CN104836695A - Security scanning method in system testing process and testing server - Google Patents

Security scanning method in system testing process and testing server Download PDF

Info

Publication number
CN104836695A
CN104836695A CN201410048260.6A CN201410048260A CN104836695A CN 104836695 A CN104836695 A CN 104836695A CN 201410048260 A CN201410048260 A CN 201410048260A CN 104836695 A CN104836695 A CN 104836695A
Authority
CN
China
Prior art keywords
scanning
data processing
resource
processing request
request bag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410048260.6A
Other languages
Chinese (zh)
Inventor
彭成锋
韩波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201410048260.6A priority Critical patent/CN104836695A/en
Publication of CN104836695A publication Critical patent/CN104836695A/en
Pending legal-status Critical Current

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a testing server, which comprises a network interface, a scanning resource obtaining module, and a memory, wherein the network interface is used for communicating with a terminal and for receiving a data processing request packet sent by the terminal; the scanning resource obtaining module, used in the data processing request packet, is initiated in a terminal testing process, and is used for obtaining the data processing request packet and for analyzing the data processing request packet to obtain a scanning resource; and the memory is used for storing the scanning resource for calling security scanning. The invention also discloses a security scanning method in a system testing process. According to the invention, the efficiency of obtaining the scanning resource is improved, and phenomenon that missed scanning exists in the process of obtaining the scanning resource in the prior art is also avoided.

Description

Security sweep method in system testing process and testing server
Technical field
The present invention relates to internet arena, particularly relate to a kind of security sweep method in system testing process and testing server.
Background technology
The scanning resource that current WEB security sweep uses is that the mode of being creeped by reptile is obtained, and then detects described scanning resource.Due to the restriction by crawler technology, but cause obtained resource very limited, therefore will occur the phenomenon of drain sweep.
Summary of the invention
The main purpose of the embodiment of the present invention is to provide a kind of security sweep method in system testing process and testing server, is intended to the efficiency of the scanning resource acquisition that improve security sweep.
For reaching above object, embodiments providing a kind of testing server, comprising:
Comprise network interface, scanning source obtaining module, memory, wherein:
Described network interface is used for carrying out communication with described terminal, the data processing request bag that receiving terminal sends;
It is initiate in terminal test process that described scanning source obtaining module is used at data processing request bag, obtains described data processing request bag, and resolves described data processing request bag, obtains scanning resource;
Described memory, for storing described scanning resource, calls for security sweep.
Accordingly, the embodiment of the present invention additionally provides a kind of security sweep method in system testing process, comprising:
The data processing request bag that testing server receiving terminal sends;
When described data processing request bag is initiated in terminal test process, testing server will obtain described data processing request bag;
Testing server carries out dissection process to described data processing request bag, obtains the scanning resource of security sweep;
The scanning resource of described security sweep stores by testing server, calls for security sweep.
Because scanning source obtaining module is arranged on testing server, thus make when terminal carries out system testing, just to realize the automatic capturing of HTTP request bag on testing server, using the scanning resource as security sweep.Therefore, make terminal when test, user does not need to carry out the automatic acquisition that manual intervention can complete the scanning resource of security sweep, not only increases the efficiency of scanning resource acquisition, but also avoids the phenomenon of the drain sweep occurred when scanning resource acquisition in prior art.
Accompanying drawing explanation
Fig. 1 is the communication schematic diagram of terminal of the present invention when carrying out system testing;
Fig. 2 is the high-level schematic functional block diagram of testing server one embodiment in Fig. 1;
Fig. 3 is the high-level schematic functional block diagram scanning source obtaining module in Fig. 2;
Fig. 4 is the high-level schematic functional block diagram of another embodiment of testing server in Fig. 1;
Fig. 5 is the high-level schematic functional block diagram of scan module in Fig. 4;
Fig. 6 is the schematic flow sheet of security sweep method one embodiment in present system test process;
Fig. 7 is the schematic flow sheet of another embodiment of security sweep method in present system test process;
Fig. 8 is the idiographic flow schematic diagram that in Fig. 7, testing server scans scanning resource.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further with reference to accompanying drawing.
Embodiment
Technical scheme of the present invention is further illustrated below in conjunction with Figure of description and specific embodiment.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
System testing and security sweep combine by the present invention, strengthen the fail safe of WEB application.System survey is the black box class testing based on entire system statement of requirements book, answers the parts of all associatings of covering system.System testing is the test carried out for whole product systems, and object is the definition whether verification system meets requirement specification, finds out the place that is inconsistent or contradiction with it with requirement specification.Because the present invention is mainly used in WEB application system, the test therefore for this WEB application system can comprise: functional test, performance test, interface detection, configuration testing, compatibility test, usability testing, wen chang qiao district.As shown in Figure 1, the test process of this WEB application system is: the terminal 100 being provided with WEB application system sends HTTP request bag to testing server 200, server is tested described HTTP request bag according to preset test order, after having tested, will return test response to terminal 100.
As shown in Figure 2, the testing server 200 of the embodiment of the present invention comprises: test module 10, scanning source obtaining module 20, memory 30, network interface 40.Wherein, memory 30 comprises configuration database and resource database.Test order, the confession scanning source obtaining module acquisition rule of carrying out resource acquisition etc. that confession test module 10 carries out testing is stored in this configuration database.The resource that resource database obtains for storing described scanning source obtaining module 20.Test module 10 is connected with network interface 40, and this network interface 40 is for carrying out communication with terminal 100, and network interface 40 can be wireless telecommunications or wire communication with terminal 100.Receiving terminal 100 in test process to testing server 200 send HTTP request bag, the test order that test module 10 provides according to memory 30 is tested described HTTP request bag, and produce test result, by network interface 40, test result is back to terminal 100.While test module 10 carries out testing, the HTTP request bag that acquisition network interface 40 receives by scanning source obtaining module 20, and described HTTP request bag is resolved, after obtaining corresponding http resource, be stored in the resource database of memory 30.
The resource that above-mentioned scanning source obtaining module 20 obtains, will be used for WEB security sweep.WEB security sweep refers in the R&D process of WEB application, uses the Security Vulnerability of scanner to target application to detect, finds a kind of automation safety detection behavior of available WEB security breaches.Due to the embodiment of the present invention in terminal system when testing, the HTTP request bag of initiating when being tested terminal system by server is captured, and after captured HTTP request bag is processed, obtain the scanning resource for WEB security sweep, thus make the scanning resource acquisition of security sweep more accurate, and then strengthen the fail safe of WEB application.
Further, the configuration data stored in above-mentioned configuration database for testing server 200 default storage, also can carry out flexible configuration by configuration module 50.Such as, this testing server 200 also provides corresponding user interface, can connect corresponding input equipment, carries out the configuration of corresponding data for user.
Further, with reference to Fig. 3, above-mentioned scanning source obtaining module 20 comprises: bag collector unit 21, packet filtering module 22 and bag data extraction module 23.Wherein bag collector unit 21 is mainly used in the HTTP request bag that acquisition network interface 40 receives, and this HTTP request bag is that terminal 100 is initiated in test process.In order to avoid the excess load of bag collector unit 21, the embodiment of the present invention can in configuration database, the operation rule of bag collector unit 21 is set, HTTP request bag in certain time period that bag collector unit 21 obtains in some day is such as set, or all HTTP request bags obtaining some terminal etc.In order to avoid the excess load of bag data extraction module 23, the embodiment of the present invention is filtered the HTTP request bag that bag collector unit 21 obtains by packet filtering module 22, to filter out the HTTP request bag that some must carry out security sweep.Such as, the HTTP request of the resources such as picture is asked.The filtering rule of packet filtering module 22 foundations also can obtain from configuration data.Finally, bag data extraction module 23 is resolved the HTTP request bag filtered by packet filtering module 22, to obtain the scanning resource required for security sweep.Such as, HTTP request mode (common request method is GET or POST), URL address, HOST information and request text etc.
Because scanning source obtaining module 20 is arranged on testing server 200, thus make, when terminal 100 carries out system testing, just to realize the automatic capturing of HTTP request bag on testing server 200, using the scanning resource as security sweep.Therefore, make terminal when test, user does not need to carry out the automatic acquisition that manual intervention can complete the scanning resource of security sweep, not only increases the efficiency of scanning resource acquisition, but also avoids the phenomenon of the drain sweep occurred when scanning resource acquisition in prior art.
Further, present invention also offers another embodiment of a kind of testing server.As shown in Figure 4, the testing server in this embodiment also comprises scan module 60.This scan module 60 for obtaining scanning resource from the resource database in memory 30, and scans described scanning resource.
Due in research and development of products flow process conventional at present, security audit and system testing are separate, and system testing be processes of research & development must through a step, system testers can cover all functions in this process, and security audit personnel when auditing to product in order to improve scanning coverage, also need traversal one time by all functions of evaluating system, and then submit scan request to, so the workload of repetition, inefficiency will be caused.The embodiment of the present invention then achieves the seamless combination of security sweep and system testing, when making terminal 100 carry out system testing, system testers is having no the situation of perception, the server on backstage just achieves the acquisition of scanning resource and the security sweep of scanning resource, therefore eliminate the work of repetition, improve the operating efficiency of audit.In addition, system testers is more familiar with test product than security audit personnel, so the function covered can be more comprehensive, thus make the scanning resource of acquisition more accurate, scanning covers can be more abundant.
Further, with reference to Fig. 5, above-mentioned scan module 60 comprises bag recomposition unit 61, bag transport module 62 and packet analysis module 63.Described bag recomposition unit 61 will obtain scanning resource from the resource database in memory 30, then from the configuration database memory 30, obtain the rule of reading, and according to the rule of described reading, described scanning resource is reconfigured the new HTTP request bag of formation one, such as GET, POST and COOKIE in HTTP request bag are recombinated.Then the HTTP request bag of having recombinated is sent to destination server by bag transport module 62, and the HTTP response packet that receiving target server returns, the HTTP response packet received is sent to packet analysis module 63.Packet analysis module 63 obtains scanning rule from the configuration database of memory 30, and according to described scanning rule, verifies HTTP response packet, when described HTTP response packet meets scanning rule, then judges that it exists corresponding leak.Scan module 60 after scanning scanning resource, then can produce corresponding scanning result.This scanning result can store in memory 30, extracts for Security Officer.Or also can configure corresponding transmission information in the server, after generation scanning result, then automatically this scanning result is sent to destination.
Be understandable that, above-mentioned testing server 200 can also arrange corresponding calling interface, can be called the security sweep instrument of testing server 200 outside by this calling interface, scans the scanning resource that testing server 200 obtains.
Further, present invention also offers a kind of security sweep method in system testing process.With reference to Fig. 6, the security sweep method in the system testing process of this embodiment comprises the following steps:
The data processing request bag that step S110, testing server receiving terminal send;
When terminal needs access external data, during particularly by browser access webpage, all need access request to be sent to testing server, to ask the web data that will access.Because the embodiment of the present invention relates generally to WEB security sweep method, therefore testing server mainly receiving terminal send HTTP request bag.
Step S120, when described data processing request bag is initiated in terminal test process, testing server will obtain described data processing request bag;
The scanning resource of security sweep of the prior art can carry out the scanning of resource by the mode of creeping, and security sweep is combined with system testing by the embodiment of the present invention, when terminal carries out system testing, carries out by the server on backstage the acquisition scanning resource.Namely server is judging that the data processing request bag received is initiated in terminal test process, then obtain described data processing request bag.In order to avoid the excess load of bag collector unit 21, the embodiment of the present invention can in configuration database, the operation rule of bag collector unit 21 is set, HTTP request bag in certain time period that bag collector unit 21 obtains in some day is such as set, or all HTTP request bags obtaining some terminal etc.
Step S130, testing server carry out dissection process to described data processing request bag, obtain the scanning resource of security sweep;
Testing server is resolved it after getting the data processing request bag of initiating in test process.This resolution rules will mate with data processing request.Such as, when data processing request bag is HTTP request bag, then utilize the resolution rules of http protocol to resolve data processing request bag, obtain the scanning resource of security sweep.This scanning resource is specifically as follows HTTP request mode (common request method is GET or POST), URL address, HOST information and request text etc.。
The scanning resource of described security sweep stores by step S140, testing server, calls for security sweep.
The scanning Resource Storage of described security sweep in the resource database of memory 30, calls for security sweep by testing server.The embodiment of the present invention, will arrange scanner in testing server, for carrying out security sweep to this scanning resource.Be understandable that, when scanning resource and obtaining, directly can be sent to scanner and carry out security sweep, and not need to store.
Due to the embodiment of the present invention in terminal system when testing, the data processing request bag of initiating when being tested terminal system by testing server is captured, and after captured data processing request bag is processed, obtain the scanning resource for WEB security sweep, thus make the scanning resource acquisition of security sweep more accurate, and then strengthen the fail safe of WEB application.
Further, also comprise between above-mentioned steps S120 and step S130:
Step S150, testing server, according to the filtering rule preset, filter described data processing request bag.
In order to avoid the excess load of bag data processing request bag process, the embodiment of the present invention is by filtering obtained data processing request bag, to filter out the data processing request bag that some must carry out security sweep.Such as, the HTTP request of the resources such as picture is asked.The filtering rule of this filtration step institute foundation also can obtain from configuration data.
Further, with reference to Fig. 7, also comprise after above-mentioned steps S140:
Step S160, testing server obtain scanning resource from described memory, and carry out security sweep to described scanning resource.
Due in research and development of products flow process conventional at present, security audit and system testing are separate, and system testing be processes of research & development must through a step, system testers can cover all functions in this process, and security audit personnel when auditing to product in order to improve scanning coverage, also need traversal one time by all functions of evaluating system, and then submit scan request to, so the workload of repetition, inefficiency will be caused.The embodiment of the present invention then achieves the seamless combination of security sweep and system testing, when making terminal carry out system testing, system testers is having no the situation of perception, the server on backstage just achieves the acquisition of scanning resource and the security sweep of scanning resource, therefore eliminate the work of repetition, improve the operating efficiency of audit.In addition, system testers is more familiar with test product than security audit personnel, so the function covered can be more comprehensive, thus make the scanning resource of acquisition more accurate, scanning covers can be more abundant.
Further, with reference to Fig. 8, above-mentioned steps S160 comprises:
Step S161, acquisition scanning resource and default scanning rule;
Step S162, described scanning resource to be reconfigured, generate a new data processing request bag;
Step S163, described data processing request bag is sent to destination server;
The data processing response packet that step S164, receiving target server return;
Step S165, according to described default scanning rule, leak analysis is carried out to described data processing response packet, and generates analysis result.
When needs security sweep, obtain scanning resource and default scanning rule by from memory 30, wherein this scanning rule preset comprises the rule of reading and the rule of analysis, obtains from the configuration database of memory 30.Described scanning resource is reconfigured the new HTTP request bag of formation one by the rule according to described reading, such as, recombinate to GET, POST and COOKIE in HTTP request bag.Then this new HTTP request bag is sent to destination server, and the HTTP response packet that receiving target server returns.Finally according to the rule of described analysis, the HTTP response packet received is verified, when described HTTP response packet meets scanning rule, then judges that it exists corresponding leak.After scanning resource is scanned, then can produce corresponding scanning result.This scanning result can store in memory 30, extracts for Security Officer.Or also can configure corresponding transmission information in the server, after generation scanning result, then automatically this scanning result is sent to destination.
Be understandable that, above-mentioned testing server 200 can also arrange corresponding calling interface, can be called the security sweep instrument of testing server 200 outside by this calling interface, scans the scanning resource that testing server 200 obtains.
The foregoing is only the preferred embodiments of the present invention; not thereby its scope of the claims is limited; every utilize specification of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; directly or indirectly be used in the technical field that other are relevant, be all in like manner included in scope of patent protection of the present invention.

Claims (10)

1. a testing server, is characterized in that, comprises network interface, scanning source obtaining module, memory, wherein:
Described network interface is used for carrying out communication with terminal, the data processing request bag that receiving terminal sends;
It is initiate in terminal test process that described scanning source obtaining module is used at data processing request bag, obtains described data processing request bag, and resolves described data processing request bag, obtains scanning resource;
Described memory, for storing described scanning resource, calls for security sweep.
2. testing server as claimed in claim 1, is characterized in that, described scanning source obtaining module also for after filtering obtained data processing request bag, then carries out the parsing of data processing request bag.
3. testing server as claimed in claim 1 or 2, is characterized in that, also comprise:
Scan module, for obtaining scanning resource from described memory, and scans described scanning resource.
4. testing server as claimed in claim 3, it is characterized in that, described scan module comprises:
Bag recomposition unit, for obtaining scanning resource and default scanning rule from described memory, and reconfiguring described scanning resource according to the reading rule of described scanning rule, forming new data processing request bag;
Bag transport module, for described data processing request bag is sent to destination server, the data processing response packet that receiving target server returns;
Packet analysis module, for according to the analysis rule in the scanning rule preset, analyzes described data processing response packet, and produces corresponding scanning result.
5. testing server as claimed in claim 1 or 2, is characterized in that, also comprise scanner calling interface, for calling outside scanner, obtaining scanning resource, and scan described scanning resource from described memory.
6. the security sweep method in system testing process, is characterized in that, comprise the following steps:
The data processing request bag that testing server receiving terminal sends;
When described data processing request bag is initiated in terminal test process, testing server will obtain described data processing request bag;
Testing server carries out dissection process to described data processing request bag, obtains the scanning resource of security sweep;
The scanning resource of described security sweep stores by testing server, calls for security sweep.
7. the security sweep method in system testing process as claimed in claim 6, is characterized in that, described when data processing request bag be initiate in terminal test process, described for acquisition data processing request bag also comprises by testing server:
Testing server, according to the filtering rule preset, filters described data processing request bag.
8. the security sweep method in system testing process as claimed in claims 6 or 7, it is characterized in that, the scanning resource of described security sweep stores by described testing server, also comprises after calling for security sweep:
Testing server obtains scanning resource from described memory, and carries out security sweep to described scanning resource.
9. the security sweep method in system testing process as claimed in claim 8, is characterized in that, described testing server obtains and scans resource from described memory, and carries out security sweep to described scanning resource and comprise:
Obtain scanning resource and default scanning rule;
Described scanning resource is reconfigured, generates a new data processing request bag;
Described data processing request bag is sent to destination server;
The data processing response packet that receiving target server returns;
According to described default scanning rule, leak analysis is carried out to described data processing response packet, and generates analysis result.
10. the security sweep method in system testing process as claimed in claims 6 or 7, it is characterized in that, the scanning resource of described security sweep stores by described testing server, also comprises after calling for security sweep:
Described testing server calls outside scanner, obtains scanning resource, and scan described scanning resource from described memory.
CN201410048260.6A 2014-02-11 2014-02-11 Security scanning method in system testing process and testing server Pending CN104836695A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410048260.6A CN104836695A (en) 2014-02-11 2014-02-11 Security scanning method in system testing process and testing server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410048260.6A CN104836695A (en) 2014-02-11 2014-02-11 Security scanning method in system testing process and testing server

Publications (1)

Publication Number Publication Date
CN104836695A true CN104836695A (en) 2015-08-12

Family

ID=53814346

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410048260.6A Pending CN104836695A (en) 2014-02-11 2014-02-11 Security scanning method in system testing process and testing server

Country Status (1)

Country Link
CN (1) CN104836695A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105553775A (en) * 2015-12-24 2016-05-04 珠海市君天电子科技有限公司 Method and device for acquiring information in test system and test system
CN106055985A (en) * 2016-05-31 2016-10-26 乐视控股(北京)有限公司 Automatic vulnerability detection method and device
CN106953860A (en) * 2017-03-20 2017-07-14 腾讯科技(深圳)有限公司 A kind of data scanning method and scanning server

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101599947A (en) * 2008-06-06 2009-12-09 盛大计算机(上海)有限公司 Trojan horse virus scanning method based on the WEB webpage
CN102104601A (en) * 2011-01-14 2011-06-22 无锡市同威科技有限公司 Web vulnerability scanning method and device based on infiltration technology
US20130269042A1 (en) * 2010-05-13 2013-10-10 Symantec Corporation Optimizing security seals on web pages
CN103428249A (en) * 2012-05-23 2013-12-04 腾讯科技(深圳)有限公司 Collecting method and processing method for HTTP request packet, system and server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101599947A (en) * 2008-06-06 2009-12-09 盛大计算机(上海)有限公司 Trojan horse virus scanning method based on the WEB webpage
US20130269042A1 (en) * 2010-05-13 2013-10-10 Symantec Corporation Optimizing security seals on web pages
CN102104601A (en) * 2011-01-14 2011-06-22 无锡市同威科技有限公司 Web vulnerability scanning method and device based on infiltration technology
CN103428249A (en) * 2012-05-23 2013-12-04 腾讯科技(深圳)有限公司 Collecting method and processing method for HTTP request packet, system and server

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105553775A (en) * 2015-12-24 2016-05-04 珠海市君天电子科技有限公司 Method and device for acquiring information in test system and test system
CN105553775B (en) * 2015-12-24 2019-02-15 珠海豹趣科技有限公司 Acquisition methods, device and the test macro of information in a kind of test macro
CN106055985A (en) * 2016-05-31 2016-10-26 乐视控股(北京)有限公司 Automatic vulnerability detection method and device
CN106953860A (en) * 2017-03-20 2017-07-14 腾讯科技(深圳)有限公司 A kind of data scanning method and scanning server

Similar Documents

Publication Publication Date Title
CN107133180B (en) Dynamic page testing method, testing device and storage medium
CN110209583B (en) Security test method, security test device, security test system, security test equipment and security test storage medium
CN106484611B (en) Fuzzy test method and device based on automatic protocol adaptation
CN105827642A (en) Automatic penetration testing method and system
CN104331662B (en) Android malicious application detection method and device
CN108809890B (en) Vulnerability detection method, test server and client
CN107948120B (en) Vulnerability detection method and device
EP3048759A1 (en) Fault diagnosis method, device and system
CN105208000A (en) Network attack retrospective analysis method and network security equipment
CN105516131A (en) Vulnerability scanning method and device and electronic equipment
US11184411B2 (en) Communication terminal, communication system, log data transmission method, and non-transitory computer-readable medium
CN103581351B (en) The method and apparatus of network access
CN106790085B (en) Vulnerability scanning method, device and system
CN104836695A (en) Security scanning method in system testing process and testing server
CN109510738B (en) Communication link test method and device
CN104253785A (en) Dangerous web address identification method, device and system
CN104683743A (en) Remote monitoring method, signal acquisition equipment and remote monitoring equipment and system
CN111143213A (en) Software automation test method and device and electronic equipment
CN105187393B (en) A kind of mobile terminal from malicious software network behavior reconstructing method and its system
CN110659481A (en) Vulnerability scanning method based on agent
Qianqian et al. Research and design on Web application vulnerability scanning service
CN105515909A (en) Data collection test method and device
CN101873593A (en) Android-based Wifi wireless dial system and method
CN105117344B (en) A kind of Interface integration method of testing and system based on PB
CN105068926A (en) Program test method and device thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150812

RJ01 Rejection of invention patent application after publication