CN110515914A - A kind of Log security deriving method based on self-help terminal equipment - Google Patents

A kind of Log security deriving method based on self-help terminal equipment Download PDF

Info

Publication number
CN110515914A
CN110515914A CN201910797130.5A CN201910797130A CN110515914A CN 110515914 A CN110515914 A CN 110515914A CN 201910797130 A CN201910797130 A CN 201910797130A CN 110515914 A CN110515914 A CN 110515914A
Authority
CN
China
Prior art keywords
self
terminal equipment
help terminal
configuration file
export
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910797130.5A
Other languages
Chinese (zh)
Other versions
CN110515914B (en
Inventor
黄军强
周修龙
王剑
李辉
高燕祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Jinqili Information Technology Co Ltd
Original Assignee
Guangzhou Jinqili Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Jinqili Information Technology Co Ltd filed Critical Guangzhou Jinqili Information Technology Co Ltd
Priority to CN201910797130.5A priority Critical patent/CN110515914B/en
Publication of CN110515914A publication Critical patent/CN110515914A/en
Application granted granted Critical
Publication of CN110515914B publication Critical patent/CN110515914B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention discloses a kind of Log security deriving method based on self-help terminal equipment, include the following steps, self-help terminal equipment reads the hardware information of storage equipment, the hardware information is encrypted and generates the first configuration file, server-side verifies the first configuration file, write-in export configuration information and effective range information after verification passes through generate the second configuration file and are saved in storage equipment.Storage equipment sends the second configuration file in server-side, server-side verifies the export configuration information and effective range information of the second configuration file, and compare the consistency of hardware information, after verification and comparison pass through, it will be exported in storage equipment after the encryption of corresponding journal file, and by the second configuration file encrypting storing into storage equipment.The present invention has higher safety in guiding system log, and does not need technical staff to execute-in-place, improves troubleshooting efficiency.

Description

A kind of Log security deriving method based on self-help terminal equipment
Technical field
The present invention relates to system log technical fields, and in particular to a kind of Log security export based on self-help terminal equipment Method.
Background technique
With the development of internet technology, in the more and more lives applied to us of self-help terminal equipment.It is such as automatic Ticket machine, ATM, self-help inquiry apparatus etc. belong to self-help terminal equipment.Self-help terminal equipment can replace some mechanical Manual service, liberate manpower.Self-help terminal equipment in use, because usage scenario, user habit and software and hardware set The factors such as meter, are likely to cause the exception of self-help terminal equipment.
System log is the information of recording equipment hardware, software and system problem, while can be to occur in monitoring system Event, the reason of mistake occurs can be checked by system log, or find the trace that attacker leaves when receiving attack. Therefore, aim at day to play the role of in the daily maintenance and anomaly analysis of equipment key.
In the prior art, when exception or failure occurs in self-help terminal equipment, it usually needs technical staff to fault in-situ It is handled, or after-sales staff is allowed to find journal file to fault in-situ operation self-help terminal equipment, then journal file is led Out into movable storage device, then passes at technical staff and analyze and handle problem.Such treatment process low efficiency and cost It is high.On the other hand, the mode of self-help terminal equipment guiding system log and dangerous is directly operated, any storage equipment can be from Guiding system log at self-help terminal equipment, there is the risks that other data are exported in system, and making system, there is certain Security risk.
Summary of the invention
In order to solve the above-mentioned problems of the prior art, it is an object of that present invention to provide one kind to be based on self-help terminal equipment Log security deriving method.The present invention has higher safety in guiding system log, and does not need technical staff To execute-in-place, troubleshooting efficiency is improved.
A kind of Log security deriving method based on self-help terminal equipment of the present invention, comprising the following steps:
S01, storage equipment is connect with self-help terminal equipment, self-help terminal equipment reads the hardware information of storage equipment;
S02, the hardware information is encrypted, generates the first configuration file, the first configuration file storage is arrived In the storage equipment;
S03, first configuration file is sent to server-side, first configuration file is decrypted in server-side, And data format is verified, if verification passes through, then follow the steps S04;If verification does not pass through, terminate to export process;
Export configuration information is added in S04, the server-side in first configuration file and effective range information generates Second configuration file;
S05, the server-side encrypt second configuration file, and are saved in storage equipment;
S06, the self-help terminal equipment is connect with storage equipment, self-help terminal equipment decryption second configuration File;
S07, the self-help terminal equipment verify the effective range information of second configuration file, if verification passes through, Execute step S08;If verification does not pass through, terminate to export process;
S08, the self-help terminal equipment read storage equipment hardware information, and with it is hard in second configuration file Part information is compared;If comparison result is consistent, S9 is thened follow the steps;If comparison result is inconsistent, terminate to export process;
S09, the self-help terminal equipment judge whether the export configuration information of second configuration file is correct, if just Really, S10 is thened follow the steps;If incorrect, terminate to export process;
S10, make the log in second configuration file that can export number to subtract one, encrypt modified second configuration text Part, and be saved in storage equipment;
S11, the self-help terminal equipment add the journal file to match according to the export configuration information in step S09 It is exported to after close in storage equipment.
Preferably, hardware information described in step S01 includes hardware sequence number, production firm ID and product IDs.
Preferably, in step S04, the export configuration information includes Log Types and logging level, the effective range Information includes the effective time of second configuration file, log can export number and self-help terminal equipment is numbered.
Preferably, self-help terminal equipment described in step S07 verifies the effective range packet of second configuration file Include effective time verification, log can export number verification and self-help terminal equipment number verification;
Wherein, the effective time verification includes: to judge whether current point in time is located in effective time, if so, having Effect time check passes through;If it is not, then effective time verification does not pass through;
It includes: to judge that log can export whether number is greater than zero that the log, which can export number judgement, if so, log can Export number verification passes through;If it is not, then log can export number verification do not pass through;
The self-help terminal equipment number verification includes: the self-help terminal equipment volume that the self-help terminal equipment compares itself It is number whether consistent with the self-help terminal equipment number in effective range information, if unanimously, self-help terminal equipment number verification is logical It crosses;If inconsistent, self-help terminal equipment number verification does not pass through;
When effective time verification, log can export number verification and self-help terminal equipment number verification passes through, The effective range information checking of second configuration file passes through, and otherwise verifies and does not pass through.
Preferably, the server-side is computer or smart phone.
A kind of Log security deriving method based on self-help terminal equipment of the present invention, the advantage is that: exporting The consistency of verifying storage equipment, effectively prevents other incredible storage equipment and leads from self-help terminal equipment when journal file Journal file out has higher safety.
By encrypting the second configuration file, and verify when exporting journal file the effective range letter of the second configuration file Breath, prevents the second configuration file to be tampered, it is ensured that safety when journal file exports.
After verification passes through, self-help terminal equipment is derived automatically from specified type and specified level according to export configuration information Journal file is operated without technical staff to scene into storage equipment, is improved failure and is solved efficiency and reduce dimension Protect cost.
It is exported to after journal file is encrypted in storage equipment, prevents the information leakage of journal file, improve safety.
Detailed description of the invention
Fig. 1 is a kind of flow chart of Log security deriving method based on self-help terminal equipment of the present invention.
Specific embodiment
As shown in Figure 1, the embodiment of the invention provides a kind of Log security deriving method based on self-help terminal equipment.It should The executing subject of method is self-help terminal equipment, and the purpose is to obtain the journal file of self-help terminal equipment safe and efficiently.This In embodiment, self-help terminal equipment can be automatic vending machine, ATM or automatic consulting machine etc..This method also needs One storage equipment of collocation and a server-side.Storage equipment is preferably USB, mobile hard disk or other mobile memories, energy side Portable belt and carry out data transmission with other equipment.Server-side is the intelligent terminals such as computer or smart phone, is taken on it It is loaded with the log export software for exporting journal file.Storing equipment can communicate to connect with self-help terminal equipment and server-side, To transmit data.In the present embodiment, equipment choosing USB storage is stored.
A kind of detailed process of the Log security deriving method based on self-help terminal equipment, as follows provided by the present embodiment It is described.
When unit exception occurs in self-help terminal equipment, technical staff needs to obtain its journal file, to diagnose and check it When abnormal, it can first ask the staff of fault point that USB storage is connected on the USB interface of self-help terminal equipment, make two Connection is established between person.Self-help terminal equipment can read the hardware information of USB storage, then add to the hardware information It is close, the first configuration file is generated after encryption, and the first configuration file is saved in USB storage.Hardware information therein includes Hardware sequence number, production firm ID and product IDs, same production firm is in a series of product, hardware sequence number and product ID is unique, and a hardware sequence number and product IDs only correspond to a product, passes through hardware sequence number, production firm ID and product IDs A storage equipment can be uniquely determined.
Then USB storage to be extracted, USB storage is connect with server-side, the log on operation service end exports software, Log export software can decrypt the first configuration file, then carry out data format verification to the file after decryption.Data format school Test and refer to whether the data format of the first configuration file identical as preset data format, can specifically be preset as character or two into The forms such as number processed.If the data format of the first configuration file is identical as preset data format, data format verification passes through, It performs the next step rapid.If the data format of the first configuration file is different from preset data format, data format verification view Not pass through, export process terminates, journal file export failure.
Server-side write-in can export configuration information and effective model in the first configuration file after data format verification passes through Information is enclosed, to generate the second configuration file.Exporting configuration information includes Log Types and logging level, Log Types and log etc. Grade is the division that self-help terminal equipment carries out different events, phylogenetic event is divided into each classification, and pressed etc. Grade arrangement, in order to manage.In the present embodiment, export configuration information for control self-help terminal equipment export corresponding types and The journal file of corresponding level, realization are derived automatically from, and improve safety and log exports efficiency.Effective range information includes second The effective time of configuration file, log can export number and self-help terminal equipment number.Effective time can be some time Node is also possible to certain section of period.Effective time refers to the second configuration file before some timing node or at certain When within the section period effectively, more than the timing node or not within this section of period, which is considered as nothing Effect.Log can export the number that number refers to the executable log export operation of the second configuration file of this part, when log can export When number is greater than zero, which could execution journal export operation.Self-help terminal equipment is numbered for specifying certain One self-help terminal equipment makes the second configuration file of this part that can only carry out log export behaviour on specified self-help terminal equipment Make.
Server-side encrypts the second configuration file after generating the second configuration file, and encrypted second is configured File is saved in USB storage.USB storage is connect with self-help terminal equipment.Self-help terminal equipment can decrypt second and match File is set, the effective range information in the second configuration file is then verified, specific checking procedure is as described below.
The checking procedure includes: effective time verification, log can export number verification and self-help terminal equipment number verifies.
Whether self-help terminal equipment verification current point in time is located in effective time, it is assumed that effective time is preset as certain for the moment Between point, then verify whether current point in time was located at before preset time point, if so, effective time verification pass through, otherwise have Effect time check does not pass through.If effective time is preset as certain time period, when verifying current point in time and whether being located at preset Between in section, if so, effective time verification passes through, otherwise effective time verification does not pass through.I.e. some second configuration file only exists In its effective time effectively, it is more than the effective time, then journal file can not be exported by second configuration file of part, to log File carries out effective protection, improves the safety in journal file export process.
The log that self-help terminal equipment verifies the second configuration file can export whether number is greater than zero, if so, log can Export number verification passes through, if it is not, then log can export number verification do not pass through.I.e. single copy of second configuration file can be derived The number of journal file be it is conditional, can not by the unlimited number of export journal file of single part of the second configuration file, improve day Safety in will export process.
The self-help terminal equipment number that self-help terminal equipment verifies its own is set with the self-aided terminal in the second configuration file Whether standby number is consistent, if unanimously, self-help terminal equipment number verification passes through, if inconsistent, and self-help terminal equipment number Verification does not pass through.I.e. single copy of second configuration file can only export journal file, self-service end in specified self-help terminal equipment End equipment only exports journal file under the control of the second configuration file with its number, can improve journal file export process In safety.
Only when active between verification, log can export number verification and self-help terminal equipment number verification by when, The effective range information checking of second configuration file just passes through, and is otherwise considered as effective range information checking and does not pass through, closing day Will exports process, journal file export failure.By the above process, stringent verification is carried out to the export of journal file, can mentioned Safety in high journal file export process.
After the effective range information checking of the second configuration file passes through, self-help terminal equipment can be to the hard of USB storage Part information is verified.Specific process is as described below, and self-help terminal equipment can read the hardware information of USB storage, by this Hardware information is compared with the hardware information in the second configuration file.Hardware information in second configuration file is initial step In the hardware information of USB storage that is connect with self-help terminal equipment.Self-help terminal equipment can read the USB storage connected instantly The hardware information of device is compared with the hardware information of the USB storage connected before, if comparison result is consistent, carries out down One step terminates to export process, log export failure if comparison result is inconsistent.Before the step is primarily to guarantee The consistency of latter linked two storages equipment, export log text after capable of preventing other storage equipment from copying the second configuration file Part effectively prevents other incredible storage equipment and exports journal file from self-help terminal equipment, has higher safety.
For the effective range information checking of the second configuration file and the comparison process of hardware information, it can be understood as only When the storage device memory of authorization contains effective second configuration file, log text could be exported from self-help terminal equipment Part, so that the safety of journal file greatly improves.
After hardware information comparison passes through, self-help terminal equipment, which judges the export configuration information in the second configuration file, is It is no correct.Exporting configuration information includes Log Types and logging level.Day in self-help terminal equipment judgement export configuration information Whether will type and logging level are consistent with the Log Types of the self-help terminal equipment, grade classification, if being consistent, judgement is positive Really, it performs the next step rapid;If not being consistent, it is judged as incorrect, terminates export process, the failure of log export process.Export is matched Confidence ceases the journal file for being derived automatically from corresponding types and corresponding level according to the information for self-help terminal equipment, is not necessarily to skill Art personnel reach fault in-situ operation, improve troubleshooting efficiency and reduce maintenance cost.
Self-help terminal equipment after judgement export configuration information is correct, can according to export configuration information, by corresponding types and It is exported in storage equipment after the journal file encryption of corresponding grade, and the number that exports of second configuration file is made to subtract one, Then modified second configuration file is encrypted to be saved in storage equipment.This completes the export process of journal file. Journal file and the second configuration file are encrypted respectively when exporting and completing, journal file can be protected, prevent journal file It reveals or is tampered, the second configuration file is prevented to be tampered, improve safety.
For those skilled in the art, it can make other each according to the above description of the technical scheme and ideas The corresponding change of kind and deformation, and all these changes and deformation all should belong to the protection model of the claims in the present invention Within enclosing.

Claims (5)

1. a kind of Log security deriving method based on self-help terminal equipment, which comprises the following steps:
S01, storage equipment is connect with self-help terminal equipment, self-help terminal equipment reads the hardware information of storage equipment;
S02, the hardware information is encrypted, generates the first configuration file, first configuration file is stored to described It stores in equipment;
S03, server-side is sent by first configuration file, first configuration file is decrypted in server-side, and school Data format is tested, if verification passes through, thens follow the steps S04;If verification does not pass through, terminate to export process;
Export configuration information is added in S04, the server-side in first configuration file and effective range information generates second Configuration file;
S05, the server-side encrypt second configuration file, and are saved in storage equipment;
S06, the self-help terminal equipment is connect with storage equipment, self-help terminal equipment decryption the second configuration text Part;
S07, the self-help terminal equipment verify the effective range information of second configuration file, if verification passes through, execute Step S08;If verification does not pass through, terminate to export process;
S08, the self-help terminal equipment read the hardware information of storage equipment, and believe with the hardware in second configuration file Breath is compared;If comparison result is consistent, S9 is thened follow the steps;If comparison result is inconsistent, terminate to export process;
S09, the self-help terminal equipment judge whether the export configuration information of second configuration file is correct, if correctly, Execute step S10;If incorrect, terminate to export process;
S10, make the log in second configuration file that can export number to subtract one, encrypt modified second configuration file, and It is saved in storage equipment;
S11, the self-help terminal equipment are according to the export configuration information in step S09, after the journal file to match encryption It exports in storage equipment.
2. a kind of Log security deriving method based on self-help terminal equipment according to claim 1, which is characterized in that step Hardware information described in S01 includes hardware sequence number, production firm ID and product IDs.
3. a kind of Log security deriving method based on self-help terminal equipment according to claim 1, which is characterized in that step In S04, the export configuration information includes Log Types and logging level, and the effective range information includes second configuration The effective time of file, log can export number and self-help terminal equipment number.
4. a kind of Log security deriving method based on self-help terminal equipment according to claim 3, which is characterized in that step The effective range information that self-help terminal equipment described in S07 verifies second configuration file includes effective time verification, log Number verification and self-help terminal equipment number verification can be exported;
Wherein, the effective time verification includes: to judge whether current point in time is located in effective time, if so, when effective Between verify and pass through;If it is not, then effective time verification does not pass through;
It includes: to judge that log can export whether number is greater than zero that the log, which can export number judgement, if so, log can export Number verification passes through;If it is not, then log can export number verification do not pass through;
Self-help terminal equipment number verification include: the self-help terminal equipment compare itself self-help terminal equipment number with Whether the self-help terminal equipment number in effective range information is consistent, if unanimously, self-help terminal equipment number verification passes through;If Inconsistent, then the verification of self-help terminal equipment number does not pass through;
It is described when effective time verification, log can export number verification and self-help terminal equipment number verification passes through The effective range information checking of second configuration file passes through, and otherwise verifies and does not pass through.
5. a kind of Log security deriving method based on self-help terminal equipment according to claim 1, which is characterized in that described Server-side is computer or smart phone.
CN201910797130.5A 2019-08-27 2019-08-27 Log safety export method based on self-service terminal equipment Active CN110515914B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910797130.5A CN110515914B (en) 2019-08-27 2019-08-27 Log safety export method based on self-service terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910797130.5A CN110515914B (en) 2019-08-27 2019-08-27 Log safety export method based on self-service terminal equipment

Publications (2)

Publication Number Publication Date
CN110515914A true CN110515914A (en) 2019-11-29
CN110515914B CN110515914B (en) 2021-09-24

Family

ID=68627235

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910797130.5A Active CN110515914B (en) 2019-08-27 2019-08-27 Log safety export method based on self-service terminal equipment

Country Status (1)

Country Link
CN (1) CN110515914B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102289622A (en) * 2011-09-01 2011-12-21 西安电子科技大学 Trusted startup method based on authentication policy file and hardware information collection
CN104881602A (en) * 2014-02-28 2015-09-02 Ncr公司 Unattended Secure Device Authorization
JP2015232742A (en) * 2014-06-09 2015-12-24 株式会社日本製鋼所 User authentication method and ejection molding machine
CN105844469A (en) * 2015-01-30 2016-08-10 Ncr公司 Authority trusted secure system component

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102289622A (en) * 2011-09-01 2011-12-21 西安电子科技大学 Trusted startup method based on authentication policy file and hardware information collection
CN104881602A (en) * 2014-02-28 2015-09-02 Ncr公司 Unattended Secure Device Authorization
JP2015232742A (en) * 2014-06-09 2015-12-24 株式会社日本製鋼所 User authentication method and ejection molding machine
CN105844469A (en) * 2015-01-30 2016-08-10 Ncr公司 Authority trusted secure system component

Also Published As

Publication number Publication date
CN110515914B (en) 2021-09-24

Similar Documents

Publication Publication Date Title
CN110691064B (en) Safety access protection and detection system for field operation terminal
CN106060796B (en) The backup destroying method and device of terminal
CN108347361B (en) Application program testing method and device, computer equipment and storage medium
CN110011848B (en) Mobile operation and maintenance auditing system
CN106059771A (en) Intelligent POS machine secret key management system and method
CN104751036A (en) Computer information security system
EP2466505A1 (en) Method for authenticating a terminal
CN105303651A (en) Bluetooth based two-way communication automatic locking system and method
CN108629206B (en) Secure encryption method, encryption machine and terminal equipment
CN104408825B (en) Encrypted card swiping public charging pile and charging method
CN104581008B (en) A kind of video monitoring system information security protection system and method
CN103559435A (en) Method and device for controlling debugging ports of terminal equipment
CN110224823A (en) Substation's message safety protecting method, device, computer equipment and storage medium
CN110046514A (en) Tune-up data guard method, device, server and storage medium
CN107315945B (en) The disk decryption method and device of a kind of electronic equipment
CN104104650B (en) data file access method and terminal device
CN104850467A (en) Computer self-protection system and computer self-protection method
CN109214221A (en) A kind of identity card reader verification method, host computer and identity card reader
CN108599932A (en) A kind of identity identifying method for electric system
CN110515914A (en) A kind of Log security deriving method based on self-help terminal equipment
CN103186798A (en) Production testing system for IC card
CN107493167A (en) Terminal key dissemination system and its terminal key distribution method
CN204904277U (en) Two encryption lock ukey of intelligence developments
KR101435592B1 (en) A log verification device for the contents distribution log of authoring content provided as an online service
CN105871548B (en) The processing method of household appliance, Cloud Server and the debugging of family's power information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A log security export method based on self-service terminal equipment

Effective date of registration: 20211101

Granted publication date: 20210924

Pledgee: Bank of China Limited by Share Ltd. Guangzhou Haizhu branch

Pledgor: Guangzhou Jinqili Information Technology Co.,Ltd.

Registration number: Y2021440000326

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20231113

Granted publication date: 20210924

Pledgee: Bank of China Limited by Share Ltd. Guangzhou Haizhu branch

Pledgor: Guangzhou Jinqili Information Technology Co.,Ltd.

Registration number: Y2021440000326

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A secure log export method based on self-service terminal devices

Effective date of registration: 20231116

Granted publication date: 20210924

Pledgee: Bank of China Limited by Share Ltd. Guangzhou Haizhu branch

Pledgor: Guangzhou Jinqili Information Technology Co.,Ltd.

Registration number: Y2023980066025