CN112035832B - Method and system for monitoring file activities - Google Patents

Method and system for monitoring file activities Download PDF

Info

Publication number
CN112035832B
CN112035832B CN202010849941.8A CN202010849941A CN112035832B CN 112035832 B CN112035832 B CN 112035832B CN 202010849941 A CN202010849941 A CN 202010849941A CN 112035832 B CN112035832 B CN 112035832B
Authority
CN
China
Prior art keywords
file
monitoring
full path
path name
ntsetinformation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010849941.8A
Other languages
Chinese (zh)
Other versions
CN112035832A (en
Inventor
宋志成
韩金池
郭鹏玉
马盼盼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Xinda Jiean Information Technology Co Ltd
Original Assignee
Zhengzhou Xinda Jiean Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Xinda Jiean Information Technology Co Ltd filed Critical Zhengzhou Xinda Jiean Information Technology Co Ltd
Priority to CN202010849941.8A priority Critical patent/CN112035832B/en
Publication of CN112035832A publication Critical patent/CN112035832A/en
Application granted granted Critical
Publication of CN112035832B publication Critical patent/CN112035832B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a method and a system for monitoring file activities, wherein the method comprises the steps of monitoring the operation of a file NtSetinformation, and transmitting the full path name of a file object of the operation of the current file NtSetinformation to a PresetInfoOperCallback completion function according to the subtype of the operation of the current file NtSetinformation; judging the file activity type according to the message parameters in the PresetInfoOperCallback completion function and the full pathname of the file object; and finally, reporting the judged file activity type and file information to monitoring software of an application layer. The invention realizes the monitoring of the file activity based on the callback function in the IRP request, judges the file activity type, and reports the file activity type and the file information to the monitoring software of the application layer, so that a manager can conveniently trace the operation record of the related file by looking up the monitoring software, the randomness of the file operation of a user is further limited, and the management system of the file operation is perfected.

Description

Method and system for monitoring file activities
Technical Field
The invention relates to the technical field of data security, in particular to a method and a system for monitoring file activities.
Background
In the information-oriented society, ensuring data security has become a common consensus. Data security is increasingly invested in individuals, businesses, and governments. The file on the computer as one of the data carriers is undoubtedly also an important protection object for data security. Many dlp (data Leak protection) products also have eighteen ideas on file protection, but all are based on application-level monitoring, are easily forced to end, and are prone to missing monitoring of file activities.
Disclosure of Invention
In order to solve the above problems, it is necessary to provide a method and a system for monitoring file activities, so as to monitor file activities such as cutting, deleting, renaming, and the like.
The invention provides a method for monitoring file activities in a first aspect, which comprises the following steps:
step 1, starting file activity monitoring;
step 2, monitoring the operation of the NtSetinformation, and transmitting the full path name of the file object of the operation of the NtSetinformation of the current file to a PreseInfoOperCallback completion function according to the subtype of the operation of the NtSetinformation of the current file;
step 2-1, monitoring operation of the NtSetinformation, judging whether the operation subtype of the operation of the NtSetinformation of the current file is FileDisposition information according to the message parameter of the operation of the NtSetinformation of the current file, and if so, entering step 2-2; if not, further judging whether the operation subtype of the operation of the current file NtSetinformation is FileRenameInformation, if so, entering the step 2-4; otherwise, ending the file activity monitoring;
step 2-2, judging whether the operation is deleting to a recycle bin or not according to the identification value of the current file NtSetinformation operation, if so, ending the file activity monitoring process, regenerating a new IRP request aiming at the file object, setting the sub-type of the file NtSetinformation operation of the new IRP request as FileRenameInformation, then executing the step 2-1 again, and if not, entering the step 2-3;
step 2-3, acquiring the full path name of the current file object, judging whether the file is in the monitoring list or not based on the full path name of the current file object, and if so, transmitting the full path name of the current file object into a PresetInfoOperCallback completion function; if not, ending the file activity monitoring;
step 2-4, acquiring the full path name of the current file object, judging whether the file is in the monitoring list or not based on the full path name of the current file object, if so, acquiring the full path name of the target file object, and transmitting the full path name of the current file object and the full path name of the target file object into a PresetInfoOperCallback completion function; if not, ending the file activity monitoring;
step 3, judging the file activity type according to the message parameters in the PreSetInfoOperCallback completion function and the full pathname of the file object;
step 3-1, in the PresetInfoOperCallback completion function, judging whether the operation subtype of the current file NtSetinformation operation is FileDispositioninformation according to the message parameters, if so, entering step 3-2, otherwise, entering step 3-3;
step 3-2, judging whether the file deleting operation result is successful, if so, judging that the file activity type is deleting operation, and if not, ending the monitoring;
3-3, judging whether the full path name of the target file object conflicts with the full path name names of other files in the current folder, if so, ending the file activity monitoring process, and if not, entering the step 3-4;
step 3-4, judging whether the full path name of the target file object contains the mark information of the recycle bin, \ $ recycle. BIN \ or not, if so, judging that the file activity type is the recycle bin operation, and if not, entering step 3-5;
step 3-5, judging whether the full path name of the current file object and the full path name of the target file object are in the same directory, if so, judging that the file activity type is renaming operation, and if not, judging that the file activity type is cutting operation;
and 4, reporting the judged file activity type and the file information to monitoring software of an application layer.
The second aspect of the present invention further provides a system for monitoring file activities, including: the monitoring method comprises the following steps of a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the program to realize the steps of the monitoring method for the file activity.
Further, the system uses a minifilter file filtering framework to extract and identify file activity features in a callback function of the minifilter file filtering framework, and reports file activity information to monitoring software of an application layer.
The third aspect of the present invention also provides a computer-readable storage medium, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the steps of the file activity monitoring method are implemented as described above.
The invention monitors the operation of the IRP request related to the FileDisposition information or FileRenameinformation by monitoring the file NtSetinformation function of the IRP request, and then further judges the file activity type based on the message parameter in the corresponding callback function and the full path name of the file object, thereby realizing the monitoring of the file activity types such as deletion operation, recycle bin operation, renaming operation or cutting operation, solving the problem that the recycle bin operation is skipped due to system crash caused by hanging the recycle bin in the traditional file activity monitoring process, and having accurate monitoring result; in addition, because the monitoring of the file activities occurs in the kernel layer, the monitoring activities cannot be forcibly ended, and the monitoring of all types of file activities can be realized;
the invention further filters the file activities which cannot be completed by detecting whether the renaming conflict exists or not, reduces the influence of the file activities which cannot be completed on the monitoring result, and also reduces the memory waste caused by judging the activity type of the file activities which cannot be completed.
The invention further reports the file activity type and the file information which are judged and obtained by the kernel layer to the monitoring software of the application layer, so that a manager can conveniently trace the operation record of the related file by looking up the monitoring software, the randomness of the file operation of the user is further limited, and the management system of the file operation is perfected.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a flow chart illustrating a method of monitoring file activity in accordance with the present invention;
FIG. 2 illustrates a flow chart of the present invention for forming a completion function;
FIG. 3 illustrates a flow chart of the present invention for determining the type of file activity.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
Fig. 1 shows a flow chart of a method for monitoring file activity according to the invention.
As shown in fig. 1, a first aspect of the present invention provides a method for monitoring file activities, including the following steps:
step 1, starting file activity monitoring;
step 2, monitoring the operation of the NtSetinformation, and transmitting the full path name of the file object of the operation of the NtSetinformation of the current file to a PreseInfoOperCallback completion function according to the subtype of the operation of the NtSetinformation of the current file;
step 3, judging the file activity type according to the message parameters in the PreSetInfoOperCallback completion function and the full pathname of the file object;
and 4, reporting the judged file activity type and the file information to monitoring software of an application layer.
In step 2, the preset monitoring list is set in advance for the user or the administrator, and the preset monitoring list may be set based on the drive letter, for example, if the administrator needs to monitor the file of the C drive, the administrator determines whether the file is in the C drive based on the drive letter information in the initial full path name of the file, and if so, the file falls into the preset monitoring list, and if not, the file does not fall into the preset monitoring list.
As shown in fig. 2, the step 2 specifically includes:
the step 2 specifically includes:
step 2-1, monitoring operation of the NtSetinformation, judging whether the operation subtype of the operation of the NtSetinformation of the current file is FileDisposition information according to the message parameter of the operation of the NtSetinformation of the current file, and if so, entering step 2-2; if not, further judging whether the operation subtype of the operation of the current file NtSetinformation is FileRenameInformation, if so, entering the step 2-4; otherwise, ending the file activity monitoring;
step 2-2, judging whether the operation is deleting to a recycle bin or not according to the identification value of the current file NtSetinformation operation, if so, ending the file activity monitoring process, regenerating a new IRP request aiming at the file object, setting the sub-type of the file NtSetinformation operation of the new IRP request as FileRenameInformation, then executing the step 2-1 again, and if not, entering the step 2-3;
step 2-3, acquiring the full path name of the current file object, judging whether the file is in the monitoring list or not based on the full path name of the current file object, and if so, transmitting the full path name of the current file object into a PresetInfoOperCallback completion function; if not, ending the file activity monitoring;
step 2-4, acquiring the full path name of the current file object, judging whether the file is in the monitoring list or not based on the full path name of the current file object, if so, acquiring the full path name of the target file object, and transmitting the full path name of the current file object and the full path name of the target file object into a PresetInfoOperCallback completion function; if not, ending the file activity monitoring.
It can be understood that, for the operation of deleting a file to the recycle bin, two types of monitoring flows of the NtSetInformation IRP are actually involved, first, a first type of NtSetInformation IRP request is generated by the system, the subtype is filedispositioning information, that is, step 2-1 is entered, at this time, it is further determined whether the file is deleted to the recycle bin, and if so, the monitoring flow of the subtype IRP request is directly ended. Then, the system generates a second type NtSetInformation IRP request based on the file, and if the subtype is FileRenameInformation, the step 2-1 is re-entered.
As shown in fig. 3, in step 3-1, in the presettifoopercallback completion function, judging whether the operation subtype of the current file NtSetInformation operation is filedisposition information according to the message parameter, if so, entering step 3-2, otherwise, entering step 3-3;
step 3-2, judging whether the file deleting operation result is successful, if so, judging that the file activity type is deleting operation, and if not, ending the monitoring;
3-3, judging whether the full path name of the target file object conflicts with the full path name names of other files in the current folder, if so, ending the file activity monitoring process, and if not, entering the step 3-4; specifically, when the full path name of the target file object is consistent with the full path names of other files, the target file object is determined as a naming conflict;
step 3-4, judging whether the full path name of the target file object contains the mark information of the recycle bin, \ $ recycle. BIN \ or not, if so, judging that the file activity type is the recycle bin operation, and if not, entering step 3-5;
and 3-5, judging whether the full path name of the current file object and the full path name of the target file object are in the same directory, if so, judging that the file activity type is renaming operation, and if not, judging that the file activity type is cutting operation.
According to an embodiment of the present invention, the types of the files include at least a file and a folder.
The invention monitors the operation of the IRP request related to the FileDisposition information or FileRenameinformation by monitoring the file NtSetinformation function of the IRP request, and then further judges the file activity type based on the message parameter in the corresponding callback function and the full path name of the file object, thereby realizing the monitoring of the file activity types such as deletion operation, recycle bin operation, renaming operation or cutting operation, solving the problem that the recycle bin operation is skipped due to system crash caused by hanging the recycle bin in the traditional file activity monitoring process, and having accurate monitoring result; in addition, because the monitoring of the file activities occurs in the kernel layer, the monitoring activities cannot be forcibly ended, and all types of file activities can be monitored;
the invention further filters the file activities which cannot be completed by detecting whether the renaming conflict exists or not, reduces the influence of the file activities which cannot be completed on the monitoring result, and also reduces the memory waste caused by judging the activity type of the file activities which cannot be completed.
The invention further reports the file activity type and the file information which are judged and obtained by the kernel layer to the monitoring software of the application layer, so that a manager can conveniently trace the operation record of the related file by looking up the monitoring software, the randomness of the file operation of the user is further limited, and the management system of the file operation is perfected.
The second aspect of the present invention further provides a system for monitoring file activities, including: the monitoring method comprises the following steps of a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the program to realize the steps of the monitoring method for the file activity.
Further, the system uses a minifilter file filtering framework to extract and identify file activity features in a callback function of the minifilter file filtering framework, and reports file activity information to monitoring software of an application layer.
Specifically, the file activities monitored by the method mainly comprise deletion operation, recycle bin operation, renaming operation and cutting operation.
The third aspect of the present invention further provides a computer-readable storage medium, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the steps of the method for monitoring file activities as described above are implemented.
The method monitors the operation of the IRP request related to the FileDisposition information or FileRenameinformation by monitoring the file NtSetinformation function of the IRP request, and then further judges the file activity type based on the message parameter in the corresponding callback function and the full path name of the file object, thereby realizing the monitoring of the file activity types such as deletion operation, recycle bin operation, renaming operation or cutting operation and the like; and then reporting the acquired file activity type and file information to monitoring software of an application layer, so that management personnel can conveniently trace operation records of related files by looking up the monitoring software, the randomness of the file operation of a user is further limited, and a management system of the file operation is perfected.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (6)

1. A method for monitoring file activities is characterized by comprising the following steps:
step 1, starting file activity monitoring;
step 2, monitoring the operation of the NtSetinformation, and transmitting the full path name of the file object of the operation of the NtSetinformation of the current file to a PreseInfoOperCallback completion function according to the subtype of the operation of the NtSetinformation of the current file;
step 2-1, monitoring operation of the NtSetinformation, judging whether the operation subtype of the operation of the NtSetinformation of the current file is FileDisposition information according to the message parameter of the operation of the NtSetinformation of the current file, and if so, entering step 2-2; if not, further judging whether the operation subtype of the operation of the current file NtSetinformation is FileRenameInformation, if so, entering the step 2-4; otherwise, ending the file activity monitoring;
step 2-2, judging whether the operation is deleting to a recycle bin or not according to the identification value of the current file NtSetinformation operation, if so, ending the file activity monitoring process, regenerating a new IRP request aiming at the file object, setting the sub-type of the file NtSetinformation operation of the new IRP request as FileRenameInformation, then executing the step 2-1 again, and if not, entering the step 2-3;
step 2-3, acquiring the full path name of the current file object, judging whether the file is in the monitoring list or not based on the full path name of the current file object, and if so, transmitting the full path name of the current file object into a PresetInfoOperCallback completion function; if not, ending the file activity monitoring;
step 2-4, acquiring the full path name of the current file object, judging whether the file is in the monitoring list or not based on the full path name of the current file object, if so, acquiring the full path name of the target file object, and transmitting the full path name of the current file object and the full path name of the target file object into a PresetInfoOperCallback completion function; if not, ending the file activity monitoring;
step 3, judging the file activity type according to the message parameters in the PreSetInfoOperCallback completion function and the full pathname of the file object;
step 3-1, in the PresetInfoOperCallback completion function, judging whether the operation subtype of the current file NtSetinformation operation is FileDispositioninformation according to the message parameters, if so, entering step 3-2, otherwise, entering step 3-3;
step 3-2, judging whether the file deleting operation result is successful, if so, judging that the file activity type is deleting operation, and if not, ending the monitoring;
3-3, judging whether the full path name of the target file object conflicts with the full path name names of other files in the current folder, if so, ending the file activity monitoring process, and if not, entering the step 3-4;
step 3-4, judging whether the full path name of the target file object contains the mark information of the recycle bin, \ $ recycle. BIN \ or not, if so, judging that the file activity type is the recycle bin operation, and if not, entering step 3-5;
step 3-5, judging whether the full path name of the current file object and the full path name of the target file object are in the same directory, if so, judging that the file activity type is renaming operation, and if not, judging that the file activity type is cutting operation;
and 4, reporting the judged file activity type and the file information to monitoring software of an application layer.
2. The method for monitoring file activities according to claim 1, wherein the step 3-3 specifically comprises:
when the full path name of the target file object is consistent with the full path names of other files, the target file object is determined to be a naming conflict.
3. A method for monitoring the activity of files according to any of claims 1-2, characterized in that the types of files comprise at least files and folders.
4. A system for monitoring file activity, comprising: memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method for monitoring file activity of any one of claims 1 to 3 when executing the program.
5. The system for monitoring file activities according to claim 4, wherein the system uses a minifilter file filtering framework to extract and identify file activity features in the callback function, and report file activity information to the monitoring software of the application layer.
6. A computer-readable storage medium having computer-executable instructions stored therein, the computer-readable storage medium characterized by: the computer executable instructions, when executed by a processor, implement the steps of the method of monitoring file activity of any of claims 1 to 3.
CN202010849941.8A 2020-08-21 2020-08-21 Method and system for monitoring file activities Active CN112035832B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010849941.8A CN112035832B (en) 2020-08-21 2020-08-21 Method and system for monitoring file activities

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010849941.8A CN112035832B (en) 2020-08-21 2020-08-21 Method and system for monitoring file activities

Publications (2)

Publication Number Publication Date
CN112035832A CN112035832A (en) 2020-12-04
CN112035832B true CN112035832B (en) 2022-02-11

Family

ID=73580403

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010849941.8A Active CN112035832B (en) 2020-08-21 2020-08-21 Method and system for monitoring file activities

Country Status (1)

Country Link
CN (1) CN112035832B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5257381A (en) * 1992-02-28 1993-10-26 Intel Corporation Method of intercepting a global function of a network operating system and calling a monitoring function
CN101556608A (en) * 2009-02-27 2009-10-14 浙大网新科技股份有限公司 File system operation intercepting method based on event monitoring mechanism
CN102541986A (en) * 2011-10-27 2012-07-04 梁松 File operation monitoring and auditing method
CN103605930A (en) * 2013-11-27 2014-02-26 湖北民族学院 Double file anti-divulging method and system based on HOOK and filtering driving
CN106169048A (en) * 2016-06-29 2016-11-30 北京金山安全软件有限公司 File deletion method and device and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5257381A (en) * 1992-02-28 1993-10-26 Intel Corporation Method of intercepting a global function of a network operating system and calling a monitoring function
CN101556608A (en) * 2009-02-27 2009-10-14 浙大网新科技股份有限公司 File system operation intercepting method based on event monitoring mechanism
CN102541986A (en) * 2011-10-27 2012-07-04 梁松 File operation monitoring and auditing method
CN103605930A (en) * 2013-11-27 2014-02-26 湖北民族学院 Double file anti-divulging method and system based on HOOK and filtering driving
CN106169048A (en) * 2016-06-29 2016-11-30 北京金山安全软件有限公司 File deletion method and device and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于IRP特征序列的文件行为监控模型;范学斌等;《信息工程大学学报》;20120815(第04期);全文 *

Also Published As

Publication number Publication date
CN112035832A (en) 2020-12-04

Similar Documents

Publication Publication Date Title
US6978303B1 (en) Monitoring of computer usage
US11537478B2 (en) Automation and optimization of data recovery after a ransomware attack
JP4807970B2 (en) Spyware and unwanted software management through autostart extension points
US8190571B2 (en) Managing data with backup server indexing
CN101789888A (en) Detection method and device for software installation
CN106503551A (en) A kind of for the processing method and system of extorting software
CN111258850A (en) Method and device for updating software information based on Linux system
CN112035832B (en) Method and system for monitoring file activities
CN110618898A (en) Method for forced saving file to appointed directory synchronous backup according to process
US11991053B2 (en) Endpoint-level SLA evaluation in managed networks
CN113112023B (en) Inference service management method and device of AIStation inference platform
CN113360909B (en) Lesovirus defense method, lesovirus defense apparatus, and readable storage medium
CN110874474A (en) Lessocian virus defense method, Lessocian virus defense device, electronic device and storage medium
CN111125701B (en) File detection method, equipment, storage medium and device
KR100897479B1 (en) Method for file backup
US9779237B2 (en) Detection of non-volatile changes to a resource
CN109325347B (en) Method, system and device for searching and killing jump virus and readable storage medium
CN115080355B (en) Method and device for generating monitoring log
CN112035833B (en) File copy monitoring method and system
CN115080119A (en) Method and device for changing access control policy, electronic equipment and storage medium
CN117149495A (en) Method, device, equipment and storage medium for retry management of error event
Zhu et al. A consistency study of the Windows Registry
CN115686942A (en) PostgreSQL database misoperation recovery method, device, equipment and medium
CN115686791A (en) Process processing method and device
CN117786687A (en) Memory protection method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A monitoring method and system for file activity

Granted publication date: 20220211

Pledgee: Bank of Zhengzhou Co.,Ltd. Zhongyuan Science and Technology City Sub branch

Pledgor: ZHENGZHOU XINDA JIEAN INFORMATION TECHNOLOGY Co.,Ltd.

Registration number: Y2024980007004

PE01 Entry into force of the registration of the contract for pledge of patent right