CN105590065B - Method and device for protecting preset file - Google Patents

Method and device for protecting preset file Download PDF

Info

Publication number
CN105590065B
CN105590065B CN201410562056.6A CN201410562056A CN105590065B CN 105590065 B CN105590065 B CN 105590065B CN 201410562056 A CN201410562056 A CN 201410562056A CN 105590065 B CN105590065 B CN 105590065B
Authority
CN
China
Prior art keywords
file
preset
terminal
signature
fixed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410562056.6A
Other languages
Chinese (zh)
Other versions
CN105590065A (en
Inventor
王兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Zhongxing Software Co Ltd
Original Assignee
Nanjing Zhongxing Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Zhongxing Software Co Ltd filed Critical Nanjing Zhongxing Software Co Ltd
Priority to CN201410562056.6A priority Critical patent/CN105590065B/en
Publication of CN105590065A publication Critical patent/CN105590065A/en
Application granted granted Critical
Publication of CN105590065B publication Critical patent/CN105590065B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation

Abstract

The invention discloses a method and a device for protecting a preset file. The method comprises the following steps: connecting fixed and unchangeable characteristic parts in each preset file in the terminal to generate a signature file, and writing the signature file into a preset storage space of the terminal before the terminal leaves a factory; when the terminal is started up, the fixed and unchangeable characteristic parts in each preset file in the terminal are connected to generate a current signature file, the signature file stored in advance is read from a preset storage space, whether the current signature file is consistent with the signature file stored in advance or not is judged, and the preset file in the terminal before leaving the factory is restored under the condition that the inconsistency is determined. By means of the technical scheme, the preset files can be automatically recovered under the condition that the preset files are deleted by the user, so that the trouble that the system cannot be normally started and needs to be taken to a maintenance point for maintenance after the user ROOT is avoided, and the benefits of mobile phone manufacturers and operators are protected.

Description

Method and device for protecting preset file
Technical Field
The present invention relates to the field of mobile communications, and in particular, to a method and an apparatus for protecting a preset file.
Background
In the prior art, there are some system-related files, and after a user ROOT deletes the system, a situation that the system cannot be normally started occurs, in which case, the user usually needs to take a maintenance point to maintain and can normally start the system.
To prevent this, the current solution is to try to prevent the user ROOT system. Without the ROOT authority, the user cannot delete the preset file, but the ROOT of the user is very difficult to prevent, and after a period of time, the user can always find a method and software to go to the ROOT system, and then delete the file preset by the system. Therefore, a method for protecting a preset file in a terminal is urgently needed.
Disclosure of Invention
The present invention is proposed to provide a method and an apparatus for protecting a preset file, in view of the problem that a user ROOT system in the prior art causes the preset file of a terminal to be deleted.
The invention provides a method for protecting a preset file, which comprises the following steps:
connecting fixed and unchangeable characteristic parts in each preset file in the terminal to generate a signature file, and writing the signature file into a preset storage space of the terminal before the terminal leaves a factory;
when the terminal is started up, the fixed and unchangeable characteristic parts in each preset file in the terminal are connected to generate a current signature file, the signature file stored in advance is read from a preset storage space, whether the current signature file is consistent with the signature file stored in advance or not is judged, and the preset file in the terminal before leaving the factory is restored under the condition that the inconsistency is determined.
Preferably, the above method further comprises:
before the terminal leaves a factory, a fixed and unchangeable feature identifier is inserted into a preset file of the terminal, and the feature identifier is used as a feature part of a corresponding preset file.
Preferably, the characteristic portion includes: an authorization description of the preset file, specific attributes of the preset file, and/or the preset file itself.
Preferably, the connecting the fixed and unchangeable characteristic parts in each preset file in the terminal to generate the signature file specifically includes:
and connecting fixed and unchangeable characteristic parts in each preset file in the terminal by adopting a TAR tool of an L INUX operating system, and generating a signature file by adopting an information abstract algorithm 5.
Preferably, the predetermined storage space includes: a read only memory ROM, or other one time memory.
The invention also provides a device for protecting the preset file, which comprises:
the signature module is used for connecting fixed and unchangeable characteristic parts in each preset file in the terminal to generate a signature file, and writing the signature file into a preset storage space of the terminal before the terminal leaves a factory;
and the recovery module is used for connecting fixed and unchangeable characteristic parts in each preset file in the terminal to generate a current signature file when the terminal is started up every time, reading the pre-stored signature file from the preset storage space, judging whether the current signature file is consistent with the pre-stored signature file or not, and recovering the preset file in the terminal before leaving the factory under the condition of determining inconsistency.
Preferably, the signature module is further configured to:
before the terminal leaves a factory, a fixed and unchangeable feature identifier is inserted into a preset file of the terminal, and the feature identifier is used as a feature part of a corresponding preset file.
Preferably, the characteristic portion includes: an authorization description of the preset file, specific attributes of the preset file, and/or the preset file itself.
Preferably, the signature module is specifically configured to:
and connecting fixed and unchangeable characteristic parts in each preset file in the terminal by adopting a TAR tool of an L INUX operating system, and generating a signature file by adopting an information abstract algorithm 5.
Preferably, the predetermined storage space includes: a read only memory ROM, or other one time memory.
The invention has the following beneficial effects:
the signature files are generated by connecting the characteristic parts of all the preset files, the signature files are written into a preset storage space when the terminal leaves a factory, whether the signatures are consistent with the preset files or not is detected when the terminal is started, if the signatures are inconsistent with the preset files, the files are recovered and then used by a user, the problem that the preset files of the terminal are deleted due to a user ROOT system in the prior art is solved, the preset files can be automatically recovered under the condition that the preset files are deleted by the user, the trouble that the system cannot be normally started after the user ROOT and needs to be taken to a maintenance point to be maintained is avoided, and the benefits of mobile phone manufacturers and operators are protected.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart of a method of protecting a preset file according to an embodiment of the present invention;
FIG. 2 is a flow diagram of factory write signatures of an embodiment of the present invention;
FIG. 3 is a flow chart of a boot check signature according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an apparatus for protecting a preset file according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In order to solve the problem that a user ROOT system causes a terminal preset file to be deleted in the prior art, the invention provides a method and a device for protecting the preset file. The present invention will be described in further detail below with reference to the drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
Method embodiment
According to an embodiment of the present invention, there is provided a method for protecting a preset file, in the embodiment of the present invention, the method is used for a terminal installed with an android system, fig. 1 is a flowchart of the method for protecting a preset file according to the embodiment of the present invention, and as shown in fig. 1, the method for protecting a preset file according to the embodiment of the present invention includes the following processing:
step 101, connecting fixed and unchangeable characteristic parts in each preset file in a terminal to generate a signature file, and writing the signature file into a preset storage space of the terminal before the terminal leaves a factory; wherein the predetermined storage space includes: a read only memory ROM, or other one time memory.
In the embodiment of the invention, if the preset file does not have a fixed characteristic part, a fixed characteristic identifier can be inserted into the preset file of the terminal before the terminal leaves a factory, and the characteristic identifier is used as the characteristic part of the corresponding preset file;
preferably, the above feature portion includes: an authorization description of the preset file, specific attributes of the preset file, and/or the preset file itself. It should be noted that the characteristic portion refers to a portion that does not change with system upgrade, for example, how many first bytes of a preset file never change, a certain preset file never changes, and the like.
In step 101, a TAR tool of the L INUX operating system may be used to connect fixed and unchangeable feature portions in each preset file in the terminal, and a signature file is generated by using the information digest algorithm 5.
102, when the terminal is started up each time, connecting the fixed and unchangeable characteristic parts in each preset file in the terminal to generate a current signature file, reading the pre-stored signature file from a preset storage space, judging whether the current signature file is consistent with the pre-stored signature file, and restoring the preset file in the terminal before leaving the factory under the condition of determining inconsistency.
The technical solutions of the factory signature writing process and the startup signature verification process according to the embodiments of the present invention are described in detail below with reference to the accompanying drawings.
Fig. 2 is a flowchart of factory write signature according to an embodiment of the present invention, and as shown in fig. 2, the method specifically includes the following steps:
step 1, when leaving a factory, finding out or adding a characteristic part of a file to be protected, wherein the characteristic part is a part which is not changed along with system upgrade. For example, the authorization specification of the document, some attributes of the document such as the author, may be used as characteristic parts of the document. If not, some identification that does not change with the system upgrade may be inserted in the file. If the file itself is not changed along with the system upgrade, the whole file can be directly treated as a characteristic file;
step 2, reading the characteristic part of the file and saving the characteristic part of the file to a temporary file;
step 3, connecting all temporary files to generate a temporary file, wherein the connecting method can directly use a TAR tool of L INUX;
step 4, generating a signature according to the temporary file by adopting a certain algorithm such as an MD5 code algorithm;
and 5, storing the signature in a ROM or other one-time memories when the terminal leaves a factory.
Fig. 3 is a flowchart of a boot verification signature according to an embodiment of the present invention, and as shown in fig. 3, the boot verification signature includes the following steps:
step 1, after starting up, finding out a characteristic part of a preset application to be protected, wherein the method for obtaining the characteristic part is the same as the factory signature writing process;
step 2, reading the characteristic part of the file and saving the characteristic part of the file to a temporary file;
step 3, connecting all temporary files to generate a temporary file, wherein the connecting method can directly use a TAR tool of L INUX;
step 4, generating a signature according to the temporary file by adopting a certain algorithm such as an MD5 code algorithm;
step 5, checking whether the calculated signature is the same as the signature stored in the ROM, if so, executing step 6, otherwise, executing step 7;
and 6, normally using.
Step 7; some kind of recovery measure is used. For example, prompting the user to upgrade the system, restoring the preset file from the network, and the like, and using the system normally after restoration.
In summary, according to the technical solution of the embodiment of the present invention, signature files are generated by connecting characteristic portions of all preset files, and are written into a predetermined storage space when a terminal leaves a factory, and whether the signatures are consistent with the preset files is detected when the terminal is started, and if the signatures are not consistent with the preset files, the files are restored and then used by a user, so that the problem that the preset files of the terminal are deleted due to a user ROOT system in the prior art is solved, and the preset files can be automatically restored under the condition that the preset files are deleted by the user, thereby avoiding the trouble that the system cannot be normally started and needs to be taken to a maintenance point for maintenance after the user ROOT is deleted, and protecting the benefits of mobile phone manufacturers and operators.
Device embodiment
According to an embodiment of the present invention, there is provided an apparatus for protecting a preset file, fig. 4 is a schematic structural diagram of the apparatus for protecting a preset file according to an embodiment of the present invention, and as shown in fig. 4, the apparatus for protecting a preset file according to an embodiment of the present invention includes: the signature module 40 and the recovery module 42 are described below in detail with respect to the respective modules of the embodiment of the present invention.
The signature module 40 is configured to connect fixed and unchangeable feature portions in each preset file in the terminal to generate a signature file, and write the signature file into a predetermined storage space of the terminal before the terminal leaves a factory; wherein the predetermined storage space includes: a read only memory ROM, or other one time memory.
The signature module 40 is further configured to: before the terminal leaves a factory, inserting a fixed feature identifier into a preset file of the terminal, and taking the feature identifier as a feature part of a corresponding preset file;
the signature module 40 is specifically configured to connect fixed and unchangeable feature portions in each preset file in the terminal by using a TAR tool of the L INUX operating system, and generate a signature file by using an information digest algorithm 5.
In the embodiment of the present invention, the characteristic portion may further include: an authorization description of the preset file, specific attributes of the preset file, and/or the preset file itself.
And the restoring module 42 is configured to, when the terminal is started up each time, connect fixed and unchangeable feature parts in each preset file in the terminal to generate a current signature file, read a pre-stored signature file from a predetermined storage space, determine whether the current signature file is consistent with the pre-stored signature file, and restore the preset file in the terminal before leaving the factory if the current signature file is determined to be inconsistent with the pre-stored signature file.
In summary, in the embodiments of the present invention, the signature files are generated by connecting the characteristic portions of all the preset files, and when the terminal leaves the factory, the signature files are written into the predetermined storage space, and when the terminal is started, it is detected whether the signatures are consistent with the preset files, and if not, the signatures are recovered and then used by the user.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the present invention and its equivalent technology, it is intended that the present invention also include such modifications and variations.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. Rather, as the foregoing specification reflects, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Those skilled in the art will appreciate that the modules in the client in an embodiment may be adaptively changed and provided in one or more clients different from the embodiment. The modules of the embodiments may be combined into one module and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-assemblies. All of the features disclosed in this specification, and all of the processes or elements of any method or client so disclosed, may be combined in any combination, except that at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification may be replaced by an alternative feature serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components in a client loaded with a ranking website according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the description.

Claims (8)

1. A method for protecting a preset file, comprising:
after a plurality of preset files are stored in a terminal, connecting fixed and unchangeable characteristic parts in the preset files to generate a signature file, and writing the signature file into a preset storage space of the terminal before the terminal leaves a factory;
when the terminal is started up every time, the terminal reads a plurality of stored preset files, connects fixed characteristic parts in each preset file to generate a current signature file, reads the signature file stored in advance from the preset storage space, judges whether the current signature file is consistent with the signature file stored in advance or not, and restores the preset file in the terminal before leaving the factory under the condition of determining inconsistency;
wherein, the connecting the fixed and unchangeable characteristic parts in the plurality of preset files to generate the signature file comprises:
and connecting fixed and unchangeable characteristic parts in each preset file in the terminal by adopting a TAR tool of an L INUX operating system, and generating a signature file by adopting an information abstract algorithm 5.
2. The method of claim 1, wherein the method further comprises:
before the terminal leaves a factory, a fixed and unchangeable feature identifier is inserted into a preset file of the terminal, and the feature identifier is used as a feature part of a corresponding preset file.
3. The method of claim 2, wherein the characterizing portion further comprises: an authorization description of the preset file, specific attributes of the preset file, and/or the preset file itself.
4. The method of claim 1, wherein the predetermined storage space comprises: a read only memory ROM, or other one time memory.
5. An apparatus for protecting a preset file, comprising:
the signature module is used for connecting fixed and unchangeable characteristic parts in a plurality of preset files to generate a signature file after the preset files are stored in the terminal, and writing the signature file into a preset storage space of the terminal before the terminal leaves a factory;
the recovery module is used for reading a plurality of stored preset files by the terminal when the terminal is started up every time, connecting fixed and unchangeable characteristic parts in each preset file to generate a current signature file, reading the signature file stored in advance from the preset storage space, judging whether the current signature file is consistent with the signature file stored in advance or not, and recovering the preset file in the terminal before delivery when the current signature file is determined to be inconsistent with the signature file stored in advance;
the signature module is specifically used for connecting fixed and unchangeable characteristic parts in each preset file in the terminal by adopting a TAR tool of an L INUX operating system and generating a signature file by adopting an information abstract algorithm 5.
6. The apparatus of claim 5, wherein the signature module is further to:
before the terminal leaves a factory, a fixed and unchangeable feature identifier is inserted into a preset file of the terminal, and the feature identifier is used as a feature part of a corresponding preset file.
7. The apparatus of claim 6, wherein the characterization part further comprises: an authorization description of the preset file, specific attributes of the preset file, and/or the preset file itself.
8. The apparatus of claim 5, wherein the predetermined storage space comprises: a read only memory ROM, or other one time memory.
CN201410562056.6A 2014-10-21 2014-10-21 Method and device for protecting preset file Active CN105590065B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410562056.6A CN105590065B (en) 2014-10-21 2014-10-21 Method and device for protecting preset file

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410562056.6A CN105590065B (en) 2014-10-21 2014-10-21 Method and device for protecting preset file
PCT/CN2015/079224 WO2016062080A1 (en) 2014-10-21 2015-05-18 Profile protecting method and device, and storage medium

Publications (2)

Publication Number Publication Date
CN105590065A CN105590065A (en) 2016-05-18
CN105590065B true CN105590065B (en) 2020-07-31

Family

ID=55760217

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410562056.6A Active CN105590065B (en) 2014-10-21 2014-10-21 Method and device for protecting preset file

Country Status (2)

Country Link
CN (1) CN105590065B (en)
WO (1) WO2016062080A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108985104A (en) * 2018-07-20 2018-12-11 南昌黑鲨科技有限公司 The encryption method and intelligent terminal of intelligent terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7231635B2 (en) * 2000-04-28 2007-06-12 Sun Microsystems, Inc. Remote incremental program verification using API definitions
CN101582275A (en) * 2008-05-16 2009-11-18 索尼株式会社 Information processing apparatus, information recording medium, information processing method, and information processing program
CN102831031A (en) * 2011-06-17 2012-12-19 鸿富锦精密工业(深圳)有限公司 Recovery method and system for operating system
CN103577211A (en) * 2012-08-08 2014-02-12 上海赤炫信息科技有限公司 Novel packaging and burning as well as updating methods for Android ROM (read only memory) system
CN103729597A (en) * 2014-01-16 2014-04-16 宇龙计算机通信科技(深圳)有限公司 System starting verifying method and device and terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7788230B2 (en) * 2007-01-23 2010-08-31 International Business Machines Corporation Backing-up and restoring files including files referenced with multiple file names
CN101340675A (en) * 2008-08-27 2009-01-07 深圳华为通信技术有限公司 Method and apparatus for implementing backup and recovery by mobile terminal
CN103514065B (en) * 2012-06-29 2016-08-10 国基电子(上海)有限公司 Tool automatically detects and recovers electronic installation and the method for function

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7231635B2 (en) * 2000-04-28 2007-06-12 Sun Microsystems, Inc. Remote incremental program verification using API definitions
CN101582275A (en) * 2008-05-16 2009-11-18 索尼株式会社 Information processing apparatus, information recording medium, information processing method, and information processing program
CN102831031A (en) * 2011-06-17 2012-12-19 鸿富锦精密工业(深圳)有限公司 Recovery method and system for operating system
CN103577211A (en) * 2012-08-08 2014-02-12 上海赤炫信息科技有限公司 Novel packaging and burning as well as updating methods for Android ROM (read only memory) system
CN103729597A (en) * 2014-01-16 2014-04-16 宇龙计算机通信科技(深圳)有限公司 System starting verifying method and device and terminal

Also Published As

Publication number Publication date
WO2016062080A1 (en) 2016-04-28
CN105590065A (en) 2016-05-18

Similar Documents

Publication Publication Date Title
CN103699421B (en) Embedded device method for upgrading system and its device
CN102262574B (en) Boot protecting method and device of operating system
CN106250192B (en) Software upgrading method and system of upper computer
CN103729597A (en) System starting verifying method and device and terminal
US20160170735A1 (en) Operating system updating method by using a checklist
CN106325929B (en) Firmware upgrading method, firmware upgrading device, refrigerator and server
JP2013543200A (en) Networked recovery system
CN104636171A (en) Upgrading method and device and mobile device
CN105704296B (en) Application environment cloning method and device
CN106940651B (en) POS terminal software upgrading method and device
CN106897166B (en) Mobile terminal and repairing method thereof
US20150067316A1 (en) Electronic device and testing method
WO2018024198A1 (en) Application upgrade method and system for set-top box, and set-top box
WO2018032757A1 (en) Method and device for updating component
CN104484240B (en) Terminal data storage method and device
CN105550071B (en) System file upgrades and detection method, communication equipment
CN108196975B (en) Data verification method and device based on multiple checksums and storage medium
CN105590065B (en) Method and device for protecting preset file
CN108710549B (en) Method and device for ensuring stability of fingerprint data
CN109033818B (en) Terminal, authentication method, and computer-readable storage medium
CN106156626B (en) Method and device for safely upgrading system
CN107967193A (en) Boot starts method and embedded device
CN104572943A (en) Installation-free program cleaning method and device
WO2016082450A1 (en) Method for upgrading user terminal, and user terminal
EP3153968A1 (en) Multi-system terminal system updating method, updating device and terminal

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200701

Address after: Yuhuatai District of Nanjing City, Jiangsu province 210012 Bauhinia Road No. 68

Applicant after: Nanjing Zhongxing New Software Co.,Ltd.

Address before: 518057 Nanshan District Guangdong high tech Industrial Park, South Road, science and technology, ZTE building, Ministry of Justice

Applicant before: ZTE Corp.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant