CN104091119B - The guard method of a kind of mobile terminal and its data, protection system - Google Patents

The guard method of a kind of mobile terminal and its data, protection system Download PDF

Info

Publication number
CN104091119B
CN104091119B CN201410242670.4A CN201410242670A CN104091119B CN 104091119 B CN104091119 B CN 104091119B CN 201410242670 A CN201410242670 A CN 201410242670A CN 104091119 B CN104091119 B CN 104091119B
Authority
CN
China
Prior art keywords
screen
mobile terminal
lock
password file
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410242670.4A
Other languages
Chinese (zh)
Other versions
CN104091119A (en
Inventor
王亚军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Taiyu information technology Limited by Share Ltd
Original Assignee
Tian Long Electronic Science And Technology Co Ltd Of Jiangsu Province
Shenzhen Tinno Wireless Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tian Long Electronic Science And Technology Co Ltd Of Jiangsu Province, Shenzhen Tinno Wireless Technology Co Ltd filed Critical Tian Long Electronic Science And Technology Co Ltd Of Jiangsu Province
Priority to CN201410242670.4A priority Critical patent/CN104091119B/en
Publication of CN104091119A publication Critical patent/CN104091119A/en
Application granted granted Critical
Publication of CN104091119B publication Critical patent/CN104091119B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The invention discloses the guard method of a kind of mobile terminal and its data, protection system, methods described is included in when detecting the operational motion to screen-lock password file, judges whether screen is in the lock state;When judging that the screen is in the lock state, the user data of mobile terminal is protected according to default safeguard measure.By the above-mentioned means, the present invention can prevent the user data of mobile terminal from leaking, the safety of user data is effectively protected.

Description

The guard method of a kind of mobile terminal and its data, protection system
Technical field
The present invention relates to communication terminal technology field, a kind of guard method more particularly to mobile terminal and its data, Protection system.
Background technology
With the fast development of smart mobile phone, the function of smart mobile phone is more and more, gradually replaces non-smart mobile phone And as the main flow in communicating terminal market, attract more consumers to buy.At present, the function of smart mobile phone gradually becomes To in the function achieved by PC, the application field that this allows for smart mobile phone is more and more extensive, such as user is usual The mail transmission/reception of routine work, shopping of surfing the Net, shooting etc. can be carried out using smart mobile phone, this allows for being stored with smart mobile phone Substantial amounts of user's significant data, and these data are once illegally accessed or leaked, it is likely that great damage can be brought to user Lose, cause negative consequence.
Existing smart mobile phone generally all has screen locking function, and user can select the mode that gesture unlocks or password unlocks Screen is locked, i.e., local user can set the unlocking pin or unblock gesture of the screen only known in person, enter To need to input correct unlocking pin or unblock gesture during the desktop for entering smart mobile phone can enter, and prevent from illegally using whereby Family enters smart mobile phone desktop, and then obtains the data of the inside, protects secure user data to a certain extent.
However, the cryptogam of the encryption of gesture unblock or password unblock can be deleted by violence, disabled user exists Can not be by being unlocked to screen after acquisition mobile phone, but the cryptogam is directly deleted, after cryptogam is deleted Disabled user can be directly entered the desktop of mobile phone, and thus the personal data of local user are just possible to be compromised, user Personal data face safe threat.
The content of the invention
The present invention solves the technical problem of guard method, the protection system for providing a kind of mobile terminal and its data System, can prevent the user data of mobile terminal from leaking, and effectively protect the safety of user data.
In order to solve the above technical problems, one aspect of the present invention is:A kind of mobile terminal data is provided Guard method, it is included in when detecting the operational motion to screen-lock password file, judges whether screen is in the lock state;When sentencing When the screen that breaks is in the lock state, the user data of mobile terminal is protected according to default safeguard measure.
Wherein, the step of default safeguard measure of the basis is protected to the user data of mobile terminal includes:Make shifting Dynamic terminal factory reset, to delete the user data of the mobile terminal.
Wherein, it is described when detecting the operational motion to screen-lock password file, judge whether screen is in the lock state The step of include:The change of the screen-lock password file is monitored by file change informing mechanism, the screen locking is close when monitoring When code file changes, the operational motion to the screen-lock password file is as detected;Judge screen whether in locking State.
Wherein, it is described the screen-lock password file is monitored by file change informing mechanism change the step of include:It is logical That crosses the file change informing mechanism monitoring screen-lock password file is deleted or modified event, literary when monitoring the screen-lock password When event is deleted or modified in part, the screen-lock password file changes.
Wherein, it is described to judge that the step of whether screen is in the lock state includes:Judge the kernel institute of the mobile terminal The mark of the record mobile terminal released state of setting is that screen is in the lock state or screen is in released state.
In order to solve the above technical problems, another technical solution used in the present invention is:A kind of mobile terminal data is provided Protection system, including:Judge module, for when detecting the operational motion to screen-lock password file, whether judging screen It is in the lock state;Processing module, for when judging that the screen is in the lock state, according to default safeguard measure to movement The user data of terminal is protected.
Wherein, the processing module is used to make mobile terminal factory reset, to delete the user of the mobile terminal Data.
Wherein, the judge module includes:Monitoring unit, it is close for monitoring the screen locking by file change informing mechanism The change of code file, when monitoring the screen-lock password file and changing, is as detected to the screen-lock password file Operational motion;Judging unit, for judging whether screen is in the lock state.
Wherein, the monitoring unit be used for by file change informing mechanism monitor the screen-lock password file deletion or Modification event, when monitoring the screen-lock password file event being deleted or modified, the screen-lock password file becomes Change;The judging unit is used to judge that the mark of the record mobile terminal released state set by the kernel of the mobile terminal to be Screen is in the lock state or screen is in released state.
In order to solve the above technical problems, another technical scheme that the present invention uses is:A kind of mobile terminal is provided, including The protection system of any of the above-described.
The beneficial effects of the invention are as follows:It is different from the situation of prior art, the guard method of mobile terminal data of the present invention In, when detecting the operational motion of screen-lock password file, judge whether screen is in the lock state, locked when judging that screen is in When determining state, illustrate screen-lock password file probably by illegal operation so that mobile terminal is possible to illegally be entered, now The user data of mobile terminal is protected according to predetermined safeguard measure, can thus prevent user data from leaking, have The safety of effect protection user data.
Brief description of the drawings
Fig. 1 is the flow chart of the embodiment of guard method one of mobile terminal data of the present invention;
Fig. 2 is in the embodiment of guard method one of mobile terminal data of the present invention, is being detected to screen-lock password file Operational motion when, judge the flow chart whether screen is in the lock state;
Fig. 3 is the structural representation of the embodiment of protection system one of mobile terminal data of the present invention;
Fig. 4 is the structural representation of another embodiment of protection system of mobile terminal data of the present invention.
Embodiment
Below in conjunction with drawings and embodiments, the present invention is described in detail.
Refering to Fig. 1, in the embodiment of guard method one of mobile terminal data of the present invention, comprise the following steps:
Step S101:When detecting the operational motion to screen-lock password file, judge whether screen is in the lock state.
After user is provided with unlocking pin or unblock gesture, mobile terminal system can generate password unblock or gesture unblock Encryption cryptogam, i.e. screen-lock password file.The screen-lock password file is typically to be stored in data/system/ In gesture.key or data/system/password.key.Screen-lock password file can be deleted by violence, once deleted Remove, then screen need not can be unlocked can enter mobile terminal.
In present embodiment, detect whether the operational motion to screen-lock password file in real time, the operational motion include pair Screen-lock password file such as is deleted or modified at the operation, wherein modification operation is, for example, write operation to screen-lock password file, read The operation of the content in screen-lock password file is crossed or deleted in extract operation.When detecting the operational motion to screen-lock password file, Now judge whether screen is in the lock state.
Step S102:When judging that screen is in the lock state, the number of users according to default safeguard measure to mobile terminal According to being protected.
Judged by the locking to screen or released state, to judge to be to the operational motion of screen-lock password file It is no to be carried out for validated user.When judging that screen is in the lock state, illustrate that modification or deletion to screen-lock password file etc. are grasped Work action occurs in the case where screen is in the lock state, and thus illustrates that modification or deletion to screen-lock password file etc. operate It is probably greatly that disabled user is being carried out, rather than the machine validated user is being carried out, i.e., mobile terminal may fall into disabled user In hand, and disabled user attempts screen-lock password file is deleted or modified to enter in mobile terminal by violence.Therefore, in order to keep away The user data exempted from mobile terminal is stolen by disabled user, causes the negative consequence to the machine validated user, present embodiment In, the user data of mobile terminal is protected according to default safeguard measure.I.e. once detecting that screen is in the lock state When screen-lock password file be deleted or modification, the user data of mobile terminal is now protected according to default safeguard measure, thus It can prevent user data from leaking, effectively to protect secure user data.
Wherein, in a preferred embodiment of this invention, safeguard measure is preset to make mobile terminal factory reset.That is root The step of being protected according to default safeguard measure to the user data of mobile terminal be specially:Mobile terminal is set to recover to dispatch from the factory to set Put, to delete the user data of mobile terminal.When screen-lock password file is maliciously cracked, directly mobile terminal is recovered to dispatch from the factory to set Put, to cause the user data of mobile terminal to be all formatted, so as to prevent user data from leaking.
In other embodiments, safeguard measure can also directly delete user data, or user data is entered Row encryption, hide processing etc..
Wherein, user data includes short message, associated person information, log, picture, video and card data is locally stored Middle one or more, can also include other user data, such as log-on message (such as QQ, the wechat of mail, application program Log-on message) etc..The machine validated user can selectively be protected according to the importance of information to important information.
Wherein, in a preferred embodiment of this invention, realized by establishing file monitor mechanism to screen-lock password file Monitoring in real time, to monitor the change of screen-lock password file, so as to can detect that the operational motion to screen-lock password file.
By taking the Android mobile terminal of the Android operation system based on linux kernel as an example, specifically, refering to Fig. 2, When detecting the operational motion to screen-lock password file, judge in the step of whether screen is in the lock state, including it is as follows Step:
Step S201:The change of screen-lock password file is monitored by file change informing mechanism (inotify), when monitoring When screen-lock password file changes, the operational motion to screen-lock password file is as detected.
Specifically, event is deleted or modified by inotify monitoring screen-lock password files.Inotify is a Linux Interior nuclear properties, for monitoring file operation, such as the operation such as reading, write-in and establishment.In present embodiment, inotify prison Control process is that screen-lock password file is, for example, data/system/gesture.key or data/system/password.key, Inotify analysis monitoring listed files, data/system/gesture.key or data/ is obtained in listed files is monitored System/password.key files, so that by Linux inotify_add_watch interfaces to data/system/ Gesture.key or data/system/password.key files are monitored, and Linux select systems call the task that allows Obstruction waits.
When inotify, which monitors screen-lock password file, to change, the operation to screen-lock password file is as detected Action.And screen-lock password file changes, in particular to screen-lock password file is deleted or changed, i.e., it ought monitor screen locking When event is deleted or modified in cryptogam, screen-lock password file changes, and now select systems, which are called, returns, and reads And event is analyzed, it thus can be judged as detecting the operational motion to screen-lock password file.
Step S202:Judge whether screen is in the lock state.
Wherein, judge that the step of whether screen is in the lock state includes:Judge the note set by the kernel of mobile terminal The mark of record mobile terminal released state is that screen is in the lock state or screen is in released state.
The mark of the released state of the screen of mobile terminal is the variable in kernel, is in locking shape for recording screen State is in released state.Wherein, this is masked as representing that screen is in released state during True, and this is masked as False When represent screen be in the lock state, original state False.
When detecting the operational motion to screen-lock password file, the mark of released state is now read, that is, reads variable Value, to judge that the mark of released state is that screen is in the lock state or screen is in released state, work as released state When being masked as Ture, then judge that screen is in released state, when released state is when being masked as False, then judge screen It is in the lock state.Therefore, when detecting the operational motion to screen-lock password file, False is masked as when released state When, make mobile terminal factory reset, to prevent user data from leaking, when released state is when being masked as Ture, illustrate pair The operational motion of screen-lock password file is likely to be the progress of the machine validated user, now carries out the monitoring of next round.
Wherein, when screen is in released state, released state is masked as Ture, so as to the machine validated user again Unlocking pin or unblock gesture are set.
By the guard method of the mobile terminal data of the present invention, detected under being in the lock state in screen to screen locking During the operational motion of cryptogam, i.e., user data of mobile terminal is protected according to default safeguard measure, such as make movement Terminal factory reset, either directly delete the user data of mobile terminal or user data is encrypted, covert Reason etc., to prevent user data from leaking, so as to effectively protect the safety of user data.
Refering to Fig. 3, in the embodiment of protection system one of mobile terminal data of the present invention, wherein the protection system is used for The user data of mobile terminal is protected according to the guard method of the respective embodiments described above, it includes the He of judge module 301 Processing module 302.Wherein, judge module 301 is used for when detecting the operational motion to screen-lock password file, judges that screen is It is no to be in screen lock state;Processing module 302 is used for when judging that screen is in the lock state, according to default safeguard measure to movement The user data of terminal is protected.
The operation such as be deleted or modified to screen-lock password file is primarily referred to as to the operational motion of screen locking file.Judge module 301 when the operation such as being deleted or modified, judge whether screen is in the lock state detecting to screen-lock password file, to judge This is deleted or modified whether operation is that the machine validated user is carried out.When judge module 301 judges that screen is in the lock state, say The operations such as bright modification or deletion to screen-lock password file are greatly probably that disabled user is being carried out, now processing module 302 The user data of mobile terminal is protected according to default safeguard measure.Specifically, processing module 302 is used in judge module 301 when judging that screen is in the lock state, and makes mobile terminal factory reset, to delete the user data of mobile terminal, by This can prevent user data from leaking, and effectively protect the safety of user data.
Certainly, in other embodiments, default safeguard measure can also directly delete user data, or to user data The processing such as it is encrypted, hides.
Wherein, user data includes short message, associated person information, log, picture, video and card data is locally stored Middle one or more, can also include other user data, such as log-on message (such as QQ, the wechat of mail, application program Log-on message) etc..The machine validated user can selectively be protected according to the importance of information to important information.
Refering to Fig. 4, in another embodiment of protection system of mobile terminal data of the present invention, by establishing file monitor machine System realizes the real-time monitoring to screen-lock password file, close to screen locking so as to can detect that to monitor the change of screen-lock password file The operational motion of code file.Specifically, judge module 301 includes monitoring unit 3011 and judging unit 3012.Wherein, monitoring is single Member 3011 is used for the change that screen-lock password file is monitored by file change informing mechanism (inotify), close when monitoring screen locking When code file changes, the operational motion to screen-lock password file is as detected.Wherein, the change of screen-lock password file is Refer to whether screen-lock password file there are the Action Events such as modification or deletion.When monitoring unit 3011 monitors screen-lock password file hair During changing, that is, monitor screen-lock password file and modification or the event deleted occurs, now namely detect to screen-lock password text The operational motion of part.Judging unit 3012 judges whether screen is in the lock state, specifically, for judging in mobile terminal The mark of record mobile terminal released state set by core is that screen is in the lock state or screen is in released state. When the mark for judging record mobile terminal released state is that screen is in the lock state, processing module 302 is according to default protection Measure is protected to the user data of mobile terminal, thus can effectively protect the safety of user data.
The present invention also provides an embodiment of mobile terminal, and it includes the protection system of any of the above-described embodiment.
Embodiments of the present invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this The equivalent structure or equivalent flow conversion that description of the invention and accompanying drawing content are made, or directly or indirectly it is used in other correlations Technical field, it is included within the scope of the present invention.

Claims (10)

  1. A kind of 1. guard method of mobile terminal data, it is characterised in that including:
    When detecting the operational motion to screen-lock password file, judge whether screen is in the lock state;
    When judging that the screen is in the lock state, the user data of mobile terminal is protected according to default safeguard measure Shield.
  2. 2. according to the method for claim 1, it is characterised in that
    The step of default safeguard measure of the basis is protected to the user data of mobile terminal includes:
    Make mobile terminal factory reset, to delete the user data of the mobile terminal.
  3. 3. according to the method for claim 1, it is characterised in that
    It is described when detecting the operational motion to screen-lock password file, judge that the step of whether screen is in the lock state is wrapped Include:
    The change of the screen-lock password file is monitored by file change informing mechanism, is sent out when monitoring the screen-lock password file During changing, the operational motion to the screen-lock password file is as detected;
    Judge whether screen is in the lock state.
  4. 4. according to the method for claim 3, it is characterised in that
    It is described the screen-lock password file is monitored by file change informing mechanism change the step of include:
    Event is deleted or modified by what file change informing mechanism monitored the screen-lock password file, when monitoring the screen locking When event is deleted or modified in cryptogam, the screen-lock password file changes.
  5. 5. according to the method for claim 3, it is characterised in that
    It is described to judge that the step of whether screen is in the lock state includes:
    The mark for judging the record mobile terminal released state set by the kernel of the mobile terminal is that screen is in locking shape State or screen are in released state.
  6. A kind of 6. protection system of mobile terminal data, it is characterised in that including:
    Judge module, for when detecting the operational motion to screen-lock password file, judging whether screen is in the lock state;
    Processing module, for when judging that the screen is in the lock state, the use according to default safeguard measure to mobile terminal User data is protected.
  7. 7. protection system according to claim 6, it is characterised in that
    The processing module is used for when the judge module judges that the screen is in the lock state, and recovers mobile terminal Factory is set, to delete the user data of the mobile terminal.
  8. 8. protection system according to claim 6, it is characterised in that the judge module includes:
    Monitoring unit, it is described when monitoring for monitoring the change of the screen-lock password file by file change informing mechanism When screen-lock password file changes, the operational motion to the screen-lock password file is as detected;
    Judging unit, for judging whether screen is in the lock state.
  9. 9. protection system according to claim 8, it is characterised in that
    The monitoring unit is used to event be deleted or modified by the file change informing mechanism monitoring screen-lock password file, When monitoring the screen-lock password file event being deleted or modified, the screen-lock password file changes.
  10. 10. protection system according to claim 8, it is characterised in that
    The judging unit is used to judge the mark of the record mobile terminal released state set by the kernel of the mobile terminal It is that screen is in the lock state or screen is in released state.
CN201410242670.4A 2014-06-03 2014-06-03 The guard method of a kind of mobile terminal and its data, protection system Active CN104091119B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410242670.4A CN104091119B (en) 2014-06-03 2014-06-03 The guard method of a kind of mobile terminal and its data, protection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410242670.4A CN104091119B (en) 2014-06-03 2014-06-03 The guard method of a kind of mobile terminal and its data, protection system

Publications (2)

Publication Number Publication Date
CN104091119A CN104091119A (en) 2014-10-08
CN104091119B true CN104091119B (en) 2017-12-19

Family

ID=51638834

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410242670.4A Active CN104091119B (en) 2014-06-03 2014-06-03 The guard method of a kind of mobile terminal and its data, protection system

Country Status (1)

Country Link
CN (1) CN104091119B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105678171A (en) * 2014-11-17 2016-06-15 中兴通讯股份有限公司 Data processing method, device and mobile terminal
CN105426778A (en) * 2015-11-18 2016-03-23 罗满清 Information processing method and apparatus
CN105488429A (en) * 2015-11-25 2016-04-13 华勤通讯技术有限公司 Mobile terminal and data security protection method thereof
CN105808992A (en) * 2016-03-14 2016-07-27 宇龙计算机通信科技(深圳)有限公司 Data reading method and device and terminal
CN106973155A (en) * 2017-03-22 2017-07-21 清华大学合肥公共安全研究院 A kind of mobile phone personal information security management method
CN110113475A (en) * 2019-04-30 2019-08-09 大连睿海信息科技有限公司 Android system mobile phone screen lock crack method based on Lian Fa section MTK processor communication agreement
US20200387633A1 (en) * 2019-06-07 2020-12-10 Lenovo (Singapore) Pte. Ltd. Apparatus, method, and program product for securing personal information in a file

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7373516B2 (en) * 2004-08-19 2008-05-13 International Business Machines Corporation Systems and methods of securing resources through passwords
CN1968467A (en) * 2006-06-21 2007-05-23 华为技术有限公司 Mobile terminal and terminal user information protection method
CN101216867A (en) * 2007-01-05 2008-07-09 黄承雄 A logging-on process cipher protection method by means of background synchronization
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 The method and system of individual privacy in the protection mobile phone
CN102236751A (en) * 2010-04-22 2011-11-09 研华股份有限公司 Computer system with safety lock and method for implementing safety lock
CN103595851A (en) * 2012-08-16 2014-02-19 联芯科技有限公司 Personal-information leakage-proof method for mobile terminal and mobile terminal

Also Published As

Publication number Publication date
CN104091119A (en) 2014-10-08

Similar Documents

Publication Publication Date Title
CN104091119B (en) The guard method of a kind of mobile terminal and its data, protection system
US10846425B2 (en) Data protection based on user input during device boot-up, user login, and device shut-down states
EP3161720B1 (en) Data protection based on user and gesture recognition
RU2608243C2 (en) Method and device for screen and terminal unlocking
KR101489152B1 (en) Apparatus and method for preventing screen capture
CN103632107B (en) A kind of information of mobile terminal security protection system and method
CN107944292B (en) Privacy data protection method and system
CN106599115B (en) Data protection method, device and terminal
CN103619001A (en) Short message processing method, device and mobile terminal
CN106485170A (en) A kind of data inputting method and device
EP3652647B1 (en) System and method for detecting a malicious file using image analysis prior to execution of the file
CN111079134A (en) Method and device for controlling authority globally, storage medium and electronic equipment
CN101308700A (en) Divulging secret prevention U disk
US9521552B2 (en) Method and apparatus to use smart phones to securely and conveniently monitor intel pcs remotely
CN104182667B (en) Data guard method and device based on screen locking
CN106453057B (en) A kind of method and terminal for preventing short message to be stolen
US20150213242A1 (en) Electronics security application
EP2863331A1 (en) Portable terminal, program, and control method
CN103530580A (en) Terminal SD card security management method, device and terminal
EP3767507A1 (en) Data processing method against ransomware, program for executing same, and computer-readable recording medium with program recorded thereon
US20150020165A1 (en) System of executing application and method thereof
CN107169354A (en) Multi-layer android system malicious act monitoring method
Desai A survey on Android ransomware and its detection methods
EP3384632B1 (en) Apparatus and method for camera-based user authentication for content access
CN106295274B (en) Application program control method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190715

Address after: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A (located in Shenzhen Qianhai business secretary Co. Ltd.)

Patentee after: Wei Expo information service (Shenzhen) Co., Ltd.

Address before: 518053 Guangdong city of Shenzhen province Nanshan District overseas Chinese town in Eastern Industrial Zone H3 building 501B

Co-patentee before: Tian Long Electronic Science and Technology Co., Ltd. of Jiangsu Province

Patentee before: Shenzhen Tinno Wireless Technology Co., Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190812

Address after: E-S-215-2, Block E, 6596 Dongfanghong Road, Yuanqiao Town, Dezhou Economic and Technological Development Zone, 250000 Shandong Province

Patentee after: Dezhou Tang Seng Intellectual Property Service Co., Ltd.

Address before: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A (located in Shenzhen Qianhai business secretary Co. Ltd.)

Patentee before: Wei Expo information service (Shenzhen) Co., Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190829

Address after: Room 509, Building 508 Chundong Road, Minhang District, Shanghai 201108

Patentee after: Shanghai Taiyu information technology Limited by Share Ltd

Address before: E-S-215-2, Block E, 6596 Dongfanghong Road, Yuanqiao Town, Dezhou Economic and Technological Development Zone, 250000 Shandong Province

Patentee before: Dezhou Tang Seng Intellectual Property Service Co., Ltd.