CN111010384A - Self-security defense system and security defense method for terminal of Internet of things - Google Patents
Self-security defense system and security defense method for terminal of Internet of things Download PDFInfo
- Publication number
- CN111010384A CN111010384A CN201911245947.8A CN201911245947A CN111010384A CN 111010384 A CN111010384 A CN 111010384A CN 201911245947 A CN201911245947 A CN 201911245947A CN 111010384 A CN111010384 A CN 111010384A
- Authority
- CN
- China
- Prior art keywords
- terminal
- terminal system
- security
- internet
- things
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention relates to a self-security defense system of an Internet of things terminal and a security defense method thereof, wherein the system comprises a security monitoring module for monitoring the Internet of things terminal system in real time and transmitting information to a security defense module, and the security defense module for comparing the transmitted information by utilizing an analysis model of a matched terminal system and processing based on a comparison result; and constructing and obtaining a terminal system process white list and a terminal system network relationship white list, after the terminal system updates the system process and network relationship information, if the updated content is consistent with the white list, continuing monitoring, otherwise, starting a strategy response, issuing a corresponding protection strategy into the terminal system, and implementing strategy protection on abnormal processes, network connections and ports. The invention helps the terminal of the Internet of things to establish a self-security defense mechanism, realizes self-security protection in the face of attack threats and virus invasion, comprehensively improves the security level of the terminal system, and ensures the information security of users when using the intelligent Internet of things terminal.
Description
Technical Field
The invention relates to the technical field of digital information transmission, such as telegraph communication, in particular to a self-security defense system and a security defense method for an internet of things terminal.
Background
Along with the development of informatization, more and more thing networking terminals need can let the user exercise control authority after carrying out the authentication, for example with bluetooth key open door, intelligent lock, vending machine etc..
With the rapid development of the internet of things terminal, threat behaviors such as network attack, virus intrusion and the like occur at higher and higher frequencies, the virus intrudes the internet of things terminal, so that the terminal becomes a broiler chicken, and an attack and a formulated target are initiated or destroyed, or an event that the terminal is intruded and important confidential information is stolen occurs at times; once the lawbreaker finishes the capture of the data signal in the normal user operation process, the lawbreaker then carries out the data signal replay to the target system in an opportunistic way and realizes the system authentication illegally, and a large amount of sensitive information can be obtained, even the target system is damaged.
The traditional network security protection means obviously has defects in the security protection of the terminal of the internet of things, and a security module for helping the terminal of the internet of things to realize a self security defense mechanism needs to be deeply combined with a terminal system of the internet of things, the security defense mechanism module works depending on terminal software and hardware resources, and if the terminal software and hardware resources are limited, the module works under the influence.
Disclosure of Invention
The invention solves the problems in the prior art, provides an optimized self-security defense system and a security defense method for the terminal of the Internet of things, realizes the security self-check of the terminal when the terminal of the Internet of things is attacked by a network, simultaneously responds to defense quickly, effectively eliminates the sources of the network attack and virus invasion in the terminal system directly, and ensures the security of the network where the terminal is located.
The technical scheme adopted by the invention is that the self-security defense system of the terminal of the Internet of things comprises a security monitoring module and a security defense module; the safety monitoring module is used for monitoring the terminal system of the Internet of things in real time and transmitting information to the safety defense module, and the safety defense module compares the transmitted information by utilizing an analysis model matched with the terminal system and processes the information based on a comparison result.
Preferably, the security monitoring module monitors changes of internal processes, network connections, traffic, port opening conditions, and operation read-write instructions of the terminal system.
Preferably, the safety monitoring module and the safety defense module exchange information in real time.
Preferably, the security monitoring module continuously monitors the process of the terminal system under a normal working condition, starts the process according to the default of the terminal system, and establishes a white list of the process of the terminal system by combining a periodic monitoring result.
Preferably, the terminal system process white list is synchronized to the security defense module.
Preferably, the security monitoring module continuously monitors the network connection relationship of the terminal system under normal working conditions, and establishes a white list of the network relationship of the terminal system according to the periodic monitoring result.
Preferably, the terminal system network relationship white list is synchronized to the security defense module.
Preferably, the security defense module compares the terminal system process white list and the terminal system network relationship white list with the latest process information and the latest network relationship information received in real time, and processes the process based on the comparison result.
Preferably, if an abnormal process and an abnormal connection are found, a policy response is started, a corresponding protection policy is issued to the inside of the terminal system, and policy protection including interception is implemented on the abnormal process, the network connection and the port.
A security defense method adopting an Internet of things terminal self-security defense system comprises the following steps:
step 1: constructing and obtaining a terminal system process white list and a terminal system network relation white list;
step 2: the terminal system updates system process and network relation information;
and step 3: if the process white list is consistent with the terminal system process white list and the terminal system network relation white list, continuing monitoring, returning to the step 2, and otherwise, performing the next step;
and 4, step 4: and starting a strategy response, issuing a corresponding protection strategy to the inside of the terminal system, and implementing strategy protection including interception on abnormal processes, network connection and ports.
The invention provides an optimized self-security defense system of an Internet of things terminal and a security defense method thereof, wherein the system comprises a security monitoring module and a security defense module, the security monitoring module is used for monitoring the Internet of things terminal system in real time and transmitting information to the security defense module, and the security defense module compares the transmitted information by utilizing an analysis model matched with the terminal system and processes the information based on a comparison result; by constructing and obtaining a terminal system process white list and a terminal system network relationship white list, after a terminal system updates system process and network relationship information, if the updated content is consistent with the terminal system process white list and the terminal system network relationship white list, monitoring is continued, otherwise, a strategy response is started, a corresponding protection strategy is issued to the inside of the terminal system, and strategy protection including interception is implemented on abnormal processes, network connections and ports.
According to the invention, system security reinforcement is realized in the terminal system, system processes are monitored, network ports are monitored, a self-learning strategy is adopted to realize normal system process and network relation white list establishment, abnormal processes and abnormal network connection caused by attack invasion are automatically blocked, self-generation safety protection is carried out, the safety defense capability of the terminal system of the Internet of things is improved, and the information security of the terminal system of the Internet of things is ensured. The invention can effectively help the terminal of the Internet of things to establish a self-security defense mechanism, realize self-sending self-security protection in the face of attack threats and virus invasion behaviors, comprehensively improve the security level of a terminal system and ensure the information security of a user when the user uses the intelligent Internet of things terminal.
Drawings
Fig. 1 is a schematic structural diagram of a security defense system of the present invention, in which a double-headed arrow between a security monitoring module and a security defense module represents information interaction, a connection line between the security monitoring module and a terminal system represents monitoring, and a single-headed arrow between the security defense module and the terminal system represents a processing relationship;
FIG. 2 is a flow chart of a security defense method of the present invention.
Detailed Description
The present invention is described in further detail with reference to the following examples, but the scope of the present invention is not limited thereto.
The invention relates to a self-security defense system of an Internet of things terminal, which comprises a security monitoring module and a security defense module; the safety monitoring module is used for monitoring the terminal system of the Internet of things in real time and transmitting information to the safety defense module, and the safety defense module compares the transmitted information by utilizing an analysis model matched with the terminal system and processes the information based on a comparison result.
In the invention, the self-security defense of the terminal means that when the terminal is attacked or invaded, the attack behavior can be defended spontaneously to prevent the terminal system from being invaded.
The safety monitoring module monitors changes of internal processes, network connection, flow, port opening conditions and operation reading and writing instructions of the terminal system.
And information is interacted between the safety monitoring module and the safety defense module in real time.
The safety monitoring module continuously monitors the terminal system process under the normal working condition, and establishes a terminal system process white list according to the terminal system default starting process and the combination of the periodic monitoring result.
And the terminal system process white list is synchronized to the security defense module.
The safety monitoring module continuously monitors the network connection relation of the terminal system under the normal working condition and establishes a terminal system network relation white list according to the periodic monitoring result.
And the terminal system network relation white list is synchronized to the security defense module.
And the security defense module is used for comparing the latest process information and the network relation information received in real time based on the terminal system process white list and the terminal system network relation white list, and processing based on a comparison result.
If the abnormal process and the abnormal connection are found, strategy response is started, a corresponding protection strategy is issued to the inside of the terminal system, and strategy protection including interception is carried out on the abnormal process, the network connection and the port.
In the invention, generally, a safety monitoring module is based on the safety monitoring of the kernel level of the terminal of the Internet of things, and relates to the level of an equipment system, a normal baseline model is established based on monitored information, and a safety defense module carries out safety protection, which is different from the monitoring of a narrow monitoring system or an application layer in the prior art; specifically, the security monitoring module is embedded and deployed in the terminal system of the internet of things, and the main monitoring contents include but are not limited to kernel-level process monitoring, kernel-level network connection monitoring, kernel-level service port monitoring, kernel-level system file monitoring, kernel-level read-write operation instruction monitoring and kernel-level access flow security analysis monitoring.
In the invention, the established behavior baseline for the terminal process, the network connection, the system file, the operation instruction, the flow and the like is based on the self-learning of the normal working state of the terminal.
In the invention, taking a terminal process monitoring model as an example:
when the normal terminal works, 10 processes are initiated, and a white list is established aiming at the 10 processes; meanwhile, a blacklist is established for processes which can be initiated by Lesox viruses, MIRAI viruses and the like during working;
then, the analysis is carried out on the process which is tried to be established in the running process of the system:
if the newly initiated process is in the blacklist, triggering a security defense module to directly block the process;
if the newly initiated process is in the white list, the process works normally;
and if the newly initiated process is not in the white list or the black list, sending the newly initiated process to a data platform for analysis, and performing security information analysis by combining more dimensions to make final judgment.
The invention also relates to a security defense method adopting the self-security defense system of the terminal of the Internet of things, which comprises the following steps:
step 1: constructing and obtaining a terminal system process white list and a terminal system network relation white list;
step 2: the terminal system updates system process and network relation information;
and step 3: if the process white list is consistent with the terminal system process white list and the terminal system network relation white list, continuing monitoring, returning to the step 2, and otherwise, performing the next step;
and 4, step 4: and starting a strategy response, issuing a corresponding protection strategy to the inside of the terminal system, and implementing strategy protection including interception on abnormal processes, network connection and ports.
The system comprises a safety monitoring module and a safety defense module, wherein the safety monitoring module is used for monitoring the terminal system of the Internet of things in real time and transmitting information to the safety defense module, and the safety defense module compares the transmitted information by utilizing an analysis model matched with the terminal system and processes the information based on a comparison result; by constructing and obtaining a terminal system process white list and a terminal system network relationship white list, after a terminal system updates system process and network relationship information, if the updated content is consistent with the terminal system process white list and the terminal system network relationship white list, monitoring is continued, otherwise, a strategy response is started, a corresponding protection strategy is issued to the inside of the terminal system, and strategy protection including interception is implemented on abnormal processes, network connections and ports.
According to the invention, system security reinforcement is realized in the terminal system, system processes are monitored, network ports are monitored, a self-learning strategy is adopted to realize normal system process and network relation white list establishment, abnormal processes and abnormal network connection caused by attack invasion are automatically blocked, self-generation safety protection is carried out, the safety defense capability of the terminal system of the Internet of things is improved, and the information security of the terminal system of the Internet of things is ensured. The invention can effectively help the terminal of the Internet of things to establish a self-security defense mechanism, realize self-sending self-security protection in the face of attack threats and virus invasion behaviors, comprehensively improve the security level of a terminal system and ensure the information security of a user when the user uses the intelligent Internet of things terminal.
Claims (10)
1. The utility model provides a thing networking terminal self-security defense system which characterized in that: the system comprises a security monitoring module and a security defense module; the safety monitoring module is used for monitoring the terminal system of the Internet of things in real time and transmitting information to the safety defense module, and the safety defense module compares the transmitted information by utilizing an analysis model matched with the terminal system and processes the information based on a comparison result.
2. The self-security defense system of the terminal of the internet of things as claimed in claim 1, wherein: the safety monitoring module monitors changes of internal processes, network connection, flow, port opening conditions and operation reading and writing instructions of the terminal system.
3. The self-security defense system of the terminal of the internet of things as claimed in claim 1, wherein: and information is interacted between the safety monitoring module and the safety defense module in real time.
4. The self-security defense system of the terminal of the internet of things as claimed in claim 1, wherein: the safety monitoring module continuously monitors the terminal system process under the normal working condition, and establishes a terminal system process white list according to the terminal system default starting process and the combination of the periodic monitoring result.
5. The internet of things terminal self-security defense system according to claim 4, characterized in that: and the terminal system process white list is synchronized to the security defense module.
6. The internet of things terminal self-security defense system according to claim 4, characterized in that: the safety monitoring module continuously monitors the network connection relation of the terminal system under the normal working condition and establishes a terminal system network relation white list according to the periodic monitoring result.
7. The internet of things terminal self-security defense system according to claim 6, characterized in that: and the terminal system network relation white list is synchronized to the security defense module.
8. The internet of things terminal self-security defense system according to claim 6, characterized in that: and the security defense module is used for comparing the latest process information and the network relation information received in real time based on the terminal system process white list and the terminal system network relation white list, and processing based on a comparison result.
9. The internet of things terminal self-security defense system according to claim 8, characterized in that: if the abnormal process and the abnormal connection are found, strategy response is started, a corresponding protection strategy is issued to the inside of the terminal system, and strategy protection including interception is carried out on the abnormal process, the network connection and the port.
10. A security defense method using the Internet of things terminal self-security defense system of any one of claims 1 to 9, characterized in that: the method comprises the following steps:
step 1: constructing and obtaining a terminal system process white list and a terminal system network relation white list;
step 2: the terminal system updates system process and network relation information;
and step 3: if the process white list is consistent with the terminal system process white list and the terminal system network relation white list, continuing monitoring, returning to the step 2, and otherwise, performing the next step;
and 4, step 4: and starting a strategy response, issuing a corresponding protection strategy to the inside of the terminal system, and implementing strategy protection including interception on abnormal processes, network connection and ports.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911245947.8A CN111010384A (en) | 2019-12-07 | 2019-12-07 | Self-security defense system and security defense method for terminal of Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911245947.8A CN111010384A (en) | 2019-12-07 | 2019-12-07 | Self-security defense system and security defense method for terminal of Internet of things |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111010384A true CN111010384A (en) | 2020-04-14 |
Family
ID=70114068
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911245947.8A Pending CN111010384A (en) | 2019-12-07 | 2019-12-07 | Self-security defense system and security defense method for terminal of Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111010384A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111641809A (en) * | 2020-05-14 | 2020-09-08 | 陈洋洋 | Security monitoring method based on Internet of things and artificial intelligence and cloud communication server |
CN112383417A (en) * | 2020-11-02 | 2021-02-19 | 杭州安恒信息安全技术有限公司 | Terminal security external connection detection method, system, equipment and readable storage medium |
CN113194061A (en) * | 2021-03-09 | 2021-07-30 | 中国大唐集团科学技术研究院有限公司 | Power plant industrial control system network security defense method based on distributed service quality control algorithm |
CN114285621A (en) * | 2021-12-20 | 2022-04-05 | 北京安天网络安全技术有限公司 | Network threat monitoring method and device and electronic equipment |
CN115118469A (en) * | 2022-06-15 | 2022-09-27 | 杭州温小度科技有限公司 | Network security threat processing system and processing method thereof |
TWI801293B (en) * | 2022-07-21 | 2023-05-01 | 中華電信股份有限公司 | System and method for monitoring endpoint device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106790149A (en) * | 2016-12-28 | 2017-05-31 | 北京安天网络安全技术有限公司 | The method and system that a kind of defence IoT equipment is invaded |
CN109639634A (en) * | 2018-11-05 | 2019-04-16 | 杭州安恒信息技术股份有限公司 | A kind of Internet of Things adaptive security means of defence and system |
CN109962885A (en) * | 2017-12-22 | 2019-07-02 | 北京安天网络安全技术有限公司 | The network safety protection method and internet of things equipment of internet of things equipment |
US20190215755A1 (en) * | 2017-10-31 | 2019-07-11 | Cable Television Laboratories, Inc | Systems and methods for internet of things security environment |
CN110138780A (en) * | 2019-05-15 | 2019-08-16 | 四川长虹电器股份有限公司 | A method of internet-of-things terminal threat detection is realized based on probe technique |
-
2019
- 2019-12-07 CN CN201911245947.8A patent/CN111010384A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106790149A (en) * | 2016-12-28 | 2017-05-31 | 北京安天网络安全技术有限公司 | The method and system that a kind of defence IoT equipment is invaded |
US20190215755A1 (en) * | 2017-10-31 | 2019-07-11 | Cable Television Laboratories, Inc | Systems and methods for internet of things security environment |
CN109962885A (en) * | 2017-12-22 | 2019-07-02 | 北京安天网络安全技术有限公司 | The network safety protection method and internet of things equipment of internet of things equipment |
CN109639634A (en) * | 2018-11-05 | 2019-04-16 | 杭州安恒信息技术股份有限公司 | A kind of Internet of Things adaptive security means of defence and system |
CN110138780A (en) * | 2019-05-15 | 2019-08-16 | 四川长虹电器股份有限公司 | A method of internet-of-things terminal threat detection is realized based on probe technique |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111641809A (en) * | 2020-05-14 | 2020-09-08 | 陈洋洋 | Security monitoring method based on Internet of things and artificial intelligence and cloud communication server |
CN112383417A (en) * | 2020-11-02 | 2021-02-19 | 杭州安恒信息安全技术有限公司 | Terminal security external connection detection method, system, equipment and readable storage medium |
CN112383417B (en) * | 2020-11-02 | 2022-08-23 | 杭州安恒信息安全技术有限公司 | Terminal security external connection detection method, system, equipment and readable storage medium |
CN113194061A (en) * | 2021-03-09 | 2021-07-30 | 中国大唐集团科学技术研究院有限公司 | Power plant industrial control system network security defense method based on distributed service quality control algorithm |
CN113194061B (en) * | 2021-03-09 | 2022-06-14 | 中国大唐集团科学技术研究院有限公司 | Power plant industrial control system network security defense method based on distributed service quality control algorithm |
CN114285621A (en) * | 2021-12-20 | 2022-04-05 | 北京安天网络安全技术有限公司 | Network threat monitoring method and device and electronic equipment |
CN115118469A (en) * | 2022-06-15 | 2022-09-27 | 杭州温小度科技有限公司 | Network security threat processing system and processing method thereof |
CN115118469B (en) * | 2022-06-15 | 2024-03-19 | 杭州温小度科技有限公司 | Network security threat processing system and processing method thereof |
TWI801293B (en) * | 2022-07-21 | 2023-05-01 | 中華電信股份有限公司 | System and method for monitoring endpoint device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111010384A (en) | Self-security defense system and security defense method for terminal of Internet of things | |
CN111726774B (en) | Method, device, equipment and storage medium for defending attack | |
CN111193719A (en) | Network intrusion protection system | |
US20030188190A1 (en) | System and method of intrusion detection employing broad-scope monitoring | |
US20040221178A1 (en) | Firewall system and method via feedback from broad-scope monitoring for intrusion detection | |
KR102234402B1 (en) | A system and method for detecting network anomalies of connected car | |
CN115001870B (en) | Information security protection system, method and storage medium | |
CN112653655B (en) | Automobile safety communication control method and device, computer equipment and storage medium | |
CN112351017B (en) | Transverse penetration protection method, device, equipment and storage medium | |
CN115150208B (en) | Zero-trust-based Internet of things terminal secure access method and system | |
CN116708210A (en) | Operation and maintenance processing method and terminal equipment | |
CN113382076A (en) | Internet of things terminal security threat analysis method and protection method | |
Pitney et al. | A systematic review of 2021 microsoft exchange data breach exploiting multiple vulnerabilities | |
CN107360182A (en) | One kind is used for Embedded Active Networks system of defense and its defence method | |
CN113411295A (en) | Role-based access control situation awareness defense method and system | |
CN115694928A (en) | Cloud honeypot of whole-ship computing environment, attack event perception and behavior analysis method | |
CN115883170A (en) | Network flow data monitoring and analyzing method and device, electronic equipment and storage medium | |
CN116192497A (en) | Network access and user authentication safe interaction method based on zero trust system | |
CN111464551A (en) | Network security analysis system | |
CN113660222A (en) | Situation awareness defense method and system based on mandatory access control | |
Nilsson et al. | Creating a secure infrastructure for wireless diagnostics and software updates in vehicles | |
CN113518067A (en) | Security analysis method based on original message | |
KR20130085473A (en) | Encryption system for intrusion detection system of cloud computing service | |
US20170085577A1 (en) | Computer method for maintaining a hack trap | |
CN112073371A (en) | Malicious behavior detection method for weak supervision routing equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200414 |