CN103118015B - A kind of implementation method of terminal security strategy and system - Google Patents
A kind of implementation method of terminal security strategy and system Download PDFInfo
- Publication number
- CN103118015B CN103118015B CN201310016621.4A CN201310016621A CN103118015B CN 103118015 B CN103118015 B CN 103118015B CN 201310016621 A CN201310016621 A CN 201310016621A CN 103118015 B CN103118015 B CN 103118015B
- Authority
- CN
- China
- Prior art keywords
- timeslice
- terminal
- distribution
- strategy
- distribution server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Information Transfer Between Computers (AREA)
- Hardware Redundancy (AREA)
Abstract
The invention provides a kind of implementation method and system of terminal security strategy.Said method comprises the following steps: Security Policy Server receives the detection data message of each terminal to report, sets up safety problem statistical form, and safety problem statistical form is synchronized to timeslice distribution server; Timeslice distribution server, according to safety problem statistical form, the first present system time sheet total amount and the first strategy, determines the first distribution timeslice of each terminal and the timeslice of system spare; If the timeslice of system spare is greater than preset value, timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to the first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to preset value, then obtain the Target Assignment timeslice of each terminal according to the first distribution timeslice and the second distribution timeslice; Security Policy Server is according to the safety problem of the Target Assignment timeslice processing terminal of each terminal.
Description
Technical field
The invention belongs to computer security technique field, particularly relate to a kind of implementation method and system of terminal security strategy.
Background technology
In traditional business network environment, enterprise terminal computer is piled up all kinds of different safety desktop product, as anti-viral software etc., these software products are usually from different vendor, cannot unified management, and take a large amount of system resource, thus affect the operating efficiency of enterprise.For solving the problem, enterprise version safety product arises at the historic moment.But the system resource utilization problem that current enterprise version safety product brings needs solution badly.
Summary of the invention
The invention provides a kind of implementation method and system of terminal security strategy, to solve the problem.
The invention provides a kind of implementation method of terminal security strategy.Said method comprises the following steps: Security Policy Server receives the detection data message of each terminal to report, and according to detection data message, sets up safety problem statistical form, and safety problem statistical form is synchronized to timeslice distribution server; Timeslice distribution server obtains the first present system time sheet total amount from Security Policy Server; Timeslice distribution server is according to safety problem statistical form, the first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value; If the timeslice of system spare is greater than preset value, timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to the first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to preset value, then obtain the Target Assignment timeslice of each terminal according to the first distribution timeslice and the second distribution timeslice; The Target Assignment timeslice of each terminal is sent to Security Policy Server by timeslice distribution server, and Security Policy Server is according to the safety problem of each terminal of Target Assignment timeslice process of each terminal.
What the present invention also provided a kind of terminal security strategy realizes system, comprises terminal, Security Policy Server and timeslice distribution server.Terminal connects Security Policy Server, and timeslice distribution server connects Security Policy Server.Wherein, Security Policy Server receives the detection data message of each terminal to report, and according to detection data message, sets up safety problem statistical form, and safety problem statistical form is synchronized to timeslice distribution server.Timeslice distribution server obtains the first present system time sheet total amount from Security Policy Server.Timeslice distribution server is according to safety problem statistical form, the first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value.If the timeslice of system spare is greater than preset value, timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to the first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to preset value, then obtain the Target Assignment timeslice of each terminal according to the first distribution timeslice and the second distribution timeslice.The Target Assignment timeslice of each terminal is sent to Security Policy Server by timeslice distribution server, and Security Policy Server is according to the safety problem of each terminal of Target Assignment timeslice process of each terminal.
Compared to prior art, according to implementation method and the system of terminal security strategy provided by the invention, timeslice distribution server is according to safety problem statistical form, the first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value.In addition, if the timeslice of system spare is greater than preset value, timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to the first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to preset value, then obtain the Target Assignment timeslice of each terminal according to the first distribution timeslice and the second distribution timeslice.So, by the time devided modulation of each terminal security problem of timeslice distribution server computing, realize the Resourse Distribute of Security Policy Server, thus make full use of resource, improve treatment effeciency, reduce system burden.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Figure 1 shows that the flow chart of the implementation method of the terminal security strategy that preferred embodiment according to the present invention provides;
Figure 2 shows that the schematic diagram of the system that realizes of the terminal security strategy that preferred embodiment according to the present invention provides.
Embodiment
Hereinafter also describe the present invention in detail with reference to accompanying drawing in conjunction with the embodiments.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combine mutually.
Figure 1 shows that the flow chart of the implementation method of the terminal security strategy that preferred embodiment according to the present invention provides.As shown in Figure 1, the implementation method of terminal security strategy that preferred embodiment of the present invention provides comprises step 101 ~ 105.
In step 101, Security Policy Server receives the detection data message of each terminal to report, and according to described detection data message, sets up safety problem statistical form, and described safety problem statistical form is synchronized to timeslice distribution server.
In the present embodiment, the detection data message of each terminal to report comprises danger classes corresponding to safety problem type, dangerous project and dangerous project.In this, safety problem type such as comprises virus, system dangerous project, wooden horse and other dangerous items etc.But the present invention does not limit this.In this, for four terminals 1 ~ 4, Security Policy Server receives the detection data message of four terminal to report, and sets up safety problem statistical form according to described detection data message, and described safety problem statistical form is such as shown in table 1.But the present invention is not limited thereto.
Table 1
In step 102, described timeslice distribution server obtains the first present system time sheet total amount from described Security Policy Server.Specifically, timeslice distribution server sends system time sheet to Security Policy Server and obtains request, after Security Policy Server receives described system time sheet acquisition request, Security Policy Server obtains the first present system time sheet total amount of self, and sends the first present system time sheet total amount to timeslice distribution server.
In step 103, described timeslice distribution server is according to described safety problem statistical form, described first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value.
In the present embodiment, first strategy is: the time devided modulation degree that the dangerous project of different danger classes is corresponding different, the dangerous project sum of the time devided modulation degree corresponding according to the dangerous project of each terminal, dangerous project and described terminal, determines the time devided modulation ratio of corresponding terminal.Specifically, the time devided modulation ratio of each terminal danger classes number that equals this terminal and corresponding time devided modulation degree product with the ratio of value and the dangerous project sum of all terminals.
In this, for table 1, danger classes comprises Three Estate: senior, intermediate and rudimentary.Correspondingly, the time devided modulation degree of senior correspondence is 50%, and the time devided modulation degree that middle rank is corresponding is 40%, and the time devided modulation degree of rudimentary correspondence is 10%.But the present invention does not limit this.In practical application, corresponding time devided modulation degree can be set as required.
For table 1, for terminal 1, its safety problem table is as shown in table 2a.
Table 2a
Now, known according to the first strategy: time devided modulation ratio=(the 3*50%+1*40%)/16=1.9/16 of terminal 1.Wherein, the dangerous project sum of current four terminals is 16 as shown in Table 1.
For table 1, for terminal 2, its safety problem table is as shown in table 2b.
Table 2b
Now, known according to the first strategy: time devided modulation ratio=(the 2*50%+1*40%+2*10%)/16=1.6/16 of terminal 2.
For table 1, for terminal 3, its safety problem table is as shown in table 2c.
Table 2c
Now, known according to the first strategy: time devided modulation ratio=(the 1*40%+3*10%)/16=0.7/16 of terminal 3.
For table 1, for terminal 4, its safety problem table is as shown in table 2d.
Table 2d
Now, known according to the first strategy: time devided modulation ratio=(the 1*50%+1*40%+1*10%)/16=1/16 of terminal 4.
In addition, in the present embodiment, first distributes the product that timeslice is time devided modulation ratio and the first present system time sheet total amount.In this, the the first present system time sheet total amount obtained for time devided modulation server is for a, and first of time devided modulation ratio each terminal known of each terminal determined according to time devided modulation server to distribute timeslice as follows successively: first of terminal 1 distributes timeslice=1.9a/16; First of terminal 2 distributes timeslice=1.6a/16; First of terminal 3 distributes timeslice=0.7a/16; First of terminal 4 distributes timeslice=a/16.It can thus be appreciated that, the timeslice=a-(1.9a/16+1.6a/16+0.7a/16+a/16 of system spare)=10.8a/16=0.675a.
In step 104, if the timeslice of system spare is greater than described preset value, described timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to described first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to described preset value, then obtain the Target Assignment timeslice of each terminal according to described first distribution timeslice and described second distribution timeslice.
In the present embodiment, still for the terminal of four in step 103, if preset value is such as set to 0.5a, then the timeslice (such as, 0.675a) of system spare is greater than preset value.Wherein, the present invention does not limit the setting of preset value, in practical application, can arrange preset value as required.Now, timeslice distribution server using the timeslice of system spare (that is, 0.675a) as the second present system time sheet total amount, then recalculates the second distribution timeslice of each terminal according to the first strategy.In this, second of each terminal that time devided modulation server calculates is distributed timeslice and is specially: second of terminal 1 distributes timeslice=(1.9/16) * 0.675a=1.2825a/16; Second of terminal 2 distributes timeslice=(1.6/16) * 0.675a=1.08a/16; Second of terminal 3 distributes timeslice=(0.7/16) * 0.675a=0.4725a; Second of terminal 4 distributes timeslice=(1/16) * 0.675a=0.675a/16.Now, the timeslice=0.675a-(1.2825a/16+1.08a/16+0.4725a/16+0.675a/16 of system spare)=0.455625a.Now, the timeslice (that is, 0.455625a) of system spare is less than preset value (0.5a), then timeslice distribution server obtains the Target Assignment timeslice of each terminal according to the first distribution timeslice and the second distribution timeslice.In this, Target Assignment timeslice is that the first distribution timeslice and second distributes timeslice sum.Specifically, the Target Assignment timeslice=1.9a/16+1.2825a/16=3.1825a/16 of terminal 1; Target Assignment timeslice=the 1.6a/16+1.08a/16=2.68a/16 of terminal 2; Target Assignment timeslice=the 0.7a/16+0.4725a/16=1.1725a/16 of terminal 3; Target Assignment timeslice=the a/16+0.675a/16=1.675a/16 of terminal 4.
In the present embodiment, if after timeslice distribution server calculates the second distribution timeslice of each terminal, the remaining timeslice of current system is still greater than preset value, then timeslice distribution server is using the remaining timeslice of current system as the 3rd present system time sheet total amount, recalculates the 3rd of each terminal distribute timeslice according to the first strategy.3rd computational process of distributing timeslice is distributed timeslice and second with first and is distributed timeslice.In addition, if after obtaining the 3rd distribution timeslice, the timeslice of system spare is less than or equal to preset value, then the Target Assignment timeslice of each terminal equals the first distribution timeslice, the second distribution timeslice and the 3rd distributes timeslice sum.In other words, when the timeslice of system spare is less than or equal to preset value, timeslice distribution server stops the calculating of the distribution timeslice of each terminal, the distribution timeslice correspondence of each terminal calculated is added the Target Assignment timeslice obtaining each terminal simultaneously.
In step 105, the Target Assignment timeslice of each terminal is sent to described Security Policy Server by described timeslice distribution server, and described Security Policy Server is according to the safety problem of each terminal of Target Assignment timeslice process of each terminal.In this, the Target Assignment timeslice of each terminal determined is sent to Security Policy Server by timeslice distribution server, after Security Policy Server receives the Target Assignment timeslice of each terminal, according to the safety problem of Target Assignment timeslice process corresponding terminal.In this, for project 3 dangerous in table 1, Security Policy Server such as directly can delete the dangerous project 3 of terminal 2 and terminal 3; For dangerous project 1, Security Policy Server such as needs the relevant setting of first more new terminal 1 and terminal 2, confirms relevantly to arrange after renewal completes, process dangerous project 1 in terminal 1 or terminal 2.
Figure 2 shows that the schematic diagram of the system that realizes of the terminal security strategy that preferred embodiment according to the present invention provides.As shown in Figure 2, the system that realizes of terminal security strategy that preferred embodiment of the present invention provides comprises terminal 10a ~ 10n, Security Policy Server 12 and timeslice distribution server 14.In this, the present invention does not limit the number of terminal.Terminal 10a ~ 10n connects Security Policy Server 12, and timeslice distribution server 14 connects Security Policy Server 12.
In the present embodiment, Security Policy Server 12 receives the detection data message of each terminal to report, and according to detection data message, sets up safety problem statistical form, and safety problem statistical form is synchronized to timeslice distribution server 14.Timeslice distribution server 14 obtains the first present system time sheet total amount from Security Policy Server 12.Timeslice distribution server 14 is according to safety problem statistical form, the first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value.If the timeslice of system spare is greater than preset value, timeslice distribution server 14 is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to the first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to preset value, then obtain the Target Assignment timeslice of each terminal according to the first distribution timeslice and the second distribution timeslice.The Target Assignment timeslice of each terminal is sent to Security Policy Server 12 by timeslice distribution server 14, and Security Policy Server 12 is according to the safety problem of each terminal of Target Assignment timeslice process of each terminal.About the specific operation process of said system with described in said method, therefore repeat no more in this.
In sum, the implementation method of the terminal security strategy provided according to present pre-ferred embodiments and system, timeslice distribution server is according to safety problem statistical form, the first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value.In addition, if the timeslice of system spare is greater than preset value, timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to the first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to preset value, then obtain the Target Assignment timeslice of each terminal according to the first distribution timeslice and the second distribution timeslice.So, by the time devided modulation of each terminal security problem of timeslice distribution server computing, realize the Resourse Distribute of Security Policy Server, thus make full use of resource, improve treatment effeciency, reduce system burden.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. an implementation method for terminal security strategy, is characterized in that, comprises the following steps:
Security Policy Server receives the detection data message of each terminal to report, and according to described detection data message, sets up safety problem statistical form, and described safety problem statistical form is synchronized to timeslice distribution server;
Described timeslice distribution server obtains the first present system time sheet total amount from described Security Policy Server;
Described timeslice distribution server is according to described safety problem statistical form, described first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value;
If the timeslice of system spare is greater than described preset value, described timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to described first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to described preset value, then obtain the Target Assignment timeslice of each terminal according to described first distribution timeslice and described second distribution timeslice;
The Target Assignment timeslice of each terminal is sent to described Security Policy Server by described timeslice distribution server, and described Security Policy Server is according to the safety problem of each terminal of Target Assignment timeslice process of each terminal;
Wherein, when the timeslice of system spare is less than or equal to preset value, timeslice distribution server stops the calculating of the distribution timeslice of each terminal, the distribution timeslice correspondence of each terminal calculated is added the Target Assignment timeslice obtaining each terminal simultaneously.
2. method according to claim 1, is characterized in that, the detection data message of each terminal to report comprises danger classes corresponding to safety problem type, dangerous project and dangerous project.
3. method according to claim 1, it is characterized in that, described first strategy is: the time devided modulation degree that the dangerous project of different danger classes is corresponding different, the dangerous project sum of the time devided modulation degree corresponding according to the dangerous project of each terminal, dangerous project and described terminal, determines the time devided modulation ratio of corresponding terminal.
4. method according to claim 3, is characterized in that, described first distributes the product that timeslice is described time devided modulation ratio and described first present system time sheet total amount.
5. method according to claim 1, is characterized in that, described Target Assignment timeslice is that described first distribution timeslice and described second distributes timeslice sum.
6. method according to claim 1, it is characterized in that, if after described timeslice distribution server calculates the second distribution timeslice of each terminal, the remaining timeslice of current system is greater than described preset value, then described timeslice distribution server is using the remaining timeslice of current system as the 3rd present system time sheet total amount, recalculates the 3rd of each terminal distribute timeslice according to described first strategy.
7. terminal security strategy realize a system, it is characterized in that, comprise terminal, Security Policy Server and timeslice distribution server, described terminal connects described Security Policy Server, and described timeslice distribution server connects described Security Policy Server,
Wherein, described Security Policy Server receives the detection data message of each terminal to report, and according to described detection data message, sets up safety problem statistical form, and described safety problem statistical form is synchronized to described timeslice distribution server,
Described timeslice distribution server obtains the first present system time sheet total amount from described Security Policy Server,
Described timeslice distribution server is according to described safety problem statistical form, described first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value
If the timeslice of system spare is greater than described preset value, described timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to described first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to described preset value, the Target Assignment timeslice of each terminal is then obtained according to described first distribution timeslice and described second distribution timeslice
The Target Assignment timeslice of each terminal is sent to described Security Policy Server by described timeslice distribution server, and described Security Policy Server is according to the safety problem of each terminal of Target Assignment timeslice process of each terminal;
Wherein, when the timeslice of system spare is less than or equal to preset value, timeslice distribution server stops the calculating of the distribution timeslice of each terminal, the distribution timeslice correspondence of each terminal calculated is added the Target Assignment timeslice obtaining each terminal simultaneously.
8. system according to claim 7, is characterized in that, the detection data message of each terminal to report comprises danger classes corresponding to safety problem type, dangerous project and dangerous project.
9. system according to claim 7, it is characterized in that, described first strategy is: the time devided modulation degree that the dangerous project of different danger classes is corresponding different, the dangerous project sum of the time devided modulation degree corresponding according to the dangerous project of each terminal, dangerous project and described terminal, determines the time devided modulation ratio of corresponding terminal.
10. system according to claim 7, is characterized in that, described first distributes the product that timeslice is described time devided modulation ratio and described first present system time sheet total amount.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310016621.4A CN103118015B (en) | 2013-01-17 | 2013-01-17 | A kind of implementation method of terminal security strategy and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310016621.4A CN103118015B (en) | 2013-01-17 | 2013-01-17 | A kind of implementation method of terminal security strategy and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103118015A CN103118015A (en) | 2013-05-22 |
CN103118015B true CN103118015B (en) | 2015-08-05 |
Family
ID=48416289
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310016621.4A Active CN103118015B (en) | 2013-01-17 | 2013-01-17 | A kind of implementation method of terminal security strategy and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103118015B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1889510A (en) * | 2005-06-30 | 2007-01-03 | 华为技术有限公司 | Method for raising network security via message processing |
CN101916068A (en) * | 2010-07-29 | 2010-12-15 | 北京交通大学 | Computer control system based on 2-out-of-2 structure and implementation method thereof |
-
2013
- 2013-01-17 CN CN201310016621.4A patent/CN103118015B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1889510A (en) * | 2005-06-30 | 2007-01-03 | 华为技术有限公司 | Method for raising network security via message processing |
CN101916068A (en) * | 2010-07-29 | 2010-12-15 | 北京交通大学 | Computer control system based on 2-out-of-2 structure and implementation method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN103118015A (en) | 2013-05-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3534320A1 (en) | Block chain-based multi-chain management method and system, electronic device, and storage medium | |
US10171630B2 (en) | Executing remote commands | |
CN103248696B (en) | Dynamic configuration method for virtual resource under a kind of cloud computing environment | |
MY184724A (en) | Method and system for conducting resource transfer using a social networking application | |
CN103281361A (en) | Personal cloud cooperation system and data management method | |
CN104091130A (en) | Authority control method for enterprise data management platform | |
CN103095706B (en) | A kind of processing method of terminal security and system | |
CN105376347A (en) | IP address allocation method and system | |
CN102611704B (en) | Cloud computing node registering system and cloud computing node registering method | |
CN104506630B (en) | Permissions data generation method, server and system based on user role | |
CN103118015B (en) | A kind of implementation method of terminal security strategy and system | |
Sharma et al. | Power‐saving policies for annual energy cost savings in green computing | |
CN103118014B (en) | A kind of control method of terminal security and system | |
CN103095707B (en) | A kind of information processing method of terminal security and system | |
CN102238037B (en) | Cooperative target strategy detailing method | |
CN102999728B (en) | Based on date storage method and the device of safety desktop | |
CN105426252A (en) | Thread distribution method and system of distributed type file system | |
CN105825316A (en) | Integral management method | |
CN104092602A (en) | Cloud computing gateway | |
CN110868330A (en) | Evaluation method, device and evaluation system for CPU resources which can be divided by cloud platform | |
CN107273047A (en) | A kind of buffer memory management method, cache manager and storage management software | |
CN103309730A (en) | Method and device for inter-process callback | |
CN113515330B (en) | Cloud desktop security authentication method and system based on domestic cryptographic technology | |
Xie et al. | Trust management model of cloud computing based on multi-agent | |
CN103530239A (en) | Method for improving performance of communication server by using memory pool |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20170523 Address after: 511300 Guangdong Province, Guangzhou City Licheng street Zengcheng District Garden Road No. 66 first floor shop Patentee after: Guangzhou Ying Sui Communication Technology Co., Ltd. Address before: Suzhou City, Jiangsu Province, Suzhou Industrial Park 215021 Xinghu Street No. 328 Chongwen Road, Guohua building A511 Patentee before: Suzhou Yibei Information Technology Co., Ltd. |