CN106557700B - A kind of gauging system and method for trusted computer - Google Patents

A kind of gauging system and method for trusted computer Download PDF

Info

Publication number
CN106557700B
CN106557700B CN201611058840.9A CN201611058840A CN106557700B CN 106557700 B CN106557700 B CN 106557700B CN 201611058840 A CN201611058840 A CN 201611058840A CN 106557700 B CN106557700 B CN 106557700B
Authority
CN
China
Prior art keywords
oprom
trusted computer
check information
calibration equipment
mainboard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611058840.9A
Other languages
Chinese (zh)
Other versions
CN106557700A (en
Inventor
肖佐楠
郑茳
匡启和
王廷平
秦赟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCore Technology Suzhou Co Ltd
Original Assignee
CCore Technology Suzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCore Technology Suzhou Co Ltd filed Critical CCore Technology Suzhou Co Ltd
Priority to CN201611058840.9A priority Critical patent/CN106557700B/en
Publication of CN106557700A publication Critical patent/CN106557700A/en
Application granted granted Critical
Publication of CN106557700B publication Critical patent/CN106557700B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of gauging systems and method for trusted computer, the system includes: the credible measurement portion in trusted computer and the OPROM calibration equipment that connect with trusted computer, OPROM calibration equipment be used to store the data progress Hash verification in mainboard SPI Flash to trusted computer OPROM check information and corresponding check results;Credible measurement portion carries out Hash verification to the data in the mainboard SPI Flash of trusted computer for reading and replicating OPROM check information, according to OPROM check information, and corresponding check results are stored to OPROM calibration equipment.OPROM check information is stored using external OPROM calibration equipment, to be verified to the data in the SPI Flash in trust computing mainboard, and store corresponding check results, after trusted computer enters operating system, user can be directly viewable the check results of record, and be not necessarily to modify to mainboard BIOS during this and modify without to hardware, it is convenient to realize, reduces additional hardware cost.

Description

A kind of gauging system and method for trusted computer
Technical field
The present invention relates to reliable computing technology fields, more particularly to a kind of gauging system for trusted computer and side Method.
Background technique
With the development of information technology, in order to guarantee to calculate the safety with communication system entirety, in calculating and communication system Trust computing is introduced in system, trust computing is being calculated and is being widely used in communication system based under hardware security module support Credible calculating platform.
Since the 1970s, many trust computings are proposed from application program, operating system and hardware view Platform, but wherein most practical is credible calculating platform based on hardware platform.Trust computing purpose is to ensure row It for safety, and proposes that one kind can surmount default safety regulation, executes the run entity of special behavior.Due to computer network The continuous development of application, computer information safe problem emerge one after another, and taking other technologies means all will be difficult to make up due to meter Safety defect existing for calculation machine itself and insincere factor give information security bring hidden danger.Therefore, it goes to develop from hardware view Trusted computer is really to realize the developing direction of trust computing at present.In existing trusted computer platform, in order to protect The secure and trusted of credible calculating platform is demonstrate,proved, needs to measure the BIOS etc. of hardware system mainboard.But in existing measurement In scheme, generally involves the modification to the BIOS of hardware system mainboard or is related to the modification to hardware to complete to measure, This improves the hardware cost of measurement.
Thus, how when carrying out credible and secure measurement to the hardware system in calculating and communication system, avoid being related to pair The BIOS or hardware of mainboard modify, and are that those skilled in the art need to solve at present to reduce additional hardware cost The technical issues of.
Summary of the invention
It, can be to calculating and logical the object of the present invention is to provide a kind of gauging system and method for trusted computer When hardware system in letter system carries out credible and secure measurement, avoid being related to modifying to the BIOS or hardware of mainboard, with Reduce additional hardware cost.
In order to solve the above technical problems, the present invention provides the following technical scheme that
A kind of gauging system for trusted computer, comprising: credible measurement portion in trusted computer and with institute The OPROM calibration equipment of trusted computer connection is stated,
Wherein, the OPROM calibration equipment be used to store the data in mainboard SPI Flash to the trusted computer into The OPROM check information of row Hash verification and corresponding check results;
The credible measurement portion is for reading and replicating the OPROM check information, according to the OPROM check information pair Data in the mainboard SPI Flash of the trusted computer carry out Hash verification, and corresponding check results are stored to described OPROM calibration equipment.
Preferably, the OPROM calibration equipment is PCIe card, and the PCIe card passes through PCIE bus and the trust computing Machine connection.
Preferably, the credible measurement portion includes:
BIOS module for booting up self-test when the trusted computer powers on, and scans the PCIE bus, reads Take and replicate the OPROM check information;
Memory portion, for storing the OPROM check information of the BIOS module duplication;
Execution module, for according to the OPROM check information stored in the memory portion to the trusted computer Mainboard SPI Flash in data carry out Hash verification, and corresponding check results are stored into the PCIe card.
Preferably, the BIOS module includes:
Self-test unit, for booting up self-test when the trusted computer powers on;
Whether detection unit detects in the PCIe card for scanning the PCIE bus comprising OPROM verification letter Breath when in the PCIe card comprising the OPROM check information, is written the OPROM base address register of the PCIe card Free address in the system address space of one trusted computer;
Reading unit, for reading the content at the base address OPROM, judge reading value two bytes of head whether be 0x55AA;
Copied cells, when for determining two bytes of head of the reading value for 0x55AA in the reading unit, duplication OPROM check information in the PCIe card is to the memory portion.
A kind of measure for trusted computer, comprising:
Read the mainboard being used for the trusted computer in the OPROM calibration equipment being arranged in trusted computer Data in SPI Flash carry out the OPROM check information of Hash verification;
The OPROM check information is replicated into the memory of the trusted computer;
The school Hash is carried out to the data in the mainboard SPI Flash of the trusted computer according to the OPROM check information It tests;
The Hash is verified corresponding check results to store into the OPROM calibration equipment.
Preferably, it reads in the OPROM calibration equipment being arranged in trusted computer and is used for the trusted computer Mainboard SPI Flash in data carry out Hash verification OPROM check information, comprising:
Obtain the power on signal of the trusted computer;
The PCIE bus in the trusted computer is scanned, the OPROM calibration equipment in the PCIE bus is detected;
Whether judge in the OPROM calibration equipment comprising the OPROM check information;
If so, the trusted computer is written in the OPROM base address register to the OPROM calibration equipment Free address in system address space;
Read the content at the base address OPROM of the base address register of the OPROM calibration equipment;
Whether the byte for judging the predeterminated position of reading value is preset value;
If so, extracting the OPROM check information;
If it is not, then sending starting triggering command to the operating system of the trusted computer.
Preferably, whether the byte of the predeterminated position for judging reading value is preset value, are as follows:
Whether two bytes of head for judging the reading value are 0x55AA.
Compared with prior art, above-mentioned technical proposal has the advantage that
The gauging system of trusted computer is used for provided by the embodiment of the present invention, comprising: in trusted computer Credible measurement portion and the OPROM calibration equipment connecting with trusted computer, OPROM calibration equipment is for storing to trusted computer Mainboard SPI Flash in data carry out Hash verification OPROM check information and corresponding check results;Credible measurement Portion is for reading and replicating OPROM check information, according to OPROM check information in the mainboard SPI Flash of trusted computer Data carry out Hash verification, and corresponding check results are stored to OPROM calibration equipment.It is external using trusted computer OPROM calibration equipment stores OPROM check information, for carrying out to the data in the SPI Flash in trust computing mainboard Verification, and corresponding check results are stored, in this way after trusted computer enters operating system, user can be directly viewable The check results recorded in OPROM calibration equipment are completed the purpose of OPROM metric computer, and are not necessarily to during this to mainboard BIOS modifies to modify without to hardware, and it is convenient to realize, reduces additional hardware cost.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 is the gauging system structural representation that trusted computer is used for provided by a kind of specific embodiment of the present invention Figure;
Fig. 2 is the measure flow chart that trusted computer is used for provided by a kind of specific embodiment of the present invention.
Specific embodiment
Core of the invention is to provide a kind of gauging system and method for trusted computer, can be to calculating and logical When hardware system in letter system carries out credible and secure measurement, avoid being related to modifying to the BIOS or hardware of mainboard, with Reduce additional hardware cost.
It is understandable in order to enable the above objects, features and advantages of the present invention to become apparent, with reference to the accompanying drawing to this hair Bright specific embodiment is described in detail.
Detail is elaborated in the following description to fully understand the present invention.But the present invention can with it is a variety of not Other way described herein is same as to implement, those skilled in the art can do class without violating the connotation of the present invention Like popularization.Therefore the present invention is not limited by following public specific embodiment.
Referring to FIG. 1, Fig. 1 is the gauging system for being used for trusted computer provided by a kind of specific embodiment of the present invention Structural schematic diagram.
A kind of specific embodiment of the invention provides a kind of gauging system for trusted computer, comprising: is located at Credible measurement portion 1 in trusted computer and the OPROM calibration equipment 2 being connect with trusted computer, wherein OPROM verification is set Standby 2 data for storing in the mainboard SPI Flash to trusted computer carry out the OPROM check information of Hash verification, and Corresponding check results;Credible measurement portion 1 is for reading and replicating OPROM check information, according to OPROM check information to credible Data in the mainboard SPI Flash of computer carry out Hash verification, and corresponding check results are stored to OPROM calibration equipment 2.In the present embodiment, OPROM calibration equipment 2 is preferably PCIe card, and PCIe card is connected by PCIE bus and trusted computer It connects.
In the present embodiment, it is loaded into using OPROM calibration equipment in the SPI memory to the mainboard of trusted computer The check information that data are verified can get rid of the space limitation of trusted computer ROM.It is credible when being carried out to trusted computer When measurement, it is only necessary to read and replicate OPROM verification from OPROM calibration equipment by the credible measurement portion in trusted computer Information, and Hash verification is carried out to the data in the mainboard SPI Flash of trusted computer according to the OPROM check information, in school Corresponding check results are stored to OPROM calibration equipment after the completion of testing.In this way, working as the os starting of trusted computer Afterwards, only need to operate trusted computer checks that OPROM calibration equipment memory can view the check results.This programme passes through OPROM measures computer, and it is convenient to realize, and modifies without modifying to mainboard BIOS without to hardware, Reduce additional hardware cost.
It should be noted that so-called OPROM refers to expansion ROM, i.e., one group is stored in PCIE device card memory Firmware program, this group of program can be called during startup self-detection by the system bios of host.
On the basis of the above embodiment, in one embodiment of the invention, credible measurement portion includes:
BIOS module for booting up self-test when trusted computer powers on, and scans PCIE bus, reads and replicates OPROM check information;
Memory portion, for storing the OPROM check information of BIOS module duplication;
Execution module, for the mainboard SPI Flash according to the OPROM check information stored in memory portion to trusted computer In data carry out Hash verification, and corresponding check results are stored into PCIe card.
Wherein, BIOS module includes:
Self-test unit, for booting up self-test when trusted computer powers on;
Detection unit, for scanning PCIE bus, whether include OPROM check information, in PCIe card if detecting in PCIe card In when including OPROM check information, the OPROM base address register of PCIe card is written the system address of a trusted computer Free address in space;
Reading unit, for reading the content at the base address OPROM, judge reading value two bytes of head whether be 0x55AA;
Copied cells when for determining two bytes of head of reading value in reading unit for 0x55AA, replicate in PCIe card OPROM check information to memory portion.
In the present embodiment, the basic input output system in BIOS module, that is, computer is one group and is cured to meter The program on a rom chip of mainboard is calculated, this group of program includes the program of the most important basic input and output of computer, opens Machine self-check program and system self-triggered program.The major function of BIOS is that the bottom, most direct hardware are provided for computer It is set and controlled.
When trusted computer powers on and starts, the self-test unit in BIOS module starts startup self-detection;Then detection is single Member scanning PCIE bus is to check the PCIe card in bus;Whether include OPROM check information, in this implementation if detecting in PCIe card OPROM check information includes OPROM program and Hash checking algorithm in mode, and configuration address is to the base OPROM of PCIe card Location register;Then reading unit read the base address OPROM at content, judge reading value two bytes of head whether be 0x55AA;If two bytes of the head of reading value are not 0x55AA, the inspection to OPROM is skipped, and then continues to start credible meter The operating system of calculation machine;If two bytes of the head of reading value are 0x55AA, copied cells replicate the OPROM verification in PCIe card Information copies to OPROM check information in the free memory inside trusted computer, to memory portion then in trust computing OPROM program is executed in the memory of machine, OPROM program is according to preset Hash checking algorithm in computer motherboard SPI Flash Data carry out Hash verification, and corresponding check results are stored in the memory of PCIe card, at this point, BIOS module will be credible The control of computer gives the operating system of computer, and the operating system of computer starts to start, and enters operation in computer After system, the operation for responding user can check the memory of PCIe card, to obtain check results.
Referring to FIG. 2, Fig. 2 is the measure for being used for trusted computer provided by a kind of specific embodiment of the present invention Flow chart.
Correspondingly, one embodiment of the present invention additionally provides a kind of measure for trusted computer, comprising:
S11: the mainboard being used for trusted computer in the OPROM calibration equipment being arranged in trusted computer is read Data in SPI Flash carry out the OPROM check information of Hash verification.
Wherein, the mainboard being used for trusted computer in the OPROM calibration equipment being arranged in trusted computer is read Data in SPI Flash carry out the OPROM check information of Hash verification, comprising:
The power on signal for obtaining trusted computer, boots up self-test to control trusted computer;
The PCIE bus in trusted computer is scanned, the OPROM calibration equipment in PCIE bus is detected;
Whether judge in OPROM calibration equipment comprising OPROM check information;
If so, the OPROM base address register of OPROM calibration equipment is written the system address of a trusted computer Free address in space;
Read the content at the base address OPROM of the base address register of OPROM calibration equipment;
Whether the byte for judging the predeterminated position of reading value is preset value, and preferably the preset value is 0x55AA;
If so, extracting OPROM check information;
If it is not, then sending starting triggering command to the operating system of trusted computer.
S12: duplication OPROM check information is into the memory of trusted computer.
S13: Hash verification is carried out to the data in the mainboard SPI Flash of trusted computer according to OPROM check information.
S14: Hash is verified into corresponding check results and is stored into OPROM calibration equipment.
In the present embodiment, in the computer booting self-test stage, letter is verified by the OPROM in OPROM calibration equipment Breath verifies the data in SPI Flash on computer motherboard, and check results is stored on OPROM calibration equipment, In Computer can check the record in OPROM calibration equipment after entering operating system to obtain check results, complete OPROM measurement The purpose of computer measures computer by OPROM, and it is convenient to realize, and without to mainboard BIOS modify also without It need to modify to hardware, reduce additional hardware cost.
In conclusion the gauging system and method provided by the present invention for trusted computer, is set by OPROM verification OPROM check information in standby verifies the data in SPI Flash on computer motherboard, and check results are stored in On OPROM calibration equipment, the record in OPROM calibration equipment can be checked to be verified after computer enters operating system As a result, being measured by OPROM to computer, it is convenient to realize, and without modifying mainboard BIOS without to hardware It modifies, reduces additional hardware cost.
A kind of gauging system and method for trusted computer provided by the present invention is described in detail above.This Apply that a specific example illustrates the principle and implementation of the invention in text, the explanation of above example is only intended to Help understands the present invention and its core concept.It should be pointed out that for those skilled in the art, not departing from , can be with several improvements and modifications are made to the present invention under the premise of the principle of the invention, these improvement and modification also fall into this hair In bright scope of protection of the claims.

Claims (2)

1. a kind of gauging system for trusted computer characterized by comprising the credible measurement in trusted computer Portion and the OPROM calibration equipment being connect with the trusted computer,
Wherein, the data that the OPROM calibration equipment is used to store in the mainboard SPI Flash to the trusted computer carry out The OPROM check information of Hash verification and corresponding check results;
The credible measurement portion is for reading and replicating the OPROM check information, according to the OPROM check information to described Data in the mainboard SPI Flash of trusted computer carry out Hash verification, and corresponding check results are stored to the OPROM Calibration equipment;
The OPROM calibration equipment is PCIe card, and the PCIe card is connected by PCIE bus with the trusted computer;
The credible measurement portion includes:
BIOS module for booting up self-test when the trusted computer powers on, and scans the PCIE bus, read and Replicate the OPROM check information;
Memory portion, for storing the OPROM check information of the BIOS module duplication;
Execution module, for the master according to the OPROM check information stored in the memory portion to the trusted computer Data in plate SPI Flash carry out Hash verification, and corresponding check results are stored into the PCIe card;
The BIOS module includes:
Self-test unit, for booting up self-test when the trusted computer powers on;
Detection unit, whether for scanning the PCIE bus, detecting in the PCIe card includes the OPROM check information, When including the OPROM check information in the PCIe card, one is written to the OPROM base address register of the PCIe card Free address in the system address space of the trusted computer;
Reading unit judges whether two bytes of head of reading value are 0x55AA for reading the content at the base address OPROM;
Copied cells, when for determining two bytes of head of the reading value for 0x55AA in the reading unit, described in duplication OPROM check information in PCIe card is to the memory portion.
2. a kind of measure for trusted computer characterized by comprising
Read the mainboard SPI Flash being used for the trusted computer in the OPROM calibration equipment connecting with trusted computer In data carry out Hash verification OPROM check information;
The OPROM check information is replicated into the memory of the trusted computer;
Hash verification is carried out to the data in the mainboard SPI Flash of the trusted computer according to the OPROM check information;
The Hash is verified corresponding check results to store into the OPROM calibration equipment;
Read the mainboard SPI Flash being used for the trusted computer in the OPROM calibration equipment connecting with trusted computer In data carry out Hash verification OPROM check information, comprising:
Obtain the power on signal of the trusted computer;
The PCIE bus in the trusted computer is scanned, the OPROM calibration equipment in the PCIE bus is detected;
Whether judge in the OPROM calibration equipment comprising the OPROM check information;
If so, the system that a trusted computer is written to the OPROM base address register of the OPROM calibration equipment Free address in address space;
Read the content at the base address OPROM of the base address register of the OPROM calibration equipment;
Whether the byte for judging the predeterminated position of reading value is preset value;
If so, extracting the OPROM check information;
If it is not, then sending starting triggering command to the operating system of the trusted computer;
Whether the byte of the predeterminated position for judging reading value is preset value, are as follows:
Whether two bytes of head for judging the reading value are 0x55AA.
CN201611058840.9A 2016-11-24 2016-11-24 A kind of gauging system and method for trusted computer Active CN106557700B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611058840.9A CN106557700B (en) 2016-11-24 2016-11-24 A kind of gauging system and method for trusted computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611058840.9A CN106557700B (en) 2016-11-24 2016-11-24 A kind of gauging system and method for trusted computer

Publications (2)

Publication Number Publication Date
CN106557700A CN106557700A (en) 2017-04-05
CN106557700B true CN106557700B (en) 2019-11-26

Family

ID=58445065

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611058840.9A Active CN106557700B (en) 2016-11-24 2016-11-24 A kind of gauging system and method for trusted computer

Country Status (1)

Country Link
CN (1) CN106557700B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107729354B (en) * 2017-08-30 2021-08-10 晶晨半导体(上海)股份有限公司 Picture ordering method and system
CN110245495B (en) * 2018-03-09 2023-05-26 阿里巴巴集团控股有限公司 BIOS checking method, configuration method, device and system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515316B (en) * 2008-02-19 2011-09-28 北京工业大学 Trusted computing terminal and trusted computing method
CN102063591B (en) * 2011-01-07 2012-08-08 北京工业大学 Methods for updating PCR (Platform Configuration Register) reference values based on trusted platform
CN202362788U (en) * 2011-11-21 2012-08-01 国民技术股份有限公司 Dependable computing device with USB (Universal Serial Bus) interfaces
CN102693385A (en) * 2012-05-28 2012-09-26 山东神思电子技术股份有限公司 Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof
CN104331666A (en) * 2014-11-10 2015-02-04 成都卫士通信息产业股份有限公司 Trusted measurement method for computer systems
CN105303094B (en) * 2015-05-07 2016-11-09 同方计算机有限公司 The safety of a kind of USB main control chip is from check system and from proved recipe method
CN105160255A (en) * 2015-08-06 2015-12-16 浪潮电子信息产业股份有限公司 Trustworthy measurement apparatus and method
CN106127057A (en) * 2016-06-23 2016-11-16 浪潮电子信息产业股份有限公司 A kind of method building credible startup control based on TPM

Also Published As

Publication number Publication date
CN106557700A (en) 2017-04-05

Similar Documents

Publication Publication Date Title
EP1754126B1 (en) Enhancing trusted platform module performance
US9081954B2 (en) Verifying firmware integrity of a device
CN103080904B (en) Multistage lock-step integrity report mechanism is provided
CN100454324C (en) Embed type platform guiding of credible mechanism
CN103270519B (en) The safety applications using dynamic measure kernel proves
CN102663301B (en) Trusted computer and credibility detection method
CN108399339A (en) A kind of credible startup method based on safety chip
US8255874B2 (en) Apparatus and method for automatically extracting interface of embedded software
CN102012979B (en) Embedded credible computing terminal
CN111638936B (en) Virtual machine static measurement method and device based on built-in security architecture
US9202060B2 (en) Method for secure self-booting of an electronic device
CN108280351A (en) A kind of credible startup method of the electricity consumption acquisition terminal based on TPM
US20190088350A1 (en) Information processing apparatus, control method thereof, and storage medium
CN106547653B (en) Computer system fault state detection method, device and system
CN106557700B (en) A kind of gauging system and method for trusted computer
CN109614154A (en) A kind of computer safety start method
JP2005149501A (en) System and method for testing memory with expansion card using dma
CN104751082B (en) Operating system and data security control method and device
JP5900336B2 (en) Emulator verification system and emulator verification method
CN115906046A (en) Trusted computing system and measurement method based on trusted computing system
JP2008276691A (en) Interface card emulating hard disk interface
CN114780208A (en) Method, system, device and storage medium for verifying backup validity of multi-platform virtual machine
JP2013257711A (en) Information processing device and information processing method
CN103677875A (en) Method for starting electronic equipment, method for controlling permission and electronic equipment
EP3387535B1 (en) Apparatus and method for software self test

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 215011 23rd Floor, Building 3, Suzhou Pioneer Park, 209 Zhuyuan Road, Suzhou High-tech Zone, Jiangsu Province

Applicant after: Suzhou Guoxin Technology Co., Ltd.

Address before: 215011 23rd Floor, Building 3, Suzhou Pioneer Park, 209 Zhuyuan Road, Suzhou High-tech Zone, Jiangsu Province

Applicant before: C*Core Technology (Suzhou) Co., Ltd.

GR01 Patent grant
GR01 Patent grant