CN109889507A - It is a kind of for monitoring the monitoring method and its system of mailbox safe operation - Google Patents

It is a kind of for monitoring the monitoring method and its system of mailbox safe operation Download PDF

Info

Publication number
CN109889507A
CN109889507A CN201910068581.5A CN201910068581A CN109889507A CN 109889507 A CN109889507 A CN 109889507A CN 201910068581 A CN201910068581 A CN 201910068581A CN 109889507 A CN109889507 A CN 109889507A
Authority
CN
China
Prior art keywords
user
monitoring
concealed space
safe
mailbox
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910068581.5A
Other languages
Chinese (zh)
Other versions
CN109889507B (en
Inventor
徐建红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Impression (Shandong) big data Co.,Ltd.
Original Assignee
TAICANG REDCODE SOFTWARE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TAICANG REDCODE SOFTWARE TECHNOLOGY Co Ltd filed Critical TAICANG REDCODE SOFTWARE TECHNOLOGY Co Ltd
Priority to CN201910068581.5A priority Critical patent/CN109889507B/en
Publication of CN109889507A publication Critical patent/CN109889507A/en
Application granted granted Critical
Publication of CN109889507B publication Critical patent/CN109889507B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Alarm Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention relates to a kind of for monitoring the monitoring method and its system of mailbox safe operation, comprising: grasps beaching accommodation if user logs in place and common site is inconsistent to user and detects in monitoring user debarkation point;If non-user commonly used equipment, user's concealed space is enabled after logging in;The important email of user's mark is transferred in user's concealed space;If active user is opened by authentication, concealed space;Authentication includes two-pass cipher verifying, pushes secondary verification information frame to active user, if the secondary verification information that user provides passes through, opens user's concealed space;After opening user's concealed space, the permission of the staged files into concealed space is provided to active user;If user needs to browse the file in concealed space, after user proposes concealed space browsing application, the icon for obtaining user clicks order;If current icon, which clicks order, is accustomed to being overlapped there are preset ratio with user, concealed space browse right is opened.

Description

It is a kind of for monitoring the monitoring method and its system of mailbox safe operation
Technical field
The present invention relates to network security, in particular to a kind of monitoring method for monitoring mailbox safe operation and its it is System.
Background technique
Email (E-mail) is also known as e-mail.It is-kind the communication party of information exchange is provided using an electronically Formula is in global multiple network using most common one service.The communication mode of this non-interactive type accelerates the friendship of information The transmission of stream and data, is-kind of simple, quick communication means.
In the present of mobile phone app prosperity, usually there is the problem of mailbox strange land, different equipment log in.It is logged in strange land, different equipment In the case where, it is difficult to determine that current lander is user or user according to the name on account and account password that can correctly fill in Authorized person.
Above-mentioned safety problem, the problem of especially landing safely, in the case where username and password is stolen, it is easy to It is logged in by other people, personal information cannot be protected.Existing verification mode can not be accustomed to sentencing depending on the user's operation Whether fixed be user's operation.
Summary of the invention
Goal of the invention:
Aiming at the problem that being mentioned in background technique, the present invention provide a kind of monitoring method for monitoring mailbox safe operation and its System.
Technical solution:
It is a kind of for monitoring the monitoring method of mailbox safe operation, comprising:
User debarkation point is monitored, if user logs in place and common site is inconsistent, beaching accommodation is grasped to user and is examined It surveys;If non-user commonly used equipment, user's concealed space is enabled after logging in;
The important email of user's mark is transferred in user's concealed space;
If active user is opened by authentication, concealed space;
Authentication includes two-pass cipher verifying, pushes secondary verification information frame to active user, if secondary the testing of user's offer Card information passes through, then opens user's concealed space;
After opening user's concealed space, the permission of the staged files into concealed space is provided to active user;
If user needs to browse the file in concealed space, after user proposes concealed space browsing application, obtain The icon of user clicks order;If current icon, which clicks order, is accustomed to being overlapped there are preset ratio, concealed space with user Browse right is opened.
As a kind of preferred embodiment of the invention, comprising:
After opening concealed space browse right, while open system is isolated;
If active user modifies or edits to the mail in concealed space, isolation of system will provide mirror image mailbox and give currently User;
If active user's modification finishes, the modification of isolation of system memory image mailbox, and closes isolation of system.
As a kind of preferred embodiment of the invention, comprising:
Authentication further includes pushing safety alarm to the secondary user;
It obtains user and receives the operation after safety alarm;
If user accurately provides safe word, opening is logged in;If user cannot accurately provide safe word, continue to log in this time Behavior is recorded and is exited and logged in.
As a kind of preferred embodiment of the invention, comprising:
Safety alarm includes providing the safety figure of user preset, if user accurately clicks the predeterminated position for presetting safe figure, is sentenced Determine user and safe word is accurately provided, releases exception and log in binding;If user cannot accurately click the predeterminated position for presetting safe figure, Then continue to log in this time behavior to be recorded and exited and log in.
Include: as a kind of preferred embodiment of the invention
If active user has commonly used equipment to log in the email accounts, then opens license confirmation during logging in;
Authorization message is pushed to commonly used equipment end, authorization message includes debarkation point and the beaching accommodation title of current device;
If commonly used equipment end confirms the authorization message, concealed space permission directly is opened to active user.
A kind of system for monitoring the monitoring method of mailbox safe operation, comprising:
Debarkation point monitoring modular, for monitoring the debarkation point of user;
Beaching accommodation monitoring modular, for monitoring user's beaching accommodation;
File shift module, for important email to be transferred to concealed space;
Authentication module, for verifying user identity;
Authentication module further includes two-pass cipher authentication module, for initiating secondary verifying to active user;
Icon authentication module, for carrying out icon verifying to user after user proposes concealed space browsing application.
As a kind of preferred embodiment of the invention, comprising:
Isolation of system module provides a user mirror image mailbox for opening after space navigation permission was hidden in unlatching;
Isolation of system module saves the modification of active user, and close isolation of system after user closes concealed space.
As a kind of preferred embodiment of the invention, comprising:
Safety alarm pushing module, for thinking that user pushes safety alarm after determining abnormal log in;
Safe word detection module, for detecting the safe word of user's input;
Safe word judgment module, for determining whether the safe word of user's input is accurate.
As a kind of preferred embodiment of the invention, comprising:
Safe figure pushing module, for pushing safety figure to user;
Safe figure identification module, for identification operation of the user to safety figure;
Safe figure determination module, for determining whether user's operation is consistent with predetermined registration operation.
As a kind of preferred embodiment of the invention, comprising:
License confirmation module, for thering is commonly used equipment to log in the email accounts, to Toad Palace -- the moon equipment during active user is logging in Open license confirmation;
Pushing module.For pushing authorization message to commonly used equipment;
Concealed space opens module, for opening concealed space permission to active user.
The present invention realize it is following the utility model has the advantages that
1. the acquisition that pair unconventional the case where logging in carries out information is hidden logging in this case to vital document, if It needs to open permission, then needs to carry out secondary verifying, improve safety.
2. pair file for needing to edit or modification is hiding, open system isolation reduce influence of the practical operation to file.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and consistent with the instructions for explaining the principles of this disclosure.
Fig. 1 is provided by the invention a kind of for monitoring the system flow chart of the monitoring method of mailbox safe operation;
Fig. 2 is provided by the invention a kind of for monitoring the secondary verifying decision flowchart of the monitoring method of mailbox safe operation;
Fig. 3 is that a kind of icon for monitoring the monitoring method of mailbox safe operation provided by the invention verifies decision flowchart;
Fig. 4 is that a kind of isolation of system for monitoring the monitoring method of mailbox safe operation provided by the invention opens determination flow Figure;
Fig. 5 is provided by the invention a kind of for monitoring the safety alarm decision flowchart of the monitoring method of mailbox safe operation;
Fig. 6 is provided by the invention a kind of for monitoring the safe figure decision flowchart of the monitoring method of mailbox safe operation;
Fig. 7 is provided by the invention a kind of for monitoring the confirmation authorization decision flowchart of the monitoring method of mailbox safe operation.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Embodiment one
With reference to Fig. 1-7.
It is a kind of for monitoring the monitoring method of mailbox safe operation, comprising:
User debarkation point is monitored, if user logs in place and common site is inconsistent, beaching accommodation is grasped to user and is examined It surveys.If non-user commonly used equipment, user's concealed space is enabled after logging in.
Debarkation point includes that user logs in IP address, if IP address and common address that user currently logs in are inconsistent, Then logged in for strange land.As an implementation, it may be verified that equipment current location, if current location and common login location are different Cause then logs in for strange land.
After the confirmation different equipment in strange land logs in, concealed space is opened.
The important email of user's mark is transferred in user's concealed space.User in advance marks important email, is opening Then important email is shifted into concealed space after opening concealed space.
If active user is opened by authentication, concealed space.Concealed space is opened to need to carry out authentication.
Authentication includes two-pass cipher verifying, pushes secondary verification information frame to active user, if the two of user's offer Secondary verification information passes through, then opens user's concealed space.
Two-pass cipher is verified as the second password of setting, and user inputs the second password in secondary verification information frame.If close Code is correct, then can open user's concealed space.
After opening user's concealed space, the permission of the staged files into concealed space is provided to active user.The use of unlatching Family concealed space is supplied to the permission that ordinary file is transferred to concealed space by user.
If user needs to browse the file in concealed space, after user proposes concealed space browsing application, The icon for obtaining user clicks order.If current icon, which clicks order, is accustomed to being overlapped there are preset ratio with user, hide Space navigation permission is opened.
The click sequence for commonly using icon after user normally logs in is obtained, and compares and currently logs in down, user's click sequence, if There is the inconsistent of preset ratio, then determines that this is logged in and dangerous log in behavior.
Preset ratio may be configured as 50%-70%
It opens concealed space browse right and browsing function is only provided.
As a kind of preferred embodiment of the invention, comprising:
After opening concealed space browse right, while open system is isolated.
If active user modifies or edits to the mail in concealed space, isolation of system will provide mirror image mailbox and give Active user.
If active user's modification finishes, the modification of isolation of system memory image mailbox, and closes isolation of system.
Under isolation of system, user can not make substantial modifications or editor or deletion to file, what isolation of system provided Operation in mirror-image system will be saved, and file will restore to the original state after closing isolation of system.
The modification of the image file of preservation will log in rear line push in common site commonly used equipment in user.
As a kind of preferred embodiment of the invention, comprising:
Authentication further includes pushing safety alarm to the secondary user.
It obtains user and receives the operation after safety alarm.
If user accurately provides safe word, opening is logged in.If user cannot accurately provide safe word, continue to this time The behavior of logging in is recorded and is exited and logged in.
Safe word is the safe word of user preset, and active user inputs safe word after receiving safety alarm, if safe word Inaccuracy will continue to execute the subsequent operation logged in extremely.
As a kind of preferred embodiment of the invention, comprising:
Safety alarm includes providing the safety figure of user preset, if user accurately clicks the predeterminated position for presetting safe figure, is sentenced Determine user and safe word is accurately provided, releases exception and log in binding.If user cannot accurately click the predeterminated position for presetting safe figure, Then continue to log in this time behavior to be recorded and exited and log in.
Safety figure is that user preset is schemed safely, and specified default click location, safe figure can be the picture of arbitrary content, packet Text can be had by including in picture.
Include: as a kind of preferred embodiment of the invention
If active user has commonly used equipment to log in the email accounts, then opens license confirmation during logging in.
Authorization message is pushed to commonly used equipment end, authorization message includes debarkation point and the beaching accommodation name of current device Claim.
If commonly used equipment end confirms the authorization message, concealed space permission directly is opened to active user.
Current login user after being authorized will obtain the consistent power of user logged in common address, commonly used equipment Limit.
Embodiment two
A kind of system for monitoring the monitoring method of mailbox safe operation, comprising:
Debarkation point monitoring modular, for monitoring the debarkation point of user.
Beaching accommodation monitoring modular, for monitoring user's beaching accommodation.
File shift module, for important email to be transferred to concealed space.
Authentication module, for verifying user identity.
Authentication module further includes two-pass cipher authentication module, for initiating secondary verifying to active user.
Icon authentication module, for carrying out icon verifying to user after user proposes concealed space browsing application.
As a kind of preferred embodiment of the invention, comprising:
Isolation of system module provides a user mirror image mailbox for opening after space navigation permission was hidden in unlatching.
Isolation of system module saves the modification of active user, and close system after user closes concealed space Isolation.
As a kind of preferred embodiment of the invention, comprising:
Safety alarm pushing module, for thinking that user pushes safety alarm after determining abnormal log in.
Safe word detection module, for detecting the safe word of user's input.
Safe word judgment module, for determining whether the safe word of user's input is accurate.
As a kind of preferred embodiment of the invention, comprising:
Safe figure pushing module, for pushing safety figure to user.
Safe figure identification module, for identification operation of the user to safety figure.
Safe figure determination module, for determining whether user's operation is consistent with predetermined registration operation.
As a kind of preferred embodiment of the invention, comprising:
License confirmation module, for thering is commonly used equipment to log in the email accounts, to Toad Palace -- the moon equipment during active user is logging in Open license confirmation.
Pushing module.For pushing authorization message to commonly used equipment.
Concealed space opens module, for opening concealed space permission to active user.
The above embodiments merely illustrate the technical concept and features of the present invention, and the purpose is to allow the skill for being familiar with the technical field Art personnel can understand the content of the present invention and implement it accordingly, and can not be limited the scope of the invention with this.All bases Equivalent changes or modifications made by spirit of the invention, should be covered by the protection scope of the present invention.

Claims (10)

1. a kind of for monitoring the monitoring method of mailbox safe operation characterized by comprising
User debarkation point is monitored, if user logs in place and common site is inconsistent, beaching accommodation is grasped to user and is examined It surveys;If non-user commonly used equipment, user's concealed space is enabled after logging in;
The important email of user's mark is transferred in user's concealed space;
If active user is opened by authentication, concealed space;
Authentication includes two-pass cipher verifying, pushes secondary verification information frame to active user, if secondary the testing of user's offer Card information passes through, then opens user's concealed space;
After opening user's concealed space, the permission of the staged files into concealed space is provided to active user;
If user needs to browse the file in concealed space, after user proposes concealed space browsing application, obtain The icon of user clicks order;If current icon, which clicks order, is accustomed to being overlapped there are preset ratio, concealed space with user Browse right is opened.
2. according to claim 1 a kind of for monitoring the monitoring method of mailbox safe operation characterized by comprising
After opening concealed space browse right, while open system is isolated;
If active user modifies or edits to the mail in concealed space, isolation of system will provide mirror image mailbox and give currently User;
If active user's modification finishes, the modification of isolation of system memory image mailbox, and closes isolation of system.
3. according to claim 1 a kind of for monitoring the monitoring method of mailbox safe operation characterized by comprising
Authentication further includes pushing safety alarm to the secondary user;
It obtains user and receives the operation after safety alarm;
If user accurately provides safe word, opening is logged in;If user cannot accurately provide safe word, continue to log in this time Behavior is recorded and is exited and logged in.
4. according to claim 3 a kind of for monitoring the monitoring method of mailbox safe operation characterized by comprising
Safety alarm includes providing the safety figure of user preset, if user accurately clicks the predeterminated position for presetting safe figure, is sentenced Determine user and safe word is accurately provided, releases exception and log in binding;If user cannot accurately click the predeterminated position for presetting safe figure, Then continue to log in this time behavior to be recorded and exited and log in.
5. according to claim 1 a kind of for monitoring the monitoring method of mailbox safe operation characterized by comprising
If active user has commonly used equipment to log in the email accounts, then opens license confirmation during logging in;
Authorization message is pushed to commonly used equipment end, authorization message includes debarkation point and the beaching accommodation title of current device;
If commonly used equipment end confirms the authorization message, concealed space permission directly is opened to active user.
6. a kind of system for monitoring the monitoring method of mailbox safe operation according to claim 1-5, It is characterized in that, comprising:
Debarkation point monitoring modular, for monitoring the debarkation point of user;
Beaching accommodation monitoring modular, for monitoring user's beaching accommodation;
File shift module, for important email to be transferred to concealed space;
Authentication module, for verifying user identity;
Authentication module further includes two-pass cipher authentication module, for initiating secondary verifying to active user;
Icon authentication module, for carrying out icon verifying to user after user proposes concealed space browsing application.
7. a kind of system for monitoring the monitoring method of mailbox safe operation according to claim 6, which is characterized in that Include:
Isolation of system module provides a user mirror image mailbox for opening after space navigation permission was hidden in unlatching;
Isolation of system module saves the modification of active user, and close isolation of system after user closes concealed space.
8. a kind of system for monitoring the monitoring method of mailbox safe operation according to claim 6, which is characterized in that Include:
Safety alarm pushing module, for thinking that user pushes safety alarm after determining abnormal log in;
Safe word detection module, for detecting the safe word of user's input;
Safe word judgment module, for determining whether the safe word of user's input is accurate.
9. a kind of system for monitoring the monitoring method of mailbox safe operation according to claim 8, which is characterized in that Include:
Safe figure pushing module, for pushing safety figure to user;
Safe figure identification module, for identification operation of the user to safety figure;
Safe figure determination module, for determining whether user's operation is consistent with predetermined registration operation.
10. a kind of system for monitoring the monitoring method of mailbox safe operation according to claim 6, feature exist In, comprising:
License confirmation module, for thering is commonly used equipment to log in the email accounts, to Toad Palace -- the moon equipment during active user is logging in Open license confirmation;
Pushing module, for pushing authorization message to commonly used equipment;
Concealed space opens module, for opening concealed space permission to active user.
CN201910068581.5A 2019-01-24 2019-01-24 Monitoring method and system for monitoring mailbox operation safety Active CN109889507B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910068581.5A CN109889507B (en) 2019-01-24 2019-01-24 Monitoring method and system for monitoring mailbox operation safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910068581.5A CN109889507B (en) 2019-01-24 2019-01-24 Monitoring method and system for monitoring mailbox operation safety

Publications (2)

Publication Number Publication Date
CN109889507A true CN109889507A (en) 2019-06-14
CN109889507B CN109889507B (en) 2021-08-06

Family

ID=66926765

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910068581.5A Active CN109889507B (en) 2019-01-24 2019-01-24 Monitoring method and system for monitoring mailbox operation safety

Country Status (1)

Country Link
CN (1) CN109889507B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113568934A (en) * 2021-07-28 2021-10-29 平安银行股份有限公司 Data query method and device, electronic equipment and storage medium
CN113824695A (en) * 2021-08-25 2021-12-21 国网新疆电力有限公司喀什供电公司 Information security control method and information security display equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789058A (en) * 2009-01-23 2010-07-28 周宏建 Method for protecting data hiding and hardware thereof
CN103294941A (en) * 2012-02-22 2013-09-11 腾讯科技(深圳)有限公司 Method for accessing private space and mobile device
CN104301286A (en) * 2013-07-15 2015-01-21 中国移动通信集团黑龙江有限公司 User login authentication method and device
CN104780530A (en) * 2014-01-15 2015-07-15 中兴通讯股份有限公司 A method and a terminal for protecting user data
CN106295359A (en) * 2015-05-26 2017-01-04 中兴通讯股份有限公司 The processing method and processing device of application
CN107665301A (en) * 2016-07-28 2018-02-06 腾讯科技(深圳)有限公司 Verification method and device
CN108595971A (en) * 2018-04-25 2018-09-28 杭州闪捷信息科技股份有限公司 A kind of database adaptive refinement method
CN109040103A (en) * 2018-08-27 2018-12-18 深信服科技股份有限公司 A kind of mail account is fallen detection method, device, equipment and readable storage medium storing program for executing

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789058A (en) * 2009-01-23 2010-07-28 周宏建 Method for protecting data hiding and hardware thereof
CN103294941A (en) * 2012-02-22 2013-09-11 腾讯科技(深圳)有限公司 Method for accessing private space and mobile device
CN104301286A (en) * 2013-07-15 2015-01-21 中国移动通信集团黑龙江有限公司 User login authentication method and device
CN104780530A (en) * 2014-01-15 2015-07-15 中兴通讯股份有限公司 A method and a terminal for protecting user data
CN106295359A (en) * 2015-05-26 2017-01-04 中兴通讯股份有限公司 The processing method and processing device of application
CN107665301A (en) * 2016-07-28 2018-02-06 腾讯科技(深圳)有限公司 Verification method and device
CN108595971A (en) * 2018-04-25 2018-09-28 杭州闪捷信息科技股份有限公司 A kind of database adaptive refinement method
CN109040103A (en) * 2018-08-27 2018-12-18 深信服科技股份有限公司 A kind of mail account is fallen detection method, device, equipment and readable storage medium storing program for executing

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113568934A (en) * 2021-07-28 2021-10-29 平安银行股份有限公司 Data query method and device, electronic equipment and storage medium
CN113568934B (en) * 2021-07-28 2023-08-22 平安银行股份有限公司 Data query method and device, electronic equipment and storage medium
CN113824695A (en) * 2021-08-25 2021-12-21 国网新疆电力有限公司喀什供电公司 Information security control method and information security display equipment

Also Published As

Publication number Publication date
CN109889507B (en) 2021-08-06

Similar Documents

Publication Publication Date Title
EP2955617B1 (en) Method and device for unlocking screen, and terminal
CN105631275B (en) information display method, information display device and terminal
CN105530356B (en) Mobile communication terminal and data protection method and device thereof
CN103888607B (en) A kind of mobile terminal secret note inspection method and system
CN103813334A (en) Right control method and right control device
CN102685106A (en) Safety verification method and equipment
CN106293816B (en) A method of increasing the viscosity of the App of user and mobile intelligent terminal installation
CN105405185B (en) Safe verification method and device
CN105721460A (en) Voiceprint password vehicle control system and method
CN105574967A (en) Intelligent access control system and operation method thereof
CN106327637A (en) Bluetooth door opening system based on community management and method
CN109101795A (en) A kind of account number safe login method, apparatus and system
CN107644172A (en) The guard method of content displaying and device
CN105809005A (en) Method for locking or unlocking computer screen based on fingerprints
CN109889507A (en) It is a kind of for monitoring the monitoring method and its system of mailbox safe operation
CN107113613A (en) Server, mobile terminal, real-name network authentication system and method
CN104349452B (en) A kind of method and system of locating cellphone
CN105450665A (en) Secure login method, secure login device and terminal
CN105913513A (en) Control method and system for door lock system
CN106559419A (en) The application and identification method and identification terminal of short message verification code
CN105959277A (en) Method of locking/unlocking computer screen based on NFC terminal
CN107256367A (en) A kind of information processing method and device, terminal device and computer-readable recording medium
CN109859350A (en) A kind of self-service input method of the fingerprint of remote authorization and hotel self-service move in method
CN107241362B (en) Method and device for identifying identity of verification code input user
US20200382504A1 (en) System and Method for Personalized Passenger Auditing in Aircrafts

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210708

Address after: 252000 Room 501, 5th floor, building a, yunshang building, No.5, Lushan South Road, high tech Zone, Liaocheng City, Shandong Province

Applicant after: Impression (Shandong) big data Co.,Ltd.

Address before: 215400 West Building 501, Pioneer Park, No. 6 Beijing West Road, Taicang Economic Development Zone, Suzhou City, Jiangsu Province

Applicant before: TAICANG HONGMA SOFTWARE TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant