CN109670736A - A kind of risk management method of e-commerce transaction behavior - Google Patents

A kind of risk management method of e-commerce transaction behavior Download PDF

Info

Publication number
CN109670736A
CN109670736A CN201910113471.6A CN201910113471A CN109670736A CN 109670736 A CN109670736 A CN 109670736A CN 201910113471 A CN201910113471 A CN 201910113471A CN 109670736 A CN109670736 A CN 109670736A
Authority
CN
China
Prior art keywords
risk
transaction
commerce
management
commerce transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910113471.6A
Other languages
Chinese (zh)
Inventor
黄虹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Womens University
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910113471.6A priority Critical patent/CN109670736A/en
Publication of CN109670736A publication Critical patent/CN109670736A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a kind of risk management methods of e-commerce transaction behavior, comprising the following steps: S1: establishes transaction system;S2: cross-border transaction monitoring;S3: e-commerce App is established;S4: transaction risk assessment;S5: transaction risk identification;S6: transaction risk analysis;S7: transaction risk control;S8: transaction risk countermeasure management;S9 encrypted transaction data;S10: transaction authentication;S11: setting management system;S12: supervision and management center is established.The present invention is managed collectively by the way that the risk management system of e-commerce transaction behavior is arranged, it uses with the risk management system of e-commerce transaction behavior as basic e-commerce App, establish the safe data channel between trade user and system server, realization is managed collectively e-commerce transaction behavior, the mode of unified supervision, cross-border transaction monitoring is added, the risk management range of e-commerce transaction behavior is improved, improves the safety of e-commerce transaction and invisible.

Description

A kind of risk management method of e-commerce transaction behavior
Technical field
The present invention relates to technical field of electronic commerce, specially a kind of risk management method of e-commerce transaction behavior.
Background technique
With the rapid development of open internet system Internet, the application of e-commerce and promotes very big and changed Become people's Working and life styles, brings unlimited business opportunity.However, platform-internet that e-commerce development is relied on Luoque is filled with huge, complicated security risk.The attack of hacker, wreaking havoc etc. for virus are all difficult electronic commerce affair Safely and conveniently carry out.
In e-commerce financial transaction management, now lack the effective of the risk management of a kind of pair of e-commerce transaction behavior Method causes risk management uncontrollable, and safety and concealment due to e-commerce transaction confusion in existing management method Property it is poor, especially in the risk management of cross-border e-commerce financial transaction, due to lacking effective management method, be difficult to protect Demonstrate,prove the safety of e-commerce transaction.
Summary of the invention
The purpose of the present invention is to provide a kind of risk management methods of e-commerce transaction behavior, to solve above-mentioned background The problem of being proposed in technology.
To achieve the above object, the invention provides the following technical scheme: a kind of risk management of e-commerce transaction behavior Method, comprising the following steps:
S1: establishing transaction system, establishes the risk of the e-commerce transaction behavior based on the network equipment centered on internet Management system;
S2: cross-border transaction monitoring is established cross-border e-commerce transaction according to the risk management system of e-commerce transaction behavior and is supervised Analysis module is controlled, for coping with cross-border Electronic Finance business transaction;
S3: establishing e-commerce App, is arranged by the risk management system of e-commerce transaction behavior and establishes e-commerce friendship Easy risk management App, establishes the safe data channel between e-commerce transaction user and system server;
S4: transaction risk assessment relies on e-commerce transaction risk management App to the safety of e-commerce transaction, e-commerce Status, information to be protected, various assets are adequately assessed and some basic security risk identifications and analysis;
S5: transaction risk identification, on the basis of collecting the information such as related full spectrum of threats, loophole and Related Measures, identification is various can The security risk of potential threat can be caused to e-commerce system;
S6: transaction risk analysis, operation analysis compare and assess the qualitative and quantitative method of progress, determine e-commerce security The importance of each risk elements to risk ranking and assesses its possibility consequence to e-commerce system various aspects;
S7: transaction risk control drops to an acceptable level using risk control means with support risk;
S8: transaction risk countermeasure management formulates e-commerce security Countermeasures of Risk Management for eliminating potential threat and safety Loophole;
S9: encrypted transaction data, by using code or pin mode by important e-commerce transaction information and data from One plaintext version being understood that is transformed into complicated entanglement, impenetrable seal form, transmits on the line or in number It is stored according to library, ciphertext is reduced into plain text by other trade users again;
S10: transaction authentication authenticates the identity of trade user in the way of authentication and message authentication;
S11: setting management system establishes Trading Authorization control system, responsibility control system, accounting system and internal check system With emergency measure system;
S12: establishing supervision and management center, is supervised by establishing supervision and management center to internet electronic business transaction.
Preferably, the network equipment in the step S1 includes computer system, network communication equipment, network communication circuit And network server.
Preferably, the step S6 Risk Analysis Methods include risk probability, impact evaluation matrix, sensitivity analysis and Analysis mode.
Preferably, the step S7 risk control means include shifting risk, losing management, insure and assume full responsibility for risks.
Preferably, the step S8 risk countermeasure management includes deep defence strategy, and the deep defence strategy includes Physical security, periphery defence, cyber-defence, host defence, application program defence and data defence.
Preferably, data encryption mode includes symmetric cryptography and asymmetric encryption in the step S9, and is encrypted basic Element includes key, encipheror, ciphertext, plaintext and decryption.
Preferably, authentication includes digital signature identification, digital authenticating and authentication techniques, biology in the step S10 Feature identification certification.
Preferably, supervision and management center supervision method includes Third-party payment supervision, network credit prison in the step S12 Pipe, Internet bank's supervision and crowd raise financing supervision.
Compared with prior art, the beneficial effects of the present invention are: the strict control of the present invention e-commerce transaction behavior The method of risk management, the risk management system by the way that e-commerce transaction behavior is arranged are managed collectively, are used with electronics The risk management system of business transaction behavior is basic e-commerce App, establishes the peace between trade user and system server Full data channel, realization are managed collectively e-commerce transaction behavior, the mode of unified supervision, add cross-border transaction prison Control, improves the risk management range of e-commerce transaction behavior, and traffic is excessively assessed transaction risk, identifies, analyzes, controlled It with countermeasure management, and is managed using data encryption, transaction authentication mode and supervision center, improves e-commerce transaction Safety and invisible.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with specific embodiment, to this Invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, not For limiting the present invention.
A kind of risk management method of e-commerce transaction behavior, comprising the following steps:
S1: establishing transaction system, establishes the risk of the e-commerce transaction behavior based on the network equipment centered on internet Management system;
S2: cross-border transaction monitoring is established cross-border e-commerce transaction according to the risk management system of e-commerce transaction behavior and is supervised Analysis module is controlled, for coping with cross-border Electronic Finance business transaction;
S3: establishing e-commerce App, is arranged by the risk management system of e-commerce transaction behavior and establishes e-commerce friendship Easy risk management App, establishes the safe data channel between e-commerce transaction user and system server;
S4: transaction risk assessment relies on e-commerce transaction risk management App to the safety of e-commerce transaction, e-commerce Status, information to be protected, various assets are adequately assessed and some basic security risk identifications and analysis;
S5: transaction risk identification, on the basis of collecting the information such as related full spectrum of threats, loophole and Related Measures, identification is various can The security risk of potential threat can be caused to e-commerce system;
S6: transaction risk analysis, operation analysis compare and assess the qualitative and quantitative method of progress, determine e-commerce security The importance of each risk elements to risk ranking and assesses its possibility consequence to e-commerce system various aspects;
S7: transaction risk control drops to an acceptable level using risk control means with support risk;
S8: transaction risk countermeasure management formulates e-commerce security Countermeasures of Risk Management for eliminating potential threat and safety Loophole;
S9: encrypted transaction data, by using code or pin mode by important e-commerce transaction information and data from One plaintext version being understood that is transformed into complicated entanglement, impenetrable seal form, transmits on the line or in number It is stored according to library, ciphertext is reduced into plain text by other trade users again;
S10: transaction authentication authenticates the identity of trade user in the way of authentication and message authentication;
S11: setting management system establishes Trading Authorization control system, responsibility control system, accounting system and internal check system With emergency measure system;
S12: establishing supervision and management center, is supervised by establishing supervision and management center to internet electronic business transaction.
Specifically, the network equipment in the step S1 includes computer system, network communication equipment, network communication circuit And network server;The high performance network equipment is selected, building security, convenient and fast E-business applications environment, could be electronics The information of business transaction provides hardware guarantee.
Specifically, the step S6 Risk Analysis Methods include risk probability, impact evaluation matrix, sensitivity analysis and Analysis mode;It, can basis since each influence factor quantifies the difficulty in reality when carrying out e-commerce security risk analysis Actual needs mainly carries out risk analysis using being aided with a small amount of quantitative approach based on qualitative method and combine, for formulation risk The control of management system and risk provides theoretic foundation.
Specifically, the step S7 risk control means include shifting risk, losing management, insure and assume full responsibility for risks; The selection of risk control method should fully consider the cost that relative risk causes damages.
Specifically, the step S8 risk countermeasure management includes deep defence strategy, the deep defence strategy includes Physical security, periphery defence, cyber-defence, host defence, application program defence and data defence;
Physical security is the premise of entire electronic commerce system security.The purpose for formulating e-commerce physical security strategy is to protect Each e-commerce system hardware entities such as computer system, e-commerce server and communication link are protected from natural calamity and people Security risk caused by destroy;
Periphery defence is can to play the role of resisting outside world to the protection of network perimeter.E-commerce system should be as far as possible Certain type of safety equipment is installed to protect each accessed node of network.For technically, firewall is network perimeter The most important means of defence, e-commerce system should install one or multi-channel firewall, to ensure to reduce to the maximum extent The risk of outside world, and extraneous unauthorized access and attack are found in time using intrusion detection feature;
Cyber-defence is assessed network system environment, takes certain measure to resist the attack of hacker, to ensure them It is properly protected.For at present, the network security act of defense is a kind of reflex action of passive type, moreover, defence skill The development speed of art also without attack technology develop not as it is fast.In order to improve network security defence capability, keep network security anti- Protecting system is active status in the confrontation attacked and protected, in network security protection system, in addition to using passive-type to pacify Full tool (firewall, vulnerability scanning etc.) is outside, it is also desirable to which using the initiative type safe safeguard measure, (such as: network trap, invasion are taken Card, intrusion detection, automatic recovery etc.);
Host defence is to carry out security evaluation to each host in system, then formulates corresponding countermeasure according to assessment result Being executed with limiting server for task.In host and its environment, safeguard protection object includes the service in user's application environment Device, client computer and the operating system and application system installed thereon.These application be capable of providing including message reference, storage, Service including transmission, typing etc..According to Information Assurance Technical Framework, the safeguard protection to host and its environment be first in order to The defence line Shou Dao for preventing despiteful internal staff's attack is established, followed by external staff's ride through system protects boundary in order to prevent And last line of defense attacked;
Application program defence is all indispensable a part in any security model.Reinforce protection operating system security only A degree of protection can be provided.Therefore, the developer of e-commerce system has a responsibility for for safeguard protection being dissolved into using journey In sequence, so that the region that may have access to application program in architecture provides special protection.Application program is present in system Environment in;
The protection to e-commerce transaction and related data is reinforced in data defence, to the safety and e-commerce of e-commerce system The normal operation of project has important practical significance.
Specifically, data encryption mode includes symmetric cryptography and asymmetric encryption in the step S9, and encrypt basic Element includes key, encipheror, ciphertext, plaintext and decryption;
Symmetric cryptography sender key encrypting plaintext, sends recipient to, and recipient is decrypted with same key, its main feature is that plus Close and decryption uses the same key;
Asymmetric encryption includes public-key cryptography and private cipher key, and after key pair generates, public-key cryptography is in a manner of unclassified to granddad It opens, corresponds only to generate the publisher for changing key, private cipher key is then stored in cipher key distribution Fang Shouli, any to obtain public-key cryptography User the cipher key encryption information can be used to be sent to the publisher of the disclosure key, and publisher obtains encryption information Afterwards, it is decrypted using with the private cipher key that public-key cryptography is mutually coped with.
Specifically, authentication includes digital signature identification, digital authenticating and authentication techniques, biology in the step S10 Feature identification certification.
Specifically, supervision and management center supervision method includes Third-party payment supervision, network credit prison in the step S12 Pipe, Internet bank's supervision and crowd raise financing supervision.
In summary: the method for the risk management of the strict control of the present invention e-commerce transaction behavior passes through setting electricity The risk management system of sub- business transaction behavior is managed collectively, and is used with the risk management system of e-commerce transaction behavior For basic e-commerce App, the safe data channel between trade user and system server is established, realizes and e-commerce is handed over Easy is to be managed collectively, and the mode of unified supervision adds cross-border transaction monitoring, improves the risk of e-commerce transaction behavior Range of management, traffic is assessed transaction risk, identified excessively, analyzed, controlled and countermeasure management, and using data encryption, friendship Easy authentication mode and supervision center are managed, and improve the safety of e-commerce transaction and invisible.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (8)

1. a kind of risk management method of e-commerce transaction behavior, it is characterised in that: the following steps are included:
S1: establishing transaction system, establishes the risk of the e-commerce transaction behavior based on the network equipment centered on internet Management system;
S2: cross-border transaction monitoring is established cross-border e-commerce transaction according to the risk management system of e-commerce transaction behavior and is supervised Analysis module is controlled, for coping with cross-border Electronic Finance business transaction;
S3: establishing e-commerce App, is arranged by the risk management system of e-commerce transaction behavior and establishes e-commerce friendship Easy risk management App, establishes the safe data channel between e-commerce transaction user and system server;
S4: transaction risk assessment relies on e-commerce transaction risk management App to the safety of e-commerce transaction, e-commerce Status, information to be protected, various assets are adequately assessed and some basic security risk identifications and analysis;
S5: transaction risk identification, on the basis of collecting the information such as related full spectrum of threats, loophole and Related Measures, identification is various can The security risk of potential threat can be caused to e-commerce system;
S6: transaction risk analysis, operation analysis compare and assess the qualitative and quantitative method of progress, determine e-commerce security The importance of each risk elements to risk ranking and assesses its possibility consequence to e-commerce system various aspects;
S7: transaction risk control drops to an acceptable level using risk control means with support risk;
S8: transaction risk countermeasure management formulates e-commerce security Countermeasures of Risk Management for eliminating potential threat and safety Loophole;
S9: encrypted transaction data, by using code or pin mode by important e-commerce transaction information and data from One plaintext version being understood that is transformed into complicated entanglement, impenetrable seal form, transmits on the line or in number It is stored according to library, ciphertext is reduced into plain text by other trade users again;
S10: transaction authentication authenticates the identity of trade user in the way of authentication and message authentication;
S11: setting management system establishes Trading Authorization control system, responsibility control system, accounting system and internal check system With emergency measure system;
S12: establishing supervision and management center, is supervised by establishing supervision and management center to internet electronic business transaction.
2. a kind of risk management method of e-commerce transaction behavior according to claim 1, it is characterised in that: the step The network equipment in rapid S1 includes computer system, network communication equipment, network communication circuit and network server.
3. a kind of risk management method of e-commerce transaction behavior according to claim 1, it is characterised in that: the step Rapid S6 Risk Analysis Methods include risk probability, impact evaluation matrix, sensitivity analysis and analysis mode.
4. a kind of risk management method of e-commerce transaction behavior according to claim 1, it is characterised in that: the step Rapid S7 risk control means include shifting risk, losing management, insure and assume full responsibility for risks.
5. a kind of risk management method of e-commerce transaction behavior according to claim 1, it is characterised in that: the step Rapid S8 risk countermeasure management includes deep defence strategy, and the deep defence strategy includes physical security, periphery defence, network Defence, host defence, application program defence and data defence.
6. a kind of risk management method of e-commerce transaction behavior according to claim 1, it is characterised in that: the step Data encryption mode includes symmetric cryptography and asymmetric encryption in rapid S9, and the fundamental encrypted include key, encipheror, Ciphertext, plaintext and decryption.
7. a kind of risk management method of e-commerce transaction behavior according to claim 1, it is characterised in that: the step Authentication includes digital signature identification, digital authenticating and authentication techniques, living things feature recognition certification in rapid S10.
8. a kind of risk management method of e-commerce transaction behavior according to claim 1, it is characterised in that: the step Supervision and management center supervision method includes that Third-party payment supervision, the supervision of network credit, Internet bank's supervision and crowd raise in rapid S12 Financing supervision.
CN201910113471.6A 2019-02-12 2019-02-12 A kind of risk management method of e-commerce transaction behavior Pending CN109670736A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910113471.6A CN109670736A (en) 2019-02-12 2019-02-12 A kind of risk management method of e-commerce transaction behavior

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910113471.6A CN109670736A (en) 2019-02-12 2019-02-12 A kind of risk management method of e-commerce transaction behavior

Publications (1)

Publication Number Publication Date
CN109670736A true CN109670736A (en) 2019-04-23

Family

ID=66152044

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910113471.6A Pending CN109670736A (en) 2019-02-12 2019-02-12 A kind of risk management method of e-commerce transaction behavior

Country Status (1)

Country Link
CN (1) CN109670736A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112115474A (en) * 2020-10-21 2020-12-22 土流集团有限公司 Land flow transfer safety transaction system
CN113408894A (en) * 2021-06-18 2021-09-17 南京昊华科技有限公司 Auction asset risk monitoring and evaluating system and method based on cloud computing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710770A (en) * 2012-06-01 2012-10-03 汪德嘉 Identification method for network access equipment and implementation system for identification method
CN108428173A (en) * 2018-01-31 2018-08-21 孙中东 1+1+N Internet banks application architecture and its business model application
CN109167832A (en) * 2018-09-03 2019-01-08 许晓山 A kind of e-commerce system based on cloud computing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710770A (en) * 2012-06-01 2012-10-03 汪德嘉 Identification method for network access equipment and implementation system for identification method
CN108428173A (en) * 2018-01-31 2018-08-21 孙中东 1+1+N Internet banks application architecture and its business model application
CN109167832A (en) * 2018-09-03 2019-01-08 许晓山 A kind of e-commerce system based on cloud computing

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112115474A (en) * 2020-10-21 2020-12-22 土流集团有限公司 Land flow transfer safety transaction system
CN113408894A (en) * 2021-06-18 2021-09-17 南京昊华科技有限公司 Auction asset risk monitoring and evaluating system and method based on cloud computing

Similar Documents

Publication Publication Date Title
Barona et al. A survey on data breach challenges in cloud computing security: Issues and threats
Razzaq et al. Security issues in the Internet of Things (IoT): A comprehensive study
Srivastava et al. XAI for cybersecurity: state of the art, challenges, open issues and future directions
Kolokotronis et al. Secured by blockchain: Safeguarding internet of things devices
Bibhu et al. Robust Secured Framework for Online Business Transactions over Public Network
Hamdani et al. Cybersecurity standards in the context of operating system: Practical aspects, analysis, and comparisons
Rani et al. Cyber security techniques, architectures, and design
Bedi et al. Threat‐oriented security framework in risk management using multiagent system
CN109670736A (en) A kind of risk management method of e-commerce transaction behavior
Haruna et al. Defending against cybersecurity threats to the payments and banking system
Telo Understanding Security Awareness Among Bank Customers: A Study Using Multiple Regression Analysis
Erinle et al. SoK: Design, vulnerabilities and defense of cryptocurrency wallets
Valadares et al. Security challenges and recommendations in 5G-IoT scenarios
Uyyala Multilevel Authentication System Using Hierarchical Intrusion Detection Architecture For Online Banking
Waziri et al. A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania
Kujo Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft tools
Gorton Using incident response trees as a tool for risk management of online financial services
Ankele et al. SoK: Cyber-Attack Taxonomy of Distributed Ledger-and Legacy Systems-based Financial Infrastructures
Pitropakis et al. Cloud security, privacy and trust baselines
Noor et al. A systematic literature review on endpoint vulnerabilities of blockchain applications
Gottipati A proposed cybersecurity model for cryptocurrency exchanges
McGee et al. How to counter cybercrime intrusions
Yakubdjanovna et al. Analysis of Information Security Problems in Electronic Management with Possible Solutions
Mohammed Application of deep learning in fraud detection in payment systems
Zhang et al. Controlling Network Risk in E-commerce

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20190717

Address after: 250300 No. 2399 University Road, Science Park, Changqing University, Jinan City, Shandong Province

Applicant after: SHANDONG WOMEN'S University

Address before: 276100 No. 29, Group II, Huanglou Village, Tancheng Town, Tancheng County, Linyi City, Shandong Province

Applicant before: Huang Hong

TA01 Transfer of patent application right
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190423

WD01 Invention patent application deemed withdrawn after publication