CN105354485B - A kind of portable set data processing method - Google Patents

A kind of portable set data processing method Download PDF

Info

Publication number
CN105354485B
CN105354485B CN201510658131.3A CN201510658131A CN105354485B CN 105354485 B CN105354485 B CN 105354485B CN 201510658131 A CN201510658131 A CN 201510658131A CN 105354485 B CN105354485 B CN 105354485B
Authority
CN
China
Prior art keywords
authority
api
function
detection
files
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510658131.3A
Other languages
Chinese (zh)
Other versions
CN105354485A (en
Inventor
时翔
冉欢欢
张悍裴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shine Technology Co ltd
Original Assignee
Sichuan Xiechuang Information Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Xiechuang Information Technology Service Co Ltd filed Critical Sichuan Xiechuang Information Technology Service Co Ltd
Priority to CN201510658131.3A priority Critical patent/CN105354485B/en
Publication of CN105354485A publication Critical patent/CN105354485A/en
Application granted granted Critical
Publication of CN105354485B publication Critical patent/CN105354485B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention provides a kind of portable set data processing method, this method includes:Application program installation package file is decompressed, obtains byte code files and Manifest files;By traveling through API Calls all in byte code files extraction procedure, the corresponding authority needed for API is analyzed;The authority asked Manifest files is modified, and deletion has requested that but untapped authority;The amended Manifest files of authority will be passed through and reintegrate into installation package file with byte code files.The present invention proposes a kind of portable set data processing method, and the authority of application program is analyzed and constrained, and improves program security and reliability, and do not influence the correct operation of program.

Description

A kind of portable set data processing method
Technical field
The present invention relates to mobile Internet, more particularly to a kind of portable set data processing method.
Background technology
With the development of mobile Internet, the popularity rate of portable terminal is improved constantly, and safety problem is increasingly drawn Play the attention of people.While increasing application program brings advantage to the user, user's private data also stores.Due to Increasing income property of system and application market are open, and Android platform is easily attacked.Application program wants what is provided by system API carries out certain operation or uses certain resource, must just have the authority corresponding with the API.These authorities must ask In the Manifest files of program, checked by system when application is mounted and remind user to apply and specifically requested Which authority.
Developer follows minimum principle when writing Android application programs, that is, carries out which operation or which is used Resource, the authority related to these operations and resource is just simply requested, it is still, many to develop document imperfection itself, or authority name Claim relatively, to cause to request the excessive authority that will not be used.Person can not only bring misunderstanding to user, make user to program Reliability and the confidentiality of individual privacy throw doubt upon, and can be utilized due to existing leak by other rogue programs, Bring potential safety hazard.
The content of the invention
To solve the problems of above-mentioned prior art, the present invention proposes a kind of portable set data processing side Method, including:
Application program installation package file is decompressed, obtains byte code files and Manifest files;
By traveling through API Calls all in byte code files extraction procedure, the corresponding authority needed for API is analyzed;
The authority asked Manifest files is modified, and deletion has requested that but untapped authority;
The amended Manifest files of authority will be passed through and reintegrate into installation package file with byte code files.
Preferably, it is described by traveling through API Calls all in byte code files extraction procedure, further comprise:
That is arrived used in these three situations is extracted to function call extraction, Intent extractions and Content Provider Authority is extracted respectively, with the byte code files and API authority contingency table generating process that are obtained in installation kit decomposable process Caused API authorities contingency table is used as output as input using the least privilege list that application program actually uses;
Api function calls extraction to include all function calls in extraction procedure, and searches institute in API authority contingency tables Authority corresponding to call function, the authority found is added in the list of access right of output;
Api function calls extraction to include traveling through each instruction in each method of each class, and checks that present instruction is It is not activation instruction, if it is, obtaining the function lambda that activation instruction is called, the function lambda includes the title of function, parameter And affiliated class;Judge whether to have in API authority contingency tables associating for function lambda and its authority, if so, then by authority contingency table All permissions corresponding to middle λ are added in the list of the access right L of output, can only be added once for same authority;
If the authority for not having function lambda in authority contingency table associates, check whether function lambda is possible to be inherited from authority pass Join some API in table, extract affiliated the class α and function name β of function lambda, backtracking class α inheritance chain respectively, and check Whether contain (α in authority contingency table:Authority association β), if associated without authority, continue to recall α, if having permission pass The permissions list checked in authority contingency table, then be added in L by connection;
Intent extractions include Action parameters when extraction procedure sends Intent requests, and in API authority contingency tables The middle authority searched corresponding to these Action parameters, is added in access right list;
Content Provider extract the schema for including the URL request that extraction procedure is sent, and are associated in API authorities The authority corresponding to these schema is searched in table, is added in access right list, that is, search byte code files in whether There is corresponding character string.
Preferably, the corresponding authority needed for the analysis API, further comprises:
Manifest is extracted from installation kit to be measured, the apllied authority of application program is analyzed, then according to apllied Authority determines the detection option of sensitive permission detection, private data type and required detection of the detection option including required detection Border, sensitive permission detection is carried out for corresponding private data type and border according to detection option;
Detection option is stored using system property, in system initialization, distributes one piece of shared section key to store attribute, Init finger daemons start attribute service, the global change that the information that system property is used between record system setting or process exchanges Amount, each attribute have a title and a respective value, and title and value are character string, client changed by attribute service, Create, the system property in acquisition shared drive;
After start completion, system property is directly set;The value of Tag and Bound two systems attributes is read, that is, is set Detection option, before sensitive permission is added, according to the detection option Tag values read, it is determined that required addition sensitive permission Private data type, corresponding code is performed, at border detection, according to the detection option Bound values read, it is determined that required The outlet of monitoring, corresponding code is performed, compiling source code generation system image, the mirror image text compiled out is loaded in simulator Part, then installed in simulation system and run application program to be measured, it is automatic that the private data of application program is revealed into behavior It is recorded in system journal, finally obtains system journal, analyzes daily record and generate examining report.
The present invention compared with prior art, has advantages below:
The present invention proposes a kind of portable set data processing method, and analysis peace treaty is carried out to the authority of application program Beam, program security and reliability are improved, and do not influence the correct operation of program.
Brief description of the drawings
Fig. 1 is the flow chart of portable set data processing method according to embodiments of the present invention.
Embodiment
Retouching in detail to one or more embodiment of the invention is hereafter provided together with the accompanying drawing for illustrating the principle of the invention State.The present invention is described with reference to such embodiment, but the invention is not restricted to any embodiment.The scope of the present invention is only by right Claim limits, and the present invention covers many replacements, modification and equivalent.Illustrate in the following description many details with Thorough understanding of the present invention is just provided.These details are provided for exemplary purposes, and without in these details Some or all details can also realize the present invention according to claims.
An aspect of of the present present invention provides a kind of portable set data processing method.Fig. 1 is according to embodiments of the present invention Portable set data processing method flow chart.
The method of the present invention is by checking Android application program installation package files, all API Calls in extraction procedure, The corresponding authority needed for these API is analyzed, obtains least privilege list used in program, and by the list to application program The permissions list asked carries out yojan, deletes those and has requested that but untapped authority.And can't be to most of programs Correct operation have an impact, can be applied to automatically analyze a large amount of programs and yojan, improve program security And reliability.
The present invention uses static analysis, and Android installation package files are analyzed and changed.The inventive method is by five Part is formed, including the association of API authorities, installation kit are decomposed, API is extracted, manifest yojan and installation kit are integrated.
In the association of API authorities, API authority associated data files, generation API and the contingency table of its authority are read, is belonged to The preparation of system.The module to processing in need installation package file only need operation once.
In the present invention, API authority associated datas source is used as using result data corresponding to AndroidAPI authorities.Correspond to Three kinds of situations of scope check mechanism, this data source include api function and called and its required authority corresponding data, Intent Action and its required authority corresponding data, Content Provider URL schema and its required authority corresponding data.This Inventive method can equally use other data to associate source as its API authority, can also be by the pass of User Defined API authorities Connection relation, the invention is not restricted to this.
Using the data structure storage API and the incidence relation of its authority of Hash table, because some API can correspond to multiple power Limit, so need to use single key correspond to more Mapping data structures of multiple values, using API as key, using its required authority to be worth.This Individual API and the contingency table of authority are used in API extractions obtain the authority corresponding to extracted API.
Manifest is extracted from installation kit to be measured, analyzes the apllied authority of application program.Then according to apllied Authority determines the detection option of sensitive permission detection, private data type and required detection of the detection option including required detection Border.Sensitive permission detection is finally carried out for corresponding private data type and border according to detection option.
In system initialization, one piece of shared section key is distributed to store attribute.Init finger daemons start attribute service, The global variable that the information that system property is used between record system setting or process exchanges.Each attribute has a title and one Individual respective value, title and value are character string.Client changed by attribute service, created, obtains system in shared drive Attribute.
In the present invention using system property storage detection option.After Android start completions, system category is directly set Property.Read the value of Android Tag and Bound two systems attributes, that is, the detection option set.Addition sensitive permission it Before, according to the detection option Tag values read, it is determined that the private data type of required addition sensitive permission, performs corresponding generation Code.At border detection, according to the detection option Bound values read, it is determined that the outlet of required monitoring, performs corresponding generation Code.Source code generation android system mirror image is compiled, the image file compiled out is loaded in Android simulator.Then exist Installed in simulation system and run application program to be measured.The private data leakage behavior of the application program, which can be automatically recorded in, is In system daily record.System journal is finally obtained, daily record is analyzed and generates examining report.
The groundwork that installation kit decomposes is that Android application program installation package files are decompressed, so as to obtain Byte code files and Manifest files.Both of these documents is respectively used among API extractions and manifest yojan.API is extracted Step checks all API Calls by traveling through byte code files.Manifest reduction steps are as obtained by API extraction modules To the authority asked Manifest files of permissions list of actual use modify, delete those and have requested that but not The authority used.Manifest files by yojan eventually pass through installation kit synthesis module with original byte code files Synthesize the installation package file that new lack of competence is excessively asked.
API extraction process is the core component of the inventive method.Its main function is extracted from byte code files All authorities used.Need to used in these three situations to authority extracted respectively.Accordingly, API is carried Take and be divided into three modules, be i.e. function call extraction module, Intent extraction modules and Content Provider extraction modules. These three modules are all with caused by the byte code files and API authority contingency table generating process that are obtained in installation kit decomposable process API authorities contingency table exports the least privilege list actually used for application program as input.
Api function calls all function calls in extraction module extraction procedure, and searches institute in API authority contingency tables Authority corresponding to call function, the authority found is added in the list of access right of output.
Api function calls extraction module to travel through each instruction in each method of each class, and checks that this instruction is It is not activation instruction.If it is, obtain the function lambda called of activation instruction, λ include the title of the function, parameter and Affiliated class.Judge whether to have in API authority contingency tables associating for function lambda and its authority, if so, then by λ in authority contingency table Corresponding all permissions are added in the list of the access right L of output.In order to ensure that L is least privilege list, for same One authority can only add once.
If the authority for not having function lambda in authority contingency table associates, check whether λ is possible to be inherited from authority contingency table In some API.Affiliated the class α and function name β of function lambda, backtracking class α inheritance chain are extracted respectively, and check authority Whether contain (α in contingency table:Authority association β), if it is not, continuing to recall α, if so, then by authority contingency table The permissions list checked is added in L.Prevent due to some applications the access system resources by way of inheritance system service Caused by fail to report.
Intent extraction module extraction procedures send Action parameters during Intent requests, and in API authority contingency tables The middle authority searched corresponding to these Action parameters, is added in access right list.Content Provider are extracted The schema for the URL request that module extraction procedure is sent, and search in API authority contingency tables the power corresponding to these schema Limit, is added in access right list.Action parameters and URL schema are character string types, thus Intent and The mode that Content Provider extraction modules search the two parameters is to look in byte code files whether having corresponding word Symbol string.
After the permissions list for obtaining application program actual use is extracted by API, the inventive method is also to requesting power The Manifest files of limit are modified, and yojan falls to have requested that but those untapped authorities, so as to reach least privilege..
Installation kit integration step performs the operation opposite with installation kit decomposition.Manifest files and peace after yojan Resulting byte code files and some other resource file decomposited are integrated by installation kit together during dress bag decomposes, weight Newly it is integrated into installation package file.The installation package file recombined is in addition to its manifest file is modified, other portions Point all modified, therefore the original structure of application program, function and semanteme are not interfered with.Use the jar orders in JDK Manifest files, byte code files and other resource files are packed.
In summary, the present invention proposes a kind of portable set data processing method, and the authority of application program is carried out Analysis and constraint, improve program security and reliability, and do not influence the correct operation of program.
Obviously, can be with general it should be appreciated by those skilled in the art, above-mentioned each module of the invention or each step Computing system realize that they can be concentrated in single computing system, or be distributed in multiple computing systems and formed Network on, alternatively, they can be realized with the program code that computing system can perform, it is thus possible to they are stored Performed within the storage system by computing system.So, the present invention is not restricted to any specific hardware and software combination.
It should be appreciated that the above-mentioned embodiment of the present invention is used only for exemplary illustration or explains the present invention's Principle, without being construed as limiting the invention.Therefore, that is done without departing from the spirit and scope of the present invention is any Modification, equivalent substitution, improvement etc., should be included in the scope of the protection.In addition, appended claims purport of the present invention Covering the whole changes fallen into scope and border or this scope and the equivalents on border and repairing Change example.

Claims (2)

  1. A kind of 1. portable set data processing method, it is characterised in that including:
    Application program installation package file is decompressed, obtains byte code files and Manifest files;
    By traveling through API Calls all in byte code files extraction procedure, the corresponding authority needed for API is analyzed;
    The authority asked Manifest files is modified, and deletion has requested that but untapped authority;
    The amended Manifest files of authority will be passed through and reintegrate into installation package file with byte code files;
    It is described by traveling through API Calls all in byte code files extraction procedure, further comprise:
    The authority arrived used in these three situations is extracted to function call extraction, Intent extractions and Content Provider Extracted respectively, to be produced in the byte code files and API authority contingency table generating process that are obtained in installation kit decomposable process API authorities contingency table as input, using the least privilege list that application program actually use be used as export;
    Api function calls extraction to include all function calls in extraction procedure, and searches and called in API authority contingency tables Authority corresponding to function, the authority found is added in the list of access right of output;
    Api function calls extraction to include traveling through each instruction in each method of each class, and checks that present instruction is Activation instruction, if it is, obtain the function lambda called of activation instruction, the function lambda include the title of function, parameter and Affiliated class;Judge whether to have in API authority contingency tables associating for function lambda and its authority, if so, then by λ in authority contingency table Corresponding all permissions are added in the list of the access right L of output, can only be added once for same authority;
    If the authority for not having function lambda in authority contingency table associates, check whether function lambda is possible to be inherited from authority contingency table In some API, extract affiliated the class α and function name β of function lambda, backtracking class α inheritance chain respectively, and check authority Whether contain (α in contingency table:Authority association β), if associated without authority, continue to recall α, if having permission association, Then the permissions list checked in authority contingency table is added in L;
    Intent extractions include Action parameters when extraction procedure sends Intent requests, and are looked into API authority contingency tables The authority corresponding to these Action parameters is looked for, is added in access right list;
    Content Provider extract the schema for including the URL request that extraction procedure is sent, and in API authority contingency tables The authority corresponding to these schema is searched, is added in access right list, that is, searches in byte code files whether have phase The character string answered.
  2. 2. according to the method for claim 1, it is characterised in that the corresponding authority needed for the analysis API, further wrap Include:
    Manifest is extracted from installation kit to be measured, the apllied authority of application program is analyzed, then according to apllied authority The detection option of sensitive permission detection is determined, detection option includes the private data type of required detection and the side of required detection Boundary, sensitive permission detection is carried out for corresponding private data type and border according to detection option;
    Detection option is stored using system property, in system initialization, distributes one piece of shared section key to store attribute, init Finger daemon startup attribute service, the global variable that the information that system property is used between record system setting or process exchanges, Each attribute has a title and a respective value, and title and value are character string, and client is changed by attribute service, created Build, obtain system property in shared drive;
    After start completion, system property is directly set;Read the value of Tag and Bound two systems attributes, that is, the detection set Option, before sensitive permission is added, according to the detection option Tag values read, it is determined that required addition sensitive permission is privately owned Data type, corresponding code is performed, at border detection, according to the detection option Bound values read, it is determined that required monitoring Outlet, perform corresponding code, compiling source code generation system image, the image file compiled out loaded in simulator, Then installed in simulation system and run application program to be measured, the private data leakage behavior of application program is recorded automatically In system journal, system journal is finally obtained, daily record is analyzed and generates examining report.
CN201510658131.3A 2015-10-13 2015-10-13 A kind of portable set data processing method Active CN105354485B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510658131.3A CN105354485B (en) 2015-10-13 2015-10-13 A kind of portable set data processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510658131.3A CN105354485B (en) 2015-10-13 2015-10-13 A kind of portable set data processing method

Publications (2)

Publication Number Publication Date
CN105354485A CN105354485A (en) 2016-02-24
CN105354485B true CN105354485B (en) 2018-02-16

Family

ID=55330456

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510658131.3A Active CN105354485B (en) 2015-10-13 2015-10-13 A kind of portable set data processing method

Country Status (1)

Country Link
CN (1) CN105354485B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096399A (en) * 2016-06-01 2016-11-09 努比亚技术有限公司 The detection device and method of application programming interface
CN107315950B (en) * 2017-05-03 2020-10-09 北京大学 Automatic division method for minimizing authority of cloud computing platform administrator and access control method
CN108763922A (en) * 2018-06-19 2018-11-06 北京金山安全软件有限公司 Authority detection method and device, electronic equipment and medium
CN109597620B (en) * 2018-08-08 2022-04-01 北京字节跳动网络技术有限公司 Data processing method, device, equipment and storage medium
CN111327683B (en) * 2020-01-21 2022-12-16 奇安信科技集团股份有限公司 Encrypted information extraction method and device, computer equipment and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102289633A (en) * 2011-09-02 2011-12-21 广东欧珀移动通信有限公司 Method for managing dynamic permission of application program under Android platform
CN103761472A (en) * 2014-02-21 2014-04-30 北京奇虎科技有限公司 Application program accessing method and device based on intelligent terminal
CN104408366A (en) * 2014-11-26 2015-03-11 清华大学 Android application permission usage behavior tracking method based on plug-in technology
CN104462970A (en) * 2014-12-17 2015-03-25 中国科学院软件研究所 Android application program permission abuse detecting method based on process communication

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4643213B2 (en) * 2004-09-29 2011-03-02 シスメックス株式会社 Application program usage restriction method, measuring device user authentication system, authentication server, client device, and application program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102289633A (en) * 2011-09-02 2011-12-21 广东欧珀移动通信有限公司 Method for managing dynamic permission of application program under Android platform
CN103761472A (en) * 2014-02-21 2014-04-30 北京奇虎科技有限公司 Application program accessing method and device based on intelligent terminal
CN104408366A (en) * 2014-11-26 2015-03-11 清华大学 Android application permission usage behavior tracking method based on plug-in technology
CN104462970A (en) * 2014-12-17 2015-03-25 中国科学院软件研究所 Android application program permission abuse detecting method based on process communication

Also Published As

Publication number Publication date
CN105354485A (en) 2016-02-24

Similar Documents

Publication Publication Date Title
CN105184152B (en) A kind of mobile terminal data processing method
Zuo et al. Why does your data leak? uncovering the data leakage in cloud from mobile apps
Backes et al. Reliable third-party library detection in android and its security applications
US10437661B2 (en) Methods, systems, devices, and products for error correction in computer programs
CN105354485B (en) A kind of portable set data processing method
US20180246884A1 (en) Enterprise-level data protection with variable data granularity and data disclosure control with hierarchical summarization, topical structuring, and traversal audit
US20190007443A1 (en) Security policy analyzer service and satisfaibility engine
US8893288B2 (en) Prevention of information leakage from a document based on dynamic database label based access control (LBAC) policies
Akhawe et al. Privilege Separation in {HTML5} Applications
US9152796B2 (en) Dynamic analysis interpreter modification for application dataflow
Acar et al. No boundaries: data exfiltration by third parties embedded on web pages
Arnatovich et al. A comparison of android reverse engineering tools via program behaviors validation based on intermediate languages transformation
US9607171B2 (en) Preventing sharing of sensitive information through code repositories
CN111868727A (en) Data anonymization
CN114124444A (en) Security policy analyzer service and satisfiability engine
Kim et al. Dwroiddump: Executable code extraction from android applications for malware analysis
TW202101263A (en) Incremental decryption and integrity verification of a secure operating system image
CN110266792A (en) Address conversion method, device, equipment and computer readable storage medium
Elsayed et al. IFCaaS: information flow control as a service for cloud security
Shalev et al. WatchIT: Who watches your IT guy?
Cho et al. Vulnerabilities of android data sharing and malicious application to leaking private information
Stamatogiannakis et al. Prov 2r: practical provenance analysis of unstructured processes
Roy Choudhary Cross-platform testing and maintenance of web and mobile applications
Noorulla Web browser private mode forensics analysis
Beksultanova et al. Analysis tools for smart contract security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190510

Address after: 610000 Room 2101, 21/F, G5 Building 1858, Middle Section of Yizhou Avenue, Chengdu High-tech Zone, Sichuan Province

Patentee after: Sichuan Boiling Zhi Technology Co.,Ltd.

Address before: 610000 No. 704, 7th Floor, No. 1800, Middle Section of Yizhou Avenue, Chengdu High-tech Zone, Sichuan Province

Patentee before: SICHUAN XIECHUANG INFORMATION TECHNOLOGY SERVICE Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220705

Address after: 610000 Room 2101, 21/F, G5 Building 1858, Middle Section of Yizhou Avenue, Chengdu High-tech Zone, Sichuan Province

Patentee after: SHINE TECHNOLOGY Co.,Ltd.

Address before: 610000 Room 2101, 21/F, G5 Building 1858, Middle Section of Yizhou Avenue, Chengdu High-tech Zone, Sichuan Province

Patentee before: Sichuan Boiling Zhi Technology Co.,Ltd.

TR01 Transfer of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A data processing method for portable equipment

Effective date of registration: 20220713

Granted publication date: 20180216

Pledgee: Chengdu Tianfu New Area sub branch of Postal Savings Bank of China Ltd.

Pledgor: SHINE TECHNOLOGY Co.,Ltd.

Registration number: Y2022510000209

PE01 Entry into force of the registration of the contract for pledge of patent right