CN111683053B - Cloud platform security network architecture - Google Patents

Cloud platform security network architecture Download PDF

Info

Publication number
CN111683053B
CN111683053B CN202010402712.1A CN202010402712A CN111683053B CN 111683053 B CN111683053 B CN 111683053B CN 202010402712 A CN202010402712 A CN 202010402712A CN 111683053 B CN111683053 B CN 111683053B
Authority
CN
China
Prior art keywords
cloud platform
security
machine
user
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010402712.1A
Other languages
Chinese (zh)
Other versions
CN111683053A (en
Inventor
辛雨
原诚寅
邹广才
杜海龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing National New Energy Vehicle Technology Innovation Center Co Ltd
Original Assignee
Beijing National New Energy Vehicle Technology Innovation Center Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing National New Energy Vehicle Technology Innovation Center Co Ltd filed Critical Beijing National New Energy Vehicle Technology Innovation Center Co Ltd
Priority to CN202010402712.1A priority Critical patent/CN111683053B/en
Publication of CN111683053A publication Critical patent/CN111683053A/en
Application granted granted Critical
Publication of CN111683053B publication Critical patent/CN111683053B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Abstract

The embodiment of the disclosure discloses a cloud platform security network architecture, which comprises: a cloud platform security machine and a cloud platform; the cloud platform security machine is connected with the cloud platform, and data transmitted to the cloud platform security machine by the cloud platform needs to be subjected to security verification; the cloud platform transmits the extracted key data to a cloud platform security machine for backup; and the cloud platform carries out security verification on all received user operations, executes the user operations passing the security verification, and does not execute the user operations failing the security verification. By arranging the cloud platform security machine, the cloud platform security machine is isolated from a cloud platform on physical hardware and software architecture and interacts with the cloud platform through a special interaction port; the cloud platform safety related control is taken over by the cloud platform safety machine, and even if the risk of the cloud platform is broken, the cloud platform safety machine still has the safety protection capability due to relative isolation with the cloud platform. Therefore, the purpose of improving the safety of the cloud platform is achieved.

Description

Cloud platform security network architecture
Technical Field
The present disclosure belongs to the technical field of cloud platforms, and more particularly, to a cloud platform security network architecture.
Background
In the past decade, with the popularization of cloud computing, more and more enterprises migrate their own IT systems and office networks to the cloud. With the popularization of the 5G technology, the digitalization process of automobiles or other industrial enterprises is promoted, and more enterprises are expected to be developed, designed, simulated and verified to migrate to the cloud in the next decade, so that a central computer can be connected anytime and anywhere to carry out design simulation work; or the automobile part supplier can be connected through a network and directly go to a central computer of the whole automobile factory for data checking and design simulation.
In the past, the whole car factory generally adopts an independent intranet office mode to ensure the safety and confidentiality of data; when an external network login is required, a VPN login mode is generally adopted. VPNs are a boundary-based security model, where internal employees are considered trusted and external employees are not. With the popularization of the cloud design simulation platform, risks in various aspects such as users, software, data and the like are brought in the operation process of the platform due to the fact that the external network and the internal network are connected and a large amount of data are transmitted at the same time.
With the development of cloud platforms, security issues are valued. In the currently designed cloud platform architecture, the security policy is performed in a relatively traditional manner of applying and issuing a security certificate, and the manner considers that the user with the certificate is trusted, so that the user with the certificate may perform illegal operation to bring a risk problem or the certificate may be brute force to break.
In the currently designed cloud platform architecture, a security policy is designed by adopting a design intermediate layer and adding a security middleware, for example, by adopting TPM2.0 as a root of trust in an IaaS layer of a cloud platform, security management and trust judgment are added to manage, distinguish and isolate trusted users and untrusted users. The architecture also has the problems that a trusted user may have illegal behaviors and the isolation layer is cracked.
In order to solve the security problem, part of enterprises use a traditional physical isolation mode to establish an enterprise or group level private cloud system, and the physical isolation mode better isolates the access of external public users on one hand, but also has the problem of security control on internal users of the private cloud. The internal control strategy of the private cloud uses a security control strategy table to control access of MAC addresses, IP addresses and other modes, users in the approved strategy table are safe and reliable, and users outside the strategy table are not trusted, so that the differentiation of the users also has the problems of other control strategies.
And a scheme for directly using a cloud management platform layer to perform security management is also provided. The cloud management software carries out various management on the cloud platform, and the safety management scheme has the advantage of high integration level, but the problems that the safety performance is insufficient, the relevance of a security hole and the cloud platform is high, the security hole is easy to be broken from other angles and the like due to the design limitation of the cloud platform exist. In the safety management scheme, because the original design framework of the cloud platform is adopted, the design loophole of the cloud platform can become one of loopholes of the safety management scheme.
In summary, in the prior art, VPN login, certificate application and authentication, IP address and MAP address based, user management and the like are all boundary-based security technologies, and generally, after one-time authorization, user behavior control is limited, which brings security risk. In addition, private cloud or traditional VPN login mode artificially separates the internal network and the external network from hardware, but actually data interaction between the internal network and the external network cannot be avoided. In the process, on one hand, the extranet user can deal with various security problems and attacks on the network, on the other hand, the intranet has weak control on the security problems, and once viruses are infected through the intranet and extranet interaction process, a large security accident is easily caused.
Disclosure of Invention
In view of this, the embodiment of the present disclosure provides a cloud platform secure network architecture, which at least solves the problem of potential safety hazard in the prior art.
The embodiment of the present disclosure provides a cloud platform security network architecture, including: a cloud platform security machine and a cloud platform;
the cloud platform safety machine and the cloud platform are two sets of independent hardware and software systems, the functions of the cloud platform safety machine are independently realized by hardware and software of the cloud platform safety machine, the functions of the cloud platform are independently realized by hardware and software of the cloud platform, the platform safety machine and the cloud platform interact through a special interaction port, and data transmitted to the cloud platform safety machine by the cloud platform through the interaction port needs to be subjected to safety verification;
the cloud platform transmits the extracted key data to a cloud platform security machine for backup;
and the cloud platform carries out security verification on all received user operations, executes the user operations passing the security verification, and does not execute the user operations failing the security verification.
Optionally, before receiving the user operation, the cloud platform performs security verification on the identity and the authority of the user.
Optionally, the cloud platform security machine includes:
security policy repository: the system comprises a cloud platform security machine, a data processing system and a data processing system, wherein the cloud platform security machine is used for carrying out security verification on data transmitted to the cloud platform security machine by a cloud platform;
a user database: for storing user data that passes the security authentication;
software database: the software data is used for storing the software data which passes the security verification;
resource database: for storing the resource data that passes the security authentication.
Optionally, the cloud platform security machine further includes:
maintaining and updating the interface: the method is used for maintaining and updating the cloud platform security machine.
Optionally, the cloud platform includes:
the cloud platform security machine comprises a physical resource layer, a resource management layer, an application management layer and a user management layer, wherein the physical resource layer, the resource management layer, the application management layer and the user management layer are all used for interacting data with the cloud platform security machine.
Optionally, the physical resource layer includes:
a computing server, a storage server and a network server.
Optionally, the resource management layer includes:
the system comprises a resource virtualization management module, a resource scheduling management module, a resource state monitoring module and a cloud platform operating system.
Optionally, the application management layer includes:
the software login authentication management module, the software configuration management module and the software input/output management module.
Optionally, the user management layer includes:
the system comprises a user login authentication management module, a user authority authentication management module and a user data management module.
Optionally, the hardware protection capability of the cloud platform security machine is stronger than that of the cloud platform.
The cloud platform security machine is isolated from a cloud platform on physical hardware and software architecture and interacts with the cloud platform through a special interaction port; the cloud platform safety related control is taken over by the cloud platform safety machine, and even if the risk of the cloud platform is broken, the cloud platform safety machine still has the safety protection capability due to relative isolation with the cloud platform. The key data of the cloud platform are stored in the cloud platform security machine, if the core data of a user is stored in the cloud platform security machine, the key data are physically isolated from the running of cloud platform software, compared with a complete cloud platform framework of software, data and management, the cloud platform security machine is safer, and even if the cloud platform is infected by viruses, the user data are still protected in the cloud platform security machine. In addition, the method and the system perform security confirmation on each key execution step of the user, such as user login confirmation, user access existing data confirmation, user software installation confirmation and the like, and modify existing data confirmation and the like, so that the security performance of the cloud platform is greatly enhanced by each step of confirmation mode. Therefore, the purpose of improving the safety of the cloud platform is achieved.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent by describing in greater detail exemplary embodiments thereof with reference to the attached drawings, in which like reference numerals generally represent like parts throughout.
Fig. 1 shows a structural schematic diagram of a cloud platform security network architecture according to one embodiment of the present disclosure.
Detailed Description
Preferred embodiments of the present disclosure will be described in more detail below. While the following describes preferred embodiments of the present disclosure, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein.
A cloud platform security network architecture, comprising: a cloud platform security machine and a cloud platform;
the cloud platform safety machine and the cloud platform are two sets of independent hardware and software systems, the functions of the cloud platform safety machine are realized independently by the hardware and the software of the cloud platform safety machine, the functions of the cloud platform are realized independently by the hardware and the software of the cloud platform, the platform safety machine and the cloud platform are interacted through a special interaction port, and data transmitted to the cloud platform safety machine by the cloud platform through the interaction port needs to be subjected to safety verification;
the cloud platform transmits the extracted key data to a cloud platform security machine for backup;
and the cloud platform carries out security verification on all received user operations, executes the user operations passing the security verification, and does not execute the user operations failing the security verification.
The cloud platform safety machine and the cloud platform are two sets of independent hardware and software systems, the functions of the cloud platform safety machine are independently realized by the hardware and the software of the cloud platform safety machine, the functions of the cloud platform are independently realized by the hardware and the software of the cloud platform, and the platform safety machine and the cloud platform are interacted through a special interaction port;
namely, the cloud platform security machine and the cloud platform are two independent hardware systems, the function of the cloud platform security machine is realized by the hardware of the cloud platform security machine, and the function of the cloud platform is realized by the hardware of the cloud platform. The platform security machine and the cloud platform interact through a special interaction port. The data transmitted to the cloud platform security machine by the cloud platform can be received by the cloud platform security machine only through security verification, if the data in the cloud platform security machine needs to be read, the cloud platform security machine needs to access the identity of a user of the cloud platform security machine for verification, the user who does not pass the security verification instructs the cloud platform security machine not to receive, the data reading instruction sent by the user who passes the security verification also needs to be subjected to the security verification, after the security verification of the data reading instruction passes, the cloud platform security machine receives the instruction and executes the instruction so as to read corresponding data, the cloud platform security machine carries out the security verification on the received data, and the received data comprises instruction data, content data and the like.
Optionally, before receiving the user operation, the cloud platform performs security verification on the identity and the authority of the user.
The cloud platform executes the instructions of the users which are subjected to the security verification, and does not execute the instructions of the users which are not subjected to the security verification.
Optionally, the cloud platform security machine includes:
a security policy library: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for carrying out security verification on data transmitted to a cloud platform security machine by a cloud platform;
a user database: for storing user data that passes the security authentication;
software database: the software data is used for storing the software data which passes the security verification;
resource database: for storing the resource data that passes the security authentication.
Optionally, the cloud platform security machine further includes:
maintaining and updating the interface: the method is used for maintaining and updating the cloud platform security machine.
Optionally, the cloud platform includes:
the cloud platform security machine comprises a physical resource layer, a resource management layer, an application management layer and a user management layer, wherein the physical resource layer, the resource management layer, the application management layer and the user management layer are all used for interacting data with the cloud platform security machine.
Optionally, the physical resource layer includes:
a computing server, a storage server and a network server.
Optionally, the resource management layer includes:
the system comprises a resource virtualization management module, a resource scheduling management module, a resource state monitoring module and a cloud platform operating system.
Optionally, the application management layer includes:
the software login authentication management module, the software configuration management module and the software input/output management module.
Optionally, the user management layer includes:
the system comprises a user login authentication management module, a user authority authentication management module and a user data management module.
Optionally, the hardware protection capability of the cloud platform security machine is stronger than that of the cloud platform.
The safety control architecture is suitable for a cloud-end central design simulation platform, solves the problem of operation safety of the cloud-end design simulation platform, and provides technical support and safety guarantee for the platform.
Based on a zero-trust security control strategy, the cloud platform does not automatically trust any person/thing inside or outside, verifies any person/thing trying to access the system before authorization, and supervises user behavior after authorization; performing multi-layer protection by physically isolating the final sensitive data from the security machine and the cloud platform; on one hand, the method brings better control to the overall safety performance of the designed simulation cloud platform, on the other hand, the safety problem brought by internal and external network transmission is also eliminated, and the method is a very good solution to the design of the simulation cloud platform.
As shown in fig. 1, the zero-trust cloud platform security network architecture is composed of a physical resource layer, a resource management layer, an application management layer, a user management layer, a cloud platform security machine, and the like. The cloud platform security machine comprises a security policy base, a user database, a software database, a resource database and a security machine maintenance and updating interface.
The design simulation cloud platform comprises a physical resource layer, a resource management layer, an application management layer, a user management layer and a cloud platform security machine. The cloud platform security machine is arranged in free security machine hardware, is isolated from the physical resource layer and interacts with the physical resource layer through a security policy library and an interface; the maintenance of the cloud platform security machine hardware is carried out through a single security machine maintenance and updating interface, and is different from a physical resource layer of the cloud platform hardware; the hardware security of the cloud platform security machine has protection capability.
When a simulation cloud platform is designed to run, whether a user management layer performs user login verification, user authority allocation or user data management, whether an application management layer performs software login, software configuration or software input and output data, or whether a resource management layer performs cloud platform operation, resource virtualization, resource scheduling or resource monitoring and display and the like, the user management layer needs to perform security supervision through a security policy library and interact with a user database, a software database or a resource database; in this way, the data and software operation and interaction process of the cloud platform has the data and software security protection capability. And the external maintenance and the external update of the related data, software, resources and security policies of the cloud platform are carried out through a proprietary interface, and the maintenance and the update process of the cloud platform also have the security protection capability.
The foregoing description of the embodiments of the present disclosure has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments.

Claims (7)

1. A cloud platform security network architecture, comprising: a cloud platform security machine and a cloud platform;
the cloud platform safety machine and the cloud platform are two sets of independent hardware and software systems, the functions of the cloud platform safety machine are independently realized by hardware and software of the cloud platform safety machine, the functions of the cloud platform are independently realized by hardware and software of the cloud platform, the platform safety machine and the cloud platform interact through a special interaction port, and data transmitted to the cloud platform safety machine by the cloud platform through the interaction port needs to be subjected to safety verification;
the cloud platform transmits the extracted key data to a cloud platform security machine for backup;
the cloud platform carries out security verification on all received user operations, executes user operations passing the security verification, and does not execute user operations failing the security verification;
cloud platform security machine includes:
a security policy library: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for carrying out security verification on data transmitted to a cloud platform security machine by a cloud platform;
a user database: for storing user data that passes the security authentication;
software database: the software data is used for storing the software data which passes the security verification;
resource database: the system is used for storing the resource data which passes the security verification;
cloud platform safety machine still includes:
maintaining and updating the interface: the cloud platform security machine is used for maintaining and updating the cloud platform security machine;
the hardware protection capability of the cloud platform security machine is stronger than that of the cloud platform.
2. The cloud platform secure network architecture of claim 1,
and before receiving the user operation, the cloud platform carries out security verification on the identity and the authority of the user.
3. The cloud platform secure network architecture of claim 1, wherein the cloud platform comprises:
the cloud platform security machine comprises a physical resource layer, a resource management layer, an application management layer and a user management layer, wherein the physical resource layer, the resource management layer, the application management layer and the user management layer are all used for interacting data with the cloud platform security machine.
4. The cloud platform secure network architecture of claim 3, wherein the physical resource layer comprises:
a computing server, a storage server and a network server.
5. The cloud platform secure network architecture of claim 3, wherein the resource management layer comprises:
the system comprises a resource virtualization management module, a resource scheduling management module, a resource state monitoring module and a cloud platform operating system.
6. The cloud platform security network architecture of claim 3, wherein the application management layer comprises:
the system comprises a software login authentication management module, a software configuration management module and a software input/output management module.
7. The cloud platform security network architecture of claim 3, wherein the user management layer comprises:
the system comprises a user login authentication management module, a user authority authentication management module and a user data management module.
CN202010402712.1A 2020-05-13 2020-05-13 Cloud platform security network architecture Active CN111683053B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010402712.1A CN111683053B (en) 2020-05-13 2020-05-13 Cloud platform security network architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010402712.1A CN111683053B (en) 2020-05-13 2020-05-13 Cloud platform security network architecture

Publications (2)

Publication Number Publication Date
CN111683053A CN111683053A (en) 2020-09-18
CN111683053B true CN111683053B (en) 2022-08-23

Family

ID=72433519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010402712.1A Active CN111683053B (en) 2020-05-13 2020-05-13 Cloud platform security network architecture

Country Status (1)

Country Link
CN (1) CN111683053B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102982408A (en) * 2012-11-05 2013-03-20 中国电力科学研究院 Large-scale electric car operation monitoring platform based on cloud computing
CN103747076A (en) * 2013-12-31 2014-04-23 曙光云计算技术有限公司 Cloud platform access method and device
CN104125251A (en) * 2013-04-26 2014-10-29 华茂云天科技(北京)有限公司 Virtualization technology-based cloud computing security terminal
CN105430000A (en) * 2015-12-17 2016-03-23 北京华油信通科技有限公司 Cloud computing security management system
CN107888613A (en) * 2017-11-30 2018-04-06 广东电网有限责任公司电力科学研究院 A kind of management system framework based on cloud platform
CN109714344A (en) * 2018-12-28 2019-05-03 国汽(北京)智能网联汽车研究院有限公司 Intelligent network based on " end-pipe-cloud " joins automobile information security platform

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102982408A (en) * 2012-11-05 2013-03-20 中国电力科学研究院 Large-scale electric car operation monitoring platform based on cloud computing
CN104125251A (en) * 2013-04-26 2014-10-29 华茂云天科技(北京)有限公司 Virtualization technology-based cloud computing security terminal
CN103747076A (en) * 2013-12-31 2014-04-23 曙光云计算技术有限公司 Cloud platform access method and device
CN105430000A (en) * 2015-12-17 2016-03-23 北京华油信通科技有限公司 Cloud computing security management system
CN107888613A (en) * 2017-11-30 2018-04-06 广东电网有限责任公司电力科学研究院 A kind of management system framework based on cloud platform
CN109714344A (en) * 2018-12-28 2019-05-03 国汽(北京)智能网联汽车研究院有限公司 Intelligent network based on " end-pipe-cloud " joins automobile information security platform

Also Published As

Publication number Publication date
CN111683053A (en) 2020-09-18

Similar Documents

Publication Publication Date Title
CN100568212C (en) Shielding system and partition method
EP2620893B1 (en) Role-based access control permissions
US20080005798A1 (en) Hardware platform authentication and multi-purpose validation
CN104320389A (en) Fusion identify protection system and fusion identify protection method based on cloud computing
WO2023159994A1 (en) Operation and maintenance processing method, and terminal device
CN110764871A (en) Cloud platform-based mimicry application packaging and control system and method
CN110012016B (en) Method and system for controlling resource access in hybrid cloud environment
CN109936555A (en) A kind of date storage method based on cloud platform, apparatus and system
CN113596009A (en) Zero trust access method, system, zero trust security proxy, terminal and medium
US8713640B2 (en) System and method for logical separation of a server by using client virtualization
CN112446029A (en) Trusted computing platform
US20200145420A1 (en) Processing System For Providing Console Access To A Cyber Range Virtual Environment
Yan et al. The research and design of cloud computing security framework
CN111683053B (en) Cloud platform security network architecture
CN112667998A (en) Safe access method and system for container mirror image warehouse
CN105120010B (en) A kind of virtual machine Anti-theft method under cloud environment
CN105790935A (en) Independent-software-and-hardware-technology-based trusted authentication server
US20220107834A1 (en) Task engine
Tang The Research on Cloud computing security model and Countermeasures
CN113407941A (en) Edge cloud node and terminal user security management method
CN105653928A (en) Service denial detection method for large data platform
Sun A Security Reinforcement Method for Intranet Computer Terminal
EP3901799A1 (en) Systems and methods for remote anomaly data scanner for cyber-physical systems
KR102444356B1 (en) Security-enhanced intranet connecting method and system
US20210103656A1 (en) Method and apparatus using virtual isolation layer in data security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100176 floor 10, building 1, zone 2, yard 9, Taihe 3rd Street, Beijing Economic and Technological Development Zone, Daxing District, Beijing

Applicant after: Beijing National New Energy Vehicle Technology Innovation Center Co.,Ltd.

Address before: 102600 1705, block a, building 1, No. 10, Ronghua Middle Road, Beijing Economic and Technological Development Zone, Daxing District, Beijing

Applicant before: BEIJING NEW ENERGY VEHICLE TECHNOLOGY INNOVATION CENTER Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant