CN115865427B - Data acquisition and monitoring method based on data routing gateway - Google Patents

Data acquisition and monitoring method based on data routing gateway Download PDF

Info

Publication number
CN115865427B
CN115865427B CN202211424675.XA CN202211424675A CN115865427B CN 115865427 B CN115865427 B CN 115865427B CN 202211424675 A CN202211424675 A CN 202211424675A CN 115865427 B CN115865427 B CN 115865427B
Authority
CN
China
Prior art keywords
information
target domain
data
content
routing gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211424675.XA
Other languages
Chinese (zh)
Other versions
CN115865427A (en
Inventor
杨剑南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Vodcat Technology Co ltd
Original Assignee
Chongqing Vodcat Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Vodcat Technology Co ltd filed Critical Chongqing Vodcat Technology Co ltd
Priority to CN202211424675.XA priority Critical patent/CN115865427B/en
Publication of CN115865427A publication Critical patent/CN115865427A/en
Application granted granted Critical
Publication of CN115865427B publication Critical patent/CN115865427B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The invention discloses a data acquisition and monitoring method based on a data routing gateway, which relates to the technical field of data security, and is characterized in that the information safety coefficient of the information content in a target domain is obtained by carrying out safety analysis on the information content in the target domain, and the safety of the information content is judged, so that the information content with high risk can be prevented from entering a user terminal, and the information safety of a user is prevented from being damaged; and when the user uploads the information content to be uploaded by the user, the information security coefficient is obtained through the data information retrieval library, so that high risk information can be prevented from entering a target domain, the use of the information content in the target domain is influenced, the user terminal can be protected from being invaded by the information in the target domain by setting the data information retrieval library, and meanwhile, the target domain is protected from being randomly implanted with the high risk information, so that the use security of the target domain is ensured.

Description

Data acquisition and monitoring method based on data routing gateway
Technical Field
The invention relates to the technical field of data security, in particular to a data acquisition and monitoring method based on a data routing gateway.
Background
With the continuous development of internet technology, massive users, abundant terminals and rapid information propagation not only enrich the content of the internet, but also provide higher requirements for the service quality of the internet in turn;
when a user enters the network through the data routing gateway, the user terminal is easy to invade risks in the network, such as binding software, advertisements and viruses, and meanwhile, the webpage is easy to upload information with potential safety hazards, so that the normal use of the webpage is affected.
Disclosure of Invention
The invention aims to provide a data acquisition and monitoring method based on a data routing gateway.
The aim of the invention can be achieved by the following technical scheme: a data acquisition and monitoring method based on a data routing gateway comprises the following steps:
step one: marking a routing gateway, setting a web crawler node, and binding the web crawler node with the routing gateway;
step two: acquiring a data request of a routing gateway through a web crawler node, connecting the target domain of the web crawler node according to the target domain of the data request of the routing gateway, and acquiring data of the target domain through the web crawler;
step three: processing the acquired data of the target domain to acquire the information content of the target domain;
step four: and analyzing the information content of the target domain, and executing protection measures on the routing gateway according to the analysis result.
Further, the routing gateway is in communication connection with the IP address of the user terminal, the user sends a data request to the routing gateway through the IP of the user terminal in communication connection with the routing gateway, and when the data request arrives at the routing gateway, the specific content of the data request is obtained through the web crawler node bound with the routing gateway.
Further, the process of the web crawler node obtaining the specific content of the data request includes:
the user connects the user terminal with the routing gateway and acquires the permission of the user terminal to enter the routing gateway; after the routing gateway is connected with the user terminal, the IP of the user terminal is obtained, a data transmission channel is established according to the IP of the user terminal, and a data request generated by a user through the user terminal is sent to the routing gateway through the data transmission channel; acquiring a link of a target domain into which the data request is to enter, and enabling a web crawler to enter the target domain through the link of the target domain; and acquiring the webpage content of the target domain, and processing the webpage content of the target domain.
Further, the types of the data requests include access, upload and download.
Further, the processing procedure of the information content of the target domain includes: classifying the information content of the target domain, and endowing the classified information content with an identification tag; and establishing a data information retrieval library, inputting the information content in the target domain into the data information retrieval library, and acquiring the information security coefficient corresponding to the information content through the data information retrieval library.
Further, the establishing process of the data information retrieval library specifically includes:
establishing a data information retrieval library, and setting an information docking port for the data information retrieval library;
setting an illegal domain name sub-library and a virus information sub-library, and respectively importing illegal domain name information into the illegal domain name sub-library and importing virus data information into the virus information sub-library.
Further, the process for obtaining the information security coefficient of the information content in the target domain specifically includes:
inputting information content in a target domain into a data information retrieval library;
the identification tag of the information content and the attribute of the information content corresponding to the identification tag are searched and matched with the illegal domain name sub-library and the virus information sub-library, so that the number of loopholes and the number of risks searched by the illegal domain name sub-library and the virus information sub-library are obtained; the historical access times and the historical reporting complaint times of the target domain are obtained, the content of the historical reporting complaint is classified, the complaint times of the information security class are obtained, and the information security coefficient is obtained through the parameters.
Further, the analysis process of the information content of the target domain includes:
respectively setting corresponding information safety coefficient thresholds according to the identification tags of the information content of the target domain;
comparing the obtained information safety coefficient with an information safety coefficient threshold value, and when the obtained information safety coefficient does not exceed the information safety coefficient threshold value, indicating that the information content corresponding to the information safety coefficient is low risk information and marking the low risk information; when the obtained information safety coefficient exceeds the information safety coefficient threshold value, the information content corresponding to the information safety coefficient is indicated to have potential safety hazards, and the information content is marked as high risk information.
Compared with the prior art, the invention has the beneficial effects that: the information content in the target domain is subjected to security analysis, so that the information security coefficient of the information content in the target domain is obtained, and the security of the information content is judged, so that the information content with high risk can be prevented from entering the user terminal, and the information security of the user is prevented from being damaged; and when the user uploads the information content to be uploaded by the user, the information security coefficient is obtained through the data information retrieval library, so that high risk information can be prevented from entering a target domain, the use of the information content in the target domain is influenced, the user terminal can be protected from being invaded by the information in the target domain by setting the data information retrieval library, and meanwhile, the target domain is protected from being randomly implanted with the high risk information, so that the use security of the target domain is ensured.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
As shown in fig. 1, a data collecting and monitoring method based on a data routing gateway includes the following steps:
step one: marking a routing gateway, setting a web crawler node, and binding the web crawler node with the routing gateway;
step two: acquiring a data request of a routing gateway through a web crawler node, connecting the target domain of the web crawler node according to the target domain of the data request of the routing gateway, and acquiring data of the target domain through the web crawler;
step three: processing the acquired data of the target domain to acquire the information content of the target domain;
step four: and analyzing the information content of the target domain, and executing protection measures on the routing gateway according to the analysis result.
The routing gateway is in communication connection with the IP address of the user terminal, a user sends a data request to the routing gateway through the IP of the user terminal in communication connection with the routing gateway, when the data request arrives at the routing gateway, the specific content of the data request is acquired through a web crawler node bound with the routing gateway, and the process of acquiring the specific content of the data request by the web crawler node comprises the following steps:
the user connects the user terminal with the routing gateway and acquires the permission of the user terminal to enter the routing gateway;
after obtaining permission of entering the routing gateway, the routing gateway carries out networking on the user terminal;
after the routing gateway is connected with the user terminal, the IP of the user terminal is obtained and recorded;
establishing a data transmission channel according to the IP of the user terminal, and sending a data request generated by the user through the user terminal to a routing gateway through the data transmission channel;
the web crawler node grabs the data request and acquires the type of the data request; the types of the data requests comprise access, uploading and downloading;
acquiring a link of a target domain into which the data request is to enter, and enabling a web crawler to enter the target domain through the link of the target domain;
and acquiring the webpage content of the target domain, and processing the webpage content of the target domain.
It should be further noted that, in the implementation process, after the user enters the target domain through the link of the target domain, different information contents often exist in the webpage of the target domain, and the information contents are processed and analyzed, so that the information contents of the target domain are ensured to be filtered, and the harm to the information entering the user terminal is avoided, so that the data in the user terminal is lost;
the processing procedure of the information content of the target domain specifically comprises the following steps:
classifying the information content of the target domain, assigning the classified information content to an identification tag,
acquiring attributes of corresponding information content according to the identification tag;
establishing a data information retrieval library, inputting information content in a target domain into the data information retrieval library, acquiring information safety coefficients corresponding to the information content through the data information retrieval library, and analyzing the information content according to the safety coefficients of the information content.
It should be further noted that, in the implementation process, the process of establishing the data information retrieval library specifically includes:
establishing a data information retrieval library, and setting an information docking port for the data information retrieval library;
setting an illegal domain name sub-library and a virus information sub-library, and respectively importing illegal domain name information into the illegal domain name sub-library and importing virus data information into the virus information sub-library;
it should be further noted that, in the implementation process, the illegal domain name information in the illegal domain name information sub-library and the virus data information in the virus information sub-library are updated in real time;
the process for acquiring the information security coefficient of the information content in the target domain specifically comprises the following steps:
inputting information content in a target domain into a data information retrieval library;
the identification tag of the information content and the attribute of the information content corresponding to the identification tag are searched and matched with the illegal domain name sub-library and the virus information sub-library, so that the number of loopholes and the number of risks searched by the illegal domain name sub-library and the virus information sub-library are obtained;
marking the vulnerability number and the risk number as LS and FS respectively;
acquiring the historical access times of the target domain, and marking the historical access times as n;
acquiring the historical reporting complaint times of the target domain, marking the historical reporting complaint times as a, classifying the content of the historical reporting complaint, and marking the complaint times representing information security class as b, wherein b is less than or equal to a;
obtaining the information security coefficient XX by the formula xx=b/(a+n) ×log [ (a+b)/(ls+fs) ];
it should be further noted that, in the implementation process, after the web crawler inputs the information content of the target domain into the data information retrieval library, the information security coefficient of the information content of the target domain is obtained according to the vulnerability number and the risk number of the information content of the target domain, and the security of the information content of the target domain accessed by the user is analyzed through the obtained information security coefficient, where the analysis process of the information content of the target domain specifically includes:
respectively setting corresponding information safety coefficient thresholds according to the identification tags of the information content of the target domain;
comparing the obtained information security coefficient XX with an information security coefficient threshold value, and when the obtained information security coefficient XX does not exceed the information security coefficient threshold value, indicating that the information content corresponding to the information security coefficient is low risk information, and marking the low risk information; when the obtained information security coefficient XX exceeds the information security coefficient threshold value, the information content corresponding to the information security coefficient is indicated to have potential safety hazards, and the information content is marked as high risk information.
It should be further noted that, in the implementation process, after the security analysis of the information content in the target domain is completed, a corresponding protection measure is executed according to the data request of the user, and the specific process includes:
a unidirectional data transmission authority is arranged in the data transmission channel;
the unidirectional data authority intercepts the information content of the target domain when the user accesses the unidirectional data authority, so that the information content of the target domain is prevented from entering the user terminal through the data transmission channel without being allowed by the user;
when the data request of the user is to access a certain piece of information content in the target domain, the user normally accesses the information content when the information content is low risk information, the information content is filtered by the unidirectional data transmission authority, and early warning information is sent to the user terminal;
when the data request of the user is to access a certain piece of information content in the target domain, when the information content is high risk information, early warning information is produced, a security log is generated by loopholes and risks, the security log is sent to the user terminal, when the user authorizes the security log, the access is continued, and when the user refuses to access the security log, the corresponding information content is marked and hidden.
When the data request of the user is a piece of information content in a downloading target domain, if the information content is low risk information, generating a security log from loopholes and risks in the information content, and sending the security log to the user terminal, if the user authorizes the security log, continuing to download, and if the user refuses to authorize the security log, interrupting the downloading process;
when the data request of the user is a piece of information content in the downloading target domain, eliminating loopholes and risks in the information content when the information content is high-risk information, and sending the proposed information content to the user terminal through a data transmission channel to complete the downloading process.
When the data request of the user is uploading a certain information content to the target domain, the information content is sent to a data information retrieval library, so that the information safety coefficient of the information content is obtained, and whether the information content is low risk information or high risk information is judged according to the information safety coefficient;
when the information content is low risk information, creating an index link according to the information content, and connecting the index link with a target domain required to be uploaded by a user;
when the information content is high risk information, the target domain automatically intercepts the information content and interrupts the uploading process.
It should be further noted that, in the specific implementation process, the information content in the target domain is subjected to security analysis, so that the information security coefficient of the information content in the target domain is obtained, and the security of the information content is judged, so that the information content with high risk can be prevented from entering the user terminal, and the information security of the user is prevented from being damaged;
and when the user uploads the information content to be uploaded by the user, the information security coefficient is obtained through the data information retrieval library, so that high risk information can be prevented from entering a target domain, the use of the information content in the target domain is influenced, the user terminal can be protected from being invaded by the information in the target domain by setting the data information retrieval library, and meanwhile, the target domain is protected from being randomly implanted with the high risk information, so that the use security of the target domain is ensured.
The above formulas are all formulas with dimensions removed and numerical values calculated, the formulas are formulas which are obtained by acquiring a large amount of data and performing software simulation to obtain the closest actual situation, and preset parameters and preset thresholds in the formulas are set by a person skilled in the art according to the actual situation or are obtained by simulating a large amount of data.
The above embodiments are only for illustrating the technical method of the present invention and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present invention may be modified or substituted without departing from the spirit and scope of the technical method of the present invention.

Claims (1)

1. The data acquisition and monitoring method based on the data routing gateway is characterized by comprising the following steps of:
step one: marking a routing gateway, setting a web crawler node, and binding the web crawler node with the routing gateway;
step two: acquiring a data request of a routing gateway through a web crawler node, connecting the target domain of the web crawler node according to the target domain of the data request of the routing gateway, and acquiring data of the target domain through the web crawler;
step three: processing the acquired data of the target domain to acquire the information content of the target domain;
step four: analyzing the information content of the target domain, and executing protection measures on the routing gateway according to the analysis result;
the routing gateway is in communication connection with the IP address of the user terminal, a user sends a data request to the routing gateway through the IP of the user terminal in communication connection with the routing gateway, and when the data request arrives at the routing gateway, the specific content of the data request is acquired through a web crawler node bound with the routing gateway;
the process of acquiring the specific content of the data request by the web crawler node comprises the following steps:
the user connects the user terminal with the routing gateway and acquires the permission of the user terminal to enter the routing gateway; after the routing gateway is connected with the user terminal, the IP of the user terminal is obtained, a data transmission channel is established according to the IP of the user terminal, and a data request generated by a user through the user terminal is sent to the routing gateway through the data transmission channel; acquiring a link of a target domain into which the data request is to enter, and enabling a web crawler to enter the target domain through the link of the target domain; acquiring webpage content of a target domain, and processing the webpage content of the target domain;
the types of the data requests comprise access, uploading and downloading;
the processing procedure of the information content of the target domain comprises the following steps: classifying the information content of the target domain, and endowing the classified information content with an identification tag; establishing a data information retrieval library, inputting information content in a target domain into the data information retrieval library, and acquiring an information security coefficient corresponding to the information content through the data information retrieval library;
the process for establishing the data information retrieval library specifically comprises the following steps:
establishing a data information retrieval library, and setting an information docking port for the data information retrieval library;
setting an illegal domain name sub-library and a virus information sub-library, and respectively importing illegal domain name information into the illegal domain name sub-library and importing virus data information into the virus information sub-library;
the process for acquiring the information security coefficient of the information content in the target domain specifically comprises the following steps:
inputting information content in a target domain into a data information retrieval library;
the identification tag of the information content and the attribute of the information content corresponding to the identification tag are searched and matched with the illegal domain name sub-library and the virus information sub-library, so that the number of loopholes and the number of risks searched by the illegal domain name sub-library and the virus information sub-library are obtained; acquiring the historical access times and the historical reporting complaint times of the target domain, classifying the contents of the historical reporting complaints, acquiring the complaint times representing information security classes therein, and acquiring the information security coefficients through the parameters;
marking the vulnerability number and the risk number as LS and FS respectively;
acquiring the historical access times of the target domain, and marking the historical access times as n;
acquiring the historical reporting complaint times of the target domain, marking the historical reporting complaint times as a, classifying the content of the historical reporting complaint, and marking the complaint times representing information security class as b, wherein b is less than or equal to a;
obtaining an information security coefficient by the formula xx=b/(a+n) ×log [ (a+b)/(ls+fs) ];
the analysis process of the information content of the target domain comprises the following steps:
respectively setting corresponding information safety coefficient thresholds according to the identification tags of the information content of the target domain;
comparing the obtained information safety coefficient with an information safety coefficient threshold value, and when the obtained information safety coefficient does not exceed the information safety coefficient threshold value, indicating that the information content corresponding to the information safety coefficient is low risk information and marking the low risk information; when the obtained information safety coefficient exceeds the information safety coefficient threshold value, the information content corresponding to the information safety coefficient is indicated to have potential safety hazards, and the information content is marked as high risk information.
CN202211424675.XA 2022-11-14 2022-11-14 Data acquisition and monitoring method based on data routing gateway Active CN115865427B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211424675.XA CN115865427B (en) 2022-11-14 2022-11-14 Data acquisition and monitoring method based on data routing gateway

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211424675.XA CN115865427B (en) 2022-11-14 2022-11-14 Data acquisition and monitoring method based on data routing gateway

Publications (2)

Publication Number Publication Date
CN115865427A CN115865427A (en) 2023-03-28
CN115865427B true CN115865427B (en) 2023-07-21

Family

ID=85663419

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211424675.XA Active CN115865427B (en) 2022-11-14 2022-11-14 Data acquisition and monitoring method based on data routing gateway

Country Status (1)

Country Link
CN (1) CN115865427B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7320866B2 (en) * 2019-02-19 2023-08-04 エスツーダブリュー インコーポレイテッド Method, apparatus and computer program for collecting data from multiple domains

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170006191A (en) * 2015-07-07 2017-01-17 주식회사 케이티 Method and apparatus for detecting spammer
WO2021022689A1 (en) * 2019-08-05 2021-02-11 苏州闻道网络科技股份有限公司 Information collection method and apparatus
CN112788601A (en) * 2021-03-04 2021-05-11 彭松英 Mobile terminal information safety protection system and method based on big data
CN114826691A (en) * 2022-04-02 2022-07-29 深圳市博博信息咨询有限公司 Network information safety intelligent analysis early warning management system based on multi-dimensional analysis
CN115037510A (en) * 2022-04-27 2022-09-09 新华三信息安全技术有限公司 Page access method and device

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10397246B2 (en) * 2010-07-21 2019-08-27 Radware, Ltd. System and methods for malware detection using log based crowdsourcing analysis
CN102754488B (en) * 2011-04-18 2016-06-08 华为技术有限公司 The control method of user's access, Apparatus and system
CN104125209B (en) * 2014-01-03 2015-09-09 腾讯科技(深圳)有限公司 Malice website prompt method and router
US10171318B2 (en) * 2014-10-21 2019-01-01 RiskIQ, Inc. System and method of identifying internet-facing assets
US10212167B2 (en) * 2016-02-27 2019-02-19 Gryphon Online Safety, Inc. Method and system to enable controlled safe internet browsing
CN113545020B (en) * 2019-03-29 2022-07-22 华为技术有限公司 Data processing method and device
CN112187792A (en) * 2020-09-27 2021-01-05 安徽斯跑特科技有限公司 Network information safety protection system based on internet
CN112073439A (en) * 2020-10-13 2020-12-11 中国联合网络通信集团有限公司 Secure Internet access control method, gateway equipment and storage medium
CN113726769B (en) * 2021-08-28 2023-07-04 睿思网盾(北京)科技有限公司 Network security prevention and control system based on data acquisition
CN114629688B (en) * 2022-02-22 2024-03-15 中国人民解放军国防科技大学 File uploading vulnerability mining method and system based on dynamic test

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170006191A (en) * 2015-07-07 2017-01-17 주식회사 케이티 Method and apparatus for detecting spammer
WO2021022689A1 (en) * 2019-08-05 2021-02-11 苏州闻道网络科技股份有限公司 Information collection method and apparatus
CN112788601A (en) * 2021-03-04 2021-05-11 彭松英 Mobile terminal information safety protection system and method based on big data
CN114826691A (en) * 2022-04-02 2022-07-29 深圳市博博信息咨询有限公司 Network information safety intelligent analysis early warning management system based on multi-dimensional analysis
CN115037510A (en) * 2022-04-27 2022-09-09 新华三信息安全技术有限公司 Page access method and device

Also Published As

Publication number Publication date
CN115865427A (en) 2023-03-28

Similar Documents

Publication Publication Date Title
CN111245793A (en) Method and device for analyzing abnormity of network data
TWI648650B (en) Gateway device, detection method of malicious domain and host host, and non-transitory computer readable media
CN107579956B (en) User behavior detection method and device
CN116506217B (en) Analysis method, system, storage medium and terminal for security risk of service data stream
CN110535806B (en) Method, device and equipment for monitoring abnormal website and computer storage medium
CN107341399B (en) Method and device for evaluating security of code file
CN103428183B (en) Method and device for identifying malicious website
CN110012005B (en) Method and device for identifying abnormal data, electronic equipment and storage medium
JP6408395B2 (en) Blacklist management method
CN112184091B (en) Industrial control system security threat assessment method, device and system
CN108156131A (en) Webshell detection methods, electronic equipment and computer storage media
CN106534146A (en) Safety monitoring system and method
CN114338064B (en) Method, device, system, equipment and storage medium for identifying network traffic type
CN115865427B (en) Data acquisition and monitoring method based on data routing gateway
CN108965296A (en) A kind of leak detection method and detection device for smart home device
CN111177779B (en) Database auditing method, device, electronic equipment and computer storage medium
CN108667770A (en) A kind of loophole test method, server and the system of website
CN113111951B (en) Data processing method and device
CN109359251A (en) Audit method for early warning, device and the terminal device of application system service condition
CN104486320A (en) Intranet sensitive information disclosure evidence collection system and method based on honeynet technology
CN111193727A (en) Operation monitoring system and operation monitoring method
CN109309665A (en) A kind of access request processing method and processing device, a kind of calculating equipment and storage medium
CN112528325B (en) Data information security processing method and system
CN115840965B (en) Information security guarantee model training method and system
CN115442159B (en) Household routing-based risk management and control method, system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant