CN104679816B - A kind of SQLITE database application methods under embedded system - Google Patents

A kind of SQLITE database application methods under embedded system Download PDF

Info

Publication number
CN104679816B
CN104679816B CN201410780886.6A CN201410780886A CN104679816B CN 104679816 B CN104679816 B CN 104679816B CN 201410780886 A CN201410780886 A CN 201410780886A CN 104679816 B CN104679816 B CN 104679816B
Authority
CN
China
Prior art keywords
data
mapping tables
hashmap
file
sqlite
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410780886.6A
Other languages
Chinese (zh)
Other versions
CN104679816A (en
Inventor
冒高峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI CAIYI INFORMATION TECHNOLOGY CO., LTD.
Original Assignee
Shanghai Caiyi Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Caiyi Information Technology Co Ltd filed Critical Shanghai Caiyi Information Technology Co Ltd
Priority to CN201410780886.6A priority Critical patent/CN104679816B/en
Publication of CN104679816A publication Critical patent/CN104679816A/en
Application granted granted Critical
Publication of CN104679816B publication Critical patent/CN104679816B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

Present applicant proposes a kind of SQLITE database application methods under embedded system, including:Step 1, structure SQLITE databases.Step 2, access SQLITE databases.Step 3, the caching Query Result.Realize the system equalization of speed and safety;Avoid negative effect caused by malice is distorted;And improve systematic entirety.

Description

A kind of SQLITE database application methods under embedded system
Technical field
The present invention relates to computer technology, the SQLITE database application methods under more particularly to a kind of embedded system.
Background technology
As the Lightweight Database increased income, SQLITE is widely used in ANDROI systems, but SQLITE databases Itself can be opened with text editor and checked without encryption, database file.Therefore the security of SQLITE databases It cannot get effective guarantee, easily by malicious attack.Although there is also SQLITE databases are encrypted in the prior art Method, but the existing encryption method to SQLITE databases tends not to meet speed and security needs simultaneously.In addition, With the progress of memory hardware technology, memory hardware cost significantly, but prior art and under utilized storage resource.
The content of the invention
For the drawbacks described above of prior art, the present invention proposes the SQLITE database applications under a kind of embedded system Method, to utilize the advantage of storage resource to greatest extent, access speed is kept in the application of SQLITE databases and is Balance between security of uniting.SQLITE database application methods under the embedded system include:Step 1, structure SQLITE databases, including:Step 1.1, a publicly-owned database file and a private data library text are internally created in memory Part, wherein publicly-owned data storage, in shared database file, private data is stored in private data library file;Step 1.2, Overall encryption is carried out to publicly-owned database file using AES symmetric cryptographies mode;Step 1.3, using RAS asymmetric encryption modes Overall encryption is carried out to private data library file;Step 2, SQLITE databases are accessed, including:It is step 2.1, public when needing to inquire about When there are data, following steps are performed:Step 2.1.1, symmetric key is obtained;Step 2.1.2, according to the symmetric key decryption institute State publicly-owned database file;If step 2.1.3, successful decryption, using the publicly-owned database file as data to be visited Library file is cached into internal memory;Step 2.2, when need inquire about private data when, perform following steps:Step 2.2.1, solution is obtained Close unsymmetrical key;Step 2.2.2, the private data library file is decrypted according to the unsymmetrical key;Step If 2.2.3, successful decryption, the private data library file is cached into internal memory as database file to be visited;Step Rapid 2.3, the copy of the database file to be visited in data base manipulation SQL statement audit memory is to obtain Query Result. Step 3, the caching Query Result, including:If without storage HashMap mapping tables in step 3.1, internal memory, in internal memory Middle establishment HashMap mapping tables;If deposited in step 3.2, external memory storage without storage HashMap mapping tables in outside HashMap mapping tables are created in reservoir;Step 3.3, Query Result is respectively mapped in internal memory and external memory storage In HashMap mapping tables, with one-to-one in key and the pair wise of value storage Query Result in the HashMap mapping tables Index entry and data item, the HashMap mapping tables store attribute corresponding with each data item simultaneously, and the attribute includes File ID, table id, major key, data item type;Step 3.4, the database file to be visited removed from internal memory.
Preferably, the SQLITE database application methods under described embedded system also include:Step 4, when visiting again When asking SQLITE databases, following steps are performed:Institute is quickly searched in step 4.1, the HashMap mapping tables cached in internal memory The data that need to be accessed;If step 4.2, lookup are unsuccessful, return to step 2.
Preferably, the SQLITE database application methods under described embedded system also include:If step 5, receive The request in storehouse is updated the data, then performs following steps:Step 5.1, the index entry of the data of renewal needed for delay in internal memory The quick data for searching required renewal in the HashMap mapping tables deposited;Step 5.2, the index entry according to the required data updated The quick data for searching required renewal in the HashMap mapping tables cached in external memory storage;If step 5.3, in step 5.1 is identical with the data item that is found in step 5.2, then performs renewal sentence;If step 5.4, in step 5.1 and step The data item found in 5.2 differs, then the nonsynchronous miscue of returned data item.
Preferably, the SQLITE database application methods under described embedded system also include:Step 6, when symmetrical close When the timestamp of key or unsymmetrical key fails, following steps are performed:Step 6.1, remove the HashMap mappings cached in internal memory Table;Step 6.2, remove the HashMap mapping tables cached in external memory storage.
The present invention compared with prior art, has advantages below:
By setting publicly-owned database file and private data library file, while to publicly-owned database file and private data AES symmetric cryptographies mode is respectively adopted in library file and RAS asymmetric encryption modes are encrypted, and is effectively coordinated, and realizes The system equalization of speed and safety.
By Query Result being mapped to HashMap mapping modes in internal memory and external memory storage simultaneously, and carry out same Step mapping, avoid negative effect caused by maliciously distorting.
By the way that Query Result is mapped into HashMap mapping tables and TreeMap mapping tables simultaneously, and according to query type point Not Fang Wen HashMap mapping tables and TreeMap mapping tables, improve systematic entirety energy.
Brief description of the drawings
Fig. 1 is the flow chart of the SQLITE database application methods under embedded system according to embodiments of the present invention.
Fig. 2 is the flow chart of the calculation procedure under active state.
Fig. 3 is the flow chart of the calculating and record of data set.
Embodiment
Retouching in detail to one or more embodiment of the invention is hereafter provided together with the accompanying drawing for illustrating the principle of the invention State.The present invention is described with reference to such embodiment, but the invention is not restricted to any embodiment.The scope of the present invention is only by right Claim limits, and the present invention covers many replacements, modification and equivalent.Illustrate in the following description many details with Thorough understanding of the present invention is just provided.These details are provided for exemplary purposes, and without in these details Some or all details can also realize the present invention according to claims.
Fig. 1 shows the flow of the SQLITE database application methods under embedded system according to embodiments of the present invention Figure.As shown in figure 1, the SQLITE database application methods under the embedded system of the present invention comprise at least:Step 1, structure SQLITE databases.Step 2, access SQLITE databases.Step 3, the caching Query Result.Wherein, the SQLITE numbers Include two database files according to storehouse, respectively publicly-owned database file and private data library file, respectively by publicly-owned data and Private data is stored in publicly-owned database and private data storehouse respectively, although such set-up mode sacrifices a little storage money Source, but thus bring security and significantly increase the benefit opened.Wherein, if the data to be accessed belong to the number accessed first According to then the data are cached, especially while be cached in internal memory and external memory storage, set by this, not only Improve the access speed of SQLITE databases, and the setting of dual caching causes system can be with automatic identification some data Lose, whether mistake is even maliciously tampered.
In embodiments of the present invention, the step 1 specifically includes:Step 1.1, a publicly-owned number is internally created in memory According to library file and a private data library file, wherein publicly-owned data storage, in shared database file, private data is stored in In private data library file;Step 1.2, overall encryption carried out to publicly-owned database file using AES symmetric cryptographies mode;Step 1.3rd, overall encryption is carried out to private data library file using RAS asymmetric encryption mode.On the one hand, due to AES encryption mode, Realize that speed is fast, the efficiency of whole encryption system can be improved, but encryption and decryption uses same key, security deficiency.And RAS cipher modes, security is higher, but realizes that speed is slow.On the other hand, publicly-owned data often require that access speed is fast still It is not high to security requirement, private data it is primary be security requirement.Therefore, the present invention is by for publicly-owned database file The cipher mode different with the setting of private data library file so that the access to SQLITE databases is in terms of speed and security It is balanced.
In embodiments of the present invention, the step 2 specifically includes:Step 2.1, when needing to inquire about publicly-owned data, perform Following steps:Step 2.1.1, symmetric key is obtained;Step 2.1.2, the publicly-owned database according to the symmetric key decryption File;If step 2.1.3, successful decryption, using the publicly-owned database file as database file to be visited cache to In internal memory.Step 2.2, when need inquire about private data when, perform following steps:Step 2.2.1, the asymmetric of decryption is obtained Key;Step 2.2.2, the private data library file is decrypted according to the unsymmetrical key;If step 2.2.3, it is decrypted into Work(, then the private data library file is cached into internal memory as database file to be visited.Step 2.3, data base manipulation The copy of the database file to be visited in SQL statement audit memory is to obtain Query Result.That is for needing The data type of access, different database files is accessed respectively, and adopted according to the cipher mode of different database files With different decruption keys.And database file to be visited is cached to internal memory, and realizes that the inquiry of data makes in internal memory Inquiry velocity is obtained to greatly improve.
In embodiments of the present invention, the step 3 specifically includes:If without storage HashMap in step 3.1, internal memory Mapping table, then HashMap mapping tables are created in internal memory, that is to say, that if belonging to access SQLITE databases first, need HashMap mapping tables are created in internal memory, the present invention uses HashMap mapping tables further to be improved in a manner of data cached The access speeds of SQLITE databases.If without HashMap mapping tables are stored in step 3.2, external memory storage, outside HashMap mapping tables are created in portion's memory, that is to say, that system memory resources are made full use of, to realize caching verifying function. Step 3.3, Query Result is respectively mapped in the HashMap mapping tables in internal memory and external memory storage, the HashMap reflects Reflected in firing table with one-to-one index entry and data item, the HashMap in key and the pair wise of value storage Query Result Firing table stores attribute corresponding with each data item simultaneously, and the attribute includes file ID, table id, major key, data item type. Step 3.4, the database file to be visited removed from internal memory.Wherein, HashMap mapping tables are as Query Result Container, the present invention in HashMap mapping tables be different from HashMap mapping tables of the prior art, in order to which usability is stronger, HashMap mapping tables in invention not only include key/value pair, and including attribute corresponding to each data item, the present invention The setting can also be replaced with value offer corresponding type and an attribute column based on chained list.In a word, enhancing is passed through HashMap mapping tables make it that usability is stronger, such as where can directly positioning a certain data item by HashMap mapping tables Database file, or even database table.
In embodiments of the present invention, in addition to step 4, when again access SQLITE databases when, perform following steps:Step Rapid 4.1, it is quick in the HashMap mapping tables cached in internal memory to search the required data accessed;If step 4.2, search not Succeed, then return to step 2.That is, in the case of the non-SQLITE databases of access first, first determine whether to cache in internal memory HashMap mapping tables in the presence or absence of the required data searched, in the present invention, term " data ", " data item " all refer to together One content, only different appellations under various circumstances.
In embodiments of the present invention, if in addition to step 5, receive the request for updating the data storehouse, perform following steps: Needed for quickly being searched in step 5.1, the HashMap mapping tables cached according to the index entry of the data of required renewal in internal memory more New data;Step 5.2, the HashMap mapping tables cached according to the index entry of the data of required renewal in external memory storage In it is quick search needed for renewal data;If step 5.3, identical with the data item that is found in step 5.2 in step 5.1, Then perform renewal sentence;If step 5.4, the data item found in step 5.1 and step 5.2 differ, number is returned According to the nonsynchronous miscue of item.It should be noted that in the case where normally accessing SQLITE databases, first in internal memory Data needed for being searched in the HashMap mapping tables of caching, if finding and needing to change required data, change first in internal memory Corresponding data item in HashMap mapping tables, and corresponding data in HashMap mapping tables are changed in the memory of inside and outside simultaneously , that is to say, that under normal circumstances, HashMap mapping tables are to maintain together in HashMap mapping tables and external memory storage in internal memory Step renewal.When receiving the request for updating the data storehouse, then the step 5.1-5.4 of the above is performed.
In embodiments of the present invention, in addition to step 6, when the timestamp of symmetric key or unsymmetrical key fails, hold Row following steps:Step 6.1, remove the HashMap mapping tables cached in internal memory;Cached in step 6.2, removing external memory storage HashMap mapping tables.The setting ensure that the security of system, avoid unsafe cache access.
In embodiments of the present invention, it is further comprising the steps of between step 3.2 and step 3.3:If do not deposited in internal memory TreeMap mapping tables are stored up, then TreeMap mapping tables are created in internal memory;Also include between step 3.3 and step 3.4 following Step:Query Result is mapped in the TreeMap mapping tables in internal memory, in the TreeMap mapping tables with key and value into One-to-one index entry and data item in Query Result are stored to mode.The step 4.1 specifically includes:If access The search statement during sentence of SQLITE databases, then in the HashMap mapping tables cached in internal memory it is quick search needed for access Data;If traveling through sentence during the sentence for accessing SQLITE databases, pressed in the TreeMap mapping tables cached in internal memory The data accessed needed for sequence traversal.The step 6 also includes:Step 6.3, remove the TreeMap mapping tables cached in internal memory.Its TreeMap mapping tables are to maintain synchronized update in HashMap mapping tables and internal memory in middle internal memory.Due to depositing for above-mentioned steps Although occupying a little memory space, but what is brought is being greatly improved for access speed, in particular for different access Type accesses HashMap mapping tables and TreeMap mapping tables respectively so that the overall performance of system is improved.Wherein, due to HashMap mapping tables have more advantage in terms of lookup, therefore search the object accessed and be set as HashMap mapping tables, due to The advantage of TreeMap mapping tables is ranking function, and travels through access and generally require to travel through in order, therefore travels through the object accessed and set It is set to TreeMap mapping tables.
It should be understood that the embedded system designed by the present invention includes ANDROID systems, IOS systems etc..Institute of the present invention The external memory storage of design includes SD card memory etc..
In summary, the SQLITE database application methods under embedded system proposed by the present invention, realize speed and The system equalization of safety;Avoid negative effect caused by malice is distorted;And improve systematic entirety.
It should be appreciated that the above-mentioned embodiment of the present invention is used only for exemplary illustration or explains the present invention's Principle, without being construed as limiting the invention.Therefore, that is done without departing from the spirit and scope of the present invention is any Modification, equivalent substitution, improvement etc., should be included in the scope of the protection.In addition, appended claims purport of the present invention Covering the whole changes fallen into scope and border or this scope and the equivalents on border and repairing Change example.

Claims (4)

1. a kind of SQLITE database application methods under embedded system, the storage device of the embedded system is including interior Deposit, internal storage and external memory storage, methods described include:
Step 1, structure SQLITE databases, including:
Step 1.1, a publicly-owned database file and a private data library file are internally created in memory, wherein publicly-owned data It is stored in publicly-owned database file, private data is stored in private data library file;
Step 1.2, overall encryption carried out to publicly-owned database file using AES symmetric cryptographies mode;
Step 1.3, overall encryption carried out to private data library file using RAS asymmetric encryption mode;
Step 2, SQLITE databases are accessed, including:
Step 2.1, when needing to inquire about publicly-owned data, perform following steps:
Step 2.1.1, symmetric key is obtained;
Step 2.1.2, the publicly-owned database file according to the symmetric key decryption;
If step 2.1.3, successful decryption, the publicly-owned database file is cached to interior as database file to be visited In depositing;
Step 2.2, when need inquire about private data when, perform following steps:
Step 2.2.1, the unsymmetrical key of decryption is obtained;
Step 2.2.2, the private data library file is decrypted according to the unsymmetrical key;
If step 2.2.3, successful decryption, the private data library file is cached to interior as database file to be visited In depositing;
The copy of the database file to be visited in step 2.3, data base manipulation SQL statement audit memory is to be inquired about As a result;
Step 3, the caching Query Result, including:
If HashMap mapping tables are created in internal memory without storage HashMap mapping tables in step 3.1, internal memory;
If HashMap is created in external memory storage without storage HashMap mapping tables in step 3.2, external memory storage Mapping table;
Step 3.3, Query Result is respectively mapped in the HashMap mapping tables in internal memory and external memory storage, it is described It is described with one-to-one index entry and data item in key and the pair wise of value storage Query Result in HashMap mapping tables HashMap mapping tables store attribute corresponding with each data item simultaneously, and the attribute includes file ID, table id, major key, number According to item type;
Step 3.4, the database file to be visited removed from internal memory.
2. the SQLITE database application methods under embedded system according to claim 1, it is characterised in that also wrap Include:
Step 4, when again access SQLITE databases when, perform following steps:
It is quick in step 4.1, the HashMap mapping tables cached in internal memory to search the required data accessed;
If step 4.2, lookup are unsuccessful, return to step 2.
3. the SQLITE database application methods under embedded system according to claim 1, it is characterised in that also wrap Include:
If step 5, receiving the request for updating the data storehouse, following steps are performed:
It is quick in step 5.1, the HashMap mapping tables cached according to the index entry of the data of required renewal in internal memory to search institute The data that need to be updated;
It is quick in the HashMap mapping tables that step 5.2, the index entry of the data of renewal needed for cache in external memory storage The data of renewal needed for searching;
If step 5.3, identical with the data item that is found in step 5.2 in step 5.1, renewal sentence is performed;
If step 5.4, the data item found in step 5.1 and step 5.2 differ, returned data item is nonsynchronous Miscue.
4. the SQLITE database application methods under embedded system according to claim 1, it is characterised in that also wrap Include:
Step 6, when the timestamp of symmetric key or unsymmetrical key fails, perform following steps:
Step 6.1, remove the HashMap mapping tables cached in internal memory;
Step 6.2, remove the HashMap mapping tables cached in external memory storage.
CN201410780886.6A 2014-12-17 2014-12-17 A kind of SQLITE database application methods under embedded system Expired - Fee Related CN104679816B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410780886.6A CN104679816B (en) 2014-12-17 2014-12-17 A kind of SQLITE database application methods under embedded system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410780886.6A CN104679816B (en) 2014-12-17 2014-12-17 A kind of SQLITE database application methods under embedded system

Publications (2)

Publication Number Publication Date
CN104679816A CN104679816A (en) 2015-06-03
CN104679816B true CN104679816B (en) 2018-02-06

Family

ID=53314858

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410780886.6A Expired - Fee Related CN104679816B (en) 2014-12-17 2014-12-17 A kind of SQLITE database application methods under embedded system

Country Status (1)

Country Link
CN (1) CN104679816B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108268476B (en) * 2016-12-30 2021-11-30 北京国双科技有限公司 Data query method and device
CN106850192A (en) * 2017-03-13 2017-06-13 国家电网公司 A kind of method for optimizing mobile device data storehouse encryption efficiency
CN108628885B (en) * 2017-03-20 2023-04-18 腾讯科技(深圳)有限公司 Data synchronization method and device and storage equipment
CN107402843A (en) * 2017-06-19 2017-11-28 阿里巴巴集团控股有限公司 Restoration methods, device and the equipment of database corruption
CN109857742B (en) * 2019-01-18 2021-03-02 烽火通信科技股份有限公司 Big data virtual table rapid display method and system
CN111159106B (en) * 2019-12-30 2023-04-07 亚信科技(中国)有限公司 Data query method and device
CN112966278A (en) * 2021-02-04 2021-06-15 北京高因科技有限公司 Method for Flutter to safely access SQLite in environment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1635494A (en) * 2003-12-27 2005-07-06 海信集团有限公司 Method for implementing class memory database access and retrieval
CN102426637A (en) * 2011-11-01 2012-04-25 北京人大金仓信息技术股份有限公司 Method for encrypting and storing embedded database
CN102436421A (en) * 2010-09-29 2012-05-02 腾讯科技(深圳)有限公司 Data caching method
CN103309815A (en) * 2013-05-23 2013-09-18 华中科技大学 Method and system for increasing available capacity and service life of solid state disc
CN103595730A (en) * 2013-11-28 2014-02-19 中国科学院信息工程研究所 Ciphertext cloud storage method and system
CN103812871A (en) * 2014-02-24 2014-05-21 北京明朝万达科技有限公司 Development method and system based on mobile terminal application program security application
WO2014120636A1 (en) * 2013-01-29 2014-08-07 Diamond Fortress Technologies, Inc. Touchless fingerprinting acquisition and processing application for mobile devices
CN104090793A (en) * 2014-07-07 2014-10-08 四川效率源信息安全技术有限责任公司 Device and method for destroying Android mobile phone body data

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1635494A (en) * 2003-12-27 2005-07-06 海信集团有限公司 Method for implementing class memory database access and retrieval
CN102436421A (en) * 2010-09-29 2012-05-02 腾讯科技(深圳)有限公司 Data caching method
CN102426637A (en) * 2011-11-01 2012-04-25 北京人大金仓信息技术股份有限公司 Method for encrypting and storing embedded database
WO2014120636A1 (en) * 2013-01-29 2014-08-07 Diamond Fortress Technologies, Inc. Touchless fingerprinting acquisition and processing application for mobile devices
CN103309815A (en) * 2013-05-23 2013-09-18 华中科技大学 Method and system for increasing available capacity and service life of solid state disc
CN103595730A (en) * 2013-11-28 2014-02-19 中国科学院信息工程研究所 Ciphertext cloud storage method and system
CN103812871A (en) * 2014-02-24 2014-05-21 北京明朝万达科技有限公司 Development method and system based on mobile terminal application program security application
CN104090793A (en) * 2014-07-07 2014-10-08 四川效率源信息安全技术有限责任公司 Device and method for destroying Android mobile phone body data

Also Published As

Publication number Publication date
CN104679816A (en) 2015-06-03

Similar Documents

Publication Publication Date Title
CN104679816B (en) A kind of SQLITE database application methods under embedded system
US10025951B2 (en) Systems and methods for implementing an encrypted search index
US10114955B2 (en) Increasing search ability of private, encrypted data
US9720943B2 (en) Columnar table data protection
US10735388B2 (en) Confining data based on location
US9779264B2 (en) Method, server and computer program for security management in database
US9965644B2 (en) Record level data security
EP2731045B1 (en) Client computer for querying a database stored on a server via a network
US8997248B1 (en) Securing data
CN105354151B (en) Cache management method and equipment
US20160078244A1 (en) Secured file system management
US20180145983A1 (en) Distributed data storage system using a common manifest for storing and accessing versions of an object
US9514325B2 (en) Secured file system management
CN106713334B (en) Encryption method, decryption method, access method and device for virtual storage volume
EP2511848A2 (en) Multiple independent encryption domains
US11288664B2 (en) Method and apparatus for processing transactions
EP3719686B1 (en) Secure database utilizing dictionary encoding
US20160292221A1 (en) Vertically partitioned databases
US10803020B1 (en) Data deduplication on a distributed file system
CN113297210A (en) Data processing method and device
US20220318438A1 (en) Systems and methods for data security on a mobile device
CN104883370A (en) Spatial data safety system based on access mode protection
CN114546271A (en) Data reading and writing method, device and system based on block chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20150917

Address after: 225400, room 4, building 401, traffic district, Taixing Town, Taixing, Jiangsu

Applicant after: Ju Qiuping

Address before: 100020 Beijing city Chaoyang District auspicious A Jiahui International Center No. 14 block 1506

Applicant before: Sea of clouds Science and Technology Ltd. can be thought in Beijing

CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Mao Gaofeng

Inventor before: Xiu Minghui

TA01 Transfer of patent application right

Effective date of registration: 20180110

Address after: Room 501, room 2, No. 391, Guiping Road, Xuhui District, Shanghai

Applicant after: SHANGHAI CAIYI INFORMATION TECHNOLOGY CO., LTD.

Address before: 225400, room 4, building 401, traffic district, Taixing Town, Taixing, Jiangsu

Applicant before: Ju Qiuping

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180206

Termination date: 20191217