Nothing Special   »   [go: up one dir, main page]

CN103618737A - VNC console optimization scheme of virtual machines in cloud computing environment - Google Patents

VNC console optimization scheme of virtual machines in cloud computing environment Download PDF

Info

Publication number
CN103618737A
CN103618737A CN201310661368.8A CN201310661368A CN103618737A CN 103618737 A CN103618737 A CN 103618737A CN 201310661368 A CN201310661368 A CN 201310661368A CN 103618737 A CN103618737 A CN 103618737A
Authority
CN
China
Prior art keywords
vnc
virtual machine
control desk
cloud computing
desktop
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310661368.8A
Other languages
Chinese (zh)
Inventor
吕广杰
郭锋
刘正伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Electronic Information Industry Co Ltd
Original Assignee
Inspur Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Electronic Information Industry Co Ltd filed Critical Inspur Electronic Information Industry Co Ltd
Priority to CN201310661368.8A priority Critical patent/CN103618737A/en
Publication of CN103618737A publication Critical patent/CN103618737A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a VNC console optimization scheme of virtual machines in a cloud computing environment. VNC console proxy and an SSH encryption tunnel are established, encryption, forwarding and shunting are carried out on VNC data packets, a virtual machine console is used in a multi-network environment, double-mouse phenomena are eliminated by writing an Applet program, the function of virtual machine console monitoring is added, wide-to-height proportions of desktops of the virtual machines are zoomed by means of a graphic algorithm, the desktops of the multiple virtual machines are monitored in the same view, and a administer of a cloud data center is helped to monitor use situations of the virtual machines. Existing VNC source codes are optimized and can be well applied to the cloud computing environment, the console optimization scheme is suitable for the multi-network environment, VNC safety is improved, using characteristics of the VNC console desktops are further optimized, and the function for monitoring the desktops of the virtual machines is enriched.

Description

Virtual machine VNC control desk prioritization scheme under a kind of cloud computing environment
Technical field
The present invention relates to cloud data-center applications system field, be specifically related to the virtual machine VNC control desk prioritization scheme of a kind of across a network, low bandwidth, high security.
Technical background
Development along with Information technology, cloud computing progressively becomes the Hot spots for development of industry, and the cloud computing service platform of domestic and international all big enterprises also starts to put into one after another a plurality of fields such as science, education, culture, health, government, high-performance calculation, ecommerce, Internet of Things to be used.
Virtual machine under cloud computing environment in server, cannot directly connect desktop with display, mostly uses VNC to carry out long-range connection.VNC(Virtual Network Computing), for a kind of screen-picture of the RFB of use agreement is shared and remote operation software.VNC software is connected with the specific VNC port of server by network, transmits keyboard and the action of mouse and real-time screen-picture.
On the one hand, VNC non-security agreement, just can accept external connection although VNC servo programe need arrange password, and the password transmission between VNC client and VNC servo programe is through encryption, but still can be intercepted easily and the search method that uses force cracks.On the other hand, in view of the complexity of cloud data center network deployed environment and the fail safe of supervising the network, most of cloud keepers carry out physical isolation by managerial grid server and service network.
In order to be applicable to multi-network environment, improve the fail safe of VNC, further optimize the operating characteristic of VNC control desk desktop, enrich virtual machine Desktop Monitoring function, this programme is optimized existing VNC Open Source Code, and it is applied under cloud computing environment better.
Summary of the invention
The technical problem to be solved in the present invention is: the present invention is directed to the drawbacks such as VNC open source software poor stability, strong, the two mouse problem of mesh dependence be serious, propose a kind ofly by utilizing the technological means such as VNC control desk agency, SSH tunnel, data ciphering and deciphering, be applicable to the VNC control desk prioritization scheme under cloud computing environment.
Traditional VNC program of increasing income, by direct connection server VNC port, obtains virtual machine desktop, has following shortcoming:
1) cannot pass through multi-network environment;
2) cannot realize VNC data distribution, cause network bandwidth occupancy very large;
3) for virtual bottoms such as VMware, Xen, there are two mouse phenomenons in various degree to occur, cannot accomplish the basic elimination of two mouses.
The technical solution adopted in the present invention is:
A virtual machine VNC control desk prioritization scheme under cloud computing environment, comprising: VNC control desk agency, and SSH tunnel is encrypted, and eliminates two mouses, virtual machine Desktop Monitoring, wherein,
VNC control desk agency, is the realization basis of this programme, disposes the middle-agent who is responsible for virtual machine VNC control desk package forward specially, connects service network and data network, realizes control desk data retransmission and shunting under many nets environment;
SSH tunnel is encrypted, it is the data security protecting measure of this programme, by setting up safe SSH tunnel encrypting user name password, protection virtual machine VNC data, background server are not subject to illegal connection, reduce the risk that virtual machine VNC control desk data are illegally accessed, many nets environment is connected, and the VNC reaching under many networks is interconnected;
Note: Secure Shell(is abbreviated as SSH, containment agreement), be a security protocol being created on application layer and transport layer basis, be the Shell(shell on computer) safe transmission and environment for use be provided;
Two mouses are eliminated, and are the optimization of this programme to the VNC client of increasing income, and by writing Applet program, eliminate two mouse phenomenons, improve the ease for use of virtual machine desktop;
Virtual machine Desktop Monitoring, utilizes graphics algorithm, by VNC desktop transverse and longitudinal convergent-divergent, in the unified management of monitoring view.In same view, monitor the desktop of many virtual machines simultaneously, help cloud data center administrator supervision user's virtual machine service condition.
Described VNC control desk agency, one end connection management net, one end connects service network.(note: managerial grid is the network environment at machine room server place, service network is the network environment at virtual machine tenant place, service network and managerial grid can be according to customer demands, select intercommunication or two kinds of modes of physical isolation) on the one hand, control desk agency is solely responsible for VNC data packet flow and forwards, and alleviates taking of the network bandwidth; On the other hand, by data retransmission, realize the support to single net, many nets environment.
Described encryption concrete steps in SSH tunnel are as follows:
1) select cryptographic algorithm.The higher cryptographic algorithm of fail safe of industry main flow comprises DES, AES, RSA, MD5 etc. at present.As the encrypting and decrypting schematic flow sheet of Fig. 2, Fig. 3, this programme is selected aes algorithm.
2) set up and encrypt SSH tunnel.SSH(Secure Shell, Secure Shell) object is to be encrypted by the network remote visit data between main frame, realizes the protection to communication.It is by providing the functions such as better authentication instrument and Secure Copy (SCP), Secure File Transfer Protocol (SFTP), X session forwarding and port repeat to carry out refined net exchange, thereby increases the fail safe of other non-security agreements.For preventing that the stolen hacker of causing of user name password in SSH tunnel from utilizing this tunnel as SSH springboard, be connected to managerial grid server, the user name of SSH is used different secret key encryptions from password.
3) for the fail safe of the network server of strengthening management, open the fire compartment wall of server, only open indivedual secure ports (as 443,8080, VNC port etc.) externally provide service.
Described pair of mouse elimination concrete steps are as follows:
1) write VNC client, choice for use Java Applet writes VNC client, has higher platform compatible, and direct loading needn't be installed, and can support the browser of all installation JRE;
2) shield local mouse, by being positioned at the local mouse shielding on Applet window top, only show the mouse in VME operating system, therefore, in the window ranges of Applet, the phenomenon of two mouses is eliminated.
Described virtual machine Desktop Monitoring concrete steps are as follows:
1), according to VNC agreement, virtual machine desktop is arranged to length and width scaling adjustable.The picture of virtual machine is presented in monitoring view according to fixing length and width;
2) VNC is configured to read-only control mode, only shows desktop, do not transmit the control flow of keyboard, mouse, to reduce the taking the network bandwidth of VNC;
3) parameter such as coded system (Raw, RRE, CoRRE, Hextile, Zlib, Tight, ZRLE), hierarchy compression, picture quality of control desk image, compressed virtual machine desktop picture are set voluntarily by user.For the user of heterogeneous networks bandwidth environment, provide optimal graphics display parameters.
Beneficial effect of the present invention is:
This programme is optimized existing VNC Open Source Code, and it is applied under cloud computing environment better, is applicable to multi-network environment, improves the fail safe of VNC, further optimizes the operating characteristic of VNC control desk desktop, enriches virtual machine Desktop Monitoring function.
Accompanying drawing explanation
Fig. 1 is the topological diagram of realizing of this scheme;
Fig. 2 is the encryption flow schematic diagram of aes algorithm;
Fig. 3 is the deciphering schematic flow sheet of aes algorithm.
Embodiment
With reference to the accompanying drawings, by embodiment, the present invention is further described:
The solution of the present invention mainly comprises: VNC control desk agency, and SSH tunnel is encrypted, and two mouses are eliminated, virtual desktop monitoring.
Wherein, VNC control desk agency is the realization basis of this programme.So-called VNC control desk is acted on behalf of, and is responsible for the middle-agent of virtual machine VNC control desk package forward specially.As Fig. 1, this acts on behalf of one end connection management net, and one end connects service network and (notes: managerial grid is the network environment at machine room server place, and service network is the network environment at virtual machine tenant place, service network and managerial grid can, according to customer demand, be selected intercommunication or two kinds of modes of physical isolation).
Such design, on the one hand, control desk agency is solely responsible for VNC data packet flow and forwards, and alleviates taking of the network bandwidth; On the other hand, by data retransmission, realize the support to single net, many nets environment.
It is the data security protecting measure of this programme that SSH tunnel is encrypted.By setting up safe SSH tunnel encrypting user name password, protection virtual machine VNC data, background server are not subject to illegal connection.Concrete steps are as follows:
1) select cryptographic algorithm.The higher cryptographic algorithm of fail safe of industry main flow comprises DES, AES, RSA, MD5 etc. at present.Encrypting and decrypting schematic flow sheet as shown in Figure 2 and Figure 3, this programme is selected aes algorithm.
2) set up and encrypt SSH tunnel.SSH(Secure Shell, Secure Shell) object is to be encrypted by the network remote visit data between main frame, realizes the protection to communication.It is by providing the functions such as better authentication instrument and Secure Copy (SCP), Secure File Transfer Protocol (SFTP), X session forwarding and port repeat to carry out refined net exchange, thereby increases the fail safe of other non-security agreements.For preventing that the stolen hacker of causing of user name password in SSH tunnel from utilizing this tunnel as SSH springboard, be connected to managerial grid server, the user name of SSH is used different secret key encryptions from password.
3) for the fail safe of the network server of strengthening management, open the fire compartment wall of server, only open indivedual secure ports (as 443,8080, VNC port etc.) externally provide service.
It is the optimization that this programme carries out the VNC client of increasing income that two mouses are eliminated, and concrete steps are as follows:
1) write VNC client.Choice for use Java Applet writes VNC client, has higher platform compatible, and direct loading needn't be installed, and can support the browser of all installation JRE.
2) shield local mouse.By being positioned at the local mouse shielding on Applet window top, only show the mouse in VME operating system, therefore, in the window ranges of Applet, the phenomenon of two mouses is eliminated.
Virtual machine Desktop Monitoring, concrete steps are as follows:
1) according to VNC agreement, virtual machine desktop is arranged to length and width scaling adjustable, the picture of virtual machine is presented in monitoring view according to fixing length and width;
2) VNC is configured to read-only control mode, only shows desktop, do not transmit the control flow of keyboard, mouse, to reduce the taking the network bandwidth of VNC;
3) parameter such as coded system (Raw, RRE, CoRRE, Hextile, Zlib, Tight, ZRLE), hierarchy compression, picture quality of control desk image, compressed virtual machine desktop picture are set voluntarily by user.For the user of heterogeneous networks bandwidth environment, provide optimal graphics display parameters.

Claims (5)

1. the virtual machine VNC control desk prioritization scheme under cloud computing environment, is characterized in that, comprising: VNC control desk agency, and SSH tunnel is encrypted, and eliminates two mouses, virtual machine Desktop Monitoring, wherein,
VNC control desk agency, is the realization basis of this programme, disposes the middle-agent who is responsible for virtual machine VNC control desk package forward specially, connects service network and data network, realizes control desk data retransmission and shunting under many nets environment;
SSH tunnel is encrypted, it is the data security protecting measure of this programme, by setting up safe SSH tunnel encrypting user name password, protection virtual machine VNC data, background server are not subject to illegal connection, reduce the risk that virtual machine VNC control desk data are illegally accessed, many nets environment is connected, and the VNC reaching under many networks is interconnected;
Two mouses are eliminated, and are the optimization of this programme to the VNC client of increasing income, and by writing Applet program, eliminate two mouse phenomenons, improve the ease for use of virtual machine desktop;
Virtual machine Desktop Monitoring, utilizes graphics algorithm, by VNC desktop transverse and longitudinal convergent-divergent, and in the unified management of monitoring view,
In same view, monitor the desktop of many virtual machines simultaneously, help cloud data center administrator supervision user's virtual machine service condition.
2. the virtual machine VNC control desk prioritization scheme under a kind of cloud computing environment according to claim 1, it is characterized in that: described VNC control desk agency, one end connection management net, one end connects service network, on the one hand, control desk agency is solely responsible for VNC data packet flow and forwards, and alleviates taking of the network bandwidth; On the other hand, by data retransmission, realize the support to single net, many nets environment.
3. the virtual machine VNC control desk prioritization scheme under a kind of cloud computing environment according to claim 1 and 2, is characterized in that, encryption concrete steps in described SSH tunnel are as follows:
1) select cryptographic algorithm;
2) set up to encrypt SSH tunnel, the user name password that prevents SSH tunnel is stolen and cause hacker to utilize this tunnel as SSH springboard, is connected to managerial grid server, and the user name of SSH is used different secret key encryptions from password;
3) for the fail safe of the network server of strengthening management, open the fire compartment wall of server, only open indivedual secure ports externally provide service.
4. the virtual machine VNC control desk prioritization scheme under a kind of cloud computing environment according to claim 3, is characterized in that, described pair of mouse elimination concrete steps are as follows:
1) write VNC client, choice for use Java Applet writes VNC client, has higher platform compatible, and direct loading needn't be installed, and can support the browser of all installation JRE;
2) shield local mouse, by being positioned at the local mouse shielding on Applet window top, only show the mouse in VME operating system.
5. the virtual machine VNC control desk prioritization scheme under a kind of cloud computing environment according to claim 4, is characterized in that, described virtual machine Desktop Monitoring concrete steps are as follows:
1), according to VNC agreement, virtual machine desktop is arranged to length and width scaling adjustable;
2) VNC is configured to read-only control mode, only shows desktop, do not transmit the control flow of keyboard, mouse, to reduce the taking the network bandwidth of VNC;
3) coded system, hierarchy compression, the picture quality parameter of control desk image are set voluntarily by user, compressed virtual machine desktop picture, for the user of heterogeneous networks bandwidth environment, provides optimal graphics display parameters.
CN201310661368.8A 2013-12-10 2013-12-10 VNC console optimization scheme of virtual machines in cloud computing environment Pending CN103618737A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310661368.8A CN103618737A (en) 2013-12-10 2013-12-10 VNC console optimization scheme of virtual machines in cloud computing environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310661368.8A CN103618737A (en) 2013-12-10 2013-12-10 VNC console optimization scheme of virtual machines in cloud computing environment

Publications (1)

Publication Number Publication Date
CN103618737A true CN103618737A (en) 2014-03-05

Family

ID=50169441

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310661368.8A Pending CN103618737A (en) 2013-12-10 2013-12-10 VNC console optimization scheme of virtual machines in cloud computing environment

Country Status (1)

Country Link
CN (1) CN103618737A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015180293A1 (en) * 2014-05-28 2015-12-03 中兴通讯股份有限公司 Cloud desktop monitoring method and apparatus
CN107124459A (en) * 2017-04-28 2017-09-01 南京大学 It is controllable in sequence of threads evaluation and test middleware based on cloud platform
CN107391350A (en) * 2017-07-28 2017-11-24 郑州云海信息技术有限公司 A kind of display methods for monitoring view, apparatus and system
CN107634892A (en) * 2017-09-08 2018-01-26 郑州云海信息技术有限公司 A kind of Xenserver realizes the method and device of console based on novnc
CN107959701A (en) * 2016-10-17 2018-04-24 中兴通讯股份有限公司 Data sharing method, cloud terminal, cloud desktop virtual machine and pass-through proxy server
CN108243157A (en) * 2016-12-26 2018-07-03 华为技术服务有限公司 The method for implanting and device of sensitive information in virtual machine
CN110995705A (en) * 2019-12-03 2020-04-10 广州西麦科技股份有限公司 Method for remotely and safely accessing virtual machine
CN112416522A (en) * 2020-11-24 2021-02-26 北京华胜天成科技股份有限公司 Virtual machine control method and device
CN113472878A (en) * 2021-06-29 2021-10-01 烽火通信科技股份有限公司 Method and device for realizing file dragging transmission in VNC by using browser plug-in
WO2023241351A1 (en) * 2022-06-14 2023-12-21 中兴通讯股份有限公司 Virtual machine monitoring method and apparatus, and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050273849A1 (en) * 2004-03-11 2005-12-08 Aep Networks Network access using secure tunnel
CN102307153A (en) * 2011-10-14 2012-01-04 王宁 Virtual desktop transmission device and method
US20120023570A1 (en) * 2010-07-23 2012-01-26 Anchorfree, Inc. Web vpn
CN102523207A (en) * 2011-12-06 2012-06-27 北京航空航天大学 VNC (Virtual Network Computer)-based remote resource access method and proxy device
CN102571773A (en) * 2011-12-27 2012-07-11 浙江省电力公司 Information security comprehensive audit system and method
CN103200215A (en) * 2012-01-08 2013-07-10 佳都新太科技股份有限公司 Method achieving XenServer virtual machine remote control on https
US20130191631A1 (en) * 2012-01-24 2013-07-25 Ssh Communications Security Corp Auditing and policy control at SSH endpoints
CN103368956A (en) * 2013-07-03 2013-10-23 北京华胜天成科技股份有限公司 RFB (remote frame buffer) protocol secure communication method for VNC (virtual network computer) used for server side and RFB proxy server
CN103368955A (en) * 2013-07-03 2013-10-23 浪潮电子信息产业股份有限公司 Method for carrying out encryption on VNC (Virtual Network Computer) of virtual machine in cloud data center operation system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050273849A1 (en) * 2004-03-11 2005-12-08 Aep Networks Network access using secure tunnel
US20120023570A1 (en) * 2010-07-23 2012-01-26 Anchorfree, Inc. Web vpn
CN102307153A (en) * 2011-10-14 2012-01-04 王宁 Virtual desktop transmission device and method
CN102523207A (en) * 2011-12-06 2012-06-27 北京航空航天大学 VNC (Virtual Network Computer)-based remote resource access method and proxy device
CN102571773A (en) * 2011-12-27 2012-07-11 浙江省电力公司 Information security comprehensive audit system and method
CN103200215A (en) * 2012-01-08 2013-07-10 佳都新太科技股份有限公司 Method achieving XenServer virtual machine remote control on https
US20130191631A1 (en) * 2012-01-24 2013-07-25 Ssh Communications Security Corp Auditing and policy control at SSH endpoints
CN103368956A (en) * 2013-07-03 2013-10-23 北京华胜天成科技股份有限公司 RFB (remote frame buffer) protocol secure communication method for VNC (virtual network computer) used for server side and RFB proxy server
CN103368955A (en) * 2013-07-03 2013-10-23 浪潮电子信息产业股份有限公司 Method for carrying out encryption on VNC (Virtual Network Computer) of virtual machine in cloud data center operation system

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105162641A (en) * 2014-05-28 2015-12-16 中兴通讯股份有限公司 Monitoring method and device for cloud desktop
WO2015180293A1 (en) * 2014-05-28 2015-12-03 中兴通讯股份有限公司 Cloud desktop monitoring method and apparatus
CN107959701A (en) * 2016-10-17 2018-04-24 中兴通讯股份有限公司 Data sharing method, cloud terminal, cloud desktop virtual machine and pass-through proxy server
CN108243157A (en) * 2016-12-26 2018-07-03 华为技术服务有限公司 The method for implanting and device of sensitive information in virtual machine
CN107124459A (en) * 2017-04-28 2017-09-01 南京大学 It is controllable in sequence of threads evaluation and test middleware based on cloud platform
CN107391350A (en) * 2017-07-28 2017-11-24 郑州云海信息技术有限公司 A kind of display methods for monitoring view, apparatus and system
CN107634892A (en) * 2017-09-08 2018-01-26 郑州云海信息技术有限公司 A kind of Xenserver realizes the method and device of console based on novnc
CN110995705A (en) * 2019-12-03 2020-04-10 广州西麦科技股份有限公司 Method for remotely and safely accessing virtual machine
CN110995705B (en) * 2019-12-03 2022-07-05 广州西麦科技股份有限公司 Method for remotely and safely accessing virtual machine
CN112416522A (en) * 2020-11-24 2021-02-26 北京华胜天成科技股份有限公司 Virtual machine control method and device
CN113472878A (en) * 2021-06-29 2021-10-01 烽火通信科技股份有限公司 Method and device for realizing file dragging transmission in VNC by using browser plug-in
CN113472878B (en) * 2021-06-29 2022-04-26 烽火通信科技股份有限公司 Method and device for realizing file dragging transmission in VNC by using browser plug-in
WO2023241351A1 (en) * 2022-06-14 2023-12-21 中兴通讯股份有限公司 Virtual machine monitoring method and apparatus, and storage medium

Similar Documents

Publication Publication Date Title
CN103618737A (en) VNC console optimization scheme of virtual machines in cloud computing environment
Ganapathy A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications
US9231976B2 (en) Creating and managing a network security tag
JP2020502896A (en) Secure distribution of sensitive data over content distribution networks
US20120254622A1 (en) Secure Access to Electronic Devices
Chen et al. An infrastructure framework for privacy protection of community medical internet of things: Transmission protection, storage protection and access control
JP2016512374A5 (en)
JP6055023B2 (en) Information processing apparatus, terminal apparatus, and storage method for storing data in cloud environment
WO2013006296A1 (en) Methods and apparatus for secure data sharing
Yan et al. Context-aware verifiable cloud computing
CN103716166A (en) Self-adaptation hybrid encryption method and device and encryption communication system
US20170302454A1 (en) Encryption for transactions in a memory fabric
WO2023155696A1 (en) Database operation method and system, and storage medium and computer terminal
CN105100248A (en) Cloud storage security realization method based on data encryption and access control
CN204180095U (en) A kind of ciphering and deciphering device for network data encryption transmission
Rekhate et al. Secure and efficient message passing in distributed systems using one-time pad
Kumaresan et al. Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile
Goswami et al. Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability
CN114546527A (en) Longitudinal multi-party data aggregation calculation solution system
Sengupta et al. Contriving hybrid DESCAST algorithm for cloud security
Wang et al. Enabling privacy and leakage resistance for dynamic blockchain-based access control systems
Somaiya et al. Implementation and evaluation of EMAES–A hybrid encryption algorithm for sharing multimedia files with more security and speed
CN111209544B (en) Web application security protection method and device, electronic equipment and storage medium
KR101173583B1 (en) Method for Security Application Data in Mobile Terminal
CN103701589A (en) Information transmission method and device based on virtual desktop system and relevant equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140305