CN101930515A - System and method for safely decompressing compressed file - Google Patents

System and method for safely decompressing compressed file Download PDF

Info

Publication number
CN101930515A
CN101930515A CN2010102661890A CN201010266189A CN101930515A CN 101930515 A CN101930515 A CN 101930515A CN 2010102661890 A CN2010102661890 A CN 2010102661890A CN 201010266189 A CN201010266189 A CN 201010266189A CN 101930515 A CN101930515 A CN 101930515A
Authority
CN
China
Prior art keywords
compressed file
module
file
security sweep
described security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010102661890A
Other languages
Chinese (zh)
Other versions
CN101930515B (en
Inventor
马占凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qizhi Business Consulting Co ltd
Beijing Qihoo Technology Co Ltd
Original Assignee
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qizhi Software Beijing Co Ltd filed Critical Qizhi Software Beijing Co Ltd
Priority to CN2010102661890A priority Critical patent/CN101930515B/en
Publication of CN101930515A publication Critical patent/CN101930515A/en
Application granted granted Critical
Publication of CN101930515B publication Critical patent/CN101930515B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a system for safely decompressing a compressed file, comprising a decompressed module and a safely scanning module, wherein the decompressed module is used for opening or decompressing a compressed file, and calling for the safely scanning module in the decompression process; and the safely scanning module is used for safely scanning a file in the compressed file. The invention further provides a method for safely decompressing the compressed file, which comprises the following steps: in the process of opening or decompressing the compressed file, the decompressed module calls for the safely scanning module to carry out safely scanning on the files in the compressed file. In the process of the decompressing and opening the compressed file, the invention integrates the functions of security scanning and malware elimination and the like, further fast and conveniently cuts off the route for spreading the malware by the compressed file.

Description

A kind of system and method that compressed file is carried out security extraction
Technical field
The present invention relates to field of information security technology, relate in particular to a kind of system and method that compressed file is carried out security extraction.
Background technology
Along with the computer technology extensive utilization of every field in social life, rogue program (Malwar, malicious software) is also comed one after another as its accessory.Because infectivity, replicability and destructiveness that these rogue programs had, it has become the significant problem that the puzzlement computing machine uses.
Rogue program is a recapitulative term, refers to that any intentional establishment is used for carrying out without permission and the software program of harmful act normally.Computer virus, backdoor programs, Key Logger, password are stolen taker, Word and excel macro virus, leading viruses, script virus (batch, windows shell, java etc.), wooden horse, crime software, spyware and ad ware or the like, all be some examples that can be referred to as rogue program.
With the wooden horse is example, and wooden horse can be stolen password of the online bank, steals the network game equipment, reveal privacy photo or the like.In general, wooden horse has dual mode to propagate: first kind is by system vulnerability or the invasion of third party's leak, and second kind is by the file invasion, i.e. user's active or overdue trojan horse program.
According to the statistics of 360 security centres, by the second way, promptly start in the process of trojan horse program, winrar.exe comes the explorer.exe back, is in second place.The Explorer.exe representative of consumer is double-clicked in operating system and has been opened trojan horse program; The Winrar.exe representative of consumer is double-clicked in this compressed software of winrar and has been opened trojan horse program.And Winrar is the indispensable software of a installation at home, occupies the compression market share more than 90%, the extensive degree that visible wooden horse is propagated by compressed package.
Therefore, how to provide a kind of safer decompression systems and method, avoid propagating rogue program, become the industry problem demanding prompt solution by compressed file.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of system and method that compressed file is carried out security extraction, to avoid propagating rogue program by compressed file.
For solving the problems of the technologies described above, the invention provides a kind of system that compressed file is carried out security extraction, comprise decompression module and security sweep module, wherein: described decompression module, be used to open compressed file or compressed file is decompressed, and in this process, call described security sweep module; Described security sweep module is used for the file in the described compressed file is carried out security sweep.
The present invention and then a kind of method of compressed file being carried out security extraction is provided, comprise: in the process of opening compressed file or compressed file being decompressed, call the security sweep module by decompression module the file in the described compressed file is carried out security sweep.
The present invention is decompressing or is opening function such as integrated security sweep and rogue program removing in the process of compressed package, and then has blocked the path that rogue program is propagated by compressed file fast and easily at one stroke.
Description of drawings
Fig. 1 is according to the described security extraction system schematic of the embodiment of the invention.
Fig. 2 is the scanning process synoptic diagram when opening compressed package according to the embodiment of the invention is described.
Fig. 3 is safe view for after the been scanned.
Fig. 4 is for finding to have the view of wooden horse after the been scanned.
Fig. 5 is a view of finding risky file after the been scanned.
Fig. 6 is the prompted dialog frame synoptic diagram behind the discovery wooden horse.
Fig. 7 is for finding the prompted dialog frame synoptic diagram of risk file.
The prevention dialog box synoptic diagram that Fig. 8 ejects when attempting to double-click the file that contains trojan horse program in the compressed package for the user.
Fig. 9 is for finding the view after wooden horse is also removed.
The dialog box synoptic diagram that Figure 10 ejects when attempting to open program in the compressed package for user when the been scanned not.
Figure 11 is for carry out the view of security sweep in advance to the compressed file bag before the decompress(ion).
Figure 12 is the safe condition synoptic diagram of prompting after the preposition security sweep before the decompress(ion) finishes.
Figure 13 is the decompress(ion) synoptic diagram of finding wooden horse and ignoring this document.
Embodiment
With the wooden horse is example, investigates user's usage behavior, and in general, the user can start rogue program in the compressed package by following several modes of operation:
1, opens compressed package, double-click the trojan horse program of camouflage, for example " the beastly door video .exe " in the network " beastly door .rar ".
2, compressed package is decompressed, double-click the trojan horse program behind the decompress(ion) then.
3, also have some other modes, but ratio is less, for example utilizes the leak of compressed software, the bug of file in the compressed package etc. is called in utilization.
Therefore, core technology thinking of the present invention is exactly in the process of opening compressed file or compressed file being decompressed, execution is carried out the action of security sweep to the file in the described compressed file, and and then can also further carry out to remove rogue program or stop the user to click and wait other actions.
Above-mentioned action can be carried out in same process, also can carry out in different processes, is preferably in same process and carries out, with the more convenient realization decompress(ion) scan function that has globality more.
Above-mentioned in the process of opening compressed file or compressed file being decompressed, specifically, can be open or decompress(ion) before, also can be after, or carry out security sweep simultaneously, also can be described in detail below by specific embodiment.
For above-mentioned the 1st kind of unfolding mode, can before opening the compressed package that contains wooden horse, the user carry out wooden horse scanning, warning notice user when wooden horse, and limited subscriber opens trojan horse program, prevents that wooden horse from being started by the user.
To above-mentioned the 2nd kind of unfolding mode, before decompress(ion), compressed package is carried out wooden horse scanning, when finding wooden horse is arranged, can skip over this trojan horse program, allow the user click less than trojan horse program.And the user is warned.
The alleged scanning of the present invention can be to utilize the condition code scanning commonly used of existing antivirus software and the mode of comparison that rogue program is judged.
The present invention is described further with reference to the accompanying drawings.
As shown in Figure 1, for according to the described security extraction system schematic of the embodiment of the invention.Security extraction provided by the invention system can comprise decompression module 102 and security sweep module, wherein, described decompression module 102 is used to open compressed file or compressed file is decompressed, and calls described security sweep module 104 in this process; Described security sweep module 104 is used for the file in the described compressed file is carried out security sweep.
In addition, according to embodiments of the invention, described security sweep module 104 can also further couple one and remove module 106, is used for carrying out the action of removing rogue program according to scanning result.
Described decompression module 102, can open compressed file or compressed file decompressed before call described security sweep module 104; Also can after opening compressed file or compressed file decompressed, call described security sweep module 104, but before described security sweep module been scanned, stop the user to carry out file in the described compressed file; Can also when opening compressed file or compressed file decompressed, call described security sweep module 104, limit decompress(ion) scan edge.
Described security sweep module 104 can also further couple a labeling module 108, is used for marking according to scanning result the safe class of each file.
Described security sweep module 104 can also further couple a reminding module 110, is used for ejecting dialog box according to scanning result, and whether the prompting user finds rogue program, and/or whether carries out the action of removing rogue program.
Described security sweep module 104 can also further couple one and stop module 112, is used for according to scanning result, when user's click contains the file of rogue program, ejects the dialog box that prevention is opened.
Described security sweep module 104 can also further couple an isolation module 114, is used for according to scanning result, if find rogue program, then skips over the decompression that this is contained the file of rogue program.
As mentioned above, described decompression module and described security sweep module can be arranged in same process to be carried out, and also can be arranged in different processes and carry out.
With above-mentioned corresponding, the present invention also provides a kind of method of compressed file being carried out security extraction, comprise: in the process of opening compressed file or compressed file being decompressed, call the security sweep module by decompression module the file in the described compressed file is carried out security sweep.
Wherein, the present invention can further include: carry out the step of removing rogue program according to described scanning result.
Wherein, described security sweep step can be open compressed file or compressed file decompressed before carry out.
Wherein, described security sweep step can be to carry out after opening compressed file or compressed file decompressed, but before been scanned, stops the user to carry out file in the described compressed file.
Wherein, described security sweep step can be carried out limit decompress(ion) scan edge synchronously with decompression.
Wherein, described security sweep step may further include: the safe class that marks each file according to scanning result.
Wherein, described security sweep step may further include: eject dialog box according to scanning result, whether the prompting user finds rogue program, and/or whether carries out the action of removing rogue program.
Wherein, described security sweep step may further include: according to scanning result, when user's click contains the file of rogue program, eject the dialog box that prevention is opened.
Wherein, described security sweep step may further include: according to scanning result, if find rogue program, then skip over the decompression that this is contained the file of rogue program.
Wherein, the described process of opening compressed file or compressed file being decompressed can be carried out in same process with described security sweep step, also can carry out in different processes.
As shown in Figure 2, the scanning process synoptic diagram when opening compressed package according to embodiments of the invention.After opening compressed package, the present invention promptly begins autoscan, and marks the safe class of each file.Can be labeled as wooden horse to trojan horse program, secure file is labeled as safety, and the risk file mark is a risk.
Be safe view after Figure 3 shows that been scanned; Fig. 4 is for finding to have the view of wooden horse after the been scanned; Fig. 5 is a view of finding risky file after the been scanned.Wherein we can see, mark has each safety of files matter in the compressed package in the security attribute hurdle.
According to embodiments of the invention, after opening the compressed package that contains wooden horse, been scanned can eject and find the wooden horse dialog box, find the risk FileDialog, contains wooden horse with the caution user, so that allow the user enhance your vigilance, deletes compressed package etc.As shown in Figure 6, be the prompted dialog frame synoptic diagram behind the discovery wooden horse; Fig. 7 is for finding the prompted dialog frame synoptic diagram of risk file.
According to embodiments of the invention, after opening the compressed package that contains wooden horse, been scanned if the user double-clicks when containing the program file of wooden horse, can eject the dialog box that a prevention is opened, and forbids that the user opens.The prevention dialog box synoptic diagram that ejects when as shown in Figure 8, attempting to double-click the file that contains trojan horse program in the compressed package for the user.
According to embodiments of the invention, after opening the compressed package that contains wooden horse, been scanned can be pointed out the user that the wooden horse of current compressed package is removed etc. and kill the wooden horse action.
As shown in Figure 9, for finding the view after wooden horse is also removed, can see that wherein the file that was labeled as " doubtful wooden horse " in the security attribute hurdle originally is labeled as " safety ".
According to embodiments of the invention, the security sweep that carries out after opening compressed package is to forbid that the user carries out the interior file of described compressed package imperfect tense.The dialog box synoptic diagram that ejects when as shown in figure 10, attempting to open program in the compressed package for user when the been scanned not.
According to embodiments of the invention, when the decompress(ion) compressed package, can carry out decompress(ion) wooden horse scanning before, as shown in figure 11, for before the decompress(ion) compressed file bag is carried out the view of security sweep in advance.After the been scanned, reresent the safe class of user's compressed package, whether danger etc. as shown in figure 12, is the finish safe condition synoptic diagram of back prompting of the preposition security sweep before the decompress(ion).This step also can be limit decompress(ion) scan edge, killing, and effect is the same.
When the decompress(ion) compressed package, if find wooden horse, then directly skip over the decompress(ion) of this wooden horse, allow the user put less than wooden horse, prevent overdue.As shown in figure 13, for finding wooden horse and ignoring the decompress(ion) synoptic diagram of this document.
Use the present invention, for computer system, killing rogue program that can be more convenient, for the user, can be informed in advance more intuitively and whether have rogue program in the compressed file bag, and can better stop the user to click rogue program, when powerful inadequately or user did not have the custom of killing virus at any time when the conventional antivirus software that conventional antivirus software or installation are not installed in computing machine, the present invention can play excellent more effect.

Claims (22)

1. the system that compressed file is carried out security extraction is characterized in that, comprises decompression module and security sweep module, wherein:
Described decompression module is used to open compressed file or compressed file is decompressed, and calls described security sweep module in this process;
Described security sweep module is used for the file in the described compressed file is carried out security sweep.
2. the system as claimed in claim 1 is characterized in that, described security sweep module further couples one and removes module, is used for carrying out the action of removing rogue program according to scanning result.
3. the system as claimed in claim 1 is characterized in that, described decompression module, open compressed file or compressed file decompressed before call described security sweep module.
4. the system as claimed in claim 1, it is characterized in that described decompression module calls described security sweep module after opening compressed file or compressed file decompressed, but before described security sweep module been scanned, stop the user to carry out the interior file of described compressed file.
5. the system as claimed in claim 1 is characterized in that, described decompression module calls described security sweep module, limit decompress(ion) scan edge when opening compressed file or compressed file decompressed.
6. the system as claimed in claim 1 is characterized in that, described security sweep module further couples a labeling module, is used for marking according to scanning result the safe class of each file.
7. the system as claimed in claim 1 is characterized in that, described security sweep module further couples a reminding module, is used for ejecting dialog box according to scanning result, and whether the prompting user finds rogue program, and/or whether carries out the action of removing rogue program.
8. the system as claimed in claim 1 is characterized in that, described security sweep module further couples one and stops module, is used for according to scanning result, when user's click contains the file of rogue program, ejects the dialog box that prevention is opened.
9. the system as claimed in claim 1 is characterized in that, described security sweep module further couples an isolation module, is used for according to scanning result, if find rogue program, then skips over the decompression that this is contained the file of rogue program.
10. the system as claimed in claim 1 is characterized in that, described decompression module and described security sweep module are arranged in same process and carry out.
11. the system as claimed in claim 1 is characterized in that, described decompression module is arranged in different processes with described security sweep module to be carried out.
12. the method that compressed file is carried out security extraction is characterized in that, comprising:
In the process of opening compressed file or compressed file being decompressed, call the security sweep module by decompression module the file in the described compressed file is carried out security sweep.
13. method as claimed in claim 12 is characterized in that, further comprises: carry out the step of removing rogue program according to described scanning result.
14. method as claimed in claim 12 is characterized in that, described security sweep step open compressed file or compressed file decompressed before carry out.
15. method as claimed in claim 12 is characterized in that, described security sweep step is carried out after opening compressed file or compressed file decompressed, but before been scanned, stops the user to carry out file in the described compressed file.
16. method as claimed in claim 12 is characterized in that, described security sweep step is carried out limit decompress(ion) scan edge synchronously with decompression.
17. method as claimed in claim 12 is characterized in that, described security sweep step further comprises: the safe class that marks each file according to scanning result.
18. method as claimed in claim 12 is characterized in that, described security sweep step further comprises: eject dialog box according to scanning result, whether the prompting user finds rogue program, and/or whether carries out the action of removing rogue program.
19. method as claimed in claim 12 is characterized in that, described security sweep step further comprises: according to scanning result, when user's click contains the file of rogue program, eject the dialog box that prevention is opened.
20. method as claimed in claim 12 is characterized in that, described security sweep step further comprises: according to scanning result, if find rogue program, then skip over the decompression that this is contained the file of rogue program.
21. method as claimed in claim 12 is characterized in that, the described process of opening compressed file or compressed file being decompressed is carried out in same process with described security sweep step.
22. method as claimed in claim 12 is characterized in that, the described process of opening compressed file or compressed file being decompressed is carried out in different processes with described security sweep step.
CN2010102661890A 2010-08-27 2010-08-27 System and method for safely decompressing compressed file Active CN101930515B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102661890A CN101930515B (en) 2010-08-27 2010-08-27 System and method for safely decompressing compressed file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102661890A CN101930515B (en) 2010-08-27 2010-08-27 System and method for safely decompressing compressed file

Publications (2)

Publication Number Publication Date
CN101930515A true CN101930515A (en) 2010-12-29
CN101930515B CN101930515B (en) 2012-11-21

Family

ID=43369687

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102661890A Active CN101930515B (en) 2010-08-27 2010-08-27 System and method for safely decompressing compressed file

Country Status (1)

Country Link
CN (1) CN101930515B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102306263A (en) * 2011-09-07 2012-01-04 盛乐信息技术(上海)有限公司 Safe compression and decompression system, safe compression method and safe decompression method
CN102314571A (en) * 2011-09-27 2012-01-11 奇智软件(北京)有限公司 Method and device for processing computer viruses
CN102915359A (en) * 2012-10-16 2013-02-06 北京奇虎科技有限公司 File management method and device
CN102930209A (en) * 2012-10-16 2013-02-13 北京奇虎科技有限公司 File processing method and file processing device in mobile equipment
WO2014012503A1 (en) * 2012-07-19 2014-01-23 Tencent Technology (Shenzhen) Company Limited Method and apparatus for performing virus scan during decompression of application installation package
CN104573518A (en) * 2015-01-23 2015-04-29 百度在线网络技术(北京)有限公司 Method, device, server and system for scanning files
CN104598819A (en) * 2015-01-09 2015-05-06 百度在线网络技术(北京)有限公司 Method, device and system for scanning packages
CN108446300A (en) * 2018-01-26 2018-08-24 北京奇虎科技有限公司 The scan method and device of data information
CN108629182A (en) * 2017-03-21 2018-10-09 腾讯科技(深圳)有限公司 Leak detection method and Hole Detection device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101587527A (en) * 2009-07-08 2009-11-25 北京东方微点信息技术有限责任公司 Method and apparatus for scanning virus program

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101587527A (en) * 2009-07-08 2009-11-25 北京东方微点信息技术有限责任公司 Method and apparatus for scanning virus program

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《电脑采购周刊》 19991231 金轮 KILL98认证版常见问题解答集萃 23 1-22 , 第15期 2 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102306263A (en) * 2011-09-07 2012-01-04 盛乐信息技术(上海)有限公司 Safe compression and decompression system, safe compression method and safe decompression method
CN102314571A (en) * 2011-09-27 2012-01-11 奇智软件(北京)有限公司 Method and device for processing computer viruses
CN102314571B (en) * 2011-09-27 2014-11-05 奇智软件(北京)有限公司 Method and device for processing computer viruses
WO2014012503A1 (en) * 2012-07-19 2014-01-23 Tencent Technology (Shenzhen) Company Limited Method and apparatus for performing virus scan during decompression of application installation package
CN102915359A (en) * 2012-10-16 2013-02-06 北京奇虎科技有限公司 File management method and device
CN102930209A (en) * 2012-10-16 2013-02-13 北京奇虎科技有限公司 File processing method and file processing device in mobile equipment
CN104598819B (en) * 2015-01-09 2017-12-26 百度在线网络技术(北京)有限公司 A kind of methods, devices and systems for scan compression bag
CN104598819A (en) * 2015-01-09 2015-05-06 百度在线网络技术(北京)有限公司 Method, device and system for scanning packages
CN104573518A (en) * 2015-01-23 2015-04-29 百度在线网络技术(北京)有限公司 Method, device, server and system for scanning files
CN104573518B (en) * 2015-01-23 2019-03-26 百度在线网络技术(北京)有限公司 File scanning method, device, server and system
CN108629182A (en) * 2017-03-21 2018-10-09 腾讯科技(深圳)有限公司 Leak detection method and Hole Detection device
CN108629182B (en) * 2017-03-21 2022-11-04 腾讯科技(深圳)有限公司 Vulnerability detection method and vulnerability detection device
CN108446300A (en) * 2018-01-26 2018-08-24 北京奇虎科技有限公司 The scan method and device of data information

Also Published As

Publication number Publication date
CN101930515B (en) 2012-11-21

Similar Documents

Publication Publication Date Title
CN101930515B (en) System and method for safely decompressing compressed file
US8161552B1 (en) White list creation in behavior monitoring system
US9330259B2 (en) Malware discovery method and system
US9165142B1 (en) Malware family identification using profile signatures
US8443439B2 (en) Method and system for mobile network security, related network and computer program product
US8752180B2 (en) Behavioral engine for identifying patterns of confidential data use
CN102081722B (en) Method and device for protecting appointed application program
US20110209219A1 (en) Protecting User Mode Processes From Improper Tampering or Termination
US9288226B2 (en) Detection of rogue software applications
US8732831B2 (en) Detection of rogue software applications
CN102194072B (en) Method, device and system used for handling computer virus
US20030105973A1 (en) Virus epidemic outbreak command system and method using early warning monitors in a network environment
EP2437197A2 (en) Device and method for providing SOC-based anti-malware service
US9183392B2 (en) Anti-malware tool for mobile apparatus
CN101414327B (en) Method for file protection
KR20140077186A (en) Method of generating, from an initial package file comprising an application to be secured and an initial configuration file, a package file for securing the application, and associated computer program product and computing device
WO2018017498A1 (en) Inferential exploit attempt detection
US7472288B1 (en) Protection of processes running in a computer system
CN106778132B (en) Control method, device and the mobile terminal of file process
US10616245B2 (en) Real-time remediation respective of security incidents
KR101674895B1 (en) Java Security Analysis Device Based On Java Method Call Graph
CN106682493B (en) A kind of method, apparatus for preventing process from maliciously being terminated and electronic equipment
CN108235766B (en) Terminal device control method and terminal device
CN103425927A (en) Device and method for removing viruses of computer documents
CN106022116B (en) The automation patch system and method attacked between being applied based on Android program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address

Address after: 100015 rooms 301-306, 2 / F and 3 / F, block B, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee after: Beijing Qizhi Business Consulting Co.,Ltd.

Address before: 100016 East unit, 4th floor, Zhaowei building, 14 Jiuxianqiao Road, Chaoyang District, Beijing

Patentee before: Qizhi software (Beijing) Co.,Ltd.

CP03 Change of name, title or address
TR01 Transfer of patent right

Effective date of registration: 20220210

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100015 rooms 301-306, 2 / F and 3 / F, block B, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee before: Beijing Qizhi Business Consulting Co.,Ltd.

TR01 Transfer of patent right