CN112153075A - Safety monitoring system for computer wireless communication - Google Patents
Safety monitoring system for computer wireless communication Download PDFInfo
- Publication number
- CN112153075A CN112153075A CN202011086231.0A CN202011086231A CN112153075A CN 112153075 A CN112153075 A CN 112153075A CN 202011086231 A CN202011086231 A CN 202011086231A CN 112153075 A CN112153075 A CN 112153075A
- Authority
- CN
- China
- Prior art keywords
- module
- network
- computer terminal
- monitoring module
- login
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
Abstract
The invention relates to a security monitoring system for computer wireless communication, which comprises a computer terminal, a signal transmission module, a security monitoring module, a firewall and a router, wherein the computer terminal is used for generating an operation command and transmitting the operation command to the signal transmission module, the signal transmission module is used for transmitting the operation command generated by the computer terminal and transmitting the operation command to the security monitoring module, and the security monitoring module is used for identifying and blocking sensitive words and domains requested to be networked by the computer terminal and can also be used for judging, monitoring and clearing login information input by the computer terminal. The invention can limit the website accessed by the local network, the searched information or the network use time, and can monitor the safety of the webpage login.
Description
Technical Field
The invention relates to the technical field of network monitoring systems, in particular to a security monitoring system for computer wireless communication.
Background
Network security is relative, on one hand, hardware, software and data in the system of the network system are protected, and are not damaged, changed and leaked due to accidental or malicious reasons, the system can continuously, reliably and normally operate, and network service is not interrupted, and on the other hand, a local network is protected to a certain extent and cannot access dangerous websites or domain names, so that the purpose of network security is achieved.
The active protection of the local network is widely applied to places such as schools, companies and the like, can protect the safety of the local network, and can enable students or employees to learn and work more intensely. However, in practical applications, it is found that the conventional network security monitoring system related to active protection still has certain disadvantages, and the network security monitoring system has great limitations, and can only detect and monitor the problem of network hardware access, but cannot limit the websites accessed in the local network, the searched information, or the time for using the network.
Disclosure of Invention
Accordingly, the present invention is directed to a security monitoring system for computer wireless communication, which can limit the website accessed by a local network, the searched information, or the time of using the network, and can monitor the security of web page login.
The invention is realized by adopting the following scheme: a security monitoring system for computer wireless communication comprises a plurality of computer terminals, a signal transmission module, a security monitoring module, a router and a firewall module; each computer terminal is connected with the signal transmission module and is used for transmitting the generated operation instruction to the signal transmission module; the signal transmission module is connected with the safety monitoring module and used for transmitting an operation instruction to the safety monitoring module through the signal transmission module, and the safety monitoring module identifies, blocks and clears the operation instruction of the computer terminal; each computer terminal is also connected with the router and is used for being connected with a network through the router; the firewall module is also connected with the network through the router; the firewall module is connected with the safety monitoring module and used for blocking unsafe network factors of the computer terminal.
Further, the operation instructions comprise webpage login, network search, software downloading, resource downloading, game downloading and online payment operation.
Furthermore, the safety monitoring module comprises a time management module, a sensitive information database, a sensitive information monitoring module, a domain name database, a domain name monitoring module, a network blocking module, an alarm module, a login judgment module, a login information monitoring module and a data clearing module; the time management module is respectively connected with the signal transmission module, the sensitive information monitoring module and the network blocking module; the sensitive information monitoring module is respectively connected with the sensitive information database, the domain name monitoring module and the network blocking module; the domain name database is connected with the domain name monitoring module; the domain name monitoring module is respectively connected with the network blocking module and the login judging module; the login judgment module is respectively connected with the login information monitoring module and the firewall module; the login information monitoring module is also respectively connected with the data clearing module, the network blocking module and the firewall module; the network blocking module is also connected with the alarm module.
Further, the step of identifying, blocking and clearing the operation instruction of the computer terminal by the security monitoring module specifically comprises the following steps:
step S1: the signal transmission module transmits the operation instruction of each computer terminal to the time management module, the time management module judges whether the network utilization time of the computer terminal is in the set time, if not, the network access of the computer terminal is blocked by the network blocking module, the alarm module gives an alarm, and if so, the data is transmitted to the sensitive information monitoring module;
step S2: the sensitive information monitoring module judges whether an operation instruction of the computer terminal contains sensitive words or not according to various sensitive words, sensitive names or sensitive information stored in the sensitive information database, if the operation instruction contains the sensitive words, a network access of the computer terminal is blocked through the network blocking module, an alarm is given through the alarm module, and if the operation instruction does not contain the sensitive words, data are transmitted to the domain name monitoring module;
step S3: the domain name monitoring module judges whether an operation instruction of the computer terminal comprises a dangerous domain name according to various dangerous domain names stored in the domain name database, if so, a network access of the computer terminal is blocked by the network blocking module, an alarm is given by the alarm module, and if not, data are transmitted to the login judging module;
step S4: the login judging module judges whether the request data of the computer terminal is login operation, if not, the data is directly transmitted to the Internet through a firewall, if yes, the login information monitoring module judges whether the login information is legal or not, if the login information is illegal, the network access of the computer terminal is blocked through the network blocking module, the alarm module gives an alarm, if the login information is legal, the data is transmitted to the Internet through the firewall, the input end of the login information monitoring module is also connected with a data clearing module, and the data clearing module is used for clearing the monitoring information in the login information monitoring module.
Compared with the prior art, the invention has the following beneficial effects:
(1) the invention can limit the website accessed by the local network, the searched information or the network use time, and can monitor the safety of the webpage login.
(2) The invention can limit the network using time of the computer terminal through the time management module, the network is smooth when the network is used in the specified time, and the network can be blocked by the network blocking module when the network is not used in the specified time, thereby preventing the user from indulging the network.
(3) The invention can identify the sensitive words of the information searched by the user through the sensitive information monitoring module and the sensitive information database, if the information contains the sensitive words, the network access of the computer terminal is blocked through the network blocking module, and the alarm is given through the alarm module, if the information does not contain the sensitive words, the network is smooth, and the safety of the network is ensured.
(4) According to the invention, through the domain name monitoring module and the domain name database, whether the request data of the computer terminal contains dangerous domain names can be judged, if the request data contains dangerous domain names, the network access of the computer terminal is blocked through the network blocking module, and the alarm is carried out through the alarm module, and if the request data does not contain dangerous domain names, the network is smooth, so that the local network can be prevented from accessing some dangerous domain names, and the safety of the local network is further ensured.
(5) The login judging module can judge whether the request data of the computer terminal is login operation, and meanwhile, the data clearing module can clear the monitoring information in the login information monitoring module, so that the safety of the data is ensured, and the login information is prevented from being left.
Drawings
Fig. 1 is a schematic system architecture diagram according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a security monitoring module according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of time determination according to an embodiment of the invention.
Fig. 4 is a schematic diagram of sensitive word determination according to an embodiment of the present invention.
Fig. 5 is a schematic diagram illustrating a dangerous domain name determination according to an embodiment of the present invention.
Fig. 6 is a schematic view illustrating login information determination according to an embodiment of the present invention.
Detailed Description
The invention is further explained below with reference to the drawings and the embodiments.
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments according to the present application. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
As shown in fig. 1, the security monitoring system for computer wireless communication in the present embodiment includes a plurality of computer terminals, a signal transmission module, a security monitoring module, a router, and a firewall module; each computer terminal is connected with the signal transmission module and is used for transmitting the generated operation instruction to the signal transmission module; the signal transmission module is connected with the safety monitoring module and used for transmitting an operation instruction to the safety monitoring module through the signal transmission module, and the safety monitoring module identifies, blocks and clears the operation instruction of the computer terminal; each computer terminal is also connected with the router and is used for being connected with a network through the router; the firewall module is also connected with the network through the router; the firewall module is connected with the safety monitoring module and used for blocking unsafe network factors of the computer terminal.
In this embodiment, the operation instruction includes a web login, a web search, a software download, a resource download, a game download, and an online payment operation.
As shown in fig. 2, in this embodiment, the security monitoring module includes a time management module, a sensitive information database, a sensitive information monitoring module, a domain name database, a domain name monitoring module, a network blocking module, an alarm module, a login judgment module, a login information monitoring module, and a data clearing module; the time management module is respectively connected with the signal transmission module, the sensitive information monitoring module and the network blocking module; the sensitive information monitoring module is respectively connected with the sensitive information database, the domain name monitoring module and the network blocking module; the domain name database is connected with the domain name monitoring module; the domain name monitoring module is respectively connected with the network blocking module and the login judging module; the login judgment module is respectively connected with the login information monitoring module and the firewall module; the login information monitoring module is also respectively connected with the data clearing module, the network blocking module and the firewall module; the network blocking module is also connected with the alarm module.
As shown in fig. 3 to 6, in this embodiment, the identifying, blocking and clearing, by the security monitoring module, the operation instruction of the computer terminal specifically includes the following steps:
step S1: the signal transmission module transmits the operation instruction of each computer terminal to the time management module, the time management module judges whether the network utilization time of the computer terminal is in the set time, if not, the network access of the computer terminal is blocked by the network blocking module, the alarm module gives an alarm, and if so, the data is transmitted to the sensitive information monitoring module;
step S2: the sensitive information monitoring module judges whether an operation instruction of the computer terminal contains sensitive words or not according to various sensitive words, sensitive names or sensitive information stored in the sensitive information database, if the operation instruction contains the sensitive words, a network access of the computer terminal is blocked through the network blocking module, an alarm is given through the alarm module, and if the operation instruction does not contain the sensitive words, data are transmitted to the domain name monitoring module;
step S3: the domain name monitoring module judges whether an operation instruction of the computer terminal comprises a dangerous domain name according to various dangerous domain names stored in the domain name database, if so, a network access of the computer terminal is blocked by the network blocking module, an alarm is given by the alarm module, and if not, data are transmitted to the login judging module;
step S4: the login judging module judges whether the request data of the computer terminal is login operation, if not, the data is directly transmitted to the Internet through a firewall, if yes, the login information monitoring module judges whether the login information is legal or not, if the login information is illegal, the network access of the computer terminal is blocked through the network blocking module, the alarm module gives an alarm, if the login information is legal, the data is transmitted to the Internet through the firewall, the input end of the login information monitoring module is also connected with a data clearing module, the data clearing module is used for clearing the monitoring information in the login information monitoring module, the monitoring information comprises all the information in the login information monitoring module, and the safety of the computer terminal is further ensured.
Preferably, in this embodiment, a legal web page and a legal login user name can be set in the login information monitoring module, and the login information monitoring module can determine that the web page is legal only when the legal login user name logs in the legal web page.
Preferably, in this embodiment: the firewall is used for generating a protection barrier and blocking unsafe network factors of the computer terminal;
the router is used for connecting the network of the computer terminal to the Internet;
the security monitoring module is used for identifying and blocking sensitive words and domain names which are requested to be networked by the computer terminal, and also can be used for judging, monitoring and clearing login information input by the computer terminal;
the safety monitoring module comprises a network blocking module and an alarm module, wherein the network blocking module is used for blocking a network access of the computer terminal, the alarm module comprises an alarm lamp and a buzzer, and when the safety monitoring module detects abnormity, the alarm module is used for generating an alarm.
The safety monitoring module further comprises a time management module, and the output end of the time management module is in signal connection with the sensitive information monitoring module and the network blocking module. The time management module comprises a control panel and a processor, the time can be set through the control panel, the network can be used within the set time, and the network can be blocked by the network blocking module when the time limit is exceeded.
The output end of the sensitive information monitoring module is in signal connection with a domain name monitoring module and a network blocking module, and the output end of the domain name monitoring module is in signal connection with a login judging module and a network blocking module. The output end of the login judgment module is in signal connection with a login information monitoring module, and the output end of the login information monitoring module is in signal connection with a network blocking module and a firewall. The input end of the sensitive information monitoring module is in signal connection with a sensitive information database, the input end of the domain name monitoring module is in signal connection with a domain name database, various sensitive words, sensitive names or other sensitive information are stored in the sensitive information database, and various dangerous domain names are stored in the domain name database. The input end of the login information monitoring module is in signal connection with a data clearing module, and the data clearing module is used for clearing the monitoring information in the login information monitoring module, so that the safety of data is ensured, and the login information is prevented from being left.
Preferably, in this embodiment, the sensitive information database and the sensitive information monitoring module can monitor the sensitive information in the computer terminal request data to prevent the computer terminal from searching for some sensitive information, and the domain name database and the domain name monitoring module can monitor the domain name in the computer terminal request data to prevent the computer terminal from accessing some domain names with dangerousness, thereby ensuring the security of the computer terminal network.
The above description is only a preferred embodiment of the present invention, and all equivalent changes and modifications made in accordance with the claims of the present invention should be covered by the present invention.
Claims (4)
1. A security monitoring system for computer wireless communication, characterized by: the system comprises a plurality of computer terminals, a signal transmission module, a safety monitoring module, a router and a firewall module; each computer terminal is connected with the signal transmission module and is used for transmitting the generated operation instruction to the signal transmission module; the signal transmission module is connected with the safety monitoring module and used for transmitting an operation instruction to the safety monitoring module through the signal transmission module, and the safety monitoring module identifies, blocks and clears the operation instruction of the computer terminal; each computer terminal is also connected with the router and is used for being connected with a network through the router; the firewall module is also connected with the network through the router; the firewall module is connected with the safety monitoring module and used for blocking unsafe network factors of the computer terminal.
2. A security monitoring system for computer wireless communication according to claim 1, characterized in that: the operation instructions comprise webpage login, network search, software downloading, resource downloading, game downloading and online payment operation.
3. A security monitoring system for computer wireless communication according to claim 1, characterized in that: the safety monitoring module comprises a time management module, a sensitive information database, a sensitive information monitoring module, a domain name database, a domain name monitoring module, a network blocking module, an alarm module, a login judgment module, a login information monitoring module and a data clearing module; the time management module is respectively connected with the signal transmission module, the sensitive information monitoring module and the network blocking module; the sensitive information monitoring module is respectively connected with the sensitive information database, the domain name monitoring module and the network blocking module; the domain name database is connected with the domain name monitoring module; the domain name monitoring module is respectively connected with the network blocking module and the login judging module; the login judgment module is respectively connected with the login information monitoring module and the firewall module; the login information monitoring module is also respectively connected with the data clearing module, the network blocking module and the firewall module; the network blocking module is also connected with the alarm module.
4. A security monitoring system for computer wireless communication according to claim 3, characterized in that: the steps of identifying, blocking and clearing the operation instruction of the computer terminal by the safety monitoring module specifically comprise the following steps:
step S1: the signal transmission module transmits the operation instruction of each computer terminal to the time management module, the time management module judges whether the network utilization time of the computer terminal is in the set time, if not, the network access of the computer terminal is blocked by the network blocking module, the alarm module gives an alarm, and if so, the data is transmitted to the sensitive information monitoring module;
step S2: the sensitive information monitoring module judges whether an operation instruction of the computer terminal contains sensitive words or not according to various sensitive words, sensitive names or sensitive information stored in the sensitive information database, if the operation instruction contains the sensitive words, a network access of the computer terminal is blocked through the network blocking module, an alarm is given through the alarm module, and if the operation instruction does not contain the sensitive words, data are transmitted to the domain name monitoring module;
step S3: the domain name monitoring module judges whether an operation instruction of the computer terminal comprises a dangerous domain name according to various dangerous domain names stored in the domain name database, if so, a network access of the computer terminal is blocked by the network blocking module, an alarm is given by the alarm module, and if not, data are transmitted to the login judging module;
step S4: the login judging module judges whether the request data of the computer terminal is login operation, if not, the data is directly transmitted to the Internet through a firewall, if yes, the login information monitoring module judges whether the login information is legal or not, if the login information is illegal, the network access of the computer terminal is blocked through the network blocking module, the alarm module gives an alarm, if the login information is legal, the data is transmitted to the Internet through the firewall, the input end of the login information monitoring module is also connected with a data clearing module, and the data clearing module is used for clearing the monitoring information in the login information monitoring module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011086231.0A CN112153075B (en) | 2020-10-12 | 2020-10-12 | Safety monitoring system for computer wireless communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011086231.0A CN112153075B (en) | 2020-10-12 | 2020-10-12 | Safety monitoring system for computer wireless communication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112153075A true CN112153075A (en) | 2020-12-29 |
CN112153075B CN112153075B (en) | 2023-05-05 |
Family
ID=73953001
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011086231.0A Active CN112153075B (en) | 2020-10-12 | 2020-10-12 | Safety monitoring system for computer wireless communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112153075B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102647425A (en) * | 2012-04-20 | 2012-08-22 | 汉柏科技有限公司 | Method and system for realizing anti-trojan function of firewall |
CN103491108A (en) * | 2013-10-15 | 2014-01-01 | 浙江中控研究院有限公司 | Method and system for security protection of industrial control network |
CN104821943A (en) * | 2015-04-27 | 2015-08-05 | 西北工业大学 | Method for enhancing security of access of Linux hosts to network system |
US20170339177A1 (en) * | 2016-05-06 | 2017-11-23 | SecuLore Solutions, LLC | System, method, and apparatus for data loss prevention |
CN108931968A (en) * | 2018-07-25 | 2018-12-04 | 安徽三实信息技术服务有限公司 | A kind of network security protection system and its means of defence applied in industrial control system |
CN109450945A (en) * | 2018-12-26 | 2019-03-08 | 成都西维数码科技有限公司 | A kind of web page access method for safety monitoring based on SNI |
CN109977661A (en) * | 2019-04-09 | 2019-07-05 | 福建奇点时空数字科技有限公司 | A kind of network safety protection method and system based on big data platform |
-
2020
- 2020-10-12 CN CN202011086231.0A patent/CN112153075B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102647425A (en) * | 2012-04-20 | 2012-08-22 | 汉柏科技有限公司 | Method and system for realizing anti-trojan function of firewall |
CN103491108A (en) * | 2013-10-15 | 2014-01-01 | 浙江中控研究院有限公司 | Method and system for security protection of industrial control network |
CN104821943A (en) * | 2015-04-27 | 2015-08-05 | 西北工业大学 | Method for enhancing security of access of Linux hosts to network system |
US20170339177A1 (en) * | 2016-05-06 | 2017-11-23 | SecuLore Solutions, LLC | System, method, and apparatus for data loss prevention |
CN108931968A (en) * | 2018-07-25 | 2018-12-04 | 安徽三实信息技术服务有限公司 | A kind of network security protection system and its means of defence applied in industrial control system |
CN109450945A (en) * | 2018-12-26 | 2019-03-08 | 成都西维数码科技有限公司 | A kind of web page access method for safety monitoring based on SNI |
CN109977661A (en) * | 2019-04-09 | 2019-07-05 | 福建奇点时空数字科技有限公司 | A kind of network safety protection method and system based on big data platform |
Also Published As
Publication number | Publication date |
---|---|
CN112153075B (en) | 2023-05-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101042246B1 (en) | USB connector and intrusion prevention system using the same | |
CN102301373B (en) | Health-based Access To Network Resources | |
US20040103200A1 (en) | Method and system for improved internet security via HTTP-only cookies | |
US20010025311A1 (en) | Access control system | |
US20220217169A1 (en) | Malware detection at endpoint devices | |
US20090048997A1 (en) | Method and apparatus for rule-based masking of data | |
US20080307529A1 (en) | Method and Apparatus for Protecting Internet Privacy | |
US20090119745A1 (en) | System and method for preventing private information from leaking out through access context analysis in personal mobile terminal | |
CN106899549B (en) | Network security detection method and device | |
US20170353434A1 (en) | Methods for detection of reflected cross site scripting attacks | |
WO2002078293A1 (en) | Method and system for securely permitting mobile code to access network resources | |
KR20080044145A (en) | Anomaly detection system and method of web application attacks using web log correlation | |
KR101996471B1 (en) | Network Securing Device and Securing method Using The Same | |
CN111614624A (en) | Risk detection method, device, system and storage medium | |
CN113518077A (en) | Malicious web crawler detection method, device, equipment and storage medium | |
US20190238544A1 (en) | Tracking and whitelisting third-party domains | |
US9230105B1 (en) | Detecting malicious tampering of web forms | |
EP1455500A1 (en) | Methods and devices relating to distributed computing environments | |
KR100916324B1 (en) | The method, apparatus and system for managing malicious code spreading site using fire wall | |
KR20020027702A (en) | Method for intercepting the harmfulness site connection on the Internet | |
US8904487B2 (en) | Preventing information theft | |
CN112153075B (en) | Safety monitoring system for computer wireless communication | |
CN111931236A (en) | Data communication monitoring method, system and computer readable storage medium | |
CN102664913A (en) | Method and device for webpage access control | |
KR101775518B1 (en) | Method of prividing browser using browser process for each access permission and apparatus using the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |