CN109246285A - A kind of method of cell phone intelligent encryption and decryption - Google Patents

A kind of method of cell phone intelligent encryption and decryption Download PDF

Info

Publication number
CN109246285A
CN109246285A CN201810158183.8A CN201810158183A CN109246285A CN 109246285 A CN109246285 A CN 109246285A CN 201810158183 A CN201810158183 A CN 201810158183A CN 109246285 A CN109246285 A CN 109246285A
Authority
CN
China
Prior art keywords
image
equipment
entropy
mobile phone
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810158183.8A
Other languages
Chinese (zh)
Other versions
CN109246285B (en
Inventor
刘晓英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Joint Creation Polytron Technologies Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810158183.8A priority Critical patent/CN109246285B/en
Publication of CN109246285A publication Critical patent/CN109246285A/en
Application granted granted Critical
Publication of CN109246285B publication Critical patent/CN109246285B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/73Deblurring; Sharpening
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/10Segmentation; Edge detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72469User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
    • H04M1/72472User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons wherein the items are sorted according to specific criteria, e.g. frequency of use

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Environmental & Geological Engineering (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a kind of methods of cell phone intelligent encryption and decryption, and this method includes that the privacy of mobile phone owner is protected using cell phone application access times matching system.By means of the invention it is possible to be effectively protected the privacy of mobile phone owner.

Description

A kind of method of cell phone intelligent encryption and decryption
Technical field
The present invention relates to the communications field more particularly to a kind of methods of cell phone intelligent encryption and decryption.
Background technique
For in traditional sense, why this English name write a Chinese character in simplified form of APP can be so popular, is primarily due to mobile mutual The quick emergence of networking.The fast development of mobile Internet allows mobile application and mobile hardware all rapidly to grow up, so-called Cell phone application also will start large-scale development because of there is hardware foundation, this, which just allows in the market, occurs The mobile phone application of large quantities of high quality.
And our usually said mobile phone applications are exactly the app that we are discussing now, he is writing a Chinese character in simplified form for mobile phone application, When many IT industry circle comment personages make comments per each pair of certain type of app, actually to this kind of mobile phone application It is once analyzed and is explained.Therefore, nowadays in most cases we be all because mobile phone is applied and to look for app be assorted In the case where the answer of the meaning, most common answer is exactly that app is exactly application program of mobile phone.
In the prior art, fingerprint recognition, Password Input and common face still are limited to the technology of mobile phone encryption and decryption Identification, the intelligent level of encryption and decryption is low, is easy to be cracked.
Summary of the invention
It to solve the above-mentioned problems, can be high-precision the present invention provides a kind of method of cell phone intelligent encryption and decryption On the basis of the image recognition of degree, the number of each APP on mobile phone interface is used in history based on owner, determination is each in history APP is judged as non-owner's use state, by hand once discovery active user's is mismatched using sequence and history using sequence Machine-cut changes to encryption mode.
The present invention at least has following multiple important inventive points:
(1) contrast of the image after Edge contrast is compared with the contrast of the image before Edge contrast with determination The amplitude that contrast enhancing is executed to the image after Edge contrast, to further improve the clarity of image;
(2) select the maximum color component image of entropy as images to be recognized from each color component image, thus Improve the speed and efficiency of target identification;
(3) it uses the number of each APP on mobile phone interface in history based on owner, it is suitable to determine that APP each in history is used Sequence is directly entered lock state in booting next time, to have once discovery active user's is mismatched using sequence and history Protect to effect the privacy of owner.
According to an aspect of the present invention, the method for a kind of cell phone intelligent encryption and decryption is provided, this method includes using Cell phone application access times matching system protects the privacy of mobile phone owner, and the cell phone application access times matching system includes:
First detection device, for detect mobile phone by power-on operation, and record the available machine time using as at the first time it is defeated Out;
Second detection device is shut down operation for detect mobile phone, and records the available machine time using defeated as the second time Out, wherein it is corresponding nearest by power-on operation apart from the first time that second time is corresponding, which to be shut down operation, Once it is shut down operation;
Trace recording equipment is opened, is connect respectively with first detection device and second detection device, is used for When mobile phone next time is switched on, the first time and second time are received;
The opening trace recording equipment be used for using the period between the first time and second time as Target time section counts the opening number of each APP on mobile phone interface in the target time section;
Wherein, the opening trace recording equipment is also used to according to opening number from big to small to each on the mobile phone interface A APP is ranked up to obtain the first sequence;
Data analysis equipment is located on cell phone mainboard, and each opening time of mobile phone is closed to corresponding on log history The opening number of each APP on mobile phone interface in the period of time is closed, and each opening time based on mobile phone in history arrives The opening number of each APP carries out APP each on the mobile phone interface on mobile phone interface in the period of corresponding shut-in time Sequence is to obtain the second sequence.
Specific embodiment
Embodiment of the present invention will be described in detail below.
In order to overcome above-mentioned deficiency, the method that the present invention has built a kind of cell phone intelligent encryption and decryption, this method includes The privacy of mobile phone owner is protected using cell phone application access times matching system, the cell phone application access times matching system is adopted Mobile phone encryption and decryption is carried out with intelligent mode.
Cell phone application access times matching system shown in embodiment of the present invention includes:
First detection device, for detect mobile phone by power-on operation, and record the available machine time using as at the first time it is defeated Out;
Second detection device is shut down operation for detect mobile phone, and records the available machine time using defeated as the second time Out, wherein it is corresponding nearest by power-on operation apart from the first time that second time is corresponding, which to be shut down operation, Once it is shut down operation.
Then, continue that the specific structure of cell phone application access times matching system of the invention is further detailed.
In the cell phone application access times matching system, further includes:
Trace recording equipment is opened, is connect respectively with first detection device and second detection device, is used for When mobile phone next time is switched on, the first time and second time are received.
In the cell phone application access times matching system:
The opening trace recording equipment be used for using the period between the first time and second time as Target time section counts the opening number of each APP on mobile phone interface in the target time section;
Wherein, the opening trace recording equipment is also used to according to opening number from big to small to each on the mobile phone interface A APP is ranked up to obtain the first sequence.
In the cell phone application access times matching system, further includes:
Data analysis equipment is located on cell phone mainboard, and each opening time of mobile phone is closed to corresponding on log history The opening number of each APP on mobile phone interface in the period of time is closed, and each opening time based on mobile phone in history arrives The opening number of each APP carries out APP each on the mobile phone interface on mobile phone interface in the period of corresponding shut-in time Sequence is to obtain the second sequence;
SD stores equipment, is located in mobile phone holding tank, connect with the data analysis equipment, suitable for recording described second Sequence;
Sequence matching unit is connect with the data analysis equipment and SD storage equipment respectively, described for receiving First sequence and second sequence, and first sequence and second sequence are matched, when matching degree is less than etc. When percentage threshold, user's confirmation request is issued;
Preceding screen acquires equipment, connect with the sequence matching unit, for opening when receiving user's confirmation request The dynamic image taking to front user to obtain front user images, and exports the front user images;
First processing equipment executes image sharpening processing to the front user images for receiving front user images, To obtain and export the first processing image;
Second processing equipment is connect with first processing equipment, for receiving the front user images and described One processing image, and the ratio of the contrast of the contrast based on the first processing image and the front user images is to institute It states the first processing image and executes Adaptive contrast enhancement, to obtain and export second processing image;
The second processing image segmentation is gone out H ingredient image, S for receiving second processing image by data separating equipment Ingredient image and the identical image of three sizes of B component image, wherein the H ingredient image is in the second processing image Each pixel H signal component value composed by image, the S ingredient image be the second processing image in each pixel Image composed by the S signal component value of point, the B component image are the B component of each pixel in the second processing image Image composed by being worth;
First statistics equipment, connect with the data separating equipment, for receiving the H ingredient image, calculate the H at Entropy in partial image, and the entropy in the H ingredient image is exported as the first entropy;
Second statistics equipment, connect with the data separating equipment, for receiving the S ingredient image, calculate the S at Entropy in partial image, and the entropy in the S ingredient image is exported as the second entropy;
Third counts equipment, connect with the data separating equipment, for receiving the B component image, calculate the B at Entropy in partial image, and exported the entropy in the B component image as third entropy;
At component selections equipment, counted respectively with the first statistics equipment, the second statistics equipment and the third Equipment connection, for receiving first entropy, second entropy and the third entropy, and to first entropy, institute State the second entropy and the third entropy and carry out size comparison, using ingredient image corresponding to the entropy of wherein greatest measure as Images to be recognized output;
Owner identifies equipment, connect with described at component selections equipment, for being based on the corresponding color of the images to be recognized Owner's characteristics of objects of ingredient identifies owner's subject area from the images to be recognized, and big in owner's subject area When being equal to preset area limit value, owner's confirmation signal is issued, otherwise, owner is issued and denies signal;
Phone lock equipment identifies that equipment is connect with the owner, for protecting when receiving owner's confirmation signal Holding mobile phone is serviceable condition, is also used to lock mobile phone, mobile phone is converted to can not when receiving the owner and denying signal Use state.
In the cell phone application access times matching system:
The ratio of the contrast and the contrast of the front user images of the first processing image is bigger, to described the The amplitude that one processing image executes contrast enhancing is smaller.
In the cell phone application access times matching system:
It is handled using DSP and realizes the first statistics equipment, the second statistics equipment and third system in chipset Count equipment.
In the cell phone application access times matching system:
In the sequence matching unit, first sequence and second sequence are matched, when matching degree is big When the percentage threshold, subscriber identification signal is issued.
In addition, dsp chip, also referred to as digital signal processor, are a kind of particularly suitable for carrying out Digital Signal Processing operation Microprocessor, main application is to realize various digital signal processing algorithms real-time, quickly.
According to the requirement of Digital Signal Processing, dsp chip generally has following main feature: (1) in an instruction cycle An interior achievable multiplication and a sub-addition;(2) program and data space is separated, can simultaneously access instruction and data;(3) piece It is interior that there is quick RAM, it can usually be accessed simultaneously in two pieces by independent data/address bus;(4) there is low overhead or without expense The hardware supported for recycling and jumping;(5) quickly interrupt processing and Hardware I/O are supported;(6) more with being operated within the monocycle A hardware address generator;(7) multiple operations can be executed parallel;(8) it supports pile line operation, makes fetching, decoding and execution Equal operations can be with Overlapped Execution.
Using cell phone application access times matching system of the invention, for mobile phone cipher intelligent control in the prior art The technical issues of low SI, the cell phone application sequence accustomed to using by detecting owner carry out intelligence to the identity of currently used person Energyization identifies, so that previous simple encryption and decryption mechanism be substituted, improves the difficulty of mobile phone access, effective protection cellphone information It is not leaked.
It is understood that although the present invention has been disclosed in the preferred embodiments as above, above-described embodiment not to Limit the present invention.For any person skilled in the art, without departing from the scope of the technical proposal of the invention, Many possible changes and modifications all are made to technical solution of the present invention using the technology contents of the disclosure above, or are revised as With the equivalent embodiment of variation.Therefore, anything that does not depart from the technical scheme of the invention are right according to the technical essence of the invention Any simple modifications, equivalents, and modifications made for any of the above embodiments still fall within the range of technical solution of the present invention protection It is interior.

Claims (7)

1. a kind of method of cell phone intelligent encryption and decryption, this method includes being protected using cell phone application access times matching system The privacy of handguard machine owner, the cell phone application access times matching system include:
First detection device, for detect mobile phone by power-on operation, and record the available machine time using as first time export;
Second detection device is shut down operation for detect mobile phone, and records the available machine time to export as the second time, In, it is corresponding by the recent quilt of power-on operation apart from the first time that second time is corresponding, which to be shut down operation, Power-off operation.
2. the method as described in claim 1, which is characterized in that the system also includes:
Trace recording equipment is opened, is connect respectively with first detection device and second detection device, in mobile phone When booting next time, the first time and second time are received.
3. method according to claim 2, it is characterised in that:
The opening trace recording equipment is used for using the period between the first time and second time as target Period counts the opening number of each APP on mobile phone interface in the target time section;
Wherein, the opening trace recording equipment is also used to according to opening number from big to small to each on the mobile phone interface APP is ranked up to obtain the first sequence.
4. method as claimed in claim 3, which is characterized in that the system also includes:
Data analysis equipment is located on cell phone mainboard, and each opening time of mobile phone is to when corresponding closing on log history Between period on mobile phone interface each APP opening number, and based on each opening time of mobile phone in history to corresponding The opening number of each APP is ranked up each APP on the mobile phone interface on mobile phone interface in the period of shut-in time To obtain the second sequence;
SD stores equipment, is located in mobile phone holding tank, connect with the data analysis equipment, for recording second sequence;
Sequence matching unit is connect, for receiving described first respectively with the data analysis equipment and SD storage equipment Sequence and second sequence, and first sequence and second sequence are matched, when matching degree is less than or equal to hundred When dividing than threshold value, user's confirmation request is issued;
Preceding screen acquires equipment, connect with the sequence matching unit, for when receiving user's confirmation request, starting pair The image taking of front user to obtain front user images, and exports the front user images;
First processing equipment executes image sharpening processing to the front user images, to obtain for receiving front user images It obtains and exports the first processing image;
Second processing equipment is connect with first processing equipment, for receiving at the front user images and described first Image is managed, and the ratio of the contrast of the contrast based on the first processing image and the front user images is to described the One processing image executes Adaptive contrast enhancement, to obtain and export second processing image;
The second processing image segmentation is gone out H ingredient image, S ingredient for receiving second processing image by data separating equipment Image and the identical image of three sizes of B component image, wherein the H ingredient image is each in the second processing image Image composed by the H signal component value of a pixel, the S ingredient image are each pixel in the second processing image Image composed by S signal component value, the B component image for each pixel in the second processing image B component value institute The image of composition;
First statistics equipment, connect with the data separating equipment, for receiving the H ingredient image, calculates the H component-part diagram Entropy as in, and the entropy in the H ingredient image is exported as the first entropy;
Second statistics equipment, connect with the data separating equipment, for receiving the S ingredient image, calculates the S component-part diagram Entropy as in, and the entropy in the S ingredient image is exported as the second entropy;
Third counts equipment, connect with the data separating equipment, for receiving the B component image, calculates the B component figure Entropy as in, and exported the entropy in the B component image as third entropy;
At component selections equipment, equipment is counted with the first statistics equipment, the second statistics equipment and the third respectively Connection, for receiving first entropy, second entropy and the third entropy, and to first entropy, described the Two entropy and the third entropy carry out size comparison, using ingredient image corresponding to the entropy of wherein greatest measure as wait know Other image output;
Owner identifies equipment, connect with described at component selections equipment, for being based on the corresponding color component of the images to be recognized Owner's characteristics of objects identify owner's subject area from the images to be recognized, and be greater than in owner's subject area etc. When preset area limit value, owner's confirmation signal is issued, otherwise, owner is issued and denies signal;
Phone lock equipment identifies that equipment is connect with the owner, for keeping hand when receiving owner's confirmation signal Machine is serviceable condition, is also used to lock mobile phone when receiving the owner and denying signal, mobile phone is converted to unusable State.
5. method as claimed in claim 4, it is characterised in that:
The ratio of the contrast and the contrast of the front user images of the first processing image is bigger, at described first The amplitude for managing image execution contrast enhancing is smaller.
6. method as claimed in claim 5, it is characterised in that:
It is handled using DSP and realizes that the first statistics equipment, the second statistics equipment and third statistics are set in chipset It is standby.
7. method as claimed in claim 6, it is characterised in that:
In the sequence matching unit, first sequence and second sequence are matched, when matching degree is greater than institute When stating percentage threshold, subscriber identification signal is issued.
CN201810158183.8A 2018-02-25 2018-02-25 A kind of method of cell phone intelligent encryption and decryption Active CN109246285B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810158183.8A CN109246285B (en) 2018-02-25 2018-02-25 A kind of method of cell phone intelligent encryption and decryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810158183.8A CN109246285B (en) 2018-02-25 2018-02-25 A kind of method of cell phone intelligent encryption and decryption

Publications (2)

Publication Number Publication Date
CN109246285A true CN109246285A (en) 2019-01-18
CN109246285B CN109246285B (en) 2019-09-20

Family

ID=65084072

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810158183.8A Active CN109246285B (en) 2018-02-25 2018-02-25 A kind of method of cell phone intelligent encryption and decryption

Country Status (1)

Country Link
CN (1) CN109246285B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222735A (en) * 2008-01-23 2008-07-16 深圳华为通信技术有限公司 Method and device for testing standby time of mobile terminal
US20140373122A1 (en) * 2013-06-13 2014-12-18 Motorola Mobility Llc Method and Apparatus for Electronic Device Access
CN104504703A (en) * 2014-12-20 2015-04-08 河南机电高等专科学校 Welding spot color image segmentation method based on chip element SMT (surface mounting technology)
CN106503503A (en) * 2016-10-20 2017-03-15 宁波江东大金佰汇信息技术有限公司 A kind of user behavior encryption method and system based on computer big data
US20170094513A1 (en) * 2015-09-29 2017-03-30 Morphotrust Usa, Llc System and method for using a symbol as instruction for a target system to request identity information and authentication from a mobile identity
CN106778128A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Information protecting method, device and terminal
CN106802801A (en) * 2016-12-30 2017-06-06 珠海市魅族科技有限公司 Application integration control method and device
CN107025392A (en) * 2016-02-01 2017-08-08 塔塔顾问服务有限公司 Based on the Verification System used

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222735A (en) * 2008-01-23 2008-07-16 深圳华为通信技术有限公司 Method and device for testing standby time of mobile terminal
US20140373122A1 (en) * 2013-06-13 2014-12-18 Motorola Mobility Llc Method and Apparatus for Electronic Device Access
CN104504703A (en) * 2014-12-20 2015-04-08 河南机电高等专科学校 Welding spot color image segmentation method based on chip element SMT (surface mounting technology)
US20170094513A1 (en) * 2015-09-29 2017-03-30 Morphotrust Usa, Llc System and method for using a symbol as instruction for a target system to request identity information and authentication from a mobile identity
CN107025392A (en) * 2016-02-01 2017-08-08 塔塔顾问服务有限公司 Based on the Verification System used
CN106503503A (en) * 2016-10-20 2017-03-15 宁波江东大金佰汇信息技术有限公司 A kind of user behavior encryption method and system based on computer big data
CN106778128A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Information protecting method, device and terminal
CN106802801A (en) * 2016-12-30 2017-06-06 珠海市魅族科技有限公司 Application integration control method and device

Also Published As

Publication number Publication date
CN109246285B (en) 2019-09-20

Similar Documents

Publication Publication Date Title
CN108573132B (en) Cell phone application access times matching system
WO2017000342A1 (en) Fingerprint recognition method and terminal
CN106033514A (en) Suspicious process detection method and device
CN102194073A (en) Scanning method and device of antivirus software
CN104951688B (en) Suitable for the exclusive data encryption method and encrypted card under Xen virtualized environment
CN106161028A (en) Safety chip, communication terminal and the method improving communication security
WO2017161569A1 (en) Access control method, apparatus and system
CN107330848A (en) Image processing method, mobile terminal and storage device
CN105791139A (en) Routing device, network access method and device of communication terminal
CN106951790B (en) USB storage medium transparent encryption method
CN113132329A (en) WEBSHELL detection method, device, equipment and storage medium
CN114218561A (en) Weak password detection method, terminal equipment and storage medium
CN104598401A (en) Domestic platform peripheral equipment management and control system and management and control method thereof
CN109246285B (en) A kind of method of cell phone intelligent encryption and decryption
TW201608407A (en) Login system and method based on face recognition
CN104955043B (en) A kind of intelligent terminal security protection system
CN110222493A (en) A kind of computer booting authentication system and method
CN104937602B (en) Privacy protection method and electronic equipment
CN103927477A (en) Safety mainboard and application method thereof
CN105303092B (en) A kind of identity identifying method and device
CN102819694A (en) TCM (trusted cryptography module) chip, virus scanning method and device for operating TCM chip
CN107688481B (en) Multi-node-supporting KVM virtual machine hiding process detection system
CN109145827A (en) Video communication method and device
CN107194229A (en) A kind of computer user's personal identification method
CN107294967A (en) One kind shares unrestricted login system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20190816

Address after: 518000 South China Sea Avenue 1057 Science and Technology Building Phase II Building 201, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen joint creation Polytron Technologies Inc

Address before: 210000 No. 8 Changle Road, Qinhuai District, Nanjing City, Jiangsu Province

Applicant before: Liu Xiaoying

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder

Address after: 518000 Shenzhen integrated circuit design and application Industrial Park 105, south of chaguang Road, Shuguang community, Xili street, Nanshan District, Shenzhen, Guangdong

Patentee after: UNITED CREATION TECHNOLOGY Corp.,Ltd.

Address before: 518000 Room 201, building a, phase II, science and technology building, 1057 Nanhai Avenue, Nanshan District, Shenzhen City, Guangdong Province

Patentee before: UNITED CREATION TECHNOLOGY Corp.,Ltd.

CP02 Change in the address of a patent holder