CN112149177A - Bidirectional protection method and system for network information security - Google Patents

Bidirectional protection method and system for network information security Download PDF

Info

Publication number
CN112149177A
CN112149177A CN202010974034.6A CN202010974034A CN112149177A CN 112149177 A CN112149177 A CN 112149177A CN 202010974034 A CN202010974034 A CN 202010974034A CN 112149177 A CN112149177 A CN 112149177A
Authority
CN
China
Prior art keywords
information
user
identification code
registration
server side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010974034.6A
Other languages
Chinese (zh)
Other versions
CN112149177B (en
Inventor
赵丽洪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Gelong Network Technology Co ltd
Original Assignee
Hebei Gailong Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hebei Gailong Network Technology Co ltd filed Critical Hebei Gailong Network Technology Co ltd
Priority to CN202010974034.6A priority Critical patent/CN112149177B/en
Publication of CN112149177A publication Critical patent/CN112149177A/en
Application granted granted Critical
Publication of CN112149177B publication Critical patent/CN112149177B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a bidirectional protection method and a system for network information security, which specifically comprise the following steps: acquiring a user account, a password and private information as registration information and encrypting the registration information; judging to execute local isolated storage or open storage on the registration information according to the information safety protection level preset by the user; if local isolation storage is performed on the registration information, only the registered identification code and the unique user identification code are packaged and transmitted to the server side, and the user registration result is fed back; judging whether the data generated by the user input information or the user internet behavior needs to be filtered or encrypted or the server side is prohibited from acquiring the data; and for the read-only information, only allowing the process of the client to take over the function of opening the process handle by the kernel layer, and forbidding the system process to open the function of the process handle. The invention can prevent the server from obtaining excessive personal privacy information on one hand, and can prevent data from being stolen on the other hand, thereby realizing the bidirectional protection of network information.

Description

Bidirectional protection method and system for network information security
Technical Field
The present invention relates to the field of network information security technologies, and in particular, to a bidirectional protection method and system for network information security.
Background
Many mobile phone applications can acquire privacy information such as a mobile phone number, personal information and positioning information of a user in the registration and use processes, and even perform various analysis on the user by acquiring data generated when the user surfs the internet, if the data applied to the mobile phone is not properly stored, the privacy information of the user may be leaked. On the other hand, the data displayed to the user by the mobile phone application is allowed to be downloaded when the specific conditions are met, but the data is difficult to be prevented from being stolen by the user in a screen capture mode and the like.
Disclosure of Invention
The invention provides a bidirectional protection method and a bidirectional protection system for network information safety, which can prevent a server side from acquiring excessive personal privacy information on one hand, and can prevent data from being stolen on the other hand, thereby realizing bidirectional protection of network information.
The technical scheme of the invention is realized as follows:
a bidirectional protection method for network information security specifically comprises the following steps:
s1, acquiring user account, password and private information as registration information and encrypting;
s2, according to the information safety protection level preset by the user, judging to execute local isolation storage or open storage on the registration information;
s3, if local isolation storage is executed on the registration information, only the registered identification code and the unique user identification code are packaged and transmitted to the server side, and the user registration result is fed back; when a user logs in, the login identification code, the login time and the user unique identification code are packaged and transmitted to the server side; if the user needs to obtain the verification code, the verification code is obtained from the server side, verification is carried out based on the verification code and the unique identification code of the user, and whether the verification code is legal or not is judged;
s4, if the registration information is stored in an open mode, the user account, the password, the private information and the unique user identification code are encrypted and then packaged and transmitted to the server side, and the server side stores the encrypted user account, the password, the private information and the unique user identification code;
s5, according to the information security protection level preset by the user, judging whether the data generated by the user input information or the user internet behavior needs to be filtered or encrypted or the server side is prohibited to obtain the data;
s6, according to the information security protection level of the server, only allowing the client process to take over the function of opening the process handle by the kernel layer and forbidding the system process to open the function of the process handle aiming at the read-only information.
As a preferred embodiment of the present invention, the private information in step S1 includes the positioning information of the user.
As a preferred embodiment of the present invention, the read-only information in step S6 includes video, text, images, and audio.
As a preferred embodiment of the present invention, if the registration information is stored in an open manner and there is no need to filter, encrypt or prohibit the data generated by the user input information or the internet access behavior from being acquired, the server stores the acquired registration information, the user input information, and the data generated by the internet access behavior in the distributed database according to time slices, sets an original data temporary table and an index table for caching the data and the information in the distributed database, and sets the corresponding information and the location information of the data in the original data temporary table in the index table.
A bidirectional protection system for network information security comprises a client and a server, wherein the client comprises a registration login module, a setting module, an information filtering module and an information protection module, and the registration login module is used for acquiring a user account, a password and private information as registration information and encrypting the registration information; packaging the registered identification code and the unique user identification code and transmitting the packaged registered identification code and the unique user identification code to a server side to realize feedback of a user registration result; when a user logs in, the login identification code, the login time and the user unique identification code are packaged and transmitted to the server side; if the user needs to obtain the verification code, the verification code is obtained from the server side, verification is carried out based on the verification code and the unique identification code of the user, and whether the verification code is legal or not is judged; the information filtering module is used for filtering or encrypting the information input by the user or the data generated by the internet surfing behavior of the user or forbidding the server side to acquire the data according to the information security protection level preset by the user; the information protection module is used for allowing the client process to take over the function of opening the process handle of the kernel layer and forbidding the system process to open the function of the process handle according to the information security protection level of the server.
As a preferred embodiment of the present invention, the private information includes positioning information of the user.
As a preferred embodiment of the present invention, the read-only information includes video, text, images and audio.
As a preferred embodiment of the present invention, the server stores the obtained registration information, the user input information, and the data generated by the internet access behavior in the distributed database in a time-slicing manner, and sets an original data temporary table and an index table for caching the data and the information in the distributed database, where the index table sets the corresponding information and the location information of the data in the original data temporary table.
The invention has the beneficial effects that: on one hand, the server side can be prevented from acquiring excessive personal privacy information, on the other hand, data can be prevented from being stolen, and the bidirectional protection of network information is realized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of a bidirectional protection method for network information security according to an embodiment of the present invention;
fig. 2 is a schematic block diagram of an embodiment of a bidirectional protection method for network information security according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, the present invention provides a bidirectional protection method for network information security, which specifically includes the following steps:
s1, acquiring user account, password and private information as registration information and encrypting; download installation cell-phone APP, cell-phone APP's account registration and login module and cell-phone APP's user interface can be planned to two functional unit that are independent each other from the function, and user account, password and private information carry out encryption as registration information, and the available function that possesses cell-phone APP behind the account is more than the visitor, can be according to user's setting moreover, according to what of the open authority of user, progressively expand the quantity and the kind of the function service that cell-phone APP can provide for the user.
The private information in step S1 includes the location information of the user. If the user wants to check other users in the same city, the encrypted positioning information can be sent to the server side, the server side does not decrypt the received positioning information, but uses the encrypted positioning information as a search keyword, matches the users with the same encrypted positioning information and pushes the users to the users.
S2, according to the information safety protection level preset by the user, judging to execute local isolation storage or open storage on the registration information;
s3, if local isolation storage is executed on the registration information, only the registered identification code and the unique user identification code are packaged and transmitted to the server side, so that the user registration result is fed back, wherein the registered result is 1, and the unregistered result is 0; when a user logs in, the login identification code, the login time and the user unique identification code are packaged and transmitted to the server, namely, the user does not upload excessive data related to personal privacy information to the server in the process of logging in the mobile phone APP; if the user needs to obtain the verification code, the verification code is obtained from the server side, verification is carried out based on the verification code and the unique identification code of the user, and whether the verification code is legal or not is judged; if local isolation storage is executed, the server side cannot acquire the mobile phone number of the user, and only can send the verification code to the mobile phone APP, so that the user does not need to worry about receiving the spam marketing advertisement short message in the later period.
S4, if the registration information is stored in an open mode, the user account, the password, the private information and the unique user identification code are encrypted and then packaged and transmitted to the server side, and the server side stores the encrypted user account, the password, the private information and the unique user identification code;
s5, according to the information security protection level preset by the user, judging whether the data generated by the user input information or the user internet behavior needs to be filtered or encrypted or the server side is prohibited to obtain the data;
s6, according to the information security protection level of the server, only allowing the client process to take over the function of opening the process handle by the kernel layer and forbidding the system process to open the function of the process handle aiming at the read-only information. The operations of memory scanning, copying and cutting are forbidden, the HOOK can be carried out in an API HOOK mode, the data is forbidden to be written into the cutting board, and the operations of copying and cutting are prevented.
The read-only information in step S6 includes video, text, images, and audio.
As a preferred embodiment of the present invention, if the registration information is stored in an open manner and there is no need to filter, encrypt or prohibit the data generated by the user input information or the internet access behavior from being acquired, the server stores the acquired registration information, the user input information, and the data generated by the internet access behavior in the distributed database according to time slices, sets an original data temporary table and an index table for caching the data and the information in the distributed database, and sets the corresponding information and the location information of the data in the original data temporary table in the index table. When information and data analysis is carried out, according to the corresponding information stored in the index table of the server side and the position information of the data in the original data temporary table, the information and the data are called from the original data temporary table for analysis, and an analysis result is obtained and stored in the distributed database.
In the using process, after a user registers an account, logs in and sets the information security protection level, the data can be obtained from the server and displayed at the client, such as displaying text data, images, animations, cartoons, videos and the like. For example, using UIColletionView as a container, the size includes the picture in reality, and the parts of the two pictures before and after the picture are exposed. And covering a transparent UIScrollView on the screen, wherein the size of the UIScrollView is the size of one picture, and the gesture interaction and page turning functions of the ScrollView are used.
As shown in fig. 2, the present invention discloses a bidirectional protection system for network information security, which includes a client and a server, wherein the client includes a registration login module, a setting module, an information filtering module and an information protection module, and the registration login module is configured to obtain a user account, a password and private information as registration information and encrypt the registration information; packaging the registered identification code and the unique user identification code and transmitting the packaged registered identification code and the unique user identification code to a server side to realize feedback of a user registration result; when a user logs in, the login identification code, the login time and the user unique identification code are packaged and transmitted to the server side; if the user needs to obtain the verification code, the verification code is obtained from the server side, verification is carried out based on the verification code and the unique identification code of the user, and whether the verification code is legal or not is judged; the information filtering module is used for filtering or encrypting the information input by the user or the data generated by the internet surfing behavior of the user or forbidding the server side to acquire the data according to the information security protection level preset by the user; the information protection module is used for allowing the client process to take over the function of opening the process handle of the kernel layer and forbidding the system process to open the function of the process handle according to the information security protection level of the server. The operations of memory scanning, copying and cutting are forbidden, the HOOK can be carried out in an API HOOK mode, the data is forbidden to be written into the cutting board, and the operations of copying and cutting are prevented.
Download installation cell-phone APP, cell-phone APP's account registration and login module and cell-phone APP's use interface can be described as two function units independent of each other in the function, user account, password and private information carry out encryption as registration information, possess behind the account cell-phone APP's available function more than the visitor, can be according to user's setting moreover, according to what of the open authority of user, progressively expand cell-phone APP can be for the quantity and the kind of the function service that the user provided.
The private information includes location information of the user. The private information includes location information of the user. If the user wants to check other users in the same city, the encrypted positioning information can be sent to the server side, the server side does not decrypt the received positioning information, but uses the encrypted positioning information as a search keyword, matches the users with the same encrypted positioning information and pushes the users to the users.
The read-only information includes video, text, images and audio.
The server stores the acquired registration information, user input information and data generated by the internet access behavior in a distributed database according to time slices, an original data temporary table and an index table for caching the data and the information are arranged in the distributed database, and the index table is provided with corresponding information and position information of the data in the original data temporary table.
The invention has the beneficial effects that: on one hand, the server side can be prevented from acquiring excessive personal privacy information, on the other hand, data can be prevented from being stolen, and the bidirectional protection of network information is realized.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (8)

1. A bidirectional protection method for network information security is characterized by comprising the following steps:
s1, acquiring user account, password and private information as registration information and encrypting;
s2, according to the information safety protection level preset by the user, judging to execute local isolation storage or open storage on the registration information;
s3, if local isolation storage is executed on the registration information, only the registered identification code and the unique user identification code are packaged and transmitted to the server side, and the user registration result is fed back; when a user logs in, the login identification code, the login time and the user unique identification code are packaged and transmitted to the server side; if the user needs to obtain the verification code, the verification code is obtained from the server side, verification is carried out based on the verification code and the unique identification code of the user, and whether the verification code is legal or not is judged;
s4, if the registration information is stored in an open mode, the user account, the password, the private information and the unique user identification code are encrypted and then packaged and transmitted to the server side, and the server side stores the encrypted user account, the password, the private information and the unique user identification code;
s5, according to the information security protection level preset by the user, judging whether the data generated by the user input information or the user internet behavior needs to be filtered or encrypted or the server side is prohibited to obtain the data;
s6, according to the information security protection level of the server, only allowing the client process to take over the function of opening the process handle by the kernel layer and forbidding the system process to open the function of the process handle aiming at the read-only information.
2. The bidirectional protection method of claim 1, wherein the private information in step S1 includes the location information of the user.
3. The bidirectional protection method for network information security as claimed in claim 1, wherein the read-only information in step S6 includes video, text, image and audio.
4. The bidirectional protection method of network information security according to claim 1, wherein if the registration information is stored in an open manner and there is no need to filter, encrypt or prohibit the user input information or the data generated by the internet behavior from being acquired, the server stores the acquired registration information, the user input information and the data generated by the internet behavior in the distributed database in time slices, sets an original data temporary table and an index table for caching the data and information in the distributed database, and sets the corresponding information and the location information of the data in the original data temporary table in the index table.
5. A bidirectional protection system for network information security comprises a client and a server, and is characterized in that the client comprises a registration login module, a setting module, an information filtering module and an information protection module, wherein the registration login module is used for acquiring a user account, a password and private information as registration information and encrypting the registration information; packaging the registered identification code and the unique user identification code and transmitting the packaged registered identification code and the unique user identification code to a server side to realize feedback of a user registration result; when a user logs in, the login identification code, the login time and the user unique identification code are packaged and transmitted to the server side; if the user needs to obtain the verification code, the verification code is obtained from the server side, verification is carried out based on the verification code and the unique identification code of the user, and whether the verification code is legal or not is judged; the information filtering module is used for filtering or encrypting the information input by the user or the data generated by the internet surfing behavior of the user or forbidding the server side to acquire the data according to the information security protection level preset by the user; the information protection module is used for allowing the client process to take over the function of opening the process handle of the kernel layer and forbidding the system process to open the function of the process handle according to the information security protection level of the server.
6. The bidirectional protection system for network information security as claimed in claim 5, wherein the private information includes location information of the user.
7. The bidirectional protection system for network information security according to claim 5, wherein the read-only information includes video, text, image and audio.
8. The bidirectional protection system for network information security according to claim 5, wherein the server stores the acquired registration information, user input information, and data generated by the internet access behavior in the distributed database in time-sliced manner, and the distributed database is provided with an original data temporary table and an index table for caching the data and information, and the index table is provided with corresponding information and position information of the data in the original data temporary table.
CN202010974034.6A 2020-09-16 2020-09-16 Bidirectional protection method and system for network information security Active CN112149177B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010974034.6A CN112149177B (en) 2020-09-16 2020-09-16 Bidirectional protection method and system for network information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010974034.6A CN112149177B (en) 2020-09-16 2020-09-16 Bidirectional protection method and system for network information security

Publications (2)

Publication Number Publication Date
CN112149177A true CN112149177A (en) 2020-12-29
CN112149177B CN112149177B (en) 2022-03-15

Family

ID=73893752

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010974034.6A Active CN112149177B (en) 2020-09-16 2020-09-16 Bidirectional protection method and system for network information security

Country Status (1)

Country Link
CN (1) CN112149177B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115208653A (en) * 2022-07-11 2022-10-18 苏州协同创新智能制造装备有限公司 Encryption communication method based on active identification

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050273600A1 (en) * 2003-02-03 2005-12-08 Seeman El-Azar Method and system for file data access within a secure environment
US20100299759A1 (en) * 2007-12-07 2010-11-25 Markany Inc. Digital information security system, kernal driver apparatus and digital information security method
US20120233462A1 (en) * 2010-03-22 2012-09-13 ZTE Corporation ZTE Plaza, Keji Road South Method and system for automatically logging in a client
CN103368942A (en) * 2013-05-25 2013-10-23 中山市中商港科技有限公司 Cloud data security storage and management method
CN106453311A (en) * 2016-10-11 2017-02-22 掌握科技无锡有限公司 Register and login system and method for biological characteristic distributed identity authentication
CN108390753A (en) * 2018-01-04 2018-08-10 中国地质大学(武汉) A kind of application program account logon method and system based on the retrieval of ciphertext Hash
CN111107095A (en) * 2019-12-26 2020-05-05 淮南师范学院 Public password management system based on hybrid encryption
CN111245841A (en) * 2020-01-14 2020-06-05 杭州涂鸦信息技术有限公司 Account authorization method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050273600A1 (en) * 2003-02-03 2005-12-08 Seeman El-Azar Method and system for file data access within a secure environment
US20100299759A1 (en) * 2007-12-07 2010-11-25 Markany Inc. Digital information security system, kernal driver apparatus and digital information security method
US20120233462A1 (en) * 2010-03-22 2012-09-13 ZTE Corporation ZTE Plaza, Keji Road South Method and system for automatically logging in a client
CN103368942A (en) * 2013-05-25 2013-10-23 中山市中商港科技有限公司 Cloud data security storage and management method
CN106453311A (en) * 2016-10-11 2017-02-22 掌握科技无锡有限公司 Register and login system and method for biological characteristic distributed identity authentication
CN108390753A (en) * 2018-01-04 2018-08-10 中国地质大学(武汉) A kind of application program account logon method and system based on the retrieval of ciphertext Hash
CN111107095A (en) * 2019-12-26 2020-05-05 淮南师范学院 Public password management system based on hybrid encryption
CN111245841A (en) * 2020-01-14 2020-06-05 杭州涂鸦信息技术有限公司 Account authorization method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115208653A (en) * 2022-07-11 2022-10-18 苏州协同创新智能制造装备有限公司 Encryption communication method based on active identification
CN115208653B (en) * 2022-07-11 2024-04-09 苏州协同创新智能制造装备有限公司 Encryption communication method based on active identification

Also Published As

Publication number Publication date
CN112149177B (en) 2022-03-15

Similar Documents

Publication Publication Date Title
US10701069B2 (en) Online identity verification platform and process
US10083320B2 (en) Dynamic content redaction
US9177174B1 (en) Systems and methods for protecting sensitive data in communications
US10607035B2 (en) Method of displaying content on a screen of an electronic processing device
EP2371096B1 (en) Electronic file sending method
US20170316187A1 (en) Systems and Methods for Creating and Sharing Protected Content
CN104573548A (en) Information encryption and decryption methods and devices and terminal
CN107256367A (en) A kind of information processing method and device, terminal device and computer-readable recording medium
US20160117520A1 (en) Method and system for sharing content files using a computer system and data network
CN106203141A (en) The data processing method of a kind of application and device
CN112149177B (en) Bidirectional protection method and system for network information security
FR3003974A1 (en) METHOD AND DEVICE FOR TRANSMITTING A FILE CONTAINING CONTROLLED ACCESS MULTIMEDIA CONTENT
US20150347365A1 (en) System and method for distributing censored and encrypted versions of a document
US9652621B2 (en) Electronic transmission security process
JP5840180B2 (en) Electronic file transmission method
GB2566043A (en) A method of displaying content on a screen of an electronic processing device
Kelec et al. Privacy threats on Android devices—Big brother is watching you
CN114553594B (en) Method and device for protecting data security
KR20190026550A (en) Method and system for providing social media using partition function
CN107147702B (en) File downloading method and device
KR101644070B1 (en) Email service method and system for mobile
JP2021081948A (en) Authentication system
CN115203737A (en) Method for displaying data and electronic equipment
CN110851842A (en) Document display method and device and electronic equipment
Swartz Examining Social Media on Mobile Devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: Room 202 (2) -22, building 5, software park, No. 78, Keling Road, Suzhou high tech Zone, Suzhou, Jiangsu 215000

Patentee after: Suzhou Gelong Network Technology Co.,Ltd.

Address before: 052360 A105, 1st floor, innovation building, gate 2, South International Leather City, Xinji City, Shijiazhuang City, Hebei Province

Patentee before: HEBEI GAILONG NETWORK TECHNOLOGY Co.,Ltd.