CN109889507A - It is a kind of for monitoring the monitoring method and its system of mailbox safe operation - Google Patents
It is a kind of for monitoring the monitoring method and its system of mailbox safe operation Download PDFInfo
- Publication number
- CN109889507A CN109889507A CN201910068581.5A CN201910068581A CN109889507A CN 109889507 A CN109889507 A CN 109889507A CN 201910068581 A CN201910068581 A CN 201910068581A CN 109889507 A CN109889507 A CN 109889507A
- Authority
- CN
- China
- Prior art keywords
- user
- monitoring
- concealed space
- safe
- mailbox
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Alarm Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention relates to a kind of for monitoring the monitoring method and its system of mailbox safe operation, comprising: grasps beaching accommodation if user logs in place and common site is inconsistent to user and detects in monitoring user debarkation point;If non-user commonly used equipment, user's concealed space is enabled after logging in;The important email of user's mark is transferred in user's concealed space;If active user is opened by authentication, concealed space;Authentication includes two-pass cipher verifying, pushes secondary verification information frame to active user, if the secondary verification information that user provides passes through, opens user's concealed space;After opening user's concealed space, the permission of the staged files into concealed space is provided to active user;If user needs to browse the file in concealed space, after user proposes concealed space browsing application, the icon for obtaining user clicks order;If current icon, which clicks order, is accustomed to being overlapped there are preset ratio with user, concealed space browse right is opened.
Description
Technical field
The present invention relates to network security, in particular to a kind of monitoring method for monitoring mailbox safe operation and its it is
System.
Background technique
Email (E-mail) is also known as e-mail.It is-kind the communication party of information exchange is provided using an electronically
Formula is in global multiple network using most common one service.The communication mode of this non-interactive type accelerates the friendship of information
The transmission of stream and data, is-kind of simple, quick communication means.
In the present of mobile phone app prosperity, usually there is the problem of mailbox strange land, different equipment log in.It is logged in strange land, different equipment
In the case where, it is difficult to determine that current lander is user or user according to the name on account and account password that can correctly fill in
Authorized person.
Above-mentioned safety problem, the problem of especially landing safely, in the case where username and password is stolen, it is easy to
It is logged in by other people, personal information cannot be protected.Existing verification mode can not be accustomed to sentencing depending on the user's operation
Whether fixed be user's operation.
Summary of the invention
Goal of the invention:
Aiming at the problem that being mentioned in background technique, the present invention provide a kind of monitoring method for monitoring mailbox safe operation and its
System.
Technical solution:
It is a kind of for monitoring the monitoring method of mailbox safe operation, comprising:
User debarkation point is monitored, if user logs in place and common site is inconsistent, beaching accommodation is grasped to user and is examined
It surveys;If non-user commonly used equipment, user's concealed space is enabled after logging in;
The important email of user's mark is transferred in user's concealed space;
If active user is opened by authentication, concealed space;
Authentication includes two-pass cipher verifying, pushes secondary verification information frame to active user, if secondary the testing of user's offer
Card information passes through, then opens user's concealed space;
After opening user's concealed space, the permission of the staged files into concealed space is provided to active user;
If user needs to browse the file in concealed space, after user proposes concealed space browsing application, obtain
The icon of user clicks order;If current icon, which clicks order, is accustomed to being overlapped there are preset ratio, concealed space with user
Browse right is opened.
As a kind of preferred embodiment of the invention, comprising:
After opening concealed space browse right, while open system is isolated;
If active user modifies or edits to the mail in concealed space, isolation of system will provide mirror image mailbox and give currently
User;
If active user's modification finishes, the modification of isolation of system memory image mailbox, and closes isolation of system.
As a kind of preferred embodiment of the invention, comprising:
Authentication further includes pushing safety alarm to the secondary user;
It obtains user and receives the operation after safety alarm;
If user accurately provides safe word, opening is logged in;If user cannot accurately provide safe word, continue to log in this time
Behavior is recorded and is exited and logged in.
As a kind of preferred embodiment of the invention, comprising:
Safety alarm includes providing the safety figure of user preset, if user accurately clicks the predeterminated position for presetting safe figure, is sentenced
Determine user and safe word is accurately provided, releases exception and log in binding;If user cannot accurately click the predeterminated position for presetting safe figure,
Then continue to log in this time behavior to be recorded and exited and log in.
Include: as a kind of preferred embodiment of the invention
If active user has commonly used equipment to log in the email accounts, then opens license confirmation during logging in;
Authorization message is pushed to commonly used equipment end, authorization message includes debarkation point and the beaching accommodation title of current device;
If commonly used equipment end confirms the authorization message, concealed space permission directly is opened to active user.
A kind of system for monitoring the monitoring method of mailbox safe operation, comprising:
Debarkation point monitoring modular, for monitoring the debarkation point of user;
Beaching accommodation monitoring modular, for monitoring user's beaching accommodation;
File shift module, for important email to be transferred to concealed space;
Authentication module, for verifying user identity;
Authentication module further includes two-pass cipher authentication module, for initiating secondary verifying to active user;
Icon authentication module, for carrying out icon verifying to user after user proposes concealed space browsing application.
As a kind of preferred embodiment of the invention, comprising:
Isolation of system module provides a user mirror image mailbox for opening after space navigation permission was hidden in unlatching;
Isolation of system module saves the modification of active user, and close isolation of system after user closes concealed space.
As a kind of preferred embodiment of the invention, comprising:
Safety alarm pushing module, for thinking that user pushes safety alarm after determining abnormal log in;
Safe word detection module, for detecting the safe word of user's input;
Safe word judgment module, for determining whether the safe word of user's input is accurate.
As a kind of preferred embodiment of the invention, comprising:
Safe figure pushing module, for pushing safety figure to user;
Safe figure identification module, for identification operation of the user to safety figure;
Safe figure determination module, for determining whether user's operation is consistent with predetermined registration operation.
As a kind of preferred embodiment of the invention, comprising:
License confirmation module, for thering is commonly used equipment to log in the email accounts, to Toad Palace -- the moon equipment during active user is logging in
Open license confirmation;
Pushing module.For pushing authorization message to commonly used equipment;
Concealed space opens module, for opening concealed space permission to active user.
The present invention realize it is following the utility model has the advantages that
1. the acquisition that pair unconventional the case where logging in carries out information is hidden logging in this case to vital document, if
It needs to open permission, then needs to carry out secondary verifying, improve safety.
2. pair file for needing to edit or modification is hiding, open system isolation reduce influence of the practical operation to file.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure
Example, and consistent with the instructions for explaining the principles of this disclosure.
Fig. 1 is provided by the invention a kind of for monitoring the system flow chart of the monitoring method of mailbox safe operation;
Fig. 2 is provided by the invention a kind of for monitoring the secondary verifying decision flowchart of the monitoring method of mailbox safe operation;
Fig. 3 is that a kind of icon for monitoring the monitoring method of mailbox safe operation provided by the invention verifies decision flowchart;
Fig. 4 is that a kind of isolation of system for monitoring the monitoring method of mailbox safe operation provided by the invention opens determination flow
Figure;
Fig. 5 is provided by the invention a kind of for monitoring the safety alarm decision flowchart of the monitoring method of mailbox safe operation;
Fig. 6 is provided by the invention a kind of for monitoring the safe figure decision flowchart of the monitoring method of mailbox safe operation;
Fig. 7 is provided by the invention a kind of for monitoring the confirmation authorization decision flowchart of the monitoring method of mailbox safe operation.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Embodiment one
With reference to Fig. 1-7.
It is a kind of for monitoring the monitoring method of mailbox safe operation, comprising:
User debarkation point is monitored, if user logs in place and common site is inconsistent, beaching accommodation is grasped to user and is examined
It surveys.If non-user commonly used equipment, user's concealed space is enabled after logging in.
Debarkation point includes that user logs in IP address, if IP address and common address that user currently logs in are inconsistent,
Then logged in for strange land.As an implementation, it may be verified that equipment current location, if current location and common login location are different
Cause then logs in for strange land.
After the confirmation different equipment in strange land logs in, concealed space is opened.
The important email of user's mark is transferred in user's concealed space.User in advance marks important email, is opening
Then important email is shifted into concealed space after opening concealed space.
If active user is opened by authentication, concealed space.Concealed space is opened to need to carry out authentication.
Authentication includes two-pass cipher verifying, pushes secondary verification information frame to active user, if the two of user's offer
Secondary verification information passes through, then opens user's concealed space.
Two-pass cipher is verified as the second password of setting, and user inputs the second password in secondary verification information frame.If close
Code is correct, then can open user's concealed space.
After opening user's concealed space, the permission of the staged files into concealed space is provided to active user.The use of unlatching
Family concealed space is supplied to the permission that ordinary file is transferred to concealed space by user.
If user needs to browse the file in concealed space, after user proposes concealed space browsing application,
The icon for obtaining user clicks order.If current icon, which clicks order, is accustomed to being overlapped there are preset ratio with user, hide
Space navigation permission is opened.
The click sequence for commonly using icon after user normally logs in is obtained, and compares and currently logs in down, user's click sequence, if
There is the inconsistent of preset ratio, then determines that this is logged in and dangerous log in behavior.
Preset ratio may be configured as 50%-70%
It opens concealed space browse right and browsing function is only provided.
As a kind of preferred embodiment of the invention, comprising:
After opening concealed space browse right, while open system is isolated.
If active user modifies or edits to the mail in concealed space, isolation of system will provide mirror image mailbox and give
Active user.
If active user's modification finishes, the modification of isolation of system memory image mailbox, and closes isolation of system.
Under isolation of system, user can not make substantial modifications or editor or deletion to file, what isolation of system provided
Operation in mirror-image system will be saved, and file will restore to the original state after closing isolation of system.
The modification of the image file of preservation will log in rear line push in common site commonly used equipment in user.
As a kind of preferred embodiment of the invention, comprising:
Authentication further includes pushing safety alarm to the secondary user.
It obtains user and receives the operation after safety alarm.
If user accurately provides safe word, opening is logged in.If user cannot accurately provide safe word, continue to this time
The behavior of logging in is recorded and is exited and logged in.
Safe word is the safe word of user preset, and active user inputs safe word after receiving safety alarm, if safe word
Inaccuracy will continue to execute the subsequent operation logged in extremely.
As a kind of preferred embodiment of the invention, comprising:
Safety alarm includes providing the safety figure of user preset, if user accurately clicks the predeterminated position for presetting safe figure, is sentenced
Determine user and safe word is accurately provided, releases exception and log in binding.If user cannot accurately click the predeterminated position for presetting safe figure,
Then continue to log in this time behavior to be recorded and exited and log in.
Safety figure is that user preset is schemed safely, and specified default click location, safe figure can be the picture of arbitrary content, packet
Text can be had by including in picture.
Include: as a kind of preferred embodiment of the invention
If active user has commonly used equipment to log in the email accounts, then opens license confirmation during logging in.
Authorization message is pushed to commonly used equipment end, authorization message includes debarkation point and the beaching accommodation name of current device
Claim.
If commonly used equipment end confirms the authorization message, concealed space permission directly is opened to active user.
Current login user after being authorized will obtain the consistent power of user logged in common address, commonly used equipment
Limit.
Embodiment two
A kind of system for monitoring the monitoring method of mailbox safe operation, comprising:
Debarkation point monitoring modular, for monitoring the debarkation point of user.
Beaching accommodation monitoring modular, for monitoring user's beaching accommodation.
File shift module, for important email to be transferred to concealed space.
Authentication module, for verifying user identity.
Authentication module further includes two-pass cipher authentication module, for initiating secondary verifying to active user.
Icon authentication module, for carrying out icon verifying to user after user proposes concealed space browsing application.
As a kind of preferred embodiment of the invention, comprising:
Isolation of system module provides a user mirror image mailbox for opening after space navigation permission was hidden in unlatching.
Isolation of system module saves the modification of active user, and close system after user closes concealed space
Isolation.
As a kind of preferred embodiment of the invention, comprising:
Safety alarm pushing module, for thinking that user pushes safety alarm after determining abnormal log in.
Safe word detection module, for detecting the safe word of user's input.
Safe word judgment module, for determining whether the safe word of user's input is accurate.
As a kind of preferred embodiment of the invention, comprising:
Safe figure pushing module, for pushing safety figure to user.
Safe figure identification module, for identification operation of the user to safety figure.
Safe figure determination module, for determining whether user's operation is consistent with predetermined registration operation.
As a kind of preferred embodiment of the invention, comprising:
License confirmation module, for thering is commonly used equipment to log in the email accounts, to Toad Palace -- the moon equipment during active user is logging in
Open license confirmation.
Pushing module.For pushing authorization message to commonly used equipment.
Concealed space opens module, for opening concealed space permission to active user.
The above embodiments merely illustrate the technical concept and features of the present invention, and the purpose is to allow the skill for being familiar with the technical field
Art personnel can understand the content of the present invention and implement it accordingly, and can not be limited the scope of the invention with this.All bases
Equivalent changes or modifications made by spirit of the invention, should be covered by the protection scope of the present invention.
Claims (10)
1. a kind of for monitoring the monitoring method of mailbox safe operation characterized by comprising
User debarkation point is monitored, if user logs in place and common site is inconsistent, beaching accommodation is grasped to user and is examined
It surveys;If non-user commonly used equipment, user's concealed space is enabled after logging in;
The important email of user's mark is transferred in user's concealed space;
If active user is opened by authentication, concealed space;
Authentication includes two-pass cipher verifying, pushes secondary verification information frame to active user, if secondary the testing of user's offer
Card information passes through, then opens user's concealed space;
After opening user's concealed space, the permission of the staged files into concealed space is provided to active user;
If user needs to browse the file in concealed space, after user proposes concealed space browsing application, obtain
The icon of user clicks order;If current icon, which clicks order, is accustomed to being overlapped there are preset ratio, concealed space with user
Browse right is opened.
2. according to claim 1 a kind of for monitoring the monitoring method of mailbox safe operation characterized by comprising
After opening concealed space browse right, while open system is isolated;
If active user modifies or edits to the mail in concealed space, isolation of system will provide mirror image mailbox and give currently
User;
If active user's modification finishes, the modification of isolation of system memory image mailbox, and closes isolation of system.
3. according to claim 1 a kind of for monitoring the monitoring method of mailbox safe operation characterized by comprising
Authentication further includes pushing safety alarm to the secondary user;
It obtains user and receives the operation after safety alarm;
If user accurately provides safe word, opening is logged in;If user cannot accurately provide safe word, continue to log in this time
Behavior is recorded and is exited and logged in.
4. according to claim 3 a kind of for monitoring the monitoring method of mailbox safe operation characterized by comprising
Safety alarm includes providing the safety figure of user preset, if user accurately clicks the predeterminated position for presetting safe figure, is sentenced
Determine user and safe word is accurately provided, releases exception and log in binding;If user cannot accurately click the predeterminated position for presetting safe figure,
Then continue to log in this time behavior to be recorded and exited and log in.
5. according to claim 1 a kind of for monitoring the monitoring method of mailbox safe operation characterized by comprising
If active user has commonly used equipment to log in the email accounts, then opens license confirmation during logging in;
Authorization message is pushed to commonly used equipment end, authorization message includes debarkation point and the beaching accommodation title of current device;
If commonly used equipment end confirms the authorization message, concealed space permission directly is opened to active user.
6. a kind of system for monitoring the monitoring method of mailbox safe operation according to claim 1-5,
It is characterized in that, comprising:
Debarkation point monitoring modular, for monitoring the debarkation point of user;
Beaching accommodation monitoring modular, for monitoring user's beaching accommodation;
File shift module, for important email to be transferred to concealed space;
Authentication module, for verifying user identity;
Authentication module further includes two-pass cipher authentication module, for initiating secondary verifying to active user;
Icon authentication module, for carrying out icon verifying to user after user proposes concealed space browsing application.
7. a kind of system for monitoring the monitoring method of mailbox safe operation according to claim 6, which is characterized in that
Include:
Isolation of system module provides a user mirror image mailbox for opening after space navigation permission was hidden in unlatching;
Isolation of system module saves the modification of active user, and close isolation of system after user closes concealed space.
8. a kind of system for monitoring the monitoring method of mailbox safe operation according to claim 6, which is characterized in that
Include:
Safety alarm pushing module, for thinking that user pushes safety alarm after determining abnormal log in;
Safe word detection module, for detecting the safe word of user's input;
Safe word judgment module, for determining whether the safe word of user's input is accurate.
9. a kind of system for monitoring the monitoring method of mailbox safe operation according to claim 8, which is characterized in that
Include:
Safe figure pushing module, for pushing safety figure to user;
Safe figure identification module, for identification operation of the user to safety figure;
Safe figure determination module, for determining whether user's operation is consistent with predetermined registration operation.
10. a kind of system for monitoring the monitoring method of mailbox safe operation according to claim 6, feature exist
In, comprising:
License confirmation module, for thering is commonly used equipment to log in the email accounts, to Toad Palace -- the moon equipment during active user is logging in
Open license confirmation;
Pushing module, for pushing authorization message to commonly used equipment;
Concealed space opens module, for opening concealed space permission to active user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910068581.5A CN109889507B (en) | 2019-01-24 | 2019-01-24 | Monitoring method and system for monitoring mailbox operation safety |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910068581.5A CN109889507B (en) | 2019-01-24 | 2019-01-24 | Monitoring method and system for monitoring mailbox operation safety |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109889507A true CN109889507A (en) | 2019-06-14 |
CN109889507B CN109889507B (en) | 2021-08-06 |
Family
ID=66926765
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910068581.5A Active CN109889507B (en) | 2019-01-24 | 2019-01-24 | Monitoring method and system for monitoring mailbox operation safety |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109889507B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113568934A (en) * | 2021-07-28 | 2021-10-29 | 平安银行股份有限公司 | Data query method and device, electronic equipment and storage medium |
CN113824695A (en) * | 2021-08-25 | 2021-12-21 | 国网新疆电力有限公司喀什供电公司 | Information security control method and information security display equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101789058A (en) * | 2009-01-23 | 2010-07-28 | 周宏建 | Method for protecting data hiding and hardware thereof |
CN103294941A (en) * | 2012-02-22 | 2013-09-11 | 腾讯科技(深圳)有限公司 | Method for accessing private space and mobile device |
CN104301286A (en) * | 2013-07-15 | 2015-01-21 | 中国移动通信集团黑龙江有限公司 | User login authentication method and device |
CN104780530A (en) * | 2014-01-15 | 2015-07-15 | 中兴通讯股份有限公司 | A method and a terminal for protecting user data |
CN106295359A (en) * | 2015-05-26 | 2017-01-04 | 中兴通讯股份有限公司 | The processing method and processing device of application |
CN107665301A (en) * | 2016-07-28 | 2018-02-06 | 腾讯科技(深圳)有限公司 | Verification method and device |
CN108595971A (en) * | 2018-04-25 | 2018-09-28 | 杭州闪捷信息科技股份有限公司 | A kind of database adaptive refinement method |
CN109040103A (en) * | 2018-08-27 | 2018-12-18 | 深信服科技股份有限公司 | A kind of mail account is fallen detection method, device, equipment and readable storage medium storing program for executing |
-
2019
- 2019-01-24 CN CN201910068581.5A patent/CN109889507B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101789058A (en) * | 2009-01-23 | 2010-07-28 | 周宏建 | Method for protecting data hiding and hardware thereof |
CN103294941A (en) * | 2012-02-22 | 2013-09-11 | 腾讯科技(深圳)有限公司 | Method for accessing private space and mobile device |
CN104301286A (en) * | 2013-07-15 | 2015-01-21 | 中国移动通信集团黑龙江有限公司 | User login authentication method and device |
CN104780530A (en) * | 2014-01-15 | 2015-07-15 | 中兴通讯股份有限公司 | A method and a terminal for protecting user data |
CN106295359A (en) * | 2015-05-26 | 2017-01-04 | 中兴通讯股份有限公司 | The processing method and processing device of application |
CN107665301A (en) * | 2016-07-28 | 2018-02-06 | 腾讯科技(深圳)有限公司 | Verification method and device |
CN108595971A (en) * | 2018-04-25 | 2018-09-28 | 杭州闪捷信息科技股份有限公司 | A kind of database adaptive refinement method |
CN109040103A (en) * | 2018-08-27 | 2018-12-18 | 深信服科技股份有限公司 | A kind of mail account is fallen detection method, device, equipment and readable storage medium storing program for executing |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113568934A (en) * | 2021-07-28 | 2021-10-29 | 平安银行股份有限公司 | Data query method and device, electronic equipment and storage medium |
CN113568934B (en) * | 2021-07-28 | 2023-08-22 | 平安银行股份有限公司 | Data query method and device, electronic equipment and storage medium |
CN113824695A (en) * | 2021-08-25 | 2021-12-21 | 国网新疆电力有限公司喀什供电公司 | Information security control method and information security display equipment |
Also Published As
Publication number | Publication date |
---|---|
CN109889507B (en) | 2021-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2955617B1 (en) | Method and device for unlocking screen, and terminal | |
CN105631275B (en) | information display method, information display device and terminal | |
CN105530356B (en) | Mobile communication terminal and data protection method and device thereof | |
CN103888607B (en) | A kind of mobile terminal secret note inspection method and system | |
CN103813334A (en) | Right control method and right control device | |
CN102685106A (en) | Safety verification method and equipment | |
CN106293816B (en) | A method of increasing the viscosity of the App of user and mobile intelligent terminal installation | |
CN105405185B (en) | Safe verification method and device | |
CN105721460A (en) | Voiceprint password vehicle control system and method | |
CN105574967A (en) | Intelligent access control system and operation method thereof | |
CN106327637A (en) | Bluetooth door opening system based on community management and method | |
CN109101795A (en) | A kind of account number safe login method, apparatus and system | |
CN107644172A (en) | The guard method of content displaying and device | |
CN105809005A (en) | Method for locking or unlocking computer screen based on fingerprints | |
CN109889507A (en) | It is a kind of for monitoring the monitoring method and its system of mailbox safe operation | |
CN107113613A (en) | Server, mobile terminal, real-name network authentication system and method | |
CN104349452B (en) | A kind of method and system of locating cellphone | |
CN105450665A (en) | Secure login method, secure login device and terminal | |
CN105913513A (en) | Control method and system for door lock system | |
CN106559419A (en) | The application and identification method and identification terminal of short message verification code | |
CN105959277A (en) | Method of locking/unlocking computer screen based on NFC terminal | |
CN107256367A (en) | A kind of information processing method and device, terminal device and computer-readable recording medium | |
CN109859350A (en) | A kind of self-service input method of the fingerprint of remote authorization and hotel self-service move in method | |
CN107241362B (en) | Method and device for identifying identity of verification code input user | |
US20200382504A1 (en) | System and Method for Personalized Passenger Auditing in Aircrafts |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210708 Address after: 252000 Room 501, 5th floor, building a, yunshang building, No.5, Lushan South Road, high tech Zone, Liaocheng City, Shandong Province Applicant after: Impression (Shandong) big data Co.,Ltd. Address before: 215400 West Building 501, Pioneer Park, No. 6 Beijing West Road, Taicang Economic Development Zone, Suzhou City, Jiangsu Province Applicant before: TAICANG HONGMA SOFTWARE TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |