CN108874941B - Big data URL duplication removing method based on convolution characteristics and multiple Hash mapping - Google Patents

Big data URL duplication removing method based on convolution characteristics and multiple Hash mapping Download PDF

Info

Publication number
CN108874941B
CN108874941B CN201810562678.7A CN201810562678A CN108874941B CN 108874941 B CN108874941 B CN 108874941B CN 201810562678 A CN201810562678 A CN 201810562678A CN 108874941 B CN108874941 B CN 108874941B
Authority
CN
China
Prior art keywords
convolution
url
hash
mapping
big data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810562678.7A
Other languages
Chinese (zh)
Other versions
CN108874941A (en
Inventor
宋绪成
邓金城
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Knownsec Information Technology Co ltd
Original Assignee
Chengdu Knownsec Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Knownsec Information Technology Co ltd filed Critical Chengdu Knownsec Information Technology Co ltd
Priority to CN201810562678.7A priority Critical patent/CN108874941B/en
Publication of CN108874941A publication Critical patent/CN108874941A/en
Application granted granted Critical
Publication of CN108874941B publication Critical patent/CN108874941B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a big data URL duplication removing method based on convolution characteristics and multiple hash mapping, wherein a BitSet is established by using a fast characteristic mapping algorithm based on the convolution characteristics and the multiple hash function mapping, each URL is mapped to a plurality of bits through one convolution operation and a plurality of hash functions, the collision probability is greatly reduced, and the URL in an independent web log is identified. Compared with the traditional duplicate removal calculation method, the method of the invention saves more resources, greatly reduces the probability of hash collision and has very high recognition speed.

Description

Big data URL duplication removing method based on convolution characteristics and multiple Hash mapping
Technical Field
The invention relates to the technical field of URL (uniform resource locator) deduplication, in particular to a big data URL deduplication method based on convolution features and multiple hash mapping.
Background
One of the existing big data URL processing technologies is to store the accessed URL by HashSet, and whether a URL is accessed can be checked only by approaching the cost of O (1). The method has the following defects: the memory is consumed too much, the occupied memory is more and more along with the increase of the URLs, even if only one hundred million URLs exist, each URL is calculated into 50 characters, 5GB memory is needed, and the number of actual large data processing is much larger.
The second of the existing big data URL processing technology is that the URL is subjected to one-way hash such as MD5 or SHA-1 and then stored in a HashSet or a database, and because the length of an information summary of a character string after being processed by MD5 is only 128 bits, and the length of an information summary of the character string after being processed by SHA-1 is only 160 bits, the memory is saved by several times. This method has the following disadvantages: the hash mapping is used, so that the memory is saved by several times, but a plurality of hash table conflicts still exist in the processing process of the data volume of billions, the number of false reports reaches a non-negligible number, and the duplicate removal effect is poor.
Terminology of the related art
Convolution: in functional analysis, Convolution (Convolution) is a mathematical algorithm that generates a third function by two functions f and g, characterizing the mapping of the overlapping parts of the function f and g, which are flipped and translated.
URL: a uniform resource locator is a compact representation of the location and access method of a resource available from the internet, and is the address of a standard resource on the internet.
A hash function: the keywords in the data elements are mapped to the hash table through a certain functional relationship.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a big data URL duplicate removal method based on convolution characteristics and multiple hash mapping, which is used for solving the problems of low URL duplicate removal processing speed and poor effect of a big data WEB access log, can quickly screen out high-value independent URLs from a huge amount of data and is convenient for post processing.
In order to solve the technical problems, the invention adopts the technical scheme that:
a big data URL duplication removing method based on convolution characteristics and multiple hash mapping comprises the following steps:
step 1: extracting a WEB access log from a WEB server or traditional WAF equipment, and then screening out required domain names HOST and URLs;
step 2: performing sequence convolution and multi-hash function mapping on the URL field;
defining a convolution kernel containing a number string by self, wherein the number sequence of the convolution kernel is determined to be any one, each character string needing to be de-duplicated is determined to be a number sequence according to a mapping table, and the result of one convolution operation is the multiplication of corresponding numbers; defining a step size, and sequentially convolving the convolution kernel on the digital sequence to generate a plurality of convolution values;
setting the number k of hash functions, the size m of bit groups and the number n of added character strings, wherein the possibility of false alarm of a hash table under the condition is as follows:
Figure BDA0001683700360000021
setting the value of k to be k-ln 2 m/n, the lowest false alarm rate is reached:
Figure BDA0001683700360000022
determining the number of hash functions to be used according to the expected false alarm rate according to the formula;
and step 3: the convolution function is f, and k hash functions are used for mapping, the hash functions are h1, h2, h3, h4... hk, and the binary bit assignment principle of the convolution characteristic value and the hash function mapping value in the BitSet is as follows: initializing a bit array of m bits (each bit is initially set to be 0), wherein the convolution output and the output of each hash function are numbers (corresponding to the index of the bit array) between (0, m-1);
input x, for each hash function, compute j ═ hi (x), set m _ bit [ j ] to 1; similarly, for each convolution operation of the convolution function, c ═ f (x) is calculated, and m _ bit [ c ] is set to 1;
and 4, step 4: and according to the assigned BitSet, the assigned BitSet is used as a keyword or a label of the URL, and then the independent URL is identified.
Further, the step 1 specifically comprises:
1) filtering redundant fields in the WAF log;
2) performing label matching by using the script, and filtering the static file and the URL which does not meet the requirement of the status code;
3) and splicing the domain name HOST and the URL character string and exporting.
Further, in step 1, "filter out unnecessary fields in the WAF logs" performs filtering using the filter method in the scala language, that is, each log is first partitioned by a space character using the split method in scala, and then a filter method is customized, wherein the filter method includes the rule to be filtered.
Further, when the domain name HOST and the URL character string are spliced, a character string combination method "+" built in scala is used for splicing.
Compared with the prior art, the invention has the beneficial effects that: the method utilizes the convolution characteristic value representing the independent characteristic of the URL and the mapping of the multi-Hash function, and the generated BitSet represents the multi-character URL, so that resources are saved more than that of a traditional duplicate removal calculation method, the probability of Hash collision is greatly reduced, and the identification speed is very high.
Drawings
FIG. 1 is a flowchart illustrating a big data URL deduplication method based on convolution features and multiple hash mappings according to the present invention.
Fig. 2 is a diagram of the convolution value and hash function value mapping principle.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
According to the invention, a BitSet is established by using a fast feature mapping algorithm based on convolution features and multiple hash function mapping, and each URL is mapped to a plurality of bits through one convolution operation and a plurality of hash functions, so that the collision probability is greatly reduced, and the URLs in independent web logs are identified. The details are as follows:
first, extract the WEB access log from the WEB server or the traditional WAF device, and then screen out the required HOST and URL (uniform resource locator). The specific screening method comprises the following steps:
1. filtering redundant fields in a WAF log
The filtering can be done using the filter method in scala language. Firstly, each log is divided by a space character by using a split method in scala:
val fields=line.split("")
then, a filter method is customized, wherein the rule which needs to be filtered is contained. The rule setting method can be performed by using a scala regular matching mode:
def myfilter()
val ho ═ gov.cn ". r// case: filtering only government web sites
ho.findFirstMatchIn(host)!=None
2. Using scripts for tag matching, filtering static files and URLs that do not meet required state codes
The static file refers to a static page or file accessed by a URL, such as html, xml, js, css, and the like, and these URLs are not needed in the actual deduplication application, and are also performed by using a self-defined filter function in scala:
Figure BDA0001683700360000031
3. combining HOST and URL, deriving
The filtered host and the filtered URL are both in the form of character strings, and then the duplicate removal operation is performed, all URLs under a domain name need to be removed, so that the host and the URL character strings are spliced by using a character string combination method "+" built in scala:
val fields=line.split("")
val host=fields(8)
val url=fields(9)
val uRL=host+url
secondly, performing sequence convolution and multi-hash function mapping on URL fields
Description of convolution operation: a convolution kernel is customized that includes a string of numbers, wherein the length of the convolution kernel is preferably no less than 6 numbers. The number sequence of convolution kernels is arbitrary, e.g., ("453752"), but once determined cannot be modified, all subsequent convolution operations use this convolution kernel. And determining each character string needing to be deduplicated as a digit sequence according to a mapping table (for example, "abcde" is mapped to "12345"), wherein the result of one convolution operation is the multiplication of corresponding digits, for example, 123 convolution 234, and the result is 1 × 2+ 3 × 4 ═ 20. Defining a step size, the sequential convolution of the convolution kernel over the digital sequence can produce many convolution values, such as convolution kernel "123" convolved over "23456", 123 convolved with 234 to produce a value, and 123 convolved with 345 to produce a value (step size 1).
The hash mapping algorithm may use the general MD5 algorithm. Setting the number k of hash functions, the size m of bit groups and the number n of added character strings, wherein the possibility of false alarm of a hash table under the condition is as follows:
Figure BDA0001683700360000041
setting the value of k to be k-ln 2 m/n, the lowest false alarm rate is reached:
Figure BDA0001683700360000042
and determining the number of hash functions to be used according to the expected false alarm rate according to the formula.
And thirdly, the convolution function is f, k hash functions are used for mapping, the hash functions are h1, h2, h3 and h4... hk, and the principle of binary bit assignment of the convolution characteristic value and the hash function mapping value in the BitSet is shown in FIG. 2. Initializing a bit array with m bits, wherein the convolution output and the output of each hash function are numbers between (0, m-1); input x, for each hash function, compute j ═ hi (x), set m _ bit [ j ] to 1; similarly, for each convolution operation of the convolution function, c ═ f (x) is calculated, and m _ bit [ c ] is set to 1.
Note: many values are generated in the convolution process (a large step length generates few values, a small step length generates many values), the step length is defined according to the needs of the user, and each convolution value is mapped into the BitSet (only one convolution value generated by convolution is shown in an image in fig. 2).
The multiple hash function mapping process part Java code is as follows:
Figure BDA0001683700360000043
Figure BDA0001683700360000051
and fourthly, according to the assigned BitSet, the assigned BitSet can be easily used as a keyword or a label of the URL, and then the independent URL is identified. For example, if a BitSet to which a URL maps already exists, the URL is considered to be duplicated.
And fifthly, the identified partial results are as follows:
www.xxxx.com/piwik.phpaction_name=www.wdzj.com%2F%E7%A4%BC%E5%BE%B7%E8%B4%A2%E5%AF%8C%E7%BD%91%E8%B4%B7%E6%A1%A3%E6%A1%88_%E7%A4%BC%E5%BE%B7%E8%B4%A2%E5%AF%8C%E5%AE%98%E7%BD%91%E8%B5%84%E6%96%99_p2p%E5%B9%B3%E5%8F%B0%E6%A1%A3%E6%A1%88_%E7%BD%91%E8%B4%B7%E4%B9%8B%E5%AE%B6&idsite=1&rec=1&r=931653&h=23&m=31&s=47&url=https%3A%2F%2Fwww.wdzj.com%2Fdangan%2Fldcf1%2F&urlref=https%3A%2F%2Fwww.wdzj.com%2Fdangan%2Fsearch%3Ffilter%3De1-b41-n44%26show%3D1&_id=747107e1f17b5566&_idts=1521648124&_idvc=3&_idn=0&_refts=1521732597&_viewts=1521732597&_ref=https%3A%2F%2Fwww.google.com%2F&send_image=0&pdf=1&qt=0&realp=0&wma=0&dir=0&fla=0&java=0&gears=0&ag=0&cookie=1&res=1440x900&cvar=%7B%223%22%3A%5B%22www%22%2C%22%22%5D%2C%225%22%3A%5B%22uid%22%2C%220%22%5D%7D&gt_ms=888>-1
www.xxxx.com/m/c.ashxs=35&u=100000&c=4&P=170663&Fl=https%3A//www.google.com.hk/>3
www.xxxx.com/user/actionevent_type=load&curt_id=7f8745b8-2d39-11e8-897e-00163e131d5b&prev_id=&event_info=%7B%22ad_uuid%22%3A%22add_trwgzad1tkva%22%7D&event=ad_exposure&target=http%3A%2F%2Fwww.shixiseng.com%2Ftc%2Frpo&uuid=9f2cd019-7402-8948-9c0b-501353d6a9e5&url=https%253A%2F%2Fwww.shixiseng.com%2F&referrer=https%3A%2F%2Fwww.google.com%2F&uri=%2F&source=pc>---1
www.xxxx.com/user/actionevent_type=load&curt_id=54c06304-2d8a-11e8-97ea-00163e131d5b&prev_id=42b3df23-dfea-4651-a86f-88ba92a4e42d&event_info=%7B%22ad_uuid%22%3A%22add_77mcl4cyo2uu%22%7D&event=ad_exposure&target=%2Fcom%2Fcom_qrf1ioxwhvxk&uuid=6e65a594-9034-97f3-ad00-b1e7a46d39ca&url=https%253A%2F%2Fwww.shixiseng.com%2F&referrer=https%3A%2F%2Fwww.google.com%2F&uri=%2F&source=pc>---1
www.xxxx.com/user/actionevent_type=load&curt_id=d72ad59e-2dcc-11e8-97ea-00163e131d5b&prev_id=&event_info=%7B%22ad_uuid%22%3A%22add_5zj7701ibn7t%22%7D&event=ad_exposure&target=http%3A%2F%2Fcampus.51job.com%2Funiqlo%2F&uuid=f6878545-7dff-4c90-9ec4-d3f0b0be2cb7&url=https%253A%2F%2Fwww.shixiseng.com%2F&referrer=https%3A%2F%2Fwww.google.com%2F&uri=%2F&source=pc>---1
www.xxxx.com/user/actionevent_type=load&curt_id=dc320a40-2dd5-11e8-86b1-00163e0e0af8&prev_id=&event_info=%7B%22ad_uuid%22%3A%22add_q5h0sozpfgsg%22%7D&event=ad_exposure&target=%2Fcom%2Fcom_ohgsahcs55rv&uuid=4d6eab5f-7e0a-da6c-a70a-75cacb5b8e2f&url=https%253A%2F%2Fwww.shixiseng.com%2F&referrer=https%3A%2F%2Fwww.google.com.hk%2F&uri=%2F&source=pc>1
www.xxxx.com/user/actionevent_type=load&curt_id=0ae48218-2db9-11e8-99e6-00163e040372&prev_id=&event_info=%7B%22ad_uuid%22%3A%22add_trwgzad1tkva%22%7D&event=ad_exposure&target=http%3A%2F%2Fwww.shixiseng.com%2Ftc%2Frpo&uuid=21bf3ae9-d652-1e0a-867a-1f9c29660cd5&url=https%253A%2F%2Fwww.shixiseng.com%2F&referrer=https%3A%2F%2Fwww.google.com.hk%2F&uri=%2F&source=pc>1

Claims (4)

1. a big data URL duplication removing method based on convolution characteristics and multiple hash mapping is characterized by comprising the following steps:
step 1: extracting a WEB access log from a WEB server or traditional WAF equipment, and then screening out required domain names HOST and URLs; splicing the domain name HOST and the URL character string;
step 2: performing sequence convolution and multi-hash function mapping on the URL field;
defining a convolution kernel containing a number string by self, wherein the number sequence of the convolution kernel is determined to be any one, each character string needing to be de-duplicated is determined to be a number sequence according to a mapping table, and the result of one convolution operation is the multiplication of corresponding numbers; defining a step size, and sequentially convolving the convolution kernel on the digital sequence to generate a plurality of convolution values;
setting the number k of hash functions, the size m of bit groups and the number n of added character strings, wherein the possibility of false alarm of a hash table under the condition is as follows:
Figure FDA0003180040130000011
setting the value of k to be k-ln 2 m/n, the lowest false alarm rate is reached:
Figure FDA0003180040130000012
determining the number of hash functions to be used according to the expected false alarm rate according to the formula;
and step 3: the convolution function is f, and k hash functions are used for mapping, the hash functions are h1, h2, h3, h4... hk, and the binary bit assignment principle of the convolution characteristic value and the hash function mapping value in the BitSet is as follows: initializing a bit array with m bits, wherein the convolution output and the output of each hash function are numbers between (0, m-1); input x, for each hash function, compute j ═ hi (x), set m _ bit [ j ] to 1; similarly, for each convolution operation of the convolution function, c ═ f (x) is calculated, and m _ bit [ c ] is set to 1;
and 4, step 4: and according to the assigned BitSet, the assigned BitSet is used as a keyword or a label of the URL, and then the independent URL is identified.
2. The big data URL deduplication method based on convolution features and multiple hash mapping as claimed in claim 1, wherein the step 1 specifically is:
1) filtering redundant fields in the WAF log;
2) performing label matching by using the script, and filtering the static file and the URL which does not meet the requirement of the status code;
3) and splicing the domain name HOST and the URL character string and exporting.
3. The big data URL deduplication method based on convolution features and multiple hashes mapping as claimed in claim 2, wherein "filtering out unnecessary fields in WAF logs" in step 1 is performed by filtering in scala language using filter method, i.e. each log is first partitioned by space character using split method in scala, and then a filter method is customized, wherein the rule that the filtering is wanted is contained.
4. The big data URL deduplication method based on convolution features and multiple hashmaps as claimed in claim 3, wherein when domain name HOST and URL string are spliced, the concatenation is performed using a built-in string combination method "+" of scala.
CN201810562678.7A 2018-06-04 2018-06-04 Big data URL duplication removing method based on convolution characteristics and multiple Hash mapping Active CN108874941B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810562678.7A CN108874941B (en) 2018-06-04 2018-06-04 Big data URL duplication removing method based on convolution characteristics and multiple Hash mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810562678.7A CN108874941B (en) 2018-06-04 2018-06-04 Big data URL duplication removing method based on convolution characteristics and multiple Hash mapping

Publications (2)

Publication Number Publication Date
CN108874941A CN108874941A (en) 2018-11-23
CN108874941B true CN108874941B (en) 2021-09-21

Family

ID=64335996

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810562678.7A Active CN108874941B (en) 2018-06-04 2018-06-04 Big data URL duplication removing method based on convolution characteristics and multiple Hash mapping

Country Status (1)

Country Link
CN (1) CN108874941B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110334251B (en) * 2019-07-01 2021-10-19 南京邮电大学 Element sequence generation method for effectively solving rehash conflict

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101958883A (en) * 2010-03-26 2011-01-26 湘潭大学 Bloom Filter and open-source kernel-based method for defensing SYN Flood attack
CN103106219A (en) * 2011-11-15 2013-05-15 盛乐信息技术(上海)有限公司 Method and system of web page grabbing
CN104657350A (en) * 2015-03-04 2015-05-27 中国科学院自动化研究所 Hash learning method for short text integrated with implicit semantic features
CN104809182A (en) * 2015-04-17 2015-07-29 东南大学 Method for web crawler URL (uniform resource locator) deduplicating based on DSBF (dynamic splitting Bloom Filter)
CN105956068A (en) * 2016-04-27 2016-09-21 湖南蚁坊软件有限公司 Webpage URL repetition elimination method based on distributed database
CN106295629A (en) * 2016-07-15 2017-01-04 北京市商汤科技开发有限公司 Structured text detection method and system
CN106599022A (en) * 2016-11-01 2017-04-26 中山大学 User portrait forming method based on user access data
CN107832476A (en) * 2017-12-01 2018-03-23 北京百度网讯科技有限公司 A kind of understanding method of search sequence, device, equipment and storage medium
CN107871014A (en) * 2017-11-23 2018-04-03 清华大学 A kind of big data cross-module state search method and system based on depth integration Hash

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8626474B2 (en) * 2010-04-19 2014-01-07 Altera Corporation Simulation tool for high-speed communications links

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101958883A (en) * 2010-03-26 2011-01-26 湘潭大学 Bloom Filter and open-source kernel-based method for defensing SYN Flood attack
CN103106219A (en) * 2011-11-15 2013-05-15 盛乐信息技术(上海)有限公司 Method and system of web page grabbing
CN104657350A (en) * 2015-03-04 2015-05-27 中国科学院自动化研究所 Hash learning method for short text integrated with implicit semantic features
CN104809182A (en) * 2015-04-17 2015-07-29 东南大学 Method for web crawler URL (uniform resource locator) deduplicating based on DSBF (dynamic splitting Bloom Filter)
CN105956068A (en) * 2016-04-27 2016-09-21 湖南蚁坊软件有限公司 Webpage URL repetition elimination method based on distributed database
CN106295629A (en) * 2016-07-15 2017-01-04 北京市商汤科技开发有限公司 Structured text detection method and system
CN106599022A (en) * 2016-11-01 2017-04-26 中山大学 User portrait forming method based on user access data
CN107871014A (en) * 2017-11-23 2018-04-03 清华大学 A kind of big data cross-module state search method and system based on depth integration Hash
CN107832476A (en) * 2017-12-01 2018-03-23 北京百度网讯科技有限公司 A kind of understanding method of search sequence, device, equipment and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
BloomFilter 确定合适的 k(hash函数个数) 值;F_URY;《https://blog.csdn.net/u012400327/article/details/62222922》;20170315;第1页 *
Character-level Convolutional Networks for Text Classification;Xiang Zhang 等;《arXiv:1509.01626v3》;20160404;第2-4页第2部分 *
网络爬虫技术在云平台上的研究与实现;刘小云;《中国优秀硕士学位论文全文数据库 信息科技辑》;20170215(第02期);第18-21页第3.3.2节 *

Also Published As

Publication number Publication date
CN108874941A (en) 2018-11-23

Similar Documents

Publication Publication Date Title
US10579831B2 (en) Verification of data set components using digitally signed probabilistic data structures
US8380680B2 (en) Piecemeal list prefetch
CN110162750B (en) Text similarity detection method, electronic device and computer readable storage medium
US10216848B2 (en) Method and system for recommending cloud websites based on terminal access statistics
US10078687B2 (en) Deletion of elements from a probabilistic data structure
CN105975459B (en) A kind of the weight mask method and device of lexical item
US10678779B2 (en) Generating sub-indexes from an index to compress the index
US10263784B2 (en) Signature verification for data set components using probabilistic data structures
WO2017036348A1 (en) Method and device for compressing and decompressing extensible markup language document
CN110750731B (en) Method and system for removing duplicate of news public opinion
JP2017532655A (en) Compress cascading style sheet files
CN104065736A (en) URL redirection method, device, and system
US20140325327A1 (en) Replacing problem web links using context information
CN111563199A (en) Data processing method and device
US20210109945A1 (en) Self-orchestrated system for extraction, analysis, and presentation of entity data
CN108874941B (en) Big data URL duplication removing method based on convolution characteristics and multiple Hash mapping
CN112765966B (en) Method and device for removing duplicate of associated word, computer readable storage medium and electronic equipment
CN103618742A (en) Method and system for acquiring sub domain names and webmaster permission verification method
US20140129543A1 (en) Search service including indexing text containing numbers in part using one or more number index structures
CN104361094A (en) Storage method and device for file in search result, and browser client
CN115080684B (en) Network disk document indexing method and device, network disk and storage medium
US20190354455A1 (en) Skew detector for data storage system
US11593824B2 (en) System and method for domain name valuation
CN110737748B (en) Text deduplication method and system
CN111723286A (en) Data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: 9/F, Block C, No. 28 Tianfu Avenue North Section, Chengdu High tech Zone, China (Sichuan) Pilot Free Trade Zone, Chengdu City, Sichuan Province, 610000

Patentee after: CHENGDU KNOWNSEC INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 610000, 11th floor, building 2, No. 219, Tianfu Third Street, hi tech Zone, Chengdu, Sichuan Province

Patentee before: CHENGDU KNOWNSEC INFORMATION TECHNOLOGY Co.,Ltd.