CN109327462A - A kind of MAC address authentication method based on L2VPN network - Google Patents
A kind of MAC address authentication method based on L2VPN network Download PDFInfo
- Publication number
- CN109327462A CN109327462A CN201811350331.2A CN201811350331A CN109327462A CN 109327462 A CN109327462 A CN 109327462A CN 201811350331 A CN201811350331 A CN 201811350331A CN 109327462 A CN109327462 A CN 109327462A
- Authority
- CN
- China
- Prior art keywords
- mac address
- enabled
- address authentication
- port
- vlan
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Present invention discloses a kind of MAC address authentication methods based on L2VPN network, including receiving message and obtaining the source MAC, source port number and VLAN ID of the message, virtual port control table entry is searched according to the source port number and VLAN ID and obtains virtual port number;Data forwarding list item is searched according to MAC Address, if searching, virtual port control table entry is searched according to virtual port number, it is determined whether MAC Address is reported CPU to carry out MAC address authentication by the enabled MAC address authentication based on virtual port if enabled;CPU authenticates the MAC Address, and marks the MAC Address when certification passes through to have authenticated.The present invention can be realized MAC address learning, aging and the security control of port drift based on virtual link.
Description
Technical field
The present invention relates to computer network communication technology fields, more particularly, to a kind of MAC Address based on L2VPN network
Authentication method.
Background technique
MAC (Media Access Control, media access control) address be have network device manufacturers production be to write
Inside hardware, for determining the address of network equipment position.In the prior art, MAC address authentication be it is a kind of based on port and
MAC Address or based on VLAN and MAC Address to for the authentication mode that is controlled of network access authority, do not need user
Any client software is installed.By taking the MAC address authentication based on port as an example, when switching equipment enables MAC address authentication,
After port detects the MAC Address of user for the first time, that is, enable the authentication operation to the user's MAC address.In verification process,
It is manually entered user name and/or password without user, if authenticating successfully, allows it to access Internet resources by port, otherwise
The MAC Address of the user is added to silent MAC.In the silence period, switching equipment loses the message from identical MAC Address
Abandoning processing.However existing MAC address authentication mode cannot achieve the certification of the MAC Address based on virtual link.
Summary of the invention
It is an object of the invention to overcome the deficiencies of existing technologies, a kind of MAC address authentication based on L2VPN network is provided
Method.
To achieve the above object, the following technical solutions are proposed: a kind of MAC address authentication based on L2VPN network by the present invention
Method, including
It receives message and obtains the source MAC, source port number and VLAN ID of the message, further according to the source
Port numbers and VLAN ID search virtual port control table entry and obtain a virtual port number;
Data forwarding list item is searched according to the MAC Address, and when not finding, further according to the virtual port
Number searching virtual port control table entry determines whether the enabled MAC address authentication based on virtual port, and when enabled by MAC
Location reports CPU to carry out MAC address authentication, and is the MAC address authentication based on virtual port the reason of report CPU;
CPU authenticates the MAC Address, and marks the MAC Address when certification passes through to have authenticated.
It is preferably, described that whether the enabled MAC address authentication based on virtual port is corresponding by the virtual port number
The value of enabled MAC address authentication field determines that the enabled MAC address authentication field is set in virtual port control table entry, uses
In identifying whether the enabled MAC certification based on virtual port.
Preferably, when being not enabled on the MAC address authentication based on virtual port, end is further searched according to the source port number
Mouth control table entry determines whether the enabled MAC address authentication based on port, and reports CPU to carry out MAC MAC Address when enabled
Address verification, and be the MAC address authentication based on port the reason of report CPU.
It is preferably, described that whether the enabled MAC address authentication based on port passes through the corresponding enabled MAC of the source port number
The value of address verification field determines that the enabled MAC address authentication field is set in port controlling list item, makes for identifying whether
It can be authenticated based on the MAC of port.
Preferably, when being not enabled on the MAC address authentication based on port, VLAN control is further searched according to the VLAN ID
Tabulation item determines whether the enabled MAC address authentication based on VLAN, and reports CPU to carry out MAC Address MAC Address when enabled
The reason of authenticating, and reporting CPU is the MAC address authentication based on VLAN.
It is preferably, described that whether the enabled MAC address authentication based on VLAN passes through the corresponding enabled MAC of the VLAN ID
The value of address verification field determines that the enabled MAC address authentication field is set in VLAN control table entry, makes for identifying whether
It can be authenticated based on the MAC of VLAN.
Preferably, the CPU marks the MAC by the way that the value of MAC authentication field is arranged in having authenticated MAC address entries
Whether address has authenticated.
Preferably, the CPU is also the configurable ageing timer of MAC Address setting one that certification passes through.
The beneficial effects of the present invention are:
MAC address authentication method of the present invention, can be realized MAC address learning based on virtual link, aging and
The security control of port drift, is applicable not only to L2VPN network, applies also for VxLAN network, Tunnel network etc..
Detailed description of the invention
Fig. 1 is flow chart of the method for the present invention schematic diagram;
Fig. 2 is exchange chip process flow diagram schematic diagram;
Fig. 3 is CPU process flow diagram schematic diagram.
Specific embodiment
Below in conjunction with attached drawing of the invention, clear, complete description is carried out to the technical solution of the embodiment of the present invention.
As shown in Figure 1, a kind of disclosed MAC address authentication method based on L2VPN network, including
S100 receives message and obtains the source MAC, source port number and vlan number of the message, further according to institute
It states source port number and vlan number searches virtual port control table entry and obtains a virtual port number;
Specifically, exchange chip is mainly used for the processing of network packet, and when implementation, exchange chip is to the message received
Dissection process is carried out, the letter of (Media Access Control, the media access control) address source MAC entrained by message is obtained
Breath, source port number information and VLAN id information.Exchange chip includes but is not limited to ASIC (Application Specific
Integrated Circuit, specific integrated circuit) chip, it is of course also possible to be FPGA (Field-Programmable
Gate Array, field programmable gate array) chip or NP (Network Processor, network processing unit) chip etc..
Further, multiple list items, including data forwarding list item (FDB, Forwarding are also configured in exchange chip
DataBase), port (Port) control table entry and VLAN control table entry.Wherein, FDB address list item is used for the forwarding of message, when
When exchange chip receives message, the mac address information according to entrained by message searches data forwarding list item, according to lookup result
Determination is filtered or forwards to the message.Port controlling list item is used to determine the whether enabled base of the data from certain Single port
MAC address authentication in port when implementation, can increase by an enabled MAC address authentication field in port controlling list item
(macAuthEn), the enabled MAC address authentication based on port is determined whether by the way that the value of enabled MAC address authentication field is arranged,
The value for such as configuring the corresponding enabled MAC address authentication field in port 1 (Port1) is 1, and configuration port 2 (Port2) is corresponding enabled
The value of MAC address authentication field is 0, when exchange chip receives message from port 1 and port 2, for the message from port 1
The MAC address authentication based on port is enabled, therefore exchange chip is reported CPU to carry out MAC address authentication, for from end
The message of mouth 2 is not enabled on the MAC address authentication based on port, therefore exchange chip is recognized without being reported CPU to carry out MAC Address
Card.VLAN control table entry is used to determine the whether enabled MAC address authentication based on VLAN of the message from a certain VLAN, implements
When, it can increase by an enabled MAC address authentication field in VLAN control table entry, by the way that enabled MAC address authentication field is arranged
Value determines whether the enabled MAC address authentication based on VLAN, such as the corresponding enabled MAC address authentication field of configuration VLAN 100
Value is 1, enables the MAC address authentication based on port for the message from VLAN 100, therefore exchange chip is reported
CPU carries out MAC address authentication.
Further, a virtual port control table entry is also configured in exchange chip, it includes source port number field,
Vlan number (VLAN ID) field and virtual port number (Virtual Port) field, for by the source port number of message and
Vlan number is mapped as a virtual port number, and such as configurable source port is 1, the corresponding virtual port number of message that vlan number is 100
It is 20.Further, it can increase by an enabled MAC address authentication field (macAuthEn) in virtual port control table entry, pass through
The value that enabled MAC address authentication field is arranged determines whether the enabled MAC address authentication based on virtual port, when implementation, exchange
Chip carries out parsing to the message received and obtains source port number and vlan number information entrained by the message, according to source port number
Virtual port control table entry is searched with vlan number, virtual port number corresponding to the message is obtained, further can be determined whether to make
Can MAC address authentication based on virtual port report CPU to carry out MAC address authentication MAC Address if enabled.
S200 searches data forwarding table according to the MAC Address, and when not finding, according to the virtual port number
Search virtual port control table entry, it is determined whether the enabled MAC address authentication based on virtual port, and when enabled by MAC
Location reports CPU to carry out MAC address authentication.
Specifically, referring to figs. 1 and 2, after exchange chip analytic message obtains source MAC, according to source MAC
Data forwarding table is searched, if not finding, virtual port control table entry is further searched according to virtual port number, according to lookup
As a result determine whether the enabled MAC address authentication based on virtual port, if enabling the MAC address authentication based on virtual port,
It then reports CPU to carry out MAC address authentication the source MAC, and virtual port will be configured to the reason of reporting CPU
MAC address authentication further searches port control according to source port number if being not enabled on the MAC address authentication based on virtual port
Tabulation item determines whether the enabled MAC address authentication based on port according to lookup result, if with enabling the MAC based on port
The reason of location authenticates, then reports CPU to carry out MAC address authentication the source MAC, and will report CPU is configured to port
MAC address authentication, if being not enabled on the MAC address authentication based on port, further according to vlan number search VLAN control table
, determined whether to enable the MAC address authentication based on VLAN according to lookup result, if enabling the MAC Address based on VLAN
The source MAC is then reported CPU to carry out MAC address authentication, and will be configured to VLAN's the reason of reporting CPU by certification
MAC address authentication is handled message using other modes if being not enabled on the MAC address authentication based on VLAN.
When implementation, if enabling the MAC address authentication based on port and the MAC address authentication based on VLAN, base simultaneously
In port MAC address authentication prior to the MAC address authentication based on VLAN, the source MAC report CPU carry out MAC Address
The reason of CPU is reported when certification is the MAC address authentication based on port.
As shown in Fig. 2, if finding, further judgement is when searching data forwarding table according to the source MAC of message
Whether no originating port migrates and has authenticated.Specifically, it is also configured with and corresponding with data forwarding table has recognized in exchange chip
It demonstrate,proves MAC address entries (DsMAC list item), DsMAC list item has authenticated mac address information for storing, and when implementation, sets in DsMAC list item
There is MAC authentication field (macAuth field), marks whether MAC Address has authenticated by the way that the value of macAuth field is arranged.
When judging whether to have authenticated, DsMAC list item is searched according to source MAC and shows that the MAC Address has authenticated if finding;
When judging whether originating port migration, by source port number or virtual terminal in source port number or virtual port number and data forwarding table
Slogan is inconsistent, then shows originating port offset.For the migration of originating port and the message that has authenticated of MAC Address, usually
There are four types of processing modes, respectively abandon, forward and do not learn, forward and learn and report CP U, wherein for reporting CPU
Message, the reason of being reported CPU configuration has authenticated MAC originating port migration (MacAuthStationMove), for losing
The message of abandoning, the reason of being abandoned, which is configured to abandon, has authenticated MAC message (MacAuthDiscard).
S300, CPU authenticate the MAC Address, and mark the address the M AC when certification passes through to have authenticated.
Specifically, as shown in figure 3, CPU authenticates the MAC Address for reporting it, by the MAC when certification passes through
Location is added in data forwarding table, meanwhile, the value of the corresponding macAuth field of the MAC Address is set in DsMAC list item to mark
Remember that the MAC Address has authenticated.Further, CPU is also that this has authenticated MAC Address one settable ageing timer of configuration
(timeI dx), to be opposed to the ageing time of common MAC Address.For it is unverified by MAC Address, then use its other party
Formula handles it
MAC address authentication method of the present invention, can be realized MAC address learning based on virtual link, aging and
The security control of port drift, is applicable not only to L2VPN network, applies also for VxLAN network, Tunnel network etc..
Technology contents and technical characteristic of the invention have revealed that as above, however those skilled in the art still may base
Make various replacements and modification without departing substantially from spirit of that invention, therefore, the scope of the present invention in teachings of the present invention and announcement
It should be not limited to the revealed content of embodiment, and should include various without departing substantially from replacement and modification of the invention, and be this patent Shen
Please claim covered.
Claims (8)
1. a kind of MAC address authentication method based on L2VPN network, which is characterized in that including
It receives message and obtains the source MAC, source port number and VLAN ID of the message, further according to the source port
Number and VLAN ID search virtual port control table entry obtain virtual port number;
Data forwarding list item is searched according to the MAC Address, and when not finding, is further looked into according to the virtual port number
Virtual port control table entry is looked for determine whether the enabled MAC address authentication based on virtual port, and will be on MAC Address when enabled
The reason of reporting CPU to carry out MAC address authentication, and reporting CPU is the MAC address authentication based on virtual port;
CPU authenticates the MAC Address, and marks the MAC Address when certification passes through to have authenticated.
2. the method according to claim 1, wherein described, whether the enabled MAC Address based on virtual port is recognized
Card determines that the enabled MAC address authentication field is set to by the value of the corresponding enabled MAC address authentication field of virtual port number
In virtual port control table entry, for identifying whether the enabled MAC certification based on virtual port.
3. the method according to claim 1, wherein when being not enabled on the MAC address authentication based on virtual port, into
One step searches port controlling list item according to the source port number and determines whether the enabled MAC address authentication based on port, and makes
The reason of reporting CPU to carry out MAC address authentication MAC Address when energy, and reporting CPU is the MAC address authentication based on port.
4. according to the method described in claim 3, it is characterized in that, described whether the enabled MAC address authentication based on port is logical
The value for crossing the corresponding enabled MAC address authentication field of source port number determines that the enabled MAC address authentication field is controlled set on port
In tabulation item, for identifying whether the enabled MAC certification based on port.
5. according to the method described in claim 3, it is characterized in that, when being not enabled on the MAC address authentication based on port, further
VLAN control table entry is searched according to the VLAN ID and determines whether the enabled MAC address authentication based on VLAN, and will when enabled
MAC Address reports CPU to carry out MAC address authentication, and is the MAC address authentication based on VLAN the reason of report CPU.
6. according to the method described in claim 5, it is characterized in that, described whether the enabled MAC address authentication based on VLAN is logical
The value for crossing the corresponding enabled MAC address authentication field of VLAN ID determines that the enabled MAC address authentication field is controlled set on VLAN
In tabulation item, for identifying whether the enabled MAC certification based on VLA N.
7. the method according to claim 1, wherein the CPU in having authenticated MAC address entries by being arranged MAC
The value of authentication field marks whether the MAC Address has authenticated.
8. the method according to claim 1, wherein the CPU is also that the MAC Address setting one that certification passes through can
The ageing timer of configuration.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811350331.2A CN109327462B (en) | 2018-11-14 | 2018-11-14 | MAC address authentication method based on L2VPN network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811350331.2A CN109327462B (en) | 2018-11-14 | 2018-11-14 | MAC address authentication method based on L2VPN network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109327462A true CN109327462A (en) | 2019-02-12 |
CN109327462B CN109327462B (en) | 2020-10-27 |
Family
ID=65260957
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811350331.2A Active CN109327462B (en) | 2018-11-14 | 2018-11-14 | MAC address authentication method based on L2VPN network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109327462B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113727222A (en) * | 2021-08-16 | 2021-11-30 | 烽火通信科技股份有限公司 | Method and device for detecting MAC address drift in PON system |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1889430A (en) * | 2006-06-21 | 2007-01-03 | 南京联创网络科技有限公司 | Safety identification control method based on 802.1 X terminal wideband switching-in |
JP2007074209A (en) * | 2005-09-06 | 2007-03-22 | Ntt Data Corp | Authentication vlan system, authentication server, and program |
JP2007208323A (en) * | 2006-01-30 | 2007-08-16 | Fujitsu Ltd | Authentication vlan switch |
CN101197785A (en) * | 2008-01-04 | 2008-06-11 | 杭州华三通信技术有限公司 | MAC authentication method and apparatus |
CN101860551A (en) * | 2010-06-25 | 2010-10-13 | 神州数码网络(北京)有限公司 | Multi-user authentication method and system under single access port |
CN103441932A (en) * | 2013-08-30 | 2013-12-11 | 福建星网锐捷网络有限公司 | Host routing table entry generating method and device |
CN103731355A (en) * | 2013-12-31 | 2014-04-16 | 迈普通信技术股份有限公司 | Method and system for avoiding Hash collision during MAC address learning |
CN103929461A (en) * | 2013-08-12 | 2014-07-16 | 杭州华三通信技术有限公司 | MAC address information synchronization method and device in stacking system |
CN104144095A (en) * | 2014-08-08 | 2014-11-12 | 福建星网锐捷网络有限公司 | Terminal authentication method and interchanger |
CN104333552A (en) * | 2014-11-04 | 2015-02-04 | 福建星网锐捷网络有限公司 | Authentication determination method and accessing equipment |
CN106131066A (en) * | 2016-08-26 | 2016-11-16 | 杭州华三通信技术有限公司 | A kind of authentication method and device |
CN107294711A (en) * | 2017-07-11 | 2017-10-24 | 国网辽宁省电力有限公司 | A kind of power information Intranet message encryption dissemination method based on VXLAN technologies |
CN107547336A (en) * | 2017-05-15 | 2018-01-05 | 新华三技术有限公司 | A kind of authentication port adds the method and device for authorizing VLAN |
CN108683660A (en) * | 2018-05-14 | 2018-10-19 | 杭州迪普科技股份有限公司 | A kind of MAC address authentication processing method and processing device |
-
2018
- 2018-11-14 CN CN201811350331.2A patent/CN109327462B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007074209A (en) * | 2005-09-06 | 2007-03-22 | Ntt Data Corp | Authentication vlan system, authentication server, and program |
JP2007208323A (en) * | 2006-01-30 | 2007-08-16 | Fujitsu Ltd | Authentication vlan switch |
CN1889430A (en) * | 2006-06-21 | 2007-01-03 | 南京联创网络科技有限公司 | Safety identification control method based on 802.1 X terminal wideband switching-in |
CN101197785A (en) * | 2008-01-04 | 2008-06-11 | 杭州华三通信技术有限公司 | MAC authentication method and apparatus |
CN101860551A (en) * | 2010-06-25 | 2010-10-13 | 神州数码网络(北京)有限公司 | Multi-user authentication method and system under single access port |
CN103929461A (en) * | 2013-08-12 | 2014-07-16 | 杭州华三通信技术有限公司 | MAC address information synchronization method and device in stacking system |
CN103441932A (en) * | 2013-08-30 | 2013-12-11 | 福建星网锐捷网络有限公司 | Host routing table entry generating method and device |
CN103731355A (en) * | 2013-12-31 | 2014-04-16 | 迈普通信技术股份有限公司 | Method and system for avoiding Hash collision during MAC address learning |
CN104144095A (en) * | 2014-08-08 | 2014-11-12 | 福建星网锐捷网络有限公司 | Terminal authentication method and interchanger |
CN104333552A (en) * | 2014-11-04 | 2015-02-04 | 福建星网锐捷网络有限公司 | Authentication determination method and accessing equipment |
CN106131066A (en) * | 2016-08-26 | 2016-11-16 | 杭州华三通信技术有限公司 | A kind of authentication method and device |
CN107547336A (en) * | 2017-05-15 | 2018-01-05 | 新华三技术有限公司 | A kind of authentication port adds the method and device for authorizing VLAN |
CN107294711A (en) * | 2017-07-11 | 2017-10-24 | 国网辽宁省电力有限公司 | A kind of power information Intranet message encryption dissemination method based on VXLAN technologies |
CN108683660A (en) * | 2018-05-14 | 2018-10-19 | 杭州迪普科技股份有限公司 | A kind of MAC address authentication processing method and processing device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113727222A (en) * | 2021-08-16 | 2021-11-30 | 烽火通信科技股份有限公司 | Method and device for detecting MAC address drift in PON system |
CN113727222B (en) * | 2021-08-16 | 2023-11-03 | 烽火通信科技股份有限公司 | Method and device for detecting MAC address drift in PON system |
Also Published As
Publication number | Publication date |
---|---|
CN109327462B (en) | 2020-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9729547B2 (en) | Systems and methods for credential management between electronic devices | |
US10291408B2 (en) | Generation of Merkle trees as proof-of-work | |
US20180278636A1 (en) | System and method for malware detection learning | |
CN102624705B (en) | A kind of intelligent image verification method and system | |
EP3011713B1 (en) | Method and system protecting against identity theft or replication abuse | |
US10904218B2 (en) | Secure proxy to protect private data | |
US7360086B1 (en) | Communications control method and information relaying device for communications network system | |
US9282120B2 (en) | Securing communication over a network using client integrity verification | |
US9202173B1 (en) | Using link analysis in adversarial knowledge-based authentication model | |
US20090300707A1 (en) | Method of Optimizing Policy Conformance Check for a Device with a Large Set of Posture Attribute Combinations | |
JP2003046533A (en) | Network system, authentication method therefor and program thereof | |
CN105490997B (en) | Safe checking method, device, terminal and server | |
CN105847245A (en) | Electronic mail box login authentication method and device | |
US20220253520A1 (en) | Methods and systems for verifying applications | |
WO2018145546A1 (en) | Authentication method, device and storage medium | |
EP3991074A1 (en) | Security certificate identity analysis | |
EP4115583A1 (en) | Identifying trusted service set identifiers for wireless networks t | |
CN109040124A (en) | The method and apparatus of processing message for interchanger | |
CN109327462A (en) | A kind of MAC address authentication method based on L2VPN network | |
CN113992387B (en) | Resource management method, device, system, electronic equipment and readable storage medium | |
BR102020003105A2 (en) | METHOD FOR DETECTION OF FAKE DNS SERVERS USING MACHINE LEARNING TECHNIQUES | |
WO2019169982A1 (en) | Url abnormality positioning method and device, and server and storage medium | |
Kim et al. | Puf-based iot device authentication scheme on iot open platform | |
CN107547390B (en) | The method and device of flow table creation and inquiry | |
AU2022203844A1 (en) | Method for detecting anomalies in ssl and/or tls communications, corresponding device, and computer program product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: 215101 unit 13 / 16, 4th floor, building B, No. 5, Xinghan street, Suzhou Industrial Park, Jiangsu Province Patentee after: Suzhou Shengke Communication Co.,Ltd. Address before: Unit 13 / 16, 4th floor, building B, No.5 Xinghan street, Suzhou Industrial Park, 215000 Jiangsu Province Patentee before: CENTEC NETWORKS (SU ZHOU) Co.,Ltd. |