CN114726880A - Information storage method based on cloud computing - Google Patents

Information storage method based on cloud computing Download PDF

Info

Publication number
CN114726880A
CN114726880A CN202210381178.XA CN202210381178A CN114726880A CN 114726880 A CN114726880 A CN 114726880A CN 202210381178 A CN202210381178 A CN 202210381178A CN 114726880 A CN114726880 A CN 114726880A
Authority
CN
China
Prior art keywords
data
cloud
data stream
virus
original
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210381178.XA
Other languages
Chinese (zh)
Other versions
CN114726880B (en
Inventor
王福成
周富
侯静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yu Chenglong
Original Assignee
Tongling Jiuzhuang Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tongling Jiuzhuang Network Technology Co ltd filed Critical Tongling Jiuzhuang Network Technology Co ltd
Priority to CN202210381178.XA priority Critical patent/CN114726880B/en
Publication of CN114726880A publication Critical patent/CN114726880A/en
Application granted granted Critical
Publication of CN114726880B publication Critical patent/CN114726880B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses an information storage method based on cloud computing, which relates to the technical field of information storage, wherein a data acquisition port is constructed through the cloud computing technology, cloud data are acquired through the data acquisition port, a data identification interval is constructed, the acquired cloud data are screened and filtered through the data identification interval, and the data acquisition port is used as a terminal for temporarily storing data, so that the frequency of data transmission among modules in a system can be relieved, the load of the system is reduced, the time difference exists between the process of computing a large amount of cloud data and the process of data transmission, and the computation magnitude required by the system can be greatly reduced; the acquired cloud data are subjected to sectional detection, so that each section of unit code in a data stream corresponding to the cloud data can be matched with the virus data, and the virus data are prevented from being hidden in normal data and entering a storage terminal of a user.

Description

Information storage method based on cloud computing
Technical Field
The invention relates to the technical field of information storage, in particular to an information storage method based on cloud computing.
Background
Cloud storage is a new concept extended and developed on the cloud computing concept, and refers to a system which integrates a large number of storage devices of different types in a network through application software to cooperatively work through functions such as cluster application, network technology or a distributed file system and provides data storage and service access functions to the outside; when the core of operation and processing of the cloud computing system is storage and management of a large amount of data, a large amount of storage devices need to be configured in the cloud computing system, and then the cloud computing system is converted into a cloud storage system, so that the cloud storage is the cloud computing system taking the data storage and management as the core.
Most of existing cloud storage technologies are used for synchronously acquiring data and operating the data, virus data cannot be effectively discriminated whether the acquired data is hidden or not, particularly, when a user cannot directly identify the virus data, the data with hidden danger is often authorized, and therefore other data in a user terminal are damaged after the data are stored in the user terminal.
Disclosure of Invention
The invention aims to provide an information storage method based on cloud computing.
The purpose of the invention can be realized by the following technical scheme: an information storage method based on cloud computing comprises the following steps:
the method comprises the following steps: a data acquisition port is constructed through a cloud computing technology, and cloud data are acquired through the data acquisition port;
step two: constructing a data identification interval, and screening the acquired cloud data through the data identification interval;
step three: and filtering the screened data, and uploading the filtered data to a storage terminal.
Further, the process of acquiring the cloud data by the data acquisition port specifically includes:
the method comprises the steps of constructing data acquisition ports, connecting the data acquisition ports with a cloud end, recording a port address of each data acquisition port, and allowing each port address through the cloud end so that each data acquisition port can obtain the authority of acquiring cloud data from the cloud end;
the cloud data are acquired from the cloud end in real time through the data acquisition port, and the acquired cloud data are stored in the data acquisition port;
and setting a data uploading period T, and uploading the cloud data acquired by the data acquisition port within the data uploading period T to a data identification interval every T time.
Further, the process of screening the acquired cloud data by the data identification interval specifically includes:
classifying the acquired cloud data: generating a corresponding data type label according to the type of the cloud data, and binding the generated data type label with the corresponding cloud data;
and converting the obtained cloud data into a data stream, and linking the obtained data stream with a data type label of the corresponding cloud data to obtain an original data stream.
Further, the original data stream is composed of a plurality of unit codes, and the unit codes are binary codes.
Further, the process of matching the original data stream with virus data in a virus database includes: acquiring the arrangement sequence of unit codes of an original data stream, marking the unit codes in the original data stream when the unit codes of the original data stream are the same as the first unit codes of the data stream corresponding to the virus data, taking the unit codes as starting points, sequentially matching the following unit codes with the unit codes at the corresponding positions of the data stream corresponding to the virus data, and judging whether the original data stream is a dangerous data stream according to the matching result;
and when the original data stream is not a dangerous data stream, acquiring the similarity between the arrangement sequence of the section of the unit codes in the original data stream and the arrangement sequence of the unit codes of the data stream corresponding to the virus data.
Further, the obtaining manner of the similarity is as follows:
when the unit code of the original data stream is consistent with the unit code of the corresponding position in the data stream corresponding to the virus data, marking the unit code;
and acquiring the total number of the marked unit codes, the total number of the unit codes of the data stream corresponding to the virus data and the total number of the unit codes of the original data stream, thereby acquiring the similarity between the original data stream and the virus data.
Further, the filtering process of the cloud data by the data identification interval comprises:
when the original data stream is a dangerous data stream, intercepting the original data stream in a data identification interval and generating a data clearing instruction;
and sending a data clearing instruction to a user, clearing the original data stream in a data identification interval after the user confirms the data clearing instruction, marking a data acquisition port for acquiring the original data stream, acquiring a network address of the original data stream acquired by the data acquisition port, adding the network address into a blacklist, and simultaneously cleaning data of a data acquisition terminal to eliminate the relation between the data acquisition terminal and the network address.
Compared with the prior art, the invention has the beneficial effects that:
1. the data acquisition port is used as a terminal for temporarily storing data, so that the frequency of data transmission among modules in the system can be relieved, the load of the system is reduced, the time difference exists between the process of computing a large amount of cloud data and the process of data transmission, and the computation magnitude required by the system can be greatly reduced;
2. by carrying out sectional type detection on the acquired cloud data, each section of unit code in the data stream corresponding to the cloud data can be matched with the virus data, so that the virus data is prevented from being hidden in normal data and entering a storage terminal of a user.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
As shown in fig. 1, a method for storing information based on cloud computing includes the following steps:
the method comprises the following steps: a data acquisition port is constructed through a cloud computing technology, and cloud data are acquired through the data acquisition port;
step two: constructing a data identification interval, and screening the acquired cloud data through the data identification interval;
step three: and filtering the screened data, and uploading the filtered data to a storage terminal.
The process of acquiring the cloud data by the data acquisition port specifically comprises the following steps:
the method comprises the steps of constructing data acquisition ports, connecting the data acquisition ports with a cloud end, recording a port address of each data acquisition port, and allowing each port address through the cloud end so that each data acquisition port can obtain the authority of acquiring cloud data from the cloud end;
the cloud data are acquired from the cloud end in real time through the data acquisition port, and the acquired cloud data are stored in the data acquisition port;
and setting a data uploading period T, and uploading the cloud data acquired by the data acquisition port within the data uploading period T to a data identification interval every T time.
It should be further noted that, in the specific implementation process, the data acquisition port is used as a terminal for temporarily storing data, so that the frequency of data transmission among modules in the system can be reduced, the load of the system can be reduced, a time difference exists between the process of computing a large amount of cloud data and the process of data transmission, and the computation magnitude required by the system can be greatly reduced.
The process of screening the acquired cloud data by the data identification interval specifically comprises the following steps:
classifying the acquired cloud data: generating a corresponding data type label according to the type of the cloud data, and binding the generated data type label with the corresponding cloud data;
it should be further noted that, in the specific implementation process, the types of the cloud data include pictures, videos, texts, codes, and the like;
converting the obtained cloud data into a data stream, and linking the obtained data stream with a data type label of the corresponding cloud data to obtain an original data stream;
it should be further noted that, in the specific implementation process, the original data stream is composed of a plurality of unit codes, and the unit codes are binary codes;
acquiring the arrangement sequence of unit codes of an original data stream, and inputting the original data stream into a virus database;
it should be further explained that, in the specific implementation process, the data streams corresponding to different virus data are stored in the virus database, and the data streams corresponding to different data in the virus database are periodically updated;
matching the obtained original data stream with virus data in a virus database: when the unit code of the original data stream is the same as the first unit code of the data stream corresponding to the virus data, marking the unit code in the original data stream, and sequentially matching the following unit codes with the unit codes at the corresponding positions of the data stream corresponding to the virus data by taking the unit code as a starting point;
if the arrangement sequence of a certain section of unit codes in the original data stream is completely consistent with the arrangement sequence of the unit codes of the data stream corresponding to the virus data, directly marking the original data stream as a dangerous data stream;
if the arrangement sequence of a certain section of unit codes in the original data stream is partially consistent with the arrangement sequence of the unit codes of the data stream corresponding to the virus data, acquiring the similarity between the arrangement sequence of the section of unit codes in the original data stream and the arrangement sequence of the unit codes of the data stream corresponding to the virus data, and marking the obtained similarity as XS;
the obtaining mode of the similarity XS is as follows: marking the total number of unit codes of a data stream corresponding to virus data matched with an original data stream as n, wherein n is an integer and is more than 0;
when the unit code of the original data stream is consistent with the unit code of the corresponding position in the data stream corresponding to the virus data, marking the unit code;
acquiring the total number of marked unit codes, and marking the total number of marked unit codes as m;
acquiring the total number of unit codes of the original data stream, and marking the total number as k;
the similarity XS between the original data stream and the virus data is obtained as m2/k*n;
Setting a similarity threshold value X0, when XS is larger than X0, marking the corresponding virus data, and generating virus early warning information;
it is further noted that, in the specific implementation process, 0 < XS < 100%;
it should be further noted that, in the specific implementation process, different pieces of unit codes can exist in the original stream data at the same time to match with different virus data, that is, the same piece of original stream data can have a plurality of sets of similarities with different virus data, so as to determine how many kinds of virus data may be included in the original stream data.
It should be further explained that, in a specific implementation process, after the screening of the cloud data is completed, the data identification interval filters the cloud data after the screening is completed, and the process of filtering the cloud data by the data identification interval specifically includes:
when the original data stream is a dangerous data stream, intercepting the original data stream in a data identification interval and generating a data clearing instruction;
sending a data clearing instruction to a user, clearing the original data stream in a data identification interval after the user confirms the data clearing instruction, marking a data acquisition port for acquiring the original data stream, acquiring a network address of the original data stream acquired by the data acquisition port, adding the network address into a blacklist, and simultaneously cleaning data of a data acquisition terminal to eliminate the relation between the data acquisition terminal and the network address;
when virus early warning information is received, marking the corresponding original data stream;
marking the unit code segment corresponding to the original data stream, acquiring the content of cloud data corresponding to the unit code segment, extracting the content of the cloud data, and uploading the content corresponding to other parts in the original data stream to a storage terminal for storage;
the cloud data content and the corresponding virus early warning information at the extracted position are sent to a user, the user confirms the cloud data content and the virus early warning information, if the user confirms, an independent storage space is established in a storage terminal, and the cloud data are led into the storage space;
it should be further explained that, in the specific implementation process, the cloud data in the independent storage space cannot interact with other cloud data stored in the storage terminal, so that damage to other cloud data caused when the cloud data in the independent storage space is virus data is avoided.
Although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the present invention.

Claims (7)

1. An information storage method based on cloud computing is characterized by comprising the following steps:
the method comprises the following steps: a data acquisition port is constructed through a cloud computing technology, and cloud data are acquired through the data acquisition port;
step two: constructing a data identification interval, and screening the acquired cloud data through the data identification interval;
step three: and filtering the screened data, and uploading the filtered data to a storage terminal.
2. The information storage method based on cloud computing according to claim 1, wherein the process of acquiring the cloud data by the data acquisition port specifically includes:
the method comprises the steps of constructing data acquisition ports, connecting the data acquisition ports with a cloud end, recording a port address of each data acquisition port, and allowing each port address through the cloud end so that each data acquisition port can obtain the authority of acquiring cloud data from the cloud end;
the cloud data are acquired from the cloud end in real time through the data acquisition port, and the acquired cloud data are stored in the data acquisition port;
and setting a data uploading period T, and uploading the cloud data acquired by the data acquisition port within the data uploading period T to a data identification interval every T time.
3. The information storage method based on cloud computing according to claim 2, wherein the process of screening the acquired cloud data by the data identification interval specifically comprises:
classifying the acquired cloud data: generating a corresponding data type label according to the type of the cloud data, and binding the generated data type label with the corresponding cloud data;
and converting the obtained cloud data into a data stream, linking the obtained data stream with a data type label of the corresponding cloud data to obtain an original data stream, and matching the original data stream with virus data in a virus database.
4. The information storage method based on cloud computing of claim 3, wherein the original data stream is composed of a plurality of unit codes, and the unit codes are binary codes.
5. The information storage method based on cloud computing according to claim 4, wherein the process of matching the original data stream with the virus data in the virus database comprises: acquiring the arrangement sequence of unit codes of an original data stream, marking the unit codes in the original data stream when the unit codes of the original data stream are the same as the first unit codes of the data stream corresponding to the virus data, sequentially matching the following unit codes with the unit codes at the corresponding positions of the data stream corresponding to the virus data by taking the unit codes as starting points, and judging whether the original data stream is a dangerous data stream according to the matching result;
and when the original data stream is not a dangerous data stream, acquiring the similarity between the arrangement sequence of the unit codes in the original data stream and the arrangement sequence of the unit codes in the data stream corresponding to the virus data.
6. The information storage method based on cloud computing according to claim 5, wherein the similarity is obtained in a manner that:
when the unit code of the original data stream is consistent with the unit code of the corresponding position in the data stream corresponding to the virus data, marking the unit code;
and acquiring the total number of the marked unit codes, the total number of the unit codes of the data stream corresponding to the virus data and the total number of the unit codes of the original data stream, thereby acquiring the similarity between the original data stream and the virus data.
7. The information storage method based on cloud computing according to claim 6, wherein the filtering process of the cloud data by the data identification interval comprises:
when the original data stream is a dangerous data stream, intercepting the original data stream in a data identification interval and generating a data clearing instruction;
and sending a data clearing instruction to a user, clearing the original data stream in a data identification interval after the user confirms the data clearing instruction, marking a data acquisition port for acquiring the original data stream, acquiring a network address of the original data stream acquired by the data acquisition port, adding the network address into a blacklist, and simultaneously cleaning data of a data acquisition terminal to eliminate the relation between the data acquisition terminal and the network address.
CN202210381178.XA 2022-04-12 2022-04-12 Information storage method based on cloud computing Active CN114726880B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210381178.XA CN114726880B (en) 2022-04-12 2022-04-12 Information storage method based on cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210381178.XA CN114726880B (en) 2022-04-12 2022-04-12 Information storage method based on cloud computing

Publications (2)

Publication Number Publication Date
CN114726880A true CN114726880A (en) 2022-07-08
CN114726880B CN114726880B (en) 2024-04-26

Family

ID=82243063

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210381178.XA Active CN114726880B (en) 2022-04-12 2022-04-12 Information storage method based on cloud computing

Country Status (1)

Country Link
CN (1) CN114726880B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100332593A1 (en) * 2009-06-29 2010-12-30 Igor Barash Systems and methods for operating an anti-malware network on a cloud computing platform
CN102055730A (en) * 2009-11-02 2011-05-11 华为终端有限公司 Cloud processing system, cloud processing method and cloud computing agent device
CN103118036A (en) * 2013-03-07 2013-05-22 上海电机学院 Cloud end based intelligent security protection system and method
CN106095954A (en) * 2016-06-14 2016-11-09 成都镜杰科技有限责任公司 Data base management method for enterprise supply chain
CN106127064A (en) * 2016-06-14 2016-11-16 成都镜杰科技有限责任公司 Date storage method for enterprise supply chain
US20170372070A1 (en) * 2016-06-28 2017-12-28 Sophos Limited Cloud storage scanner
CN109861995A (en) * 2019-01-17 2019-06-07 安徽谛听信息科技有限公司 A kind of safe big data intelligent analysis method of cyberspace, computer-readable medium
CN110602153A (en) * 2018-06-13 2019-12-20 李莎 Software big data safe storage verification system
CN110941823A (en) * 2018-09-21 2020-03-31 武汉安天信息技术有限责任公司 Threat information acquisition method and device
CN111026795A (en) * 2019-11-27 2020-04-17 成都耍流量网络科技有限公司 Multi-platform data fusion system based on big data
CN111885210A (en) * 2020-08-10 2020-11-03 上海上实龙创智能科技股份有限公司 Cloud computing network monitoring system based on end user environment
CN113572744A (en) * 2021-07-07 2021-10-29 浙江工业大学 Data security processing method based on big data
CN113676534A (en) * 2021-08-18 2021-11-19 中山政数大数据科技有限公司 AI algorithm flow and service all-in-one machine based on edge calculation
CN113868498A (en) * 2021-09-29 2021-12-31 珠海格力电器股份有限公司 Data storage method, electronic device, device and readable storage medium
CN114253484A (en) * 2021-12-25 2022-03-29 东莞市微三云大数据科技有限公司 Big data cloud storage server

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100332593A1 (en) * 2009-06-29 2010-12-30 Igor Barash Systems and methods for operating an anti-malware network on a cloud computing platform
CN102055730A (en) * 2009-11-02 2011-05-11 华为终端有限公司 Cloud processing system, cloud processing method and cloud computing agent device
CN103118036A (en) * 2013-03-07 2013-05-22 上海电机学院 Cloud end based intelligent security protection system and method
CN106095954A (en) * 2016-06-14 2016-11-09 成都镜杰科技有限责任公司 Data base management method for enterprise supply chain
CN106127064A (en) * 2016-06-14 2016-11-16 成都镜杰科技有限责任公司 Date storage method for enterprise supply chain
US20170372070A1 (en) * 2016-06-28 2017-12-28 Sophos Limited Cloud storage scanner
CN110602153A (en) * 2018-06-13 2019-12-20 李莎 Software big data safe storage verification system
CN110941823A (en) * 2018-09-21 2020-03-31 武汉安天信息技术有限责任公司 Threat information acquisition method and device
CN109861995A (en) * 2019-01-17 2019-06-07 安徽谛听信息科技有限公司 A kind of safe big data intelligent analysis method of cyberspace, computer-readable medium
CN111026795A (en) * 2019-11-27 2020-04-17 成都耍流量网络科技有限公司 Multi-platform data fusion system based on big data
CN111885210A (en) * 2020-08-10 2020-11-03 上海上实龙创智能科技股份有限公司 Cloud computing network monitoring system based on end user environment
CN113572744A (en) * 2021-07-07 2021-10-29 浙江工业大学 Data security processing method based on big data
CN113676534A (en) * 2021-08-18 2021-11-19 中山政数大数据科技有限公司 AI algorithm flow and service all-in-one machine based on edge calculation
CN113868498A (en) * 2021-09-29 2021-12-31 珠海格力电器股份有限公司 Data storage method, electronic device, device and readable storage medium
CN114253484A (en) * 2021-12-25 2022-03-29 东莞市微三云大数据科技有限公司 Big data cloud storage server

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
肖亮;李强达;刘金亮;: "云存储安全技术研究进展综述", 数据采集与处理, 15 May 2016 (2016-05-15) *
薛佳桦;: "云计算下的计算机网络安全技术的优化策略", 电子技术与软件工程 *

Also Published As

Publication number Publication date
CN114726880B (en) 2024-04-26

Similar Documents

Publication Publication Date Title
CN102831127B (en) Method, device and system for processing repeating data
US10547523B2 (en) Systems and methods for extracting media from network traffic having unknown protocols
EP2186275B1 (en) Generating a fingerprint of a bit sequence
CN107222511B (en) Malicious software detection method and device, computer device and readable storage medium
EP3948604B1 (en) Computer security
CN116415206B (en) Operator multiple data fusion method, system, electronic equipment and computer storage medium
CN113254255B (en) Cloud platform log analysis method, system, device and medium
US11989161B2 (en) Generating readable, compressed event trace logs from raw event trace logs
GB2583892A (en) Adaptive computer security
CN111523527A (en) Special transport vehicle monitoring method and device, medium and electronic equipment
GB2582609A (en) Pre-emptive computer security
CN113434857A (en) User behavior safety analysis method and system applying deep learning
CN116383742B (en) Rule chain setting processing method, system and medium based on feature classification
CN114726880B (en) Information storage method based on cloud computing
CN111143312A (en) Format analysis method, device, equipment and storage medium for power logs
KR102559398B1 (en) Security monitoring intrusion detection alarm processing device and method using artificial intelligence
CN110457323B (en) Data table processing method and device
CN114465875A (en) Fault processing method and device
CN110196793B (en) Log analysis method and device for plug-in database
CN113688240A (en) Threat element extraction method, device, equipment and storage medium
CN112597498A (en) Webshell detection method, system and device and readable storage medium
CN117112846B (en) Multi-information source license information management method, system and medium
CN113381986B (en) Reduction method and device for network security scanning rule set
CN111581512A (en) Webpage visitor number statistical method and device
CN116108226A (en) Data processing method, device, terminal equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20240325

Address after: Room 202, Door 2, Building 10, Zone E, Milan Sunshine Garden, Xianshuigu Town, Jinnan District, Tianjin City, 300350

Applicant after: Yu Chenglong

Country or region after: China

Address before: 244000 room 1002, Zone D, building 1, Jiahua Plaza, Tongling City, Anhui Province

Applicant before: Tongling jiuzhuang Network Technology Co.,Ltd.

Country or region before: China

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant