CN206820776U - A kind of comprehensive safety monitoring analytical equipment based on network traffics - Google Patents
A kind of comprehensive safety monitoring analytical equipment based on network traffics Download PDFInfo
- Publication number
- CN206820776U CN206820776U CN201720341273.1U CN201720341273U CN206820776U CN 206820776 U CN206820776 U CN 206820776U CN 201720341273 U CN201720341273 U CN 201720341273U CN 206820776 U CN206820776 U CN 206820776U
- Authority
- CN
- China
- Prior art keywords
- analysis
- board
- analytical equipment
- safety monitoring
- comprehensive safety
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000012544 monitoring process Methods 0.000 title claims description 34
- 238000001914 filtration Methods 0.000 claims abstract description 17
- 238000004458 analytical method Methods 0.000 claims description 79
- 238000012098 association analyses Methods 0.000 claims description 11
- 230000004927 fusion Effects 0.000 claims description 10
- 238000001514 detection method Methods 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 7
- 206010000117 Abnormal behaviour Diseases 0.000 claims description 6
- 238000012550 audit Methods 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 6
- JEOQACOXAOEPLX-WCCKRBBISA-N (2s)-2-amino-5-(diaminomethylideneamino)pentanoic acid;1,3-thiazolidine-4-carboxylic acid Chemical compound OC(=O)C1CSCN1.OC(=O)[C@@H](N)CCCN=C(N)N JEOQACOXAOEPLX-WCCKRBBISA-N 0.000 claims description 5
- 238000005206 flow analysis Methods 0.000 claims description 5
- 238000004891 communication Methods 0.000 claims description 3
- 238000007726 management method Methods 0.000 claims description 3
- 235000013399 edible fruits Nutrition 0.000 claims 1
- 238000005516 engineering process Methods 0.000 abstract description 3
- 238000000034 method Methods 0.000 description 7
- 238000003780 insertion Methods 0.000 description 5
- 230000037431 insertion Effects 0.000 description 5
- 241001269238 Data Species 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Abstract
The utility model discloses a kind of comprehensive safety based on network traffics to monitor analytical equipment, the unification of polytype flow is supported to obtain, focus on, redundant filtration and load balancing, and a variety of analytical technology engines are moved forward, it is integrated into platform, so as to reach, function is integrated and the purpose of device miniaturization.
Description
Technical field
Computer network field is the utility model is related to, in particular to a kind of comprehensive safety based on network traffics
Monitor analytical equipment.
Background technology
Currently, the safety monitoring system based on network traffics mainly include intruding detection system, user's behaviors analysis system,
Malicious code detection system, network content security auditing system etc..There are the following problems for these current systems:
(1) function of every kind of equipment is all relatively single, when carrying out comprehensive safety monitoring to network, need to dispose in a network
Plurality of devices and system, great burden is brought to Web access;
(2) collection of a variety of analytical equipments for network traffics, processing procedure are substantially similar, simply analysis means and method
Difference, therefore, a variety of analytical equipments are disposed, the collection and processing procedure for network traffics are to repeat, and easily cause resource
Waste;
(3) comprehensive safety monitoring analysis is completed, it is necessary to a variety of analytical equipments and system are disposed jointly, do not meet function collection
It is weaker in terms of portability and rapid deployment into the requirement changed with device miniaturization;
(4) a variety of analysis result datas are each independent, it is difficult to the fusion of a variety of analyze datas is completed, data sharing is poor,
Association analysis is merged to lack.
Utility model content
To solve the above problems, the utility model is based on ATCA standard architectures, realize a kind of based on the comprehensive of network traffics
Close security auditing equipment.
A kind of comprehensive safety monitoring analytical equipment based on network traffics, including cabinet, converging device, filter, friendship
Changing device and analysis computing device;Wherein, converging device, filter, switch, the analysis back of the body of the computing device by cabinet
Plate interconnects;
The analysis computing device calculates board by the analysis of analysis software for calculation by least one burning and formed;
The converging device includes interface subcard and input card;Interface subcard is arranged on input card;Interface subcard
As the input interface of disparate networks link, data on flows bag is identified according to the data stream list of self maintained, and will received
Network link data is converted into ethernet traffic data, is then issued to input card;
The input card is according to the traffic filtering forwarding strategy that filter is sent to the data that are received from interface subcard
Bag is transmitted to exchange board or makees discard processing;
The filter reads the packet for exchanging board by the backboard, identifies the application protocol of flow, goes forward side by side
Row parsing, obtained analysis result are supplied to user by exchanging the configuration interface of board, for formulating traffic filtering forwarding plan
Slightly, user has formulated traffic filtering forwarding strategy and the strategy has been configured in filter;
The switch receives the data on flows that converging device is sent, defeated by power board backplane interface or front panel
Outgoing interface, the analysis according to corresponding to forwarding the traffic to the traffic filtering forwarding strategy that filter is sent are calculated in board, by
This carries out specific flow analysis to data.
Further, the switch provides configuration interface, realize to the local of comprehensive safety monitoring analytical equipment or
Novel maintenance management.
Further, the cabinet also includes power supply, board slot, communication system and heat abstractor.
Preferably, the cabinet uses ATCA standard implementations.
Preferably, each comprehensive safety monitoring analytical equipment sets multiple converging devices according to demand.
Preferably, the interface subcard supports standard modular interface, support ATM155M, ATM622M, POS155M,
POS622M, POS2.5G, POS10G, POS40G, 10GE, 1GE interface type.
Preferably, the analysis, which calculates board, includes intrusion detection module, abnormal behaviour analysis module, Network Content Audit
Module, malicious code trapping module or one kind, two kinds, three kinds, four kinds or five kinds of modules in fusion association analysis module.
Preferably, the analysis of analysis computing device, which calculates board, includes merging association analysis module for obtaining other points
Analysis calculates the analysis result of board, and when suspicious IP occurs in the analysis result prompting that one of analysis calculates board, fusion is closed
Joining analysis module calls other analyses to calculate the board analysis result related to the suspicious IP, and carries out Macro or mass analysis, and judgement is
No is security incident.
A kind of cascade system of comprehensive safety monitoring analytical equipment, including multiple comprehensive safeties monitoring analytical equipment, are used
The form of multilayer cascade, i.e.,:Comprehensive safety monitoring analytical equipment is divided at least two-stage, and a comprehensive peace is comprised at least in every one-level
Full monitoring analytical equipment, wherein, the output interface and the converging device of upper level comprehensive safety monitoring analytical equipment of switch
Input interface be connected.
The utility model has the advantages that:
The utility model provides the flow comprehensive safety analysis platform of a dynamic scalable, supports polytype flow
Unification obtain, focus on, redundant filtration and load balancing, and a variety of analytical technology engines are moved forward, are integrated into platform,
So as to reach, function is integrated and the purpose of device miniaturization.
Brief description of the drawings
Fig. 1 shows the schematic diagram of the comprehensive safety monitoring analytical equipment described in the utility model based on network traffics.
Fig. 2 shows the logical relation of each part of the utility model.
Fig. 3 shows the annexation during more equipment cascadings.
Fig. 4 show analysis computing device structure and with switch annexation figure.
Embodiment
With reference to the accompanying drawings and examples, the utility model is described in detail.
It is of the present utility model it is a kind of based on network traffics comprehensive safety monitoring analytical equipment, as shown in figure 1, by cabinet,
Converging device, filter, switch and analysis computing device composition.Wherein cabinet is converging device, filter, exchange
Device, analysis computing device provide the basic necessary condition for interconnecting and cooperating;Converging device is the input of equipment
End, it is mainly used in gathering the network traffics of various Linktypes;Filter is used to identify network application agreement, and configures accordingly
Filtering and load balancing rule;Switch realizes data fusion, exchange forwarding between other devices;Computing device is analyzed according to use
Family needs to be integrated with different flow analysis functions.Logical relation is as shown in Figure 2 between said apparatus.
Wherein, converging device, filter, switch, analysis computing device are interconnected by case back plate.
The cabinet, mainly including power supply, board slot, backboard, communication system and heat abstractor.It is real using ATCA standards
It is existing, it is the tie that various boards are connected and cooperated.Cabinet is divided into convergence-level, filter layer, switching layer and analysis computation layer
Four regions, convergence-level slot insertion converging device, filter layer slot insertion filtering board, the insertion of switching layer slot exchange dress
Put, analysis computation layer slot insertion analysis computing device.The device in each region is connected by case back plate.Wherein convergence-level and point
Analysis computation layer is essential region, and the device quantity of other regions and all areas is by user according to network node flow monitoring
Demand and determine.All kinds of boards support hot plug and automatically configured to come into force in equipment, are easy to dispose and safeguard.The convergence dress
Put, including interface subcard and input card.Multiple interfaces subcard is provided with input card, interface subcard provides current main-stream
The input interface of disparate networks link, the link of different type, different rates is uniformly accessed into equipment, carried out at concentration
Reason, converts thereof into ethernet traffic data output, to switch, so as to realize high-speed backbone network multiclass link data
It is unified to obtain convergence and protocol conversion output.
Wherein input card is based on ATCA standard implementations, for carrying multiple interfaces subcard, realizes a variety of link flows
Processing and forwarding, each input card at most 4 interface subcards of carrying.Single input card is maximum to support 80G traffic aggregations.One
Multiple converging devices can be according to demand set in platform equipment, could support up 4 pieces of converging devices.
Interface subcard is used to gather different link flow data, and interface subcard can select according to flow rate and discharge pattern
Different subcard types.Interface subcard support standard modular interface, support ATM155M, ATM622M, POS155M, POS622M,
POS2.5G, POS10G, POS40G, 10GE, 1GE interface type.
Interface subcard identifies data on flows bag according to the data stream list of maintenance, and is changed, then issues input card;It is defeated
Enter the traffic filtering forwarding strategy that board is sent according to filter to forward the packet of reception or discard processing.
Filter is filtering board.Filter reads the data packet for exchanging board, identification by backplane interface
The application protocol of flow, and parsed, obtained analysis result is supplied to user by exchanging the configuration interface of board, is used for
Traffic filtering forwarding strategy is formulated, and the strategy is configured in filter;Filter identifies the current main net of more than 400 kinds
Network flow protocol.By filtering board, the utility model realizes the load balancing of application layer.
Switch is exchange board.The multilink data on flows that converging device is sent is received in power board clamping, passes through exchange
Backboard plate interface or front panel output interface, analysis is forwarded the traffic to according to traffic filtering forwarding strategy and calculates board, and
Realize the exchange fusion between polylith input card data.Exchange board and configuration interface (serial ports or network interface) is provided, realize to equipment
Local or Remote operation management;Wherein, all kinds of board Linktypes of converging device, link rate, link verification side can be set
Formula.The load balancing of switching layer output flow, packet is averagely forwarded to by the Hash calculation to data traffic different
Output port, it is main in Hash calculation to consider source IP address and purpose IP address factor, it is ensured that by same session data bag
It is output to identical output interface.When certain output port failure, power board automatic identification and can bear output flow automatically
It is downloaded to other several interfaces.The output weight of configuration output interface is supported, different flow export ratio is distributed for each output interface.
Exchange board and realize flow copy function, while flow is transmitted into output interface, copy to other output interfaces.
Board front panel output interface is exchanged to be used to realize the cascade of equipment multilayer and calculate the function and property of analytical equipment
Can extension.As shown in Figure 3.Multiple comprehensive safety monitoring analytical equipments use the form of multilayer cascade, comprehensive safety monitoring analysis
Equipment is divided at least two-stage, and comprising at least a comprehensive safety in every one-level monitors analytical equipment, wherein, the output of switch
Interface is connected with the input interface of the converging device of upper level comprehensive safety monitoring analytical equipment.Directly it can be connected by netting twine,
Also can be connected by light pricker substitute mode.Data are unidirectional transmission upwards.
Analysis cluster is calculated to be used to extend flow analysis ability, including in performance and functionally, so as to realize equipment
Distributed deployment and centralized and unified analysis.
Further, analyze computing device and calculate board for analysis.Analysis calculates the board analysis software for calculation that has been burning
The general board of system, so as to complete specific flow analysis function, and export analyze data.User can be according to own analysis need
Ask, select different analysis plates card insertions to enter in device board neck.The utility model provides intrusion detection module, abnormal behaviour point
Analyse module, Network Content Audit module, malicious code trapping module, the alanysis software systems of fusion association analysis module five.According to
Required according to analytical performance, five alanysis software systems, which can be combined, is positioned over same analysis calculating board, can also be individually placed at one
Individual analysis calculates board, can also be positioned over server composition analysis computing cluster.
When the data traffic of processing is larger, analyzing can set multiple identical computing board cards to carry out simultaneously in computing module
Row computing, therefore, when switch calculates to analysis sends packet, often send once, analysis computing module needs to consider
The problem of data flow equilibrium assignment, the method that the utility model uses for:The packet sent for switch, extract data
The source IP of bag and purpose IP, and Hash calculation is carried out to it:HASH (source IP, purpose IP), obtained binary result reconvert
For decimal result;The decimal result is taken the remainder to the calculating board quantity n included in computation analysis module, and according to
The value of the remainder carries out assignment of traffic:When remainder is 0, data flow is distributed into No. 1 calculating board, will when remainder is 1
Data flow distributes to No. 2 calculating board, and the rest may be inferred, and data stream is distributed according to the rule.
The analysis computing architecture is as shown in Figure 4:
Further, the intrusion detection module completes the network security threats in single packet with attack signature
Alarm.Packet mainly is parsed by splitting, and the method compared with intrusion feature database is realized.Intrusion detection module is by computing board
Card realizes function, and user calculates the quantity of board according to the demand to performance, selection, and inserts in device board neck.
The abnormal behaviour analysis module is completed to show the net of attack signature in network traffics in certain time window
The alarm of network security threat.Mainly by counting, calculating security threat index, and the method reality compared with abnormal behavior storehouse
It is existing.Abnormal behaviour analysis module realizes function by calculating board, and user calculates the number of board according to the demand to performance, selection
Amount, and insert in device board neck.
The Network Content Audit module is completed to carry out security audit and to disobeying to the Web content transmitted in network traffics
Rule information alarmed, mainly by reduce network application agreement, and then extract text message, compared again with violation information storehouse
To method realize.Network Content Audit module realizes function by calculating board, and user calculates according to the demand to performance, selection
The quantity of board, and insert in device board neck.
The program code that the malicious code trapping module is completed to transmit in network traffics carries out safety analysis function.Mainly
By reducing network application agreement, the program code that extraction is transmitted and being thrown to integrated virtual execution environment monitoring programme generation
Code malicious act, and then the step such as security threat of discriminating program code is realized.Malicious code trapping module is by calculating board
Function is realized, user calculates the quantity of board according to the demand to performance, selection, and inserts in device board neck.
The fusion association analysis module completes analyzing again and convergence analysis function for above-mentioned module analysis result data.It is main
By calling above-mentioned module, the different aspect of same security threat is analyzed by user collaborative.Association analysis module is merged by counting
Calculate board and realize function, user calculates the quantity of board according to the demand to performance, selection, and inserts in device board neck.Melt
The analysis result that association analysis module obtains other analysis modules is closed, when the analysis result of one of analysis module is prompted to occur
During suspicious IP, fusion association analysis module calls other analysis modules analysis result related to the suspicious IP, collect point
Analysis, and security incident is determine whether by the rule in correlation rule storehouse.
In summary, preferred embodiment of the present utility model is these are only, is not intended to limit of the present utility model
Protection domain.All any modification, equivalent substitution and improvements within the spirit and principles of the utility model, made etc., all should be wrapped
It is contained within the scope of protection of the utility model.
Claims (9)
1. a kind of comprehensive safety monitoring analytical equipment based on network traffics, it is characterised in that including cabinet, converging device, mistake
Filter device, switch and analysis computing device;Wherein, converging device, filter, switch, analysis computing device lead to
Cross the backboard interconnection of cabinet;
The analysis computing device calculates board by the analysis of analysis software for calculation by least one burning and formed;
The converging device includes interface subcard and input card;Interface subcard is arranged on input card;Interface subcard conduct
The input interface of disparate networks link, data on flows bag, and the network that will be received are identified according to the data stream list of self maintained
Link data is converted into ethernet traffic data, is then issued to input card;
The input card turns according to the traffic filtering forwarding strategy that filter is sent to the packet received from interface subcard
Issue exchange board or make discard processing;
The filter reads the packet for exchanging board by the backboard, identifies the application protocol of flow, and solved
Analysis, obtained analysis result is supplied to user by exchanging the configuration interface of board, for formulating traffic filtering forwarding strategy, uses
Traffic filtering forwarding strategy is formulated and the strategy has been configured in filter in family;
The switch receives the data on flows that converging device is sent, and is connect by power board backplane interface or front panel output
Mouthful, the analysis according to corresponding to forwarding the traffic to the traffic filtering forwarding strategy that filter is sent is calculated in board, thus right
Data carry out specific flow analysis.
2. a kind of comprehensive safety monitoring analytical equipment based on network traffics as claimed in claim 1, it is characterised in that described
Switch provides configuration interface, realizes the Local or Remote operation management to comprehensive safety monitoring analytical equipment.
3. a kind of comprehensive safety monitoring analytical equipment based on network traffics as claimed in claim 1, it is characterised in that described
Cabinet also includes power supply, board slot, communication system and heat abstractor.
4. a kind of comprehensive safety monitoring analytical equipment based on network traffics as claimed in claim 1, it is characterised in that described
Cabinet uses ATCA standard implementations.
5. a kind of comprehensive safety monitoring analytical equipment based on network traffics as claimed in claim 1, it is characterised in that each
Comprehensive safety monitoring analytical equipment sets multiple converging devices according to demand.
6. a kind of comprehensive safety monitoring analytical equipment based on network traffics as claimed in claim 1, it is characterised in that described
Interface subcard support standard modular interface, support ATM155M, ATM622M, POS155M, POS622M, POS2.5G, POS10G,
POS40G, 10GE, 1GE interface type.
7. a kind of comprehensive safety monitoring analytical equipment based on network traffics as claimed in claim 1, it is characterised in that described
Analysis, which calculates board, includes intrusion detection module, abnormal behaviour analysis module, Network Content Audit module, malicious code capture mould
Block or one kind, two kinds, three kinds, four kinds or five kinds of modules in fusion association analysis module.
A kind of 8. comprehensive safety monitoring analytical equipment based on network traffics as claimed in claim 1, it is characterised in that analysis
The analysis of computing device, which calculates board, to be included merging the analysis knots that association analysis module calculates board for obtaining other analyses
Fruit, when suspicious IP occurs in the analysis result prompting that one of analysis calculates board, fusion association analysis module is called other
Analysis calculates the board analysis result related to the suspicious IP, and carries out Macro or mass analysis, determines whether security incident.
9. the cascade system of any one of comprehensive safety monitoring analytical equipment in a kind of 1-8 based on claim, it is special
Sign is, including multiple comprehensive safeties monitoring analytical equipment, the form cascaded using multilayer, i.e.,:Comprehensive safety monitoring analysis is set
Back-up is at least two-stage, per one-level in comprise at least a comprehensive safety and monitor analytical equipment, wherein, the output of switch connects
Mouth is connected with the input interface of the converging device of upper level comprehensive safety monitoring analytical equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720341273.1U CN206820776U (en) | 2017-04-01 | 2017-04-01 | A kind of comprehensive safety monitoring analytical equipment based on network traffics |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720341273.1U CN206820776U (en) | 2017-04-01 | 2017-04-01 | A kind of comprehensive safety monitoring analytical equipment based on network traffics |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206820776U true CN206820776U (en) | 2017-12-29 |
Family
ID=60753061
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201720341273.1U Expired - Fee Related CN206820776U (en) | 2017-04-01 | 2017-04-01 | A kind of comprehensive safety monitoring analytical equipment based on network traffics |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206820776U (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107688743A (en) * | 2017-08-14 | 2018-02-13 | 北京奇虎科技有限公司 | The determination method and system of a kind of rogue program |
CN111082861A (en) * | 2019-12-02 | 2020-04-28 | 广东省电信规划设计院有限公司 | Millimeter wave communication test system |
CN112702278A (en) * | 2020-12-30 | 2021-04-23 | 恒安嘉新(北京)科技股份公司 | Load balancing method, convergence diverter and storage medium |
-
2017
- 2017-04-01 CN CN201720341273.1U patent/CN206820776U/en not_active Expired - Fee Related
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107688743A (en) * | 2017-08-14 | 2018-02-13 | 北京奇虎科技有限公司 | The determination method and system of a kind of rogue program |
CN107688743B (en) * | 2017-08-14 | 2021-01-29 | 北京奇虎科技有限公司 | Malicious program detection and analysis method and system |
CN111082861A (en) * | 2019-12-02 | 2020-04-28 | 广东省电信规划设计院有限公司 | Millimeter wave communication test system |
CN112702278A (en) * | 2020-12-30 | 2021-04-23 | 恒安嘉新(北京)科技股份公司 | Load balancing method, convergence diverter and storage medium |
CN112702278B (en) * | 2020-12-30 | 2022-08-12 | 恒安嘉新(北京)科技股份公司 | Load balancing method, convergence diverter and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104506507B (en) | A kind of sweet net safety protective system and method for SDN | |
CN106375384B (en) | The management system and control method of image network flow in a kind of virtual network environment | |
US7773529B2 (en) | Director device and methods thereof | |
CN206820776U (en) | A kind of comprehensive safety monitoring analytical equipment based on network traffics | |
CN110224990A (en) | A kind of intruding detection system based on software definition security architecture | |
CN101197715B (en) | Method for centrally capturing mobile data service condition | |
CN103684922B (en) | Outlet information privacy checking detection platform system based on SDN (self-defending network) and detection method | |
CN102801738B (en) | Distributed DoS (Denial of Service) detection method and system on basis of summary matrices | |
CN107645542A (en) | A kind of data acquisition device applied to cloud auditing system | |
CN104168144A (en) | Method for auditing SDN | |
CN109558366A (en) | A kind of firewall based on multiple processor structure | |
CN106161395A (en) | A kind of prevent the method for Brute Force, Apparatus and system | |
CN106254338B (en) | Message detecting method and device | |
CN106972985A (en) | Accelerate the method and DPI equipment of the processing of DPI device datas and forwarding | |
CN102510524A (en) | Control system for broadcasting network | |
CN101483649A (en) | Network safe content processing card based on FPGA | |
CN107645472A (en) | A kind of virtual machine traffic detecting system based on OpenFlow | |
CN107689958A (en) | A kind of network audit subsystem applied to cloud auditing system | |
CN106411863A (en) | Virtualization platform for processing network traffic of virtual switches in real time | |
CN111191247A (en) | Database security audit system | |
CN103701824A (en) | Security isolation management and control system | |
CN103346905B (en) | A kind of method and system of signalling analysis | |
CN109286594A (en) | The processing method and processing device of address analysis protocol message | |
CN102215125B (en) | Network service control system | |
CN106878340A (en) | A kind of comprehensive safety monitoring analysis system based on network traffics |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20171229 |