CN105657713A - False-AP detecting and blocking method, wireless device and router - Google Patents

False-AP detecting and blocking method, wireless device and router Download PDF

Info

Publication number
CN105657713A
CN105657713A CN201610173358.3A CN201610173358A CN105657713A CN 105657713 A CN105657713 A CN 105657713A CN 201610173358 A CN201610173358 A CN 201610173358A CN 105657713 A CN105657713 A CN 105657713A
Authority
CN
China
Prior art keywords
access point
beacon message
pseudo
ssid
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610173358.3A
Other languages
Chinese (zh)
Inventor
马君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHUHAI NETBOX INFORMATION TECHNOLOGY Co Ltd
Original Assignee
ZHUHAI NETBOX INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHUHAI NETBOX INFORMATION TECHNOLOGY Co Ltd filed Critical ZHUHAI NETBOX INFORMATION TECHNOLOGY Co Ltd
Priority to CN201610173358.3A priority Critical patent/CN105657713A/en
Publication of CN105657713A publication Critical patent/CN105657713A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the field of wireless network application and discloses a false-AP detecting and blocking method, a wireless device and a router. By broadcasting a Beacon message carrying a specific encrypted field and receiving Beacon messages broadcast by peripheral APs, whether SSIDs carried in the received Beacon messages are identical with an SSID of a self AP or not is judged; when the SSIDs carried in the received Beacon messages are identical with the SSID of the self AP, whether the encrypted field is carried in the Beacon messages or not is judged, it is detected that the AP sending the corresponding Beacon message is a false AP when the encrypted field does not exist in the corresponding Beacon message, and a De-Authentication message for canceling identity authentication is sent to a client side to block connection between the client side and the false AP. The false AP is effectively identified, and the client side is blocked and protected against the risk that personal information is stolen due to the fact that the client side is connected with the false AP.

Description

A kind of pseudo-AP detects blocking-up method, wireless device and router
Technical field
The present invention relates to wireless network application, relate in particular to a kind of pseudo-AP and detect blocking-up method, wirelessDevice and router.
Background technology
In existing 802.11 Radio Network Systems, WIFIAP (abbreviation access point) equipment orRouter device can be by sending the mode of Beacon packet, allows wireless WIFI terminal (abbreviation terminal)Can automatically find access point, thereby terminal can be connected to access point. If the SSID of two access pointsTitle is the same, can not distinguish access point in terminal. At present, hacker often utilizes this this mode,Set up camouflage access point, fascination terminal, once terminal access camouflage access point, hacker will obtain user's letterBreath, the privacy to user and personal property produce and threaten.
Summary of the invention
The invention provides a kind of pseudo-AP and detect blocking-up method, wireless device and router, solve prior artMiddle hacker easily swindles by pseudo-AP, obtains the technical problem of user privacy information.
The object of the invention is to be achieved through the following technical solutions:
A kind of pseudo-AP detects blocking-up method, comprising:
Broadcast transmission Beacon message, described Beacon message carries the SSID of self access point and addsClose field;
Receive the Beacon message of periphery access point broadcast;
Whether judge the SSID of the SSID that carries and self access point in the described Beacon message receivingIdentical;
In the time that the SSID of the SSID carrying in described Beacon message and self access point is identical, judgementIn described Beacon message, whether carry described encrypted fields;
In the time there is not described encrypted fields in described Beacon message, detect and send described BeaconThe access point of message is pseudo-access point, and sends and cancel authentication De-Authentication to clientMessage, to block being connected of described client and pseudo-access point, wherein, described De-AuthenticationThe target MAC (Media Access Control) address of message is client mac address, the MAC that source MAC is pseudo-access pointAddress.
A kind of wireless device, comprising:
Sending module, for broadcast transmission Beacon message, described Beacon message carries self accessSSID and the encrypted fields of point;
Receiver module, for receiving the Beacon message of periphery access point broadcast.
The first judge module, for judging SSID that the described Beacon message of reception carries and selfWhether the SSID of access point is identical;
The second judge module, for judging what described Beacon message carried when described the first judge moduleWhen the SSID of SSID and self access point is identical, described in judging and whether carrying in described Beacon messageEncrypted fields;
Blocking-up module, in the time that described Beacon message does not exist described encrypted fields, detection is set outThe access point that send described Beacon message is pseudo-access point, and sends and cancel authentication to clientDe-Authentication message, to block being connected of described client and pseudo-access point, wherein, described inThe target MAC (Media Access Control) address of De-Authentication message is client mac address, source MACFor the MAC Address of pseudo-access point.
A kind of router, comprising:
Sending module, for broadcast transmission Beacon message, described Beacon message carries self accessSSID and the encrypted fields of point;
Receiver module, for receiving the Beacon message of periphery access point broadcast.
The first judge module, for judging SSID that the described Beacon message of reception carries and selfWhether the SSID of access point is identical;
The second judge module, for judging what described Beacon message carried when described the first judge moduleWhen the SSID of SSID and self access point is identical, described in judging and whether carrying in described Beacon messageEncrypted fields;
Blocking-up module, in the time that described Beacon message does not exist described encrypted fields, detection is set outThe access point that send described Beacon message is pseudo-access point, and sends and cancel authentication to clientDe-Authentication message, to block being connected of described client and pseudo-access point, wherein, described inThe target MAC (Media Access Control) address of De-Authentication message is client mac address, source MACFor the MAC Address of pseudo-access point.
The invention provides a kind of pseudo-AP and detect blocking-up method, wireless device and router, pass through broadcast transmissionBeacon message, receives the Beacon message that periphery access point is broadcasted, the described Beacon that judgement receivesWhether the SSID carrying in message is identical with the SSID of self access point, when in described Beacon messageWhen the SSID of the SSID carrying and self access point is identical, judges in described Beacon message and whether takeBe with described encrypted fields, in the time there is not described encrypted fields in described Beacon message, detect transmissionThe access point of described Beacon message is pseudo-access point, and sends and cancel authentication to clientDe-Authentication message, to block being connected of described client and pseudo-access point. Realize pseudo-APEffective identification, by client is blocked, prevented that client is because connecting pseudo-AP, personal informationThe risk being stolen.
Brief description of the drawings
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, below will be to implementingIn example, the accompanying drawing of required use is briefly described, and apparently, the accompanying drawing in the following describes is onlySome embodiments of the present invention, for those of ordinary skill in the art, are not paying creative workPrerequisite under, also can obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the wireless network schematic diagram of the embodiment of the present invention;
Fig. 2 is the flow chart that a kind of pseudo-AP of the embodiment of the present invention detects blocking-up method;
Fig. 3 is the structural representation of a kind of wireless device of the embodiment of the present invention.
Detailed description of the invention
For above-mentioned purpose of the present invention, feature and advantage can be become apparent more, below in conjunction with accompanying drawing andThe present invention is further detailed explanation for detailed description of the invention.
As shown in Figure 1, be the minimal network topology signal of the WLAN that provides in the embodiment of the present inventionFigure, comprise two 802.11 WAPs (true access point AP1, camouflage access point AP2) and ifDry terminal STA 1, STA2 ... STAn, below in conjunction with the concrete operations of AP1 for, be situated between in detailThe pseudo-AP of one continuing in the embodiment of the present invention detects blocking-up method, as shown in Figure 2, comprising:
Step 201, broadcast transmission Beacon message;
Wherein, described Beacon message carries SSID and the encrypted fields of self access point; BeaconMessage fixed time broadcast sends, and is mainly used to the existence of informing network AP. Terminal and AP connectTime, also need to use Beacon. Terminal can scan Beacon by Scan, thereby learnsThe existence of AP. The information of carrying in general Beacon frame comprises hardware address (MAC Address), beaconInterval BeaconInterval, SSID etc.
The Beacon message of step 202, the broadcast of reception periphery access point;
The SSID carrying in the described Beacon message that step 203, judgement receive and self access pointWhether SSID is identical;
Step 204, when the SSID carrying in described Beacon message and the SSID phase of self access pointMeanwhile, judge in described Beacon message whether carry described encrypted fields;
Step 205, in the time there is not described encrypted fields in described Beacon message, detect send instituteThe access point of stating Beacon message is pseudo-access point, and sends and cancel authentication to clientDe-Authentication message, to block being connected of described client and pseudo-access point.
Wherein, the target MAC (Media Access Control) address of described De-Authentication message is client mac address,Source MAC is the MAC Address of pseudo-access point.
Wherein, when broadcast transmission Beacon message, can also comprise: every Preset Time, randomGenerate encrypted fields. Can avoid so pseudo-AP to forge equally encrypted fields.
Described in step 205, detect when sending the access point of described Beacon message and being pseudo-access point, toClient sends information, to remind the user network of client to have pseudo-AP. Can inform in advance like thisUser in this network carries out safety precaution in advance, careful input privacy information.
The invention provides a kind of pseudo-AP and detect blocking-up method, carry particular encryption field by broadcast transmissionBeacon message, receive the Beacon message of periphery access point broadcast, judgement receive described inWhether the SSID carrying in Beacon message is identical with the SSID of self access point, as described BeaconWhen the SSID of the SSID carrying in message and self access point is identical, judge in described Beacon messageWhether carry described encrypted fields, in the time there is not described encrypted fields in described Beacon message, detectThe access point that goes out to send described Beacon message is pseudo-access point, and sends and cancel authentication to clientDe-Authentication message, to block being connected of described client and pseudo-access point. Realize pseudo-APEffective identification, by client is blocked, prevented that client is because connecting pseudo-AP, personal informationThe risk being stolen.
The embodiment of the present invention also provides a kind of wireless device, as shown in Figure 3, comprising:
Sending module 310, for broadcast transmission Beacon message, described Beacon message carries selfThe SSID of access point and encrypted fields;
Receiver module 320, for receiving the Beacon message of periphery access point broadcast;
The first judge module 330, for judge SSID that the described Beacon message of reception carries withWhether the SSID of self access point is identical;
The second judge module 340, for judging that when described the first judge module described Beacon message takesWhen the SSID of band is identical with the SSID of self access point, judges in described Beacon message and whether carryDescribed encrypted fields;
Blocking-up module 350, in the time that described Beacon message does not exist described encrypted fields, detectsThe access point that goes out to send described Beacon message is pseudo-access point, and sends and cancel authentication to clientDe-Authentication message, to block being connected of described client and pseudo-access point, wherein, described inThe target MAC (Media Access Control) address of De-Authentication message is client mac address, source MACFor the MAC Address of pseudo-access point.
Wherein, described sending module 310 also, for every Preset Time, generates encrypted fields at random.
Described blocking-up module 350, also detects the access point that sends described Beacon message for pseudo-for working asWhen access point, send information to client, to remind the user network of client to have pseudo-AP.
The embodiment of the present invention provides again a kind of router, comprising:
Sending module, for broadcast transmission Beacon message, described Beacon message carries self accessSSID and the encrypted fields of point;
Receiver module, for receiving the Beacon message of periphery access point broadcast;
The first judge module, for judging SSID that the described Beacon message of reception carries and selfWhether the SSID of access point is identical;
The second judge module, for judging what described Beacon message carried when described the first judge moduleWhen the SSID of SSID and self access point is identical, described in judging and whether carrying in described Beacon messageEncrypted fields;
Blocking-up module, in the time that described Beacon message does not exist described encrypted fields, detection is set outThe access point that send described Beacon message is pseudo-access point, and sends and cancel authentication to clientDe-Authentication message, to block being connected of described client and pseudo-access point, wherein, described inThe target MAC (Media Access Control) address of De-Authentication message is client mac address, source MACFor the MAC Address of pseudo-access point.
Through the above description of the embodiments, those skilled in the art can be well understood to the present inventionThe mode that can add essential hardware platform by software realizes, and can certainly all come real by hardwareExecute, but in a lot of situation, the former is better embodiment. Based on such understanding, technical side of the present inventionWhat case contributed to background technology can embody with the form of software product in whole or in part, this meterCalculation machine software product can be stored in storage medium, as ROM/RAM, magnetic disc, CD etc., if compriseDry instruction in order to make a computer equipment (can be personal computer, server, or the network equipmentDeng) carry out the method described in some part of each embodiment of the present invention or embodiment.
Above the present invention is described in detail, has applied specific case herein to of the present invention formerReason and embodiment are set forth, and the explanation of above embodiment is just of the present invention for helping to understandMethod and core concept thereof; Meanwhile, for one of ordinary skill in the art, according to think of of the present inventionThink, all will change in specific embodiments and applications, in sum, this descriptionContent should not be construed as limitation of the present invention.

Claims (7)

1. pseudo-AP detects a blocking-up method, it is characterized in that, comprising:
Broadcast transmission Beacon message, described Beacon message carries the SSID of self access point and addsClose field;
Receive the Beacon message of periphery access point broadcast;
Whether judge the SSID of the SSID that carries and self access point in the described Beacon message receivingIdentical;
In the time that the SSID of the SSID carrying in described Beacon message and self access point is identical, judgementIn described Beacon message, whether carry described encrypted fields;
In the time there is not described encrypted fields in described Beacon message, detect and send described BeaconThe access point of message is pseudo-access point, and sends and cancel authentication De-Authentication to clientMessage, to block being connected of described client and pseudo-access point, wherein, described De-AuthenticationThe target MAC (Media Access Control) address of message is client mac address, the MAC that source MAC is pseudo-access pointAddress.
2. pseudo-AP according to claim 1 detects blocking-up method, it is characterized in that, also comprises:
Every Preset Time, generate at random encrypted fields.
3. pseudo-AP according to claim 1 detects blocking-up method, it is characterized in that described detectionWhen the access point that goes out to send described Beacon message is pseudo-access point, send information to client, withRemind the user network of client to have pseudo-AP.
4. a wireless device, is characterized in that, comprising:
Sending module, for broadcast transmission Beacon message, described Beacon message carries self accessSSID and the encrypted fields of point;
Receiver module, for receiving the Beacon message of periphery access point broadcast;
The first judge module, for judging SSID that the described Beacon message of reception carries and selfWhether the SSID of access point is identical;
The second judge module, for judging what described Beacon message carried when described the first judge moduleWhen the SSID of SSID and self access point is identical, described in judging and whether carrying in described Beacon messageEncrypted fields;
Blocking-up module, in the time that described Beacon message does not exist described encrypted fields, detection is set outThe access point that send described Beacon message is pseudo-access point, and sends and cancel authentication to clientDe-Authentication message, to block being connected of described client and pseudo-access point, wherein, described inThe target MAC (Media Access Control) address of De-Authentication message is client mac address, source MACFor the MAC Address of pseudo-access point.
5. wireless device according to claim 4, is characterized in that, described sending module also forEvery Preset Time, generate at random encrypted fields.
6. wireless device according to claim 4, is characterized in that, described blocking-up module, also usesIn when detecting when sending the access point of described Beacon message and being pseudo-access point, send prompting to clientInformation, to remind the user network of client to have pseudo-AP.
7. a router, is characterized in that, comprising:
Sending module, for broadcast transmission Beacon message, described Beacon message carries self access pointSSID and encrypted fields;
Receiver module, for receiving the Beacon message of periphery access point broadcast;
The first judge module, for the SSID and self access that judge that the described Beacon message of reception carriesWhether the SSID of point is identical;
The second judge module, for judging when described the first judge module the SSID that described Beacon message carriesWhen identical with the SSID of self access point, judge in described Beacon message whether carry described encrypted fields;
Blocking-up module, in the time that described Beacon message does not exist described encrypted fields, detects and sends instituteThe access point of stating Beacon message is pseudo-access point, and sends and cancel authentication to clientDe-Authentication message, to block being connected of described client and pseudo-access point, wherein, described inThe target MAC (Media Access Control) address of De-Authentication message is client mac address, and source MAC is that puppet connectsEnter MAC Address a little.
CN201610173358.3A 2016-03-25 2016-03-25 False-AP detecting and blocking method, wireless device and router Pending CN105657713A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610173358.3A CN105657713A (en) 2016-03-25 2016-03-25 False-AP detecting and blocking method, wireless device and router

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610173358.3A CN105657713A (en) 2016-03-25 2016-03-25 False-AP detecting and blocking method, wireless device and router

Publications (1)

Publication Number Publication Date
CN105657713A true CN105657713A (en) 2016-06-08

Family

ID=56494331

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610173358.3A Pending CN105657713A (en) 2016-03-25 2016-03-25 False-AP detecting and blocking method, wireless device and router

Country Status (1)

Country Link
CN (1) CN105657713A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131849A (en) * 2016-06-23 2016-11-16 深圳市百米生活股份有限公司 The detection of a kind of rogue AP in wireless network and blocking-up method
CN106851646A (en) * 2016-12-31 2017-06-13 北京红山瑞达科技有限公司 A kind of wifi accesses safety detection method and device, wifi access systems
CN107094298A (en) * 2017-05-11 2017-08-25 北京囡宝科技有限公司 Take precautions against module, wireless network access device and the method for illegal wireless network insertion
CN107197456A (en) * 2017-06-16 2017-09-22 中国海洋大学 A kind of client-based identification puppet AP detection method and detection means
CN107896372A (en) * 2017-11-07 2018-04-10 河南溯源通信科技有限公司 One kind fishing hot spot detecting method, device and router
CN108134996A (en) * 2017-12-22 2018-06-08 成都飞鱼星科技股份有限公司 A kind of detection of illegal wireless access point and blocking-up method
CN108540979A (en) * 2018-04-04 2018-09-14 北京邮电大学 Pseudo- AP detection method and device based on fingerprint characteristic
CN110312253A (en) * 2018-03-20 2019-10-08 杭州海康威视数字技术股份有限公司 A kind of method for network access, apparatus and system
CN110475274A (en) * 2018-05-09 2019-11-19 北京智慧图科技有限责任公司 The recognition methods of exception AP in a kind of mobile positioning technique
WO2020093860A1 (en) * 2018-11-09 2020-05-14 华为技术有限公司 Fake network device identification method and communication apparatus
CN111417120A (en) * 2020-03-27 2020-07-14 中国人民解放军战略支援部队信息工程大学 WiFi hotspot and terminal communication blocking method based on de-authentication message reconstruction
CN113411809A (en) * 2021-07-30 2021-09-17 浙江大华技术股份有限公司 Method and device for preventing access pseudo AP and AP hijacking

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030185244A1 (en) * 2002-03-29 2003-10-02 Miles Wu Detecting a counterfeit access point in a wireless local area network
CN1996893A (en) * 2006-12-25 2007-07-11 杭州华为三康技术有限公司 Method, device and system for monitoring illegal access point in the wireless LAN
CN101079741A (en) * 2007-06-29 2007-11-28 杭州华三通信技术有限公司 Access point, access controller and method for monitoring illegal access

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030185244A1 (en) * 2002-03-29 2003-10-02 Miles Wu Detecting a counterfeit access point in a wireless local area network
CN1996893A (en) * 2006-12-25 2007-07-11 杭州华为三康技术有限公司 Method, device and system for monitoring illegal access point in the wireless LAN
CN101079741A (en) * 2007-06-29 2007-11-28 杭州华三通信技术有限公司 Access point, access controller and method for monitoring illegal access

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131849A (en) * 2016-06-23 2016-11-16 深圳市百米生活股份有限公司 The detection of a kind of rogue AP in wireless network and blocking-up method
CN106851646A (en) * 2016-12-31 2017-06-13 北京红山瑞达科技有限公司 A kind of wifi accesses safety detection method and device, wifi access systems
CN107094298A (en) * 2017-05-11 2017-08-25 北京囡宝科技有限公司 Take precautions against module, wireless network access device and the method for illegal wireless network insertion
CN107197456B (en) * 2017-06-16 2020-06-02 中国海洋大学 Detection method and detection device for identifying pseudo AP (access point) based on client
CN107197456A (en) * 2017-06-16 2017-09-22 中国海洋大学 A kind of client-based identification puppet AP detection method and detection means
CN107896372A (en) * 2017-11-07 2018-04-10 河南溯源通信科技有限公司 One kind fishing hot spot detecting method, device and router
CN108134996A (en) * 2017-12-22 2018-06-08 成都飞鱼星科技股份有限公司 A kind of detection of illegal wireless access point and blocking-up method
CN110312253A (en) * 2018-03-20 2019-10-08 杭州海康威视数字技术股份有限公司 A kind of method for network access, apparatus and system
CN110312253B (en) * 2018-03-20 2022-08-09 杭州海康威视数字技术股份有限公司 Network access method, device and system
CN108540979A (en) * 2018-04-04 2018-09-14 北京邮电大学 Pseudo- AP detection method and device based on fingerprint characteristic
CN110475274A (en) * 2018-05-09 2019-11-19 北京智慧图科技有限责任公司 The recognition methods of exception AP in a kind of mobile positioning technique
WO2020093860A1 (en) * 2018-11-09 2020-05-14 华为技术有限公司 Fake network device identification method and communication apparatus
CN111417120A (en) * 2020-03-27 2020-07-14 中国人民解放军战略支援部队信息工程大学 WiFi hotspot and terminal communication blocking method based on de-authentication message reconstruction
CN113411809A (en) * 2021-07-30 2021-09-17 浙江大华技术股份有限公司 Method and device for preventing access pseudo AP and AP hijacking

Similar Documents

Publication Publication Date Title
CN105657713A (en) False-AP detecting and blocking method, wireless device and router
US9497699B2 (en) Dedicated channel for fast initial link setup in a wireless network
EP3014842B1 (en) Validating presence of a communication device using a wireless local area network
US10237738B2 (en) Wi-Fi privacy in an access point using media access control address randomization
JP7115636B2 (en) Instructions for updating parameters related to integrated access control
US20160135041A1 (en) Wi-fi privacy in a wireless station using media access control address randomization
JP7088414B2 (en) Steps to update parameters related to unified access control
JP7521564B2 (en) First network node, second network node, and methods and programs thereof
WO2015142247A1 (en) Authentication in device to device discovery
US20180198767A1 (en) Method and device for performing proximity service communication in wireless communication system
US9491621B2 (en) Systems and methods for fast initial link setup security optimizations for PSK and SAE security modes
US9686666B2 (en) Method and arrangement for handling D2D communication
JP2018501717A (en) System and method for effective access point discovery
US20220408253A1 (en) Method and System for Authenticating a Base Station
US20240137756A1 (en) Procedure to update the parameters related to unified access control
CA3051777A1 (en) Encrypting data in a pre-associated state
US10206110B1 (en) Techniques for network security
US9739867B2 (en) Methods and apparatus for determining relationships in heterogeneous networks
WO2017095303A1 (en) Provisioning node, communication node and methods therein for handling key identifiers in wireless communication
US9510374B2 (en) Entity of a mobile cellular network
CN111586694B (en) Malignant paging monitoring method, core network server and communication system
CN111132162B (en) Method and device for acquiring terminal information
US20220393877A1 (en) Cryptographic Security Mechanism for Groupcast Communication
JP2019505132A (en) Method and apparatus for obtaining user equipment identifier and method and apparatus for transmitting user equipment identifier

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160608