CN102819723B - Method and system for detecting malicious two-dimension codes - Google Patents

Method and system for detecting malicious two-dimension codes Download PDF

Info

Publication number
CN102819723B
CN102819723B CN201110440506.0A CN201110440506A CN102819723B CN 102819723 B CN102819723 B CN 102819723B CN 201110440506 A CN201110440506 A CN 201110440506A CN 102819723 B CN102819723 B CN 102819723B
Authority
CN
China
Prior art keywords
quick response
malice
response code
binary data
detected
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110440506.0A
Other languages
Chinese (zh)
Other versions
CN102819723A (en
Inventor
康学斌
张冲
杨波涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Antiy Technology Group Co Ltd
Original Assignee
Harbin Antiy Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Antiy Technology Co Ltd filed Critical Harbin Antiy Technology Co Ltd
Priority to CN201110440506.0A priority Critical patent/CN102819723B/en
Publication of CN102819723A publication Critical patent/CN102819723A/en
Application granted granted Critical
Publication of CN102819723B publication Critical patent/CN102819723B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a method for detecting malicious two-dimension codes. The method comprises identifying malicious two-dimension code graphs to obtain binary data, and calculating and saving HASH values of the binary data of the malicious two-dimension codes; extracting fragment features of the malicious two-dimension codes; obtaining binary data and the length of the binary data of two-dimension code graphs to be detected; calculating complete HASH values of the binary data of the two-dimension code graphs to be detected, matching the full HASH values with the HASH values of the binary data, fragment features and contained uniform resource locators (URLs) of the malicious two-dimension codes, and determining whether the two-dimension codes to be detected are malicious two-dimension codes. The invention further provides a system for detecting malicious two-dimension codes. According to the technical scheme, the binary data are converted through the identification of the two-dimension code graphs, and the feature detection is performed on the binary data to detect the malicious two-dimension codes of the URL.

Description

A kind of malice Quick Response Code detection method and system
Technical field
The present invention relates to this anti-virus field, particularly relate to a kind of malice Quick Response Code detection method and system.
Background technology
Current two-dimension is applied in every field fast widely, but some Quick Response Code recognizers do not have safety detection, detection at present for malice Quick Response Code does not also have disclosed method, but the Quick Response Code form of malice occurs, be mainly manifested on the left-handed URL of bag, must have the leak principle of generality of resolving the form spilling caused for data input, the Quick Response Code of resolving the malice form of the flooding in storehouse for some Quick Response Code also there will be simultaneously.
Summary of the invention
Due to the widespread use of current planar bar code technology, and the not identifiability of its naked eyes, safety inspection for Quick Response Code is necessary, mainly through being converted to binary data to two-dimension code pattern, feature detection is carried out to binary data, detect possible URL malice Quick Response Code, and the Quick Response Code of the form overflow type occurred in the future, carried out detecting before entering conventional Quick Response Code recognizer and prevent the URL of flooding and malice from carrying out further wooden horse, phishing attack behavior.
For above technical matters, the present invention proposes a kind of malice Quick Response Code detection method, comprising:
Identify that malice two-dimension code pattern obtains binary data, calculate and preserve the HASH value of described malice Quick Response Code binary data;
Extract malice Quick Response Code segment characterizations;
Obtain the binary data of two-dimension code pattern to be detected and the length of described binary data;
Calculate the full HASH value of the binary data of two-dimension code pattern to be detected, and mate with the HASH value of described malice Quick Response Code binary data,
If the match is successful, then described Quick Response Code to be detected is malice Quick Response Code;
Otherwise, the binary data of described two-dimension code pattern to be detected is mated with malice Quick Response Code segment characterizations, if the binary data of described two-dimension code pattern to be detected comprises described malice Quick Response Code segment characterizations, then described Quick Response Code to be detected is malice Quick Response Code;
Otherwise resolve the URL in the binary data of two-dimension code pattern to be detected, mate with the HASH storehouse of malice URL, if the match is successful, described Quick Response Code to be detected is malice Quick Response Code.
Described extraction malice Quick Response Code segment characterizations selects the data of 2 place's different lengths as segment feature in the binary data identifying the acquisition of malice two-dimension code pattern.
Further, in the binary data identifying the acquisition of malice two-dimension code pattern, length is selected to be not less than two place's data of 16 as segment feature.
The present invention also proposes a kind of malice Quick Response Code detection system, comprising:
Two-dimension code pattern identification module, for being converted to binary data by the figure of Quick Response Code;
Malice Quick Response Code HASH module, for calculating and preserving the HASH value of described malice Quick Response Code binary data;
Malice Quick Response Code segment characteristic module, for extracting malice Quick Response Code segment characterizations;
The segment extracting Quick Response Code identification data, as feature, is chosen the segment in data, is selected the high length of two place's information entropy to be not less than the binary data of 16.
Malice URL library module, for calculating the HASH of malice URL and being saved in the HASH storehouse of malice URL; Specifically, extract the URL in Quick Response Code, filter out white list URL, adopt Bloom-filter algorithm, the URL of malice is saved in malice URL storehouse.
Characteristic matching module, for calculating the full HASH value of the binary data of two-dimension code pattern to be detected, and mates with the HASH value of described malice Quick Response Code binary data,
If the match is successful, then described Quick Response Code to be detected is malice Quick Response Code;
Otherwise, the binary data of described two-dimension code pattern to be detected is mated with malice Quick Response Code segment characterizations, if the binary data of described two-dimension code pattern to be detected comprises described malice Quick Response Code segment characterizations, then described Quick Response Code to be detected is malice Quick Response Code;
Otherwise resolve the URL in the binary data of two-dimension code pattern to be detected, mate with the HASH storehouse of malice URL, if the match is successful, described Quick Response Code to be detected is malice Quick Response Code.
Described malice Quick Response Code segment characteristic module specifically for selecting the data of 2 place's different lengths as segment feature in the binary data identifying the acquisition of malice two-dimension code pattern.
Described malice Quick Response Code segment characteristic module is concrete also for selecting length to be not less than two place's data of 16 as segment feature in the binary data identifying the acquisition of malice two-dimension code pattern.
The invention has the beneficial effects as follows:
Because current two-dimension is applied in every field fast widely, but some Quick Response Code recognizers do not have safety detection, and the not identifiability of Quick Response Code naked eyes, safety inspection for Quick Response Code is necessary, technical solution of the present invention is mainly through being converted to binary data to two-dimension code pattern, feature detection is carried out to binary data, detect possible URL malice Quick Response Code, and the Quick Response Code of the form overflow type occurred in the future, carried out detecting before entering conventional Quick Response Code recognizer and prevent the URL of flooding and malice from carrying out further wooden horse, phishing attack behavior.
Accompanying drawing explanation
In order to be illustrated more clearly in the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, the accompanying drawing that the following describes is only some embodiments recorded in the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the present invention's malice Quick Response Code detection method feature extraction process flow diagram;
Fig. 2 is the present invention's malice Quick Response Code detection method process flow diagram;
Fig. 3 is the simulating two-dimensional code of the embodiment of the present invention;
Fig. 4 is the hexadecimal data after the conversion of embodiment of the present invention simulating two-dimensional code;
Fig. 5 is the present invention's malice Quick Response Code detection system schematic diagram.
Embodiment
In order to make those skilled in the art person understand technical scheme in the embodiment of the present invention better, and enable above-mentioned purpose of the present invention, feature and advantage become apparent more, below in conjunction with accompanying drawing, technical scheme in the present invention is described in further detail.
As shown in Figure 1, be malice Quick Response Code detection method feature extraction process flow diagram provided by the invention, concrete steps comprise:
S101, identification two-dimension code pattern;
The data of S102, acquisition binary format;
The full HASH feature of S103, calculating binary data is preserved;
S104, extraction malice Quick Response Code segment feature, select the data of 2 place's different lengths as segment feature, have and relatively uniquely represent this section of binary data in the binary data identifying Quick Response Code acquisition;
S105, judge whether there is URL in Quick Response Code; If carry out step S106;
S106, filter out white list URL;
S107, employing Bloom-filter algorithm, be saved in the URL of malice in malice URL storehouse.
As shown in Figure 2, be malice Quick Response Code detection method process flow diagram provided by the invention, concrete steps comprise:
S201, two-dimension code pattern identification;
The binary data that S202, the length obtaining the binary data of the Quick Response Code identified and Quick Response Code represent;
S203, HASH calculating is carried out to binary data entirety, the HASH value obtained and malice HASH value are compared, if the match is successful, go to step S206 and differentiate that this Quick Response Code is for maliciously Quick Response Code.Otherwise go to step S204;
S204, to identifying that the binary data that parses carries out segment characteristic matching, if comprise segment feature in binary data, then go to step S206.Otherwise go to step S205;
S205, parsing binary data obtain the URL of Quick Response Code kind, and the HASH value calculating URL is mated with the hash storehouse of malice URL, if the match is successful, goes to step S206.Otherwise terminate;
S206, differentiation Quick Response Code are malice Quick Response Code.
Fig. 3 is the simulating two-dimensional code of the embodiment of the present invention, to the flow process of its application drawing 1, first carries out two-dimension code pattern identification, obtains the binary data of Fig. 3 Quick Response Code as Fig. 4, calculates the full HASH value extracting data.
Extract segment feature, the position with relative unique nature can be selected, such as select 16 byte length 2E 71 71 32 30 31 31 73 61 2E 74 6B 2F 6A 69 6D as feature segment, for segment feature detection.
Extract and wherein comprise URL:http: whether //www.qq2011sa.tk/jimm.apk, judges whether in URL white list storehouse, Bloom-filter algorithm can be selected to search in white list storehouse this URL.If not in white list storehouse, this URL is placed in malice Quick Response Code URL storehouse.
According to Fig. 2, detect for any one two-dimension code image, binary data is obtained by figure identification, full HASH calculating is carried out to binary data, the malice Quick Response Code HASH value extracted before coupling, if coupling, is judged as malice Quick Response Code, if do not mated, carries out the detection of segment characterizations, detect in whole binary data and whether comprise malice binary segments, if comprised, be determined as malice Quick Response Code.Proceed to judge whether comprise URL in binary data if do not detected, extract URL, judge this URL whether in malice URL storehouse, if, be judged as malice Quick Response Code, if do not existed, terminate.
As shown in Figure 5, be the present invention's malice Quick Response Code detection system schematic diagram, comprise:
Two-dimension code pattern identification module 501, for being converted to binary data by the figure of Quick Response Code;
Malice Quick Response Code HASH module 502, for calculating and preserving the HASH value of described malice Quick Response Code binary data;
Malice Quick Response Code segment characteristic module 503, for extracting malice Quick Response Code segment characterizations;
The segment extracting Quick Response Code identification data, as feature, is chosen the segment in data, is selected the high length of two place's information entropy to be not less than the binary data of 16.
Malice URL library module 504, for calculating the HASH of malice URL and being saved in the HASH storehouse of malice URL; Specifically, extract the URL in Quick Response Code, filter out white list URL, adopt Bloom-filter algorithm, the URL of malice is saved in malice URL storehouse.
Characteristic matching module 505, for calculating the full HASH value of the binary data of two-dimension code pattern to be detected, and mates with the HASH value of described malice Quick Response Code binary data,
If the match is successful, then described Quick Response Code to be detected is malice Quick Response Code;
Otherwise, the binary data of described two-dimension code pattern to be detected is mated with malice Quick Response Code segment characterizations, if the binary data of described two-dimension code pattern to be detected comprises described malice Quick Response Code segment characterizations, then described Quick Response Code to be detected is malice Quick Response Code;
Otherwise resolve the URL in the binary data of two-dimension code pattern to be detected, mate with the HASH storehouse of malice URL, if the match is successful, described Quick Response Code to be detected is malice Quick Response Code.
Described malice Quick Response Code segment characteristic module 503 specifically for selecting the data of 2 place's different lengths as segment feature in the binary data identifying the acquisition of malice two-dimension code pattern.
Described malice Quick Response Code segment characteristic module 503 is concrete also for selecting length to be not less than two place's data of 16 as segment feature in the binary data identifying the acquisition of malice two-dimension code pattern.
In this instructions, the embodiment of method adopts the mode of going forward one by one to describe, and for the embodiment of system, because it is substantially similar to embodiment of the method, so description is fairly simple, relevant part illustrates see the part of embodiment of the method.
Although depict the present invention by embodiment, those of ordinary skill in the art know, the present invention has many distortion and change and do not depart from spirit of the present invention, and the claim appended by wishing comprises these distortion and change and do not depart from spirit of the present invention.

Claims (6)

1. a malice Quick Response Code detection method, is characterized in that, comprising:
Identify that malice two-dimension code pattern obtains binary data, calculate and preserve the HASH value of described malice Quick Response Code binary data;
Extract malice Quick Response Code segment characterizations;
Obtain the binary data of two-dimension code pattern to be detected and the length of described binary data;
Calculate the full HASH value of the binary data of two-dimension code pattern to be detected, and mate with the HASH value of described malice Quick Response Code binary data,
If the match is successful, then described Quick Response Code to be detected is malice Quick Response Code;
Otherwise, the binary data of described two-dimension code pattern to be detected is mated with malice Quick Response Code segment characterizations, if the binary data of described two-dimension code pattern to be detected comprises described malice Quick Response Code segment characterizations, then described Quick Response Code to be detected is malice Quick Response Code;
Otherwise resolve the URL in the binary data of two-dimension code pattern to be detected, mate with the HASH storehouse of malice URL, if the match is successful, described Quick Response Code to be detected is malice Quick Response Code.
2. maliciously Quick Response Code detection method as claimed in claim 1, is characterized in that, extracts malice Quick Response Code segment characterizations, is select the data of 2 place's different lengths as segment feature in the binary data identifying the acquisition of malice two-dimension code pattern.
3. malice Quick Response Code detection method as claimed in claim 2, is characterized in that, in the binary data identifying the acquisition of malice two-dimension code pattern, select length to be not less than two place's data of 16 as segment feature.
4. a malice Quick Response Code detection system, is characterized in that, comprising:
Two-dimension code pattern identification module, for being converted to binary data by the figure of Quick Response Code;
Malice Quick Response Code HASH module, for calculating and preserving the HASH value of described malice Quick Response Code binary data;
Malice Quick Response Code segment characteristic module, for extracting malice Quick Response Code segment characterizations;
Malice URL library module, for calculating the HASH of malice URL and being saved in the HASH storehouse of malice URL;
Characteristic matching module, for calculating the full HASH value of the binary data of two-dimension code pattern to be detected, and mates with the HASH value of described malice Quick Response Code binary data,
If the match is successful, then described Quick Response Code to be detected is malice Quick Response Code;
Otherwise, the binary data of described two-dimension code pattern to be detected is mated with malice Quick Response Code segment characterizations, if the binary data of described two-dimension code pattern to be detected comprises described malice Quick Response Code segment characterizations, then described Quick Response Code to be detected is malice Quick Response Code;
Otherwise resolve the URL in the binary data of two-dimension code pattern to be detected, mate with the HASH storehouse of malice URL, if the match is successful, described Quick Response Code to be detected is malice Quick Response Code.
5. malice Quick Response Code detection system as claimed in claim 4, is characterized in that, malice Quick Response Code segment characteristic module specifically for selecting the data of 2 place's different lengths as segment feature in the identification binary data that maliciously two-dimension code pattern obtains.
6. maliciously Quick Response Code detection system as claimed in claim 5, is characterized in that, malice Quick Response Code segment characteristic module is concrete also for selecting length to be not less than two place's data of 16 as segment feature in the binary data identifying the acquisition of malice two-dimension code pattern.
CN201110440506.0A 2011-12-26 2011-12-26 Method and system for detecting malicious two-dimension codes Active CN102819723B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110440506.0A CN102819723B (en) 2011-12-26 2011-12-26 Method and system for detecting malicious two-dimension codes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110440506.0A CN102819723B (en) 2011-12-26 2011-12-26 Method and system for detecting malicious two-dimension codes

Publications (2)

Publication Number Publication Date
CN102819723A CN102819723A (en) 2012-12-12
CN102819723B true CN102819723B (en) 2015-07-22

Family

ID=47303833

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110440506.0A Active CN102819723B (en) 2011-12-26 2011-12-26 Method and system for detecting malicious two-dimension codes

Country Status (1)

Country Link
CN (1) CN102819723B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103226688B (en) * 2013-02-28 2015-12-23 中国地质大学(武汉) The authentication method of the anti-tamper and anti-counterfeiting of a kind of Quick Response Code
CN103268328B (en) * 2013-05-02 2016-05-25 百度在线网络技术(北京)有限公司 The verification method of Quick Response Code and search engine server
CN104239792A (en) * 2013-06-21 2014-12-24 广州杰赛科技股份有限公司 Cloud-based two-dimension code safety protecting method and device
CN103647779A (en) * 2013-12-16 2014-03-19 北京奇虎科技有限公司 Method and device for detecting fishing fraud information through two-dimensional code
CN103984697A (en) * 2014-04-08 2014-08-13 百度在线网络技术(北京)有限公司 Barcode information processing method, device and system
CN105704100A (en) * 2014-11-26 2016-06-22 阿里巴巴集团控股有限公司 File identification method and file identification device
CN105718792A (en) * 2015-08-13 2016-06-29 哈尔滨安天科技股份有限公司 Sandbox based two-dimensional code detection method and system
CN105162603A (en) * 2015-09-15 2015-12-16 重庆智韬信息技术中心 Method for realizing distribution of two-dimensional codes to users and commenting and security detection on two-dimensional codes
CN106055693B (en) * 2016-06-12 2020-01-10 深圳市金立通信设备有限公司 Information processing method and terminal
CN111967609B (en) * 2020-08-14 2021-08-06 深圳前海微众银行股份有限公司 Model parameter verification method, device and readable storage medium
CN113630414A (en) * 2021-08-09 2021-11-09 中国电信股份有限公司 Identification code verification method, system, gateway device and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102243699A (en) * 2011-06-09 2011-11-16 深圳市安之天信息技术有限公司 Malicious code detection method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102010008538A1 (en) * 2010-02-18 2011-08-18 zynamics GmbH, 44787 Method and system for detecting malicious software

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102243699A (en) * 2011-06-09 2011-11-16 深圳市安之天信息技术有限公司 Malicious code detection method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于4级受信机制的可疑终端的恶意代码取证与分析;苗得雨等;《电信科学》;20110115(第1期);第105-109页 *
基于Bloom Filter的大规模网页去重策略研究;丁振国等;《现代图书情报技术》;20080325(第3期);第45-50页 *

Also Published As

Publication number Publication date
CN102819723A (en) 2012-12-12

Similar Documents

Publication Publication Date Title
CN102819723B (en) Method and system for detecting malicious two-dimension codes
WO2017160654A3 (en) Systems, methods, and computer readable media for extracting data from portable document format (pdf) files
CN103294953B (en) A kind of mobile phone malicious code detecting method and system
CN105681898A (en) Similar video and pirated video detection method and device
CN102346153A (en) Method for detecting tunnel defect
CN103281320A (en) Website icon matching-based detection method for brand counterfeit websites
CN102801698B (en) Uniform resource locator (URL) request time sequence-based detection method and system for malicious codes
CN103294951B (en) A kind of malicious code sample extracting method based on document type bug and system
RU2011152811A (en) METHOD FOR IDENTIFYING FALSE POSITIVE RESULTS OF SCANNING FILES FOR Malicious software
CN103209177B (en) The detection method of phishing attacks and device
CN105681899A (en) Method and device for detecting similar video and pirated video
CN103761483A (en) Method and device for detecting malicious codes
CN105975855A (en) Method and system for malicious code detection based on apk certificate similarity
CN105095330A (en) Method and system for identifying file format based on compressed package content
CN106203229A (en) The terminal unit recognition Quick Response Code of different rights is with the method for the different information of display
CN105718795A (en) Malicious code evidence obtaining method and system on the basis of feature code under Linux
RU2009124522A (en) INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD
CN105488409A (en) Method and system for detecting malicious code family variety and new family
KR101228900B1 (en) System and method for detecting malicious content in a non-pe file
CN105740308A (en) Hypertext markup language structure-based website invisible link detection method and system
CN106709350B (en) Virus detection method and device
WO2007100289A3 (en) A method for additive character recognition and an apparatus thereof
TWI543011B (en) Method and system for extracting digital fingerprints of malicious files
CN103902906A (en) Mobile terminal malicious code detecting method and system based on application icon
EP1137253A3 (en) Image processing apparatus, image processing method and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Method and system for detecting malicious two-dimension codes

Effective date of registration: 20170621

Granted publication date: 20150722

Pledgee: Bank of Longjiang, Limited by Share Ltd, Harbin Limin branch

Pledgor: Harbin Antiy Technology Co., Ltd.

Registration number: 2017110000004

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20190614

Granted publication date: 20150722

Pledgee: Bank of Longjiang, Limited by Share Ltd, Harbin Limin branch

Pledgor: Harbin Antiy Technology Co., Ltd.

Registration number: 2017110000004

CP03 Change of name, title or address

Address after: 150028 Building 7, Innovation Plaza, Science and Technology Innovation City, Harbin High-tech Industrial Development Zone, Heilongjiang Province (838 Shikun Road)

Patentee after: Harbin antiy Technology Group Limited by Share Ltd

Address before: 150090 room 506, Hongqi Street, Nangang District, Harbin Development Zone, Heilongjiang, China, 162

Patentee before: Harbin Antiy Technology Co., Ltd.

CP03 Change of name, title or address
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Method and system for detecting malicious two-dimension codes

Effective date of registration: 20190828

Granted publication date: 20150722

Pledgee: Bank of Longjiang, Limited by Share Ltd, Harbin Limin branch

Pledgor: Harbin antiy Technology Group Limited by Share Ltd

Registration number: Y2019230000002

PE01 Entry into force of the registration of the contract for pledge of patent right
CP01 Change in the name or title of a patent holder

Address after: 150028 Building 7, Innovation Plaza, Science and Technology Innovation City, Harbin High-tech Industrial Development Zone, Heilongjiang Province (838 Shikun Road)

Patentee after: Antan Technology Group Co.,Ltd.

Address before: 150028 Building 7, Innovation Plaza, Science and Technology Innovation City, Harbin High-tech Industrial Development Zone, Heilongjiang Province (838 Shikun Road)

Patentee before: Harbin Antian Science and Technology Group Co.,Ltd.

CP01 Change in the name or title of a patent holder
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20211119

Granted publication date: 20150722

Pledgee: Bank of Longjiang Limited by Share Ltd. Harbin Limin branch

Pledgor: Harbin Antian Science and Technology Group Co.,Ltd.

Registration number: Y2019230000002

PC01 Cancellation of the registration of the contract for pledge of patent right