CN103441926B - Security gateway system of numerically-controllmachine machine tool network - Google Patents

Security gateway system of numerically-controllmachine machine tool network Download PDF

Info

Publication number
CN103441926B
CN103441926B CN201310379363.6A CN201310379363A CN103441926B CN 103441926 B CN103441926 B CN 103441926B CN 201310379363 A CN201310379363 A CN 201310379363A CN 103441926 B CN103441926 B CN 103441926B
Authority
CN
China
Prior art keywords
security
data
management
machine tool
net
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310379363.6A
Other languages
Chinese (zh)
Other versions
CN103441926A (en
Inventor
蔡霖
蔡皖东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xining wiscom Electronics Co. Ltd.
Original Assignee
Northwestern Polytechnical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwestern Polytechnical University filed Critical Northwestern Polytechnical University
Priority to CN201310379363.6A priority Critical patent/CN103441926B/en
Publication of CN103441926A publication Critical patent/CN103441926A/en
Application granted granted Critical
Publication of CN103441926B publication Critical patent/CN103441926B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Abstract

The invention discloses a kind of security gateway system of numerically-controllmachine machine tool network, for solving the technical problem of existing gateway security of system difference.Technical scheme is to include data communications security subsystem, security of system protection subsystem, the management interface of based role and remote management tool.When Digit Control Machine Tool net accessing enterprise information net, carry out data source authentication, data integrity certification and communication unit tropism certification by data communications security subsystem, then communicate controllability certification, abnormal event alarming and security audit by security of system protection subsystem.Owing to establishing the one way data communication passage of a safety between Enterprise Information Net and Digit Control Machine Tool net, it is achieved that security mechanisms such as data source authentication, data integrity and communication unit tropisms.Inside security gateway system, it is provided that the security mechanisms such as communication controllability, abnormal event alarming, security audit and safety management, solve the technical problem that the security risk of the mode of being directly accessed is high.

Description

Security gateway system of numerically-controllmachine machine tool network
Technical field
The present invention relates to a kind of security gateway system, particularly relate to a kind of security gateway system of numerically-controllmachine machine tool network.
Background technology
The manufacturing enterprise of China is increasingly using Digit Control Machine Tool and carries out precision optical machinery processing.Based on numerical control machine In the machining system of bed, being made up of a control machine and multiple Digit Control Machine Tool, they are coupled together by network, by controlling Digit Control Machine Tool is implemented remotely located and controls by machine, constitutes a numerical control machine tool net.
Along with industrialization and informationalized depth integration, Digit Control Machine Tool net is linked into company information by increasing enterprise Net, engineer's work station in Enterprise Information Net designs machining drawing, after generating machined parameters file, is transferred to number On control machine in control machine tool net, it is directly used in control Digit Control Machine Tool and carries out machining, it is to avoid manual delivery and input add The mistake that work Parameter File may introduce, substantially increases work efficiency.
Owing to the node in Digit Control Machine Tool net is mainly controller of digital controlled machine tool, belong to built-in terminal, it is impossible to by peace The safety information products such as dress anti-virus software protect, and are in state in the air.There is bigger peace in this mode that is directly accessed Full hidden danger, mainly shows themselves in that
(1) Digit Control Machine Tool net may be passed to from rogue programs such as the virus in Enterprise Information Net, wooden horses, machinery is added Work process is disturbed and destroys.Shake net virus is exactly typical case.
(2) from the aggressive behavior in Enterprise Information Net and violation operation, numerical control machine tool net and mechanical processing process are entered Row interference and destruction.
(3) machined parameters file may illegally be distorted in transmitting procedure, causes the serious consequences such as part rejection.
(4) illegal access host in Digit Control Machine Tool net, Entry Firm Information Network without permission, implement unlawful activities.
On the other hand, a lot of military enterprises mostly establish Digit Control Machine Tool net, and military enterprise's Information Network belongs to concerning security matters letter Breath net, according to the regulation of country's Information System Security cascade protection system, any terminal unit must have safety prevention measure Under conditions of just can be linked in classified information net, to ensure the safety of network boundary.Owing to controller of digital controlled machine tool is to embed Formula terminal, it is impossible to install security protection system.Therefore, generally forbid the Digit Control Machine Tool net without security protection is linked into concerning security matters letter In breath net, data can only be used to derive mode, on the work station of classified information net, the machined parameters file of generation is stored in light Dish;Then by the control machine during machined parameters file imports to Digit Control Machine Tool net again in CD.This data export method Although comparing safety, but also bring the problems such as use inconvenience and the wasting of resources.
Visible, the mode of being directly accessed also exists the biggest potential safety hazard, and data derive mode and there is use inconvenience etc. Problem.Solve these problems challenge is how that safely Digit Control Machine Tool net being linked into Enterprise Information Net (includes that concerning security matters are believed Breath net) in, safety, controlled under conditions of, it is achieved securely transmitting of data file.
First, Digit Control Machine Tool net is non-classified network, there is not classified information and processes and storage problem.Secondly, Digit Control Machine Tool Net must be linked into Enterprise information system under conditions of having safety prevention measure, and this safety prevention measure can be by enterprise Arrange a security gateway between industry Information Network and Digit Control Machine Tool net to realize, under the control of security gateway, Enterprise Information Net Transmit machined parameters file to Digit Control Machine Tool net, both effectively reduced the security risk that the mode of being directly accessed is brought, and solved again Data derive the use inconvenience problem that mode is brought.
Summary of the invention
In order to overcome the deficiency of existing gateway security of system difference, the present invention provides a kind of Digit Control Machine Tool net safety net relation System.This system includes data communications security subsystem, security of system protection subsystem, the management interface of based role and remotely manages Science and engineering has.When Digit Control Machine Tool net accessing enterprise information net, carry out data source authentication, data by data communications security subsystem Integrated authentication and communication unit tropism certification, then communicate controllability certification, exception by security of system protection subsystem Affair alarm and security audit.By security gateway system, between Enterprise Information Net and Digit Control Machine Tool net, establish one The one way data communication passage of safety, it is achieved that the security mechanisms such as data source authentication, data integrity and communication unit tropism. Inside security gateway system, it is provided that the securities of system such as communication controllability, abnormal event alarming, security audit and safety management Mechanism, further enhancing security of system.Security mechanism and security mechanism combine, by Digit Control Machine Tool The security risk that net accesses is reduced in controlled range, can be to solve to be directly accessed the technical problem that the security risk of mode is high.
The technical solution adopted for the present invention to solve the technical problems is: a kind of security gateway system of numerically-controllmachine machine tool network, its Feature is to include data communications security subsystem, security of system protection subsystem, the management interface of based role and remotely manage Instrument.
Data communications security subsystem realizes data source authentication, data integrity and communication unit tropism.Data source white list Employing XML language describes, and the one-way hash function in data source authentication and data integrity protection uses MD5 algorithm to realize.
Security of system protection subsystem realizes communication controllability, abnormal event alarming and security audit.Communication controllability is white List uses XML language to describe, and utilizes the API of operating system to realize its communication control function.Abnormal event alarming uses screen Curtain display, SMS and E-mail mode, and by anomalous event details record in journal file.Anomalous event Including excluding accessing operation and violating the Deviant Behavior of safety regulation of white list.Journal file includes two proper communication row For information and exceptional communication behavioural information, and identify different danger classes according to the order of severity of anomalous event.Daily record literary composition Part uses standard logs form to carry out rolling record, and journal file provides information when will write all over, it is desirable to manager is timely Backup log file.
The management interface module of based role provides the management interface of based role for remote management tool, including angle System manager that color separates and security audit person, system manager be mainly responsible for white list and safety regulation set up with editor, Abnormal event alarming information processing, inspection algorithm update and the operation such as maintenance and other system administration;Security audit person master Log information to be responsible for inquiry, audit and backup operation.
Remote management tool provides the user security gateway based on B/S three-decker management platform, including security configuration Management, system operational management, anomalous event management, log query and security audit function.System manager and security audit The role of member is provided separately with account, the most individually logs in and identity differentiates, constitute the supervision mechanism of mutually restriction, it is ensured that safety The safety of gateway management and credibility.
The invention has the beneficial effects as follows: this system includes that data communications security subsystem, security of system protect subsystem, base Management interface and remote management tool in role.When Digit Control Machine Tool net accessing enterprise information net, pass through data communications security Subsystem carries out data source authentication, data integrity certification and communication unit tropism certification, then protects subsystem by security of system System communicates controllability certification, abnormal event alarming and security audit.By security gateway system, Enterprise Information Net with Establish the one way data communication passage of a safety between Digit Control Machine Tool net, it is achieved that data source authentication, data integrity and The security mechanisms such as communication unit tropism.Inside security gateway system, it is provided that communication controllability, abnormal event alarming, peace The security mechanisms such as full audit and safety management, further enhancing security of system.Security mechanism and security of system Mechanism combines, and the security risk that Digit Control Machine Tool net accesses is reduced in controlled range, solves the side of being directly accessed The technical problem that the security risk of formula is high.
With embodiment, the present invention is elaborated below in conjunction with the accompanying drawings.
Accompanying drawing explanation
Fig. 1 is the block diagram of security gateway system of numerically-controllmachine machine tool network of the present invention.
Detailed description of the invention
Security gateway system of numerically-controllmachine machine tool network of the present invention includes that data communications security subsystem, security of system protect subsystem System, the management interface of based role and remote management tool.
(1) data communications security subsystem: mainly realize data source authentication, data integrity and communicate with communication unit tropism etc. Security mechanism, wherein:
1. data source white list uses XML language to describe, and the one-way hash function in data source authentication uses MD5 algorithm Realize.
2. the one-way hash function in data integrity protection is also to use MD5 algorithm to realize.
It addition, on work station end and control machine end, need to realize corresponding data file and send and reception program.
(2) security of system protection subsystem: the systems such as main realization communication controllability, abnormal event alarming, security audit Security mechanism, wherein:
1. communication controllability white list uses XML language to describe, and utilizes the API(such as Windows TDI of operating system Interface function) realize its communication control function.
2. abnormal event alarming use screen to show, the mode such as SMS, Email, and anomalous event is believed in detail Breath record is in journal file.Anomalous event includes excluding accessing operation and violating the abnormal row of safety regulation of white list For etc..
3. log recording includes two category informations: proper communication behavioural information and exceptional communication behavioural information, and according to exception The order of severity of event identifies different danger classes.Journal file uses standard logs form to carry out rolling record, daily record File provides information when will write all over, it is desirable to manager's timely backup log file.
(3) the management interface module of based role: the management interface of based role, bag are provided for remote management tool Including system manager and security audit person that role separates, system manager is mainly responsible for white list and safety regulation is set up and compiled Volume, abnormal event alarming information processing, check that algorithm updates and safeguards and other the operation such as system administration;Security audit person Main it is responsible for that log information inquire about, audited, backup etc. operates.
(4) remote management tool: provide the user security gateway based on B/S three-decker management platform, including safety Configuration management, system operational management, anomalous event management and the function such as log query, security audit.System manager and An Complete auditorial role and account are provided separately, and the most individually log in and identity differentiates, constitute the intendant of mutually restriction System, it is ensured that the safety of security gateway management and credibility.
Security gateway system mainly realizes following security mechanism:
(1) data source authentication: by data source authentication based on white list mechanism, data source is authenticated, the most in vain Data source (work station) on list just allows to initiate TCP and connects, and transmits data file, prevents rogue program and aggressive behavior pair The interference of Digit Control Machine Tool net and destruction.
(2) data integrity: by one-way hash function, the data file transmitted is carried out integrity protection, prevents Data file is illegally distorted in transmitting procedure.
(3) communication unit tropism: by one-way communication mechanism, only allows Enterprise Information Net to initiate TCP even to Digit Control Machine Tool net Connect and transmit data file, and forbid reversely setting up connection and transmission data, prevent from utilizing Digit Control Machine Tool net to enter without permission Enter Enterprise Information Net, implement unlawful activities.
(4) communication controllability: by communication controling machine based on white list, to process, service on security gateway system Network service behavior with application program is controlled, and the only trusted program on white list just allows to carry out network service behaviour Make, prevent rogue program to Enterprise Information Net or to Digit Control Machine Tool net initiation network attack.
(5) operation retrospective: by log recording and Security Auditing Mechanism, to action row all of on security gateway system For recording with security incident and auditing, and anomalous event is sent in time warning.For assessing security risk, tracing assailant Responsibility provides foundation and evidence.
The present invention described further below.
1. data source authentication mechanism.
Each work station allowing to access control machine, it is necessary to use 32 authentication codes and IP address to identify, and thing First it is registered in the data source white list of security gateway system.
Data source authentication is divided into two stages:
(1) preliminary certification: when the work station (abbreviation work station) of Enterprise Information Net uses Transmission Control Protocol to Digit Control Machine Tool net Control machine (being called for short control machine) sends when setting up TCP connection request, and first security gateway system receives sets up TCP connection request, Then extract source IP address, inquire about data source white list, to determine whether for believable data source.If incredible number According to source, do not allow to set up TCP and connect, stop this operation.
(2) final authentication: connecting if allowing to set up TCP, work station uses the one-way hash function authentication code to oneself Do hash with IP address to calculate, obtain data source hashed value, and construct a data structure, including data file, file Name, data file hashed value, data source hashed value etc., be sent to control machine by tcp data bag.First security gateway system connects Receive tcp data bag, extract data source hashed value, then use identical one-way hash function to calculate the number in data source white list According to source authentication code and IP address, the hashed value of the hashed value obtained with extraction is compared, if identical, this data source is described It is believable data source, proceeds to follow-up process;It is otherwise illegal data source, stops this operation.Final authentication is predominantly Prevent the IP spoofing from attacking.
2. data integrity mechanism.
Work station uses one-way hash function that data file to be transmitted is done hash and calculates, and obtains data file hash Value, and construct a data structure, including data file, filename, data file hashed value, data source hashed value etc., It is sent to control machine by tcp data bag.First security gateway system receives tcp data bag, extracts data file hashed value, so The hashed value of the one-way hash function calculating received data file that rear use is identical, compares two hashed values, if identical, says Bright received data file is complete, is not tampered with, and proceeds to follow-up process;Otherwise explanation data file is tampered, Stop this operation.
3. communication unit tropism mechanism.
Security gateway system, after by data source authentication and data integrity checking, sends to control machine and sets up TCP even Connect request.When security gateway system receive control machine allow to set up TCP connection response after, to control machine send only comprise number Tcp data bag according to file and filename.Control machine receives tcp data bag, is stored under the catalogue specified by file, completes this Secondary data file transmission, it is achieved that the safe transfer of data file.Under any circumstance, security gateway system is all forbidden carrying out automatic control The communication request of machine processed, mainly for preventing from utilizing Digit Control Machine Tool net Entry Firm Information Network without permission, implements illegal living Dynamic.
4. communication controllability mechanism.
In advance by allowing on security gateway system to carry out the process of network service, the name registration of services and applications exists In the trusted program white list of security gateway system.After security gateway system runs, attempt to start network service for any Process, services and applications, system will inquiry trusted program white list, if its program name occurs in white list, then Allow to perform network communication operations, otherwise forbid that this program performs.Mainly for preventing the rogue program such as virus, wooden horse to enterprise Information Network or to Digit Control Machine Tool net initiate network attack.
5. Security Auditing Mechanism.
On security gateway system, all of operation behavior and security incident will record in journal file, the information of record Including: produce the program module of daily record, seriousness, time, host name or IP, process name, process ID and text etc..In order to ensure The integrity of log information, takes following protective measure: (1) prevents information from distorting: system is generally forbidden amendment or deletes daily record Log information in file, to keep the integrity of log information.(2) loss of data is prevented: in order to prevent journal file from writing all over And producing loss of data, file size, by the journal file length according to Administrator, is monitored by system, when reaching to set During fixed higher limit, provide warning message continuously, remind manager to back up current log data in time, to prevent loss of data.
Security audit is by the user operation behavior in system and the statistical analysis of security incident, therefrom finding system In violation operation that may be present, anomalous event, aggressive behavior and system vulnerability etc., for security incident electronic evidence-collecting and can Retrospective provides technological means.Manager is audited by system management facility and manages operation, including systematic parameter configuration, day Will information inspection, event statistics analysis, alarm information processing, log information backup etc..

Claims (1)

1. a security gateway system of numerically-controllmachine machine tool network, it is characterised in that include that data communications security subsystem, security of system are anti- Protect subsystem, the management interface of based role and remote management tool;
Data communications security subsystem realizes data source authentication, data integrity and communication unit tropism;Data source white list uses XML language describes, and the one-way hash function in data source authentication and data integrity protection uses MD5 algorithm to realize;
Security of system protection subsystem realizes communication controllability, abnormal event alarming and security audit;Communication controllability white list Employing XML language describes, and utilizes the API of operating system to realize its communication control function;Abnormal event alarming uses screen to show Show, SMS and E-mail mode, and by anomalous event details record in journal file;Anomalous event includes Exclude accessing operation and violating the Deviant Behavior of safety regulation of white list;Journal file includes two category informations: positive normal open Letter behavioural information and exceptional communication behavioural information, and identify different danger classes according to the order of severity of anomalous event;Day Will file uses standard logs form to carry out rolling record, and journal file provides information when will write all over, it is desirable to manager Backup log file in time;
The management interface module of based role provides the management interface of based role for remote management tool, divides including role From system manager and security audit person, system manager is responsible for white list and safety regulation and sets up and editor, anomalous event Alarm information processing, inspection algorithm renewal and maintenance and other system management operation;Security audit person is responsible for log information Inquiry, audit and backup operation;
Remote management tool provide the user security gateway based on B/S three-decker management platform, including secure configuration management, System operational management, anomalous event management, log query and security audit function;System manager and the angle of security audit person Color is provided separately with account, the most individually logs in and identity differentiates, constitute the supervision mechanism of mutually restriction, it is ensured that security gateway pipe The safety of reason and credibility.
CN201310379363.6A 2013-08-27 2013-08-27 Security gateway system of numerically-controllmachine machine tool network Expired - Fee Related CN103441926B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310379363.6A CN103441926B (en) 2013-08-27 2013-08-27 Security gateway system of numerically-controllmachine machine tool network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310379363.6A CN103441926B (en) 2013-08-27 2013-08-27 Security gateway system of numerically-controllmachine machine tool network

Publications (2)

Publication Number Publication Date
CN103441926A CN103441926A (en) 2013-12-11
CN103441926B true CN103441926B (en) 2016-12-28

Family

ID=49695592

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310379363.6A Expired - Fee Related CN103441926B (en) 2013-08-27 2013-08-27 Security gateway system of numerically-controllmachine machine tool network

Country Status (1)

Country Link
CN (1) CN103441926B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103744992B (en) * 2014-01-22 2017-05-17 重庆心宿二信息技术有限公司 Control method and control system for accessing to computer file contents
CN104539573B (en) * 2014-10-30 2018-07-27 北京科技大学 A kind of communication means and device of the industry security gateway based on embedded system
CN106411816B (en) * 2015-07-29 2021-02-05 研祥智能科技股份有限公司 Industrial control system, safety interconnection system and processing method thereof
CN105978871A (en) * 2016-05-09 2016-09-28 北京航天数控系统有限公司 Communication protection device for numerical control system
CN106354100B (en) * 2016-11-18 2019-03-12 北京网御星云信息技术有限公司 A kind of operation audit method and device applied to numerically-controlled machine tool
CN106774168B (en) * 2016-12-09 2019-06-28 中国电子科技网络信息安全有限公司 A kind of numerical control NC code safety filtering system
CN108429744A (en) * 2018-03-05 2018-08-21 中国电子科技网络信息安全有限公司 A kind of CNC Machine Tools Communication interface security means of defence and device
CN109739203B (en) * 2019-02-25 2021-09-21 南京世界村云数据产业集团有限公司 Industrial network boundary protection system
CN109976239B (en) * 2019-04-29 2020-06-16 北京京航计算通讯研究所 Industrial control system terminal safety protection system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101634850A (en) * 2008-07-23 2010-01-27 北京三维力控科技有限公司 Isolated gateway

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7305547B2 (en) * 2002-06-28 2007-12-04 Hewlett-Packard Development Company, L.P. Method for upgrading a host/agent security system that includes digital certificate management and an upgradable backward compatible host/agent security system digital certificate infrastructure
CN101247391B (en) * 2007-12-28 2013-03-06 上海电力学院 OPC safety proxy system and proxy method thereof
FR2937763B1 (en) * 2008-10-24 2010-11-12 Thales Sa Centralized supervision and / or hypervision tool of a set of systems of different security levels
CN101588360A (en) * 2009-07-03 2009-11-25 深圳市安络大成科技有限公司 Associated equipment and method for internal network security management

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101634850A (en) * 2008-07-23 2010-01-27 北京三维力控科技有限公司 Isolated gateway

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
内部网行为监管审计系统的设计与实现;何得勇;《中国优秀硕士学位论文全文数据库 信息科技辑》;20040915(第3期);第5,16-23,29-30页 *

Also Published As

Publication number Publication date
CN103441926A (en) 2013-12-11

Similar Documents

Publication Publication Date Title
CN103441926B (en) Security gateway system of numerically-controllmachine machine tool network
CN104753936B (en) OPC security gateway systems
CN105553940A (en) Safety protection method based on big data processing platform
CN106326699B (en) Server reinforcing method based on file access control and process access control
US20050071643A1 (en) Method of and system for enterprise information asset protection through insider attack specification, monitoring and mitigation
US9635029B2 (en) Role-based access control permissions
CN103310161B (en) A kind of means of defence for Database Systems and system
CN103413088B (en) A kind of computer document operation safety auditing system
CN103413083B (en) Unit security protection system
CN101515931B (en) Method for enhancing the database security based on agent way
Gerić et al. Information system security threats classifications
CN103442354A (en) Mobile-police-terminal safety management and control system
CN103188105A (en) Safety enhancing system and method thereof of NAS equipment
CN102195991A (en) Terminal security management and authentication method and system
CN103530559A (en) Integrity protection system of Android system
CN109976239B (en) Industrial control system terminal safety protection system
CN105430000A (en) Cloud computing security management system
CN109995796B (en) Industrial control system terminal safety protection method
US20200394342A1 (en) System and method for administering physical security access to components of a process control system
CN102143168A (en) Linux platform-based server safety performance real-time monitoring method and system
CN108200073B (en) Sensitive data safety protection system
CN103618613A (en) Network access control system
CN107465688B (en) Method for identifying network application permission of state monitoring and evaluating system
CN108388779A (en) A kind of Portable Automatic stamper machine and management system and its management control method
Braband What's Security Level got to do with Safety Integrity Level?

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Li Yonghu

Inventor before: Cai Lin

Inventor before: Cai Wandong

Inventor after: Li Yonghu

Inventor before: Cai Lin

Inventor before: Cai Wandong

TR01 Transfer of patent right

Effective date of registration: 20171013

Address after: Room 3, building 60, Yan Yan Road, Chengxi District, Qinghai, Xining, 810000, China

Patentee after: Xining wiscom Electronics Co. Ltd.

Address before: 710072 Xi'an friendship West Road, Shaanxi, No. 127

Patentee before: Northwestern Polytechnical University

Effective date of registration: 20171013

Address after: Room 3, building 60, Yan Yan Road, Chengxi District, Qinghai, Xining, 810000, China

Patentee after: Xining wiscom Electronics Co. Ltd.

Address before: 710072 Xi'an friendship West Road, Shaanxi, No. 127

Patentee before: Northwestern Polytechnical University

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20161228

Termination date: 20190827