CN106203002A - Software product guard method - Google Patents

Software product guard method Download PDF

Info

Publication number
CN106203002A
CN106203002A CN201510227639.8A CN201510227639A CN106203002A CN 106203002 A CN106203002 A CN 106203002A CN 201510227639 A CN201510227639 A CN 201510227639A CN 106203002 A CN106203002 A CN 106203002A
Authority
CN
China
Prior art keywords
license
software product
bootstrap
program
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510227639.8A
Other languages
Chinese (zh)
Other versions
CN106203002B (en
Inventor
施伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bangdao Technology Co., Ltd
Original Assignee
Longshine Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Longshine Science And Technology Co Ltd filed Critical Longshine Science And Technology Co Ltd
Priority to CN201510227639.8A priority Critical patent/CN106203002B/en
Publication of CN106203002A publication Critical patent/CN106203002A/en
Application granted granted Critical
Publication of CN106203002B publication Critical patent/CN106203002B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to field of computer technology; the present invention provides the guard method of a kind of software product; comprise step: generate license file; including step: isolate startup program and main body program from software product; integrate described startup program and license proving program; form bootstrap, merge described bootstrap, license information, generate described license file;Before running described main body program, verify described license file, be verified, then run described main body program.The software product guard method that the present invention provides, by improving license file and the verification mode of license information, can prevent license proving program to be bypassed or be modified, to reach to protect the purpose of software product.

Description

Software product guard method
Technical field
The present invention relates to field of computer technology, especially with respect to a kind of software product guard method.
Background technology
Java is a kind of object oriented program language that can write cross-platform software.Java technology has the versatility of brilliance, height Effect property, platform transplantation and safety, be widely used in PC, data center, game console, science supercomputer, mobile phone and interconnection Net.Java source code is compiled into Java bytecode file, Java Virtual Machine be responsible for Java bytecode file is explained execution, have The motility of height, but, as long as there being a decompiler, computer software being carried out decompiling, anyone can analyze java applet Source code so that source code is easy to be cracked and steals.Existing business software product all can be with the license literary composition authorized when selling or being on probation Part, contains the license information such as the manufacturer to software product, name of product, authorization message, effect duration, MAC binding in license file, License information is verified by software product by license proving program, is verified to obtain and uses authority accordingly, thus reaches The purpose of protection software product.But, owing to Java source code is easy to be stolen, then License can be cracked according to Java source code File, forges it or revises, or by amendment software product program code, walks around license proving program or amendment license tests Card program makes it lose efficacy, so that license file cannot protect software product, and ultimately results in business software product and is plagiarized or be tampered. As can be seen here, the most perfect protection software product has become the problem the most urgently studied.
Summary of the invention
In order to solve problem present in background technology, the present invention provides software product guard method, the method by improve license file and The verification mode of license information, can prevent license proving program to be bypassed or be modified, to reach to protect the purpose of software product.
The present invention provides the guard method of a kind of software product, comprises step: generate license file, including step: separate from software product Go out startup program and main body program, integrate described startup program and license proving program, form bootstrap, merge described bootstrap, License information, generates described license file;Before running described main body program, verify described license file, be verified, Then run described main body program.
In a preferred embodiment, when merging the described license file of generation, merge digital certificate and privacy key simultaneously.
In a preferred embodiment, before the described combining step in generating described license file, further include and described bootstrap is added Close step: be that described bootstrap generates digital digest by the private key of described digital certificate, and is described bootstrap by described privacy key And the digital digest of described bootstrap is encrypted, the encryption bootstrap obtained after encryption merges described with the digital digest of encryption bootstrap Step is incorporated in described license file.
In a preferred embodiment, before the described combining step in generating described license file, further include and described license information is entered The step of row encryption: be that described license information generates digital digest by the private key of described digital certificate, and is described by described privacy key The digital digest of license information and described license information is encrypted, the encryption license information obtained after encryption and encryption license The digital digest of information is incorporated in described license file in described combining step.
In a preferred embodiment, after described encrypting step, and before described combining step, further include the step to described secret key encryption: Being that described privacy key is encrypted by the private key of described digital certificate, the secret encryption key obtained after encryption is merged in described combining step To described license file.
In a preferred embodiment, the method for described checking described license information includes step: parse described from described license file Bootstrap and described license information;Perform the described license proving program in described bootstrap, described license information is carried out Checking;It is verified, then performs the described startup program in described bootstrap, and then run described main body program.
In a preferred embodiment, described license file is stored in mobile memory.
The guard method of the present invention software product by providing, by the startup program of software product being separated with main body program, and will start program Integrate with license proving program so that license information must be by the checking of license proving program, could properly functioning startup Program, and then run main body program, say, that if license information cannot pass through the checking of license proving program, or license tests Card program is bypassed, then the startup program of software product will be unable to properly functioning, so that the main body program of software product cannot add carrying at all OK, further, in presently preferred embodiments of the present invention, by bootstrap and license information and the encryption of privacy key, and Improvement to license file verification method, improve license file cracks difficulty, it is thus possible to preferably protect software product.
Accompanying drawing explanation
Fig. 1 illustrates the guard method flow chart of the software product that a preferred embodiment of the present invention is provided;
Fig. 2 illustrates the license document generating method flow chart provided in a preferred embodiment of the present invention;
Fig. 3 illustrates the license document generating method flow chart provided in a preferred embodiment of the present invention;
Fig. 4 illustrates the license document generating method flow chart provided in a preferred embodiment of the present invention;
Fig. 5 illustrates the license document generating method flow chart provided in a preferred embodiment of the present invention;
Fig. 6 illustrates the license file verification method flow diagram that a preferred embodiment of the present invention is provided.
Detailed description of the invention
For making technical scheme and advantage thereof definitely and in detail, illustrate hereinafter with reference to diagram.
Refer to Fig. 1, Fig. 1 and illustrate the guard method flow chart of the software product that a preferred embodiment of the present invention is provided.As it is shown in figure 1, software The guard method of product comprises step: generate license file;Checking license file, if being verified, then runs the main body of software product Program, if checking is not passed through, the most out of service.
Specifically, refer to Fig. 2, Fig. 2 and illustrate the license document generating method flow chart provided in a preferred embodiment of the present invention.As Shown in Fig. 2, the method generating license file comprises the steps of:
S1, isolates startup program and main body program from software product.The startup program of software product refers in the main body program running software product The Bootloader before having to carry out, such as, the main body program for software product carries running environment, carries out the main body program of software product Loading, say, that if the startup program of software product cannot normally perform, the main body program of software product will be unable to start.Software produces The main body program of product refer to realize the program of various concrete business function, be software product chief value embody.In this step, separate and start journey Sequence is by the way of code dehind with the mode of main body program, and the code of startup program Yu main body program is separated from each other independence.The enforcement of the present invention In example, the development language that software product uses is java language.
S2, integrates startup program and license proving program, forms bootstrap.In this step, program will be started by the way of integrating code Integrate with license proving program.
S3, merges bootstrap, license information, generates license file.In this step, by designing self-defined byte code files rule, Bootstrap, license information are written in same file according to self-defined byte code files rule, thus generate license file.This In inventive embodiment, license information is software product authorization information, comprises: manufacturer, name of product, authorization message, effect duration, MAC binding etc..
According in the license file that above-mentioned steps is generated, i.e. contain the license information of software product, contain again opening of software product Dynamic program and license proving program, by the startup program of software product being separated with main body program, and enter license starting integration procedure In file, add software product cracks difficulty, has reached to protect the purpose of software product.
In order to further promote the protection to software product, in other preferred embodiments of the present invention can by bootstrap or License information is encrypted, and increase license file cracks difficulty.By Fig. 3 to Fig. 5, those preferred embodiments will be entered respectively below Row describes in detail.
Refer to Fig. 3, Fig. 3 and illustrate the license document generating method flow chart provided in a preferred embodiment of the present invention.As it is shown on figure 3, The present embodiment is with the difference of embodiment illustrated in fig. 2, further includes step S203, after being positioned at step S2, before step S3.Step S203 It it is the step that bootstrap is encrypted.In the present embodiment, encryption bootstrap method is to be realized by the means of digital certificate and privacy key , specifically, including by the private key of digital certificate be bootstrap generate digital digest, and by privacy key be bootstrap and guiding journey The digital digest of sequence is encrypted, and obtains the digital digest encrypting bootstrap with encryption bootstrap.It is understood that what the present embodiment provided In license document generating method, step S3 is when merging generation license file, and merging is encryption bootstrap and encryption bootstrap Digital digest, from license document generating method shown in Fig. 2 step S3 merge content different, but merge method the most identical, Therefore do not repeating at this.The license file generated by the method in the present embodiment, owing to having done digital digest, and to two to bootstrap Person is encrypted, if it is desired to crack license file, the most not only it should be understood that self-defined byte code files is regular, in addition it is also necessary to complete To bootstrap and the correct deciphering of digital digest thereof, and by the checking of bootstrap digital digest, it can be seen that, carried by the present embodiment The license document generating method of confession, can promote the difficulty that cracks of license file greatly, thus provide more solid to software product Protection.
Refer to Fig. 4, Fig. 4 and illustrate the license document generating method flow chart provided in a preferred embodiment of the present invention.As shown in Figure 4, The present embodiment is with the difference of embodiment illustrated in fig. 3, further includes step S213, before being positioned at step S3.Step S213 is to believe license The step that breath is encrypted.In the present embodiment, the method for encryption license information is to be realized by the means of digital certificate and privacy key, Specifically, including by the private key of digital certificate be license information generate digital digest, and by privacy key be license information and The digital digest of license information is encrypted, and obtains the digital digest encrypting license information with encryption license information.May be appreciated It is that, in the license document generating method that the present embodiment provides, step S3 is when merging generation license file, and merging is encryption license Information and the digital digest of encryption license information, different from the content that step S3 in license document generating method shown in Fig. 3 merges, But the method merged is the most identical, therefore is not repeating at this.Being not difficult to find out, the present embodiment is improvement, phase further based on embodiment illustrated in fig. 3 For the embodiment shown in Fig. 2, not only bootstrap is encrypted, also license information is encrypted too, thus may be used See, the license file generated by the method for the present embodiment not only possess the license file of Fig. 2 and embodiment illustrated in fig. 3 generation Feature, also by the encryption to license information so that license file to crack step more complicated, thus further improve license File crack difficulty.It is understood that step S213 in the present embodiment is independent with step S203 each other, say, that In other embodiments of the present invention, in the method generating license file, it is also possible to according to actual demand, only comprise and license information is added Close step S213, and do not comprise step S203 that bootstrap is encrypted, therefore this embodiment, also should belong to the model that the present invention is protected Farmland.
Refer to Fig. 5, Fig. 5 and illustrate the license document generating method flow chart provided in a preferred embodiment of the present invention.As it is shown in figure 5, The present embodiment is with the difference of embodiment illustrated in fig. 4, further includes step S223, after being positioned at step S203 and S213, before step S3. Step S223 is the step being encrypted privacy key.In the present embodiment, the method for secret encryption key is to be secret by the private key of digital certificate Decryption key is encrypted, and obtains secret encryption key.It is understood that in the license document generating method of the present embodiment offer, compared to For embodiment illustrated in fig. 4, step S3 merge generate license file time, not only incorporate encryption bootstrap and encryption digital digest, Encryption license information and encryption digital digest, still further incorporate secret encryption key, same, the method for merging is the most identical, Therefore do not repeating at this.
It should be noted that Fig. 3 in the embodiment shown in 5, in newly-increased step S203, S213 or S223, the cryptographic means of use is all Be the private key by digital certificate and privacy key, owing to license file is during normal use, need to be decrypted and verify, and decipher and The PKI of the digital certificate needed for checking and privacy key the most all comprise respectively in digital certificate files and privacy key file, it is to be understood that In the embodiment shown in Fig. 3 to Fig. 5, the file merged in step S3 has further included digital certificate and privacy key (or secret encryption key).
By above-mentioned diagram and description, the method for the generation license file in the method for protecting software of the present invention is described in detail, below In conjunction with diagram, the method for the license file verification in embodiment illustrated in fig. 1 will be described in detail.
Refer to Fig. 6, Fig. 6 and illustrate the license file verification method flow diagram that a preferred embodiment of the present invention is provided.Testing in the present embodiment Card method, is the verification method of the license file generated for embodiment illustrated in fig. 2, as shown in Figure 6, license file verification method bag Include following steps:
A1, parses bootstrap and license information from license file.Specifically, when software product starts, owing to starting journey Sequence is separated and is merged and is written in License file, cannot be completed the normal startup of software product by normal approach, so Java must be passed through The bottom ClassLoader extension mechanism that virtual machine provides, extension realizes self-defining ClassLoader, self-defined ClassLoader takes over Java Virtual Machine is to starting loading and the process of execution of program, by the rewriting to findclass method, according to self-defined byte code files rule, License file is resolved, restores bootstrap, perform bootstrap.
A2, performs the license proving program in bootstrap, verifies license information.After bootstrap is resolved and restores Then can perform bootstrap, in embodiments of the invention, after bootstrap is performed, begin to be taken over whole start-up course by bootstrap.Draw License information is the most first resolved reduction from license file by helical pitch sequence, then by internal license proving program pair License information is verified.Wherein, in embodiments of the invention, license proving program can by the way of validity verification or effectively License information is verified by the mode of phase and marc address binding, but the present invention is not limited to this, it is also possible to entered by other verification modes Row checking.
By license proving program, license information is verified, according to the result, select follow-up processing mode, if being verified, Then perform the startup program in bootstrap, and then run main body program, to complete the normal startup of software product;If checking is not passed through, the most directly The execution of escape leading program, software product will be unable to start.
License file verification method provided in the embodiment of the present invention, need to first call self defined class loader, according to generating license file Time the self-defined byte code files rule that used license file carries out resolving reduction, then performed license proving program by bootstrap, To complete the checking of license information.Obtaining before license information authentication results, either the startup program of software product or main body journey Sequence, all without there being any action, thus the checking avoiding license information is bypassed, and software product is provided protection.
In verification method for the license file generated in Fig. 3 to embodiment illustrated in fig. 5, further include the numeral card in license file Book and privacy key (or secret encryption key) resolve, and are decrypted bootstrap, license information and corresponding digital digest Process with checking, it can be seen that, the verification method of license file is different, further by the difference along with license document generating method Improve the difficulty that license proving program is cracked or walks around.
In sum, by the improvement to license file in method for protecting software provided by the present invention, and strictly license file is tested Card process carries out management and control, improves license file and cracks difficulty, and the difficulty that software product is modified.For instance, if it is desired to crack figure The license file generated in 5 illustrated embodiments, it is necessary first to the self-defined bytecode structure of correct understanding license file, the most complete Parse all modules, forge PKI, private key, privacy key, License information, and according to the regular and self-defined byte of encryption logic Code document convention regenerates License file or decompiling restores bootstrap, extracts the startup-program code in bootstrap, translates main body Program, joins startup code in software agent, thus walks around License checking procedure, it can be seen that, cracking programs is extremely complex, difficulty The highest.
More further, in order to more preferably provide protection to software product, license file can be written in the mobile memories such as USBKey, And in the findclass method of self defined class loader ClassLoader, perform to read the step of License file from USBKey, thus Complete to guide and proof procedure.

Claims (7)

1. the guard method of a software product, it is characterised in that comprise step:
Generate license file, including step:
From software product, isolate startup program and main body program, integrate described startup program and license proving program, form bootstrap, close And described bootstrap, license information, generate described license file;
Before running described main body program, verify the license information in described license file, be verified, then run described main body program.
2. the guard method of software product as claimed in claim 1, it is characterised in that when merging the described license file of generation, simultaneously merge numeral Certificate and privacy key.
3. the guard method of software product as claimed in claim 2, it is characterised in that the described combining step in generating described license file it Before, further include the step that described bootstrap is encrypted: be that described bootstrap generates digital digest by the private key of described digital certificate, And be encrypted by the digital digest that described privacy key is described bootstrap and described bootstrap, the encryption obtained after encryption guides journey Sequence is incorporated in described license file with the digital digest of encryption bootstrap in described combining step.
4. the guard method of software product as claimed in claim 3, it is characterised in that the described combining step in generating described license file it Before, further include the step that described license information is encrypted: be that described license information generates numeral by the private key of described digital certificate Summary, and be encrypted by the digital digest that described privacy key is described license information and described license information, obtain after encryption Encryption license information is incorporated in described license file with the digital digest of encryption license information in described combining step.
5. the guard method of software product as claimed in claim 4, it is characterised in that after described encrypting step, and before described combining step, Further include the step to described secret key encryption: be that described privacy key is encrypted by the private key of described digital certificate, obtain after encryption Secret encryption key be incorporated in described combining step in described license file.
6. the guard method of software product as claimed in claim 1, it is characterised in that the method for described checking described license information includes step: Described bootstrap and described license information is parsed from described license file; Perform the described license proving program in described bootstrap, described license information is verified.
7. software product as claimed in claim 1 comprise method, it is characterised in that described license file is stored in mobile memory.
CN201510227639.8A 2015-05-06 2015-05-06 Software product guard method Active CN106203002B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510227639.8A CN106203002B (en) 2015-05-06 2015-05-06 Software product guard method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510227639.8A CN106203002B (en) 2015-05-06 2015-05-06 Software product guard method

Publications (2)

Publication Number Publication Date
CN106203002A true CN106203002A (en) 2016-12-07
CN106203002B CN106203002B (en) 2019-09-03

Family

ID=57459601

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510227639.8A Active CN106203002B (en) 2015-05-06 2015-05-06 Software product guard method

Country Status (1)

Country Link
CN (1) CN106203002B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112257033A (en) * 2020-10-14 2021-01-22 郑州阿帕斯数云信息科技有限公司 Application packaging method, device and equipment
CN114722356A (en) * 2021-01-04 2022-07-08 武汉斗鱼鱼乐网络科技有限公司 Method, device, medium and equipment for protecting copyright based on block chain

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2373604A (en) * 2001-03-23 2002-09-25 Ibm Authenticating software programs
JP2005242627A (en) * 2004-02-26 2005-09-08 Tadayuki Saito Method for authenticating license of software by portable recording medium
CN101441692A (en) * 2008-11-21 2009-05-27 北京市研祥兴业国际智能科技有限公司 Method for binding computer hardware and software
CN101872404A (en) * 2009-04-21 2010-10-27 普天信息技术研究院有限公司 Method for protecting Java software program
CN102272738A (en) * 2008-12-29 2011-12-07 Sk电信有限公司 Method for separately executing software, apparatus, and computer-readable recording medium
CN102314578A (en) * 2011-09-26 2012-01-11 浪潮(北京)电子信息产业有限公司 System and method for realizing software protection
CN102456111A (en) * 2011-07-12 2012-05-16 中标软件有限公司 Method and system for license control of Linux operating system
CN103065072A (en) * 2011-10-21 2013-04-24 北京大学 Method and device to improve Java software jailbreak difficulty and copyright verification method
CN103971034A (en) * 2014-04-24 2014-08-06 福建联迪商用设备有限公司 Method and device for protecting Java software

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2373604A (en) * 2001-03-23 2002-09-25 Ibm Authenticating software programs
JP2005242627A (en) * 2004-02-26 2005-09-08 Tadayuki Saito Method for authenticating license of software by portable recording medium
CN101441692A (en) * 2008-11-21 2009-05-27 北京市研祥兴业国际智能科技有限公司 Method for binding computer hardware and software
CN102272738A (en) * 2008-12-29 2011-12-07 Sk电信有限公司 Method for separately executing software, apparatus, and computer-readable recording medium
CN101872404A (en) * 2009-04-21 2010-10-27 普天信息技术研究院有限公司 Method for protecting Java software program
CN102456111A (en) * 2011-07-12 2012-05-16 中标软件有限公司 Method and system for license control of Linux operating system
CN102314578A (en) * 2011-09-26 2012-01-11 浪潮(北京)电子信息产业有限公司 System and method for realizing software protection
CN103065072A (en) * 2011-10-21 2013-04-24 北京大学 Method and device to improve Java software jailbreak difficulty and copyright verification method
CN103971034A (en) * 2014-04-24 2014-08-06 福建联迪商用设备有限公司 Method and device for protecting Java software

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112257033A (en) * 2020-10-14 2021-01-22 郑州阿帕斯数云信息科技有限公司 Application packaging method, device and equipment
CN114722356A (en) * 2021-01-04 2022-07-08 武汉斗鱼鱼乐网络科技有限公司 Method, device, medium and equipment for protecting copyright based on block chain

Also Published As

Publication number Publication date
CN106203002B (en) 2019-09-03

Similar Documents

Publication Publication Date Title
CN103827880B (en) The method for protecting non-native code security
US10797868B2 (en) Shared secret establishment
CN109313677B (en) Method and apparatus for dynamically executable verification
EP3038004A1 (en) Method for providing security for common intermediate language-based program
CN104156659A (en) Embedded system secure start method
CN106650341A (en) Android application reinforcement method based on the process confusion technology
DE102006046456A1 (en) Circuit arrangement for controlling access to cryptographic function of cryptographic unit, has cryptographic unit for providing cryptographic function and access control interface examines access requirement of application computer program
CN108304698B (en) Product authorized use method and device, computer equipment and storage medium
CN109657479B (en) Data leakage prevention method and computer readable storage medium
CN106372497B (en) Application programming interface API protection method and protection device
CN108259479B (en) Business data processing method, client and computer readable storage medium
CN104318135A (en) Java code safety dynamic loading method on basis of trusted execution environment
CN111984962A (en) Firmware security verification method and device
CN111191195A (en) Method and device for protecting APK
CN107430650A (en) Computer program is protected to resist reverse-engineering
CN103971034A (en) Method and device for protecting Java software
CN109598104A (en) Soft ware authorization based on timestamp and secret authentication file protects system and method
CN105893837A (en) Application program installation method, security encryption chip and terminal
Oka Building secure cars: assuring the automotive software development lifecycle
CN106203002A (en) Software product guard method
CN113592497A (en) Financial transaction service security authentication method and device based on block chain
CN104504309A (en) Data encryption method and terminal for application program
CN112115430A (en) Apk reinforcement method, electronic equipment and storage medium
CN115795438A (en) Method and system for authorizing application program and readable storage medium
CN113297563B (en) Method and device for accessing privileged resources of system on chip and system on chip

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Wuxi District of Jiangsu city of Wuxi province Zhenze road 214131 No. 18 Wuxi Software Park, whale D Building Room 601

Patentee after: Lanxin Technology Group Co., Ltd

Address before: Wuxi District of Jiangsu city of Wuxi province Zhenze road 214131 No. 18 Wuxi Software Park, whale D Building Room 601

Patentee before: LONGSHINE TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder
CP02 Change in the address of a patent holder

Address after: 214135 floor 10 and 11, building B, swan tower, Wuxi Software Park, No. 90, Jinghui East Road, Xinwu District, Wuxi City, Jiangsu Province

Patentee after: Lanxin Technology Group Co., Ltd

Address before: Wuxi District of Jiangsu city of Wuxi province Zhenze road 214131 No. 18 Wuxi Software Park, whale D Building Room 601

Patentee before: Lanxin Technology Group Co., Ltd

CP02 Change in the address of a patent holder
TR01 Transfer of patent right

Effective date of registration: 20210309

Address after: 214028 10th floor, building B, swan block, Wuxi Software Park, 111 Linghu Avenue, Xinwu District, Wuxi City, Jiangsu Province

Patentee after: Bangdao Technology Co., Ltd

Address before: 214135 10th and 11th floors, building B, swan block, Wuxi Software Park, No. 90, Jinghui East Road, Xinwu District, Wuxi City, Jiangsu Province

Patentee before: Lanxin Technology Group Co.,Ltd.

TR01 Transfer of patent right