CN105337999A - Method for improving stability of cloud computing environment - Google Patents

Method for improving stability of cloud computing environment Download PDF

Info

Publication number
CN105337999A
CN105337999A CN201510866641.XA CN201510866641A CN105337999A CN 105337999 A CN105337999 A CN 105337999A CN 201510866641 A CN201510866641 A CN 201510866641A CN 105337999 A CN105337999 A CN 105337999A
Authority
CN
China
Prior art keywords
cloud computing
computing environment
information
hidden danger
stability
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510866641.XA
Other languages
Chinese (zh)
Other versions
CN105337999B (en
Inventor
张鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing tengkai Network Co.,Ltd.
Original Assignee
Chengdu Zhongxun Innovative Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Zhongxun Innovative Information Technology Co Ltd filed Critical Chengdu Zhongxun Innovative Information Technology Co Ltd
Priority to CN201510866641.XA priority Critical patent/CN105337999B/en
Publication of CN105337999A publication Critical patent/CN105337999A/en
Application granted granted Critical
Publication of CN105337999B publication Critical patent/CN105337999B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1025Dynamic adaptation of the criteria on which the server selection is based
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1008Server selection for load balancing based on parameters of servers, e.g. available memory or workload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Abstract

The invention provides a method for improving stability of the cloud computing environment. The method includes the steps that information is captured, the information is analyzed and extracted to be processed, whether stability hidden hazards are brought to the cloud computing environment or not is judged, and if yes, a stable strategy is started to prevent the hidden hazards. By means of operation of the cloud computing environment through the method, stability of the cloud computing environment can be effectively improved, and the safety and stability problems caused by quick increasing in the aspects of complexity, handling capacity and the like of cloud computing are solved.

Description

A kind of method improving cloud computing environment stability
Technical field
The present invention relates to electrical signal data process field, more specifically, relate to a kind of method improving cloud computing environment stability.
Background technology
Along with the fast development of the technology such as cyber-net, modern society enters the information age, thus grows with each passing day to the demand of integration management and exploitation that information resources carry out efficient quick.Simultaneously along with the development of Internet of Things, information management becomes more complicated, and require day by day to increase to computing capability, data to be managed are day by day huge, and the cost of the technology such as the safety assurance of information management system and daily operation maintenance is constantly risen.This is for enterprise, proposes challenge from efficiency, economy, data processing aspect.And the appearance of " cloud computing (Cloudcomputing) ", information-based method can be realized with low cost high yield.Cloud computing is new computation model, and calculation task is distributed on the resource pool of a large amount of computer composition by it, enables various application system obtain computing capability, memory space and various software service as required.It is the product that the traditional calculations machine technologies such as grid computing, Distributed Calculation, parallel computation, function calculating, the network storage, virtual, load balancing and network technical development merge, be intended to, by network, the computational entity of multiple advantage of lower cost is integrated into the perfect system that has powerful calculating ability, and namely serve by software, namely platform serves, namely infrastructure serve, MSP etc. is advanced pattern is distributed to powerful computing capability in terminal use's hand.
The appearance of cloud computing makes user directly to cloud service provider rental service device, information data can be kept on Cloud Server, and buys hardware device without the need to dropping into a large amount of funds.And Cloud Server is for user, not only early investment cost is low, and energy consumption is little, and later maintenance expense is low, has good flexibility, adaptability and protects malleability, so cloud computing is following inexorable trend.
But, because cloud computing environment has merged the network information technology, it inevitably introduces lot of unstable factor, such as, be not limited to the connection fault on network attack, Virus entry, network node, the fault of Cloud Server, the fault of cloud computing environment management platform etc.This brings stability problem and hidden danger to cloud computing environment and the universal further of platform, in art technology, investigation and application emphasis mainly concentrates on Distributed Calculation, parallel computation, virtual mirror image and the aspect such as operation, load balancing, the stability brought for the quick increase of the aspect such as complexity, treating capacity of cloud computing does not have enough attention, therefore in the urgent need to solving this technical problem.
Summary of the invention
An object of the present invention is to provide a kind of method improving cloud computing environment stability, the method is by operating cloud computing environment, can effectively improve cloud computing environment stability, solve the technical problem of safety that the quick increase for the aspect such as complexity, treating capacity of cloud computing brings and stability.
The present invention solves the problems of the technologies described above the technical scheme taked to be: a kind of method improving cloud computing environment stability, comprise step: capturing information, analysis and information extraction process, judge whether to bring stability hidden danger to cloud computing environment, and if have hidden danger, start stable strategy to stop hidden danger.
According to an aspect of the present invention, capturing information comprises: real-time capturing information from cloud computing environment, to obtain the information of the doubtful hidden danger of automatic network; Management platform in cloud computing environment receives the information of this doubtful hidden danger.To analyze and information extraction is carried out process and comprised: the information of this doubtful hidden danger is carried out category analysis and is further processed based on this classification by the management platform in cloud computing environment, to extract for relatively or the available information mated.Judge whether to bring stability hidden danger to comprise to cloud computing environment: the information of this doubtful hidden danger compares with the data storing in the background or record or mates by the management platform in cloud computing environment, and then determine whether the information of doubtful hidden danger brings stability hidden danger to cloud computing environment further; To store in backstage or the data of record comprise about the information of history stability hidden danger or program or application or routine or embodied on computer readable fragment, or it is from the stability hidden danger information of this locality itself, or is stored in this locality but from the copy of long-range stability hidden danger information; If there is hidden danger, starts stable strategy and comprise to stop hidden danger: if determine that the information of doubtful hidden danger brings stability hidden danger to cloud computing environment, management platform then in cloud computing environment starts the security strategy being used for stability, stops the information of doubtful hidden danger.
According to another aspect of the present invention, wherein the method comprises further: obtain cloud computing environment interior joint a, the connection between b exists the probability P of data transmit-receive cI(a, b), determines the S set to the factor that the transmitting-receiving of the connection between this node is disturbed cI(a, b); Catch the data flow transmitting-receiving speed V of the connection between cloud computing environment interior joint in real time cI(a, b); Calculate the improper value E of this connection cI(a, b); Management platform in cloud computing environment is by E cI(a, b) compare with threshold value, if be more than or equal to this threshold value, management platform then in cloud computing environment start the ratio being used for stability before the higher security strategy of described intensity, two nodes of this connection are blocked, and record this event, and remind other nodes of being connected with these two nodes: suspend and any one data transmit-receive and processing data information in these two nodes; Undertaken reviewing one's lessons by oneself redoubling checking by the module in this cloud computing platform with self-repair function; Periodically obtain the state information of Cloud Server in cloud computing environment, if there is fault, transfer the profile information of this Cloud Server, according to its performance and importance parameter, selectivity parameter is better than or higher than one or more redundant servers of this Cloud Server, and this redundant server in scheduling cloud computing environment create new node based on the profile information of this Cloud Server and importance parameter thereon, and configure the function of this new node and physics and virtual link.
Accompanying drawing explanation
By the mode of example instead of by the mode of restriction, embodiments of the invention are shown in the accompanying drawings, wherein identical Reference numeral represents identical element, wherein:
Fig. 1 is exemplified with the method framework improving cloud computing environment stability.
Embodiment
In the following description, also several specific embodiment is shown by way of illustration with reference to accompanying drawing.It is to be appreciated that: can imagine and other embodiments can be made and do not depart from the scope of the present disclosure or spirit.Therefore, below describe in detail and should not be considered to have limited significance.
According to embodiments of the invention, Fig. 1, exemplified with the method framework improving cloud computing environment stability, comprising: capturing information, and analysis and information extraction process, judge whether to bring stability hidden danger to cloud computing environment, if there is hidden danger, start stable strategy to stop hidden danger.
According to embodiments of the invention, the method framework of Fig. 1 illustrative raising cloud computing environment stability comprises following flow process further.In step sl, real-time capturing information from cloud computing environment, to obtain the information of the doubtful hidden danger of automatic network, such as but not limited to the information of network attack or Virus entry.In step s 2, the management platform in cloud computing environment receives the information of this doubtful hidden danger.In step s3, the information of this doubtful hidden danger is carried out category analysis and is further processed based on this classification by the management platform in cloud computing environment, to extract the available information being used for relatively or mating, such as, be not limited to data slot, usability of program fragments, application fragment, implant segment information etc.In step s 4 which, the information of this doubtful hidden danger compares with the data storing in the background or record or mates by the management platform in cloud computing environment, and then determines whether the information of doubtful hidden danger brings stability hidden danger to cloud computing environment further.To store in backstage or the data of record include, without being limited to about the information of history stability hidden danger or program or application or routine or embodied on computer readable fragment, it can be the stability hidden danger information itself from this locality, or is stored in this locality but from the copy of long-range stability hidden danger information.In step s 5, if determine that the information of doubtful hidden danger brings stability hidden danger to cloud computing environment, management platform then in cloud computing environment starts the security strategy being used for stability, stop the information of doubtful hidden danger, the means herein adopted such as are not limited to various network interrupter technique as known in the art.In step s 6, obtaining cloud computing environment interior joint a, there is the probability P of data transmit-receive in the connection between b cI(a, b), determines the S set to the factor that the transmitting-receiving of the connection between this node is disturbed cI(a, b), wherein CI represents I article of connection, I is positive integer, and a, b represent any two nodes in cloud computing environment, described factor is such as not limited to network attack, Virus entry, the interference mistake that causes for the interference mistake of Object node, the fault of node due to physical discontinuity or the external world of wirelessly interrupting causing of data cube computation etc.In the step s 7, the data flow transmitting-receiving speed V of the connection between cloud computing environment interior joint is caught in real time cI(a, b), V cI(a, b) is the summation of two unidirectional resource transmission data that I article in cloud computing environment between node a, b connects, that is the set of two-way resource interaction data.In step s 8, the improper value E of this connection is calculated cI(a, b), wherein wherein (a, b) is the probability being carried out fault or the instability disturbing to cause in the data transmit-receive that exists of connection between two nodes in cloud computing environment by a jth factor, and wherein G is the mean value of H, and represent the probability successfully sending packet via any one in node a, b.In step s 9, the management platform in cloud computing environment according to the result of step S8, by E cI(a, b) compare with threshold value, if be more than or equal to this threshold value, management platform then in cloud computing environment starts the security strategy than step S5 more high strength being used for stability, two nodes of this connection are blocked, and record this event, and remind other nodes of being connected with these two nodes: suspend and any one data transmit-receive and processing data information in these two nodes.In step slo, selfreparing is carried out with the self-repair module in this cloud computing platform with self-repair function, the checking of the data transmit-receive success or not of the connection between these two nodes is carried out after successful operation, and other nodes that notice is connected with these two nodes.In step s 11, periodically obtain the state information of Cloud Server in cloud computing environment, if state information detects that Cloud Server exists fault accordingly, management platform in cloud computing environment transfers the profile information of this Cloud Server, according to its performance and importance parameter, selectivity parameter is better than or higher than one or more redundant servers of this Cloud Server, and this redundant server in scheduling cloud computing environment create new node based on the profile information of this Cloud Server and importance parameter thereon, and configure the function of this new node and physics and virtual link.
To sum up, in the inventive solutions, by adopting described method to operate cloud computing environment, cloud computing environment stability be can effectively improve, safety and a stability difficult problem that the quick increase for the aspect such as complexity, treating capacity of cloud computing brings solved.
Node as herein described can be back end in general sense understood by one of ordinary skill in the art.In addition, this node also can include but not limited to the modules such as processor, controller, volatibility and/or nonvolatile memory.
It is to be appreciated that: the form of combination of hardware, software or hardware and software example of the present invention and embodiment can be realized.As mentioned above, the main body of this method of any execution can be stored, with the form of volatibility or non-volatile memories, such as memory device, whether no matter erasable picture ROM, maybe can rewrite, or in the form of a memory, such as such as RAM, memory chip, equipment or integrated circuit or on light or the readable medium of magnetic, such as such as CD, DVD, disk or tape.It is to be appreciated that: memory device and storage medium are the examples being suitable for the machine readable storage storing one or more program, upon being performed, described one or more program realizes example of the present invention.Via any medium, such as by the signal of communication that wired or wireless connection is loaded with, example of the present invention can be transmitted electronically, and example suitably comprises identical content.
It is to be noted that because the invention solves the technical problem in the safety brought for the quick increase in the complexity, treating capacity etc. of cloud computing and stability; to have employed in computer realm technical staff after reading this description according to the accessible technological means of its training centre; and obtain the Advantageous Effects effectively improving cloud computing environment stability, so scheme claimed in the following claims belongs to the technical scheme on patent law purposes.In addition, because the claimed technical scheme of claims can manufacture in the industry or use, therefore the program possesses practicality.
The above; be only the present invention's preferably embodiment, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; the change that can expect easily or replacement, all should forgive within protection scope of the present invention.Unless otherwise clearly stated, otherwise disclosed each feature is only the general equivalence of series or an example of similar characteristics.Therefore, protection scope of the present invention should be as the criterion with the protection range of claims.

Claims (10)

1. improve a method for cloud computing environment stability, comprise step:
Capturing information,
Analysis and information extraction process,
Judge whether to bring stability hidden danger to cloud computing environment, and
If there is hidden danger, start stable strategy to stop hidden danger.
2. the method for claim 1, wherein capturing information comprises: real-time capturing information from cloud computing environment, to obtain the information of the doubtful hidden danger of automatic network; And
The method comprises further: the management platform in cloud computing environment receives the information of this doubtful hidden danger.
3. method as claimed in claim 2, wherein to analyze and information extraction is carried out process and comprised: the information of this doubtful hidden danger is carried out category analysis and is further processed based on this classification by the management platform in cloud computing environment, to extract for relatively or the available information mated.
4. method as claimed in claim 3, wherein judge whether to bring stability hidden danger to comprise to cloud computing environment: the information of this doubtful hidden danger compares with the data storing in the background or record or mates by the management platform in cloud computing environment, and then determine whether the information of doubtful hidden danger brings stability hidden danger to cloud computing environment further; To store in backstage or the data of record comprise about the information of history stability hidden danger or program or application or routine or embodied on computer readable fragment, or it is from the stability hidden danger information of this locality itself, or is stored in this locality but from the copy of long-range stability hidden danger information; And
If there is hidden danger, starts stable strategy and comprise to stop hidden danger: if determine that the information of doubtful hidden danger brings stability hidden danger to cloud computing environment, management platform then in cloud computing environment starts the security strategy being used for stability, stops the information of doubtful hidden danger.
5. method as claimed in claim 4, wherein the method comprises further: obtain cloud computing environment interior joint a, the connection between b exists the probability P of data transmit-receive cI(a, b), determines the S set to the factor that the transmitting-receiving of the connection between this node is disturbed cI(a, b), wherein CI represents I article of connection, I is positive integer, and a, b represent any two nodes in cloud computing environment, described factor be following in any one: network attack, Virus entry, the interference mistake caused for the interference mistake of Object node, the fault of node due to physical discontinuity or the external world of wirelessly interrupting causing of data cube computation.
6. method as claimed in claim 5, wherein the method comprises further: the data flow transmitting-receiving speed V catching the connection between cloud computing environment interior joint in real time cI(a, b), V cI(a, b) is the summation of two unidirectional resource transmission data that I article in cloud computing environment between node a, b connects, that is the set of two-way resource interaction data.
7. method as claimed in claim 6, wherein the method comprises further: the improper value E calculating this connection cI(a, b), wherein E C I ( a , b ) = ( Σ j ∈ S C I ( a , b ) log P CI j ( a , b ) ) - log F , Wherein the probability being carried out fault or the instability disturbing to cause in the data transmit-receive of the connection existence between two nodes in cloud computing environment by a jth factor, and wherein G is the mean value of H, and represent the probability successfully sending packet via any one in node a, b.
8. method as claimed in claim 7, wherein the method comprises further: the management platform in cloud computing environment is by E cI(a, b) compare with threshold value, if be more than or equal to this threshold value, management platform then in cloud computing environment starts for the higher security strategy of the intensity described in claim 4 of stability, two nodes of this connection are blocked, and record this event, and remind other nodes of being connected with these two nodes: suspend and any one data transmit-receive and processing data information in these two nodes.
9. method as claimed in claim 8, wherein the method comprises further: carry out selfreparing with the self-repair module in this cloud computing platform with self-repair function, the checking of the data transmit-receive success or not of the connection between these two nodes is carried out after successful operation, and other nodes that notice is connected with these two nodes.
10. method as claimed in claim 9, wherein the method comprises further: the state information periodically obtaining Cloud Server in cloud computing environment, if state information detects that Cloud Server exists fault accordingly, management platform in cloud computing environment transfers the profile information of this Cloud Server, according to its performance and importance parameter, selectivity parameter is better than or higher than one or more redundant servers of this Cloud Server, and this redundant server in scheduling cloud computing environment create new node based on the profile information of this Cloud Server and importance parameter thereon, and configure the function of this new node and physics and virtual link.
CN201510866641.XA 2015-12-01 2015-12-01 A method of improving cloud computing environment stability Active CN105337999B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510866641.XA CN105337999B (en) 2015-12-01 2015-12-01 A method of improving cloud computing environment stability

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510866641.XA CN105337999B (en) 2015-12-01 2015-12-01 A method of improving cloud computing environment stability

Publications (2)

Publication Number Publication Date
CN105337999A true CN105337999A (en) 2016-02-17
CN105337999B CN105337999B (en) 2018-11-20

Family

ID=55288281

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510866641.XA Active CN105337999B (en) 2015-12-01 2015-12-01 A method of improving cloud computing environment stability

Country Status (1)

Country Link
CN (1) CN105337999B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106571969A (en) * 2016-11-11 2017-04-19 工业和信息化部电信研究院 Cloud service availability assessment method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020143923A1 (en) * 2001-04-03 2002-10-03 Vigilos, Inc. System and method for managing a device network
CN103812699A (en) * 2014-02-17 2014-05-21 无锡华云数据技术服务有限公司 Monitoring management system based on cloud computing
CN104092730A (en) * 2014-06-20 2014-10-08 裴兆欣 Cloud computing system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020143923A1 (en) * 2001-04-03 2002-10-03 Vigilos, Inc. System and method for managing a device network
CN103812699A (en) * 2014-02-17 2014-05-21 无锡华云数据技术服务有限公司 Monitoring management system based on cloud computing
CN104092730A (en) * 2014-06-20 2014-10-08 裴兆欣 Cloud computing system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106571969A (en) * 2016-11-11 2017-04-19 工业和信息化部电信研究院 Cloud service availability assessment method and system
CN106571969B (en) * 2016-11-11 2019-09-27 工业和信息化部电信研究院 A kind of cloud service usability evaluation method and system

Also Published As

Publication number Publication date
CN105337999B (en) 2018-11-20

Similar Documents

Publication Publication Date Title
CN104796270A (en) Method and device for recommending suspicious components during problem diagnosis of cloud application
CN104090886A (en) Method and device for constructing real-time portrayal of user
CN103761309A (en) Operation data processing method and system
US20130326028A1 (en) Server migration
CN102413186B (en) Resource scheduling method and device based on private cloud computing, and cloud management server
CN112633649A (en) Power grid multi-attribute important node evaluation and planning method
CN109034580B (en) Information system overall health degree evaluation method based on big data analysis
CN107357730A (en) A kind of system fault diagnosis restorative procedure and device
CN107832475A (en) Deployment control method, deployment control engine and deployment control system
CN111083179B (en) Internet of things cloud platform, and equipment interaction method and device based on same
CN105607606B (en) A kind of data acquisition device and method based on double mainboard frameworks
CN105337999A (en) Method for improving stability of cloud computing environment
CN104580109A (en) Method and device for generating click verification code
CN105516283A (en) Device for enhancing stability of cloud computing environment
CN101286903B (en) Method for enhancing integrity of sessions in network audit field
CN114500229B (en) Network alarm positioning and analyzing method based on space-time information
CN111431872A (en) Two-stage Internet of things equipment identification method based on TCP/IP protocol characteristics
CN110276852A (en) Unmanned plane method for inspecting and device
CN114598731B (en) Cluster log acquisition method, device, equipment and storage medium
CN110674080A (en) Method and system for collecting large-data-volume non-structural files based on NiFi
CN105450751A (en) System capable of improving stability of cloud computing environment
CN106571969B (en) A kind of cloud service usability evaluation method and system
CN105446707A (en) Data conversion method
CN114900835A (en) Malicious traffic intelligent detection method and device and storage medium
CN107800710A (en) A kind of intelligent appliance and platform connection methods, system and Internet of Things module

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20181011

Address after: 210000 No. 3, ancient Tan Road, Gaochun Economic Development Zone, Nanjing, Jiangsu

Applicant after: Nanjing crown Kai Information Technology Co., Ltd.

Address before: 610041 No. 13, 2 building, 387 Tianren Road, high-tech zone, Chengdu, Sichuan, China 1306

Applicant before: CHENGDU ZHONGXUN INNOVATIVE INFORMATION TECHNOLOGY CO., LTD.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201214

Address after: No.208, Zhenxing Road, Chunxi Town, Gaochun County, Nanjing City, Jiangsu Province, 210000

Patentee after: Nanjing tengkai Network Co.,Ltd.

Address before: 210000 No. 3, ancient Tan Road, Gaochun Economic Development Zone, Nanjing, Jiangsu

Patentee before: Nanjing crown Kai Information Technology Co.,Ltd.