CN103607433B - A kind of method and device in terminal deployment file in batches - Google Patents

A kind of method and device in terminal deployment file in batches Download PDF

Info

Publication number
CN103607433B
CN103607433B CN201310535267.6A CN201310535267A CN103607433B CN 103607433 B CN103607433 B CN 103607433B CN 201310535267 A CN201310535267 A CN 201310535267A CN 103607433 B CN103607433 B CN 103607433B
Authority
CN
China
Prior art keywords
file
server
attribute information
unique mark
occurrence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310535267.6A
Other languages
Chinese (zh)
Other versions
CN103607433A (en
Inventor
温铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qax Technology Group Inc
Original Assignee
Beijing Qianxin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qianxin Technology Co Ltd filed Critical Beijing Qianxin Technology Co Ltd
Priority to CN201310535267.6A priority Critical patent/CN103607433B/en
Publication of CN103607433A publication Critical patent/CN103607433A/en
Application granted granted Critical
Publication of CN103607433B publication Critical patent/CN103607433B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of method and device in terminal deployment file in batches, the terminal and server communication, the server storage have the blacklist and white list of file attribute information, and the method includes:Server is determined when time target terminal of progress file identification;The target terminal is one or more;The server receives the file attribute information that the target terminal uploads, and the file attribute information includes file unique mark;The server judge received file unique mark whether with the blacklist and white list of existing file attribute information there are occurrence, if nothing, the file unique mark according to the no occurrence judges whether corresponding file legal;If so, then the file attribute information is added to the white list by the server;If it is not, then the file attribute information is added to the blacklist by the server.The present invention reduces the repeat step of identical flow to reduce deployment time.

Description

A kind of method and device in terminal deployment file in batches
Technical field
The present invention relates to the communications field, and in particular to a kind of method in terminal deployment file in batches, and, one kind is at end Hold the device of deployment file in batches.
Background technology
According to the difference of cloud computing service property, cloud computing can be divided into public cloud, private clound and mixed cloud.Someone Think, public cloud deployment possesses more preferable flexibility and scalability, what someone then thought private cloud more safety and was easy to Control.For enterprise, particularly for large enterprise, the data related with business are its lifelines, are to be taken office The threat of what form, and private clound is used alone and builds for enterprise or other clients, it is thus possible to data, security With the most effective control of offer of service quality.Enterprise possesses infrastructure, can in this infrastructure disposing application program it is real Now to the deployment of the terminal under private clound.In practical applications, private clound can be deployed in the fire wall of enterprise data center, It can will be deployed in the hosting place of a safety.
In the concrete realization, the deployment of private clound refers to the electricity in a whole set of software deployment to enterprise network by private clound On brain, and by adjusting with the process that reaches and can use is postponed, in simple terms in three steps:1)Deployment services device end software Onto server computer;2)Terminal software is disposed to terminal computer;3)Fileinfo is collected in server and is built privately owned white List storehouse.
But the deployment process of private clound is slow in the prior art, the recognition efficiency of fileinfo is low, and rate of false alarm is high, portion It is complicated to affix one's name to flow, adds that deployment is time-consuming, and during deployment can not effective monitoring terminal file, in terminal document In the case of enormous amount, when examining fileinfo, easily there is maloperation, the file quilt disposed cannot be entered by allowing Misinformate into server white list storehouse, causing the Information Security of enterprise's private clound reduces.
The content of the invention
In view of the above problems, it is proposed that the present invention overcomes the above problem in order to provide one kind or solves at least in part State a kind of in the terminal method of deployment file and a kind of corresponding device in terminal deployment file in batches in batches of problem.
According to one aspect of the present invention, there is provided a kind of method in terminal deployment file in batches, the terminal and clothes Business device communication, the server storage have the blacklist and white list of file attribute information, and the method includes:
Server is determined when time target terminal of progress file identification;The target terminal is one or more;
The server receives the file attribute information that the target terminal uploads, and the file attribute information includes file Unique mark;
The server judge received file unique mark whether with the blacklist of existing file attribute information and White list is there are occurrence, if nothing, the file unique mark according to the no occurrence judges whether corresponding file is legal;
If so, then the file attribute information is added to the white list by the server;
If it is not, then the file attribute information is added to the blacklist by the server.
Alternatively, the file attribute information further includes alternative document attribute;The file according to the no occurrence The step whether unique mark judges corresponding file legal includes:
The server receives other texts corresponding to the file unique mark without occurrence that the target terminal uploads Part attribute;
The server judges whether corresponding file is legal according to the file unique mark and other file attributes.
Alternatively, the server is associated with publicly-owned server, and the publicly-owned server storage has file attribute information Blacklist and white list, the server judge whether corresponding file is legal according to the file unique mark of the no occurrence The step of include:
The server extracts the file unique mark from the file attribute information;
The server judge the file unique mark whether the blacklist with the file attribute information of publicly-owned server And there are occurrence for white list;
If the white list of the file attribute information of the file unique mark and publicly-owned server is there are occurrence, described Server judges that the corresponding file of the file unique mark is legal;
If the blacklist of the file attribute information of the file unique mark and publicly-owned server is there are occurrence, described Server judges that the corresponding file of the file unique mark is illegal.
Alternatively, the method further includes:
The server allows the legitimate files to be run in the target terminal;
The server forbids the illegal file to be run in the target terminal.
Alternatively, it is public to include file digital signature information, file size, file name, file for the alternative document attribute The device name of equipment where taking charge of title, file.
According to another aspect of the present invention, there is provided a kind of method in terminal deployment file in batches, the terminal with Server communication, the server storage have the blacklist and white list of file attribute information, and the method includes:
Target terminal receives the notice of the carry out file identification of server transmission;
The file attribute information that the target terminal is uploaded according to the notice, the file attribute information include file only One mark;The server be used to judging received file unique mark whether the blacklist with existing file attribute information And white list, there are occurrence, if nothing, the file unique mark according to the no occurrence judges whether corresponding file closes Method;If so, the file attribute information is then added to the white list;If it is not, then the file attribute information is added to The blacklist.
Alternatively, the file attribute information further includes alternative document attribute;The target terminal is according in the notice The step of file attribute information of biography, includes:
The alternative document attribute corresponding to the file unique mark without occurrence that the target terminal uploads is to the clothes Business device;The server is used to judge whether corresponding file is legal according to the file unique mark and other file attributes.
According to another aspect of the present invention, there is provided a kind of device in terminal deployment file in batches, the terminal with Server communication, the server storage have the blacklist and white list of file attribute information, and the device includes:
Positioned at the determining module of server, it is adapted to determine that when time target terminal of progress file identification;The target terminal For one or more;
Positioned at the receiving module of server, suitable for receiving the file attribute information that the target terminal uploads, the file Attribute information includes file unique mark;
Positioned at the matching module of server, suitable for judge received file unique mark whether with existing file attribute The blacklist and white list of information are there are occurrence, if nothing, the file unique mark according to the no occurrence judges to correspond to File it is whether legal;If so, then calling positioned at server plus white module, mould is blackened positioned at server if it is not, then calling Block;
Add white module positioned at server, suitable for the file attribute information is added to the white list;
Module is blackened positioned at server, suitable for the file attribute information is added to the blacklist.
Alternatively, the file attribute information further includes alternative document attribute;The matching module bag positioned at server Include:
Positioned at the receiving submodule of server, the file without occurrence uploaded suitable for receiving the target terminal is uniquely marked Know corresponding alternative document attribute;
Positioned at the validity judgement submodule of server, suitable for sentencing according to the file unique mark and other file attributes Whether the corresponding file that breaks is legal.
Alternatively, the server is associated with publicly-owned server, and the publicly-owned server storage has file attribute information Blacklist and white list, the matching module positioned at server include:
Positioned at the extracting sub-module of server, suitable for extracting the file unique mark from the file attribute information;
Positioned at the mark judging submodule of server, suitable for judge the file unique mark whether with publicly-owned server There are occurrence for the blacklist and white list of file attribute information;If the file unique mark and the file category of publicly-owned server Property information white list there are occurrence, then the legal decision sub-module positioned at server is called, if the file unique mark Blacklist with the file attribute information of publicly-owned server then calls there are occurrence and judges submodule positioned at the illegal of server Block;
Positioned at the legal decision sub-module of server, it is adapted to determine that the corresponding file of the file unique mark is legal;
Positioned at the illegal decision sub-module of server, it is adapted to determine that the corresponding file of the file unique mark is illegal.
Alternatively, the device further includes:
Operation positioned at server allows module, is adapted to allow for the legitimate files to be run in the target terminal;
Positioned at the operation disabled module of server, suitable for forbidding the illegal file to be run in the target terminal.
Alternatively, it is public to include file digital signature information, file size, file name, file for the alternative document attribute The device name of equipment where taking charge of title, file.
According to another aspect of the present invention, there is provided a kind of device in terminal deployment file in batches, the terminal with Server communication, the server storage have the blacklist and white list of file attribute information, and the device includes:
Positioned at the receiving module of target terminal, suitable for receiving the notice of the carry out file identification of server transmission;
Positioned at the uploading module of target terminal, suitable for the file attribute information uploaded according to the notice, the file category Property information includes file unique mark;The server be used to judging received file unique mark whether with existing file The blacklist and white list of attribute information are there are occurrence, if nothing, the file unique mark according to the no occurrence judges Whether corresponding file is legal;If so, the file attribute information is then added to the white list;If it is not, then by the text Part attribute information is added to the blacklist.
Alternatively, the file attribute information further includes alternative document attribute;The uploading module includes:
Alternative document attribute positioned at target terminal uploads submodule, suitable for the file unique mark without occurrence of upload Corresponding alternative document attribute is to the server;The server is used for according to the file unique mark and alternative document Whether the corresponding file of determined property is legal.
A kind of method and device in terminal deployment file in batches according to the present invention, server division enter the end of deployment Hold batch, the terminal of present lot is uploaded in the file attribute information locally scanned to server, and server is by this document attribute Information is matched with the blacklist and white list of existing file attribute information, if finding, the terminal in former batches uploads Identical file attribute information has been categorized into corresponding list, then can directly determine that this document attribute information corresponds to text Part it is whether legal because the file attribute information of the terminal of present lot is in former batches of terminal-baseds, quantity Less, the whether legal of these file attribute information respective files more accurately and quickly judged, therefore deployment can be accelerated Speed, simplifies deployment flow, thus solves during deployment, it is necessary to which identical file category to be audited of classifying is repeated several times Property information, causes waste of time, the repetition of flow, the problem of adding deployment time, and the embodiment of the present invention passes through in batches The mode of deployment file, achieving reduces deployment time, reduces the repeat step of identical flow, accelerates the beneficial effect of deployment speed Fruit.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this area Technical staff will be clear understanding.Attached drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole attached drawing, identical component is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows according to an embodiment of the invention a kind of in the terminal embodiment of the method one of deployment file in batches Flow chart of steps;
Fig. 2 shows according to an embodiment of the invention a kind of in the terminal embodiment of the method two of deployment file in batches Flow chart of steps;
Fig. 3 shows the schematic diagram that a kind of terminal of one embodiment of the invention is disposed in batches;
Fig. 4 shows according to an embodiment of the invention a kind of in the terminal embodiment of the method three of deployment file in batches Flow chart of steps;
Fig. 5 shows according to an embodiment of the invention a kind of in the terminal device embodiment one of deployment file in batches Structure diagram;
Fig. 6 shows according to an embodiment of the invention a kind of in the terminal device embodiment two of deployment file in batches Structure diagram.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
With reference to Fig. 1, a kind of step flow in the terminal embodiment of the method one of deployment file in batches of the present invention is shown Figure, the terminal can be stored with the blacklist and white list of file attribute information with server communication, the server, Specifically it may include steps of:
Step 101, server is determined when time target terminal of progress file identification;The target terminal is one or more It is a;
In the concrete realization, using having one or more servers in the network of cloud computing, and, it is one or more with The terminal that server communicates.
In embodiments of the present invention, server can set the terminal of given batch to enter deployment mode, and other-end is then Other operating modes are may be at, server can divide in batches according to the priority and significance level of all target terminals The batch of deployment.
It should be noted that the servicing property based on cloud computing, for a user, such as enterprise customer, due to the use of Private clound more safety and the control being easy to, therefore private clound would generally be selected, certainly, examined in practice based on otherwise Consider, public cloud, or mixed cloud etc. can also be selected, the embodiment of the present invention is not restricted this.
Step 102, the server receives the file attribute information that the target terminal uploads, the file attribute information It can include file unique mark;
In embodiments of the present invention, calculation document unique mark is carried out preferably using MD5 algorithms.MD5(Md5-challenge 5, Message-Digest Algorithm5), it is a kind of one of widely used hash algorithm, data operation is another by it Fixed-length value, by Information Compression into a kind of form of secrecy.MD5 has the characteristics that collision rate is low, and text is calculated using MD5 algorithms Part unique mark, can effectively prevent the repetition and collision of file identification.
Certainly, in practical applications, MD5 algorithms are not limited to, those skilled in the art are also an option that other appropriate calculations Method generates file unique mark.
Step 103, the server judge received file unique mark whether with existing file attribute information Blacklist and white list are there are occurrence, if nothing, the file unique mark according to the no occurrence judges corresponding file It is whether legal;If so, then perform step 104;If it is not, then perform step 105;
Server can file for reference according to blacklist and white list of the file unique mark in local existing file attribute information Inquiry whether there is occurrence, if it is present the file corresponding to explanation this document unique mark in former batches of terminals with uploading File attribute information it is identical, that is, this document attribute information be accordingly added to file attribute information blacklist and In white list, then woth no need to repeat identical step, first result can be directly referred to;If it does not, or want Further determine that the security of this document attribute information, further can also judge file attribute information using the step of other Whether corresponding file is legal.
In one preferred embodiment of the invention, the server can be associated with publicly-owned server, the publicly-owned clothes Business device can be stored with the blacklist and white list of file attribute information, the step 103, the i.e. text according to the no occurrence Part unique mark judges that the whether legal step of corresponding file can include following sub-step:
Sub-step S11, the server extract the file unique mark from the file attribute information;
Sub-step S12, the server judge whether the file unique mark is believed with the file attribute of publicly-owned server There are occurrence for the blacklist and white list of breath;If the file unique mark is white with the file attribute information of publicly-owned server List then performs sub-step S13, if the file unique mark and the file attribute information of publicly-owned server there are occurrence Blacklist then performs sub-step S14 there are occurrence;
Sub-step S13, the server judge that the corresponding file of the file unique mark is legal;
Sub-step S14, the server judge that the corresponding file of the file unique mark is illegal.
The present invention concrete application a kind of example in, server with and publicly-owned server carry out http communications, service File unique mark is sent to publicly-owned server and goes to inquire about by device, and this document can be returned after publicly-owned server lookup and is uniquely marked Knowledge whether there is can foundation in the blacklist of the file attribute information in public server or the query result of white list, server Query result, can also be shown to private clound console and be looked into for administrator by the query result foundation legal as file is judged See.
Step 104, the file attribute information is added to the white list by the server;
Step 105, the file attribute information is added to the blacklist by the server.
In the concrete realization, can if the query result in public server is to be present in the white list of publicly-owned server It is legal to judge to change file attribute information, then this document attribute information can be added in white list;If conversely, serviced in public affairs The query result of device is to be present in the blacklist of publicly-owned server, judges that file attribute information is illegal, then can be by this document Attribute information is added in blacklist.
In practical applications, when the target terminal limited amount of secondary progress file identification, file attribute information to be audited Quantity it is relatively fewer, server is not easy maloperation occur.In addition, by controlling the terminal disposed to limit file in batches Source, the file for preventing some terminals for not allowing access into deployment mode are arrived the white list of server by misinformation, ensure that network The safety of middle data.
With reference to Fig. 2, a kind of step flow in the terminal embodiment of the method two of deployment file in batches of the present invention is shown Figure, the terminal can be stored with the blacklist and white list of file attribute information with server communication, the server, Specifically it may include steps of:
Step 201, server is determined when time target terminal of progress file identification;The target terminal is one or more It is a;
Step 202, the server receives the file attribute information that the target terminal uploads, the file attribute information Including file unique mark;
Step 203, the server judge received file unique mark whether with existing file attribute information Blacklist and white list, if nothing, perform step 204 there are occurrence;
Step 204, the server is received corresponding to the file unique mark without occurrence that the target terminal uploads Alternative document attribute;
In the concrete realization, server storage has the blacklist and white list of file attribute information, if finding what is received Blacklist and white list occurrence of the file unique mark with server storage with the presence of file attribute information, then server can To return to the attribute information of these file unique marks immediately to target terminal, server would not receive there are file only The alternative document attribute of one mark.Since the file that next batch carries out the terminal of file identification is in last batch terminal-based It is upper increased, if the attribute information of most of file unique mark has existed, so needing the file attribute information audited Quantity is less, and user can more accurately and quickly sort out file to be audited into the white list and blacklist, deployment Speed can be greatly speeded up.
Step 205, the server judges that corresponding file is according to the file unique mark and other file attributes It is no legal;
In the concrete realization, server the whether legal of respective file can also be determined according to alternative document attribute.Example Such as, if consideration of the certain user based on data safety, the software of some enterprise developments may be forbidden, or be not oneself exploitation Software operation, the alternative document attribute corresponding to the passable file unique mark of server, which is done, to be determined whether. In a preferred embodiment of the present invention, the alternative document attribute can include file digital signature information, file size, text The device name of equipment where part title, file Business Name, file.Such as server can be believed according to the digital signature of file Breath and file Business Name determine that this document is to belong to certain enterprise, it may be considered that this document attribute information is illegal.
Step 206, the server allows the legitimate files to be run in the target terminal;
Step 207, the server forbids the illegal file to be run in the target terminal;
In practical applications, if the server determine that the corresponding file of file attribute information is legal, then this article can be allowed Part is in terminal operating;If the server determine that the corresponding file of file attribute information is illegal, the consideration based on secure data area, Then this document can be forbidden to delete this document in terminal operating, or prompt terminal.
Step 208, the file attribute information is added to the white list by the server;
Step 209, the file attribute information is added to the blacklist by the server.
In order to make those skilled in the art further appreciate that the embodiment of the present invention, below using a specific example for The bright present invention disposes the process of terminal in batches.
The schematic diagram that a kind of terminal of the invention with reference to shown in Fig. 3 is disposed in batches, terminal realize the process disposed in batches The following steps can specifically be included:
Step 1:Server sets the terminal specified to enter deployment mode, which enters deployment mode for first Terminal, other-end then may be at other operating modes.
After server has obtained all files attribute information of first terminal for entering deployment mode, by these texts Part attribute information is sent to the server lookup security of public cloud associated with it, or can be by server by these files Attribute information is accordingly added in blacklist or white list, then first terminal can all be withdrawn from deployment mode.
Step 2:Second batch is set first to go up transmitting file into the terminal of deployment mode, second batch terminal according still further to step 1 Unique mark, if it find that being already present in blacklist or white list, then can be not required terminal to repeat upper transmitting file unique The corresponding alternative document attribute of mark, file attribute letter is not uploaded since second batch terminal can only upload first terminal For breath so quantity is less, server can more accurately and quickly judge these file securities, accelerate deployment speed.
Terminal document in deployment mode process can more accurately be controlled by above-mentioned step, prevention is some cannot be into The file for entering the machine of deployment mode arrives server white list by misinformation, greatly improves the security of data.
With reference to Fig. 4, show that a kind of method in terminal deployment file in batches according to an embodiment of the invention is implemented The step flow chart of example three, the terminal can be stored with file attribute information with server communication, the server Blacklist and white list, specifically may include steps of:
Step 301, target terminal receives the notice of the carry out file identification of server transmission;
Step 302, the file attribute information that the target terminal is uploaded according to the notice, the file attribute information bag Include file unique mark;The server be used to judging received file unique mark whether with existing file attribute information Blacklist and white list there are occurrence, if nothing, the file unique mark according to the no occurrence judges corresponding text Whether part is legal;If so, the file attribute information is then added to the white list;If it is not, then the file attribute is believed Breath is added to the blacklist.
In one preferred embodiment of the invention, the file attribute information can also include alternative document attribute;Institute Following sub-step can be included by stating step 302:
Sub-step S33, the alternative document category corresponding to the file unique mark without occurrence that the target terminal uploads Property is to the server;The server is used to judge corresponding file according to the file unique mark and other file attributes It is whether legal.
In embodiments of the present invention, when target terminal receives the notice of server transmission, into deployment mode, receive Server is it according to specified client software object, then is scanned using the client software object in the present invention, will File attribute information, which uploads, refers to server authentication its legitimacy.
Specifically, file attribute information includes file unique mark, and server can be checked after receiving in local black name Whether there are this document unique mark in list and white list, if so, it is identical to illustrate that former batches of terminals are transmitted through on File attribute information, then target terminal can only upload alternative document attribute in addition to this document unique mark, due to text The quantity of part attribute information is reduced, and the operating rate of server will greatly be accelerated, and the progress entirely disposed can also be accelerated therewith.
For embodiment of the method, in order to be briefly described, therefore it is all expressed as to a series of combination of actions, but this area Technical staff should know, the embodiment of the present invention and from the limitation of described sequence of movement, because implementing according to the present invention Example, some steps can use other orders or be carried out at the same time.Secondly, those skilled in the art should also know, specification Described in embodiment belong to preferred embodiment, necessary to the involved action not necessarily embodiment of the present invention.
With reference to Fig. 5, show that a kind of device in terminal deployment file in batches according to an embodiment of the invention is implemented The structure diagram of example one, the terminal can be stored with the black of file attribute information with server communication, the server List and white list, can specifically include following module:
Positioned at the determining module 401 of server, it is adapted to determine that when time target terminal of progress file identification;The target is whole Hold as one or more;
Positioned at the receiving module 402 of server, suitable for receiving the file attribute information that the target terminal uploads, the text Part attribute information includes file unique mark;
Positioned at the matching module 403 of server, suitable for judge received file unique mark whether with existing file The blacklist and white list of attribute information are there are occurrence, if nothing, the file unique mark according to the no occurrence judges Whether corresponding file is legal;If so, then calling adds white module positioned at server, if it is not, then calling adding positioned at server Black module;
In one preferred embodiment of the invention, the file attribute information can also include alternative document attribute;Institute Rheme can include in the matching module of server:
Positioned at the receiving submodule of server, the file without occurrence uploaded suitable for receiving the target terminal is uniquely marked Know corresponding alternative document attribute;
Positioned at the validity judgement submodule of server, suitable for sentencing according to the file unique mark and other file attributes Whether the corresponding file that breaks is legal.
In one preferred embodiment of the invention, the server can be associated with publicly-owned server, the publicly-owned clothes Business device is stored with the blacklist and white list of file attribute information, and the matching module 403 positioned at server can include:
Positioned at the extracting sub-module of server, suitable for extracting the file unique mark from the file attribute information;
Positioned at the mark judging submodule of server, suitable for judge the file unique mark whether with publicly-owned server There are occurrence for the blacklist and white list of file attribute information;If the file unique mark and the file category of publicly-owned server Property information white list there are occurrence, then the legal decision sub-module positioned at server is called, if the file unique mark Blacklist with the file attribute information of publicly-owned server then calls there are occurrence and judges submodule positioned at the illegal of server Block;
Positioned at the legal decision sub-module of server, it is adapted to determine that the corresponding file of the file unique mark is legal;
Positioned at the illegal decision sub-module of server, it is adapted to determine that the corresponding file of the file unique mark is illegal.
Add white module 404 positioned at server, suitable for the file attribute information is added to the white list;
Module 405 is blackened positioned at server, suitable for the file attribute information is added to the blacklist.
In one preferred embodiment of the invention, the device can also include:
Operation positioned at server allows module, is adapted to allow for the legitimate files to be run in the target terminal;
Positioned at the operation disabled module of server, suitable for forbidding the illegal file to be run in the target terminal.
In one preferred embodiment of the invention, the alternative document attribute includes file digital signature information, file The device name of equipment where size, file name, file Business Name, file.
With reference to Fig. 6, show that a kind of device in terminal deployment file in batches according to an embodiment of the invention is implemented The structure diagram of example two, the terminal can be stored with the black of file attribute information with server communication, the server List and white list, can specifically include following module:
Positioned at the receiving module 501 of target terminal, suitable for receiving the notice of the carry out file identification of server transmission;
Positioned at the uploading module 502 of target terminal, suitable for the file attribute information uploaded according to the notice, the file Attribute information includes file unique mark;The server be used to judging received file unique mark whether with existing text The blacklist and white list of part attribute information are there are occurrence, if nothing, the file unique mark according to the no occurrence is sentenced Whether the corresponding file that breaks is legal;If so, the file attribute information is then added to the white list;If it is not, then by described in File attribute information is added to the blacklist.
In one preferred embodiment of the invention, the file attribute information can also include alternative document attribute;Institute Rheme can include in the uploading module 502 of target terminal:
Alternative document attribute positioned at target terminal uploads submodule, suitable for the file unique mark without occurrence of upload Corresponding alternative document attribute is to the server;The server is used for according to the file unique mark and alternative document Whether the corresponding file of determined property is legal.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with teaching based on this.As described above, required by constructing this kind of system Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It should be understood that it can utilize various Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the specification that this place provides, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, Above in the description to the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The application claims of shield features more more than the feature being expressly recited in each claim.It is more precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself Separate embodiments all as the present invention.
Those skilled in the art, which are appreciated that, to carry out adaptively the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any Combination is to this specification(Including adjoint claim, summary and attached drawing)Disclosed in all features and so disclosed appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification(Including adjoint power Profit requirement, summary and attached drawing)Disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation Replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed One of meaning mode can use in any combination.
The all parts embodiment of the present invention can be with hardware realization, or to be run on one or more processor Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that it can use in practice Microprocessor or digital signal processor(DSP)To realize terminal according to embodiments of the present invention one in batches in deployment facility The some or all functions of a little or whole components.The present invention is also implemented as performing method as described herein Some or all equipment or program of device(For example, computer program and computer program product).Such realization The program of the present invention can store on a computer-readable medium, or can have the form of one or more signal.This The signal of sample can be downloaded from internet website and obtained, and either provided on carrier signal or carried in the form of any other For.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of some different elements and being come by means of properly programmed computer real It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.
A1, a kind of method in terminal deployment file in batches, the terminal and server communication, the server storage have The blacklist and white list of file attribute information, the method include:
Server is determined when time target terminal of progress file identification;The target terminal is one or more;
The server receives the file attribute information that the target terminal uploads, and the file attribute information includes file Unique mark;
The server judge received file unique mark whether with the blacklist of existing file attribute information and White list is there are occurrence, if nothing, the file unique mark according to the no occurrence judges whether corresponding file is legal;
If so, then the file attribute information is added to the white list by the server;
If it is not, then the file attribute information is added to the blacklist by the server.
A2, the method as described in claim A1, it is characterised in that the file attribute information further includes alternative document category Property;The file unique mark according to the no occurrence judges corresponding file, and whether legal step includes:
The server receives other texts corresponding to the file unique mark without occurrence that the target terminal uploads Part attribute;
The server judges whether corresponding file is legal according to the file unique mark and other file attributes.
A3, the method as described in claim A1, it is characterised in that the server is associated with publicly-owned server, described Publicly-owned server storage has the blacklist and white list of file attribute information, file of the server according to the no occurrence The step whether unique mark judges corresponding file legal includes:
The server extracts the file unique mark from the file attribute information;
The server judge the file unique mark whether the blacklist with the file attribute information of publicly-owned server And there are occurrence for white list;
If the white list of the file attribute information of the file unique mark and publicly-owned server is there are occurrence, described Server judges that the corresponding file of the file unique mark is legal;
If the blacklist of the file attribute information of the file unique mark and publicly-owned server is there are occurrence, described Server judges that the corresponding file of the file unique mark is illegal.
A4, the method as described in claim A1 or A2 or A3, it is characterised in that further include:
The server allows the legitimate files to be run in the target terminal;
The server forbids the illegal file to be run in the target terminal.
A5, the method as described in claim A1 or A2 or A3, it is characterised in that the alternative document attribute includes file The device name of equipment where digital signature information, file size, file name, file Business Name, file.
B6, a kind of method in terminal deployment file in batches, the terminal and server communication, the server storage have The blacklist and white list of file attribute information, the method include:
Target terminal receives the notice of the carry out file identification of server transmission;
The file attribute information that the target terminal is uploaded according to the notice, the file attribute information include file only One mark;The server be used to judging received file unique mark whether the blacklist with existing file attribute information And white list, there are occurrence, if nothing, the file unique mark according to the no occurrence judges whether corresponding file closes Method;If so, the file attribute information is then added to the white list;If it is not, then the file attribute information is added to The blacklist.
B7, the method as described in claim B6, it is characterised in that the file attribute information further includes alternative document category Property;The step of file attribute information that the target terminal is uploaded according to the notice, includes:
The alternative document attribute corresponding to the file unique mark without occurrence that the target terminal uploads is to the clothes Business device;The server is used to judge whether corresponding file is legal according to the file unique mark and other file attributes.
C8, a kind of device in terminal deployment file in batches, the terminal and server communication, the server storage have The blacklist and white list of file attribute information, the device include:
Positioned at the determining module of server, it is adapted to determine that when time target terminal of progress file identification;The target terminal For one or more;
Positioned at the receiving module of server, suitable for receiving the file attribute information that the target terminal uploads, the file Attribute information includes file unique mark;
Positioned at the matching module of server, suitable for judge received file unique mark whether with existing file attribute The blacklist and white list of information are there are occurrence, if nothing, the file unique mark according to the no occurrence judges to correspond to File it is whether legal;If so, then calling positioned at server plus white module, mould is blackened positioned at server if it is not, then calling Block;
Add white module positioned at server, suitable for the file attribute information is added to the white list;
Module is blackened positioned at server, suitable for the file attribute information is added to the blacklist.
C9, the device as described in claim C8, it is characterised in that the file attribute information further includes alternative document category Property;The matching module positioned at server includes:
Positioned at the receiving submodule of server, the file without occurrence uploaded suitable for receiving the target terminal is uniquely marked Know corresponding alternative document attribute;
Positioned at the validity judgement submodule of server, suitable for sentencing according to the file unique mark and other file attributes Whether the corresponding file that breaks is legal.
C10, the device as described in claim C8, it is characterised in that the server is associated with publicly-owned server, described Publicly-owned server storage has the blacklist and white list of file attribute information, and the matching module positioned at server includes:
Positioned at the extracting sub-module of server, suitable for extracting the file unique mark from the file attribute information;
Positioned at the mark judging submodule of server, suitable for judge the file unique mark whether with publicly-owned server There are occurrence for the blacklist and white list of file attribute information;If the file unique mark and the file category of publicly-owned server Property information white list there are occurrence, then the legal decision sub-module positioned at server is called, if the file unique mark Blacklist with the file attribute information of publicly-owned server then calls there are occurrence and judges submodule positioned at the illegal of server Block;
Positioned at the legal decision sub-module of server, it is adapted to determine that the corresponding file of the file unique mark is legal;
Positioned at the illegal decision sub-module of server, it is adapted to determine that the corresponding file of the file unique mark is illegal.
C11, the device as described in claim C8 or C9 or C10, it is characterised in that further include:
Operation positioned at server allows module, is adapted to allow for the legitimate files to be run in the target terminal;
Positioned at the operation disabled module of server, suitable for forbidding the illegal file to be run in the target terminal.
C12, the device as described in claim C8 or C9 or C10, it is characterised in that the alternative document attribute includes text The device name of equipment where part digital signature information, file size, file name, file Business Name, file.
D13, a kind of device in terminal deployment file in batches, the terminal and server communication, the server storage There are the blacklist and white list of file attribute information, the device includes:
Positioned at the receiving module of target terminal, suitable for receiving the notice of the carry out file identification of server transmission;
Positioned at the uploading module of target terminal, suitable for the file attribute information uploaded according to the notice, the file category Property information includes file unique mark;The server be used to judging received file unique mark whether with existing file The blacklist and white list of attribute information are there are occurrence, if nothing, the file unique mark according to the no occurrence judges Whether corresponding file is legal;If so, the file attribute information is then added to the white list;If it is not, then by the text Part attribute information is added to the blacklist.
D14, the device as described in claim D13, it is characterised in that the file attribute information further includes alternative document Attribute;The uploading module includes:
Alternative document attribute positioned at target terminal uploads submodule, suitable for the file unique mark without occurrence of upload Corresponding alternative document attribute is to the server;The server is used for according to the file unique mark and alternative document Whether the corresponding file of determined property is legal.

Claims (14)

1. a kind of method in terminal deployment file in batches, the terminal and server communication, the server storage have file The blacklist and white list of attribute information, the method include:
Priority and significance level of the server according to all target terminals, determine when time target terminal of progress file identification; The target terminal sets the one or more of given batch for server;
The server receives the file attribute information that the target terminal uploads, and it is unique that the file attribute information includes file Mark;
The server judge received file unique mark whether blacklist with existing file attribute information and white name Singly there are occurrence, if nothing, the file unique mark according to no occurrence judges whether corresponding file is legal;
If so, then the file attribute information is added to the white list by the server;
If it is not, then the file attribute information is added to the blacklist by the server.
2. the method as described in claim 1, it is characterised in that the file attribute information further includes alternative document attribute;Institute State and judge corresponding file according to the file unique mark of the no occurrence whether legal step includes:
The server receives the alternative document category corresponding to the file unique mark without occurrence that the target terminal uploads Property;
The server judges whether corresponding file is legal according to the file unique mark and other file attributes.
3. the method as described in claim 1, it is characterised in that the server is associated with publicly-owned server, the publicly-owned clothes Business device is stored with the blacklist and white list of file attribute information, and the server is uniquely marked according to the file of the no occurrence Knowledge judges corresponding file, and whether legal step includes:
The server extracts the file unique mark from the file attribute information;
The server judge the file unique mark whether with the blacklist of the file attribute information of publicly-owned server and white There are occurrence for list;
If there are occurrence, the service for the white list of the file attribute information of the file unique mark and publicly-owned server Device judges that the corresponding file of the file unique mark is legal;
If there are occurrence, the service for the blacklist of the file attribute information of the file unique mark and publicly-owned server Device judges that the corresponding file of the file unique mark is illegal.
4. method as claimed in claim 3, it is characterised in that further include:
The server allows the legitimate files to be run in the target terminal;
The server forbids the illegal file to be run in the target terminal.
5. method as claimed in claim 2, it is characterised in that the alternative document attribute include file digital signature information, The device name of equipment where file size, file name, file Business Name, file.
6. a kind of method in terminal deployment file in batches, the terminal and server communication, the server storage have file The blacklist and white list of attribute information, the method include:
Target terminal receives the notice of the carry out file identification of server transmission;Server is preferential according to all target terminals Level and significance level, determine when time target terminal of progress file identification;The target terminal sets given batch for server One or more;
The file attribute information that the target terminal is uploaded according to the notice, the file attribute information are uniquely marked including file Know;The server be used to judging received file unique mark whether with the blacklist of existing file attribute information and white List is there are occurrence, if nothing, the file unique mark according to no occurrence judges whether corresponding file is legal;If so, The file attribute information is then added to the white list;If it is not, the file attribute information is then added to the black name It is single.
7. method as claimed in claim 6, it is characterised in that the file attribute information further includes alternative document attribute;Institute The step of stating the file attribute information that target terminal is uploaded according to the notice includes:
The alternative document attribute corresponding to the file unique mark without occurrence that the target terminal uploads is to the server; The server is used to judge whether corresponding file is legal according to the file unique mark and other file attributes.
8. a kind of device in terminal deployment file in batches, the terminal and server communication, the server storage have file The blacklist and white list of attribute information, the device include:
Positioned at the determining module of server, suitable for the priority and significance level according to all target terminals, determine when time progress The target terminal of file identification;The target terminal sets the one or more of given batch for server;
Positioned at the receiving module of server, suitable for receiving the file attribute information that the target terminal uploads, the file attribute Information includes file unique mark;
Positioned at the matching module of server, suitable for judge received file unique mark whether with existing file attribute information Blacklist and white list there are occurrence, if nothing, the file unique mark according to no occurrence judges that corresponding file is It is no legal;If so, then calling positioned at server plus white module, module is blackened positioned at server if it is not, then calling;
Add white module positioned at server, suitable for the file attribute information is added to the white list;
Module is blackened positioned at server, suitable for the file attribute information is added to the blacklist.
9. device as claimed in claim 8, it is characterised in that the file attribute information further includes alternative document attribute;Institute Rheme includes in the matching module of server:
Positioned at the receiving submodule of server, suitable for receiving the file unique mark institute without occurrence that the target terminal uploads Corresponding alternative document attribute;
Positioned at the validity judgement submodule of server, suitable for according to the file unique mark and the judgement pair of other file attributes Whether the file answered is legal.
10. device as claimed in claim 8, it is characterised in that the server is associated with publicly-owned server, the publicly-owned clothes Business device is stored with the blacklist and white list of file attribute information, and the matching module positioned at server includes:
Positioned at the extracting sub-module of server, suitable for extracting the file unique mark from the file attribute information;
Positioned at the mark judging submodule of server, suitable for judge the file unique mark whether the file with publicly-owned server There are occurrence for the blacklist and white list of attribute information;If the file unique mark and the file attribute of publicly-owned server are believed The white list of breath then calls the legal decision sub-module positioned at server, if the file unique mark and public affairs there are occurrence With the presence of the blacklist occurrence of the file attribute information of server, then the illegal decision sub-module positioned at server is called;
Positioned at the legal decision sub-module of server, it is adapted to determine that the corresponding file of the file unique mark is legal;
Positioned at the illegal decision sub-module of server, it is adapted to determine that the corresponding file of the file unique mark is illegal.
11. device as claimed in claim 10, it is characterised in that further include:
Operation positioned at server allows module, is adapted to allow for the legitimate files to be run in the target terminal;
Positioned at the operation disabled module of server, suitable for forbidding the illegal file to be run in the target terminal.
12. device as claimed in claim 9, it is characterised in that the alternative document attribute include file digital signature information, The device name of equipment where file size, file name, file Business Name, file.
13. a kind of device in terminal deployment file in batches, the terminal and server communication, the server storage have file The blacklist and white list of attribute information, the device include:
Positioned at the receiving module of target terminal, suitable for receiving the notice of the carry out file identification of server transmission;Server according to According to the priority and significance level of all target terminals, determine when time target terminal of progress file identification;The target terminal The one or more of given batch is set for server;
Positioned at the uploading module of target terminal, suitable for the file attribute information uploaded according to the notice, the file attribute letter Breath includes file unique mark;The server be used to judging received file unique mark whether with existing file attribute The blacklist and white list of information are there are occurrence, if nothing, the file unique mark according to no occurrence judges corresponding text Whether part is legal;If so, the file attribute information is then added to the white list;If it is not, then the file attribute is believed Breath is added to the blacklist.
14. device as claimed in claim 13, it is characterised in that the file attribute information further includes alternative document attribute; The uploading module includes:
Alternative document attribute positioned at target terminal uploads submodule, right suitable for the institute of the file unique mark without occurrence of upload The alternative document attribute answered is to the server;The server is used for according to the file unique mark and other file attributes Judge whether corresponding file is legal.
CN201310535267.6A 2013-11-01 2013-11-01 A kind of method and device in terminal deployment file in batches Active CN103607433B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310535267.6A CN103607433B (en) 2013-11-01 2013-11-01 A kind of method and device in terminal deployment file in batches

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310535267.6A CN103607433B (en) 2013-11-01 2013-11-01 A kind of method and device in terminal deployment file in batches

Publications (2)

Publication Number Publication Date
CN103607433A CN103607433A (en) 2014-02-26
CN103607433B true CN103607433B (en) 2018-05-04

Family

ID=50125633

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310535267.6A Active CN103607433B (en) 2013-11-01 2013-11-01 A kind of method and device in terminal deployment file in batches

Country Status (1)

Country Link
CN (1) CN103607433B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104052807B (en) * 2014-06-13 2018-05-08 珠海市君天电子科技有限公司 A kind of information processing method and device based on high in the clouds
CN104243604A (en) * 2014-09-28 2014-12-24 北京奇虎科技有限公司 File disabling method and device
CN104243214B (en) * 2014-09-28 2019-11-26 奇安信科技集团股份有限公司 Data processing method, device and system
CN105897685A (en) * 2015-12-15 2016-08-24 乐视网信息技术(北京)股份有限公司 File validity determining method and system
CN109213494A (en) * 2018-08-03 2019-01-15 北京奇安信科技有限公司 A kind of processing method and processing device of automatic deployment cluster test host

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750463A (en) * 2011-12-16 2012-10-24 北京安天电子设备有限公司 System and method for improving file rescanning speed
WO2013016584A1 (en) * 2011-07-26 2013-01-31 Nebula, Inc. Systems and methods for implementing cloud computing
CN102982121A (en) * 2012-11-12 2013-03-20 北京奇虎科技有限公司 File scanning method and file scanning device and file detecting system
CN102984135A (en) * 2012-11-12 2013-03-20 北京奇虎科技有限公司 Security defense method and device and system
CN103023882A (en) * 2012-11-26 2013-04-03 北京奇虎科技有限公司 Method and system for judging data security
CN103023884A (en) * 2012-11-26 2013-04-03 北京奇虎科技有限公司 Security data processing method and system
CN103023885A (en) * 2012-11-26 2013-04-03 北京奇虎科技有限公司 Security data processing method and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102945348B (en) * 2012-10-19 2016-08-03 北京奇虎科技有限公司 Fileinfo collection method and device
CN103020520B (en) * 2012-11-26 2017-02-08 北京奇安信科技有限公司 Enterprise-based document security detection method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013016584A1 (en) * 2011-07-26 2013-01-31 Nebula, Inc. Systems and methods for implementing cloud computing
CN102750463A (en) * 2011-12-16 2012-10-24 北京安天电子设备有限公司 System and method for improving file rescanning speed
CN102982121A (en) * 2012-11-12 2013-03-20 北京奇虎科技有限公司 File scanning method and file scanning device and file detecting system
CN102984135A (en) * 2012-11-12 2013-03-20 北京奇虎科技有限公司 Security defense method and device and system
CN103023882A (en) * 2012-11-26 2013-04-03 北京奇虎科技有限公司 Method and system for judging data security
CN103023884A (en) * 2012-11-26 2013-04-03 北京奇虎科技有限公司 Security data processing method and system
CN103023885A (en) * 2012-11-26 2013-04-03 北京奇虎科技有限公司 Security data processing method and system

Also Published As

Publication number Publication date
CN103607433A (en) 2014-02-26

Similar Documents

Publication Publication Date Title
US20200412767A1 (en) Hybrid system for the protection and secure data transportation of convergent operational technology and informational technology networks
CN103607433B (en) A kind of method and device in terminal deployment file in batches
EP2532136B1 (en) System and method for risk rating and detecting redirection activities
US9858626B2 (en) Social sharing of security information in a group
CN102687480B (en) Based on firewall system and the service of cloud
US20200127976A1 (en) Network security system with enhanced traffic analysis based on feedback loop
AU2016354668A1 (en) A distributed user profile identity verification system for e-commerce transaction security
CN104396220A (en) Method and device for secure content retrieval
CN109088909B (en) Service gray level publishing method and device based on merchant type
CN102315952A (en) Method and device for detecting junk posts in community network
CN104010064B (en) The method and device for searching number of networking
CN109359250A (en) Uniform resource locator processing method, device, server and readable storage medium storing program for executing
CN105550593A (en) Cloud disk file monitoring method and device based on local area network
CN105100048B (en) WiFi network secure authentication method, server, client terminal device and system
CN112995357B (en) Domain name management method, device, medium and electronic equipment based on cloud hosting service
EP3332533B1 (en) Parallel detection of updates to a domain name system record system using a common filter
CN108683631B (en) Method and system for preventing scanning of authority file
US10078750B1 (en) Methods and systems for finding compromised social networking accounts
US10474810B2 (en) Controlling access to web resources
CN104021338A (en) Method, device and system for startup item detection
US9621582B1 (en) Generating pharming alerts with reduced false positives
CN109214182A (en) To the processing method for extorting software in virtual machine operation under cloud platform
CN113268765B (en) Credential detection method, system, electronic device and storage medium
US20230091440A1 (en) A method and a system for identifying a security breach or a data theft
US11805138B2 (en) Data loss prevention on images

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20161228

Address after: 100015 Chaoyang District Road, Jiuxianqiao, No. 10, building No. 3, floor 15, floor 17, 1701-26,

Applicant after: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Applicant before: Qizhi software (Beijing) Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100015 15, 17 floor 1701-26, 3 building, 10 Jiuxianqiao Road, Chaoyang District, Beijing.

Patentee after: QAX Technology Group Inc.

Address before: 100015 15, 17 floor 1701-26, 3 building, 10 Jiuxianqiao Road, Chaoyang District, Beijing.

Patentee before: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder