CN109886002B - Application software use control method and mobile terminal - Google Patents

Application software use control method and mobile terminal Download PDF

Info

Publication number
CN109886002B
CN109886002B CN201910147319.XA CN201910147319A CN109886002B CN 109886002 B CN109886002 B CN 109886002B CN 201910147319 A CN201910147319 A CN 201910147319A CN 109886002 B CN109886002 B CN 109886002B
Authority
CN
China
Prior art keywords
application software
preset
face image
user
standard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910147319.XA
Other languages
Chinese (zh)
Other versions
CN109886002A (en
Inventor
石焜
王方东
罗仕龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING LIAOWANG SHENZHOU TECHNOLOGY Co.,Ltd.
Original Assignee
Beijing Liaowang Shenzhou Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Liaowang Shenzhou Technology Co ltd filed Critical Beijing Liaowang Shenzhou Technology Co ltd
Priority to CN201910147319.XA priority Critical patent/CN109886002B/en
Publication of CN109886002A publication Critical patent/CN109886002A/en
Application granted granted Critical
Publication of CN109886002B publication Critical patent/CN109886002B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides a use control method of application software and a mobile terminal, wherein the method comprises the following steps: starting the controlled application software; acquiring a standard face image of a user in a standard database according to the identity authentication information of the user; acquiring preset control information of a preset supervisor according to the standard face image; acquiring a face image of a current user in an indefinite time within a preset period and storing the face image into a temporary database; accumulating the running time of the controlled application software in a preset period; and if the running time reaches the control time corresponding to the preset control information, screening a plurality of face images from a temporary database, judging whether the plurality of face images are matched with the standard face images, and if the plurality of face images are successfully matched, closing the controlled application software until the dormancy time corresponding to the preset control information is reached.

Description

Application software use control method and mobile terminal
Technical Field
The invention relates to the technical field of communication, in particular to a use control method of application software and a mobile terminal.
Background
In the related art, a plurality of application software is provided in the mobile terminal, and the application software lures the user to continuously experience, so that the user is indulged in using the application software. Therefore, the mobile terminal has poor monitoring capability on the use habits of the application software of a specific user.
Disclosure of Invention
In order to solve the problems, the invention provides a use control method of application software and a mobile terminal.
The purpose of the invention is realized by adopting the following technical scheme:
the invention provides a method for controlling the use of application software, which is used for a mobile terminal and comprises the following steps:
starting the controlled application software;
acquiring a standard face image of a user in a standard database according to the identity authentication information of the user;
acquiring preset control information of a preset supervisor according to the standard face image;
acquiring a face image of a current user in an indefinite time within a preset period and storing the face image into a temporary database;
accumulating the running time of the controlled application software in a preset period;
and if the running time reaches the control time corresponding to the preset control information, screening a plurality of face images from a temporary database, judging whether the plurality of face images are matched with the standard face images, and if the plurality of face images are successfully matched, closing the controlled application software until the dormancy time corresponding to the preset control information is reached.
According to the invention, when the same user uses the controlled application software to reach the control time preset by the preset supervisor, the controlled application software is closed for a preset time, so that the monitoring capability of the mobile terminal on the application software used by the user is improved, and the user can be helped to develop a good habit of using the controlled application software; the method and the device have the advantages that whether the controlled application software is used by the same user or not is judged in a face matching mode, so that the closing time of the controlled application software can be changed according to the replacement of the user, the time control function of the controlled application software is beneficial to avoiding bad experience brought to the user who is replaced during the use period, and the use control precision of the controlled application software is further improved.
In the above embodiment, the preset control information is a rule for restricting the use of the application software in the mobile terminal by the user, and may be customized by the user as needed or preset for the user to select when the user leaves a factory. The preset control information may be expressed in various forms, including but not limited to, the property of the controlled application software and its running time, timing period, and the like.
According to an implementable manner of the first aspect of the present invention, before starting the controlled application software, the method further comprises:
receiving a request for using controlled application software, wherein the request comprises identity authentication information and an application label input by a user;
verifying the identity verification information;
and after the verification is successful, starting the controlled application software of the application label.
In one embodiment, verifying the authentication information includes: and matching the identity authentication information with standard identity authentication information prestored in a database, wherein if the matching is successful, the authentication is successful. And the standard identity authentication information is set and corresponding storage operation is executed by the preset supervisor.
Wherein the authentication information includes user information and a password. The user information may be a user name, a mobile phone number or an identification number, etc. The present embodiment is not limited thereto.
According to the embodiment of the invention, the identity authentication information of the user is verified, and the corresponding controlled application software is started according to the application label after the verification is successful, so that the effective limitation on the user using the controlled application software is realized.
According to an enabling aspect of the first aspect of the invention, the method further comprises:
and sending alarm information to the preset supervisor when the controlled application software is closed.
The embodiment sends the warning information to the preset supervisor when the user meets the requirements of using the controlled application software so as to prompt the preset supervisor to carry out relevant use restriction on the user using the mobile terminal.
A second aspect of the present invention provides a mobile terminal, including:
the control module is used for starting the controlled application software;
the first acquisition module is used for acquiring a standard face image of the user in a standard database according to the identity authentication information of the user;
the second acquisition module is used for acquiring preset control information of a preset supervisor according to the standard face image;
the third acquisition module is used for acquiring the face image of the current user in an indefinite time within a preset period and storing the face image into the temporary database;
the timing module is used for accumulating the running time of the controlled application software in a preset period;
the image processing module is used for screening a plurality of face images from the temporary database when the running time reaches the control time corresponding to the preset control information, and judging whether the plurality of face images are matched with the standard face images or not;
and when the matching is successful, the control module closes the controlled application software until the sleep time corresponding to the preset control information is reached.
According to one implementable aspect of the second aspect of the present invention, the mobile terminal further comprises:
the receiving module is used for receiving a request for using the controlled application software, wherein the request comprises the identity authentication information and the application label input by a user;
and the verification module is used for verifying the identity verification information, and then the control module starts the controlled application software of the application label after the verification is successful.
According to one implementable aspect of the second aspect of the present invention, the mobile terminal further comprises:
and the warning module is used for sending warning information to the preset supervisor when the controlled application software is closed.
Drawings
The invention is further illustrated by means of the attached drawings, but the embodiments in the drawings do not constitute any limitation to the invention, and for a person skilled in the art, other drawings can be obtained on the basis of the following drawings without inventive effort.
Fig. 1 is a flowchart illustrating a usage control method of application software according to an exemplary embodiment of the present invention;
fig. 2 is a block diagram of a mobile terminal according to an exemplary embodiment of the present invention.
Reference numerals:
the device comprises a control module 1, a first acquisition module 2, a second acquisition module 3, a third acquisition module 4, a timing module 5 and an image processing module 6.
Detailed Description
The invention is further described with reference to the following examples.
Referring to fig. 1, a first aspect of the present invention provides a method for controlling application software usage, for a mobile terminal, the method including:
s01 starting the controlled application software;
s02, acquiring a standard face image of the user in a standard database according to the identity authentication information of the user;
s03, acquiring preset control information of a preset supervisor according to the standard face image;
s04, acquiring the face image of the current user at random in a preset period and storing the face image into a temporary database;
s05, accumulating the running time of the controlled application software in a preset period;
s06, if the running time reaches the control time corresponding to the preset control information, screening a plurality of face images from a temporary database, judging whether the plurality of face images are matched with the standard face images, and if the plurality of face images are successfully matched with the standard face images, closing the controlled application software until the dormancy time corresponding to the preset control information is reached.
According to the invention, when the same user uses the controlled application software to reach the control time preset by the preset supervisor, the controlled application software is closed for a preset time, so that the monitoring capability of the mobile terminal on the application software used by the user is improved, and the user can be helped to develop a good habit of using the controlled application software; the method and the device have the advantages that whether the controlled application software is used by the same user or not is judged in a face matching mode, so that the closing time of the controlled application software can be changed according to the replacement of the user, the time control function of the controlled application software is beneficial to avoiding bad experience brought to the user who is replaced during the use period, and the use control precision of the controlled application software is further improved.
In the above embodiment, the preset control information is a rule for restricting the use of the application software in the mobile terminal by the user, and may be customized by the user as needed or preset for the user to select when the user leaves a factory. The preset control information may be expressed in various forms, including but not limited to, the property of the controlled application software and its running time, timing period, and the like.
According to an implementable manner of the first aspect of the present invention, before starting the controlled application software, the method further comprises:
receiving a request for using controlled application software, wherein the request comprises identity authentication information and an application label input by a user;
verifying the identity verification information;
and after the verification is successful, starting the controlled application software of the application label.
In one embodiment, verifying the authentication information includes: and matching the identity authentication information with standard identity authentication information prestored in a database, wherein if the matching is successful, the authentication is successful. And the standard identity authentication information is set and corresponding storage operation is executed by the preset supervisor.
Wherein the authentication information includes user information and a password. The user information may be a user name, a mobile phone number or an identification number, etc. The present embodiment is not limited thereto.
According to the embodiment of the invention, the identity authentication information of the user is verified, and the corresponding controlled application software is started according to the application label after the verification is successful, so that the effective limitation on the user using the controlled application software is realized.
According to an enabling aspect of the first aspect of the invention, the method further comprises:
and sending alarm information to the preset supervisor when the controlled application software is closed.
The embodiment sends the warning information to the preset supervisor when the user meets the requirements of using the controlled application software so as to prompt the preset supervisor to carry out relevant use restriction on the user using the mobile terminal. For example, the preset control information is set to be used for no more than 30 minutes in a day by using the game application software, and if the time for the same user to use the game application software in a day exceeds 30 minutes, a notification message is sent to a preset supervisor (such as a parent of the user) to prompt the preset supervisor to correct the use habit of the user using the mobile terminal.
As shown in fig. 2, a second aspect of the present invention provides a mobile terminal, including:
the control module 1 is used for starting controlled application software;
the first acquisition module 2 is used for acquiring a standard face image of the user in a standard database according to the identity authentication information of the user;
the second acquisition module 3 is used for acquiring preset control information of a preset supervisor according to the standard face image;
the third acquisition module 4 is used for acquiring the face image of the current user in an indefinite time within a preset period and storing the face image into a temporary database;
the timing module 5 is used for accumulating the running time of the controlled application software in a preset period;
the image processing module 6 is configured to screen a plurality of face images from the temporary database when the running time reaches the control time corresponding to the preset control information, and determine whether the plurality of face images are matched with the standard face images;
and when the matching is successful, the control module 1 closes the controlled application software until the sleep time corresponding to the preset control information is reached.
According to one implementable aspect of the second aspect of the present invention, the mobile terminal further comprises:
the receiving module is used for receiving a request for using the controlled application software, wherein the request comprises the identity authentication information and the application label input by a user;
and the verification module is used for verifying the identity verification information, and further the control module 1 starts the controlled application software of the application label after the verification is successful.
According to one implementable aspect of the second aspect of the present invention, the mobile terminal further comprises:
and the warning module is used for sending warning information to the preset supervisor when the controlled application software is closed.
In the application software use control method and the mobile terminal according to the above embodiments, the step of screening a plurality of face images from the temporary database includes:
(1) calling corresponding preset standard information in a database according to the standard face image of the user, wherein the preset standard information comprises a channel value difference threshold kTDetermining the number of noise points of each face image in the temporary database, wherein if a pixel point (i, j) in a face image in the temporary database meets the following formula, the pixel point (i, j) is determined as a noise point:
Figure BDA0001980431860000051
wherein k (i, j) represents the channel value of the pixel point (i, j), and ky(i, j) represents the channel value of the y-th pixel in the region adjacent to 3 × 3 of pixel (i, j);
(2) and determining the average value of the number of the noise points according to the number of the noise points of each face image, and deleting the face images of which the number of the noise points is greater than the average value of the number of the noise points.
According to the embodiment, the face image with excessive image noise points is deleted from the temporary database, so that the screening of the face image is realized, a high-quality face image to be matched is provided for subsequent face matching, the system storage space is greatly saved, and the efficiency of the subsequent face matching is improved; a noise point detection formula is designed, whether a noise point appears or not is judged according to the relation between a pixel point and a neighborhood pixel point channel value, and the noise point is quickly detected.
In the application software use control method and the mobile terminal according to the above embodiments, the method for screening a plurality of face images from a temporary database further includes:
(1) the preset standard information further comprises standard gray η corresponding to the standard face image of the userTStandard edge sharpness λTAnd image similarity threshold QTDeleting the face image with the number of the noise points larger than the average value of the number of the noise points, and then carrying out the residue on the temporary databaseExtracting the face areas of the rest face images from the rest face images;
(2) calculating the image similarity of the face areas of the front face image and the back face image of the remaining face images in the temporary database:
Figure BDA0001980431860000061
in the formula, QabRepresenting the image similarity of the a-th face image and the a + 1-th face image in the rest face images of the temporary database,
Figure BDA0001980431860000062
the average gray value of the face area of the a-th face image,
Figure BDA0001980431860000063
is the average gray value, lambda, of the face region of the a +1 th face imageaIs the edge sharpness, lambda, of the face area of the a-th face imagea+1The edge sharpness of the face area of the (a + 1) th face image is obtained;
(3) if Qa,a+1Q ofTAnd deleting the a-th face image and screening out the rest face images from the temporary database.
The embodiment innovatively provides the index of the image similarity, and deletes one of the two images with the image similarity larger than a certain value from the temporary database, so that the system storage space is greatly saved, and the subsequent face matching efficiency is improved; in the face image screening, the factors of edge sharpness and gray value are considered, the limitation of image similarity evaluation through single characteristics is avoided, and the image with high similarity can be screened out more accurately.
It will be clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the system is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the system and the terminal described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
From the above description of embodiments, it is clear for a person skilled in the art that the embodiments described herein can be implemented in hardware, software, firmware, middleware, code or any appropriate combination thereof. For a hardware implementation, a processor may be implemented in one or more of the following units: an application specific integrated circuit, a digital signal processor, a digital signal processing system, a programmable logic device, a field programmable gate array, a processor, a controller, a microcontroller, a microprocessor, other electronic units designed to perform the functions described herein, or a combination thereof. For a software implementation, some or all of the procedures of an embodiment may be performed by a computer program instructing associated hardware. In practice, the program may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. The computer-readable medium can include, but is not limited to, random access memory, read only memory images, electrically erasable programmable read only memory or other optical disk storage, magnetic disk storage media or other magnetic storage systems, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
Finally, it should be noted that the above embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the protection scope of the present invention, although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions can be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (6)

1. A method for controlling the use of application software is used for a mobile terminal, and is characterized by comprising the following steps:
starting the controlled application software;
acquiring a standard face image of a user in a standard database according to the identity authentication information of the user;
acquiring preset control information of a preset supervisor according to the standard face image;
acquiring a face image of a current user in an indefinite time within a preset period and storing the face image into a temporary database;
accumulating the running time of the controlled application software in a preset period;
if the running time reaches the control time corresponding to the preset control information, screening a plurality of face images from a temporary database, judging whether the plurality of face images are matched with the standard face images, and if the plurality of face images are successfully matched, closing the controlled application software until the dormancy time corresponding to the preset control information is reached;
screening out a plurality of face images from a temporary database, comprising:
(1) calling corresponding preset standard information in a database according to the standard face image of the user, wherein the preset standard information comprises a channel value difference threshold kTDetermining the number of noise points of each face image in the temporary database, wherein if a pixel point (i, j) in a face image in the temporary database meets the following formula, the pixel point (i, j) is determined as a noise point:
Figure FDA0002518829940000011
wherein k (i, j) represents the channel value of the pixel point (i, j), and ky(i, j) represents the channel value of the y-th pixel in the region adjacent to 3 × 3 of pixel (i, j);
(2) and determining the average value of the number of the noise points according to the number of the noise points of each face image, and deleting the face images of which the number of the noise points is greater than the average value of the number of the noise points.
2. The method for controlling the use of application software according to claim 1, wherein before starting the controlled application software, the method further comprises:
receiving a request for using controlled application software, wherein the request comprises identity authentication information and an application label input by a user;
verifying the identity verification information;
and after the verification is successful, starting the controlled application software of the application label.
3. The method for controlling the use of application software according to claim 2, wherein said method further comprises:
and sending alarm information to the preset supervisor when the controlled application software is closed.
4. A mobile terminal, characterized in that the mobile terminal comprises:
the control module is used for starting the controlled application software;
the first acquisition module is used for acquiring a standard face image of the user in a standard database according to the identity authentication information of the user;
the second acquisition module is used for acquiring preset control information of a preset supervisor according to the standard face image;
the third acquisition module is used for acquiring the face image of the current user in an indefinite time within a preset period and storing the face image into the temporary database;
the timing module is used for accumulating the running time of the controlled application software in a preset period;
the image processing module is used for screening a plurality of face images from the temporary database when the running time reaches the control time corresponding to the preset control information, and judging whether the plurality of face images are matched with the standard face images or not;
when the matching is successful, the control module closes the controlled application software until the sleep time corresponding to the preset control information is reached;
screening out a plurality of face images from a temporary database, comprising:
(1) calling corresponding preset standard information in a database according to the standard face image of the user, wherein the preset standard information comprises a channel value difference threshold kTDetermining the number of noise points of each face image in the temporary database, wherein if a pixel point (i, j) in a face image in the temporary database meets the following formula, the pixel point (i, j) is determined as a noise point:
Figure FDA0002518829940000021
wherein k (i, j) represents the channel value of the pixel point (i, j), and ky(i, j) represents the channel value of the y-th pixel in the region adjacent to 3 × 3 of pixel (i, j);
(2) and determining the average value of the number of the noise points according to the number of the noise points of each face image, and deleting the face images of which the number of the noise points is greater than the average value of the number of the noise points.
5. The mobile terminal according to claim 4, wherein said mobile terminal further comprises:
the receiving module is used for receiving a request for using the controlled application software, wherein the request comprises the identity authentication information and the application label input by a user;
and the verification module is used for verifying the identity verification information, and then the control module starts the controlled application software of the application label after the verification is successful.
6. The mobile terminal according to claim 4, wherein said mobile terminal further comprises:
and the warning module is used for sending warning information to the preset supervisor when the controlled application software is closed.
CN201910147319.XA 2019-02-27 2019-02-27 Application software use control method and mobile terminal Active CN109886002B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910147319.XA CN109886002B (en) 2019-02-27 2019-02-27 Application software use control method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910147319.XA CN109886002B (en) 2019-02-27 2019-02-27 Application software use control method and mobile terminal

Publications (2)

Publication Number Publication Date
CN109886002A CN109886002A (en) 2019-06-14
CN109886002B true CN109886002B (en) 2020-10-02

Family

ID=66929751

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910147319.XA Active CN109886002B (en) 2019-02-27 2019-02-27 Application software use control method and mobile terminal

Country Status (1)

Country Link
CN (1) CN109886002B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778218A (en) * 2016-11-29 2017-05-31 维沃移动通信有限公司 The use control method and mobile terminal of a kind of application software
CN108537026A (en) * 2018-03-30 2018-09-14 百度在线网络技术(北京)有限公司 application control method, device and server
CN108830592A (en) * 2018-06-12 2018-11-16 南京熊猫电子股份有限公司 A kind of subscriber authentication and authority recognition method and system
CN109376678A (en) * 2018-11-02 2019-02-22 深圳壹账通智能科技有限公司 Anti-addiction method, apparatus, equipment and storage medium based on recognition of face

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140013548A (en) * 2012-07-25 2014-02-05 삼성전자주식회사 User terminal apparatus and control method thereof
US9058644B2 (en) * 2013-03-13 2015-06-16 Amazon Technologies, Inc. Local image enhancement for text recognition
US20180375791A1 (en) * 2017-06-23 2018-12-27 Ca, Inc. Authorization of varying levels of access to a resource server
CN108509885A (en) * 2018-03-26 2018-09-07 东南大学 A kind of efficient identity card picture screening technique

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778218A (en) * 2016-11-29 2017-05-31 维沃移动通信有限公司 The use control method and mobile terminal of a kind of application software
CN108537026A (en) * 2018-03-30 2018-09-14 百度在线网络技术(北京)有限公司 application control method, device and server
CN108830592A (en) * 2018-06-12 2018-11-16 南京熊猫电子股份有限公司 A kind of subscriber authentication and authority recognition method and system
CN109376678A (en) * 2018-11-02 2019-02-22 深圳壹账通智能科技有限公司 Anti-addiction method, apparatus, equipment and storage medium based on recognition of face

Also Published As

Publication number Publication date
CN109886002A (en) 2019-06-14

Similar Documents

Publication Publication Date Title
CA3061783C (en) Resource transfer method, fund payment method, and electronic device
US9544286B2 (en) Methods and systems for increasing the security of electronic messages
CA2795601C (en) Methods and systems for determining biometric data for use in authentication transactions
US8661558B2 (en) Methods and systems for increasing the security of electronic messages
US8224128B2 (en) Portable information terminal device
CN108171165B (en) Fingerprint identification method and device and computer readable storage medium
CN109784031B (en) Account identity verification processing method and device
US20170091569A1 (en) Imaging processing system and method and management apparatus
US20110250867A1 (en) Method and apparatus for restricting network access in a mobile communication terminal
US20070111707A1 (en) Method for call-theft detection
CN109886002B (en) Application software use control method and mobile terminal
CN109076126B (en) Permission updating method and terminal equipment
CN107526955B (en) Screen-off unlocking method and device
CN104394258A (en) Method and device for processing contact change of communication object
CN108021967B (en) Method and device for copying intelligent card and computer readable storage medium
CN110955884B (en) Method and device for determining upper limit times of password trial and error
CN112351131B (en) Control method and device of electronic equipment, electronic equipment and storage medium
CN110099164B (en) Method for finding lost terminal and terminal
CN109871677B (en) Intelligent switch control system and method
US20160371676A1 (en) Checking the validity of a transaction via the location of a terminal
CN109871243B (en) Intelligent terminal multi-application software control method and system
CN115589571B (en) Device retrieving method, user equipment, ground satellite equipment and storage medium
CN113139167B (en) Resident identification card receiving method and system for self-service card receiving machine and storage medium
JP7492091B1 (en) Estimation device and estimation method
CN114821845B (en) Card punching method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Shi Kun

Inventor after: Wang Fangdong

Inventor after: Luo Shilong

Inventor before: Luo Shilong

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200909

Address after: 2117, 2 / F, building 5, yard 8, Chama street, Xicheng District, Beijing 100000

Applicant after: BEIJING LIAOWANG SHENZHOU TECHNOLOGY Co.,Ltd.

Address before: Room 601-A42, 88 Nantiancheng Road, Xiangcheng High-speed Railway New Town, Suzhou City, Jiangsu Province

Applicant before: SUZHOU MAIRONGXIANG INFORMATION TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant