CN108154026B - Root-free and non-invasive secure communication method and system based on Android system - Google Patents

Root-free and non-invasive secure communication method and system based on Android system Download PDF

Info

Publication number
CN108154026B
CN108154026B CN201711464695.9A CN201711464695A CN108154026B CN 108154026 B CN108154026 B CN 108154026B CN 201711464695 A CN201711464695 A CN 201711464695A CN 108154026 B CN108154026 B CN 108154026B
Authority
CN
China
Prior art keywords
module
application program
security
server
android
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711464695.9A
Other languages
Chinese (zh)
Other versions
CN108154026A (en
Inventor
汪仕兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electronics Technology Network Security Technology Co ltd
Original Assignee
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Westone Information Industry Inc filed Critical Chengdu Westone Information Industry Inc
Priority to CN201711464695.9A priority Critical patent/CN108154026B/en
Publication of CN108154026A publication Critical patent/CN108154026A/en
Application granted granted Critical
Publication of CN108154026B publication Critical patent/CN108154026B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading

Abstract

The invention discloses a Root-free non-invasive secure communication method based on an Android system, which is used for realizing data secure interaction between Android intelligent equipment and a server and comprises the following steps: implanting a dynamic packet capturing module and a security client module into Android intelligent equipment; starting an application program of the Android intelligent device; the application program loads the dynamic packet capturing module, if the loading is successful, the application program continues to run, and if the loading is failed, the application program stops running; and the application program and the server carry out data interaction through the security application proxy module. The invention avoids Root intrusion in the whole data interaction process, each application program can load a dynamic packet capturing module, and information channels between different application programs and the server are independent, thereby effectively isolating data between different application programs and preventing the application programs from unauthorized access.

Description

Root-free and non-invasive secure communication method and system based on Android system
Technical Field
The invention relates to the field of communication safety, in particular to a Root-free non-invasive safety communication method and system based on an Android system.
Background
With the great influx of Android intelligent devices such as Android mobile phones and Android flat panels into the office environment of enterprises, enterprise employees process related businesses of the enterprises through the intelligent devices, convenience is brought to mobile office, meanwhile, various malicious attacks threaten the information security of the enterprises unknowingly, security holes of the Android intelligent system are numerous, and malicious software spreads over the earth, so that the enterprises urgently need to use the security devices to protect the security of the enterprise information system in the mobile office environment. The existing security solution is to deploy traditional VPN equipment or security gateway equipment at the entrance of the enterprise internet, and perform network isolation and boundary protection on the internal network of the enterprise through the isolation function of the VPN equipment or the security gateway equipment.
The VPN equipment uses a virtual network card to establish a safety tunnel on the Android intelligent equipment, and an information system client performs data interaction with an information system server through the safety tunnel established by the virtual network card, but the safety solution has the following problems: the identity of an application program using the security tunnel is not clear, and a malicious program can also access an enterprise internal network by using the security tunnel to attack an enterprise internal gateway and steal enterprise sensitive information; the whole intelligent terminal only has one safety tunnel, data among all application systems cannot be isolated, the client side of the application system possibly accesses the data of other application system servers without authorization, and potential safety hazards exist.
The traditional security gateway acquires Root authority on an Android intelligent terminal, integrates a network data packet module into an operating system, and realizes an application system network data packet by taking over related functions of the system, and the technology has the following problems: the Root authority needs to be acquired, and different Root schemes are adopted according to different intelligent terminals through relevant functions of an intrusion takeover system, so that the technology is complex and the success rate is low; after the Root authority is obtained, the malicious program can obtain the Root authority, so that the whole intelligent terminal is controlled, and further the internal network of the enterprise is damaged more.
Therefore, it is of great significance to develop a Root-free non-intrusive communication method and system with an independent secure channel based on the Android system.
Disclosure of Invention
In view of the above, the application provides a Root-free and non-invasive secure communication method and system based on an Android system, by implanting a secure client and a dynamic packet capturing module in an Android intelligent terminal, a current application program of the Android intelligent terminal is advanced to be loaded by the dynamic packet capturing module before data interaction is performed with a server, and after the current application program is successfully loaded, the current application program performs data interaction with the server through a secure application proxy module shared by the secure client and the dynamic packet capturing module, so that the whole data interaction process is Root-free and non-invasive, and is independent and secure. The invention is realized by the following technical scheme:
a Root-free and non-invasive secure communication method based on an Android system is used for realizing data secure interaction between Android intelligent equipment and a server, and comprises the following steps:
implanting a dynamic packet capturing module and a security client module comprising a security application agent module into the Android intelligent device;
starting an application program of the Android intelligent device;
the application program loads the dynamic packet capturing module, if the loading is successful, the application program continues to run, and if the loading is failed, the application program stops running;
and the application program and the server carry out data interaction through the security application proxy module.
Further, the application program loading dynamic packet capturing module comprises:
an application program actively loads a dynamic packet capturing module;
the dynamic packet capturing module downloads and analyzes the security policy from the security client module;
the dynamic packet capturing module judges whether the current application program is safe and legal or not according to the analyzed safety strategy, if so, the application program continues to run, and if not, the application program stops running;
and the dynamic packet capturing module reflects the network connection module used by the current application program to the security agent module through the AOP frame of the Android intelligent device, and the application program successfully loads the dynamic packet capturing module into the application program network frame.
Further, the data interaction between the application program and the server through the secure application proxy module comprises:
the application program calls a network interface in the network connection module;
the dynamic packet capturing module calls a security application proxy module of the security client module;
the method comprises the steps that an AOP framework of the Android intelligent device automatically transmits a network interface called by an application program to a security agent module;
the application program sends the data to the security agent module;
the security agent module sends data received from the application to the server.
Further, the data interaction between the application program and the server through the secure application proxy module further comprises:
the server sends data to the security agent module;
the security agent module sends the data received from the server to an AOP frame of the Android intelligent device;
and the application program automatically receives the data through the AOP framework of the Android intelligent equipment.
Further, before the application program and the server perform data interaction through the secure application proxy module, the method further comprises the following steps: and the safety client module is used for carrying out user identity authentication on the server, if the server is safe and legal, data interaction is carried out, and otherwise, data interaction is not carried out.
A Root-free and non-invasive secure communication system based on an Android system realizes data secure interaction between Android intelligent equipment and a server through the secure communication method, and the secure communication system comprises:
the dynamic packet capturing module: the system is implanted in the Android intelligent device and used for loading an application program in the Android intelligent device;
a secure client module: the system is implanted into Android intelligent equipment and used for providing a security policy for the dynamic packet capturing module;
the security client module comprises a security application agent module, the dynamic packet capturing module automatically calls the security application agent module, and the security application agent module is used for providing a security channel for data interaction of an application program and a server.
Further, the dynamic packet capturing module comprises:
a security policy management module: the system is used for downloading the security policy from the security client module and analyzing the security policy;
an application identification module: the system is used for judging whether the current application program is safe and legal or not according to the analyzed safety strategy;
the network framework dynamic loading module: the method is used for loading into an application program network framework of the Android intelligent device.
Furthermore, the security client module is also provided with a security policy issuing module, and the security policy issuing module is used for providing a security policy for the dynamic packet capturing module.
Furthermore, the secure client module is further provided with a user identity authentication module, and the user identity authentication module is used for authenticating whether the server is secure and legal.
When the method is used, firstly, the Root authority does not need to be acquired, the Root-free non-invasive data interaction can be realized, and the safety risk brought by acquiring the Root authority of the system is effectively avoided; secondly, each application program in the Android intelligent device is loaded with a dynamic packet capturing module, and communication with the server is achieved through the security application agent module. Therefore, the information channels between different application programs and the server are independent, data between different application programs can be effectively isolated, and the application programs are prevented from being accessed without authorization. In addition, the method and the device can accurately identify whether the application program is safe and legal, and can prevent malicious software from threatening the internal network of an enterprise.
Drawings
Fig. 1 is a flowchart of a communication method according to embodiment 1 of the present invention.
Fig. 2 is a specific flowchart of the application program loading the dynamic packet capture module according to embodiment 1 of the present invention.
Fig. 3 is a specific flowchart of data interaction between an application and a server through a secure application proxy module according to embodiment 1 of the present invention.
Fig. 4 is a block diagram of a communication system according to embodiment 2 of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood by those skilled in the art, the present invention will be further described in detail with reference to the accompanying drawings and specific embodiments.
Example 1
As shown in fig. 1, this embodiment provides a Root-free and non-intrusive secure communication method based on an Android system, where the method is used to implement data secure interaction between an Android intelligent device and a server, and includes:
step S1: implanting a dynamic packet capturing module and a security client module comprising a security application agent module into the Android intelligent device;
step S2: starting an application program of the Android intelligent device;
step S3: the application program loads the dynamic packet capturing module, if the loading is successful, the application program continues to run, and if the loading is failed, the application program stops running;
step S4: and the application program and the server carry out data interaction through the security application proxy module.
Specifically, as shown in fig. 2, the step S4 of loading the dynamic packet capture module by the application program includes:
step S301: an application program actively loads a dynamic packet capturing module;
step S302: the dynamic packet capturing module downloads and analyzes the security policy from the security client module;
step S303: the dynamic packet capturing module judges whether the current application program is safe and legal or not according to the analyzed safety strategy, if so, the application program continues to run, and if not, the application program stops running;
step S304: and the dynamic packet capturing module reflects the network connection module used by the current application program to the security agent module through the AOP frame of the Android intelligent device, and the application program successfully loads the dynamic packet capturing module into the application program network frame.
Specifically, as shown in fig. 3, the step S4 where the data interaction between the application program and the server through the secure application proxy module includes:
step S401: the application program calls a network interface in the network connection module;
step S402: the dynamic packet capturing module calls a security application proxy module of the security client module;
step S403: the method comprises the steps that an AOP framework of the Android intelligent device automatically transmits a network interface called by an application program to a security agent module;
step S404: the application program sends the data to the security agent module;
step S405: the security agent module sends data received from the application to the server.
In this embodiment, step S4 further includes:
step S406: the server sends data to the security agent module;
step S407: the security agent module sends the data received from the server to an AOP frame of the Android intelligent device;
step S408: and the application program automatically receives the data through the AOP framework of the Android intelligent equipment.
Preferably, before the application program and the server perform data interaction through the secure application proxy module, the method further comprises: and the safety client module is used for carrying out user identity authentication on the server, if the server is safe and legal, data interaction is carried out, and otherwise, data interaction is not carried out.
The AOP refers to extracting a tangent plane in a business processing process, and is a special function of obtaining low coupling between parts in a logic process by a certain step or stage in the processing process.
When the method is implemented, the application program in the Android intelligent device can acquire the network data packet of the appointed application program when the application program is connected by using a network, so that the safe transparent proxy of network data is realized, the Root permission of the Android intelligent device does not need to be acquired, the Android system does not need to be invaded, and different application programs can be accurately identified.
Example 2
As shown in fig. 4, this embodiment provides a Root-free and non-intrusive secure communication system based on an Android system, where the system implements data secure interaction between an Android intelligent device and a server by using the secure communication method provided in embodiment 1, and the communication system includes:
the dynamic packet capturing module: the system is implanted in the Android intelligent device and used for loading an application program in the Android intelligent device;
a secure client module: the system is implanted into Android intelligent equipment and used for providing a security policy for the dynamic packet capturing module;
the security client module comprises a security application agent module, the dynamic packet capturing module automatically calls the security application agent module, and the security application agent module is used for providing a security channel for data interaction of an application program and a server.
Specifically, the dynamic packet capturing module comprises:
a security policy management module: the system is used for downloading the security policy from the security client module and analyzing the security policy;
an application identification module: the system is used for judging whether the current application program is safe and legal or not according to the analyzed safety strategy;
the network framework dynamic loading module: the method is used for loading into an application program network framework of the Android intelligent device.
Specifically, the security client module comprises a security policy issuing module, and the security policy issuing module is used for providing a security policy for the dynamic packet capturing module.
Preferably, the secure client module of this embodiment further includes a user identity authentication module, and the user identity authentication module is configured to authenticate whether the server is secure and legitimate.
In the embodiment, when an application program of an Android intelligent device is initialized, a dynamic packet capturing module is loaded, after the dynamic packet capturing module is loaded successfully, a class proxy and reflection function provided by an Android system AOP frame is used, a class loader in the dynamic packet capturing module is used for loading a network frame dynamic loading module in the dynamic packet capturing module into a current application program, when the application program calls a network related interface, the network frame dynamic loading module is automatically called, when the network frame dynamic module is called, network data is forwarded to a server through a safety application proxy module, the application program identification module intelligently identifies the current application program in operation and judges whether the current application program is legal or not, and because each application program independently loads the dynamic network packet capturing module, whether the current application program is legal or not can be intelligently identified, and the data between different application programs are completely isolated by communicating with the server through different security channels, so that the security of the internal network of the enterprise is ensured.
The above is only a preferred embodiment of the present invention, and it should be noted that the above preferred embodiment should not be considered as limiting the present invention, and the protection scope of the present invention should be subject to the scope defined by the claims. It will be apparent to those skilled in the art that various modifications and adaptations can be made without departing from the spirit and scope of the invention, and these modifications and adaptations should be considered within the scope of the invention.

Claims (8)

1. A Root-free and non-invasive secure communication method based on an Android system is used for realizing data secure interaction between Android intelligent equipment and a server, and is characterized by comprising the following steps:
implanting a dynamic packet capturing module and a security client module comprising a security application agent module into the Android intelligent device;
starting an application program of the Android intelligent device;
the application program loads the dynamic packet capturing module, if the loading is successful, the application program continues to run, and if the loading is failed, the application program stops running; wherein, the application program loading dynamic packet capturing module comprises: an application program actively loads a dynamic packet capturing module; the dynamic packet capturing module downloads and analyzes the security policy from the security client module; the dynamic packet capturing module judges whether the current application program is safe and legal or not according to the analyzed safety strategy, if so, the application program continues to run, and if not, the application program stops running; the dynamic packet capturing module reflects a network connection module used by a current application program to the security agent module through an AOP frame of the Android intelligent device, and the application program successfully loads the dynamic packet capturing module into an application program network frame;
and the application program and the server carry out data interaction through the security application proxy module.
2. The Android system-based Root-free and non-intrusive secure communication method as recited in claim 1, wherein the data interaction between the application program and the server through the secure application proxy module comprises:
the application program calls a network interface in the network connection module;
the dynamic packet capturing module calls a security application proxy module of the security client module;
the method comprises the steps that an AOP framework of the Android intelligent device automatically reflects a network interface called by an application program to a security agent module;
the application program sends the data to the security agent module;
the security agent module sends data received from the application to the server.
3. The Android system-based Root-free and non-intrusive secure communication method of claim 2, wherein the data interaction between the application program and the server through the secure application proxy module further comprises:
the server sends data to the security agent module;
the security agent module sends the data received from the server to an AOP frame of the Android intelligent device;
and the application program automatically receives the data through the AOP framework of the Android intelligent equipment.
4. The Android system-based Root-free non-intrusive secure communication method as recited in claim 1, further comprising, before the application program performs data interaction with the server through the secure application proxy module: and the safety client module is used for carrying out user identity authentication on the server, if the server is safe and legal, data interaction is carried out, and otherwise, data interaction is not carried out.
5. A Root-free and non-invasive secure communication system based on an Android system, which realizes data secure interaction between Android intelligent devices and a server through the secure communication method of any one of claims 1 to 4, and is characterized by comprising:
the dynamic packet capturing module: the system is implanted in the Android intelligent device and used for loading an application program in the Android intelligent device;
a secure client module: the system is implanted into Android intelligent equipment and used for providing a security policy for the dynamic packet capturing module;
the security client module comprises a security application agent module, the dynamic packet capturing module automatically calls the security application agent module, and the security application agent module is used for providing a security channel for data interaction of an application program and a server.
6. The Android system-based Root-free and non-intrusive secure communication system according to claim 5, wherein the dynamic packet capture module comprises:
a security policy management module: the system is used for downloading the security policy from the security client module and analyzing the security policy;
an application identification module: the system is used for judging whether the current application program is safe and legal or not according to the analyzed safety strategy;
the network framework dynamic loading module: the method is used for loading into an application program network framework of the Android intelligent device.
7. The Android system-based Root-free and non-intrusive secure communication system of claim 5, wherein the secure client module is further provided with a security policy issuing module, and the security policy issuing module is configured to provide a security policy for the dynamic packet capture module.
8. The Android system-based Root-free and non-intrusive secure communication system of claim 7, wherein the secure client module is further provided with a user identity authentication module, and the user identity authentication module is used for authenticating whether the server is secure and legal.
CN201711464695.9A 2017-12-28 2017-12-28 Root-free and non-invasive secure communication method and system based on Android system Active CN108154026B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711464695.9A CN108154026B (en) 2017-12-28 2017-12-28 Root-free and non-invasive secure communication method and system based on Android system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711464695.9A CN108154026B (en) 2017-12-28 2017-12-28 Root-free and non-invasive secure communication method and system based on Android system

Publications (2)

Publication Number Publication Date
CN108154026A CN108154026A (en) 2018-06-12
CN108154026B true CN108154026B (en) 2022-01-11

Family

ID=62462544

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711464695.9A Active CN108154026B (en) 2017-12-28 2017-12-28 Root-free and non-invasive secure communication method and system based on Android system

Country Status (1)

Country Link
CN (1) CN108154026B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110888795B (en) * 2018-09-11 2023-10-20 中数通信息有限公司 APP security evaluation data acquisition method
CN109981662A (en) * 2019-03-31 2019-07-05 西安电子科技大学 A kind of safe communication system and method
CN112804686A (en) * 2021-01-22 2021-05-14 中信银行股份有限公司 Risk identification method and device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083602A (en) * 2006-05-30 2007-12-05 国际商业机器公司 Method for sharing communication information using local proxy
CN103152433A (en) * 2013-01-14 2013-06-12 广东电子工业研究院有限公司 Distributed server side framework and use, interaction and request processing method thereof
CN104239786A (en) * 2014-10-13 2014-12-24 北京奇虎科技有限公司 ROOT-free active defense configuration method and device
CN106020912A (en) * 2016-06-02 2016-10-12 北京元心科技有限公司 Cloud-based SELinux strategy loading method, device, terminal equipment and system
CN107133171A (en) * 2017-05-02 2017-09-05 山东浪潮通软信息科技有限公司 A kind of light weight AOP frameworks and its application method based on assembly type

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060167891A1 (en) * 2005-01-27 2006-07-27 Blaisdell Russell C Method and apparatus for redirecting transactions based on transaction response time policy in a distributed environment
US20070283317A1 (en) * 2006-03-17 2007-12-06 Organizational Strategies, Inc. Inter domain services manager

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083602A (en) * 2006-05-30 2007-12-05 国际商业机器公司 Method for sharing communication information using local proxy
CN103152433A (en) * 2013-01-14 2013-06-12 广东电子工业研究院有限公司 Distributed server side framework and use, interaction and request processing method thereof
CN104239786A (en) * 2014-10-13 2014-12-24 北京奇虎科技有限公司 ROOT-free active defense configuration method and device
CN106020912A (en) * 2016-06-02 2016-10-12 北京元心科技有限公司 Cloud-based SELinux strategy loading method, device, terminal equipment and system
CN107133171A (en) * 2017-05-02 2017-09-05 山东浪潮通软信息科技有限公司 A kind of light weight AOP frameworks and its application method based on assembly type

Also Published As

Publication number Publication date
CN108154026A (en) 2018-06-12

Similar Documents

Publication Publication Date Title
US9240977B2 (en) Techniques for protecting mobile applications
US8839354B2 (en) Mobile enterprise server and client device interaction
US9306933B2 (en) Ensuring network connection security between a wrapped app and a remote server
US9071600B2 (en) Phishing and online fraud prevention
US10356612B2 (en) Method of authenticating a terminal by a gateway of an internal network protected by an access security entity providing secure access
US20100197293A1 (en) Remote computer access authentication using a mobile device
CN112383524B (en) Operation and maintenance auditing method, device and medium for transformer substation power monitoring system
CA2792707A1 (en) Associating services to perimeters
CN108154026B (en) Root-free and non-invasive secure communication method and system based on Android system
US9245118B2 (en) Methods for identifying key logging activities with a portable device and devices thereof
Kravets et al. Mobile security solution for enterprise network
US11595426B2 (en) Risk based virtual workspace delivery
US20220217143A1 (en) Identity security gateway agent
CN109995769B (en) Multi-stage heterogeneous trans-regional full-real-time safety management and control method and system
CN116319024A (en) Access control method and device of zero trust system and zero trust system
US9553849B1 (en) Securing data based on network connectivity
CN104125223A (en) Security defending system for private data of mobile device
KR101592323B1 (en) System and method for remote server recovery
CN103685134A (en) WLAN (Wireless Local Area Network) resource access control method and WLAN resource access control device
EP1582053A4 (en) System and method for distributed authorization for access to communications device
CN109842600B (en) Method for realizing mobile office, terminal equipment and MDM equipment
Davi et al. Over-the-air cross-platform infection for breaking mTAN-based online banking authentication
EP3127374B1 (en) Securely accessing a wide area network via a mobile communication network
CN111371729A (en) Cloud computing based security protection method
CN111226415A (en) System and method for communicating with a service processor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: No. 333, Yunhua Road, high tech Zone, Chengdu, Sichuan 610041

Patentee after: China Electronics Technology Network Security Technology Co.,Ltd.

Address before: No. 333, Yunhua Road, high tech Zone, Chengdu, Sichuan 610041

Patentee before: CHENGDU WESTONE INFORMATION INDUSTRY Inc.

CP01 Change in the name or title of a patent holder