CN100496052C - Method and system for testing safety access protocol conformity of network terminal - Google Patents

Method and system for testing safety access protocol conformity of network terminal Download PDF

Info

Publication number
CN100496052C
CN100496052C CNB2006100418484A CN200610041848A CN100496052C CN 100496052 C CN100496052 C CN 100496052C CN B2006100418484 A CNB2006100418484 A CN B2006100418484A CN 200610041848 A CN200610041848 A CN 200610041848A CN 100496052 C CN100496052 C CN 100496052C
Authority
CN
China
Prior art keywords
field
access point
protocol
wapi
test
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CNB2006100418484A
Other languages
Chinese (zh)
Other versions
CN1812418A (en
Inventor
张变玲
曹军
涂学峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Iwncomm Co Ltd
Original Assignee
China Iwncomm Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Iwncomm Co Ltd filed Critical China Iwncomm Co Ltd
Priority to CNB2006100418484A priority Critical patent/CN100496052C/en
Publication of CN1812418A publication Critical patent/CN1812418A/en
Priority to PCT/CN2007/000635 priority patent/WO2007098692A1/en
Application granted granted Critical
Publication of CN100496052C publication Critical patent/CN100496052C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/03Protocol definition or specification 

Abstract

A method for testing safety switching in protocol conformity of network terminal includes activating safety switching in certification procedure, seizing safety switching in protocol data packet generated in certification procedure, detecting and analyzing package format and protocol flow process of safety switching in protocol data packet.

Description

The method and system of the safety switch-in protocol conformity of turn-on test of the network terminal
One, technical field
The present invention relates to network security access protocol field tests, especially a kind of method and system thereof of safety switch-in protocol conformity of turn-on test of the network terminal.
Two, background technology
IP network loaded service kind is various day by day, got involved in national economy and each aspect of society, Wireless IP network more makes the opening of network physical reach the new stage by the radio wave transmissions data, thus, safety inserts becomes key issue wired and the wireless network secure operation.
The safety access system of IP network is mainly concerned with three network entities: the network terminal, access point (claiming the base station again) and authentication server.The various resources that network terminal request access network, enjoy network provide; Access point is the edge device of IP internet, is the entity that access service is provided for the network user; Authentication server provides the entity that user identity is differentiated service.
Mainly contain the auxiliary management test macro that WI-FI alliance uses at interoperability test macro and some WLAN (wireless local area network) of IEEE802.11 standard about network terminal product safety access protocol test macro at present.Wherein auxiliary management test macro mainly provides network system installation and the relevant information of using by the state of monitoring physical channel and network.The interoperability test macro of WI-FI alliance is to verify the correctness that agreement realizes in the Devices to test by the test Devices to test with the interoperability of reference device and the performance of communicating by letter, and promptly the agreement accordance detects.This test macro has following shortcoming:
1, by the typical application environment, promptly the interoperability of upper-layer protocol comes testing equipment to have imperfection, and may there be deviation in test result.
2, the correctness degree of reference device realization will have a strong impact on precision of test result.
3, can not provide test not by the location of mistake information under the situation.
Three, summary of the invention
The present invention is for solving the above-mentioned technical problem that exists in the background technology, and provides that a kind of test result is accurate, test data is complete and can carry out the method and the system thereof of safety switch-in protocol conformity of turn-on test of the network terminal of location of mistake.
Technical solution of the present invention is: a kind of method of safety switch-in protocol conformity of turn-on test of the network terminal, and its special character is: this method may further comprise the steps:
1) activates safe access protocol verification process;
2) catch the safe access protocol packet that produces in this verification process;
3) analyzing and testing safety access protocol packet encapsulation form and agreement flow process.
Above-mentioned safe access protocol is WAPI agreement or IEEE802.11i agreement.
When the safety access protocol was the WAPI agreement, said method comprised that also step 4) disposes the combined situation that WAPI enables in terminal and access point respectively, analyzes the correctness that the access point access control function is realized.
Above-mentioned steps 4) combined situation that terminal in and access point configuration WAPI enable comprises:
1.1) terminal to be measured enables that the WAI wildcard is differentiated and the WAPI security mechanism of key management mode, the benchmark access point adopts the WAPI security mechanism of certificate discriminating and key management mode, and dut terminal can not be communicated by letter with the benchmark access point;
1.2) terminal to be measured enables that the WAI certificate is differentiated and the WAPI security mechanism of key management mode, the benchmark access point adopts the WAPI security mechanism of wildcard discriminating and key management mode, and terminal can not be communicated by letter with the benchmark access point.
Above-mentioned WAPI protocol data bag comprises: WAI: differentiate Active Frame, access discriminating request, request of certificate authentication, certificate discriminating response, insert and differentiate that response, unicast key agreement request, unicast key agreement response, unicast key agreement affirmation, multicast key notification, multicast key notification respond; WPI: unicast data frames.
Above-mentioned steps 2) incomplete if the WAPI protocol data is caught in, the network terminal then to be measured continues 3 to handle set by step catching data not by the WAPI test, and display result.
Above-mentioned access differentiates that the analyte detection process of request is as follows:
2.1) check the whether regulation in the conformance with standard of version number;
2.2) check whether the data length field value is consistent with the length of data field;
2.3) differentiate relatively whether the value of the discriminating identification field in the discriminating grouping that the value of identification field and access point send is identical;
2.4) whether comparison terminal certificate field content identical with local terminal certificate content of preserving;
2.5) check whether encapsulation format and the length of the signature field of ASUE inquiry, ASUE key data, terminal identity, ECDH parameter and ASUE conform to regulation in the standard.
The analyte detection process of above-mentioned unicast key agreement response is as follows:
3.1) check the whether regulation in the conformance with standard of version number;
3.2) check whether the data length field value is consistent with the length of data field;
3.3) length of checking BKID, USKID, ADDID, ASUE inquiry and WIE field whether with standard in stipulate consistent;
3.4) check whether the value of the AE inquiry field in the value of AE inquiry field and the unicast key agreement request that access point sends is identical;
3.5) check whether the length of Message Authentication Code field is consistent with regulation in the standard.
The analyte detection process of above-mentioned multicast key notification response is as follows:
4.1) check the whether regulation in the conformance with standard of version number;
4.2) check whether the data length field value is consistent with the length of data field;
4.3) relatively whether the MSKID field value identical with MSKID field value during the multicast key notification that access point sends is divided into groups;
4.4) relatively whether the USKID field value identical with USKID field value during the multicast key notification that access point sends is divided into groups;
4.5) relatively whether the key announce identification field values identical with key announce identification field values during the multicast key notification that access point sends is divided into groups;
4.6) check whether the length of Message Authentication Code field is consistent with regulation in the standard.
The analyte detection process of above-mentioned unicast data frames is as follows:
5.1) check that the value of session key index field is whether in the scope of standard code;
5.2) check that the value of packet sequence number field is whether in the scope of standard code;
5.3) whether the value of judgment data grouping serial number field be even number.
A kind of system of method of the safety switch-in protocol conformity of turn-on test that realizes the above-mentioned network terminal, its special character is: this system comprises Monitoring and Controlling platform, benchmark authentication server, benchmark access point, hub and the auxilliary terminal to be measured of surveying software is installed, described Monitoring and Controlling platform, benchmark authentication server and benchmark access point are connected on the hub, and described terminal to be measured is associated with in the benchmark access point by Radio Link.
The above-mentioned network terminal to be measured comprises notebook computer and network adapter.
The present invention is based on that the network terminal designs, and can be used for that the network terminal that equipment vendors produce is carried out correctness and consistency that safe access protocol realizes and tests.The present invention has not only adopted the Interoperability Testing of agreement, test the interoperability of the network terminal to be measured and benchmark access point and authentication server, catching, resolving and analyzing also by safe access protocol data completely, and the safe access protocol process analysis that realizes on this basis and the simulation test of abnormal conditions, ensured that the product by test meets the regulation and the interoperability of GB fully.Therefore the present invention has following advantage:
1, test result is more accurate.The present invention has introduced catching and complete analytical method of related protocol data, makes the result of test more accurate.
2, test data is complete.Because test process has comprised complete data capture analysis, can provide the details of protocol data in the Devices to test.
3, can carry out location of mistake.Because agreement implementation process has been carried out the detection of microcosmic, mistake that can accurate localization agreement realization aspect.
Four, description of drawings
Fig. 1 is the topological structure figure of system of the present invention.
Five, embodiment
The all applicable method of the present invention of WAPI agreement or IEEE802.11i agreement, its step is as follows:
1) activates safe access protocol verification process;
2) catch the safe access protocol packet that produces in this verification process;
3) analyzing and testing safety access protocol packet encapsulation form and agreement flow process.
Be specific embodiment when being the WAPI agreement with the safety access protocol below, the whole concrete testing process of its method is as follows:
1) activates the WAPI verification process;
2) catch the WAPI protocol data bag that produces in this verification process; If it is incomplete that the WAPI protocol data is caught, the network terminal then to be measured continues 3 to handle set by step catching data not by the WAPI test, and display result;
WAPI protocol data bag comprises: WAI: differentiate Active Frame, access discriminating request, request of certificate authentication, certificate discriminating response, insert and differentiate that response, unicast key agreement request, unicast key agreement response, unicast key agreement affirmation, multicast key notification, multicast key notification respond; WPI: unicast data frames.
3) analyzing and testing WAPI protocol data is sealed dress form and agreement flow process.Wherein only need to carry out analyzing and testing to inserting discriminating request, key negotiation response, multicast key notification response and unicast data frames.
The analyte detection process that inserts the request of discriminating is as follows:
1.1) check the whether regulation in the conformance with standard of version number;
1.2) check whether the data length field value is consistent with the length of data field;
1.3) differentiate relatively whether the value of the discriminating identification field in the discriminating grouping that the value of identification field and access point send is identical;
1.4) whether comparison terminal certificate field content identical with local terminal certificate content of preserving;
1.5) check whether encapsulation format and the length of the signature field of ASUE inquiry, ASUE key data, terminal identity, ECDH parameter and ASUE conform to regulation in the standard.
The analyte detection process of unicast key agreement response is as follows:
2.1) check the whether regulation in the conformance with standard of version number;
2.2) check whether the data length field value is consistent with the length of data field;
2.3) length of checking BKID, USKID, ADDID, ASUE inquiry and WIE field whether with standard in stipulate consistent;
2.4) check whether the value of the AE inquiry field in the value of AE inquiry field and the unicast key agreement request that access point sends is identical;
2.5) check whether the length of Message Authentication Code field is consistent with regulation in the standard.
The analyte detection process of multicast key notification response is as follows:
3.1) check the whether regulation in the conformance with standard of version number;
3.2) check whether the data length field value is consistent with the length of data field;
3.3) relatively whether the MSKID field value identical with MSKID field value during the multicast key notification that access point sends is divided into groups;
3.4) relatively whether the USKID field value identical with USKID field value during the multicast key notification that access point sends is divided into groups;
3.5) relatively whether the key announce identification field values identical with key announce identification field values during the multicast key notification that access point sends is divided into groups;
3.6) check whether the length of Message Authentication Code field is consistent with regulation in the standard.
The analyte detection process of unicast data frames is as follows:
4.1) check that the value of session key index field is whether in the scope of standard code;
4.2) check that the value of packet sequence number field is whether in the scope of standard code;
4.3) whether the value of judgment data grouping serial number field be even number.
In the above analyte detection process, if there is a detection not pass through, then the test result of this network terminal to be measured promptly must be passed through above-mentioned all test items for not passing through, and the network terminal to be measured could pass through the agreement accordance and detect.
The present invention comprises that also step 4) disposes the combined situation that WAPI enables in terminal and access point respectively, analyzes the correctness that the access point access control function is realized.Wherein terminal and the access point configuration WAPI combined situation of enabling comprises:
5.1) terminal to be measured enables that the WAI wildcard is differentiated and the WAPI security mechanism of key management mode, the benchmark access point adopts the WAPI security mechanism of certificate discriminating and key management mode, and dut terminal can not be communicated by letter with benchmark AP;
5.2) terminal to be measured enables that the WAI certificate is differentiated and the WAPI security mechanism of key management mode, the benchmark access point adopts the WAPI security mechanism of wildcard discriminating and key management mode, and terminal can not be communicated by letter with the benchmark access point.
Check that in these cases can terminal to be measured carry out correct access control function under the various configuring conditions of access point WAPI of terminal to be measured and benchmark.
Step 4) can be carried out before step 1), also can carry out after step 3), and the effect that it played is identical.
Referring to Fig. 1, system of the present invention comprises Monitoring and Controlling platform 1, benchmark authentication server 4, benchmark access point 3, hub 2 and the auxilliary terminal to be measured 5 of surveying software is installed, described Monitoring and Controlling platform 1, benchmark authentication server 4 and benchmark access point 3 are connected on the hub 2, described terminal to be measured 5 is associated with in the benchmark access point 3 by Radio Link, and terminal 5 to be measured comprises notebook computer and network adapter.
During system works, benchmark authentication server 4 issue access point and terminal certificate and be installed to terminal 5 to be measured and benchmark access point 3 and Monitoring and Controlling platform 1 in.After enabling the WAPI of benchmark access point 3 and terminal to be measured 5, terminal 5 to be measured is associated with benchmark access point 3; Monitoring and Controlling platform 1 is caught the WAPI protocol data bag in the WAPI authentication process, and provides analysis result.
Explanation of nouns:
1, ECDH: elliptic curve DH exchange, a kind of algorithm of finishing cipher key change.
2, ASUE: identification requester entity, the entity of operation is differentiated in request before access service.
3, BKID: base key sign, base key index value.
4, USKID: singlecast key sign, singlecast key index value.
5, AE: the discriminator entity, for identification requester supplies to differentiate the entity of operating in the access service prerequisite.
6, ADDID: allocation index, mac address information.
7, WIE:WAPI information element comprises the parameter information of WAPI.
8, MSKID: multicast key sign, multicast key index value.

Claims (14)

1, the method for a kind of safety switch-in protocol conformity of turn-on of network terminal test, it is characterized in that: this method may further comprise the steps:
1) activates safe access protocol verification process;
2) catch the safe access protocol packet that produces in this verification process;
3) analyzing and testing safety access protocol packet encapsulation form and agreement flow process.
2, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 1 test, it is characterized in that: described safe access protocol is WAPI agreement or IEEE802.11i agreement.
3, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 2 test, it is characterized in that: when the safety access protocol is the WAPI agreement, this method comprises that also step 4) disposes the combined situation that WAPI enables in terminal and access point respectively, analyzes the correctness that the access point access control function is realized.
4, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 3 test is characterized in that; The combined situation that terminal in the described step 4) and access point configuration WAPI enable comprises:
1.1) terminal to be measured enables that the WAI wildcard is differentiated and the WAPI of key management mode
Security mechanism, benchmark access point adopt certificate discriminating and key management mode
The WAPI security mechanism, dut terminal can not be communicated by letter with the benchmark access point;
1.2) terminal to be measured enables that the WAI certificate is differentiated and the WAPI safety of key management mode
Mechanism, benchmark access point adopt wildcard discriminating and key management mode
The WAPI security mechanism, terminal can not be communicated by letter with the benchmark access point.
5, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 3 test, it is characterized in that: described WAPI protocol data bag comprises: WAI: differentiate Active Frame, access discriminating request, request of certificate authentication, certificate discriminating response, insert and differentiate that response, unicast key agreement request, unicast key agreement response, unicast key agreement affirmation, multicast key notification, multicast key notification respond; WPI: unicast data frames.
6, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 5 test, it is characterized in that: catch incomplete as if the WAPI protocol data described step 2), the network terminal then to be measured is not tested by WAPI, continuation 3 is handled set by step to catching data, and display result.
7, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 5 test is characterized in that: described access differentiates that the analyte detection process of request is as follows:
2.1) check the whether regulation in the conformance with standard of version number;
2.2) check whether the data length field value is consistent with the length of data field;
2.3) differentiate relatively whether the value of the discriminating identification field in the discriminating grouping that the value of identification field and access point send is identical;
2.4) whether comparison terminal certificate field content identical with local terminal certificate content of preserving;
2.5) check whether encapsulation format and the length of the signature field of ASUE inquiry, ASUE key data, terminal identity, ECDH parameter and ASUE conform to regulation in the standard.
8, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 5 test, it is characterized in that: the analyte detection process of described key negotiation response is as follows:
3.1) check the whether regulation in the conformance with standard of version number;
3.2) check whether the data length field value is consistent with the length of data field;
3.3) length of checking BKID, USKID, ADDID, ASUE inquiry and WIE field whether with standard in stipulate consistent;
3.4) check whether the value of the AE inquiry field in the value of AE inquiry field and the unicast key agreement request that access point sends is identical;
3.5) check whether the length of Message Authentication Code field is consistent with regulation in the standard.
9, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 5 test is characterized in that: the analyte detection process of described multicast key notification response is as follows:
4.1) check the whether regulation in the conformance with standard of version number;
4.2) check whether the data length field value is consistent with the length of data field;
4.3) relatively whether the MSKID field value identical with MSKID field value during the multicast key notification that access point sends is divided into groups;
4.4) relatively whether the USKID field value identical with USKID field value during the multicast key notification that access point sends is divided into groups;
4.5) relatively whether the key announce identification field values identical with key announce identification field values during the multicast key notification that access point sends is divided into groups;
4.6) check whether the length of Message Authentication Code field is consistent with regulation in the standard.
10, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 5 test, it is characterized in that: the analyte detection process of described unicast data frames is as follows:
5.1) check that the value of session key index field is whether in the scope of standard code;
5.2) check that the value of packet sequence number field is whether in the scope of standard code;
5.3) whether the value of judgment data grouping serial number field be even number.
11, a kind of system of method of the safety switch-in protocol conformity of turn-on test that realizes the described network terminal of claim 1, it is characterized in that: this system comprises Monitoring and Controlling platform, benchmark authentication server, benchmark access point, hub and the auxilliary terminal to be measured of surveying software is installed, described Monitoring and Controlling platform, benchmark authentication server and benchmark access point are connected on the hub, and described terminal to be measured is associated with in the benchmark access point by Radio Link.
12, the system of the safety switch-in protocol conformity of turn-on of the network terminal according to claim 11 test, it is characterized in that: described terminal to be measured comprises notebook computer and network adapter.
CNB2006100418484A 2006-02-28 2006-02-28 Method and system for testing safety access protocol conformity of network terminal Active CN100496052C (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CNB2006100418484A CN100496052C (en) 2006-02-28 2006-02-28 Method and system for testing safety access protocol conformity of network terminal
PCT/CN2007/000635 WO2007098692A1 (en) 2006-02-28 2007-02-28 An apparatus for testing the protocol conformance of the security accessing of network terminal and the method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006100418484A CN100496052C (en) 2006-02-28 2006-02-28 Method and system for testing safety access protocol conformity of network terminal

Publications (2)

Publication Number Publication Date
CN1812418A CN1812418A (en) 2006-08-02
CN100496052C true CN100496052C (en) 2009-06-03

Family

ID=36845097

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100418484A Active CN100496052C (en) 2006-02-28 2006-02-28 Method and system for testing safety access protocol conformity of network terminal

Country Status (2)

Country Link
CN (1) CN100496052C (en)
WO (1) WO2007098692A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098668B (en) * 2010-12-20 2012-11-07 西安西电捷通无线网络通信股份有限公司 Detecting system and method for realizing negative test on robustness in WAPI (Wireless LAN Authentication and Privacy Infrastructure) equipment protocol
CN103442383B (en) 2013-09-17 2016-05-25 西安西电捷通无线网络通信股份有限公司 A kind of method of testing of authentication server and system
CN104009889B (en) * 2014-06-10 2017-04-26 西安西电捷通无线网络通信股份有限公司 Communication protocol testing method and tested equipment and testing platform of communication protocol testing method
CN114205261B (en) * 2020-08-27 2024-02-20 中车株洲电力机车研究所有限公司 Automatic test method for correctness of network communication data and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100527668C (en) * 2004-04-24 2009-08-12 华为技术有限公司 Method for implementing compatibility between WAPI protocol and 802.1X protocol

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
无线接入点WAPI认证机制的研究与实现. 宋宇波,胡爱群,杨晓辉,王质礼.中国工程科学,第7卷第9期. 2005
无线接入点WAPI认证机制的研究与实现. 宋宇波,胡爱群,杨晓辉,王质礼.中国工程科学,第7卷第9期. 2005 *

Also Published As

Publication number Publication date
CN1812418A (en) 2006-08-02
WO2007098692A1 (en) 2007-09-07

Similar Documents

Publication Publication Date Title
CN100369446C (en) Method for testing safety switch-in protocol conformity of turn-on point and system thereof
CN100448239C (en) Method for testing safety switch-in protocol conformity to identify service entity and system thereof
US9019944B2 (en) Diagnosing and resolving wireless network malfunctions
US10873594B2 (en) Test system and method for identifying security vulnerabilities of a device under test
CN100388664C (en) Access method for realizing WLAN multi mode safety identification
Lanze et al. Undesired relatives: protection mechanisms against the evil twin attack in IEEE 802.11
CN104811462A (en) Access gateway redirection method and access gateway
CN100496052C (en) Method and system for testing safety access protocol conformity of network terminal
CN104580141A (en) Method and apparatus for detecting unauthorized access point
Lanze et al. Hacker's toolbox: Detecting software-based 802.11 evil twin access points
CN106454903A (en) Method and device for accessing smart terminal equipment into Internet
KR101816463B1 (en) Authentication server testing method and system
KR20120132086A (en) System for detecting unauthorized AP and method for detecting thereof
CN113347145B (en) 5G wireless communication application secret evaluation system and method
Bitsikas et al. UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework
CN110149641B (en) Analog wireless connection test method
CN104080106B (en) The method and apparatus for determining common signal channel
CN102752174A (en) System and method for testing safety performance of wireless local area network (WLAN)
Idland Detecting mac spoofing attacks in 802.11 networks through fingerprinting on the mac layer
US20230114705A1 (en) Security analysis system and method based on negative testing for protocol implementation of lte device
WO2024063498A1 (en) Method and system for imei verification and unauthorized terminal detection using control plane message
KR20240041501A (en) Method for IMEI verification and unauthorized device detection using control plane message and the system thereof
Lin et al. Conformance Testing for 5G O-RAN Entities through MEC
Xiao-Hui et al. Design and implementation of a WLAN intrusion detection and DoS attack analyze system
CN103888944B (en) Cdma network replicates card test method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: XI AN IWNCOMM CO., LTD.

Free format text: FORMER NAME: XIDIAN JIETONG WIRELESS NETWORK COMMUNICATION CO LTD, XI AN

CP01 Change in the name or title of a patent holder

Address after: 710075 4F.C building, No. 12, No. two, hi tech Road, Shaanxi, Xi'an

Patentee after: Anxi Dianjietong Wireless Network Communications Co.,Ltd.

Address before: 710075 4F.C building, No. 12, No. two, hi tech Road, Shaanxi, Xi'an

Patentee before: Xi'an Xidian Jietong Wireless Network Communication Co., Ltd.