CN107403114A - A kind of structure and method for locking input - Google Patents

A kind of structure and method for locking input Download PDF

Info

Publication number
CN107403114A
CN107403114A CN201710613078.4A CN201710613078A CN107403114A CN 107403114 A CN107403114 A CN 107403114A CN 201710613078 A CN201710613078 A CN 201710613078A CN 107403114 A CN107403114 A CN 107403114A
Authority
CN
China
Prior art keywords
input
locking
equipment
content
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710613078.4A
Other languages
Chinese (zh)
Other versions
CN107403114B (en
Inventor
庞伟振
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201710613078.4A priority Critical patent/CN107403114B/en
Publication of CN107403114A publication Critical patent/CN107403114A/en
Application granted granted Critical
Publication of CN107403114B publication Critical patent/CN107403114B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of structure and method for locking input, applied to computer system or in the electronic system including mobile phone, including, locking module, inputted for locking system, be in the locked state disarmed state to the input of any equipment of system;Control module, locking and unblock for being inputted to system carry out logic control, by judging whether current system conditions are in a safe condition, system carries out normal device input when in a safe condition, and system is inputted by the locking module locking device during non-secure states.The structure and method of a kind of locking input of the present invention are compared with prior art, it effectively prevent and hit the attack meanses such as storehouse, avoid the loss of data caused by password is revealed, avoid the secondary verification process of complexity, effectively increase the security of system, it is practical, it is applied widely, it is easy to spread.

Description

A kind of structure and method for locking input
Technical field
The present invention relates to field of information security technology, specifically one kind can be applied to computer system or mobile phone system The structure and method of the locking input of system.
Background technology
Computer (computer) and mobile phone have turned into visual plant indispensable in routine work life, these electronic equipments By interconnecting immediately, the approach such as information sharing improve our office efficiency, facilitate our production, life.At us Work, production, generate substantial amounts of private data information in life and be stored in corresponding electronic equipment, how to prevent not Method molecule peep surreptitiously, protect our information security to turn into the serious problems whole society, each field paid close attention to jointly.
Peeping surreptitiously in order to avoid other people at this stage, the most frequently used means of system are exactly to introduce user name, key authentication mechanism, User, which wants access data, to be needed to be verified, is proved to be successful, can be accessed.
User name, key authentication mechanism are most commonly used security means at this stage, but unfortunately this authentication mechanism is simultaneously It is dangerous, the leakage of the password of user, hitting storehouse and can easily cracking so as to log in acquisition data for malice, cause privacy information Lose.
Current security means is as shown in Figure 1:Data information request is obtained first, then carries out cipher authentication, password again Certification success after obtain data again, if but cipher authentication stage password leakage or malice hit storehouse, eventually maliciously attack Enter system, so as to obtain privacy information.
To sum up describe, prior art can not meet the needs of people are for safety, and then reinforced guarantor occur Shield strategy, wherein most commonly used is exactly re-authentication, strengthens safety to a certain extent, but is to rely on other intelligence Electronic equipment, and whether the equipment as re-authentication can not also ensure safely in itself.For example pass through short message re-authentication, attack Person can by pretend base station or invasion mobile phone etc. mode user unconsciously in the case of take re-authentication code and form Work(intrusion system.
To sum up, security system is still easy to be broken, and does not prevent from effectively invading.
Based on this, a kind of scheme that can effectively improve security of system energy is needed badly.
The content of the invention
The present invention technical assignment be to be directed to above weak point, there is provided one kind can effectively improve security of system energy, Lock the structure and method of input.
A kind of structure for locking input, applied to computer system or in the electronic system including mobile phone, its structure includes,
Locking module, inputted for locking system, any equipment input to system is in disarmed state in the locked state;
Control module, locking and unblock for being inputted to system carry out logic control, by whether judging current system conditions In a safe condition, system carries out normal device input when in a safe condition, and system passes through the locking during non-secure states Module locking device inputs.
Equipment for system input includes keyboard, mouse, Trackpad, network, when locking module locking system, equipment In state is abandoned, i.e. system and equipment is mutually isolated for input.
The process of system input is:The content of equipment input first is driven by input equipment to be obtained, then passes through input Input content is converted into the general key assignments of kernel by content processing module, and finally input content is distributed in application program;Work as lock Cover half block lock the system equipment input when, then by by the locking module be inserted into input content distribution before, reach locking The function of input.
The locking module is inserted into input content distribution phase by hook mechanism, is specially:Locking module is in content A checkpoint hook point is inserted in handling process, before the handling process refers to input content distribution, according to control The judgement of module decides whether to allow this content to continue to distribute, realizes and forbid inputting under system lock state.
The control module judges whether the process of safety is current system conditions:Whether control module will have safety means Access system is as trigger condition, when there is safety means access system, and the safety means through safety certification after, current system Unite in a safe condition, unlocker device, system can pass through equipment input content;When without safety means access system, or access system The safety means of system not through safety certification after, current system is in non-secure states, locking device, and system can not pass through equipment Input content.
The safety certification is finger print identifying, i.e., after safety means access system, checks the fingerprint of safety means itself Whether information matches with the finger print information of typing in system, when complete matching, triggers the control module unlocker device, equipment The content of input is normally distributed, the step of otherwise can not carrying out content distribution.
A kind of method for locking input, based on the structure of above-mentioned locking input, its implementation process is:First by controlling mould Block judge system state whether safety, when system is in a safe condition system carry out normal device input, i.e., system with it is defeated It is in connection status to enter equipment, equipment can normally input content to system;When system is in non-secure states, pass through locking module Locking device inputs, by system and equipment blocking.
When system is in a safe condition, the process that system carries out normal device input is:In being inputted first by equipment Hold;Then the content of the input is driven by input equipment and obtained, then changed input content by input content processing module Into the general key assignments of kernel, finally input content is distributed in application program.
When system is in non-secure states, locking system makes it can not carry out the process of equipment input to be:Pass through hook Before locking module is inserted into input content distribution by mechanism, the step of making system cannot be introduced into content distribution, so as to reach locking The function of input.
The detailed process inserted by hook mechanism is:Locking module inserts a checkpoint before input content distribution Hook point, to be decided whether to allow this content to continue to distribute according to the judgement of control module, realize in system lock state Under forbid inputting.
Compared to the prior art the structure and method of a kind of locking input of the present invention, have the advantages that:
The structure and method of a kind of locking input of the present invention, the locking module in this method inserts hook in kernel module and flowed Journey, the distribution of input is directly effectively locked, it is achieved thereby that the locking of input;Control module can be by device parameter certainly Dynamic computing device finger print information, and independent of information such as the keys being stored in external device, it effectively prevent and hit storehouse etc. and attack Hitter's section, the loss of data caused by password is revealed is avoided, the secondary verification process of complexity is avoided, effectively increases and be The security of system, it is practical, it is applied widely, it is easy to spread.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis The accompanying drawing of offer obtains other accompanying drawings.
Accompanying drawing 1 is the implementation process figure of information security means in the prior art.
Accompanying drawing 2 is the specific implementation schematic diagram of structure of the present invention.
Accompanying drawing 3 is the implementing procedure figure of the inventive method.
Accompanying drawing 4 is the specific implementation flow chart of the inventive method.
Accompanying drawing 5 is the logic judgment process example figure of control module in the inventive method.
Embodiment
In order that those skilled in the art more fully understand the solution of the present invention, with reference to embodiment to this Invention is described in further detail.Obviously, described embodiment is only part of the embodiment of the present invention, rather than all Embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art institute under the premise of creative work is not made The every other embodiment obtained, belongs to the scope of protection of the invention.
As shown in Figure 2, a kind of structure for locking input, applied to computer system or the electronic system including mobile phone In, its structure includes,
Locking module, inputting for locking system, any equipment input to system is in disarmed state in the locked state, That is abandoning the input control such as input of keyboard and mouse to system in the locked state, being controlled from long-range input, do The isolation characteristic of good system.
Control module, locking and unblock for being inputted to system carry out logic control, by judging current system conditions Whether in a safe condition, system carries out normal device input when in a safe condition, and system passes through described during non-secure states Locking module locking device inputs.
Equipment for system input includes keyboard, mouse, Trackpad, network, when locking module locking system, equipment In state is abandoned, i.e. system and equipment is mutually isolated for input.
The process of system input is:The content of equipment input first is driven by input equipment to be obtained, then passes through input Input content is converted into the general key assignments of kernel by content processing module, and finally input content is distributed in application program;Work as lock Cover half block lock the system equipment input when, then by by the locking module be inserted into input content distribution before, reach locking The function of input.
Below by taking input through keyboard as an example, system kernel is as follows to the general handling process of input equipment:Input through keyboardKey Dish driving, which obtains, inputs and is converted into the general key assignments code of kernelThe processing of kernel incoming event (is such as packaged into specific lattice Formula)Input time distributes(A file will such as be write input time)Application program obtains input information from file and (pressed Key assignments).
The locking module is inserted into input content distribution phase by hook mechanism, is specially:Locking module is in content A checkpoint hook point is inserted in handling process, before the handling process refers to input content distribution, according to control The judgement of module decides whether to allow this content to continue to distribute, realizes and forbid inputting under system lock state.
The control module judges whether the process of safety is current system conditions:Whether control module will have safety means Access system is as trigger condition, when there is safety means access system, and the safety means through safety certification after, current system Unite in a safe condition, unlocker device, system can pass through equipment input content;When without safety means access system, or access system The safety means of system not through safety certification after, current system is in non-secure states, locking device, and system can not pass through equipment Input content.
The safety certification is finger print identifying, i.e., after safety means access system, checks the fingerprint of safety means itself Whether information matches with the finger print information of typing in system, when complete matching, triggers the control module unlocker device, equipment The content of input is normally distributed, the step of otherwise can not carrying out content distribution.
A kind of method for locking input, as shown in Figure 3, based on the structure of above-mentioned locking input, its implementation process is:
The structure of above-mentioned locking input is installed in computer system or cell phone system.
The peripheral hardware as triggering equipment is wanted in insertion, and setting for hot plug can be supported by generally comprising USB flash disk, wifi network card etc. It is standby.
Open and interface is set, select specific triggering equipment, can the system of checking match triggers equipment.
Finally locked or unlocked.
Further, as shown in accompanying drawing 4, Fig. 5, in the method, the state for judging system by control module first is No safety, when system is in a safe condition, system carries out normal device input, i.e., system and input equipment are in connection status, if It is standby can normally input content to system;When system is in non-secure states, inputted by locking module locking device, by system With equipment blocking.
When system is in a safe condition, the process that system carries out normal device input is:In being inputted first by equipment Hold;Then the content of the input is driven by input equipment and obtained, then changed input content by input content processing module Into the general key assignments of kernel, finally input content is distributed in application program.
When system is in non-secure states, locking system makes it can not carry out the process of equipment input to be:Pass through hook Before locking module is inserted into input content distribution by mechanism, the step of making system cannot be introduced into content distribution, so as to reach locking The function of input.
The detailed process inserted by hook mechanism is:Locking module inserts a checkpoint before input content distribution Hook point, to be decided whether to allow this content to continue to distribute according to the judgement of control module, realize in system lock state Under forbid inputting.
By inserting a specific security module into system kernel, locking system input when needed exists the present invention Under lock-out state, any input information is all abandoned realization, main security mechanism works and kernel state, security system itself Security is greatly improved.Even if being revealed relative to existing scheme user cipher, if system input is still locked out State attacker still uncontrollable system, can not be by inputting password login.Cracked even if by maliciously hitting storehouse method It can not be realized because can not be inputted to system, effectively raising security of system.Present invention, avoiding complexity again Re-authentication mechanism(Such as short message, phone), it is therefore prevented that the possibility invaded again.
By embodiment above, the those skilled in the art can readily realize the present invention.Herein Apply specific case to be set forth the principle and embodiment of the present invention, the explanation of above example is only intended to help Understand the method and its core concept of the present invention.It should be pointed out that for those skilled in the art, do not taking off On the premise of from the principle of the invention, some improvement and modification can also be carried out to the present invention, these are improved and modification also falls into this In invention scope of the claims.

Claims (10)

  1. A kind of 1. structure for locking input, applied to computer system or in the electronic system including mobile phone, it is characterised in that its Structure includes,
    Locking module, inputted for locking system, any equipment input to system is in disarmed state in the locked state;
    Control module, locking and unblock for being inputted to system carry out logic control, by whether judging current system conditions In a safe condition, system carries out normal device input when in a safe condition, and system passes through the locking during non-secure states Module locking device inputs.
  2. 2. a kind of structure for locking input according to claim 1, it is characterised in that the equipment for system input includes Keyboard, mouse, Trackpad, network, when locking module locking system, equipment input is in abandon state, i.e. system and equipment phase Mutually isolation.
  3. 3. a kind of structure for locking input according to claim 1, it is characterised in that the process of system input is: The content of equipment input first is driven by input equipment to be obtained, then in by input content processing module, input content is converted into Input content, is finally distributed in application program by the general key assignments of core;When locking module locks the equipment input of the system, then Before the locking module is inserted into input content distribution, reach the function of locking input.
  4. 4. a kind of structure for locking input according to claim 3, it is characterised in that the locking module passes through hook machines System is inserted into input content distribution phase, is specially:Locking module inserts a checkpoint hook in content handling process Point, before the handling process refers to input content distribution, come according to the judgement of control module decide whether to allow this content after Continuous distribution, realizes and forbids inputting under system lock state.
  5. 5. a kind of structure for locking input according to claim 1, it is characterised in that the control module judges current system Whether the process of safety is system state:Whether control module will have safety means access system as trigger condition, when there is safety During equipment access system, and the safety means through safety certification after, current system is in a safe condition, unlocker device, system Equipment input content can be passed through;When without safety means access system, or access system safety means not through safety certification after, Current system is in non-secure states, locking device, and system can not pass through equipment input content.
  6. 6. a kind of structure for locking input according to claim 5, it is characterised in that the safety certification is recognized for fingerprint Card, i.e., after safety means access system, check that the finger print information of safety means itself and the finger print information of typing in system are No matching, when complete matching, the control module unlocker device is triggered, the content of equipment input is normally distributed, otherwise can not The step of carrying out content distribution.
  7. A kind of 7. method for locking input, it is characterised in that the structure based on above-mentioned locking input, its implementation process are:First Judge whether the state of system is safe, and system carries out normal device input when system is in a safe condition by control module, That is system and input equipment is in connection status, equipment can normally input content to system;When system is in non-secure states, lead to The input of locking module locking device is crossed, by system and equipment blocking.
  8. A kind of 8. method for locking input according to claim 7, it is characterised in that when system is in a safe condition, System carry out normal device input process be:Pass through equipment input content first;Then the content of the input is set by inputting Standby driving is obtained, then input content is converted into the general key assignments of kernel by input content processing module, finally by input content It is distributed in application program.
  9. 9. a kind of method for locking input according to claim 7, it is characterised in that when system is in non-secure states When, locking system makes it can not carry out the process of equipment input to be:Locking module is inserted into by input content by hook mechanism Before distribution, the step of making system cannot be introduced into content distribution, so as to reach the function of locking input.
  10. A kind of 10. method for locking input according to claim 9, it is characterised in that the tool inserted by hook mechanism Body process is:Locking module inserts a checkpoint hook point before input content distribution, according to control module Judgement decides whether to allow this content to continue to distribute, realizes and forbid inputting under system lock state.
CN201710613078.4A 2017-07-25 2017-07-25 Input locking structure and method Active CN107403114B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710613078.4A CN107403114B (en) 2017-07-25 2017-07-25 Input locking structure and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710613078.4A CN107403114B (en) 2017-07-25 2017-07-25 Input locking structure and method

Publications (2)

Publication Number Publication Date
CN107403114A true CN107403114A (en) 2017-11-28
CN107403114B CN107403114B (en) 2020-09-22

Family

ID=60401348

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710613078.4A Active CN107403114B (en) 2017-07-25 2017-07-25 Input locking structure and method

Country Status (1)

Country Link
CN (1) CN107403114B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108596592A (en) * 2018-04-19 2018-09-28 深圳鼎智通讯股份有限公司 A kind of triggering lock machine method of intelligent terminal

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6098171A (en) * 1998-03-31 2000-08-01 International Business Machines Corporation Personal computer ROM scan startup protection
CN1308277A (en) * 1999-11-01 2001-08-15 国际商业机器公司 Method and system for improving computer safety during ROM scanning
CN101167080A (en) * 2005-03-23 2008-04-23 株式会社Ihc Authentication system
CN101379458A (en) * 2006-01-30 2009-03-04 三洋电机株式会社 Input device for inputting password or the like and portable telephone device having the input device
CN101452345A (en) * 2007-10-22 2009-06-10 得逻辑公司 System lock
CN101663882A (en) * 2007-04-17 2010-03-03 诺基亚公司 Apparatuses and methods for facilitating user designation of device functions
CN102883037A (en) * 2011-06-28 2013-01-16 株式会社电装 Vehicular communication system, vehicular communication apparatus and portable terminal apparatus
CN102971690A (en) * 2010-07-02 2013-03-13 诺基亚公司 An apparatus and method for detecting a rocking movement of an electronic device and execute a function in response to the detected movement
CN103164350A (en) * 2011-12-16 2013-06-19 国民技术股份有限公司 Secure digital (SD) card device and method of regionally accessing SD card
CN103186373A (en) * 2011-12-29 2013-07-03 盛乐信息技术(上海)有限公司 System and method for realizing hot plugging of input equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6098171A (en) * 1998-03-31 2000-08-01 International Business Machines Corporation Personal computer ROM scan startup protection
CN1308277A (en) * 1999-11-01 2001-08-15 国际商业机器公司 Method and system for improving computer safety during ROM scanning
CN101167080A (en) * 2005-03-23 2008-04-23 株式会社Ihc Authentication system
CN101379458A (en) * 2006-01-30 2009-03-04 三洋电机株式会社 Input device for inputting password or the like and portable telephone device having the input device
CN101663882A (en) * 2007-04-17 2010-03-03 诺基亚公司 Apparatuses and methods for facilitating user designation of device functions
CN101452345A (en) * 2007-10-22 2009-06-10 得逻辑公司 System lock
CN102971690A (en) * 2010-07-02 2013-03-13 诺基亚公司 An apparatus and method for detecting a rocking movement of an electronic device and execute a function in response to the detected movement
CN102883037A (en) * 2011-06-28 2013-01-16 株式会社电装 Vehicular communication system, vehicular communication apparatus and portable terminal apparatus
CN103164350A (en) * 2011-12-16 2013-06-19 国民技术股份有限公司 Secure digital (SD) card device and method of regionally accessing SD card
CN103186373A (en) * 2011-12-29 2013-07-03 盛乐信息技术(上海)有限公司 System and method for realizing hot plugging of input equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108596592A (en) * 2018-04-19 2018-09-28 深圳鼎智通讯股份有限公司 A kind of triggering lock machine method of intelligent terminal

Also Published As

Publication number Publication date
CN107403114B (en) 2020-09-22

Similar Documents

Publication Publication Date Title
CN103065100B (en) Container-based method of users to protect private data
US8402267B1 (en) Security enhanced network device and method for secure operation of same
US20130151849A1 (en) Device, method, and system for processing communications for secure operation of industrial control system field devices
CN102833066B (en) Three-party authentication method and device as well as intelligent card supporting two-way authentication
Mohsin et al. Two factor vs multi-factor, an authentication battle in mobile cloud computing environments
CN116362747A (en) Block chain digital signature system
US8364978B2 (en) System for and method of auto-registration with cryptographic modules
CN103514392A (en) Login authentication device and method of computer operation system
EP3267352B1 (en) Secure operation apparatuses and methods therefor
Ghorbanzadeh et al. A survey of mobile database security threats and solutions for it
CN106936672A (en) The control method and terminal of gas-fired equipment
CN107403114A (en) A kind of structure and method for locking input
CN102098313A (en) Waterproof wall system and authentication method thereof
US9262619B2 (en) Computer system and method for protecting data from external threats
CN105635090B (en) System access method, system access mechanism and terminal
CN107154854A (en) A kind of unmanned plane instruction is reinforced and discrimination method and system
WO2009070752A1 (en) System for and method of auto-registration with cryptographic modules
CN103745143B (en) Computer protection method
CN114520735B (en) User identity authentication method, system and medium based on trusted execution environment
CN105451225A (en) An access authentication method and an access authentication device
CN103778388B (en) A kind of safety strengthens computer system
CN107347077A (en) A kind of Software security protection method and apparatus based on user right
CN212727070U (en) Cross-network data safety exchange equipment
CN114329376A (en) Computer starting-up identity authentication system
CN107563743A (en) Lift the method and system of POS transaction securities

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200825

Address after: 215100 No. 1 Guanpu Road, Guoxiang Street, Wuzhong Economic Development Zone, Suzhou City, Jiangsu Province

Applicant after: SUZHOU LANGCHAO INTELLIGENT TECHNOLOGY Co.,Ltd.

Address before: 450000 Henan province Zheng Dong New District of Zhengzhou City Xinyi Road No. 278 16 floor room 1601

Applicant before: ZHENGZHOU YUNHAI INFORMATION TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant