CN102761559B - Network security based on private data shares method and communication terminal - Google Patents

Network security based on private data shares method and communication terminal Download PDF

Info

Publication number
CN102761559B
CN102761559B CN201210271948.1A CN201210271948A CN102761559B CN 102761559 B CN102761559 B CN 102761559B CN 201210271948 A CN201210271948 A CN 201210271948A CN 102761559 B CN102761559 B CN 102761559B
Authority
CN
China
Prior art keywords
private data
virtual disk
encryption
disk files
communication terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210271948.1A
Other languages
Chinese (zh)
Other versions
CN102761559A (en
Inventor
曾洪宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Upper Marine Infotech Share Co Ltd Of Interrogating
Original Assignee
Upper Marine Infotech Share Co Ltd Of Interrogating
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Upper Marine Infotech Share Co Ltd Of Interrogating filed Critical Upper Marine Infotech Share Co Ltd Of Interrogating
Priority to CN201210271948.1A priority Critical patent/CN102761559B/en
Publication of CN102761559A publication Critical patent/CN102761559A/en
Application granted granted Critical
Publication of CN102761559B publication Critical patent/CN102761559B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention is applicable to computer network security technology field, and provide a kind of network security based on private data and share method and communication terminal, described method comprises step to be had: by virtual for file for virtual disk files; By predetermined driving and agreement, virtual disk files is stored in server; After communication terminal is encrypted automatically to private data, by encryption private data by Internet Transmission to server, then will encryption private data write virtual disk files; From the virtual disk files of server, read the private data of encryption, by the private data of encryption by Internet Transmission to communication terminal, then send application program to after automatically being deciphered by the private data of encryption.Whereby, present invention achieves the stereoscopic protective system that a kind of private data network is shared, not only ensure that the storage security of private data when network is shared and Internet Transmission safety, and facilitate easy-to-use, comprehensive high-efficiency, achieve the real-time synchronization of shared data simultaneously.

Description

Network security based on private data shares method and communication terminal
Technical field
The present invention relates to computer network security technology field, for the fail safe protection of private data when network is shared, particularly relate to a kind of network security based on private data and share method and communication terminal.
Background technology
Along with the develop rapidly of computer and information technology especially network technology, data message has become the most key resource of entire society, and enterprises and institutions need the data message of share and access to get more and more, and more and more important.Therefore, how to ensure the information security of private data when network is shared, become significant problem urgently to be resolved hurrily.At present, in order to protect the safety of shared private data Network Based, the following two kinds of methods of main employing: is be encrypted data.Adopt cryptographic algorithm to be encrypted data to store and transmission, make it be difficult to analyze decoding, realize maintaining secrecy and safety of private data.Two is arrange access rights to data, and conduct interviews control.Different access rights are set for different users, and before its access private data, legitimate verification are carried out to its identity.Adopt the system that realizes of above-mentioned two kinds of methods to have a lot, substantially partly can solve problem of data safety, but also all Shortcomings:
1) adopting encryption technology, the private data be stored on disk being encrypted, when being decrypted by during access to netwoks private data.This method ensure that the storage security of private data, but the fail safe of private data in Internet Transmission is not processed, therefore, the leakage problem of private data in network transmission process may be appeared at.
2) adopt encryption technology, the private data of Internet Transmission is encrypted, thus ensure the fail safe of private data in network transmission process.This implementation method ensure that the fail safe of the Internet Transmission of private data, but does not process the fail safe that private data stores, and therefore, once the disk unit storing private data exposes, the leakage of private data is apparent.
3) encryption technology is adopted, not only to the private data encryption be stored on disk unit, and to the private data encryption in Internet Transmission.Although the method can ensure storage security and the Internet Transmission safety of private data, owing to carrying out too much encryption and decryption process to data, systematic function is difficult to ensure.
4) adopt access control, the private data for different user arranges different access rights, to ensure that each user can only access the private data of oneself.Obviously, this implementation method can not ensure storage security and the Internet Transmission safety of private data.
5) encryption technology and access control is adopted, not only the private data encryption be stored on disk unit, and the private data encryption in Internet Transmission, arrange different access rights for different user, the method can solve the safe sharing problem of private data preferably simultaneously.But the actualizing technology of employing the method is more, broad categories, all the time solution of neither one the whole series.
In summary, obviously there is inconvenience and defect in actual use, so be necessary to be improved in the Sharing Technology in Network of existing private data.
Summary of the invention
For above-mentioned defect, a kind of network security based on private data is the object of the present invention is to provide to share method and communication terminal, it achieves the stereoscopic protective system that a kind of private data network is shared, not only ensure that the storage security of private data when network is shared and Internet Transmission safety, and facilitate easy-to-use, comprehensive high-efficiency, achieve the real-time synchronization of shared data simultaneously.
To achieve these goals, the invention provides a kind of network security based on private data and share method, be applied to communication terminal, described method comprises step to be had:
By virtual for file be virtual disk files;
By predetermined driving and agreement, described virtual disk files is stored in server;
After communication terminal is encrypted automatically to private data, by encryption described private data by Internet Transmission to described server, then by encrypt described private data write described virtual disk files;
From the described virtual disk files of described server, read the described private data of encryption, the described private data of encryption is passed through described Internet Transmission to described communication terminal, then send application program to after automatically being deciphered by the described private data of encryption.
Share method according to network security of the present invention, described driving is that file redirection device drives, and described agreement is SMB agreement.
Share method according to network security of the present invention, also comprise:
By authentication, described virtual disk files is conducted interviews control.
Share method according to network security of the present invention, described by authentication to described virtual disk files conduct interviews control step also comprise:
By described authentication and the inline HOOK of connected applications routine interface and can the plug-in part technology of secondary development, fine-granularity access control is carried out to described virtual disk files.
Share method according to network security of the present invention, described authentication is the two-factor authentication of USBKey.
The present invention also provides a kind of communication terminal, includes:
Virtual disk module, for by virtual for file be virtual disk files;
File storage module, for being stored in server by predetermined driving and agreement by described virtual disk files;
Data write. module, for after communication terminal is encrypted automatically to private data, by encryption described private data by Internet Transmission to described server, then by encrypt described private data write described virtual disk files;
Data read module, for reading the described private data of encryption from the described virtual disk files of described server, the described private data of encryption is passed through described Internet Transmission to described communication terminal, then send application program to after automatically being deciphered by the described private data of encryption.
According to communication terminal of the present invention, described driving is that file redirection device drives, and described agreement is SMB agreement.
According to communication terminal of the present invention, also comprise:
Access control module, for conducting interviews control to described virtual disk files by authentication.
According to communication terminal of the present invention, described access control module also for by described authentication and the inline HOOK of connected applications routine interface and can the plug-in part technology of secondary development, carries out fine-granularity access control to described virtual disk files.
According to communication terminal of the present invention, described authentication is the two-factor authentication of USBKey.
The invention belongs to computer network security field, for the fail safe protection of private data when network is shared.The present invention first by virtual for certain file be virtual disk files, then by predetermined driving and agreement, virtual disk files is stored in server; The ablation process of described private data is: after communication terminal is encrypted automatically to the private data needing network to share, the private data of encryption is write virtual disk files by Internet Transmission to server; The reading process of described private data is: the private data reading encryption from the virtual disk files of server, by Internet Transmission to communication terminal, automatically send application program to after being deciphered by the private data of encryption, application program can carry out normal running to the private data after deciphering again.The present invention adopts transparent encipher-decipher method to private data, and combined with virtual disk, related protocol and Driving technique achieve the stereoscopic protective system that a kind of private data network is shared, it not only ensure that the storage security of private data when network is shared and Internet Transmission safety, and facilitates easy-to-use, comprehensive high-efficiency.In addition, because the reading of virtual disk files and write are all carry out for the private data file of network, thus the real-time synchronization realizing private data is easy to.Preferably; the present invention also needs to carry out authentication to the user of access private data; and in conjunction with the inline HOOK of API and can the plug-in part technology of secondary development; the legitimacy of the user identity of visit data can not only be ensured; and the fine granularity achieving user operation file permission controls, thus protect the safety of file better.
Accompanying drawing explanation
Fig. 1 is the structural representation of communication terminal of the present invention.
Fig. 2 is the theory diagram of private data encryption and decryption of the present invention.
Fig. 3 is the flow chart that the network security that the present invention is based on private data shares method.
Fig. 4 is the preferred flow charts that the network security that the present invention is based on private data shares method.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Fig. 1 is the structural representation of communication terminal of the present invention, communicate to connect between described communication terminal 100 and server 200, described communication terminal 100 can be computer, mobile phone, PDA(PersonalDigitalAssistant, personal digital assistant), panel computer etc., and described communication terminal 100 comprises virtual disk module 10, file storage module 20, Data write. module 30 and data read module 40, wherein:
Virtual disk module 10, for by virtual for certain file be virtual disk files.
File storage module 20, for being stored in server 200 by predetermined driving and agreement by virtual disk files.Preferably, described driving is LanmanRedirector(file redirection device) drive, LanmanRedirector drives and is used for the particular location of the file redirection of access to file place network.Described agreement is SMB(ServerMessageBlock, SMB agreement) agreement, described SMB agreement is used for transfer files content.
Data write. module 30, for after communication terminal 100 pairs of private datas are encrypted automatically, by encryption private data by Internet Transmission to server 200, then will encryption private data write virtual disk files.Preferably, the encryption of private data is adopted to the AES(AdvancedEncryptionStandard of 256 high strength, Advanced Encryption Standard) cryptographic algorithm.
Data read module 40, for reading the private data of encryption in the virtual disk files from server 200, by encryption private data by Internet Transmission to communication terminal 100, automatically send application program to after being deciphered by the private data of encryption, described application program can carry out normal running to the private data after deciphering again.
Virtual disk is a kind of virtual for the file technology for disk, driven by LanmanRedirector again and SMB agreement etc., can virtual disk files be deposited on server 200 in a network, and in conjunction with encryption and decryption technology, the transparent encryption and decryption of virtual disk files can be realized, not only ensure that the storage security of private data when network is shared and Internet Transmission safety, and implement and facilitate easy-to-use, comprehensive high-efficiency.
The network wanting system to solve private data shares safety problem, not only to ensure storage security and the Internet Transmission safety of private data, and authentication (i.e. access control) to be carried out to the user of this private data of access, therefore, described communication terminal 100 preferably also comprises:
Access control module 50, for conducting interviews control to virtual disk files by authentication.Described authentication is preferably USBKey certification, based on the identity identifying technology of USBKey, is a kind of not only convenient but also safe identity identifying technology grown up in recent years, adopts software and hardware to combine, solve the contradiction between fail safe and ease for use well.Be more preferably, described authentication is the two-factor authentication of USBKey, user is to pass through the two-factor authentication based on USBKey, the hardware (such as USB flash disk etc.) that not only will have USBKey but also the password (PIN value) needing to know USBKey, thus effectively ensure the legitimacy of user identity.
Be more preferably, access control module 50 is also for by authentication and in conjunction with API(ApplicationProgrammingInterface, application programming interfaces) inline HOOK(hook) and can the plug-in part technology of secondary development, to realize carrying out fine-granularity access control to virtual disk files.Based on the plug-in part technology of the inline HOOK of API and secondary development, can realize monitoring the whole operating process of virtual disk files, namely the Life cycle monitoring of virtual disk files, comprises the establishment of virtual disk files, reading, amendment, separately deposits, copies, prints and deletion etc.This technology can not only ensure the legitimacy of the user identity of visit data; and the fine granularity achieving user operation file permission controls, such as: user can only file reading A, amendment file B; copy and mimeograph documents C etc., thus the safety of protected file better.
The present embodiment have employed data encryption and identity identifying method; combined with virtual disk, SMB agreement, API inline HOOK mechanism and can the plug-in part technology of secondary development, achieve a set ofly be easy to manage, be easy to use, three-dimensional safety system that prevention and control fine size and efficient private data Network Based are shared.
Virtual disk module 10 in described communication terminal 100, file storage module 20, Data write. module 30, data read module 40 and access control module 50 can be the software units being built in communication terminal 100, hardware cell or software and hardware combining unit.Described server 200 is preferably file server.
Fig. 2 is the theory diagram of private data encryption and decryption of the present invention, wherein:
The process of private data write virtual disk files is; private data is generated in the application program such as notepad, office software, graphics software of communication terminal 100; described private data is encrypted to carry out data protection, then the private data after encryption is write virtual disk files by Internet Transmission to server 200.
The process reading private data from virtual disk files is, the private data of encryption is read from the virtual disk files of server 200, by Internet Transmission to communication terminal 100, then send the application programs such as notepad, office software, graphics software to after automatically being deciphered by the private data of encryption.
Because the process of private data encryption was carried out before private data is transferred to network, and the process of private data deciphering is carried out after private data is transferred to communication terminal 100, therefore, in the process of whole Internet Transmission, private data is all in encrypted state; Again in conjunction with encryption and decryption process, the storage security of private data when network is shared and Internet Transmission safety can be protected easily and efficiently.Further, the encryption process of whole private data, without the need to user intervention, achieves the transparent encryption and decryption of virtual disk files, enhances the experience of user.
Fig. 3 is the flow chart that the network security that the present invention is based on private data shares method, and it realizes by communication terminal 100 as shown in Figure 1, comprises step as follows:
Step S301, by virtual for file be virtual disk files.
Step S302, is stored in server 200 by predetermined driving and agreement by virtual disk files.Preferably, described driving is that LanmanRedirector drives; Described LanmanRedirector drives and is used for the particular location of the file redirection of access to file place network.Described agreement is SMB agreement, and described SMB agreement is used for transfer files content.
Step S303, the write step of private data: after communication terminal 100 pairs of private datas are encrypted automatically, by encryption private data by Internet Transmission to server 200, then will encryption private data write virtual disk files.Preferably, the encryption of private data is adopted to the AES encryption algorithm of 256 high strength.
Step S304, the read step of private data: the private data reading encryption from the virtual disk files of server 200, by encryption private data by Internet Transmission to communication terminal 100, automatically send application program to after being deciphered by the private data of encryption, described application program can carry out normal running to the private data after deciphering again.
Fig. 4 is the preferred flow charts that the network security that the present invention is based on private data shares method, and it realizes by communication terminal 100 as shown in Figure 1, comprises step as follows:
Step S401, by virtual for file be virtual disk files.
Step S402, is stored in server 200 by predetermined driving and agreement by virtual disk files.Preferably, described driving is that LanmanRedirector drives, and described agreement is server 200 block of information agreement.
Step S403, to be conducted interviews control to virtual disk files by authentication.Described authentication is preferably USBKey certification, based on the identity identifying technology of USBKey, is a kind of not only convenient but also safe identity identifying technology grown up in recent years, adopts software and hardware to combine, solve the contradiction between fail safe and ease for use well.Be more preferably, described authentication is the two-factor authentication of USBKey, user is to pass through the two-factor authentication based on USBKey, the hardware (such as USB flash disk etc.) that not only will have USBKey but also the password (PIN value) needing to know USBKey, thus effectively ensure the legitimacy of user identity.Be more preferably, by authentication and in conjunction with the inline HOOK(hook of API) and can the plug-in part technology of secondary development, fine-granularity access control is carried out to virtual disk files.Based on the plug-in part technology of the inline HOOK of API and secondary development, can realize monitoring the whole operating process of virtual disk files, namely the Life cycle monitoring of virtual disk files, comprises the establishment of virtual disk files, reading, amendment, separately deposits, copies, prints and deletion etc.This technology can not only ensure the legitimacy of the user identity of visit data; and the fine granularity achieving user operation file permission controls, such as: user can only file reading A, amendment file B; copy and mimeograph documents C etc., thus the safety of protected file better.
Step S404, after communication terminal 100 pairs of private datas are encrypted automatically, by encryption private data by Internet Transmission to server 200, then will encryption private data write virtual disk files.
Step S405, the private data of encryption is read from the virtual disk files of server 200, by encryption private data by Internet Transmission to communication terminal 100, automatically send application program to after being deciphered by the private data of encryption, described application program can carry out normal running to the private data after deciphering again.
In sum, the invention belongs to computer network security field, for the fail safe protection of private data when network is shared.The present invention first by virtual for certain file be virtual disk files, then by predetermined driving and agreement, virtual disk files is stored in server; The ablation process of described private data is: after communication terminal is encrypted automatically to the private data needing network to share, the private data of encryption is write virtual disk files by Internet Transmission to server; The reading process of described private data is: the private data reading encryption from the virtual disk files of server, by Internet Transmission to communication terminal, automatically send application program to after being deciphered by the private data of encryption, application program can carry out normal running to the private data after deciphering again.The present invention adopts transparent encipher-decipher method to private data, and combined with virtual disk, related protocol and Driving technique achieve the stereoscopic protective system that a kind of private data network is shared, it not only ensure that the storage security of private data when network is shared and Internet Transmission safety, and facilitates easy-to-use, comprehensive high-efficiency.In addition, because the reading of virtual disk files and write are all carry out for the private data file of network, thus the real-time synchronization realizing private data is easy to.Preferably; the present invention also needs to carry out authentication to the user of access private data; and in conjunction with the inline HOOK of API and can the plug-in part technology of secondary development; the legitimacy of the user identity of visit data can not only be ensured; and the fine granularity achieving user operation file permission controls, thus protect the safety of file better.
Certainly; the present invention also can have other various embodiments; when not deviating from the present invention's spirit and essence thereof; those of ordinary skill in the art are when making various corresponding change and distortion according to the present invention, but these change accordingly and are out of shape the protection range that all should belong to the claim appended by the present invention.

Claims (4)

1. the network security based on private data shares a method, it is characterized in that, is applied to communication terminal, and described method comprises step to be had:
By virtual for file be virtual disk files;
By predetermined driving and agreement, described virtual disk files is stored in server;
After communication terminal is encrypted automatically to private data, by encryption described private data by Internet Transmission to described server, then by encrypt described private data write described virtual disk files;
From the described virtual disk files of described server, read the described private data of encryption, the described private data of encryption is passed through described Internet Transmission to described communication terminal, then send application program to after automatically being deciphered by the described private data of encryption;
Also comprise: by authentication, described virtual disk files is conducted interviews control;
Described authentication is the two-factor authentication of USBKey;
Described by authentication to described virtual disk files conduct interviews control step also comprise:
By described authentication and the inline HOOK of connected applications routine interface and can the plug-in part technology of secondary development, fine-granularity access control is carried out to described virtual disk files.
2. network security according to claim 1 shares method, it is characterized in that, described driving is that file redirection device drives, and described agreement is SMB agreement.
3. a communication terminal, is characterized in that, includes:
Virtual disk module, for by virtual for file be virtual disk files;
File storage module, for being stored in server by predetermined driving and agreement by described virtual disk files;
Data write. module, for after communication terminal is encrypted automatically to private data, by encryption described private data by Internet Transmission to described server, then by encrypt described private data write described virtual disk files;
Data read module, for reading the described private data of encryption from the described virtual disk files of described server, the described private data of encryption is passed through described Internet Transmission to described communication terminal, then send application program to after automatically being deciphered by the described private data of encryption;
Also comprise: access control module, for being conducted interviews control to described virtual disk files by authentication;
Described authentication is the two-factor authentication of USBKey;
Described access control module also for by described authentication and the inline HOOK of connected applications routine interface and can the plug-in part technology of secondary development, carries out fine-granularity access control to described virtual disk files.
4. communication terminal according to claim 3, is characterized in that, described driving is that file redirection device drives, and described agreement is SMB agreement.
CN201210271948.1A 2012-08-02 2012-08-02 Network security based on private data shares method and communication terminal Active CN102761559B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210271948.1A CN102761559B (en) 2012-08-02 2012-08-02 Network security based on private data shares method and communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210271948.1A CN102761559B (en) 2012-08-02 2012-08-02 Network security based on private data shares method and communication terminal

Publications (2)

Publication Number Publication Date
CN102761559A CN102761559A (en) 2012-10-31
CN102761559B true CN102761559B (en) 2016-02-17

Family

ID=47055880

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210271948.1A Active CN102761559B (en) 2012-08-02 2012-08-02 Network security based on private data shares method and communication terminal

Country Status (1)

Country Link
CN (1) CN102761559B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021319B (en) * 2013-12-03 2017-02-15 山东渔翁信息技术股份有限公司 Method and device for preventing read-write data from being copied
CN104615946A (en) * 2015-02-13 2015-05-13 成都卫士通信息安全技术有限公司 Virtual encrypted disk data protection system and method based on intelligent mobile terminals
CN107770139B (en) * 2016-08-23 2020-05-19 北京计算机技术及应用研究所 SAMBA identity authentication method based on third-party USBKEY equipment
CN108229190B (en) * 2018-01-02 2021-10-22 北京亿赛通科技发展有限责任公司 Transparent encryption and decryption control method, device, program, storage medium and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889426A (en) * 2005-06-30 2007-01-03 联想(北京)有限公司 Method and system for realizing network safety storaging and accessing
CN101923678A (en) * 2010-07-30 2010-12-22 武汉天喻信息产业股份有限公司 Data security protection method of enterprise management software
CN102223359A (en) * 2010-07-29 2011-10-19 上海华御信息技术有限公司 Network hard disk backup file data safe system and method based on virtual disk

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889426A (en) * 2005-06-30 2007-01-03 联想(北京)有限公司 Method and system for realizing network safety storaging and accessing
CN102223359A (en) * 2010-07-29 2011-10-19 上海华御信息技术有限公司 Network hard disk backup file data safe system and method based on virtual disk
CN101923678A (en) * 2010-07-30 2010-12-22 武汉天喻信息产业股份有限公司 Data security protection method of enterprise management software

Also Published As

Publication number Publication date
CN102761559A (en) 2012-10-31

Similar Documents

Publication Publication Date Title
RU2589861C2 (en) System and method of user data encryption
EP2830282B1 (en) Storage method, system and apparatus
US9608813B1 (en) Key rotation techniques
WO2017097041A1 (en) Data transmission method and device
US8997179B2 (en) Shared secret identification for secure communication
US20140281520A1 (en) Secure cloud data sharing
CN105072107A (en) System and method for enhancing data transmission and storage security
CN1773994A (en) Method for realizing data safety storing business
CN102638568A (en) Cloud storage system and data management method thereof
CN113541935B (en) Encryption cloud storage method, system, equipment and terminal supporting key escrow
CN103955654A (en) USB (Universal Serial Bus) flash disk secure storage method based on virtual file system
CN103546421A (en) Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system
CN110445840B (en) File storage and reading method based on block chain technology
CN102025744A (en) Import and export system of virtual machine image in cloud computing
CN102024123A (en) Method and device for importing mirror image of virtual machine in cloud calculation
CN104270242A (en) Encryption and decryption device used for network data encryption transmission
CN112383391A (en) Data security protection method based on data attribute authorization, storage medium and terminal
CN105468940A (en) Software protection method and apparatus
CN103413100A (en) File security protection system
CN102761559B (en) Network security based on private data shares method and communication terminal
CN104065623A (en) Information processing method, trust server and cloud server
CN103207976A (en) Mobile storage file leakage-preventing method and confidential U-disk based on same
CN103873245B (en) Dummy machine system data ciphering method and equipment
Hu Study of file encryption and decryption system using security key
Hussien et al. Scheme for ensuring data security on cloud data storage in a semi-trusted third party auditor

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent for invention or patent application
CB02 Change of applicant information

Address after: 201203, 18 building, 88 Darwin Road, Zhangjiang hi tech park, Shanghai, Pudong New Area, 1

Applicant after: The upper marine infotech share company limited of interrogating

Address before: 201203, 18 building, 88 Darwin Road, Zhangjiang hi tech park, Shanghai, Pudong New Area, 1

Applicant before: Shanghai Suninfo Technology Co., Ltd.

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: SHANGHAI SUNINFO TECHNOLOGY LTD. TO: SHANGHAI SUNINFO TECHNOLOGY CO., LTD.

C14 Grant of patent or utility model
GR01 Patent grant