CN104199921B - The anti-copy method for tracing and webpage anti-copy follow-up mechanism of web application - Google Patents

The anti-copy method for tracing and webpage anti-copy follow-up mechanism of web application Download PDF

Info

Publication number
CN104199921B
CN104199921B CN201410438958.9A CN201410438958A CN104199921B CN 104199921 B CN104199921 B CN 104199921B CN 201410438958 A CN201410438958 A CN 201410438958A CN 104199921 B CN104199921 B CN 104199921B
Authority
CN
China
Prior art keywords
copy
server
code
main program
web application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410438958.9A
Other languages
Chinese (zh)
Other versions
CN104199921A (en
Inventor
黄贺群
骆清华
张小刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Zhixing Intellectual Property Service Co.,Ltd.
Original Assignee
Shenzhen Yun Lai Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yun Lai Network Technology Co Ltd filed Critical Shenzhen Yun Lai Network Technology Co Ltd
Priority to CN201410438958.9A priority Critical patent/CN104199921B/en
Publication of CN104199921A publication Critical patent/CN104199921A/en
Application granted granted Critical
Publication of CN104199921B publication Critical patent/CN104199921B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1015Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention discloses a kind of anti-copy method for tracing of web application and and webpage anti-copy follow-up mechanism, the anti-copy method for tracing comprises the following steps:T1:User terminal sends an access request to server, and server returns to web application according to access request to user terminal;T2:User terminal runs web application;T3:Web application sends an ID authentication request to server, and server returns to an identity information according to ID authentication request to web application;T4:Web application judges whether server has permission according to identity information, if so, then continuing to run with;If it is not, then sending identity information to Scout service device.The present invention can be followed the trail of and certification by the identity information to server, so that the identity information of copier's server is sent to Scout service device.

Description

The anti-copy method for tracing and webpage anti-copy follow-up mechanism of web application
Technical field
Prevent the present invention relates to the anti-copy method for tracing and webpage of field of computer technology, more particularly to a kind of web application Copy follow-up mechanism.
Background technology
With the popularization of intelligent terminal, and HTML (Hypertext Markup Language, HTML) 5 fast development, web application can be achieved to update and maintenance, support because what it had without user effort time manual install It is cross-platform to wait inherent attribute and propagate its belief on a large scale.User can be by the browsers of the clients such as intelligent terminal, PC Access the Webpage that Website server is provided, the abundant work(that the various web applications that experience is embedded in Webpage are provided Energy.Such as working out home zone of mobile phone number inquiry, online editing photo, exclusive itinerary.User passes through the clear of client Device of looking at is accessed and opened after the Webpage of Website server offer, and client can generally run net embedded in Webpage Page application.
In correlation technique, the application of web application widely, but usually occurs rival by copying other people nets Page application source code, so as to plagiarize other people web applications, the situation for causing client to shunt, results in harmful competition.
The content of the invention
The technical problem to be solved in the present invention is that there is provided a kind of anti-copy method for tracing of web application and webpage anti-copy Shellfish follow-up mechanism.
The technical solution adopted for the present invention to solve the technical problems is:A kind of anti-copy tracking side of web application is provided Method, comprises the following steps:
T1:User terminal sends an access request to server, and server returns to webpage according to access request to user terminal should With;
T2:User terminal runs web application;
T3:Web application sends an ID authentication request to server, and server should to webpage according to ID authentication request With returning to an identity information;
T4:Web application judges whether server has permission according to identity information, if so, then continuing to run with;If it is not, then to Scout service device sends identity information.
Preferably, web application includes main program code and code is followed the trail of in anti-copy;Anti-copy follow the trail of code carry out to It is few once obscure after ciphered compressed be embedded into main program code, and main program code obscure webpage is obtained after compression should With.
Preferably, anti-copy is followed the trail of code and write in the preceding end core script of main program code, and to whole preceding end core Script carries out obscuring ciphered compressed.
Preferably, in step T2, after the user terminal operation setting time of main program code one, then step T3 is performed.
Preferably, code is followed the trail of in anti-copy also includes legal server information;
In step T3, anti-copy follows the trail of code and sends ID authentication request to server, and anti-copy is followed the trail of code and connect Receive the identity information returned;
In step t 4, anti-copy follows the trail of code and compares identity information with legal server information, judges that server is It is no to have permission, if it is not, then anti-copy follows the trail of code to Scout service device transmission identity information, and stop the main program of web application The operation of code.
Preferably, identity information includes the IP address and/or domain name of server;Legal server information includes legitimate service The IP address and/or domain name of device.
Preferably, in step t 4, when stopping the operation of main program code of web application, broken to user terminal output one Bad script causes user terminal main program code out of service, and output error prompting message.
A kind of webpage anti-copy follow-up mechanism is also provided, including:
Main program module;
Anti-copy tracing module, for while user terminal runs main program module to server acquisition request server Identity information;
Judge module, for judging whether server has permission according to identity information, and exports judged result, to control master Program module is continued to run with or out of service.
Preferably, main program module includes main program code;Anti-copy tracing module includes anti-copy and follows the trail of code;Anti-copy Shellfish tracking code is obscured after ciphered compressed at least one times to be embedded into main program code, and main program code carries out obscuring pressure Webpage anti-copy follow-up mechanism is obtained after contracting.
Preferably, in addition to a processing module, for according to judged result to Scout service device send identity information and/or Script, which is destroyed, to user terminal output one causes user terminal main program code out of service.
The beneficial effects of enforcing the present invention are:It can be followed the trail of and certification by the identity information to server, so that will copy The identity information of person's server is sent to Scout service device.
Brief description of the drawings
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the schematic flow sheet of the anti-copy method for tracing of web application in some embodiments of the invention;
Fig. 2 is webpage anti-copy follow-up mechanism and server, user terminal and Scout service device in some embodiments of the invention Annexation schematic diagram.
Embodiment
In order to which technical characteristic, purpose and effect to the present invention are more clearly understood from, now compare accompanying drawing and describe in detail The embodiment of the present invention.
As Fig. 1 shows the anti-copy method for tracing of web application in some embodiments of the invention, the method comprising the steps of T1, T2, T3 and T4.It should be noted that, the web application initially proposes access request by user terminal to a legal server, should Legal server receives this access request rear line end and returns to the web application, is answered so that user terminal runs the webpage With.But, after a copier obtains the source code of the web application by legal server copy, this source code can also be passed through Cross certain fine setting or do not finely tune direct compilation for web application, should so as to allow user terminal to be realized by the server of copier The operation of web application.
Therefore, in certain embodiments, the web application includes main program code and code is followed the trail of in anti-copy.Wherein, Anti-copy is followed the trail of code and obscured at least one times after ciphered compressed, is embedded into main program code, then main program code is entered Row obtains web application after obscuring compression.Preferably, anti-copy tracking code is obscured twice is embedded into master after ciphered compressed In program code.It is to be appreciated that after obscuring ciphered compressed repeatedly, it has been difficult the person of being copied from master that code is followed the trail of in anti-copy Identified in program code, so, there can be disguise well, increase copier and delete anti-from main program code Copy the difficulty of code.Preferably, the script of the web application is JavaScript or VBscript.Preferably, for example, Obscure ciphering process to be compressed javascript codes, all change the variable inside code and method name into no language Justice, brief content, accordingly even when copier can be decompressed, it is also difficult to understand the actual functional capability of code.
In certain embodiments, further, anti-copy is followed the trail of code and write in the preceding end core script of main program code, And whole preceding end core script is carried out obscuring ciphered compressed.It is to be appreciated that anti-copy tracking code is write on into preceding end core In script, i.e., copier, which must run anti-copy code simultaneously, could realize the operation of web application, more increase copier from The difficulty of anti-copy code is deleted in main program code, the stability of anti-copy tracking is further increased.
Preferably, anti-copy, which is followed the trail of, also includes legal server information in code.These legal server information records The IP address and/or domain name of legal server with legal authority, to be followed the trail of in the anti-copy of some embodiments of the invention In method, the server identity information that tracking is obtained is compared, determines whether the server has authority.
The anti-copy method for tracing in some embodiments of the invention is illustrated below.
T1:User terminal sends an access request to server, and server returns to webpage according to access request to user terminal should With.
In this step, it should be noted that, server herein is probably the server of copier, it is also possible to be copied The server of person.
T2:User terminal runs web application.
In the step, it should be noted that, it is that the main program code in web application is being run now.For example, when webpage should With for one make a breakthrough class trivial games when, the code that main program code is played for this, in this step, this game user terminal run, So that this can be used to play for the user of user terminal.
T3:Web application sends an ID authentication request to server, and server should to webpage according to ID authentication request With returning to an identity information.
In this step, it should be noted that, now in web application, anti-copy code operation, i.e., anti-copy code to Server sends an ID authentication request, and server returns to an identity information according to ID authentication request to anti-copy code.Can It is corresponding with legal server information to understand ground, include the IP address and/or domain name of server in identity information, so as to Legal server information is compared.Preferably, web application directly can obtain identity information by document.domain.
Alternatively, in certain embodiments, in step T2, after the user terminal operation setting time of main program code one, Step T3 is performed again.For example, when web application be one make a breakthrough class trivial games when, in step T2 user terminal run main program generation After code, the i.e. user of user terminal are using this game certain time (for example, 5 minutes), then perform step T3 authentication.
T4:Web application judges whether server has permission according to identity information, if so, then continuing to run with;If it is not, then to Scout service device sends identity information.
In step t 4, anti-copy follows the trail of code and compares identity information with legal server information, judges that server is It is no to have permission, if it is not, then anti-copy follows the trail of code to Scout service device transmission identity information, and stop the main program of web application The operation of code.
In certain embodiments, further, when stopping the operation of main program code of web application, anti-copy is followed the trail of Code also destroys script to user terminal output one and causes user terminal main program code out of service, and output error prompting message. For example, sending prompting " you are good, and what you accessed is pirate game " etc. to client.Further, can also be to user terminal prompting just Version information.For example, " legal game please be access, address is ×× ".
Fig. 2 show webpage anti-copy follow-up mechanism in some embodiments of the invention and server 50, user terminal 70 and The annexation of Scout service device 30.Webpage anti-copy follow-up mechanism include main program module 110, anti-copy tracing module 120, Judge module 130 and processing module 140.It should be noted that, the web device is initially by user terminal 70 to a legal server 50 propose access request, and the legal server 50 receives this access request rear line end 70 and returns to the web device, so that Obtain user terminal 70 and run the web device.But, obtain the web device when a copier is copied by legal server 50 , also can be by this source code by necessarily finely tuning or not finely tuning direct compilation for web device, so as to allow user after source code The operation of the web device is realized by the server 50 of copier in end 70.
Wherein, main program module 110 includes main program code.Anti-copy tracing module 120 is used to run in user terminal 70 To the identity information of the acquisition request server 50 of server 50 while main program module 110.Anti-copy tracing module 120 includes Code is followed the trail of in anti-copy.Wherein, anti-copy is followed the trail of code and obscured at least one times after ciphered compressed, is embedded into main program code In, then main program code carries out obtaining webpage anti-copy follow-up mechanism after obscuring compression.Preferably, anti-copy tracking code enters Row is obscured after ciphered compressed twice to be embedded into main program code.It is to be appreciated that after repeatedly obscuring ciphered compressed, anti-copy It has been difficult that the person of being copied identifies from main program code that shellfish, which follows the trail of code, so, can have disguise well, increase Copier deletes the difficulty of anti-copy code from main program code.Preferably, the script of the webpage anti-copy follow-up mechanism Language is JavaScript or VBscript.Preferably, for example, obscuring ciphering process to be pressed javascript codes Contracting, the variable inside code and method name are all changed into without semanteme, brief content, accordingly even when copier can be by it Decompression, it is also difficult to understand the actual functional capability of code.
In certain embodiments, further, anti-copy is followed the trail of code and write in the preceding end core script of main program code, And whole preceding end core script is carried out obscuring ciphered compressed.It is to be appreciated that anti-copy tracking code is write on into preceding end core In script, i.e., copier, which must run anti-copy code simultaneously, could realize the operation of web device, more increase copier from The difficulty of anti-copy code is deleted in main program code, the stability of anti-copy tracking is further increased.
Preferably, anti-copy, which is followed the trail of, also includes the information of legal server 50 in code.These information of legal server 50 are remembered The IP address and/or domain name of the legal server 50 with legal authority are recorded, so as in the anti-copy of some embodiments of the invention In shellfish method for tracing, the identity information of server 50 that tracking is obtained is compared, determines whether the server 50 has authority.
Judge module 130, for judging whether server 50 has permission according to identity information, and exports judged result, with Control main program module 110 is continued to run with or out of service.
Processing module 140, for sending identity information and/or to user terminal 70 to Scout service device 50 according to judged result Output one destroys script and causes the main program code out of service of user terminal 70.
Described above is only the preferred embodiment of the present invention, and protection scope of the present invention is not limited merely to above-mentioned implementation Example, all technical schemes belonged under thinking of the present invention belong to protection scope of the present invention.It should be pointed out that for the art Those of ordinary skill for, several improvements and modifications without departing from the principles of the present invention, these improvements and modifications Also it should be regarded as protection scope of the present invention.

Claims (7)

1. the anti-copy method for tracing of a kind of web application, it is characterised in that comprise the following steps:
T1:User terminal sends an access request to server, and the server is returned according to the access request to the user terminal Return the web application;The web application includes main program code and code is followed the trail of in anti-copy;In generation, is followed the trail of in the anti-copy Code is obscured at least one times to be embedded into after ciphered compressed in the main program code, and the main program code carries out obscuring pressure The web application is obtained after contracting;The anti-copy is followed the trail of code and write in the preceding end core script of the main program code, and The whole preceding end core script is carried out obscuring ciphered compressed;
T2:The user terminal runs the web application;
T3:The web application sends an ID authentication request to the server, and the server is according to the authentication Ask to return to an identity information to the web application;In the web application, the anti-copy follows the trail of code in operation;
T4:The web application judges whether the server has permission according to the identity information, if so, then continuing to run with; If it is not, then sending the identity information to Scout service device.
2. anti-copy method for tracing according to claim 1, it is characterised in that in the step T2, the user terminal Run after the setting time of main program code one, then perform the step T3.
3. anti-copy method for tracing according to claim 1 or 2, it is characterised in that the anti-copy is followed the trail of code and also wrapped Include legal server information;
In the step T3, the anti-copy follows the trail of code and sends the ID authentication request to the server, and described Anti-copy follows the trail of code and receives the identity information returned;
In the step T4, the anti-copy follows the trail of code and compares the identity information with the legal server information, Judge whether the server has permission, if it is not, then the anti-copy follows the trail of code to the Scout service device transmission body Part information, and stop the operation of the main program code of the web application.
4. anti-copy method for tracing according to claim 3, it is characterised in that the identity information includes the server IP address and/or domain name;The legal server information includes the IP address and/or domain name of legal server.
5. anti-copy method for tracing according to claim 3, it is characterised in that in the step T4, described in stopping During the operation of the main program code of web application, destroy script to user terminal output one and make it that the user terminal is out of service The main program code, and output error prompting message and point out legal information to the user terminal.
6. a kind of webpage anti-copy follow-up mechanism, it is characterised in that including:
Main program module (110);The main program module (110) includes main program code;
Anti-copy tracing module (120), for while user terminal (70) runs main program module (110) to server (50) identity information of server described in acquisition request (50);The anti-copy tracing module (120) includes anti-copy and follows the trail of generation Code;The anti-copy tracking code is obscured at least one times to be embedded into after ciphered compressed in the main program code, and described Main program code carries out obtaining the webpage anti-copy follow-up mechanism after obscuring compression;
Judge module (130), for judging whether the server (50) has permission according to the identity information, and exports judgement As a result, to control the main program module (110) to continue to run with or out of service.
7. webpage anti-copy follow-up mechanism according to claim 6, it is characterised in that also including a processing module (140), For sending the identity information to Scout service device (50) according to the judged result and/or being exported to the user terminal (70) One destruction script causes the user terminal (70) main program code out of service.
CN201410438958.9A 2014-08-30 2014-08-30 The anti-copy method for tracing and webpage anti-copy follow-up mechanism of web application Active CN104199921B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410438958.9A CN104199921B (en) 2014-08-30 2014-08-30 The anti-copy method for tracing and webpage anti-copy follow-up mechanism of web application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410438958.9A CN104199921B (en) 2014-08-30 2014-08-30 The anti-copy method for tracing and webpage anti-copy follow-up mechanism of web application

Publications (2)

Publication Number Publication Date
CN104199921A CN104199921A (en) 2014-12-10
CN104199921B true CN104199921B (en) 2017-09-15

Family

ID=52085214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410438958.9A Active CN104199921B (en) 2014-08-30 2014-08-30 The anti-copy method for tracing and webpage anti-copy follow-up mechanism of web application

Country Status (1)

Country Link
CN (1) CN104199921B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3889810A1 (en) * 2020-04-03 2021-10-06 Make Great Sales Limited System and method for the detection of website content theft

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450662A (en) * 2015-12-25 2016-03-30 小米科技有限责任公司 Encryption method and device
CN109145535A (en) * 2018-08-13 2019-01-04 阿里巴巴集团控股有限公司 A kind of front end page providing method and device
CN110971605B (en) * 2019-12-05 2022-03-08 福建天晴在线互动科技有限公司 Method for acquiring pirated game server information by capturing data packet

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9325682B2 (en) * 2007-04-16 2016-04-26 Tailstream Technologies, Llc System for interactive matrix manipulation control of streamed data and media
CN101815061B (en) * 2009-02-23 2015-01-07 传线网络科技(上海)有限公司 Anti-stealing link system of internet content delivery network
FR2942559B1 (en) * 2009-02-24 2016-05-20 European Aeronautic Defence And Space Company - Eads France METHOD FOR PROTECTING THE SOURCE CODE OF A COMPUTER PROGRAM.
CN103036924B (en) * 2011-09-29 2017-02-22 深圳市云帆世纪科技有限公司 Chaining processing method and chaining processing system
CN103888490B (en) * 2012-12-20 2018-03-13 上海天泰网络技术有限公司 A kind of man-machine knowledge method for distinguishing of full automatic WEB client side
CN103150493B (en) * 2013-02-28 2016-06-22 浙江中控技术股份有限公司 A kind of JavaScript code obscure method and apparatus

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于Red5流媒体服务系统的设计与实现;彭一凌;《中国优秀硕士学位论文全文数据库信息科技辑》;20131215(第S2期);第I138-405页 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3889810A1 (en) * 2020-04-03 2021-10-06 Make Great Sales Limited System and method for the detection of website content theft

Also Published As

Publication number Publication date
CN104199921A (en) 2014-12-10

Similar Documents

Publication Publication Date Title
CN106682028B (en) Method, device and system for acquiring webpage application
Nadji et al. Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense.
Gupta et al. Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network
CN104199921B (en) The anti-copy method for tracing and webpage anti-copy follow-up mechanism of web application
US20190228047A1 (en) Obfuscating network page structure
Huang et al. Protecting browsers from cross-origin CSS attacks
US20130111584A1 (en) Method and apparatus for preventing unwanted code execution
US9313223B2 (en) Systems and methods for tokenizing user-generated content to enable the prevention of attacks
CN104935558A (en) Network user rapid registration and login method and system
US9098722B2 (en) Systems and methods for parsing user-generated content to prevent attacks
Gupta et al. XSS‐immune: a Google chrome extension‐based XSS defensive framework for contemporary platforms of web applications
CN103152323A (en) Method and system of controlling access behaviors of client network
CN103444215A (en) Methods and apparatuses for avoiding damage in network attacks
CN103971059B (en) Cookie local storage and usage method
CN104052757B (en) Identification system and method based on the client application in mobile phone
Young et al. BadVoice: Soundless voice-control replay attack on modern smartphones
WO2018176814A1 (en) Personalized component implementation method and device
Snyder et al. Pro PHP security
KR102278660B1 (en) Passing authentication information through parameters
CN102761576B (en) Web system malicious polyphonic ringtone ordering preventing method and server
KR101748627B1 (en) Web-based electronic document service apparatus capable of authenticating a document and operating method thereof
CN106888200B (en) Identification association method, information sending method and device
CN112836186A (en) Page control method and device
CN101375543A (en) Apparatus and method for moving rights object from one device to another device via server
CN112287349A (en) Security vulnerability detection method and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20141210

Assignee: Shenzhen rabbit exhibition Intelligent Technology Co., Ltd

Assignor: Shenzhen Yun Lai network technology company limited

Contract record no.: X2020980000016

Denomination of invention: Copy-preventing tracking method for web application and copy-preventing webpage tracking device

Granted publication date: 20170915

License type: Common License

Record date: 20200106

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210824

Address after: Room 706, seismology building, the second monitoring center of China Seismological Bureau, No. 316, Xiying Road, Qujiang New Area, Xi'an, Shaanxi 710043

Patentee after: Xi'an Zhixing Intellectual Property Service Co.,Ltd.

Address before: 518000 room 906, international student entrepreneurship building, South District, high tech Zone, Nanshan District, Shenzhen, Guangdong Province

Patentee before: SHENZHEN YUNLAI NETWORK TECHNOLOGY Co.,Ltd.