CN108183921A - 经由边界网关进行信息安全性威胁中断的系统和方法 - Google Patents
经由边界网关进行信息安全性威胁中断的系统和方法 Download PDFInfo
- Publication number
- CN108183921A CN108183921A CN201810122119.4A CN201810122119A CN108183921A CN 108183921 A CN108183921 A CN 108183921A CN 201810122119 A CN201810122119 A CN 201810122119A CN 108183921 A CN108183921 A CN 108183921A
- Authority
- CN
- China
- Prior art keywords
- alarm
- instruction
- group
- network
- gateway
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 104
- 238000011144 upstream manufacturing Methods 0.000 claims abstract description 114
- 230000009471 action Effects 0.000 claims abstract description 42
- 238000012545 processing Methods 0.000 claims description 51
- 230000001568 sexual effect Effects 0.000 claims description 38
- 230000000977 initiatory effect Effects 0.000 claims description 22
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000012790 confirmation Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 description 68
- 230000005540 biological transmission Effects 0.000 description 15
- 230000015654 memory Effects 0.000 description 15
- 238000012544 monitoring process Methods 0.000 description 9
- 230000008901 benefit Effects 0.000 description 8
- 238000007726 management method Methods 0.000 description 8
- 230000000694 effects Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000001514 detection method Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 238000010079 rubber tapping Methods 0.000 description 4
- 230000001960 triggered effect Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 3
- 230000001052 transient effect Effects 0.000 description 3
- 241000700605 Viruses Species 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000001965 increasing effect Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000001771 impaired effect Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000002045 lasting effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- ZRHANBBTXQZFSP-UHFFFAOYSA-M potassium;4-amino-3,5,6-trichloropyridine-2-carboxylate Chemical compound [K+].NC1=C(Cl)C(Cl)=NC(C([O-])=O)=C1Cl ZRHANBBTXQZFSP-UHFFFAOYSA-M 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1475—Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (33)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810122119.4A CN108183921B (zh) | 2015-03-18 | 2015-03-18 | 经由边界网关进行信息安全性威胁中断的系统和方法 |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810122119.4A CN108183921B (zh) | 2015-03-18 | 2015-03-18 | 经由边界网关进行信息安全性威胁中断的系统和方法 |
CN201580002251.6A CN105765942A (zh) | 2015-03-18 | 2015-03-18 | 经由边界网关进行信息安全性威胁中断的系统和方法 |
PCT/SG2015/050040 WO2016148641A1 (en) | 2015-03-18 | 2015-03-18 | System and method for information security threat disruption via a border gateway |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201580002251.6A Division CN105765942A (zh) | 2015-03-18 | 2015-03-18 | 经由边界网关进行信息安全性威胁中断的系统和方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108183921A true CN108183921A (zh) | 2018-06-19 |
CN108183921B CN108183921B (zh) | 2021-06-01 |
Family
ID=56343060
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810122119.4A Active CN108183921B (zh) | 2015-03-18 | 2015-03-18 | 经由边界网关进行信息安全性威胁中断的系统和方法 |
CN201580002251.6A Pending CN105765942A (zh) | 2015-03-18 | 2015-03-18 | 经由边界网关进行信息安全性威胁中断的系统和方法 |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201580002251.6A Pending CN105765942A (zh) | 2015-03-18 | 2015-03-18 | 经由边界网关进行信息安全性威胁中断的系统和方法 |
Country Status (8)
Country | Link |
---|---|
US (1) | US10693904B2 (zh) |
EP (1) | EP3108614B1 (zh) |
CN (2) | CN108183921B (zh) |
AU (1) | AU2015387270B2 (zh) |
MY (1) | MY184710A (zh) |
SG (1) | SG11201509821SA (zh) |
TW (1) | TWI699666B (zh) |
WO (1) | WO2016148641A1 (zh) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6578224B2 (ja) * | 2016-02-22 | 2019-09-18 | ルネサスエレクトロニクス株式会社 | 車載システム、プログラムおよびコントローラ |
KR20200085309A (ko) * | 2017-11-15 | 2020-07-14 | 케이에스비 에스이 앤드 코. 카게아아 | 사이버 공격으로부터 펌프 유닛을 보호하기 위한 방법 및 장치 |
JP7163593B2 (ja) * | 2018-03-09 | 2022-11-01 | 富士通株式会社 | 不正監視プログラム、不正監視方法、及び情報処理装置 |
US20200296119A1 (en) * | 2019-03-11 | 2020-09-17 | Electronics And Telecommunications Research Institute | Apparatus and method for security control |
US11394702B2 (en) | 2019-09-23 | 2022-07-19 | T-Mobile Usa, Inc. | Authentication system when authentication is not functioning |
JP2022050219A (ja) * | 2020-09-17 | 2022-03-30 | 富士フイルムビジネスイノベーション株式会社 | 情報処理装置及び情報処理プログラム |
CN112953928A (zh) * | 2020-12-30 | 2021-06-11 | 山东鲁能软件技术有限公司 | 一种视频监控前端设备的网络安全防护系统和方法 |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020166063A1 (en) * | 2001-03-01 | 2002-11-07 | Cyber Operations, Llc | System and method for anti-network terrorism |
CN101141305A (zh) * | 2007-10-08 | 2008-03-12 | 福建星网锐捷网络有限公司 | 网络安全防御系统、方法和安全管理服务器 |
CN101431449A (zh) * | 2008-11-04 | 2009-05-13 | 中国科学院计算技术研究所 | 一种网络流量清洗系统 |
CN101471936A (zh) * | 2007-12-29 | 2009-07-01 | 华为技术有限公司 | 建立ip会话的方法、装置及系统 |
US20110113490A1 (en) * | 2005-12-28 | 2011-05-12 | Foundry Networks, Llc | Techniques for preventing attacks on computer systems and networks |
CN102546661A (zh) * | 2012-02-21 | 2012-07-04 | 神州数码网络(北京)有限公司 | 一种防止IPv6网关邻居欺骗攻击的方法及系统 |
CN103368909A (zh) * | 2012-03-30 | 2013-10-23 | 迈普通信技术股份有限公司 | 一种通信设备控制平面保护装置及方法 |
CN103457920A (zh) * | 2012-06-04 | 2013-12-18 | 中国科学院声学研究所 | 一种基于重叠网的分布式防火墙安全策略配置方法和系统 |
US20140283030A1 (en) * | 2013-03-15 | 2014-09-18 | Centripetal Networks, Inc. | Protecting networks from cyber attacks and overloading |
Family Cites Families (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW453072B (en) * | 1999-08-18 | 2001-09-01 | Alma Baba Technical Res Lab Co | System for montoring network for cracker attacic |
US8370936B2 (en) * | 2002-02-08 | 2013-02-05 | Juniper Networks, Inc. | Multi-method gateway-based network security systems and methods |
US7366893B2 (en) * | 2002-08-07 | 2008-04-29 | Intelliden, Inc. | Method and apparatus for protecting a network from attack |
US7434254B1 (en) | 2002-10-25 | 2008-10-07 | Cisco Technology, Inc. | Method and apparatus for automatic filter generation and maintenance |
US20040103314A1 (en) | 2002-11-27 | 2004-05-27 | Liston Thomas F. | System and method for network intrusion prevention |
US7376969B1 (en) * | 2002-12-02 | 2008-05-20 | Arcsight, Inc. | Real time monitoring and analysis of events from multiple network security devices |
US9118711B2 (en) * | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
KR100628296B1 (ko) * | 2003-12-18 | 2006-09-27 | 한국전자통신연구원 | 네트워크 공격상황 분석 방법 |
JP2005197823A (ja) * | 2003-12-26 | 2005-07-21 | Fujitsu Ltd | ファイアウォールとルータ間での不正アクセス制御装置 |
US7610624B1 (en) * | 2004-01-12 | 2009-10-27 | Novell, Inc. | System and method for detecting and preventing attacks to a target computer system |
US20050193429A1 (en) * | 2004-01-23 | 2005-09-01 | The Barrier Group | Integrated data traffic monitoring system |
JP4480422B2 (ja) * | 2004-03-05 | 2010-06-16 | 富士通株式会社 | 不正アクセス阻止方法、装置及びシステム並びにプログラム |
CN100370757C (zh) * | 2004-07-09 | 2008-02-20 | 国际商业机器公司 | 识别网络内分布式拒绝服务攻击和防御攻击的方法和系统 |
US7725708B2 (en) * | 2004-10-07 | 2010-05-25 | Genband Inc. | Methods and systems for automatic denial of service protection in an IP device |
KR100628317B1 (ko) * | 2004-12-03 | 2006-09-27 | 한국전자통신연구원 | 네트워크 공격 상황 탐지 장치 및 그 방법 |
TW200644495A (en) * | 2005-06-10 | 2006-12-16 | D Link Corp | Regional joint detecting and guarding system for security of network information |
US20080127324A1 (en) * | 2006-11-24 | 2008-05-29 | Electronics And Telecommunications Research Institute | DDoS FLOODING ATTACK RESPONSE APPROACH USING DETERMINISTIC PUSH BACK METHOD |
US20080181100A1 (en) * | 2007-01-31 | 2008-07-31 | Charlie Chen-Yui Yang | Methods and apparatus to manage network correction procedures |
JP4777461B2 (ja) * | 2007-09-07 | 2011-09-21 | 株式会社サイバー・ソリューションズ | ネットワークセキュリティ監視装置ならびにネットワークセキュリティ監視システム |
US9009828B1 (en) * | 2007-09-28 | 2015-04-14 | Dell SecureWorks, Inc. | System and method for identification and blocking of unwanted network traffic |
US8085681B2 (en) * | 2008-10-21 | 2011-12-27 | At&T Intellectual Property I, Lp | Centralized analysis and management of network packets |
US8621065B1 (en) * | 2008-10-23 | 2013-12-31 | Amazon Technologies, Inc. | Dynamic blocking of suspicious electronic submissions |
US8528041B1 (en) * | 2008-11-07 | 2013-09-03 | Sprint Communications Company L.P. | Out-of-band network security management |
US20100262688A1 (en) * | 2009-01-21 | 2010-10-14 | Daniar Hussain | Systems, methods, and devices for detecting security vulnerabilities in ip networks |
US8914878B2 (en) * | 2009-04-29 | 2014-12-16 | Juniper Networks, Inc. | Detecting malicious network software agents |
TWI430674B (zh) * | 2009-08-14 | 2014-03-11 | Ind Tech Res Inst | 用於具有中繼節點之無線通訊系統的安全性方法 |
US9667503B2 (en) * | 2010-09-22 | 2017-05-30 | At & T Intellectual Property I, L.P. | Method and system for detecting common attributes of network upgrades |
US8561187B1 (en) * | 2010-09-30 | 2013-10-15 | Webroot Inc. | System and method for prosecuting dangerous IP addresses on the internet |
US8499348B1 (en) * | 2010-12-28 | 2013-07-30 | Amazon Technologies, Inc. | Detection of and responses to network attacks |
US8978136B2 (en) * | 2011-02-17 | 2015-03-10 | Terremark Worldwide, Inc. | Systems and methods for detection and suppression of abnormal conditions within a networked environment |
US9571511B2 (en) * | 2013-06-14 | 2017-02-14 | Damballa, Inc. | Systems and methods for traffic classification |
US9160761B2 (en) * | 2013-07-31 | 2015-10-13 | Hewlett-Packard Development Company, L.P. | Selection of a countermeasure |
US10223530B2 (en) * | 2013-11-13 | 2019-03-05 | Proofpoint, Inc. | System and method of protecting client computers |
US20150135316A1 (en) * | 2013-11-13 | 2015-05-14 | NetCitadel Inc. | System and method of protecting client computers |
US8881281B1 (en) * | 2014-05-29 | 2014-11-04 | Singularity Networks, Inc. | Application and network abuse detection with adaptive mitigation utilizing multi-modal intelligence data |
US20160036837A1 (en) * | 2014-08-04 | 2016-02-04 | Microsoft Corporation | Detecting attacks on data centers |
-
2015
- 2015-03-18 WO PCT/SG2015/050040 patent/WO2016148641A1/en active Application Filing
- 2015-03-18 CN CN201810122119.4A patent/CN108183921B/zh active Active
- 2015-03-18 CN CN201580002251.6A patent/CN105765942A/zh active Pending
- 2015-03-18 US US14/893,668 patent/US10693904B2/en active Active
- 2015-03-18 MY MYPI2015704318A patent/MY184710A/en unknown
- 2015-03-18 SG SG11201509821SA patent/SG11201509821SA/en unknown
- 2015-03-18 AU AU2015387270A patent/AU2015387270B2/en active Active
- 2015-03-18 EP EP15796998.1A patent/EP3108614B1/en active Active
-
2016
- 2016-03-15 TW TW105107893A patent/TWI699666B/zh active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020166063A1 (en) * | 2001-03-01 | 2002-11-07 | Cyber Operations, Llc | System and method for anti-network terrorism |
US20110113490A1 (en) * | 2005-12-28 | 2011-05-12 | Foundry Networks, Llc | Techniques for preventing attacks on computer systems and networks |
CN101141305A (zh) * | 2007-10-08 | 2008-03-12 | 福建星网锐捷网络有限公司 | 网络安全防御系统、方法和安全管理服务器 |
CN101471936A (zh) * | 2007-12-29 | 2009-07-01 | 华为技术有限公司 | 建立ip会话的方法、装置及系统 |
CN101431449A (zh) * | 2008-11-04 | 2009-05-13 | 中国科学院计算技术研究所 | 一种网络流量清洗系统 |
CN102546661A (zh) * | 2012-02-21 | 2012-07-04 | 神州数码网络(北京)有限公司 | 一种防止IPv6网关邻居欺骗攻击的方法及系统 |
CN103368909A (zh) * | 2012-03-30 | 2013-10-23 | 迈普通信技术股份有限公司 | 一种通信设备控制平面保护装置及方法 |
CN103457920A (zh) * | 2012-06-04 | 2013-12-18 | 中国科学院声学研究所 | 一种基于重叠网的分布式防火墙安全策略配置方法和系统 |
US20140283030A1 (en) * | 2013-03-15 | 2014-09-18 | Centripetal Networks, Inc. | Protecting networks from cyber attacks and overloading |
Also Published As
Publication number | Publication date |
---|---|
US20160277436A1 (en) | 2016-09-22 |
TWI699666B (zh) | 2020-07-21 |
WO2016148641A1 (en) | 2016-09-22 |
US10693904B2 (en) | 2020-06-23 |
AU2015387270B2 (en) | 2020-01-02 |
MY184710A (en) | 2021-04-19 |
EP3108614A1 (en) | 2016-12-28 |
CN108183921B (zh) | 2021-06-01 |
SG11201509821SA (en) | 2016-10-28 |
EP3108614A4 (en) | 2017-12-27 |
CN105765942A (zh) | 2016-07-13 |
EP3108614B1 (en) | 2022-08-24 |
TW201635182A (zh) | 2016-10-01 |
AU2015387270A1 (en) | 2017-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108183921A (zh) | 经由边界网关进行信息安全性威胁中断的系统和方法 | |
US8516575B2 (en) | Systems, methods, and media for enforcing a security policy in a network including a plurality of components | |
KR101217647B1 (ko) | 특정 소스/목적지 ip 어드레스 쌍들에 기초한 ip 네트워크들에서 서비스 거부 공격들에 대한 방어 방법 및 장치 | |
WO2006071985A2 (en) | Threat scoring system and method for intrusion detection security networks | |
CN106850690B (zh) | 一种蜜罐构造方法及系统 | |
Mukhopadhyay et al. | A comparative study of related technologies of intrusion detection & prevention systems | |
Kumar et al. | DDOS prevention in IoT | |
CN113364799B (zh) | 一种网络威胁行为的处理方法和系统 | |
Cheetancheri et al. | A distributed host-based worm detection system | |
EP2981041A1 (en) | Connected home system with cyber security monitoring | |
RU2703329C1 (ru) | Способ обнаружения несанкционированного использования сетевых устройств ограниченной функциональности из локальной сети и предотвращения исходящих от них распределенных сетевых атак | |
JP4159814B2 (ja) | 双方向型ネットワーク侵入検知システムおよび双方向型侵入検知プログラム | |
Chiu et al. | Detection and defense of DDoS attack and flash events by using Shannon entropy | |
US20160149933A1 (en) | Collaborative network security | |
Kumar et al. | Statistical based intrusion detection framework using six sigma technique | |
CN115694965A (zh) | 一种电力行业网络安全密网系统 | |
CN113411296B (zh) | 态势感知虚拟链路防御方法、装置及系统 | |
CN109274638A (zh) | 一种攻击源接入自动识别处理的方法和路由器 | |
Lasota et al. | Mobile platform for threat monitoring in wireless sensor networks | |
Lakhdhar et al. | An approach to a graph-based active cyber defense model | |
Shirsath et al. | An Assessment of Game-Based Cyber Defense Strategy for SDN | |
Wu et al. | Testing and evaluation of the mimic defense principle verification system | |
Giri et al. | Intrusion Detection System for Local Networks–A Review Study | |
Shengjian et al. | Design of network security early-warning system based on network defense in depth model | |
CN115604009A (zh) | 一种网络攻击对抗方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1249683 Country of ref document: HK |
|
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20181224 Address after: Singapore Applicant after: Ensain Information Security (Network Security) Co.,Ltd. Address before: Singapore Singapore Applicant before: CERTIS CISCO SECURITY Pte. Ltd. |
|
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20190718 Address after: Shinka ha Applicant after: CERTIS CISCO SECURITY Pte. Ltd. Address before: Singapore Applicant before: Ensain Information Security (Network Security) Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |