CN110430527B - Unmanned aerial vehicle ground safety transmission power distribution method - Google Patents

Unmanned aerial vehicle ground safety transmission power distribution method Download PDF

Info

Publication number
CN110430527B
CN110430527B CN201910645734.8A CN201910645734A CN110430527B CN 110430527 B CN110430527 B CN 110430527B CN 201910645734 A CN201910645734 A CN 201910645734A CN 110430527 B CN110430527 B CN 110430527B
Authority
CN
China
Prior art keywords
user
aerial vehicle
unmanned aerial
power
transmission rate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910645734.8A
Other languages
Chinese (zh)
Other versions
CN110430527A (en
Inventor
陈新颖
赵楠
邹德岳
刘鑫
陈炳才
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Hongchuan Technology Co ltd
Original Assignee
Dalian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University of Technology filed Critical Dalian University of Technology
Priority to CN201910645734.8A priority Critical patent/CN110430527B/en
Publication of CN110430527A publication Critical patent/CN110430527A/en
Application granted granted Critical
Publication of CN110430527B publication Critical patent/CN110430527B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/18Negotiating wireless communication parameters
    • H04W28/22Negotiating communication rate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0473Wireless resource allocation based on the type of the allocated resource the resource being transmission power
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/51Allocation or scheduling criteria for wireless resources based on terminal or device properties

Abstract

A method for distributing safe transmission power of an unmanned aerial vehicle to the ground is characterized in that a circular flight track where the unmanned aerial vehicle is located is dynamically divided into a plurality of time slots in the flight process of the unmanned aerial vehicle, and the lowest transmission power is distributed to the unmanned aerial vehicle no matter how far or near the position of a safe user is in each time slot; and allocating power to other users according to the distance of the positions of the other users. Therefore, the safe user is ensured not to be intercepted, and the maximization of the transmission rate of other users is realized. In addition, the patent also provides the upper limit value of the transmission rate threshold of the safe user at various relative distance positions, and the linear relation between the transmission rate of the common user and the transmission rate threshold of the safe user.

Description

Unmanned aerial vehicle ground safety transmission power distribution method
Technical Field
The invention belongs to the technical field of unmanned aerial vehicle multi-user wireless communication network security, relates to a user power distribution strategy for ensuring information security of security users by an unmanned aerial vehicle with a circular track, and particularly relates to a method for distributing ground security transmission power of the unmanned aerial vehicle.
Background
The unmanned aerial vehicle has many advantages such as high mobility, convenient deployment and low cost, and is a research focus of leading-edge communication. In addition, the shortage of channel resources is a contradiction that is increasingly prominent in the communication world. With the explosive growth of information in modern society, the exponential increase of mobile terminals and data transmission flow, the resources of transmission frequency bands are more and more valuable, which is also a bottleneck problem that hinders the growth of users and the increase of information transmission rate in the communication industry at present and in the future. In order to solve the problem of limited communication channel resources, researchers have proposed means such as time division multiplexing, frequency division multiplexing, wavelength division multiplexing and space division multiplexing in sequence to realize efficient utilization of channels by multiple users. However, with the popularity of 4G and the arrival of 5G, the above approaches have not been able to meet the requirement of users for channel resources, and then the scholars propose a non-orthogonal multiple access algorithm to achieve more efficient data transmission by actively introducing interference information and then correctly demodulating user information through serial interference cancellation at the receiving end, thereby improving the spectrum transmission efficiency. However, the non-orthogonal multiple access still has some problems, especially the information security problem and the operation complexity problem of the user, which cause certain obstacles to the development of the non-orthogonal multiple access in practical application.
Firstly, wireless communication is carried out in a mode of broadcasting all users, so that the wireless communication has certain openness, certain damage can be caused to the information security of the users, and especially, the modern people urgently need to protect the personal privacy, so that the user information security degree must be paid attention to. In a communication network, a certain number of eavesdroppers can exist, and the information of a user is intercepted through a technical means of the eavesdroppers under the condition that the broadcasting information of an information source is normally received and the communication of the user is not influenced or is not perceived by the user. The traditional communication network generally adopts means such as a secret key to encrypt the transmitted information, and a user receives the encrypted information and then decrypts the encrypted information by using the secret key which is distributed in advance. However, existing computing means such as distributed computing have posed a threat to the security of such means for encrypted transmission. Therefore, non-orthogonal multiple access is just to actively introduce interference noise in the physical layer to combat illegal eavesdropping. And the specific requirements for transmission rate and interception rate can be met by adjusting the power allocation strategy. The aim of this document is to achieve the requirements on the interception rate and the transmission rate by adjusting the power allocated to each user.
The conventional non-orthogonal multiple access performs power allocation according to the channel condition of a user: the better the channel condition (or the closer the users are), the lower the allocated power; the worse the channel condition (or the farther away the user), the higher the allocated power. This causes the interception rate of the secure user to increase dramatically when the channel condition is poor (at the furthest position among all legitimate users), resulting in a high risk of interception.
The invention provides a method for dynamically distributing power according to time slots aiming at an unmanned aerial vehicle flying in a circular track so as to realize maximization of the total transmission rate of a common user on the basis of ensuring that a safe user is not intercepted, and the specific scheme is shown in a schematic diagram 1. In a non-orthogonal multiple access network of K common users, a safe user and an eavesdropping user, the power distribution strategy is adopted, the communication rate and the maximization of the common users are realized by minimizing the transmission power of the safe user and performing power distribution on other common users according to corresponding proportion, and the eavesdropping rate is reduced at the same time.
In addition, as the position of the drone changes, the distance of each user from the drone changes at any time, and thus the power allocation to each user also needs to change in real time.
Disclosure of Invention
The invention provides a method for distributing ground safety transmission power of an unmanned aerial vehicle, which is a new power distribution strategy to realize anti-eavesdropping protection on information of a safety user. In K common users and one safety user UsAn eavesdropper UeIn the unmanned aerial vehicle network based on the non-orthogonal multiple access and with the circular operation track, the power distribution strategy of all legal users (K safe users and one safe user) is dynamically redesigned, so that the user UsThe transmission power of the system is constantly the lowest to ensure that the safe users are not in any condition to be intercepted, and the transmission rate and the maximization are realized by the design of the distributed power of K common users on the basis.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
(1) dividing the track of the unmanned aerial vehicle in one week into N time slots, and calculating the position of each user relative to the unmanned aerial vehicle in each time slot based on the initial position of the time slot.
(2) The transmission rate threshold at which the ordinary user can correctly transmit and demodulate is r;
(3) the transmission rate threshold of the secure user is rsAnd r issR cannot be exceeded;
(4)Usthe transmission power of the user is constantly the minimum value of the transmission power of all legal users;
(5) secure user eavesdropping rate ReAs small as possible;
(6) common user transmission rate and
Figure GDA0002611185260000031
as large as possible;
by dynamically designing and distributing the power of legal users according to time slots in real time, the safe users can be ensured not to be intercepted under any condition, and meanwhile, the transmission rate of common users is maximized. The specific process is as follows:
step 1: starting from a certain time slot;
step 2: calculating the distance between all legal users and the unmanned aerial vehicle;
and step 3: according to the premises (1) to (6) and the relative position of the safe user, reasonable power distribution is carried out on all legal users by using the formula (2), the formula (4) and the formula (6), and data transmission is carried out, so that U is enabled to be realizedsIs not covered by UeEavesdropping;
and 4, step 4: communication time
Figure GDA0002611185260000032
And then, the time slot communication is finished, the step 1 is returned, and the next time slot communication task is started.
For simplicity of representation, an intermediate variable q is introduced into the formula for how to allocate the transmit power of each useriWherein U issAt the farthest time, the power p of each useriExpressed as:
Figure GDA0002611185260000033
Figure GDA0002611185260000034
Usat the latest time, power p of each useriExpressed as:
Figure GDA0002611185260000035
Figure GDA0002611185260000041
Usin the middle, the power p of each useriExpressed as:
Figure GDA0002611185260000042
Figure GDA0002611185260000043
on the premise of meeting the requirements (1) to (6),
Figure GDA0002611185260000044
with its upper limit. Transmission rate threshold for safe subscribers furthest away from the drone, closest to the drone, and in the middle zone
Figure GDA0002611185260000045
The expression (c) is different, and the upper limit value in each case is:
Figure GDA0002611185260000046
Figure GDA0002611185260000047
Figure GDA0002611185260000048
transmission rate and R for other common userssumAnd rsThe values of (A) are in a linear relationship, and the expression is as follows:
Figure GDA0002611185260000049
the method for distributing the ground safety transmission power of the unmanned aerial vehicle ensures that a safety user is not intercepted, and maximizes the sum of the transmission rates of common users on the basis. The invention provides the upper limit value of the safe user communication rate threshold, and provides an important reference range for how to accept or reject the user communication rate. The linear relation between the communication rate of the common user and the communication rate threshold of the safe user provides parameter reference for power distribution design.
Drawings
Fig. 1 is a schematic diagram of a circular trajectory non-orthogonal multiple access unmanned aerial vehicle network;
FIG. 2 illustrates the distribution R of the time slot points of one-week flight of the UAV and the conventional non-orthogonal multiple access powersumComparing;
FIG. 3 illustrates the distribution R of the time slot points of the unmanned aerial vehicle in one flight cycle and the power of the conventional non-orthogonal multiple accesssComparing;
FIG. 4 illustrates the distribution R of the time slot points of the unmanned aerial vehicle in one flight cycle and the power of the conventional non-orthogonal multiple accesseComparing;
FIG. 5 shows that R is the common user R for R under different unmanned aerial vehicle transmitting powerssumInfluence comparison;
fig. 6 shows a safe user r under different unmanned aerial vehicle transmitting powerssTo RsumInfluence comparison;
FIG. 7 secure user farthest case, nearest case and in the middle case, RsumAnd rsA linear relationship.
Detailed Description
The present invention will be further explained with reference to the drawings and examples.
In order to better understand the technical solution, specific analysis is given below with reference to the accompanying drawings and specific embodiments.
Example 1
In a non-orthogonal multiple access drone network with a K-4 user, one secure user and one eavesdropper, which employs guaranteed secure transmission, the network side length of the square area is 560 m. The unmanned aerial vehicle flies around the center of the network in a circular track with the radius of 200m, and the flying height of the unmanned aerial vehicle is 80 m. In addition, we assume that the channel between the drone and the communication user is subject to rice fading, where the rice channel power reference gain is ρ0-30dBm, rice parameter K 05, the variance of the gaussian additive noise distribution is σ2=10-23mW。
First, fig. 2, fig. 3, and fig. 4 compare the performance of the power allocation scheme of the present invention with that of a conventional non-orthogonal multiple access-deployed drone communication network with respect to the transmission rate of secure users, the eavesdropping rate, and the transmission rate and performance of other users, respectively. In the communication process, the transmission rate threshold of a common user is r ═ 3.5bit/s/Hz, and the transmission total power threshold of the unmanned aerial vehicle is PS10mW, transmission rate threshold r for the secure usersDerived from equation (1) (and guaranteed that its value does not exceed r). As can be seen from the experimental results in fig. 2, the communication rate of the secure user in the non-orthogonal multiple access transmission strategy for ensuring secure transmission proposed in this patent is slightly lower than that of the conventional non-orthogonal multiple access network communication. However, as can be seen from fig. 3, the power allocation strategy proposed in this patent can greatly reduce the eavesdropping rate of the secure user, and can ensure that the secure user is not eavesdropped without dispute. In addition, as can also be seen from fig. 4, the sum of the transmission rates of the other users in the two power allocation strategies is substantially the same, and there is no great difference. Therefore, the non-orthogonal multiple access-based circular track unmanned aerial vehicle communication network provided by the patent ensures that the power distribution strategy of safe transmission can strictly ensure the information safety of the safe user without eavesdropping while ensuring the communication quality of other users.
Next, in FIG. 5, the power P is transmitted at different dronesSIn the case of (1), the change of the transmission rate sum of the ordinary users when the transmission rate r is 3bit/s/Hz, r is 3.5bit/s/Hz, and r is 4bit/s/Hz is compared. From the results, it can be seen that when the transmission power of the drone increases, the transmission rate of the normal user tends to increase, and when the transmission power of the drone increases gradually, the transmission rate of the normal user of the network with the normal user communication threshold r being 4bit/s/Hz is smaller than the case with the communication threshold r being 3bit/s/Hz and r being 3.5 bit/s/Hz. The change is caused by that when the threshold of the transmission rate of the ordinary user is increased, the transmission rate which can be reached by the safe user is increased under the condition that the transmission power of the unmanned aerial vehicle is sufficient, and therefore, more communication resources are occupied, so that the transmission rate and the inverse of the ordinary user are increasedAnd decreases.
In addition, in fig. 6, the transmission power P is transmitted to different dronesSIn case of a safe subscriber, the transmission rate threshold rsThe transmission rate and the image of a common user are researched. The experimental results show that the sum of the transmission rates of common users under three conditions is in an ascending trend along with the increase of the transmitting power of the unmanned aerial vehicle; however, as the transmission rate threshold of the safe user increases, the sum of the transmission rates of the normal users tends to decrease, because when the transmission threshold of the safe user is low, the occupied unmanned aerial vehicle transmission power resource is less, so that sufficient transmission power is available for the normal user. Therefore, the transmission rate of a common user is higher in a scenario where the threshold value of the transmission rate is low, but the communication quality of a safe user also needs to be ensured in the communication process, so how to set the power allocation needs to be balanced according to actual requirements.
Finally, in fig. 7, the transmission rate of the normal user and the transmission rate threshold r with the safe user are sorted according to the distance between the different userssThe linear relationship of (a) was explored. The result of the figure shows that no matter what position relationship is, what value is taken by the transmission rate threshold of the ordinary user, as long as the unmanned aerial vehicle has sufficient transmitting power, the transmission rate of the ordinary user and the transmission rate threshold value r of the safe usersThe linear negative correlation and the same slope are obtained, and the result is in accordance with the conclusion of equation (8).

Claims (1)

1. An unmanned aerial vehicle ground safety transmission power distribution method is characterized by comprising the following steps:
(1) dividing the track of the unmanned aerial vehicle in one week into N time slots, and calculating the position of each user relative to the unmanned aerial vehicle in each time slot based on the initial position of the time slot;
(2) the transmission rate threshold at which the ordinary user can correctly transmit and demodulate is r;
(3) the transmission rate threshold of the secure user is rsAnd r issR cannot be exceeded;
(4) secure user UsThe transmission power of the user is constantly the minimum value of the transmission power of all legal users;
(5) Secure user eavesdropping rate ReAs small as possible;
(6) common user transmission rate and
Figure FDA0002611185250000011
as large as possible;
the power of legal users is dynamically designed and distributed according to time slots in real time, so that the safe users can be guaranteed not to be intercepted under any condition, and the maximization of the transmission rate of common users is realized; the specific process is as follows:
step 1: starting from a certain time slot;
step 2: calculating the distance between all legal users and the unmanned aerial vehicle;
and step 3: according to the premises (1) to (6) and the relative position of the safe user, reasonable power distribution is carried out on all legal users by using the formula (2), the formula (4) and the formula (6), and data transmission is carried out, so that U is enabled to be realizedsIs not intercepted by the eavesdropper UeEavesdropping;
and 4, step 4: communication time
Figure FDA0002611185250000012
After that, the time slot communication is finished, the step 1 is returned to, and the next time slot communication task is started;
introducing an intermediate variable q in a formula for how to allocate transmission power of each useriWherein U issAt the farthest time, the power p of each useriExpressed as:
Figure FDA0002611185250000013
Figure FDA0002611185250000014
Usat the latest time, power p of each useriExpressed as:
Figure FDA0002611185250000015
Figure FDA0002611185250000021
Usin the middle, the power p of each useriExpressed as:
Figure FDA0002611185250000022
Figure FDA0002611185250000023
on the premise of meeting the requirements (1) to (6),
Figure FDA0002611185250000024
has an upper limit value; transmission rate threshold for safe subscribers furthest away from the drone, closest to the drone, and in the middle zone
Figure FDA0002611185250000025
The expression (c) is different, and the upper limit value in each case is:
Figure FDA0002611185250000026
transmission rate and R for other common userssumAnd rsThe values of (A) are in a linear relationship, and the expression is as follows:
Figure FDA0002611185250000027
CN201910645734.8A 2019-07-17 2019-07-17 Unmanned aerial vehicle ground safety transmission power distribution method Active CN110430527B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910645734.8A CN110430527B (en) 2019-07-17 2019-07-17 Unmanned aerial vehicle ground safety transmission power distribution method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910645734.8A CN110430527B (en) 2019-07-17 2019-07-17 Unmanned aerial vehicle ground safety transmission power distribution method

Publications (2)

Publication Number Publication Date
CN110430527A CN110430527A (en) 2019-11-08
CN110430527B true CN110430527B (en) 2020-09-25

Family

ID=68410767

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910645734.8A Active CN110430527B (en) 2019-07-17 2019-07-17 Unmanned aerial vehicle ground safety transmission power distribution method

Country Status (1)

Country Link
CN (1) CN110430527B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111786713B (en) * 2020-06-04 2021-06-08 大连理工大学 Unmanned aerial vehicle network hovering position optimization method based on multi-agent deep reinforcement learning

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101493518A (en) * 2009-02-16 2009-07-29 中国科学院计算技术研究所 Wireless sensor network node positioning method and device
CN204021250U (en) * 2014-07-23 2014-12-17 陈志石 A kind of have the round wing unmanned plane blowing wing mechanism

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102209033B (en) * 2011-05-24 2013-08-28 哈尔滨工程大学 Cluster-based routing method for wireless sensor networks
US20130233964A1 (en) * 2012-03-07 2013-09-12 Aurora Flight Sciences Corporation Tethered aerial system for data gathering
CN103209455A (en) * 2013-01-06 2013-07-17 南昌大学 Wireless sensor network routing method based on node position information
US20150130840A1 (en) * 2013-11-08 2015-05-14 Sharper Shape Ltd. System and method for reporting events
CN105592472B (en) * 2016-01-22 2020-03-17 华北电力大学(保定) Wireless sensor network topology method
CN105681110B (en) * 2016-03-16 2019-07-19 重庆邮电大学 Safe transmission wirelessly takes joint network selection and the resource allocation methods of energy network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101493518A (en) * 2009-02-16 2009-07-29 中国科学院计算技术研究所 Wireless sensor network node positioning method and device
CN204021250U (en) * 2014-07-23 2014-12-17 陈志石 A kind of have the round wing unmanned plane blowing wing mechanism

Also Published As

Publication number Publication date
CN110430527A (en) 2019-11-08

Similar Documents

Publication Publication Date Title
Cao et al. Secure transmission via beamforming optimization for NOMA networks
US20230300624A1 (en) Method and system for soft frequency reuse in a distributed antenna system
CN112055310B (en) Trajectory design and power distribution method in unmanned aerial vehicle CR-NOMA network
CN110730494B (en) Power optimization method for maximizing minimum safe rate of unmanned aerial vehicle downlink non-orthogonal multiple access (NOMA) mobile user
CN108718445B (en) QoS-driven D2D secure communication resource allocation method
Chen et al. Secure transmission via power allocation in NOMA-UAV networks with circular trajectory
CN108093411B (en) Resource scheduling optimization method based on channel signature in D2D communication network
CN109996264B (en) Power allocation method for maximizing safe energy efficiency in non-orthogonal multiple access system
CN111885732B (en) Dynamic resource allocation method for enhancing NOMA visible light communication network security
Lin et al. Secure computation efficiency maximization in NOMA-enabled mobile edge computing networks
Tang et al. Opportunistic power allocation strategies and fair subcarrier allocation in OFDM-based cognitive radio networks
Fazel et al. Secure throughput optimization for cache-enabled multi-UAVs networks
CN110430527B (en) Unmanned aerial vehicle ground safety transmission power distribution method
Jiang et al. Three-dimensional trajectory optimization for secure UAV-enabled cognitive communications
Bansal et al. Some research issues in cognitive radio networks
CN112564768B (en) Safety transmission optimization method in unmanned aerial vehicle cognitive wireless network based on marginal effect
CN102523587A (en) Multi-user spectrum allocation method capable of realizing defense of various attacks in cognitive radio network
CN113055322A (en) Uplink and downlink communication method and device for 5G private network and public network
Yan et al. An adaptive subcarrier, bit and power allocation algorithm for multicell OFDM systems
CN107148078B (en) User access control method and device for hybrid full-duplex and half-duplex network
CN111787623B (en) D2D communication resource allocation method for multiplexing uplink and downlink channels
CN110300412B (en) Game theory-based resource allocation method in non-orthogonal cognitive radio network
Huang et al. UAV-Assisted Downlink-and-Uplink Communication in the Presence of Multiple Malicious Jammers
Zhang et al. Subcarrier and power allocation in ofdm-based cognitive radio systems
Chen et al. Power allocation for secure transmission in circular trajectory NOMA-UAV networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information

Inventor after: Liu Mingjian

Inventor after: Chen Xinying

Inventor after: Zhao Nan

Inventor after: Zou Deyue

Inventor after: Liu Xin

Inventor after: Chen Bingcai

Inventor before: Chen Xinying

Inventor before: Zhao Nan

Inventor before: Zou Deyue

Inventor before: Liu Xin

Inventor before: Chen Bingcai

CB03 Change of inventor or designer information
TR01 Transfer of patent right

Effective date of registration: 20220525

Address after: 410000 No. 27, Liansheng street, Tongtai street, Kaifu District, Changsha City, Hunan Province

Patentee after: Changsha Taipin Information Technology Co.,Ltd.

Address before: 116024 No. 2 Ling Road, Ganjingzi District, Liaoning, Dalian

Patentee before: DALIAN University OF TECHNOLOGY

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221008

Address after: 410000 Floor 4, No. 103, Small Instrument Assembly Plant, No. 1, Jinzhuo Industrial Park, No. 118, Qingzhuhu Road, Qingzhuhu Street, Kaifu District, Changsha City, Hunan Province

Patentee after: Hunan Hongchuan Technology Co.,Ltd.

Address before: 410000 No. 27, Liansheng street, Tongtai street, Kaifu District, Changsha City, Hunan Province

Patentee before: Changsha Taipin Information Technology Co.,Ltd.

TR01 Transfer of patent right