CN103036924A - Chaining processing method and chaining processing system - Google Patents

Chaining processing method and chaining processing system Download PDF

Info

Publication number
CN103036924A
CN103036924A CN201110302248XA CN201110302248A CN103036924A CN 103036924 A CN103036924 A CN 103036924A CN 201110302248X A CN201110302248X A CN 201110302248XA CN 201110302248 A CN201110302248 A CN 201110302248A CN 103036924 A CN103036924 A CN 103036924A
Authority
CN
China
Prior art keywords
key
user
request
server end
http request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201110302248XA
Other languages
Chinese (zh)
Other versions
CN103036924B (en
Inventor
张克东
王羲桀
唐涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN YUNFAN CENTURY TECHNOLOGY CO., LTD.
Original Assignee
Shenzhen QVOD Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen QVOD Technology Co Ltd filed Critical Shenzhen QVOD Technology Co Ltd
Priority to CN201110302248.XA priority Critical patent/CN103036924B/en
Publication of CN103036924A publication Critical patent/CN103036924A/en
Application granted granted Critical
Publication of CN103036924B publication Critical patent/CN103036924B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a chaining processing method and a chaining processing system. The method comprises the steps of a server-side receiving a hyper text transport protocol (HTTP) request for accessing an anti-stealing-link document; acquiring relevant information, comprising at least time, internet protocol (IP) of a user, or a multi-access computer (MAC) of the user, from the HTTP request; encrypting the acquired relevant information or a code preset by the server-side or the combination of the information and the code in a first method to generate a first key code; judging whether the first key code conforms to a second key code contained in the HTTP request; and returning requested data if the first key code conforms to the second key code. According to the method, the first key code is generated according to the preset first method, then, whether the second key code in the HTTP request for accessing the anti-stealing-link document is the same as the first key code is judged, the request can be confirmed to be a legal request only when the second key code is the same as the first key code, and the requested data are allowed to be acquired, thus, and therefore a user in a stealing-link can not access the document so that stealing-link is prevented from occurring.

Description

A kind of linking processing method and system
Technical field
The present invention relates to a kind of linking processing method and system.
Background technology
In fact the content that does not have the shown user of Website page to access when the server of a website, such as certain picture, and this website is connected to other website by the link with this picture, directly provides this content having on the gainful page of advertisement of oneself to the end user.This phenomenon namely is called robber's chain.
Steal chain so that without any the website use of resource the resource of other website show and browse the user, improved its visit capacity, and major part browse the user to this without discover.Obviously, this is inequitable for stolen chain website, and not only space and flow are stolen, and legitimate interests are encroached on, and have also increased the weight of the burden of server.
Summary of the invention
The main technical problem to be solved in the present invention is, a kind of linking processing method and system are provided, and can effectively prevent from stealing chain.
For solving the problems of the technologies described above, the invention provides a kind of linking processing method, comprising: server end is received the http request of request access door chain file; From described http request, obtain relevant information, described relevant information comprises at least one of time, User IP, user MAC, the default password of the described relevant information obtained or server end or both combinations is encrypted with the first method produces the first key; Whether the second key that comprises in judging described the first key and http asking is consistent; If unanimously, then return the data of request.
The invention allows for a kind of link treatment system, described link treatment system comprises: receiving element: be used for receiving the http request of request access door chain file; The first ciphering unit: be used for obtaining relevant information from described http request, described relevant information comprises at least one of time, User IP, user MAC, the default password of the described relevant information obtained or server end or both combinations is encrypted with the first method produces the first key; Judging unit: whether the second key that comprises in judging described the first key and http asking is consistent; If unanimously, then return the data of request.
The invention has the beneficial effects as follows: by producing the first key according to default the first method, then judge whether the second key in the http request of this door chain file of request access is identical with the first key, only have and identically just can regard as legitimate request, allow the data of the request of obtaining, so just make the user who steals the chain connection can't access these files, prevented from stealing the generation of chain.
Description of drawings
Fig. 1 is the schematic flow sheet of an embodiment of a kind of linking processing method of the present invention;
Fig. 2 is a kind of module diagram that links an embodiment for the treatment of system of the present invention.
Embodiment
By reference to the accompanying drawings the present invention is described in further detail below by embodiment.
At first, the embodiment of the invention is carried out brief description.The embodiment of the invention has proposed a kind of linking processing method, comprising: server end is received the http request of request access door chain file; From described http request, obtain relevant information, described relevant information comprises at least one of time, User IP, user MAC, the default password of the described relevant information obtained or server end or both combinations is encrypted with the first method produces the first key; Whether the second key that comprises in judging described the first key and http asking is consistent; If unanimously, then return the data of request.Further, can also comprise: after detecting the request that the user accesses the door chain file, Website server is processed the chained address of described door chain file, produces described http request, and described http request comprises with described the first method encrypts described the second key that obtains; The encryption acts of described web site server end for information comprise at least one of time, User IP, user MAC and described server end preset password.
Can find out by above-mentioned brief description, the embodiment of the invention is by after the http request of receiving access door chain file, produce the first key by the first method, and then whether second key of relatively carrying in this http request is consistent with this first key, if unanimously then allow access.By this method, only have those users by legal web page access door chain file just to have the consistent key that calculates with server, the situation of having avoided stealing chain occurs.This is because the key that validated user obtains is to adopt the first method to encrypt the address that obtains by the webpage backstage, and is inevitable consistent by the key that described the first method obtains with server, so validated user can be accessed this door chain file.But just can not normally access by the link that robber's chain website provides, because certain has accessed this door chain file by legal means to suppose to steal the chain person, and obtained him by interception URL and worked as time chained address and the key of this door chain file of access, address and key that he uses interception to obtain are placed in the website of oneself as stealing the chain address, but because correct key changes, and correct key and time, User IP, user MAC, in the password that server end is preset at least one is relevant, so even he uses the address of this robber's chain and key to steal chain, the key that also will produce owing to server and inconsistent the causing of key of this robber's chain can't be accessed.
The embodiment of the invention produces key by the door chain file being encrypted process, then judge that the key in the http request of this door chain file of request access is whether identical with the key that encryption obtains, only have and identically just can allow normal access, so just make the user who steals the chain connection can't access these files, prevented from stealing the generation of chain.
Described the first method specifically can have a variety of, below describes in detail for example.
Method one:
According to the different different keys of period generation;
The described period can be with the sky, hour, 30 minutes or other suitable even chronomeres; Also can be the default inhomogeneous period, for example: 12:00-18:00 be a period, and 18:00-19:00 is a period, and 19:00-20:00 is a period;
Described different key can be the key of determining that sets in advance in database; It also can be the key that produces at random; Can also be the key that calculates according to some Varying parameters, the key that for example calculates by certain rule according to Hour Minute Second six bit digital of the current time that switches key;
Method two:
Use in the described relevant information at least one to calculate key by default cryptographic algorithm;
For example, current date and User IP can be obtained key as combination by calculating the MD5 value;
Certainly, described relevant parameter not only includes only current date and User IP, such as comprising the parameters such as user MAC;
Method three:
Calculate key by the default password of server end and at least one in the relevant information;
For example, the default password of described server end can be 123456, this password and current date and User IP can be obtained key as combination by calculating MD5 value so;
Preferably adopting MD5 as coded system, is that method own is also fairly simple because the irreversibility of the coded system of MD5 can't obtain the default password of server end so steal the chain person, and such mode has very strong fail safe; The password that server end is default and some information are carried out together md5 encryption and are obtained a MD5 value, because the irreversibility of MD5 algorithm can't be known the set password of server by inference; The MD5 value that this linking processing method only obtains encryption is added in the request URL, and this URL does not comprise the cleartext information of terminal, steals the chain person and can't learn it is which information is carried out the MD5 value that computing obtains; More than make door chain be difficult to be cracked, improved reliability and the fail safe of door chain;
Further, the default password of this server end can change according to default method, for example can be along with the time change, and 00:00-12:00 is that 123456,12:00-24:00 is 654321, the person just more is difficult to crack to steal the chain like this;
Further, on method two and three basis, open the cryptographic calculations mode that can adopt variation, for example calculate with the MD5 method with the combination of User IP by the default password of server end at time period 18:00-19:00, at time period 19:00-20:00 by server end default password and the combination of user MAC SHA1 method calculating.
Below for example understand several encryption methods; but all methods of limit not herein; those of ordinary skills may also can obtain a variety of concrete methods after reading said method, give unnecessary details no longer one by one, but these methods also belong within protection scope of the present invention herein.
Said method is illustrated mainly with the MD5 coded system, in fact other coded systems also can, methods such as SHA1, CRC32.
After having produced key, described key can be placed on after the chained address of door chain file, as the part of new chained address.
Whether consistent mode is illustrated said method with key relatively, in fact, and also can be by the new chained address that relatively produces consistent mode whether.
Correspondingly, the invention allows for a kind of link treatment system, comprising:
Receiving element: be used for receiving the http request of request access door chain file;
The first ciphering unit: be used for obtaining relevant information from described http request, described relevant information comprises at least one of time, User IP, user MAC, the default password of the described relevant information obtained or server end or both combinations is encrypted with the first method produces the first key;
Judging unit: whether the second key that comprises in judging described the first key and http asking is consistent; If unanimously, then return the data of request.
Further, described link treatment system can also comprise:
Web site server end: after accessing the request of door chain file to the user, the chained address of described door chain file is processed, produce described http request, described http request comprises with described the first method encrypts described the second key that obtains;
The encryption acts of described web site server end for information comprise at least one of time, User IP, user MAC and described server end preset password.
Preferably, described the first method is: use the default password of server end and User IP, date to calculate the MD5 value and obtain key.
Describe below in conjunction with accompanying drawing and a specific embodiment:
Processing method for normal legal link at first is described among the embodiment of a kind of linking processing method of the present invention:
Suppose server ip: 192.168.50.11, server end at first arrange password (for example being set to 123456) in option, and determine to arrange file or the catalogue of door chain.For the webpage client, usually the following http of chained address form that shows in the webpage: // 192.168.50.11/1.rmvb, if in the server this document is provided with door chain, then should link can encrypt through the backstage, this linking request should be when arriving server: http: // 192.168.50.11/1.rmvb? keyCode=2db5549d642d24283f8a26aed9168b58.Link after the above-mentioned encryption has comprised a keycode, the key in the embodiment of the invention namely, and in the present embodiment, this key can obtain by (Arabic numerals of the default password+User IP of server end+date) are calculated the MD5 value.For instance, the user that on August 20th, 2011, the IP address was 192.168.50.10 carries out program request to this door chain file, then: keycode=MD5 (123456192.168.50.102011820)=2db5549d642d24283f8a26aed9168b58, so the link of program request just should be the link after the encryption mentioned above: http: // 192.168.50.11/1.rmvb when sending to server? keyCode=2db5549d642d24283f8a26aed9168b58.
When accessing described door chain file, described web page user produces the http request, destination address in the described http request is the chained address after encrypting, after server is received described address, will be according to IP address and the time of this http acquisition request client, and then according to above-mentioned encryption method calculating MD5 value, namely be exactly to calculate keycode=MD5 (123456192.168.50.102011820)=2db5549d642d24283f8a26aed9168b58, then judge whether the keycode in the chained address in the result calculate and the described http request is identical, if identical then the permission normally accessed.
Be illustrated in figure 1 as the schematic flow sheet of an embodiment of a kind of linking processing method of the present invention, as shown in the figure, the method comprises:
101, receive the http linking request of client;
The relevant information that comprises file destination in the described linking request, such as client ip,, time etc.;
103, judge whether described file destination is provided with door chain;
If 105 are provided with door chain, obtain client ip and time;
107, calculate the MD5 value;
Calculate according to described client ip, time, the default password of server end;
109, judge whether the MD5 value of carrying in described MD5 value and the described http request is consistent;
If 111 is consistent, then return correct chained address and allow normal access;
When inconsistent, denied access then.
Be illustrated in figure 2 as a kind of module diagram that links an embodiment for the treatment of system of the present invention, as shown in the figure, this system comprises:
201, information acquisition unit:
Be used for obtaining the http request of client, obtain at least file destination information, client ip, time according to the http request of described client;
203, computing unit:
Be used for to calculate key, as according to as described in client ip, time, the default password of server end calculate the MD5 value as key;
205, authentication unit:
Be used for judging whether the 203 MD5 values that calculate are consistent with the MD5 value of the http request of client, if unanimously then return the data of request, allow normally to access.
Further, described link treatment system also comprises the webpage background server, described webpage background server is used for will having comprised that according to the user's of current accessed client ip, time, the default cryptographic calculations MD5 value of server end the door chain file address of described MD5 value offers the user.
Above content is the further description of the present invention being done in conjunction with concrete execution mode, can not assert that implementation of the present invention is confined to these explanations.For the general technical staff of the technical field of the invention, without departing from the inventive concept of the premise, can also make some simple deduction or replace, all should be considered as belonging to protection scope of the present invention.

Claims (10)

1. a linking processing method is characterized in that, comprising:
Server end is received the http request of request access door chain file;
From described http request, obtain relevant information, described relevant information comprises at least one of time, User IP, user MAC, the default password of the described relevant information obtained or server end or both combinations is encrypted with the first method produces the first key;
Whether the second key that comprises in judging described the first key and http asking is consistent;
If unanimously, then return the data of request.
2. linking processing method as claimed in claim 1 is characterized in that, also comprises:
After detecting the request that the user accesses the door chain file, Website server is processed the chained address of described door chain file, produces described http request, and described http request comprises with described the first method encrypts described the second key that obtains;
The encryption acts of described web site server end for information comprise at least one of time, User IP, user MAC and described server end preset password.
3. such as claim 1 or 2 each described linking processing methods, it is characterized in that:
Described the first method is:
According to the different different keys of period generation.
4. such as claim 1 or 2 each described linking processing methods, it is characterized in that:
Described the first method is:
Use in the described relevant information at least one to calculate key by default cryptographic algorithm.
5. such as claim 1 or 2 each described linking processing methods, it is characterized in that:
Described the first method is:
Service time, User IP, the default password of server end calculate key by the MD5 algorithm.
6. linking processing method as claimed in claim 4 is characterized in that:
Described cryptographic algorithm comprises with lower at least a: MD5, SHA1, CRC32.
7. such as claim 1 or 2 each described linking processing methods, it is characterized in that:
Described the first method changes according to preset rules.
8. a link treatment system is characterized in that, comprising:
Receiving element: be used for receiving the http request of request access door chain file;
The first ciphering unit: be used for obtaining relevant information from described http request, described relevant information comprises at least one of time, User IP, user MAC, the default password of the described relevant information obtained or server end or both combinations is encrypted with the first method produces the first key;
Judging unit: whether the second key that comprises in judging described the first key and http asking is consistent; If unanimously, then return the data of request.
9. link treatment system as claimed in claim 8 is characterized in that, also comprises:
Web site server end: after accessing the request of door chain file to the user, the chained address of described door chain file is processed, produce described http request, described http request comprises with described the first method encrypts described the second key that obtains;
The encryption acts of described web site server end for information comprise at least one of time, User IP, user MAC and described server end preset password.
10. such as claim 8 or 9 each described link treatment systems, it is characterized in that:
Described the first method is:
Use the default password of described server end and User IP, date to calculate the MD5 value and obtain key.
CN201110302248.XA 2011-09-29 2011-09-29 Chaining processing method and chaining processing system Expired - Fee Related CN103036924B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110302248.XA CN103036924B (en) 2011-09-29 2011-09-29 Chaining processing method and chaining processing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110302248.XA CN103036924B (en) 2011-09-29 2011-09-29 Chaining processing method and chaining processing system

Publications (2)

Publication Number Publication Date
CN103036924A true CN103036924A (en) 2013-04-10
CN103036924B CN103036924B (en) 2017-02-22

Family

ID=48023406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110302248.XA Expired - Fee Related CN103036924B (en) 2011-09-29 2011-09-29 Chaining processing method and chaining processing system

Country Status (1)

Country Link
CN (1) CN103036924B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104135507A (en) * 2014-06-30 2014-11-05 北京奇艺世纪科技有限公司 A method and a device for hotlink protection
CN104184804A (en) * 2014-08-12 2014-12-03 北京京东尚科信息技术有限公司 Cloud storage system and system and method for downloading/providing data from cloud storage system
CN104199921A (en) * 2014-08-30 2014-12-10 深圳市云来网络科技有限公司 Copy-preventing tracking method for web application and copy-preventing webpage tracking device
CN104468607A (en) * 2014-12-24 2015-03-25 四川金网通电子科技有限公司 Multi-server authentication method
CN105721411A (en) * 2015-05-15 2016-06-29 乐视云计算有限公司 Method for preventing hotlinking, server and client terminalfor preventing hotlinking
CN105844121A (en) * 2016-03-31 2016-08-10 乐视控股(北京)有限公司 Method and system for applying digital watermark to content delivery network (CDN)
CN105893873A (en) * 2016-03-31 2016-08-24 乐视控股(北京)有限公司 Hotlink protection method and system based on Blond filter query optimization
CN105915494A (en) * 2015-12-07 2016-08-31 乐视云计算有限公司 Anti-stealing-link method and system
CN107463840A (en) * 2016-06-02 2017-12-12 腾讯科技(深圳)有限公司 A kind of method and device of the defence CC attacks based on the encryption of website and webpage title
CN108093078A (en) * 2017-12-29 2018-05-29 北京长御科技有限公司 A kind of secure flows shifting method of document
CN108494759A (en) * 2018-03-14 2018-09-04 北京思特奇信息技术股份有限公司 A kind of access request processing method, system, equipment and storage medium
CN109040079A (en) * 2018-08-09 2018-12-18 广东省南方数字电视无线传播有限公司 The establishment of live streaming chained address and verification method and related device
CN115021998A (en) * 2022-05-27 2022-09-06 福建天晴数码有限公司 Method and system for static resource double anti-stealing link

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101815061A (en) * 2009-02-23 2010-08-25 未序网络科技(上海)有限公司 Anti-stealing link system of internet content delivery network
CN101815060A (en) * 2009-02-23 2010-08-25 未序网络科技(上海)有限公司 Anti-stealing link method of internet content delivery network
CN102055752A (en) * 2009-10-29 2011-05-11 腾讯科技(深圳)有限公司 Anti-leech method and terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101815061A (en) * 2009-02-23 2010-08-25 未序网络科技(上海)有限公司 Anti-stealing link system of internet content delivery network
CN101815060A (en) * 2009-02-23 2010-08-25 未序网络科技(上海)有限公司 Anti-stealing link method of internet content delivery network
CN102055752A (en) * 2009-10-29 2011-05-11 腾讯科技(深圳)有限公司 Anti-leech method and terminal

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104135507B (en) * 2014-06-30 2018-01-16 北京奇艺世纪科技有限公司 A kind of method and apparatus of door chain
CN104135507A (en) * 2014-06-30 2014-11-05 北京奇艺世纪科技有限公司 A method and a device for hotlink protection
CN104184804A (en) * 2014-08-12 2014-12-03 北京京东尚科信息技术有限公司 Cloud storage system and system and method for downloading/providing data from cloud storage system
CN104184804B (en) * 2014-08-12 2018-07-06 北京京东尚科信息技术有限公司 Cloud storage system and its offer and the system and method from its downloading data
CN104199921A (en) * 2014-08-30 2014-12-10 深圳市云来网络科技有限公司 Copy-preventing tracking method for web application and copy-preventing webpage tracking device
CN104468607A (en) * 2014-12-24 2015-03-25 四川金网通电子科技有限公司 Multi-server authentication method
CN104468607B (en) * 2014-12-24 2017-09-22 四川金网通电子科技有限公司 multi-server authentication method
CN105721411A (en) * 2015-05-15 2016-06-29 乐视云计算有限公司 Method for preventing hotlinking, server and client terminalfor preventing hotlinking
CN105915494A (en) * 2015-12-07 2016-08-31 乐视云计算有限公司 Anti-stealing-link method and system
CN105844121A (en) * 2016-03-31 2016-08-10 乐视控股(北京)有限公司 Method and system for applying digital watermark to content delivery network (CDN)
CN105893873A (en) * 2016-03-31 2016-08-24 乐视控股(北京)有限公司 Hotlink protection method and system based on Blond filter query optimization
CN107463840A (en) * 2016-06-02 2017-12-12 腾讯科技(深圳)有限公司 A kind of method and device of the defence CC attacks based on the encryption of website and webpage title
CN107463840B (en) * 2016-06-02 2018-11-09 腾讯科技(深圳)有限公司 A kind of method and device based on the encrypted defence CC attacks of website and webpage title
CN108093078A (en) * 2017-12-29 2018-05-29 北京长御科技有限公司 A kind of secure flows shifting method of document
CN108093078B (en) * 2017-12-29 2020-10-16 北京长御科技有限公司 Safe document circulation method
CN108494759A (en) * 2018-03-14 2018-09-04 北京思特奇信息技术股份有限公司 A kind of access request processing method, system, equipment and storage medium
CN108494759B (en) * 2018-03-14 2021-06-01 北京思特奇信息技术股份有限公司 Access request processing method, system, device and storage medium
CN109040079A (en) * 2018-08-09 2018-12-18 广东省南方数字电视无线传播有限公司 The establishment of live streaming chained address and verification method and related device
CN115021998A (en) * 2022-05-27 2022-09-06 福建天晴数码有限公司 Method and system for static resource double anti-stealing link
CN115021998B (en) * 2022-05-27 2023-08-11 福建天晴数码有限公司 Method and system for dual anti-theft chain of static resources

Also Published As

Publication number Publication date
CN103036924B (en) 2017-02-22

Similar Documents

Publication Publication Date Title
CN103036924A (en) Chaining processing method and chaining processing system
JP6941146B2 (en) Data security service
US10129033B2 (en) Methods of accessing and providing access to a remote resource from a data processing device
CA2923437C (en) Resource locators with keys
CN101771532B (en) Method, device and system for realizing resource sharing
US10007779B1 (en) Methods and systems for gradual expiration of credentials
US9300639B1 (en) Device coordination
CN104361267A (en) Software authorization and protection device and method based on asymmetric cryptographic algorithm
CN103095733A (en) Keyword cipher text retrieval method for cloud storage
CN103763308A (en) Method and device for having access to webpage safely and downloading data through intelligent terminal
CN103929434A (en) File sharing method based on encryption and permission system
WO2014126882A1 (en) Data security service
CN102055752A (en) Anti-leech method and terminal
US20160182562A1 (en) Time based authentication codes
US9479495B2 (en) Sending authentication codes to multiple recipients
US20100250607A1 (en) Personal information management apparatus and personal information management method
CN104506518A (en) Identity authentication method for access control of MIPS (Million Instructions Per Second) platform network system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: SHENZHEN YUNFAN CENTURY TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: SHENZHEN KUAIBO TECHNOLOGY CO., LTD.

Effective date: 20140818

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 518000 SHENZHEN, GUANGDONG PROVINCE TO: 518057 SHENZHEN, GUANGDONG PROVINCE

TA01 Transfer of patent application right

Effective date of registration: 20140818

Address after: 518057 Guangdong, Shenzhen, Futian District, No. 3013 Yitian Road, South Plaza, building A room, room 1605

Applicant after: SHENZHEN YUNFAN CENTURY TECHNOLOGY CO., LTD.

Address before: 518000 Guangdong city of Shenzhen province Nanshan District Gao Xin Road No. 009 Chinese Technology Development Institute Technology Park building three, 22 floor

Applicant before: SHENZHEN QVOD TECHNOLOGY Co.,Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170222

Termination date: 20200929