CN115879115A - Method and system for detecting Web application security vulnerability - Google Patents

Method and system for detecting Web application security vulnerability Download PDF

Info

Publication number
CN115879115A
CN115879115A CN202211594869.4A CN202211594869A CN115879115A CN 115879115 A CN115879115 A CN 115879115A CN 202211594869 A CN202211594869 A CN 202211594869A CN 115879115 A CN115879115 A CN 115879115A
Authority
CN
China
Prior art keywords
fuzz
mutation
url
program
tested
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211594869.4A
Other languages
Chinese (zh)
Other versions
CN115879115B (en
Inventor
崔延彬
白易元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shuimu Yulin Technology Co ltd
Original Assignee
Beijing Shuimu Yulin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shuimu Yulin Technology Co ltd filed Critical Beijing Shuimu Yulin Technology Co ltd
Priority to CN202211594869.4A priority Critical patent/CN115879115B/en
Publication of CN115879115A publication Critical patent/CN115879115A/en
Application granted granted Critical
Publication of CN115879115B publication Critical patent/CN115879115B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a method and a system for detecting Web application security loopholes.A client calls an AFL tool to perform fuzz test according to a user test instruction, and performs parameter mutation on a URL (uniform resource locator) of a program to be tested by using a specified mutator, wherein the URL is subjected to directional mutation by taking key information of the program to be tested, which is collected by stain tracking, as a characteristic value of auxiliary mutation, and a mutation result is integrated into an http (hyper text transport protocol) request and is sent to a server; and the server analyzes the obtained http request, performs security vulnerability detection and coverage analysis on the program to be tested by taking the mutation result obtained by analysis as input, obtains the test result by calling the taint tracking module, and returns the test result to the client. By utilizing a stain tracking technology, the accuracy of the webfuzz test mutation is realized, meanwhile, the false report in the traditional web vulnerability scanning is reduced, and the fuzz technology can eliminate the insecticide paradox in the traditional automatic test software.

Description

Method and system for detecting Web application security vulnerability
Technical Field
The invention relates to the technical field of security vulnerability detection, in particular to a method and a system for detecting a security vulnerability of Web application.
Background
Vulnerability scanning, a computer program designed to evaluate and discover known vulnerabilities of a computer, network or application, and to identify and detect vulnerabilities in firewalls, routers, network servers, application servers, etc., due to misconfiguration or defective programs. In addition, the vulnerability scanner scans the installed software, open ports, certificates and other host information on the computer and gives reports of vulnerabilities and detailed and accurate information about the operating system and the installed software, such as configuration problems and security patches missing from the system. Fuzzing (fuzzing) is a software testing technique. The core idea is to input automatically or semi-automatically generated random data into a program and monitor program exceptions such as crashes, assertion (assertion) failures to discover possible program errors such as memory leaks.
Traditional Web vulnerability scanning, especially static code scanning, can generate a large number of false positives, pesticide paradoxs are generated due to the limitation of a test case library, and after test software runs for a period of time, new bugs are difficult to monitor. Current fuzz testing techniques test the javaweb program or can only detect a single error, such as a crash (kelnci); or an assertion needs to be specified for each target to be detected in a complex mode, so that the use is more complicated, the cost in actual production is too high, and the use is difficult.
Disclosure of Invention
Therefore, the invention provides a method and a system for detecting Web application security vulnerabilities, so as to solve the technical problems.
In order to achieve the above purpose, the invention provides the following technical scheme:
according to a first aspect of an embodiment of the present invention, a method for detecting a security vulnerability of a Web application is provided, where the method includes:
the fuzz client calls an AFL tool according to the user test instruction and designates a specific URL path of the program to be tested to perform fuzz test, the AFL tool performs parameter mutation on the URL of the program to be tested by using a designated mutator, wherein the URL is subjected to directional mutation by taking key information of the program to be tested, which is collected according to stain tracking, as a characteristic value of auxiliary mutation, and a mutation result is integrated into an http request and is sent to a fuzz server;
the fuzz server analyzes the acquired http request, performs security vulnerability detection and coverage analysis on the program to be tested based on the mutation result obtained by analysis as input, acquires the test result by calling the taint tracking module, determines the URL of the program to be tested which may have security problems and the detected web security vulnerability, and returns the test result to the fuzz client.
Further, the method further comprises:
and the fuzz client calls a fuzz verification module to start verification on the web security vulnerability found in the obtained test result, and the final detection result is obtained by removing the false alarm information through verification.
Further, the method further comprises:
and the user sends test instructions including starting and stopping instructions to the fuzz client by operating the SDK.
Further, the method further comprises:
the fuzz server responds to the request of the fuzz client to acquire a URL list of the program to be tested and returns the URL list to the fuzz client, so that the fuzz client starts to perform the fuzz test on the URL of the program to be tested;
the method for acquiring the url information of the program to be tested comprises recording the called url and the url in the analysis frame.
Further, performing directional mutation on the URL according to key information of the program to be tested, collected by the stain tracking, as a characteristic value of the auxiliary mutation, specifically including:
the fuzzy server responds to the request of the fuzzy client and returns the key information of the program to be tested, which is collected by the taint tracking module, to the fuzzy client as a mutation characteristic value;
and the fuzz client mutates the parameters in the URL according to a preset mutation mode through the appointed mutator on the acquired mutation characteristic value.
According to a second aspect of the embodiment of the invention, a detection system for Web application security vulnerabilities is provided, which comprises a fuzz client and a fuzz server;
the fuzz client comprises a fuzz management module and a fuzz agent module;
the fuzz management module is used for calling an AFL tool according to a user test instruction and appointing a specific URL path of the program to be tested to perform fuzz test, the AFL tool performs parameter mutation on the URL of the program to be tested by using an appointed mutator, and directional mutation is performed on the URL according to key information of the program to be tested, which is collected by stain tracking and used as a characteristic value of auxiliary mutation; the fuzz agent module is used for sending the http request of the fuzz client to the fuzz server and receiving a request feedback result of the fuzz server;
the fuzzy server comprises a request processing module, a taint tracking module and a JQF agent module;
the request processing module is used for acquiring an http request sent by the fuzz client and feeding back a request return result to the fuzz client; the stain tracking module is used for acquiring safety problems, stack information and mutation characteristic values possibly existing in the program to be tested; the JQF agent module is used for acquiring coverage rate information of a program to be tested based on the JQF fuzzy test platform.
Further, the fuzz client further comprises a fuzz verification module, which is used for starting verification on the web security vulnerabilities found in the obtained test results, and removing the false alarm information through verification to obtain a final detection result.
Further, the system also comprises an SDK, and the SDK is used for sending test instructions including starting and stopping instructions to the fuzz client by operating the SDK by a user.
Further, the fuzz server further comprises a fuzz URL collection module used for obtaining a URL list of the program to be tested; the method for acquiring the url information of the program to be tested comprises recording the called url and the url in the analysis frame.
Further, the mutation device is specifically configured to perform mutation on the parameter in the URL according to a preset mutation mode according to the obtained mutation characteristic value.
The invention has the following advantages:
the invention provides a method and a system for detecting Web application security vulnerabilities, wherein the method comprises the following steps: the fuzz client calls an AFL tool according to a user test instruction and designates a specific URL path of the program to be tested to perform fuzz test, the AFL tool performs parameter mutation on the URL of the program to be tested by using a designated mutation device, wherein the URL is subjected to directional mutation by taking key information of the program to be tested, which is collected according to stain tracking, as a characteristic value of auxiliary mutation, and a mutation result is integrated into an http request and sent to a fuzz server; the fuzz server analyzes the obtained http request, performs security vulnerability detection and coverage analysis on the program to be tested based on the mutation result obtained by analysis as input, obtains the test result by calling the stain tracking module, determines the URL of the program to be tested which possibly has security problems and the detected web security vulnerability, and returns the test result to the fuzz client. And collecting key information of the system to be tested through stain tracking, and performing directional mutation on the client by using the collected information to perform a fuzz test. By utilizing a stain tracking technology, the accuracy of the webfuzz test mutation is realized, meanwhile, the false report in the traditional web vulnerability scanning is reduced, and the fuzz technology can eliminate the insecticide paradox in the traditional automatic test software.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It should be apparent that the drawings in the following description are merely exemplary, and that other embodiments can be derived from the drawings provided by those of ordinary skill in the art without inventive effort.
Fig. 1 is a schematic flowchart of a method for detecting a security vulnerability of a Web application according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a system for detecting a security vulnerability of a Web application according to an embodiment of the present invention.
Detailed Description
The present invention is described in terms of specific embodiments, and other advantages and benefits of the present invention will become apparent to those skilled in the art from the following disclosure. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, this embodiment provides a method for detecting a security vulnerability of a Web application, where the method includes:
s100, the fuzz client calls an AFL tool according to a user test instruction and designates a specific URL path of a program to be tested to perform fuzz test, the AFL tool performs parameter mutation on the URL of the program to be tested by using a designated mutator, directional mutation is performed on the URL according to key information of the program to be tested, collected by stain tracking, and used as characteristic values of auxiliary mutation, mutation results are integrated into an http request, and the http request is sent to a fuzz server;
s200, analyzing the obtained http request by the fuzz server, performing security vulnerability detection and coverage analysis on the program to be tested by taking a mutation result obtained by analysis as an input, obtaining a test result by calling a taint tracking module, determining URL (Uniform resource locator) possibly having a security problem and a detected web security vulnerability of the program to be tested, and returning the test result to the fuzz client.
Further, the method also includes:
s300, the fuzz client calls a fuzz verification module to start verification on the web security vulnerability found in the obtained test result, and the false alarm information is removed through verification to obtain a final detection result.
Fig. 2 shows a schematic structural diagram of a detection system for detecting a Web application security vulnerability, which is used for implementing the detection method of the present embodiment, and the overall work flow of the system is as follows:
the first step is as follows: sending a test instruction by an sdk requester;
the second step is that: after a test instruction reaches a webfuzz (product function is short, namely a fuzz tool aiming at a web website) client, a fuzz-manager module calls an af, a specified mutator module is used for fuzz, a mutation result is returned to the fuzz-manager module, a fuzz-manager module integrates a request, and the request is transmitted to the fuzz-proxy module;
the third step: a fuzz-proxy module sends a request to a webFuzz server side;
the fourth step: after the server side obtains the request, the fuzz-java-agent carries out security vulnerability detection, the JQWidagent carries out coverage rate analysis, the request is intercepted by the HTTP-server, the external request is intercepted, and a request return value is processed;
the HTTP-server calls a fuzzy-URL-Collection, stain tracking or problem verification function respectively according to different incoming requests;
the fifth step: after receiving the return value of the server, the web client calls a fuzz-validation-module to validate the found bug.
In particular:
the module calling sequence for realizing url acquisition is as follows:
fuzz-proxy- > (webfuzz server side) fuzz-java-agent- > http-server- > fuzz-url-colletion.
The module calling sequence for realizing the security vulnerability detection is as follows:
fuzzy-manager- > fuzzy-proxy- > fuzzy-java-agent- > Http-server- > taint tracing.
The following describes the specific functions and interactive contents of the modules of the system in detail:
a client:
1.fuzz-manager (fuzz management module)
The module functions as follows: scheduling and managing a fuzz main flow, and recording and interacting a fuzz result:
1.sdk: starting and stopping instructions and the like sent by user operation sdk;
1.Fuzz-proxy: acquiring url information of the to-be-fuzz through a fuzz-proxy module;
2. Aft: designating a specific URL path to start fuzz;
2.afl
the module functions as follows: performing a single url of fuzz (there may be multiple conditions to stop, e.g., no new path)
Interaction:
1.fuzz-manager: returning the fuzz result to the fuzz-manager, and judging whether the fuzz-manager is finished or not;
2.Mutator: appointing a mutator to obtain mutated content;
fuzz-proxy: the mutated content is given to the fuzzy-proxy and is sent to the target program;
mutator (mutation module)
The module functions as follows: carrying out parameter mutation in url, and appointing specific mutation mode, such as adding special symbol, adding character with appointed length, etc., to mutate parameter in url into brand-new content
Interaction: 1. Af: sending the mutated content to afl;
2.Fuzz-proxy: acquiring information of auxiliary variation such as characteristic values and the like obtained by the fuzz-proxy;
fuzzy-validation-module (fuzzy validation module)
The module functions as follows: the module is used for removing false alarm information and carrying out centralized verification
Interaction:
1.sdk: acquiring url of the detected problem and the corresponding problem condition;
2.Fuzz-proxy: sending request verification information to a program to be tested;
fuzz-proxy (fuzz proxy module)
The module functions as follows: the HTTPrest request is sent to the server side, the return value of the server side is analyzed and processed, and the server side returns the specific information such as the url list, the test result, the characteristic value and the like according to different sending requests
Interaction:
1.fuzz-manager: returning to a url list to be tested;
2. Af: returning the test result of the single request;
3 mutator: returning the characteristic value of the url to be measured;
4. Fuzzy-validation-module: returning a request result;
webfuzzy plug-in-HTTP-server: all requests are sent to the target program, intercepted and processed by the module
The server side:
1.fuzz-java-agent
the module functions as follows: scheduling and managing agent main process
Interaction:
1.Sdk: receiving instructions such as start stop and the like sent by sdk;
HTTP-server: monitoring and controlling the use condition of the HTTP-server;
2.HTTP-server
the module functions as follows: intercepting external requests, analyzing functions of webFuzz tool-fuzz-proxy module targets, and processing request return values
Interaction:
1.fuzz-java-agent: receiving scheduling control;
2.Fuzz-URL-Collection: acquiring a url list to be detected;
3. and (3) stain tracking: acquiring security problems, stack information, mutation characteristic values and the like possibly existing in a target program;
3. Fuzzy-URL-Collection (fuzzy URL Collection Module)
The module functions as follows: acquiring url information of a program to be tested in two ways, 1, recording the called url; 2. parsing url in a framework
Interaction:
HTTP-server: returning the acquired url information;
4. stain tracking
The module functions as follows: discovering security issues of a program under test
Interaction:
HTTP-server: returning the problems of stack information of the trigger sink point and the like;
5.JQFAgent
the module functions as follows: obtaining coverage rate information of a program to be tested
Interaction:
HTTP-server: coverage of return requests
Although the invention has been described in detail above with reference to a general description and specific examples, it will be apparent to one skilled in the art that modifications or improvements may be made thereto based on the invention. Accordingly, it is intended that all such modifications and alterations be included within the scope of this invention as defined in the appended claims.

Claims (10)

1.A method for detecting Web application security vulnerabilities is characterized by comprising the following steps:
the fuzz client calls an AFL tool according to a user test instruction and designates a specific URL path of the program to be tested to perform fuzz test, the AFL tool performs parameter mutation on the URL of the program to be tested by using a designated mutation device, wherein the URL is subjected to directional mutation by taking key information of the program to be tested, which is collected according to stain tracking, as a characteristic value of auxiliary mutation, and a mutation result is integrated into an http request and sent to a fuzz server;
the fuzz server analyzes the acquired http request, performs security vulnerability detection and coverage analysis on the program to be tested based on the mutation result obtained by analysis as input, acquires the test result by calling the taint tracking module, determines the URL of the program to be tested which may have security problems and the detected web security vulnerability, and returns the test result to the fuzz client.
2. The method for detecting the Web application security vulnerability according to claim 1, further comprising:
and the fuzz client calls a fuzz verification module to start verification on the web security vulnerability found in the obtained test result, and the final detection result is obtained by removing the false alarm information through verification.
3. The method for detecting the Web application security vulnerability according to claim 1, further comprising:
and the user sends test instructions including starting and stopping instructions to the fuzz client by operating the SDK.
4. The method for detecting the Web application security vulnerability according to claim 1, further comprising:
the fuzz server responds to the request of the fuzz client to acquire a URL list of the program to be tested and returns the URL list to the fuzz client, so that the fuzz client starts to perform the fuzz test on the URL of the program to be tested;
the method for acquiring the url information of the program to be tested comprises the steps of recording the called url and the url in the analysis frame.
5. The method for detecting the Web application security vulnerability according to claim 1, wherein performing directional mutation on the URL according to key information of a program to be detected collected by stain tracking as a feature value of auxiliary mutation specifically comprises:
the fuzz server responds to the request of the fuzz client and returns the key information of the program to be tested, which is collected by the taint tracking module, to the fuzz client as a mutation characteristic value;
and the fuzz client mutates the parameters in the URL according to a preset mutation mode through the appointed mutator according to the acquired mutation characteristic value.
6. The system for detecting the Web application security vulnerability is characterized by comprising a fuzz client and a fuzz server;
the fuzz client comprises a fuzz management module and a fuzz agent module;
the fuzz management module is used for calling an AFL tool according to a user test instruction and appointing a specific URL path of the program to be tested to perform fuzz test, the AFL tool performs parameter mutation on the URL of the program to be tested by using an appointed mutator, and directional mutation is performed on the URL according to key information of the program to be tested, which is collected by stain tracking and used as a characteristic value of auxiliary mutation; the fuzz agent module is used for sending the http request of the fuzz client to the fuzz server and receiving the request feedback result of the fuzz server;
the fuzzy server comprises a request processing module, a taint tracking module and a JQF agent module;
the request processing module is used for acquiring an http request sent by the fuzz client and feeding back a request return result to the fuzz client; the stain tracking module is used for acquiring safety problems, stack information and mutation characteristic values possibly existing in the program to be tested; the JQF agent module is used for acquiring coverage rate information of a program to be tested based on the JQF fuzzy test platform.
7. The system for detecting the Web application security vulnerability according to claim 6, wherein the fuzz client further comprises a fuzz verification module, which is used for starting verification of the Web security vulnerability found in the obtained test results and obtaining a final detection result by removing false alarm information through verification.
8. The system according to claim 6, further comprising an SDK, configured to send a test instruction, including a start instruction and a stop instruction, to the fuzz client by operating the SDK.
9. The system for detecting the Web application security vulnerability of claim 6, wherein the fuzz server further comprises a fuzz URL collection module for obtaining a URL list of a program to be tested; the method for acquiring the url information of the program to be tested comprises the steps of recording the called url and the url in the analysis frame.
10. The system according to claim 6, wherein the mutation unit is configured to mutate the parameters in the URL according to a preset mutation mode according to the obtained mutation characteristic value.
CN202211594869.4A 2022-12-13 2022-12-13 Method and system for detecting security holes of Web application Active CN115879115B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211594869.4A CN115879115B (en) 2022-12-13 2022-12-13 Method and system for detecting security holes of Web application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211594869.4A CN115879115B (en) 2022-12-13 2022-12-13 Method and system for detecting security holes of Web application

Publications (2)

Publication Number Publication Date
CN115879115A true CN115879115A (en) 2023-03-31
CN115879115B CN115879115B (en) 2024-03-29

Family

ID=85767169

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211594869.4A Active CN115879115B (en) 2022-12-13 2022-12-13 Method and system for detecting security holes of Web application

Country Status (1)

Country Link
CN (1) CN115879115B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108255711A (en) * 2017-12-29 2018-07-06 湖南优利泰克自动化系统有限公司 A kind of PLC firmware fuzz testing systems and test method based on stain analysis
CN109308415A (en) * 2018-09-21 2019-02-05 四川大学 One kind is towards binary guiding performance fuzz testing method and system
CN110516448A (en) * 2019-09-02 2019-11-29 杭州安恒信息技术股份有限公司 A kind of grey box testing method, apparatus, equipment and readable storage medium storing program for executing
CN114297079A (en) * 2021-12-30 2022-04-08 北京工业大学 XSS fuzzy test case generation method based on time convolution network
CN114780398A (en) * 2022-04-14 2022-07-22 中国人民解放军战略支援部队信息工程大学 Cisco IOS-XE-oriented Web command injection vulnerability detection method
CN114968750A (en) * 2021-02-23 2022-08-30 腾讯科技(深圳)有限公司 Test case generation method, device, equipment and medium based on artificial intelligence
CN115422543A (en) * 2022-08-19 2022-12-02 复旦大学 Vulnerability detection method based on applet framework

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108255711A (en) * 2017-12-29 2018-07-06 湖南优利泰克自动化系统有限公司 A kind of PLC firmware fuzz testing systems and test method based on stain analysis
CN109308415A (en) * 2018-09-21 2019-02-05 四川大学 One kind is towards binary guiding performance fuzz testing method and system
CN110516448A (en) * 2019-09-02 2019-11-29 杭州安恒信息技术股份有限公司 A kind of grey box testing method, apparatus, equipment and readable storage medium storing program for executing
CN114968750A (en) * 2021-02-23 2022-08-30 腾讯科技(深圳)有限公司 Test case generation method, device, equipment and medium based on artificial intelligence
CN114297079A (en) * 2021-12-30 2022-04-08 北京工业大学 XSS fuzzy test case generation method based on time convolution network
CN114780398A (en) * 2022-04-14 2022-07-22 中国人民解放军战略支援部队信息工程大学 Cisco IOS-XE-oriented Web command injection vulnerability detection method
CN115422543A (en) * 2022-08-19 2022-12-02 复旦大学 Vulnerability detection method based on applet framework

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
戴渭;陆余良;朱凯龙;: "基于动态能量调控的导向式灰盒模糊测试技术", 浙江大学学报(工学版), no. 08, 15 August 2020 (2020-08-15) *
段斌;李兰;赖俊;詹俊;: "基于动态污点分析的工控设备硬件漏洞挖掘方法研究", 信息网络安全, no. 04, 10 April 2019 (2019-04-10) *

Also Published As

Publication number Publication date
CN115879115B (en) 2024-03-29

Similar Documents

Publication Publication Date Title
CN108683562B (en) Anomaly detection positioning method and device, computer equipment and storage medium
US8631124B2 (en) Network analysis system and method utilizing collected metadata
CN106484611B (en) Fuzzy test method and device based on automatic protocol adaptation
US20200117587A1 (en) Log File Analysis
CN107241229B (en) Service monitoring method and device based on interface testing tool
US20150371047A1 (en) Determining coverage of dynamic security scans using runtime and static code analyses
CN111259399B (en) Method and system for dynamically detecting vulnerability attacks for web applications
CN110943984B (en) Asset safety protection method and device
CN111371623B (en) Service performance and safety monitoring method and device, storage medium and electronic equipment
CN114157554A (en) Troubleshooting method and device, storage medium and computer equipment
CN112668010A (en) Method, system and computing device for scanning industrial control system for bugs
CN107168844B (en) Performance monitoring method and device
CN113934621A (en) Fuzzy test method, system, electronic device and medium
US11349730B2 (en) Operation device and operation method
Kim et al. Smart seed selection-based effective black box fuzzing for IIoT protocol
CN109522202B (en) Software testing method and device
CN113965355A (en) SOC-based illegal IP (Internet protocol) provincial network plugging method and device
KR101824924B1 (en) System and method for performance measurements of web site in response to the real time load
CN112765611A (en) Unauthorized vulnerability detection method, device, equipment and storage medium
CN115879115B (en) Method and system for detecting security holes of Web application
CN111752819B (en) Abnormality monitoring method, device, system, equipment and storage medium
JP2017199250A (en) Computer system, analysis method of data, and computer
CN113704763B (en) Pipelined device scanning detection method
CN115550228A (en) Internet of vehicles bus communication network test method and system
CN114428715A (en) Log processing method, device and system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant