CN107809762A - The security risk control method identified using the foster card of big data and device-fingerprint - Google Patents

The security risk control method identified using the foster card of big data and device-fingerprint Download PDF

Info

Publication number
CN107809762A
CN107809762A CN201711053325.6A CN201711053325A CN107809762A CN 107809762 A CN107809762 A CN 107809762A CN 201711053325 A CN201711053325 A CN 201711053325A CN 107809762 A CN107809762 A CN 107809762A
Authority
CN
China
Prior art keywords
card
foster
fingerprint
browser
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711053325.6A
Other languages
Chinese (zh)
Other versions
CN107809762B (en
Inventor
石光捷
付飞龙
方勇
徐高军
戴光浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANJING XINWANG INTERNETWORK TECHNOLOGY Co.,Ltd.
China Mobile Group Jiangsu Co Ltd
Original Assignee
Nanjing Xinwang Internetwork Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Xinwang Internetwork Technology Co Ltd filed Critical Nanjing Xinwang Internetwork Technology Co Ltd
Priority to CN201711053325.6A priority Critical patent/CN107809762B/en
Publication of CN107809762A publication Critical patent/CN107809762A/en
Application granted granted Critical
Publication of CN107809762B publication Critical patent/CN107809762B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The security risk control method of the foster card identification of big data and device-fingerprint is the present invention relates to the use of, including:S1, which is established, supports card database;S2 transfers business diary of the user in platform when user enters platform transacting business, the number of the phonecard of the content obtaining user-association according to described in business diary, the device number and IP that log in;And the calling card number of acquisition is compared with the number of foster card model library;S3 obtains the fingerprint handled path, read the equipment in daily record used in transacting business for supporting card number code in electric channel daily record, and the device-fingerprint is stored in the archives that this supports card number code with handling the data message in path.S4 obtains the business handling path in electric channel daily record of user, and whether analysis business handling is the default business for being related to arbitrage.This method accounts for that internal memory is small, and the speed of service is fast, and error rate is extremely low.

Description

The security risk control method identified using the foster card of big data and device-fingerprint
Technical field
The present invention relates to the information security field of mobile operation, more particularly to a kind of supporting using big data and device-fingerprint Block the security risk control method of identification.
Background technology
" palm business hall " is a mobile operator mobile Internet product important in terms of electronic channel, because Its any active ues is numerous, the business of the most of commmunication company of carrying, industry popularity is high, often carries out preferential the Internet activity The features such as, also into the emphasis object of attack of this Dark Industry Link.In recent years, the Mobile Communications Market number of users of each department increases Long speed eases up, and low-end subscribers increase on developing market, mobile, UNICOM and telecommunications(Or Netcom)Between it is increasingly competitive. Meanwhile social channel is reducing to the loyalty of commmunication company, commercially carried out in violation of rules and regulations in the presence of some dealers in each department The phenomenon of operation, on the one hand some commission agents establish cat pond and carry out supporting card, to extract charg`e d'affaires's expense of commmunication company;On the other hand increase The falseness in amount market, which is distributed telephone numbers, to be increased, and the channel commission cost of commmunication company is remained high, cost of marketing persistently rises, to movement Company causes certain financial pressure.Further investigation is found, agent's channel exists in various degree utilizes " cat pond " equipment Carry out illegal set machine and support the phenomenon of card.Therefore needing a kind of method effectively to identify prevents above-mentioned foster card phenomenon.
The content of the invention
1st, technical problem to be solved:
The present invention provides a kind of security risk control method identified using the foster card of big data and device-fingerprint, can solve the problem that existing The problem of accuracy rate of the foster card identification method having is low, workload is big.
2nd, technical scheme:
A kind of security risk control method identified using the foster card of big data and device-fingerprint, including:
S1, which is established, supports card database;The foster card database obtains IT wisdom center Yang Ka storehouses and dereliction last month by api interface Be the data message without called storehouse, obtain foster card number code in the Yang Ka storehouses of IT wisdom center and last month without in caller storehouse without caller Telephone number;And transmitted by the foster card number code of above-mentioned acquisition and without calling telephone number into foster card database, and in foster card number According to being that the number of each input establishes archives in storehouse.
S2 transfers business diary of the user in platform, according in business diary when user enters platform transacting business The number of the phonecard of the content obtaining of the record user-association, the device number and IP logged in;And by the calling card number of acquisition It is compared with the number of foster card model library;If had under the device number or IP, the number in foster card model library is logged, should Number is considered as in doubtful foster card number code;If the number of phonecard is identical with the number in foster card model library, into S3;If The number of phonecard differs with the number in foster card model library or is above-mentioned doubtful foster card number code, into S4.
S3 obtains foster card number code and handles path in electric channel daily record, the equipment in reading daily record used in transacting business Fingerprint, and the device-fingerprint is stored in the archives that this supports card number code with handling the data message in path.The step be by The number of phonecard is contrasted with the number in the foster card database of this platform again, and is drawn by the number of phonecard Using the number of the equipment of foster card number code, by the equipment number, device-fingerprint deposit is supported in card database, can effectively prevented non- Method user utilizes the different telephone number Website login platform of identical equipment.
S4 obtains the business handling path in electric channel daily record of user, and whether analysis business handling is default be related to The business of arbitrage, if it is, obtaining the device-fingerprint of the user;Calculating tables of equipment feature calling amount corresponding to the device-fingerprint is It is no whether to be more than default Second Threshold more than default first threshold and single feature accounting;If two threshold values are more than therein The number is set alert status, and is stored into foster card database by one.When telephone number is handled into platform, be related to can During the business of " arbitrage ", whether default value is more than according to single feature calling amount of the user and single feature accounting.At this In single feature can be to handle the amount of identical set meal, or get the project that preferential number etc. is related to making a profit.
Further, the S2 also includes setting for the content obtaining user pass transacting business according to described in business diary Standby number and No. IP;If having preceding mark code logged under the device number or IP numbers, the preceding mark code is stored into foster card number According to storehouse.Not only telephone number is monitored in this method, and to being monitored using the equipment of number.
Further, the device-fingerprint includes browser fingerprint and APP fingerprints.Browser fingerprint and APP refer at this stage As the risk control method of the network platform, its security is credible to line, thus the device-fingerprint used in this method for Browser fingerprint and APP fingerprints.
Further, the parameter of the browser fingerprint collecting is:Browser UA, browser language, equipment palette Bit-depth, device pixel ratio, equipment cpu kernels, screen resolution, screen resolution, time zone is poor, whether allows browser Session storages, the data directory for whether allowing browser to be locally stored, whether allowing browser end, whether there is user behavior Whether binding, browser CPU, browser support whether allow net using database, the operating system of browser execution, user Stand, content etc. is tracked, whether browser plug-in, browser support whether canvas, browser are supported webgl, whether permitted Perhaps intercept ad elements, verification browser language resolution ratio whether consistent with the preferred language that user is set, calibration equipment and Available resolution relation, whether be not common equipment, whether be not conventional browser, whether support touch event, js available words Body.
Further, the information of the archives for supporting card number code of the deposit in the S3 also includes IP and the device number logged in.
3rd, beneficial effect:
This method is first stored in foster card number code storehouse according to a number consumption attribute for card, a collection of foster card number code of output and by number, passes through reality When monitor the access track for supporting number in card number code storehouse, monitor out " user " of this lot number code;The content of monitoring includes user's No. IP, device number or device-fingerprint;The number in the non-foster card number code storehouse accessed under " user " is calculated simultaneously, if it find that different Number, IP, device number are often put into foster card number code storehouse;This method accounts for that internal memory is small, and the speed of service is fast, and error rate is extremely low.
Brief description of the drawings
Fig. 1 is the flow chart of the present invention.
Embodiment
The present invention will be described below in conjunction with the accompanying drawings:As illustrated, this method is first with existing foster Ka Ku, and rest Resource in card storehouse is introduced directly into the database of this platform so as to distinguish the foster card number code having been recorded in database.It is and right The number not having in original foster card model library is recognized again, if the number is also stored in this and put down by the condition for meeting foster card In the foster card database of platform.Main flow is:
S1, which is established, supports card database;The foster card database obtains IT wisdom center Yang Ka storehouses and dereliction last month by api interface Be the data message without called storehouse, obtain foster card number code in the Yang Ka storehouses of IT wisdom center and last month without in caller storehouse without caller Telephone number;And transmitted by the foster card number code of above-mentioned acquisition and without calling telephone number into foster card database, and in foster card number According to being that the number of each input establishes archives in storehouse.
S2 transfers business diary of the user in platform, according in business diary when user enters platform transacting business The number of the phonecard of the content obtaining of the record user-association, the device number and IP logged in;And by the calling card number of acquisition It is compared with the number of foster card model library;If had under the device number or IP, the number in foster card model library is logged, should Number is also considered as in doubtful foster card number code;If the number of phonecard is identical with the number in foster card model library, into S3;Such as The number of fruit phonecard differs with the number in foster card model library or is above-mentioned doubtful foster card number code, into S4.
S3 obtains foster card number code and handles path in electric channel daily record, the equipment in reading daily record used in transacting business Fingerprint, and the device-fingerprint is stored in the archives that this supports card number code with handling the data message in path.
S4 obtains the business handling path in electric channel daily record of user, and whether analysis business handling is default be related to The business of arbitrage, if it is, obtaining the device-fingerprint of the user;Calculating tables of equipment feature calling amount corresponding to the device-fingerprint is It is no whether to be more than default Second Threshold more than default first threshold and single feature accounting;If two threshold values are more than therein The number is set alert status, and is stored into foster card database by one.
Further, the S2 also includes setting for the content obtaining user pass transacting business according to described in business diary Standby number and No. IP;If having preceding mark code logged under the device number or IP numbers, the preceding mark code is stored into foster card number According to storehouse.
Further, the device-fingerprint includes browser fingerprint and APP fingerprints.
Further, the parameter of the browser fingerprint collecting is:Browser UA, browser language, equipment palette Bit-depth, device pixel ratio, equipment cpu kernels, screen resolution, screen resolution, time zone is poor, whether allows browser Session storages, the data directory for whether allowing browser to be locally stored, whether allowing browser end, whether there is user behavior Whether binding, browser CPU, browser support whether allow net using database, the operating system of browser execution, user Stand, content etc. is tracked, whether browser plug-in, browser support whether canvas, browser are supported webgl, whether permitted Perhaps intercept ad elements, verification browser language resolution ratio whether consistent with the preferred language that user is set, calibration equipment and Available resolution relation, whether be not common equipment, whether be not conventional browser, whether support touch event, js available words Body.
Although the present invention disclosed as above with preferred embodiment, they be not for limit the present invention, it is any ripe This those skilled in the art is practised, without departing from the spirit and scope of the invention, can make various changes or retouch from working as, therefore the guarantor of the present invention What shield scope should be defined by claims hereof protection domain is defined.

Claims (5)

1. utilize the security risk control method of the foster card of big data and device-fingerprint identification, it is characterised in that:Including following step Suddenly:
S1, which is established, supports card database;The foster card database obtains IT wisdom center Yang Ka storehouses and dereliction last month by api interface Be the data message without called storehouse, obtain foster card number code in the Yang Ka storehouses of IT wisdom center and last month without in caller storehouse without caller Telephone number;And transmitted by the foster card number code of above-mentioned acquisition and without calling telephone number into foster card database, and in foster card number According to being that the number of each input establishes archives in storehouse;
S2 transfers business diary of the user in platform, according to described in business diary when user enters platform transacting business The content obtaining user-association phonecard number, the device number and IP that log in;And by the calling card number of acquisition with supporting The number of card model library is compared;If had under the device number or IP, the number in foster card model library is logged, the number It is considered as in doubtful foster card number code;If the number of phonecard is identical with the number in foster card model library, into S3;If phone The number of card differs with the number in foster card model library or is above-mentioned doubtful foster card number code, into S4;
S3 obtains the finger handled path, read the equipment in daily record used in transacting business for supporting card number code in electric channel daily record Line, and the device-fingerprint is stored in the archives that this supports card number code with handling the data message in path;
S4 obtains the business handling path in electric channel daily record of user, and whether analysis business handling is default to be related to arbitrage Business, if it is, obtaining the device-fingerprint of the user;Whether big calculate tables of equipment feature calling amount corresponding to the device-fingerprint Whether it is more than default Second Threshold in default first threshold and single feature accounting;If two threshold values are more than one of those The number is set into alert status, and is stored into foster card database.
2. the security risk control method according to claim 1 identified using the foster card of big data and device-fingerprint, its It is characterised by:The S2 also includes the device number and IP of content obtaining user pass transacting business according to described in business diary Number;If having preceding mark code logged under the device number or IP numbers, the preceding mark code is stored into foster card database.
A kind of 3. security risk controlling party identified using the foster card of big data and device-fingerprint according to claim 1 Method, it is characterised in that:The device-fingerprint includes browser fingerprint and APP fingerprints.
4. the security risk control method according to claim 1 identified using the foster card of big data and device-fingerprint, its It is characterised by:The parameter of the browser fingerprint collecting is:Browser UA, browser language, equipment palette bit-depth, Device pixel ratio, equipment cpu kernels, screen resolution, screen resolution, whether time zone is poor, allow browser session to deposit Storage, the data directory for whether allowing browser to be locally stored, whether allowing browser end, whether there is user behavior binding, browse Whether device CPU, browser support whether allow website using database, the operating system of browser execution, user, and content etc. is entered Whether line trace, browser plug-in, browser support whether canvas, browser support webgl, whether allow to intercept advertisement member Whether element, verification browser language resolution ratio and available resolution consistent with the preferred language that user is set, calibration equipment close It is, whether be not common equipment, whether be not conventional browser, whether supports touch event, js to use font.
5. the security risk control method according to claim 1 identified using the foster card of big data and device-fingerprint, its It is characterised by:The information for being stored in the archives for supporting card number code in the S3 also includes IP and the device number logged in.
CN201711053325.6A 2017-11-01 2017-11-01 Security risk control method for card-raising identification by utilizing big data and equipment fingerprints Active CN107809762B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711053325.6A CN107809762B (en) 2017-11-01 2017-11-01 Security risk control method for card-raising identification by utilizing big data and equipment fingerprints

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711053325.6A CN107809762B (en) 2017-11-01 2017-11-01 Security risk control method for card-raising identification by utilizing big data and equipment fingerprints

Publications (2)

Publication Number Publication Date
CN107809762A true CN107809762A (en) 2018-03-16
CN107809762B CN107809762B (en) 2021-05-25

Family

ID=61582788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711053325.6A Active CN107809762B (en) 2017-11-01 2017-11-01 Security risk control method for card-raising identification by utilizing big data and equipment fingerprints

Country Status (1)

Country Link
CN (1) CN107809762B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833723A (en) * 2018-06-28 2018-11-16 中国联合网络通信集团有限公司 Identify the method and apparatus for supporting the number of card in the same pond that keeps a cat
CN109151828A (en) * 2018-09-30 2019-01-04 中国联合网络通信集团有限公司 Support recognition methods, device, equipment and the storage medium of card user
CN109474923A (en) * 2018-11-23 2019-03-15 中国联合网络通信集团有限公司 Object identifying method and device, storage medium
CN109640312A (en) * 2018-11-21 2019-04-16 上海观安信息技术股份有限公司 " black card " recognition methods, electronic equipment and computer program product
CN112601228A (en) * 2019-09-16 2021-04-02 中国电信股份有限公司 Method and device for detecting card number and computer readable storage medium
CN112765578A (en) * 2021-01-26 2021-05-07 上海黔易数据科技有限公司 Method for realizing safety privacy calculation based on browser client

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068428A (en) * 2007-06-07 2007-11-07 中国移动通信集团福建有限公司 Apparatus for attacking illegal telephone traffic
CN103164474A (en) * 2011-12-15 2013-06-19 中国移动通信集团贵州有限公司 Method for analyzing data service
CN104602182A (en) * 2015-02-12 2015-05-06 中国联合网络通信集团有限公司 Channel value acquiring method and channel value acquiring device
CN105528535A (en) * 2015-12-25 2016-04-27 北京奇虎科技有限公司 Log information based user behavior analysis method and apparatus
US20160269908A1 (en) * 2013-09-13 2016-09-15 Network Kinetix, LLC System and method for an automated system for continuous observation, audit and control of user activities as they occur within a mobile network
CN106445796A (en) * 2015-08-04 2017-02-22 腾讯科技(深圳)有限公司 Cheating channel automatic detection method and device
CN106611321A (en) * 2015-10-22 2017-05-03 百度在线网络技术(北京)有限公司 An identification method and apparatus for fake handset numbers
CN107153847A (en) * 2017-05-31 2017-09-12 北京知道创宇信息技术有限公司 Predict method and computing device of the user with the presence or absence of malicious act
CN107248082A (en) * 2017-05-23 2017-10-13 北京道隆华尔软件股份有限公司 Support card identification method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068428A (en) * 2007-06-07 2007-11-07 中国移动通信集团福建有限公司 Apparatus for attacking illegal telephone traffic
CN103164474A (en) * 2011-12-15 2013-06-19 中国移动通信集团贵州有限公司 Method for analyzing data service
US20160269908A1 (en) * 2013-09-13 2016-09-15 Network Kinetix, LLC System and method for an automated system for continuous observation, audit and control of user activities as they occur within a mobile network
CN104602182A (en) * 2015-02-12 2015-05-06 中国联合网络通信集团有限公司 Channel value acquiring method and channel value acquiring device
CN106445796A (en) * 2015-08-04 2017-02-22 腾讯科技(深圳)有限公司 Cheating channel automatic detection method and device
CN106611321A (en) * 2015-10-22 2017-05-03 百度在线网络技术(北京)有限公司 An identification method and apparatus for fake handset numbers
CN105528535A (en) * 2015-12-25 2016-04-27 北京奇虎科技有限公司 Log information based user behavior analysis method and apparatus
CN107248082A (en) * 2017-05-23 2017-10-13 北京道隆华尔软件股份有限公司 Support card identification method and device
CN107153847A (en) * 2017-05-31 2017-09-12 北京知道创宇信息技术有限公司 Predict method and computing device of the user with the presence or absence of malicious act

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
吕智超: "基于Hadoop平台的电信养卡研究与分析", 《中国优秀硕士学位论文全文数据库 经济与管理科学辑》 *
姚伟: "业务系统异常行为检测", 《邮电设计技术》 *
温瑞军: "移动代理商渠道养卡套利行为识别与治理", 《电子技术与软件工程》 *
王保华: "利用大数据分析建立养卡模型", 《电信技术》 *
谷红勋: "基于大数据的移动用户行为分析系统与应用案例", 《电信科学》 *
赵纯坚: "基于数据仓库技术的社会实体渠道虚假销售行为分析与研究", 《中国新通信》 *
青岛软媒网络科技有限公司: "业内人告诉你:"羊毛党"为何那么难剿灭", 《HTTPS://BAIJIAHAO.BAIDU.COM/S?ID=156 4905186026656&WFR=SPIDER&FOR=PC》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833723A (en) * 2018-06-28 2018-11-16 中国联合网络通信集团有限公司 Identify the method and apparatus for supporting the number of card in the same pond that keeps a cat
CN108833723B (en) * 2018-06-28 2021-03-19 中国联合网络通信集团有限公司 Method and device for identifying card maintenance numbers in same card maintenance device
CN109151828A (en) * 2018-09-30 2019-01-04 中国联合网络通信集团有限公司 Support recognition methods, device, equipment and the storage medium of card user
CN109640312A (en) * 2018-11-21 2019-04-16 上海观安信息技术股份有限公司 " black card " recognition methods, electronic equipment and computer program product
CN109640312B (en) * 2018-11-21 2021-09-14 上海观安信息技术股份有限公司 'Black card' identification method, electronic equipment and computer readable storage medium
CN109474923A (en) * 2018-11-23 2019-03-15 中国联合网络通信集团有限公司 Object identifying method and device, storage medium
CN112601228A (en) * 2019-09-16 2021-04-02 中国电信股份有限公司 Method and device for detecting card number and computer readable storage medium
CN112601228B (en) * 2019-09-16 2023-04-18 中国电信股份有限公司 Method and device for detecting card number and computer readable storage medium
CN112765578A (en) * 2021-01-26 2021-05-07 上海黔易数据科技有限公司 Method for realizing safety privacy calculation based on browser client
CN112765578B (en) * 2021-01-26 2022-09-16 上海黔易数据科技有限公司 Method for realizing safety privacy calculation based on browser client

Also Published As

Publication number Publication date
CN107809762B (en) 2021-05-25

Similar Documents

Publication Publication Date Title
CN107809762A (en) The security risk control method identified using the foster card of big data and device-fingerprint
US10713653B2 (en) Anonymized access to online data
CN104391979B (en) Network malice reptile recognition methods and device
CN106295382B (en) A kind of Information Risk preventing control method and device
US20160140626A1 (en) Web page advertisement configuration and optimization with visual editor and automatic website and webpage analysis
US20120303552A1 (en) Techniques to track users and user metrics for a website
CN110442712B (en) Risk determination method, risk determination device, server and text examination system
US10672026B2 (en) System and a method for surveying advertisements in mobile applications
CN107704497A (en) Web data crawling method, device, web data crawl platform and storage medium
EP3047370B1 (en) Method and system for inferring risk of data leakage from third-party tags
CN108112038B (en) Method and device for controlling access flow
CN107645533A (en) Data processing method, data transmission method for uplink, Risk Identification Method and equipment
CN106802904A (en) Log processing method, apparatus and system
CN113412607B (en) Content pushing method and device, mobile terminal and storage medium
WO2019232821A1 (en) Method for processing risk control data, device, computer apparatus, and storage medium
CN104636470B (en) A kind of method and device of recommendation business information
CN115445212A (en) Game gift bag pushing method and device, computer equipment and storage medium
US10453091B2 (en) System and method to build external facing information platform to generate target list of entities
CN112347457A (en) Abnormal account detection method and device, computer equipment and storage medium
CN110163013A (en) A kind of method and apparatus detecting sensitive information
US11924175B2 (en) Systems and methods for web tracker classification and mitigation
CN108021584A (en) A kind of method and apparatus of pushed information
CN110738509A (en) Method and device for quantifying association degree between users
CN114285896A (en) Information pushing method, device, equipment, storage medium and program product
CN107145375A (en) Kernel loads method, device, system, user terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20180802

Address after: No. 59, Gulou District, Nanjing City, Jiangsu, Jiangsu

Applicant after: China Mobile Communication Group Jiangsu Co., Ltd.

Applicant after: NANJING XINWANG INTERNETWORK TECHNOLOGY CO., LTD.

Address before: 210000 the 7 floor of the first phase of Changjiang science and Technology Park, 40 Nanchang Road, Gulou District, Nanjing, Jiangsu.

Applicant before: NANJING XINWANG INTERNETWORK TECHNOLOGY CO., LTD.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210419

Address after: 210000, 7 floor, Changjiang science and Technology Park, No. 40 Nanchang Road, Gulou District, Jiangsu, Nanjing

Applicant after: NANJING XINWANG INTERNETWORK TECHNOLOGY Co.,Ltd.

Applicant after: CHINA MOBILE GROUP JIANGSU Co.,Ltd.

Address before: Hu Ju Road, Gulou District of Nanjing city of Jiangsu Province, No. 59 210000

Applicant before: CHINA MOBILE GROUP JIANGSU Co.,Ltd.

Applicant before: NANJING XINWANG INTERNETWORK TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant