CN101340293B - Packet safety detection method and device - Google Patents

Packet safety detection method and device Download PDF

Info

Publication number
CN101340293B
CN101340293B CN2008101182849A CN200810118284A CN101340293B CN 101340293 B CN101340293 B CN 101340293B CN 2008101182849 A CN2008101182849 A CN 2008101182849A CN 200810118284 A CN200810118284 A CN 200810118284A CN 101340293 B CN101340293 B CN 101340293B
Authority
CN
China
Prior art keywords
message
address
source
mpm
processing module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2008101182849A
Other languages
Chinese (zh)
Other versions
CN101340293A (en
Inventor
汪洪远
王�锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Enterprise Development LP
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN2008101182849A priority Critical patent/CN101340293B/en
Publication of CN101340293A publication Critical patent/CN101340293A/en
Application granted granted Critical
Publication of CN101340293B publication Critical patent/CN101340293B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method for inspecting the safety of message, which comprises the following steps: network equipment is used for receiving the message; the network equipment is used for searching for a routing table according to a source IP address of the received message and obtaining a next hop IP address which has a destination address that is identical with the source IP address of the received message in the same routing table; the network equipment is used for searching for an address resolution protocol ARP table according to the obtained next hop IP address and obtaining a media access control MAC address corresponding to the next hop IP address; the network equipment is used for judging whether the obtained MAC address is the same with the source MAC address of the received message, and if the two addresses are the same, the received message is a legal message, otherwise, the received message is an illegal message. The invention also discloses a message safety inspection device and the technical scheme of the invention can better assure the network safety.

Description

A kind of packet safety detection method and device
Technical field
The present invention relates to the network security technology field, refer to a kind of packet safety detection method and device especially.
Background technology
Along with the continuous evolution of Internet technology with and the explosivity development of scale, internet, applications has extended to the every aspect of contemporary society's life gradually from scientific research field originally.Increasing based on network key business is surging forward, and network becomes the new motive force that the mankind increase productivity and promote quality of life.
Yet, the technical foundation of the Internet, promptly the IP network technology but exists such as problems such as safety, service quality, operation modes on natural.Wherein, the safe practice of IP network is very important one side, because the opening of IP network makes its safety problem become very complicated again.IP network simple and being opened in when facilitating the Internet fast development also caused IP network to introduce the weakness of security breaches easily.On the other hand, further developing of network security technology also facilitated in the threat of network security, and reversal path of unicast is transmitted (URPF, Unicast Reverse Path Forwarding) and checked to be exactly a kind of network security technology that prevents that IP spoofing from attacking.
The major function that URPF checks is the attack that prevents based on source address spoofing.The source address spoofing attack is that the invador constructs and send a series of messages that have cook source address, for the application of using based on the IP address validation, this attack method can cause the authority of unauthorized user with other people identity acquisition access system, even visits with administrator right.
Fig. 1 is the networking schematic diagram that existing URPF inspection technology is described.Referring to Fig. 1, be that to forge source IP address on the router-A of 1.1.1.8/8 be the message of 2.2.2.1/8 in the IP address, and, during router B response request, response message is sent to the IP address really be the router C of 2.2.2.1/8 to router B initiation request as server.Therefore, the invalid packet of router-A forgery has all caused attack to router B and router C.
URPF checks that technology can be applied in the environment shown in Figure 1, promptly on router B, search the outgoing interface of this IP address according to the source IP address that receives message, whether the outgoing interface of judging this IP address is consistent with the incoming interface that receives message, if checking, unanimity then URPF pass through, if it is inconsistent then think that URPF checks and do not pass through, and the message that is received is taked corresponding processing, as dropping packets etc.
By above-mentioned explanation as seen, existing URPF inspection technology is based on the inspection of IP layer, and current network attack has permeated each side, and only the inspection based on the IP layer seems that some is thin, can not guarantee network security well.
Summary of the invention
The invention provides a kind of packet safety detection method, this method can guarantee network security better.
The present invention also provides a kind of packet safety detection device, and this device can guarantee network security better.
For achieving the above object, technical scheme of the present invention specifically is achieved in that
The invention discloses a kind of packet safety detection method, this method comprises:
The network equipment receives message;
The network equipment is searched routing table according to the source IP address of described reception message, obtains the next-hop ip address in the destination address route table items identical with the source IP address of described reception message;
The network equipment is searched the ARP table according to the next-hop ip address that is obtained, and obtains the media access control MAC address corresponding with described next-hop ip address;
The network equipment judges whether the MAC Address of being obtained is identical with the source MAC of described reception message, is to determine that then described reception message is legal message, otherwise determines that described reception message is an invalid packet.
The invention also discloses a kind of packet safety detection device, this device comprises: message processing module (MPM) and safety check module, wherein,
Message processing module (MPM) is used to receive message, and the source IP address and the source MAC of described reception message sent to safety check module;
Described safety check module is used for behind the source IP address and source MAC that receive from message processing module (MPM), by search routing table obtain destination address with described from the next-hop ip address in the identical route table items of the source IP address of message processing module (MPM); Search the ARP table according to the next-hop ip address that is obtained, obtain the MAC Address corresponding with described next-hop ip address; Judge whether the MAC Address of being obtained is identical with the source MAC that is received, and is then to return legal message acknowledge message to message processing module (MPM), otherwise returns the invalid packet acknowledge message to message processing module (MPM).
As seen from the above technical solution, after this network equipment of the present invention receives message, source IP address according to described reception message is searched routing table, obtain the next-hop ip address in the destination address route table items identical with the source IP address of described reception message, search the ARP table according to the next-hop ip address that is obtained then, obtain the media access control MAC address corresponding with described next-hop ip address, judge whether the MAC Address of being obtained is identical with the source MAC of described reception message, be to determine that then described reception message is legal message, otherwise determine the technical scheme that described reception message is an invalid packet, can be by checking the source MAC of IP message, the message that the filtered source MAC Address is illegal, thereby prevent the attack of invalid packet, guarantee the safety of network better network.
Description of drawings
Fig. 1 is the networking schematic diagram that existing URPF inspection technology is described;
Fig. 2 is the flow chart of a kind of packet safety detection method of the embodiment of the invention;
Fig. 3 is the networking schematic diagram that packet safety detection method of the present invention is described;
Fig. 4 is the composition structured flowchart of a kind of packet safety detection device of the embodiment of the invention.
Embodiment
Core concept of the present invention is: utilize in the IP message repeating process revolution to send out the characteristics that a jumping can be changed the message source MAC Address, obtain the next hop address of this address according to the source IP address of message, obtain corresponding ARP list item according to next hop address then, compare the legitimacy of confirmation message at source MAC according to MAC Address in the ARP list item and message.
Fig. 2 is the flow chart of a kind of packet safety detection method of the embodiment of the invention.As shown in Figure 2, may further comprise the steps:
Step 201, the network equipment receives message.
Step 202, the network equipment is searched routing table according to the source IP address of described reception message, obtains the next-hop ip address in the destination address route table items identical with the source IP address of described reception message.
Step 203, the network equipment is searched the ARP table according to the next-hop ip address that is obtained, and obtains the media access control MAC address corresponding with described next-hop ip address.
Step 204, the network equipment judge whether the MAC Address of being obtained is identical with the source MAC of described reception message, are to determine that then described reception message is legal message, otherwise determine that described reception message is an invalid packet.
In this step, the network equipment can take appropriate measures after being invalid packet determine receiving message, as reception message etc. as described in abandoning.
The present invention's packet safety detection method as shown in Figure 2 passes through to check the source MAC of IP message, the message that the filtered source MAC Address is illegal, thus prevent the attack of invalid packet to network, guarantee the safety of network better.In addition, the present invention's method as shown in Figure 2 can combine with existing URPF inspection technology based on IP address check, promptly can check based on the source IP address of message earlier, check based on the message source MAC Address again, guarantee that the link layer data security of IP message is reliable.Therefore can also carry out following steps before above-mentioned step 202: the network equipment is searched routing table according to the source IP address of described reception message, obtain the outgoing interface in the destination address route table items identical with the source IP address of described reception message, the outgoing interface that judgement is obtained goes into the reception message whether reception is same interface, be to determine that then described reception message is legal message, otherwise determine that described reception message is an invalid packet, continue execution in step 202 to step 204.
In the present invention's packet safety detection method as shown in Figure 2, the described network equipment is router or three-tier switch.
For making purpose of the present invention, technical scheme and advantage clearer, below enumerate a specific embodiment, the present invention is described in more detail.
Fig. 3 is the networking schematic diagram that packet safety detection method of the present invention is described.As shown in Figure 3, router R2 is as access layer equipment, following extension Layer 2 switch A; Layer 2 switch A inserts three subscriber's main stations; And R2 links to each other with router R1, and R1 links to each other with server B.Subscriber's main station is successively by Layer 2 switch A, R2 and R1 access server B.The process of present embodiment comprises:
1) the IP address is in the subscriber's main station of 192.168.1.5 after the virus, and sending a large amount of source IP addresss is the scanning message of 192.168.1.5, source MAC change at random, and the purpose IP address of message is the server B that is connected with R1.This can cause server B to receive a large amount of source IP addresss is 192.168.1.5, the rubbish message of source MAC change at random, and can consume the ample resources of server B to the processing of these rubbish messages, thus server B is caused attack.
2) after R2 receives that source IP address is the message of 192.168.1.5, search the routing table of self according to 192.168.1.5, obtaining with 192.168.1.5 is next hop address in the route table items of destination address, search the ARP table of self then according to the next hop address of being obtained, obtain the MAC Address corresponding with described next hop address.
According to networking shown in Figure 3 and existing route technology as can be known, the destination address in the routing table of R2 is that the route table items of 192.168.1.5 is as shown in table 1:
Purpose IP address Next-hop ip address Outgoing interface
192.168.1.5/32 192.168.1.5 VLAN 10
Table 1
The ARP list item corresponding with 192.168.1.5 in the APR table of R2 is as shown in table 2:
The IP address MAC Address VLAN
192.168.1.5 0-0-5 VLAN 10
Table 2
According to table 1 as can be known, be that next-hop ip address in the route table items of destination address is 192.168.1.5 with 192.168.1.5; According to table 2 as can be known, corresponding with 192.168.1.5 MAC Address is 0-0-5 (the IP address is the real mac address of the subscriber's main station of 192.168.1.5).
3) R2 is that the source MAC of the message of 192.168.1.5 compares with the MAC Address 0-0-5 that obtained and the source IP address that is received, if the two is identical, then message normally is transmitted to R1, otherwise, if inequality, direct dropping packets then.
Therefore, the IP address is the scanning message of a large amount of source MAC change at random of sending of the subscriber's main station of 192.168.1.5, can be abandoned by R2.
In the embodiment shown in fig. 3, access layer equipment R2 has filtered the attack of subscriber's main station to the server B of network side, thereby prevents the influence of the attack of invalid packet to core network, has increased the fail safe of network.
In addition, if the IP address among Fig. 3 is in the subscriber's main station of 192.168.1.5 after the virus, send a large amount of source IP address change at random, but MAC Address is not during the scanning message of change at random, use technical scheme router R2 of the present invention and also can detect these attack messages, and carry out discard processing.Be specially: after R2 receives the above-mentioned scanning message that this subscriber's main station sends, search the routing table of self according to the source IP address of message, obtaining with this source IP address is next hop address in the route table items of destination address, search the ARP table of self then according to the next hop address of being obtained, obtain the MAC Address corresponding with described next hop address; When R2 compared the source MAC of the MAC Address obtained and the scanning message that is received, the two was inequality, and R2 directly abandons the scanning message.In addition, when the source IP address of the above-mentioned scanning message that R2 sends according to subscriber's main station is the routing table of purpose IP address search self, also may can not find out corresponding list item, this time, R2 directly abandoned the scanning message.
Based on the foregoing description, next provide the composition structure of a kind of packet safety detection device of the present invention.
Fig. 4 is the composition structured flowchart of a kind of packet safety detection device of the embodiment of the invention.As shown in Figure 4, this device comprises: message processing module (MPM) 401 and safety check module 402, wherein:
Message processing module (MPM) 401 is used to receive message, and the source IP address and the source MAC of described reception message sent to safety check module 402;
Safety check module 402 is used for behind the source IP address and source MAC that receive from message processing module (MPM) 401, obtains next-hop ip address in the destination address route table items identical with the source IP address of described reception by searching routing table; Search the ARP table according to the next-hop ip address that is obtained, obtain the MAC Address corresponding with described next-hop ip address; Judge whether the MAC Address of being obtained is identical with the source MAC that is received, and is then to return legal message acknowledge message to message processing module (MPM) 401, otherwise returns the invalid packet acknowledge message to message processing module (MPM) 401.
In Fig. 4, message processing module (MPM) 401 when receiving the invalid packet acknowledge message that safety check module 402 returns, abandons described reception message.
In Fig. 4, message processing module (MPM) 401 is further used for the incoming interface sign of described reception message is sent to safety check module 402; Safety check module 402, be further used for obtaining outgoing interface sign in the destination address route table items identical with the source IP address of described reception by searching routing table, judge whether the outgoing interface sign of being obtained is consistent with the incoming interface sign that is received, be then to return legal message acknowledge message, otherwise return the invalid packet acknowledge message to message processing module (MPM) to message processing module (MPM).
In Fig. 4, safety check module 402, be further used for behind the source IP address and source MAC that receive from message processing module (MPM) 401, by searching routing table when not finding the identical route table items of source IP address with described reception, return the invalid packet acknowledge message to message processing module (MPM) 401; Message processing module (MPM) 401 when receiving this invalid packet acknowledge message that safety check module 402 returns, abandons described reception message.
Device as shown in Figure 4 can be router, perhaps can be three-tier switch.
In sum, after this network equipment of the present invention receives message, source IP address according to described reception message is searched routing table, obtain the next-hop ip address in the destination address route table items identical with the source IP address of described reception message, search the ARP table according to the next-hop ip address that is obtained then, obtain the media access control MAC address corresponding with described next-hop ip address, judge whether the MAC Address of being obtained is identical with the source MAC of described reception message, be to determine that then described reception message is legal message, otherwise determine the technical scheme that described reception message is an invalid packet, existing URPF technology is replenished, strengthened the function that URPF checks, and in access layer network, can be by checking the source MAC of IP message, the message that the filtered source MAC Address is illegal, thus the attack of invalid packet prevented to core network, strengthen the fail safe of network.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention, all any modifications of being made within the spirit and principles in the present invention, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a packet safety detection method is characterized in that, this method comprises:
The network equipment receives message;
The network equipment is searched routing table according to the source IP address of described reception message, obtains the next-hop ip address in the destination address route table items identical with the source IP address of described reception message;
The network equipment is searched the ARP table according to the next-hop ip address that is obtained, and obtains the media access control MAC address corresponding with described next-hop ip address;
The network equipment judges whether the MAC Address of being obtained is identical with the source MAC of described reception message, is to determine that then described reception message is legal message, otherwise determines that described reception message is an invalid packet.
2. the method for claim 1 is characterized in that, this method further comprises after described definite reception message is invalid packet: abandon described reception message.
3. the method for claim 1, it is characterized in that, this method is searched routing table at the described network equipment according to the source IP address of described reception message, and the next-hop ip address that obtains in the destination address route table items identical with the source IP address of described reception message further comprises before:
The network equipment is searched routing table according to the source IP address of described reception message, obtains the outgoing interface in the destination address route table items identical with the source IP address of described reception message;
The outgoing interface that network equipment judgement is obtained goes into the reception message whether reception is same interface, be to determine that then described reception message is legal message, otherwise definite described reception message is an invalid packet.
4. as claim 1,2 or 3 described methods, it is characterized in that, this method further comprises: when the described network equipment is searched routing table according to the source IP address of described reception message, if do not find the destination address route table items identical with the source IP address of described reception message, the then described network equipment abandons described reception message.
5. as claim 1,2 or 3 described methods, it is characterized in that the described network equipment is router or three-tier switch.
6. a packet safety detection device is characterized in that, this device comprises: message processing module (MPM) and safety check module, wherein,
Message processing module (MPM) is used to receive message, and the source IP address and the source MAC of described reception message sent to safety check module;
Described safety check module is used for behind the source IP address and source MAC that receive from message processing module (MPM), by search routing table obtain destination address with described from the next-hop ip address in the identical route table items of the source IP address of message processing module (MPM); Search the ARP table according to the next-hop ip address that is obtained, obtain the MAC Address corresponding with described next-hop ip address; Judge whether the MAC Address of being obtained is identical with the source MAC that is received, and is then to return legal message acknowledge message to message processing module (MPM), otherwise returns the invalid packet acknowledge message to message processing module (MPM).
7. device as claimed in claim 6 is characterized in that,
Described message processing module (MPM) when receiving the invalid packet acknowledge message that safety check module returns, abandons described reception message.
8. device as claimed in claim 6 is characterized in that,
Described message processing module (MPM) is further used for the incoming interface sign of described reception message is sent to safety check module;
Described safety check module, be further used for by search routing table obtain destination address with described from the sign of the outgoing interface in the identical route table items of the source IP address of message processing module (MPM), judge whether the outgoing interface sign of being obtained is consistent with the incoming interface sign that is received, be then to return legal message acknowledge message, otherwise return the invalid packet acknowledge message to message processing module (MPM) to message processing module (MPM).
9. as claim 6,7 or 8 described devices, it is characterized in that,
Described safety check module, be further used for behind the source IP address and source MAC that receive from message processing module (MPM), do not find with described and during from the identical route table items of the source IP address of message processing module (MPM), return the invalid packet acknowledge message by searching routing table to message processing module (MPM);
Described message processing module (MPM) when receiving the invalid packet acknowledge message that safety check module returns, abandons described reception message.
10. as claim 6,7 or 8 described devices, it is characterized in that this device is router or three-tier switch.
CN2008101182849A 2008-08-12 2008-08-12 Packet safety detection method and device Active CN101340293B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101182849A CN101340293B (en) 2008-08-12 2008-08-12 Packet safety detection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101182849A CN101340293B (en) 2008-08-12 2008-08-12 Packet safety detection method and device

Publications (2)

Publication Number Publication Date
CN101340293A CN101340293A (en) 2009-01-07
CN101340293B true CN101340293B (en) 2010-10-27

Family

ID=40214255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101182849A Active CN101340293B (en) 2008-08-12 2008-08-12 Packet safety detection method and device

Country Status (1)

Country Link
CN (1) CN101340293B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674312B (en) * 2009-10-19 2012-12-19 中兴通讯股份有限公司 Method for preventing source address spoofing in network transmission and device thereof
CN101945117A (en) * 2010-09-28 2011-01-12 杭州华三通信技术有限公司 Method and equipment for preventing source address spoofing attack
CN102457586B (en) * 2010-10-18 2015-06-03 中兴通讯股份有限公司 Expanding method for realizing double-layer network and expanded double-layer network
CN102724107A (en) * 2011-03-31 2012-10-10 百度在线网络技术(北京)有限公司 Method for forwarding message and selecting message forwarding device, device and equipment
CN103220255B (en) * 2012-01-18 2017-07-21 南京中兴新软件有限责任公司 It is a kind of to realize the method and device that reversal path of unicast forwarding URPF is checked
CN104158736B (en) 2013-05-15 2017-12-22 华为技术有限公司 A kind of method and apparatus for determining next-hop, issuing routing iinformation
CN105227480B (en) * 2014-06-13 2018-10-19 腾讯科技(深圳)有限公司 Message forwarding method and relevant apparatus and communication system
CN104853001B (en) * 2015-04-21 2019-06-07 新华三技术有限公司 A kind of processing method and equipment of ARP message
CN106209661B (en) * 2015-05-07 2020-06-05 中兴通讯股份有限公司 Flow inhibition method and device
CN107241307B (en) * 2017-04-26 2023-08-08 北京立思辰计算机技术有限公司 Self-learning network isolation safety device and method based on message content
CN108650237B (en) * 2018-04-13 2020-09-08 烽火通信科技股份有限公司 Message security check method and system based on survival time
CN108769055A (en) * 2018-06-14 2018-11-06 北京神州绿盟信息安全科技股份有限公司 A kind of falseness source IP detection method and device
CN110351193B (en) * 2019-07-05 2022-02-25 京信网络系统股份有限公司 Route updating method and device, computer device and readable storage medium
CN111314370B (en) * 2020-02-28 2022-07-29 杭州迪普科技股份有限公司 Method and device for detecting service vulnerability attack behavior

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1466341A (en) * 2002-06-22 2004-01-07 ��Ϊ�������޹�˾ Method for preventing IP address deceit in dynamic address distribution
CN101123614A (en) * 2007-09-04 2008-02-13 中兴通讯股份有限公司 A method and communication device for processing address parsing protocol packet

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1466341A (en) * 2002-06-22 2004-01-07 ��Ϊ�������޹�˾ Method for preventing IP address deceit in dynamic address distribution
CN101123614A (en) * 2007-09-04 2008-02-13 中兴通讯股份有限公司 A method and communication device for processing address parsing protocol packet

Also Published As

Publication number Publication date
CN101340293A (en) 2009-01-07

Similar Documents

Publication Publication Date Title
CN101340293B (en) Packet safety detection method and device
US9560008B2 (en) Method and arrangement for providing a wireless mesh network
CN101179566B (en) Method and apparatus for preventing ARP packet attack
CN101674306B (en) Address resolution protocol message processing method and switch
CN100548004C (en) A kind of method of searching instantaneous communication user in LAN
US20110247068A1 (en) Method And Apparatus For Enhanced Security In A Data Communications Network
CN101674312B (en) Method for preventing source address spoofing in network transmission and device thereof
CN101997768A (en) Method and device for uploading address resolution protocol messages
CN102137073B (en) Method and access equipment for preventing imitating internet protocol (IP) address to attack
CN101945117A (en) Method and equipment for preventing source address spoofing attack
Thigale et al. Lightweight novel trust based framework for IoT enabled wireless network communications
CN112769694B (en) Address checking method and device
CN108650237B (en) Message security check method and system based on survival time
CN102546364A (en) Network data distribution method and device
Wong et al. Truth in advertising: Lightweight verification of route integrity
CN101330409A (en) Method and system for detecting network loophole
CN108900517B (en) Safety route defense method based on HWMP protocol
CN101141396B (en) Packet processing method and network appliance
CN1567900A (en) A method for implementing message forwarding control in routing equipment
CN102711103B (en) A kind of wireless sensor network interior joint goes offline the safety routing method reconnected
CN108769055A (en) A kind of falseness source IP detection method and device
Mahore et al. Agent based black hole detection technique in aodv routing protocol
Yadav et al. A review on black hole attack in MANETs
Adithya et al. Assuaging cache based attacks in named data network
Mahmood et al. An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address

Address after: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No.

Patentee after: NEW H3C TECHNOLOGIES Co.,Ltd.

Address before: 310053 Hangzhou hi tech Industrial Development Zone, Zhejiang province science and Technology Industrial Park, No. 310 and No. six road, HUAWEI, Hangzhou production base

Patentee before: HANGZHOU H3C TECHNOLOGIES Co.,Ltd.

CP03 Change of name, title or address
TR01 Transfer of patent right

Effective date of registration: 20240122

Address after: texas

Patentee after: HEWLETT PACKARD ENTERPRISE DEVELOPMENT L.P.

Country or region after: U.S.A.

Address before: 310052 Changhe Road, Binjiang District, Hangzhou, Zhejiang Province, No. 466

Patentee before: NEW H3C TECHNOLOGIES Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right