CN104539684B - A kind of user's machine resources extracting integral method and system - Google Patents

A kind of user's machine resources extracting integral method and system Download PDF

Info

Publication number
CN104539684B
CN104539684B CN201410810554.8A CN201410810554A CN104539684B CN 104539684 B CN104539684 B CN 104539684B CN 201410810554 A CN201410810554 A CN 201410810554A CN 104539684 B CN104539684 B CN 104539684B
Authority
CN
China
Prior art keywords
virtual machine
machine
layer
virtual
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410810554.8A
Other languages
Chinese (zh)
Other versions
CN104539684A (en
Inventor
叶耀荣
刘锦涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Onecloud Information Technology Co ltd
Guangzhou Yunbiao Bureau Network Technology Co.,Ltd.
Original Assignee
GUANGZHOU ONECLOUD INFORMATION TECHNOLOGY Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGZHOU ONECLOUD INFORMATION TECHNOLOGY Inc filed Critical GUANGZHOU ONECLOUD INFORMATION TECHNOLOGY Inc
Priority to CN201410810554.8A priority Critical patent/CN104539684B/en
Publication of CN104539684A publication Critical patent/CN104539684A/en
Application granted granted Critical
Publication of CN104539684B publication Critical patent/CN104539684B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45504Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Stored Programmes (AREA)

Abstract

The present invention relates to a kind of user's machine resources extracting integral method and system.This method includes:Client creates first layer virtual machine according to the physical resource being pre-selected, and the first layer virtual machine carries out network connection with resource management center, so that the resource management center gets the virtual resource information of the first layer virtual machine;Resource management center asks to create second layer virtual machine on corresponding first layer virtual machine with reference to all virtual resource information according to networking input by user, and multiple second layer virtual machine configurations are formed into a Virtual Local Area Network, multiple second layer virtual machines in same Virtual Local Area Network are in communication with each other.The present invention can will disperse and user's machine resources of internet are extracted and integrated, and is built for the cloud platform of provider server, and cost is built so as to reduce cloud platform.

Description

A kind of user's machine resources extracting integral method and system
Technical field
The present invention relates to cloud computing technologies.
Background technology
In field of cloud calculation, the deployment of cloud platform at present is all to establish the data center of a concentration, is provided by cloud service Quotient provides server to build the cluster of cloud service, and server becomes the big limitation for building cloud platform, cloud service is provided For quotient, it has to spend very big expense on buying server.And simultaneously, and have some provider servers or individual Available free server leaves unused.How idle resource is integrated, so as to reduce the expense that service provider builds cloud platform With, be in the industry urgent need to resolve the technical issues of.
Invention content
It is an object of the invention to propose a kind of user's machine resources extracting integral method, can solve utilize at present Idle machines resource is come the problem of building cloud platform.
In order to achieve the above object, the technical solution adopted in the present invention is as follows:
A kind of user's machine resources extracting integral method, includes the following steps:
Client creates first layer virtual machine, the first layer virtual machine and resource pipe according to the physical resource being pre-selected Reason center carries out network connection, so that the resource management center gets the virtual resource information of the first layer virtual machine;
Resource management center asks to combine all virtual resource information in corresponding first layer according to networking input by user Second layer virtual machine is created on virtual machine, and multiple second layer virtual machine configurations are formed into a Virtual Local Area Network, same void The multiple second layer virtual machines intended in local area network are in communication with each other.
Preferably, the physical resource includes CPU, memory, bandwidth and hard disk.
Preferably, the virtual resource information includes virtual cpu, virtual memory, virtual bandwidth and virtual hard disk.
Preferably, the virtual operating system of the first layer is Linux, Windows, Unix, Mac OS, Android OS In one kind.
Preferably, first layer virtual machine is encrypted in resource management center.
Preferably, the internetwork connection mode of first layer virtual machine and resource management center is using one in NAT, VPN, IPOP Kind.
The present invention also proposes a kind of user's machine resources extracting integral system, including following device:
First creating device is set on client, for creating first layer virtual machine according to the physical resource being pre-selected, The first layer virtual machine carries out network connection with resource management center, so that the resource management center gets described first The virtual resource information of layer virtual machine;
Second creating device is set on resource management center, for being asked to combine all void according to networking input by user Intend resource information and second layer virtual machine is created on corresponding first layer virtual machine, and multiple second layer virtual machine configurations are formed One Virtual Local Area Network, multiple second layer virtual machines in same Virtual Local Area Network are in communication with each other.
Preferably, resource management center is additionally operable to that first layer virtual machine is encrypted.
The present invention has the advantages that:
It can will disperse to extract and integrate with user's machine resources of internet, be put down for the cloud of provider server Platform is built, and cost is built so as to reduce cloud platform.
Description of the drawings
Fig. 1 is the flow chart of user's machine resources extracting integral method of present pre-ferred embodiments.
Specific embodiment
In the following, with reference to attached drawing and specific embodiment, the present invention is described further.
As shown in Figure 1, a kind of user's machine resources extracting integral method, includes the following steps:
Step S1, client (being dispersed in the user's machine of internet everywhere) is created according to the physical resource being pre-selected First layer virtual machine, the first layer virtual machine carries out network connection with resource management center, so that the resource management center Get the virtual resource information of the first layer virtual machine.The physical resource includes CPU, memory, bandwidth and hard disk etc., example Such as, user selects the moneys such as corresponding CPU, memory, bandwidth and hard disk according to the hardware configuration of oneself client according to resource ratio Source.According to physical resource fictionalize come first layer virtual machine, corresponding virtual resource is just likewise supplied with, including virtual cpu, void Intend memory, virtual bandwidth and virtual hard disk etc..Since resource management center needs to control first layer virtual machine, First layer virtual machine needs to be attached by network and resource management center, and connection mode can be in NAT, VPN, IPOP It is a kind of.The operating system of the first layer virtual machine of establishment can be Linux, Windows, Unix, Mac OS, Android OS Deng.
Step S2, in order to ensure the safety of data and confidentiality, resource management center adds first layer virtual machine Close processing, to prevent the owner of client from easily accessing first layer virtual machine.
This is because machine resources are not to concentrate on a data center, and entire internet is distributed across, is Ensure the safety of data, the transmission of data is encrypted in resource management center, and data transmission is based on SSL, ensureing The safety of data transmission on internet, utilizes data confidentiality technology, it can be ensured that in transmission process of the data on network not It can be intercepted and eavesdrop the safety for ensureing data and integrality.The present embodiment can also equally carry out virtual machine image simultaneously Cryptographic operation so as to which the owner for ensureing physical machine will not have the permission for arbitrarily checking the data in virtual machine, ensures number According to safety and crypticity.
Step S3, the networking request that resource management center is inputted according to user's (can be provider server) combines all Virtual resource information creates second layer virtual machine on corresponding first layer virtual machine, and by multiple second layer virtual machine configuration shapes Into a Virtual Local Area Network, multiple second layer virtual machines in same Virtual Local Area Network are in communication with each other.Thus may be used According to the demand of user, cloud platform is built using the slack resources that client shares out, so as to mitigate provider server Buy the burden of physical server.
It should be noted that step S2 can also just be performed when second layer virtual machine is created.
In addition, in general, a first layer virtual machine is created in same client, it is virtual in same first layer A second layer virtual machine is created on machine, but under conditions of physical resource and virtual resource allow, in same client Multiple first layer virtual machines can also be created, same first layer virtual machine can also create multiple second layer virtual machines.
The present embodiment also proposes a kind of user's machine resources extracting integral system, including following device:
First creating device is set on client, for creating first layer virtual machine according to the physical resource being pre-selected, The first layer virtual machine carries out network connection with resource management center, so that the resource management center gets described first The virtual resource information of layer virtual machine;
Encryption device is set on resource management center, for first layer virtual machine to be encrypted;
Second creating device is set on resource management center, for being asked to combine all void according to networking input by user Intend resource information and second layer virtual machine is created on corresponding first layer virtual machine, and multiple second layer virtual machine configurations are formed One Virtual Local Area Network, multiple second layer virtual machines in same Virtual Local Area Network are in communication with each other.
In order to facilitate the understanding of the present invention, it is described in detail with reference to specific application scenarios.
User's operation client logs on to resource management center by authentication, and master die is downloaded from resource management center Plate/mirror image, configuration file, virtualization software etc. form installation kit, perform installation kit, and selection needs the physical resource virtualized, First layer virtual machine (KVM/Vmware etc.) is created on the client, meanwhile, resource management center communicates with first layer virtual machine, And the information such as IP address, internetwork connection mode, serve port, virtual resource for recording client ip and first layer virtual machine.
Provider server logging resource administrative center, it is defeated to resource management center according to the demand of the cloud platform of deployment Enter networking request, resource management center is according to networking request and virtual resource information, it is possible to select suitable first layer virtual Machine creates second layer virtual machine, to complete building for cloud platform.
The present embodiment is the premise based on nested virtualization technology for the extraction of machine resources, virtual by first layer Machine, the machine resources of user are just extracted, and can be used for the operating system software installed, and virtual management and control are soft Part, carries out network legal power control, and resource management center can be managed this part resource.And in the base of first layer virtual machine The virtual machine of the second layer created on plinth is then that can provide practical IAAS or PAAS services.
All it is to support for the mainstreams such as nested virtualization, KVM, Vmware virtualization technology, this is a kind of very convenient Extraction resource method, and more ensure that the safety of system.Due to can finally be provided to the IAAS or PAAS of user The resources of virtual machine of service is the virtual machine of the second layer, so can prevent physical resource owner from entering virtual machine easily, is protected It has demonstrate,proved system and data is more safe.
Another benefit that nested virtualization is brought is the control that resource management center possesses first layer virtual machine completely, That is resource management center can also install different control softwares, such as installing pipe according to different first layer virtual machines Module is managed, other first layer virtual machines can be controlled by being mounted with the first layer virtual machine of management module.In resource management The heart can also install first layer virtual machine other service softwares, for example, installation provides a variety of work(such as virtualization, network, storage The service of energy.
It needs to log on to resource management center by certification when user wants and builds a cloud platform, be similarly to The network architecture of SDN, the network between first layer virtual machine and client is using the form of bridge joint, first layer virtual machine and second It is also using the pattern of bridge joint between layer virtual machine, externally all network access is all that enter first layer by client virtual Machine, then second layer virtual machine internal is entered by first layer virtual machine, the then forwarding of final network packet is to pass through physics Machine carries out.Resource management center installs a routing management module on first layer virtual machine, this routing management module pipe Reason is the same as the routing iinformation of all first layer virtual machines under network, the forwarding of the network packet of all disengaging first layer virtual machines All it is managed by routing module.In this way, the only application establishment second layer on applicable first layer virtual machine that user is concerned about Virtual machine, the configuration of network can automatically be gone to complete by routing module.
Resource management center chooses one or more first layer virtual robot arms into a Virtual Local Area Network as needed (vnet), it is identified (OAID is a special unique character string, for mark one tenant network) by OAID.Resource management Center sends and updates the IP information and location information of other first layer virtual machines to each first layer virtual machine of vnet, is in The first layer virtual machine of same vnet can be in communication with each other.First layer virtual machine each in this way and it is equipped with the of management module A vnet is formed between one layer of virtual machine (VManger), VManger can be in vnet according to resource usage policy, load balancing Strategy sends instruction to first layer virtual machine and creates container (Container) or guest virtual machine (Virtual ), Machine the container (Container) or guest virtual machine (Virtual Machine) can provide IAAS/PAAS clothes Business, can dispose and run client-side program.
The present embodiment has the advantage that:
The idle machine resources of dispersion can be combined, uniformly control, realize on resource management center The integration of resource, avoids the waste of resource.
Provider server directly can create container (container) or virtual machine using these machine resources (virtual machine), and cloud platform is built, without purchasing a large amount of server resource, cost is greatly saved.
Node virtual machine is created on physical node, node virtual machine uses linux system, program assembly, network Connection mode oneself can realize and control, the problems such as shielding the operating system complexity and user right of physical node.
The access of first layer virtual machine is very convenient, can realize quick dynamic access and exit.
It realizes and obtains machine resources on demand, it is not necessary to a large amount of fund is just spent to purchase machine before cloud platform is built, and Be can dynamic access first layer virtual machine again when needed, obtain machine resources.
For those skilled in the art, technical solution that can be as described above and design are made other each Kind is corresponding to be changed and deforms, and all these change and deform the protection model that should all belong to the claims in the present invention Within enclosing.

Claims (7)

  1. A kind of 1. user's machine resources extracting integral method, which is characterized in that include the following steps:
    Client selects corresponding CPU, memory, bandwidth and hard disk resources to create first layer void according to hardware configuration and resource ratio Plan machine, the first layer virtual machine carries out network connection with resource management center, so that the resource management center gets institute State the virtual resource information of first layer virtual machine;
    Resource management center asks all virtual resource information of combination virtual in corresponding first layer according to networking input by user Second layer virtual machine is created on machine, and multiple second layer virtual machine configurations are formed into a Virtual Local Area Network, same virtual office Multiple second layer virtual machines in the network of domain are in communication with each other.
  2. 2. user's machine resources extracting integral method as described in claim 1, which is characterized in that the virtual resource packet Include virtual cpu, virtual memory, virtual bandwidth and virtual hard disk.
  3. 3. user's machine resources extracting integral method as described in claim 1, which is characterized in that the first layer virtual machine Operating system is L i nux, one kind in Wi ndows, Un i x, Mac OS, Andro id OS.
  4. 4. user's machine resources extracting integral method as described in claim 1, which is characterized in that resource management center is to first Layer virtual machine is encrypted.
  5. 5. user's machine resources extracting integral method as described in claim 1, which is characterized in that first layer virtual machine and resource The internetwork connection mode of administrative center is using one kind in NAT, VPN, I POP.
  6. 6. a kind of user's machine resources extracting integral system, which is characterized in that including following device:
    First creating device is set on client, for selecting corresponding CPU, memory, band according to hardware configuration and resource ratio Wide and hard disk resources create first layer virtual machine, and the first layer virtual machine carries out network connection with resource management center, so that The resource management center gets the virtual resource information of the first layer virtual machine;
    Second creating device is set on resource management center, for being asked to combine all virtual moneys according to networking input by user Source information creates second layer virtual machine on corresponding first layer virtual machine, and multiple second layer virtual machine configurations are formed one Virtual Local Area Network, multiple second layer virtual machines in same Virtual Local Area Network are in communication with each other.
  7. 7. user's machine resources extracting integral system as claimed in claim 6, which is characterized in that resource management center is to first Layer virtual machine is encrypted.
CN201410810554.8A 2014-12-23 2014-12-23 A kind of user's machine resources extracting integral method and system Active CN104539684B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410810554.8A CN104539684B (en) 2014-12-23 2014-12-23 A kind of user's machine resources extracting integral method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410810554.8A CN104539684B (en) 2014-12-23 2014-12-23 A kind of user's machine resources extracting integral method and system

Publications (2)

Publication Number Publication Date
CN104539684A CN104539684A (en) 2015-04-22
CN104539684B true CN104539684B (en) 2018-07-06

Family

ID=52855151

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410810554.8A Active CN104539684B (en) 2014-12-23 2014-12-23 A kind of user's machine resources extracting integral method and system

Country Status (1)

Country Link
CN (1) CN104539684B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224388A (en) * 2015-09-14 2016-01-06 北京百度网讯科技有限公司 Based on the cloud system continuous integrating method and apparatus of nested virtualization
CN106685860B (en) * 2015-11-06 2020-09-11 阿里巴巴集团控股有限公司 Network virtualization method and device
US10318321B2 (en) * 2017-04-10 2019-06-11 Hongfujin Precision Electronics(Tianjin)Co., Ltd. Virtual desktop system and method of control
CN107122228B (en) * 2017-04-18 2018-06-29 北京华云网际科技有限公司 The dispositions method and device of the management platform of super emerging system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102655532A (en) * 2012-04-18 2012-09-05 上海和辰信息技术有限公司 Distributed heterogeneous virtual resource integration management method and system
CN102739771A (en) * 2012-04-18 2012-10-17 上海和辰信息技术有限公司 Cloud application integrated management platform and method supporting service fusion
CN103995733A (en) * 2014-05-27 2014-08-20 西安交通大学 Lightweight nested virtualization implementation method based on physical resource penetration mechanism

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7739434B2 (en) * 2008-01-11 2010-06-15 International Business Machines Corporation Performing a configuration virtual topology change and instruction therefore
US7734900B2 (en) * 2008-01-11 2010-06-08 International Business Machines Corporation Computer configuration virtual topology discovery and instruction therefore
CN103400246B (en) * 2013-08-23 2016-07-06 中国科学院合肥物质科学研究院 A kind of nuclear power plant's risk monitoring system based on cloud framework and monitoring method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102655532A (en) * 2012-04-18 2012-09-05 上海和辰信息技术有限公司 Distributed heterogeneous virtual resource integration management method and system
CN102739771A (en) * 2012-04-18 2012-10-17 上海和辰信息技术有限公司 Cloud application integrated management platform and method supporting service fusion
CN103995733A (en) * 2014-05-27 2014-08-20 西安交通大学 Lightweight nested virtualization implementation method based on physical resource penetration mechanism

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
网络虚拟化环境中虚拟网络的嵌套映射算法;卿苏德,等;《软件学报》;20121130;第23卷(第11期);第3047页 *

Also Published As

Publication number Publication date
CN104539684A (en) 2015-04-22

Similar Documents

Publication Publication Date Title
US10992473B2 (en) Secure single sign on and conditional access for client applications
CN108062248B (en) Resource management method, system, equipment and storage medium of heterogeneous virtualization platform
US10868771B2 (en) Methods and systems for creating and managing network groups
JP5740445B2 (en) How to provide local secure network access to remote services
US20120331528A1 (en) Apparatus, systems and methods for secure and selective access to services in hybrid public-private infrastructures
US11943297B2 (en) Distributed network security system providing isolation of customer data
CN111164571A (en) Secure processing based control plane function virtualization in cloud systems
US9686237B2 (en) Secure communication channel using a blade server
CN104539684B (en) A kind of user's machine resources extracting integral method and system
KR101219662B1 (en) Security system of cloud service and method thereof
US20180062908A1 (en) Allocation of virtual interfaces to containers
US11457007B2 (en) Single sign-on from desktop to network
US11057358B2 (en) Concealment of customer sensitive data in virtual computing arrangements
CN111818081A (en) Virtual encryption machine management method and device, computer equipment and storage medium
US11062049B2 (en) Concealment of customer sensitive data in virtual computing arrangements
CN111698249B (en) Virtual security management and control equipment deployment method and component, communication method and system
CN114785612A (en) Cloud platform management method, device, equipment and medium
Vijaya Bharati et al. Data storage security in cloud using a functional encryption algorithm
CN107608768A (en) Resource access method, electronic equipment and storage medium based on command mode
EP3089428A1 (en) Method and apparatus for deploying applications
Sabharwal et al. GKE Networking
Svobunas Implementing a private cloud with System Center 2016 in a virtual lab environment
Yeluri et al. Network security in the cloud
Csibi Integration of Virtual Machine Technologies for the support of Remote Development Units

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Room 705-714, block B, Zhongda science and technology complex building, 135 Xingang West Road, Haizhu District, Guangzhou, Guangdong 510260

Patentee after: GUANGZHOU ONECLOUD INFORMATION TECHNOLOGY CO.,LTD.

Address before: Room 705-714, block B, Zhongda science and technology complex building, 135 Xingang West Road, Haizhu District, Guangzhou, Guangdong 510260

Patentee before: ONECLOUD, Inc.

CP01 Change in the name or title of a patent holder
TR01 Transfer of patent right

Effective date of registration: 20230602

Address after: Room 715, Building B, Zhongda Science and Technology Park, Building 705, West District, Yuanyuan, No. 135 Xingang West Road, Haizhu District, Guangzhou City, Guangdong Province, 510000 (for office only)

Patentee after: Guangzhou Yunbiao Bureau Network Technology Co.,Ltd.

Address before: Room 705-714, block B, Zhongda science and technology complex building, 135 Xingang West Road, Haizhu District, Guangzhou, Guangdong 510260

Patentee before: GUANGZHOU ONECLOUD INFORMATION TECHNOLOGY CO.,LTD.

TR01 Transfer of patent right