and method
CN108712426A (en) Reptile recognition methods and system a little are buried based on user behavior
CN115134099B (en) Network attack behavior analysis method and device based on full flow
CN104753960B (en) A kind of system configuration management method based on single-sign-on
CN105635064B (en) CSRF attack detection method and device
WO2017063274A1 (en) Method for automatically determining malicious-jumping and malicious-nesting offensive websites
CN103118035A (en) Website access request parameter legal range analysis method and device
CN108768921A (en) A kind of malicious web pages discovery method and system of feature based detection
Shi et al. The penetration testing framework for large-scale network based on network fingerprint
CN106790073B (en) Blocking method and device for malicious attack of Web server and firewall
CN109857923A (en) A kind of news intelligent recommendation method and system based on area media
CN109408499B (en) Auditing method and system for matching database access users
CN108282443A (en) A kind of reptile Activity recognition method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191126