CN110602118A - Virtualization data remote encryption security system and method - Google Patents

Virtualization data remote encryption security system and method Download PDF

Info

Publication number
CN110602118A
CN110602118A CN201910890046.8A CN201910890046A CN110602118A CN 110602118 A CN110602118 A CN 110602118A CN 201910890046 A CN201910890046 A CN 201910890046A CN 110602118 A CN110602118 A CN 110602118A
Authority
CN
China
Prior art keywords
module
data
node
remote
security system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910890046.8A
Other languages
Chinese (zh)
Other versions
CN110602118B (en
Inventor
王玲
陈淑君
孔爱娣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Xinyida Computing Technology Co ltd
Original Assignee
南京信同诚信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 南京信同诚信息技术有限公司 filed Critical 南京信同诚信息技术有限公司
Priority to CN201910890046.8A priority Critical patent/CN110602118B/en
Publication of CN110602118A publication Critical patent/CN110602118A/en
Application granted granted Critical
Publication of CN110602118B publication Critical patent/CN110602118B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption

Abstract

The invention relates to the technical field of data encryption, in particular to a virtualized data remote encryption security system and a virtualized data remote encryption security method. The data transmission module is used for transmitting data in a long distance, the data encryption module is used for encrypting the transmitted data, and the virtualization processing platform is used for virtualizing the data. According to the virtualization data remote encryption safety system and method, remote data transmission is achieved, meanwhile, the stability of data transmission is guaranteed, data encryption in all aspects is achieved by the aid of the data encryption module, safety during data transmission is guaranteed, the virtualization technology is adopted, physical hardware is utilized to the maximum extent, and the data running speed is improved.

Description

Virtualization data remote encryption security system and method
Technical Field
The invention relates to the technical field of data encryption, in particular to a virtualized data remote encryption security system and a virtualized data remote encryption security method.
Background
In a computer, virtualization is a resource management technology, and various entity resources of the computer, such as servers, networks, memories, storages and the like, are abstracted and converted to present the resources, so that the barrier that the entity structures cannot be cut is broken, and a user can apply the resources in a better mode than the original configuration. However, when data is processed in a virtualization manner, the distance is affected, and it is difficult to realize remote data transmission, and meanwhile, when data is transmitted, the encryption degree is insufficient, and it is difficult to ensure the security of data transmission.
Disclosure of Invention
The present invention is directed to a virtualized data remote encryption security system and method, which solves one or more of the above-mentioned deficiencies in the prior art.
In order to achieve the above object, in one aspect, the present invention provides a virtualized data remote encryption security system, including a data transmission module, a data encryption module, and a virtualization processing platform, where the data transmission module is configured to transmit data remotely, the data encryption module is configured to encrypt the transmitted data, and the virtualization processing platform is configured to perform virtualization processing on the data.
Preferably, the data transmission module comprises a collection network module, an internet module and a remote monitoring center module, the collection network module is used for collecting data, the internet module is used for transmitting the collected data to the internet, and the remote monitoring center module is used for analyzing the collected data.
Preferably, the collection network module comprises a collection node module and a gateway node module, the collection node module is used for collecting data information, and the gateway node module is used for network maintenance and data processing and transmission.
Preferably, the remote monitoring center module includes a node parameter setting module, a node data processing module and a node data storage module, the node parameter setting module is configured to set parameters for node data acquisition, the node data processing module is configured to analyze data acquired by a node, and the node data storage module is configured to store data acquired by a node.
Preferably, the data encryption module includes a byte transformation module, a row displacement module, a fission hybrid transformation module, a round key addition module and a key expansion module, the byte transformation module is configured to replace data collected by a node, the row displacement module is configured to shift data bytes, the fission hybrid transformation module is configured to perform fission hybrid transformation on the data bytes, the round key addition module is configured to perform round key addition, and the key expansion module is configured to generate a round key.
Preferably, the virtualization processing platform comprises a database, an application server module, a storage module and a switch module, wherein the database is used for establishing the database to process and store data, the application server module is used for calling the processor to process the data, the storage module is used for storing the processed data, and the switch module is used for realizing network communication.
Preferably, the storage module includes a main storage module for storing data, and the backup storage module includes a module for performing backup processing on data.
Preferably, the switch module includes a server access switch module and a fiber switch module, the server access switch module is connected to the virtualization processing platform and the application server module, and the fiber switch module is used for connecting the storage module and the application server module.
In another aspect, a virtualized data remote encryption security method includes any one of the above-mentioned virtualized data remote encryption security systems, and includes the following operation steps:
s1, data transmission: setting a data acquisition standard through a remote monitoring center, acquiring data through an acquisition network module, and transmitting the acquired data to the Internet through an Internet module;
s2, data encryption: during data transmission, data collected by the nodes are replaced through the byte conversion module, the data bytes are shifted through the row shift module, the data bytes are subjected to fission-mixing conversion through the fission-mixing conversion module, and a round key addition step is executed through the round key addition module and a round key addition module;
s3, virtualization processing: the application server module calls the processor to process the data, the storage module stores the processed data, and the switch module realizes network communication.
Compared with the prior art, the invention has the beneficial effects that:
1. in the virtualized data remote encryption safety system and the virtualized data remote encryption method, the data acquisition is realized by adopting the acquisition node module, and meanwhile, the gateway node module is responsible for bidirectional data interactive communication of a ZigBee network and a TCP/IP network, so that the data remote transmission is realized, and the stability of the data transmission is ensured.
2. In the virtualization data remote encryption safety system and the virtualization data remote encryption method, a data encryption module is adopted, and data is encrypted in all aspects through a byte conversion module, a row displacement module, a fission hybrid conversion module, a round key adding module and a key expansion module, so that the safety of data transmission is guaranteed.
3. In the remote encryption safety system and method for the virtualized data, the virtualization technology is adopted, the virtualized processing of the data is realized, the physical hardware is utilized to the maximum extent, and the data running speed is improved.
Drawings
FIG. 1 is a block diagram of the overall structure of the present invention;
FIG. 2 is a schematic diagram of a data transmission module according to the present invention;
FIG. 3 is a schematic diagram of an acquisition network module according to the present invention;
FIG. 4 is a schematic view of a remote monitoring center module according to the present invention;
FIG. 5 is a block diagram of the overall flow of the data transmission module of the present invention;
FIG. 6 is a schematic diagram of a data encryption module according to the present invention;
FIG. 7 is a block diagram of a virtualization processing platform according to the present invention;
FIG. 8 is a schematic view of a storage module according to the present invention;
FIG. 9 is a schematic diagram of a switch module of the present invention;
FIG. 10 is a block diagram of a virtualization processing platform flow according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
In one aspect, the present invention provides a virtualized data remote encryption security system, as shown in fig. 1 to 5, including a data transmission module, a data encryption module, and a virtualization processing platform, where the data transmission module is configured to transmit data remotely, the data encryption module is configured to encrypt the transmitted data, and the virtualization processing platform is configured to virtualize the data.
In this embodiment, the data transmission module includes a collection network module, an internet module and a remote monitoring center module, the collection network module is used for collecting data, the internet module is used for transmitting the collected data to the internet, and the remote monitoring center module is used for analyzing the collected data.
The Internet module is an Internet wide area network, and the Internet adopts a wired access network mode.
Furthermore, the acquisition network module comprises an acquisition node module and a gateway node module, wherein the acquisition node module is used for acquiring data information, and the gateway node module is used for network maintenance and data processing and transmission.
The gateway node module comprises a ZigBee chip and a TCP/IP access network module, and is responsible for bidirectional data interactive communication between a ZigBee network and a TCP/IP network, data collected by the ZigBee network is unpacked by a gateway node according to a ZigBee protocol, and then is packaged into a TCP/IP data packet to be sent to a monitoring center; otherwise, according to the control command sent by the monitoring center, the gateway node firstly carries out TCP/IP protocol unpacking, then the gateway node encapsulates the data into ZigBee protocol data and sends the ZigBee protocol data to the ZigBee network node.
The node collecting module is a ZigBee collecting node and consists of an RFD cluster head node and a gateway, the RFD cluster head node is responsible for collecting and sending data, the RFD cluster head node is responsible for forwarding network data routes, and the gateway realizes data interaction between ZigBee and TCP.
Specifically, the remote monitoring center module comprises a node parameter setting module, a node data processing module and a node data storage module, wherein the node parameter setting module is used for setting parameters for node data acquisition, the node data processing module is used for analyzing data acquired by nodes, and the node data storage module is used for storing data acquired by nodes.
The node data processing module processes the measurement data of each ZigBee acquisition node in the cluster by adopting a batch estimation algorithm, each acquisition node measures multiple groups of consistency measurement data at a certain moment, each acquisition node estimates a fusion value Y close to a measurement true value by adopting a batch estimation algorithm on the weighted average value of the multiple groups of acquired data, so that an accurate measurement result of a measurement value is obtained, and uncertainty caused by node failure or other external factors in the measurement process is eliminated.
Setting a first group of collected measurement data of the same node in the same tree cluster of the collection nodes as follows:
Y11,Y12……Y1n
setting a second group of collected measurement data of the same node in the same tree cluster of the collection nodes as follows:
Y21,Y22......Y2n
the network sensing nodes in the same cluster firstly perform primary data fusion on self data by a batch estimation weighting algorithm respectively, eliminate self data fluctuation errors and provide a reliable data basis for the secondary data fusion in the cluster, wherein the primary data fusion result is as follows:
suppose that each node collects a set of data respectively as Y(1),Y(2).., randomly dividing into two groups,for the respective average of two sets of measured data of the same batchSurgical weight, the respective set of corresponding error criteria is:
the first group is:
the second group is:
carrying out batch estimation weighting on a data group acquired by each ZigBee point to obtain a node measurement fusion value and a variance which are respectively:
Y-=[σ+-)]Y+[σ+HTQ-1]Y=[σ+HTQ-1]Y
in the formula, H is a coefficient matrix of a measurement equation:
whereinAndare respectivelyAndthe arithmetic mean value of each group of collected data, and the final calculated value of the formula is the batch estimation fusion result of the data of the collection point.
Example 2
As a second embodiment of the present invention, in order to facilitate encryption processing on transmitted data, the present invention is further provided with a data encryption module, as shown in fig. 6, as a preferred embodiment, the data encryption module includes a byte transformation module, a row displacement module, a fission-mixture transformation module, a round key adding module and a key expansion module, the byte transformation module is used to replace data collected by the node, the row displacement module is used to shift data bytes, the fission-mixture transformation module is used to perform fission-mixture transformation on the data bytes, the round key adding module is used to perform round key addition, and the key expansion module is used to generate a round key.
In this embodiment, the byte conversion module is an S-box conversion, which is a non-linear conversion, and during calculation, in order to facilitate programming and improve the speed of encryption and decryption, an S-box conversion is usually adopted in an inquiry manner, that is, the S-box is stored in advance, and corresponding data in the S-box is searched according to the original number for replacement.
Further, the row shifting module performs circular left shifting on different rows in the state matrix according to different offsets after completing the byte shifting, wherein usually the first row of the state matrix does not move, the second row moves to the left by one bit, the third row moves to the left by two bits, and the fourth row moves to the left by three bits.
Specifically, the fission-mixing transformation module method is to treat each column of the state matrix as a polynomial on a finite field and then perform modular multiplication with a fixed polynomial.
Wherein, the design changes to:
is F28[x]/(x4+1) reversible polynomial c (x) ═ c0x3+c1x2+c2x+c3Corresponding linear variation, wherein:
example 3
As a third embodiment of the present invention, in order to perform virtualization processing on data, the present invention is further provided with a virtualization processing platform, as shown in fig. 7-10, as a preferred embodiment, the virtualization processing platform includes a database, an application server module, a storage module, and a switch module, where the database is used to establish the database to process and store the data, the application server module is used to call a processor to process the data, the storage module is used to store the processed data, and the switch module is used to implement network communication.
In this embodiment, the database establishment is implemented based on a SQLSever database, which is composed of a set of tables, where the tables include structured data and other objects defined to support operations on the data and guarantee the integrity of the data, such as views, indexes, storage procedures, user-defined functions, triggers, and the like, and the tables are sufficient to form a logical storage structure of the database.
Further, the application server module adopts a virtual machine, the virtual machine is two four-core physical CPUs and 64GB memories, and is configured with two 10-core CPUs, 256GB memories and two 300GB disks.
Specifically, the storage module includes a main storage module for storing data, the backup storage module includes a storage module for performing backup processing on the data, and the storage module is based on an SAN network storage architecture.
The switch module comprises a server access switch module and an optical fiber switch module, the server access switch module is connected with the virtualization processing platform and the application server module, and the optical fiber switch module is used for connecting the storage module and the application server module.
In another aspect, a virtualized data remote encryption security method includes any one of the above virtualized data remote encryption security systems, and includes the following operation steps:
s1, data transmission: setting a data acquisition standard through a remote monitoring center, acquiring data through an acquisition network module, and transmitting the acquired data to the Internet through an Internet module;
s2, data encryption: during data transmission, data collected by the nodes are replaced through the byte conversion module, the data bytes are shifted through the row shift module, the data bytes are subjected to fission-mixing conversion through the fission-mixing conversion module, and a round key addition step is executed through the round key addition module and a round key addition module;
s3, virtualization processing: the application server module calls the processor to process the data, the storage module stores the processed data, and the switch module realizes network communication.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and the preferred embodiments of the present invention are described in the above embodiments and the description, and are not intended to limit the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (9)

1. A virtualization data remote encryption security system comprises a data transmission module, a data encryption module and a virtualization processing platform, and is characterized in that: the data transmission module is used for transmitting data in a long distance, the data encryption module is used for encrypting the transmitted data, and the virtualization processing platform is used for virtualizing the data.
2. The virtualized data remote encryption security system of claim 1 wherein: the data transmission module comprises a collection network module, an Internet module and a remote monitoring center module, the collection network module is used for collecting data, the Internet module is used for transmitting the collected data to the Internet, and the remote monitoring center module is used for analyzing the collected data.
3. The virtualized data remote encryption security system of claim 2 wherein: the acquisition network module comprises an acquisition node module and a gateway node module, wherein the acquisition node module is used for acquiring data information, and the gateway node module is used for network maintenance and data processing and transmission.
4. The virtualized data remote encryption security system of claim 2 wherein: the remote monitoring center module comprises a node parameter setting module, a node data processing module and a node data storage module, wherein the node parameter setting module is used for setting parameters for node data acquisition, the node data processing module is used for analyzing data acquired by nodes, and the node data storage module is used for storing data acquired by nodes.
5. The virtualized data remote encryption security system of claim 1 wherein: the data encryption module comprises a byte transformation module, a row displacement module, a fission hybrid transformation module, a round key adding module and a key expansion module, wherein the byte transformation module is used for replacing data collected by nodes, the row displacement module is used for shifting the data bytes, the fission hybrid transformation module is used for performing fission hybrid transformation on the data bytes, the round key adding module is used for executing round key addition, and the key expansion module is used for generating a round key.
6. The virtualized data remote encryption security system of claim 1 wherein: the virtualization processing platform comprises a database, an application server module, a storage module and a switch module, wherein the database is used for establishing the database to process and store data, the application server module is used for calling a processor to process the data, the storage module is used for storing the processed data, and the switch module is used for realizing network communication.
7. The virtualized data remote encryption security system of claim 6 wherein: the storage module comprises a main storage module used for storing data, and the backup storage module comprises a backup module used for performing backup processing on the data.
8. The virtualized data remote encryption security system of claim 6 wherein: the switch module comprises a server access switch module and an optical fiber switch module, the server access switch module is connected with the virtualization processing platform and the application server module, and the optical fiber switch module is used for connecting the storage module and the application server module.
9. A virtualized data remote encryption security method comprising the virtualized data remote encryption security system of any of claims 1-8, the operational steps of which are as follows:
s1, data transmission: setting a data acquisition standard through a remote monitoring center, acquiring data through an acquisition network module, and transmitting the acquired data to the Internet through an Internet module;
s2, data encryption: during data transmission, data collected by the nodes are replaced through the byte conversion module, the data bytes are shifted through the row shift module, the data bytes are subjected to fission-mixing conversion through the fission-mixing conversion module, and a round key addition step is executed through the round key addition module and a round key addition module;
s3, virtualization processing: the application server module calls the processor to process the data, the storage module stores the processed data, and the switch module realizes network communication.
CN201910890046.8A 2019-09-20 2019-09-20 Virtualization data remote encryption security system and method Active CN110602118B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910890046.8A CN110602118B (en) 2019-09-20 2019-09-20 Virtualization data remote encryption security system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910890046.8A CN110602118B (en) 2019-09-20 2019-09-20 Virtualization data remote encryption security system and method

Publications (2)

Publication Number Publication Date
CN110602118A true CN110602118A (en) 2019-12-20
CN110602118B CN110602118B (en) 2022-04-22

Family

ID=68861432

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910890046.8A Active CN110602118B (en) 2019-09-20 2019-09-20 Virtualization data remote encryption security system and method

Country Status (1)

Country Link
CN (1) CN110602118B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111211890A (en) * 2019-12-31 2020-05-29 江苏省未来网络创新研究院 SDN-based network security defense system and working method thereof
CN112104684A (en) * 2020-02-12 2020-12-18 云池网络科技(上海)有限公司 Platform management system based on Internet of things
CN113672439A (en) * 2021-10-25 2021-11-19 深圳市迪壹六电子有限公司 Loss-preventing pre-backup processing type data storage method for external storage equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223368A (en) * 2011-06-14 2011-10-19 杭州思福迪信息技术有限公司 System and method capable of realizing operation identification during monitoring of remote desktop protocol (RDP)
CN104408374A (en) * 2014-10-17 2015-03-11 武汉华安科技股份有限公司 File encryption method applied to data acquisition workstation
CN104660711A (en) * 2015-03-13 2015-05-27 华存数据信息技术有限公司 Remote visualized application method based on virtualization of graphic processor
CN104991483A (en) * 2015-05-19 2015-10-21 北京宇航系统工程研究所 Test-launch-control remote monitoring platform based on virtualization technology
CN107196932A (en) * 2017-05-18 2017-09-22 北京计算机技术及应用研究所 Managing and control system in a kind of document sets based on virtualization

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223368A (en) * 2011-06-14 2011-10-19 杭州思福迪信息技术有限公司 System and method capable of realizing operation identification during monitoring of remote desktop protocol (RDP)
CN104408374A (en) * 2014-10-17 2015-03-11 武汉华安科技股份有限公司 File encryption method applied to data acquisition workstation
CN104660711A (en) * 2015-03-13 2015-05-27 华存数据信息技术有限公司 Remote visualized application method based on virtualization of graphic processor
CN104991483A (en) * 2015-05-19 2015-10-21 北京宇航系统工程研究所 Test-launch-control remote monitoring platform based on virtualization technology
CN107196932A (en) * 2017-05-18 2017-09-22 北京计算机技术及应用研究所 Managing and control system in a kind of document sets based on virtualization

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
容典: ""数据远程采集系统的设计与实现"", 《中国优秀硕士学位论文全文数据库》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111211890A (en) * 2019-12-31 2020-05-29 江苏省未来网络创新研究院 SDN-based network security defense system and working method thereof
CN112104684A (en) * 2020-02-12 2020-12-18 云池网络科技(上海)有限公司 Platform management system based on Internet of things
CN113672439A (en) * 2021-10-25 2021-11-19 深圳市迪壹六电子有限公司 Loss-preventing pre-backup processing type data storage method for external storage equipment
CN113672439B (en) * 2021-10-25 2022-03-01 深圳市迪壹六电子有限公司 Loss-preventing pre-backup processing type data storage method for external storage equipment

Also Published As

Publication number Publication date
CN110602118B (en) 2022-04-22

Similar Documents

Publication Publication Date Title
CN110602118B (en) Virtualization data remote encryption security system and method
US9183033B2 (en) Method and system for analyzing root causes of relating performance issues among virtual machines to physical machines
CN105683918B (en) Centralized networking configuration in distributed systems
CN108351823A (en) It realizes and automatically switches
CN112134741A (en) Client-directed networking restrictions in distributed systems
CN110457190A (en) A kind of full link monitoring method, apparatus and system based on block chain
US20080089336A1 (en) Location of a probe algorithm
CN116389365B (en) Switch data processing method and system
CN110457929A (en) The sharing method and system of isomery HIS big data real-time encryption and decryption compression cochain
CN109729073B (en) Network anomaly identification method and system in power grid information physical system
CN105025063A (en) Online data transmission method for large-scale terminal equipment
Terdik et al. Advances and practice in Internet of Things
Liu et al. Scalability of network-failure resilience: Analysis using multi-layer probabilistic graphical models
CN116015983B (en) Network security vulnerability analysis method and system based on digital twin
Lin et al. Security function virtualization based moving target defense of SDN-enabled smart grid
CN114745616B (en) Underground heat information remote monitoring and early warning system and method
Lu et al. A study on the reliability of software defined wireless sensor network
KR20140110566A (en) Unified platform architecture system for volcanic disaster prevention
CN104717176B (en) A kind of authority control method, system and server
CN110224872A (en) A kind of communication means, device and storage medium
Chou et al. Implementation of mobile-agent-based network management systems for national broadband experimental networks in Taiwan
CN110061886B (en) Prepress network management system based on SNMP
TW201832094A (en) Software-defined storage apparatus, system, and storage method
CN116684303B (en) Digital twinning-based data center operation and maintenance method and system
CN206585591U (en) Software definition storage device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220323

Address after: Room 1947, hatching Eagle building, No. 99, Tuanjie Road, yanchuangyuan, Nanjing, Jiangsu 210000

Applicant after: Nanjing Xinyida Computing Technology Co.,Ltd.

Address before: 210000 No.7, building 35, yanjiangyuan, Gulou District, Nanjing City, Jiangsu Province

Applicant before: NANJING XINTONGCHENG INFORMATION TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant