CN112149177A - Bidirectional protection method and system for network information security - Google Patents
Bidirectional protection method and system for network information security Download PDFInfo
- Publication number
- CN112149177A CN112149177A CN202010974034.6A CN202010974034A CN112149177A CN 112149177 A CN112149177 A CN 112149177A CN 202010974034 A CN202010974034 A CN 202010974034A CN 112149177 A CN112149177 A CN 112149177A
- Authority
- CN
- China
- Prior art keywords
- information
- user
- identification code
- registration
- server side
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Medical Informatics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a bidirectional protection method and a system for network information security, which specifically comprise the following steps: acquiring a user account, a password and private information as registration information and encrypting the registration information; judging to execute local isolated storage or open storage on the registration information according to the information safety protection level preset by the user; if local isolation storage is performed on the registration information, only the registered identification code and the unique user identification code are packaged and transmitted to the server side, and the user registration result is fed back; judging whether the data generated by the user input information or the user internet behavior needs to be filtered or encrypted or the server side is prohibited from acquiring the data; and for the read-only information, only allowing the process of the client to take over the function of opening the process handle by the kernel layer, and forbidding the system process to open the function of the process handle. The invention can prevent the server from obtaining excessive personal privacy information on one hand, and can prevent data from being stolen on the other hand, thereby realizing the bidirectional protection of network information.
Description
Technical Field
The present invention relates to the field of network information security technologies, and in particular, to a bidirectional protection method and system for network information security.
Background
Many mobile phone applications can acquire privacy information such as a mobile phone number, personal information and positioning information of a user in the registration and use processes, and even perform various analysis on the user by acquiring data generated when the user surfs the internet, if the data applied to the mobile phone is not properly stored, the privacy information of the user may be leaked. On the other hand, the data displayed to the user by the mobile phone application is allowed to be downloaded when the specific conditions are met, but the data is difficult to be prevented from being stolen by the user in a screen capture mode and the like.
Disclosure of Invention
The invention provides a bidirectional protection method and a bidirectional protection system for network information safety, which can prevent a server side from acquiring excessive personal privacy information on one hand, and can prevent data from being stolen on the other hand, thereby realizing bidirectional protection of network information.
The technical scheme of the invention is realized as follows:
a bidirectional protection method for network information security specifically comprises the following steps:
s1, acquiring user account, password and private information as registration information and encrypting;
s2, according to the information safety protection level preset by the user, judging to execute local isolation storage or open storage on the registration information;
s3, if local isolation storage is executed on the registration information, only the registered identification code and the unique user identification code are packaged and transmitted to the server side, and the user registration result is fed back; when a user logs in, the login identification code, the login time and the user unique identification code are packaged and transmitted to the server side; if the user needs to obtain the verification code, the verification code is obtained from the server side, verification is carried out based on the verification code and the unique identification code of the user, and whether the verification code is legal or not is judged;
s4, if the registration information is stored in an open mode, the user account, the password, the private information and the unique user identification code are encrypted and then packaged and transmitted to the server side, and the server side stores the encrypted user account, the password, the private information and the unique user identification code;
s5, according to the information security protection level preset by the user, judging whether the data generated by the user input information or the user internet behavior needs to be filtered or encrypted or the server side is prohibited to obtain the data;
s6, according to the information security protection level of the server, only allowing the client process to take over the function of opening the process handle by the kernel layer and forbidding the system process to open the function of the process handle aiming at the read-only information.
As a preferred embodiment of the present invention, the private information in step S1 includes the positioning information of the user.
As a preferred embodiment of the present invention, the read-only information in step S6 includes video, text, images, and audio.
As a preferred embodiment of the present invention, if the registration information is stored in an open manner and there is no need to filter, encrypt or prohibit the data generated by the user input information or the internet access behavior from being acquired, the server stores the acquired registration information, the user input information, and the data generated by the internet access behavior in the distributed database according to time slices, sets an original data temporary table and an index table for caching the data and the information in the distributed database, and sets the corresponding information and the location information of the data in the original data temporary table in the index table.
A bidirectional protection system for network information security comprises a client and a server, wherein the client comprises a registration login module, a setting module, an information filtering module and an information protection module, and the registration login module is used for acquiring a user account, a password and private information as registration information and encrypting the registration information; packaging the registered identification code and the unique user identification code and transmitting the packaged registered identification code and the unique user identification code to a server side to realize feedback of a user registration result; when a user logs in, the login identification code, the login time and the user unique identification code are packaged and transmitted to the server side; if the user needs to obtain the verification code, the verification code is obtained from the server side, verification is carried out based on the verification code and the unique identification code of the user, and whether the verification code is legal or not is judged; the information filtering module is used for filtering or encrypting the information input by the user or the data generated by the internet surfing behavior of the user or forbidding the server side to acquire the data according to the information security protection level preset by the user; the information protection module is used for allowing the client process to take over the function of opening the process handle of the kernel layer and forbidding the system process to open the function of the process handle according to the information security protection level of the server.
As a preferred embodiment of the present invention, the private information includes positioning information of the user.
As a preferred embodiment of the present invention, the read-only information includes video, text, images and audio.
As a preferred embodiment of the present invention, the server stores the obtained registration information, the user input information, and the data generated by the internet access behavior in the distributed database in a time-slicing manner, and sets an original data temporary table and an index table for caching the data and the information in the distributed database, where the index table sets the corresponding information and the location information of the data in the original data temporary table.
The invention has the beneficial effects that: on one hand, the server side can be prevented from acquiring excessive personal privacy information, on the other hand, data can be prevented from being stolen, and the bidirectional protection of network information is realized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of a bidirectional protection method for network information security according to an embodiment of the present invention;
fig. 2 is a schematic block diagram of an embodiment of a bidirectional protection method for network information security according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, the present invention provides a bidirectional protection method for network information security, which specifically includes the following steps:
s1, acquiring user account, password and private information as registration information and encrypting; download installation cell-phone APP, cell-phone APP's account registration and login module and cell-phone APP's user interface can be planned to two functional unit that are independent each other from the function, and user account, password and private information carry out encryption as registration information, and the available function that possesses cell-phone APP behind the account is more than the visitor, can be according to user's setting moreover, according to what of the open authority of user, progressively expand the quantity and the kind of the function service that cell-phone APP can provide for the user.
The private information in step S1 includes the location information of the user. If the user wants to check other users in the same city, the encrypted positioning information can be sent to the server side, the server side does not decrypt the received positioning information, but uses the encrypted positioning information as a search keyword, matches the users with the same encrypted positioning information and pushes the users to the users.
S2, according to the information safety protection level preset by the user, judging to execute local isolation storage or open storage on the registration information;
s3, if local isolation storage is executed on the registration information, only the registered identification code and the unique user identification code are packaged and transmitted to the server side, so that the user registration result is fed back, wherein the registered result is 1, and the unregistered result is 0; when a user logs in, the login identification code, the login time and the user unique identification code are packaged and transmitted to the server, namely, the user does not upload excessive data related to personal privacy information to the server in the process of logging in the mobile phone APP; if the user needs to obtain the verification code, the verification code is obtained from the server side, verification is carried out based on the verification code and the unique identification code of the user, and whether the verification code is legal or not is judged; if local isolation storage is executed, the server side cannot acquire the mobile phone number of the user, and only can send the verification code to the mobile phone APP, so that the user does not need to worry about receiving the spam marketing advertisement short message in the later period.
S4, if the registration information is stored in an open mode, the user account, the password, the private information and the unique user identification code are encrypted and then packaged and transmitted to the server side, and the server side stores the encrypted user account, the password, the private information and the unique user identification code;
s5, according to the information security protection level preset by the user, judging whether the data generated by the user input information or the user internet behavior needs to be filtered or encrypted or the server side is prohibited to obtain the data;
s6, according to the information security protection level of the server, only allowing the client process to take over the function of opening the process handle by the kernel layer and forbidding the system process to open the function of the process handle aiming at the read-only information. The operations of memory scanning, copying and cutting are forbidden, the HOOK can be carried out in an API HOOK mode, the data is forbidden to be written into the cutting board, and the operations of copying and cutting are prevented.
The read-only information in step S6 includes video, text, images, and audio.
As a preferred embodiment of the present invention, if the registration information is stored in an open manner and there is no need to filter, encrypt or prohibit the data generated by the user input information or the internet access behavior from being acquired, the server stores the acquired registration information, the user input information, and the data generated by the internet access behavior in the distributed database according to time slices, sets an original data temporary table and an index table for caching the data and the information in the distributed database, and sets the corresponding information and the location information of the data in the original data temporary table in the index table. When information and data analysis is carried out, according to the corresponding information stored in the index table of the server side and the position information of the data in the original data temporary table, the information and the data are called from the original data temporary table for analysis, and an analysis result is obtained and stored in the distributed database.
In the using process, after a user registers an account, logs in and sets the information security protection level, the data can be obtained from the server and displayed at the client, such as displaying text data, images, animations, cartoons, videos and the like. For example, using UIColletionView as a container, the size includes the picture in reality, and the parts of the two pictures before and after the picture are exposed. And covering a transparent UIScrollView on the screen, wherein the size of the UIScrollView is the size of one picture, and the gesture interaction and page turning functions of the ScrollView are used.
As shown in fig. 2, the present invention discloses a bidirectional protection system for network information security, which includes a client and a server, wherein the client includes a registration login module, a setting module, an information filtering module and an information protection module, and the registration login module is configured to obtain a user account, a password and private information as registration information and encrypt the registration information; packaging the registered identification code and the unique user identification code and transmitting the packaged registered identification code and the unique user identification code to a server side to realize feedback of a user registration result; when a user logs in, the login identification code, the login time and the user unique identification code are packaged and transmitted to the server side; if the user needs to obtain the verification code, the verification code is obtained from the server side, verification is carried out based on the verification code and the unique identification code of the user, and whether the verification code is legal or not is judged; the information filtering module is used for filtering or encrypting the information input by the user or the data generated by the internet surfing behavior of the user or forbidding the server side to acquire the data according to the information security protection level preset by the user; the information protection module is used for allowing the client process to take over the function of opening the process handle of the kernel layer and forbidding the system process to open the function of the process handle according to the information security protection level of the server. The operations of memory scanning, copying and cutting are forbidden, the HOOK can be carried out in an API HOOK mode, the data is forbidden to be written into the cutting board, and the operations of copying and cutting are prevented.
Download installation cell-phone APP, cell-phone APP's account registration and login module and cell-phone APP's use interface can be described as two function units independent of each other in the function, user account, password and private information carry out encryption as registration information, possess behind the account cell-phone APP's available function more than the visitor, can be according to user's setting moreover, according to what of the open authority of user, progressively expand cell-phone APP can be for the quantity and the kind of the function service that the user provided.
The private information includes location information of the user. The private information includes location information of the user. If the user wants to check other users in the same city, the encrypted positioning information can be sent to the server side, the server side does not decrypt the received positioning information, but uses the encrypted positioning information as a search keyword, matches the users with the same encrypted positioning information and pushes the users to the users.
The read-only information includes video, text, images and audio.
The server stores the acquired registration information, user input information and data generated by the internet access behavior in a distributed database according to time slices, an original data temporary table and an index table for caching the data and the information are arranged in the distributed database, and the index table is provided with corresponding information and position information of the data in the original data temporary table.
The invention has the beneficial effects that: on one hand, the server side can be prevented from acquiring excessive personal privacy information, on the other hand, data can be prevented from being stolen, and the bidirectional protection of network information is realized.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (8)
1. A bidirectional protection method for network information security is characterized by comprising the following steps:
s1, acquiring user account, password and private information as registration information and encrypting;
s2, according to the information safety protection level preset by the user, judging to execute local isolation storage or open storage on the registration information;
s3, if local isolation storage is executed on the registration information, only the registered identification code and the unique user identification code are packaged and transmitted to the server side, and the user registration result is fed back; when a user logs in, the login identification code, the login time and the user unique identification code are packaged and transmitted to the server side; if the user needs to obtain the verification code, the verification code is obtained from the server side, verification is carried out based on the verification code and the unique identification code of the user, and whether the verification code is legal or not is judged;
s4, if the registration information is stored in an open mode, the user account, the password, the private information and the unique user identification code are encrypted and then packaged and transmitted to the server side, and the server side stores the encrypted user account, the password, the private information and the unique user identification code;
s5, according to the information security protection level preset by the user, judging whether the data generated by the user input information or the user internet behavior needs to be filtered or encrypted or the server side is prohibited to obtain the data;
s6, according to the information security protection level of the server, only allowing the client process to take over the function of opening the process handle by the kernel layer and forbidding the system process to open the function of the process handle aiming at the read-only information.
2. The bidirectional protection method of claim 1, wherein the private information in step S1 includes the location information of the user.
3. The bidirectional protection method for network information security as claimed in claim 1, wherein the read-only information in step S6 includes video, text, image and audio.
4. The bidirectional protection method of network information security according to claim 1, wherein if the registration information is stored in an open manner and there is no need to filter, encrypt or prohibit the user input information or the data generated by the internet behavior from being acquired, the server stores the acquired registration information, the user input information and the data generated by the internet behavior in the distributed database in time slices, sets an original data temporary table and an index table for caching the data and information in the distributed database, and sets the corresponding information and the location information of the data in the original data temporary table in the index table.
5. A bidirectional protection system for network information security comprises a client and a server, and is characterized in that the client comprises a registration login module, a setting module, an information filtering module and an information protection module, wherein the registration login module is used for acquiring a user account, a password and private information as registration information and encrypting the registration information; packaging the registered identification code and the unique user identification code and transmitting the packaged registered identification code and the unique user identification code to a server side to realize feedback of a user registration result; when a user logs in, the login identification code, the login time and the user unique identification code are packaged and transmitted to the server side; if the user needs to obtain the verification code, the verification code is obtained from the server side, verification is carried out based on the verification code and the unique identification code of the user, and whether the verification code is legal or not is judged; the information filtering module is used for filtering or encrypting the information input by the user or the data generated by the internet surfing behavior of the user or forbidding the server side to acquire the data according to the information security protection level preset by the user; the information protection module is used for allowing the client process to take over the function of opening the process handle of the kernel layer and forbidding the system process to open the function of the process handle according to the information security protection level of the server.
6. The bidirectional protection system for network information security as claimed in claim 5, wherein the private information includes location information of the user.
7. The bidirectional protection system for network information security according to claim 5, wherein the read-only information includes video, text, image and audio.
8. The bidirectional protection system for network information security according to claim 5, wherein the server stores the acquired registration information, user input information, and data generated by the internet access behavior in the distributed database in time-sliced manner, and the distributed database is provided with an original data temporary table and an index table for caching the data and information, and the index table is provided with corresponding information and position information of the data in the original data temporary table.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010974034.6A CN112149177B (en) | 2020-09-16 | 2020-09-16 | Bidirectional protection method and system for network information security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010974034.6A CN112149177B (en) | 2020-09-16 | 2020-09-16 | Bidirectional protection method and system for network information security |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112149177A true CN112149177A (en) | 2020-12-29 |
CN112149177B CN112149177B (en) | 2022-03-15 |
Family
ID=73893752
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010974034.6A Active CN112149177B (en) | 2020-09-16 | 2020-09-16 | Bidirectional protection method and system for network information security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112149177B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115208653A (en) * | 2022-07-11 | 2022-10-18 | 苏州协同创新智能制造装备有限公司 | Encryption communication method based on active identification |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050273600A1 (en) * | 2003-02-03 | 2005-12-08 | Seeman El-Azar | Method and system for file data access within a secure environment |
US20100299759A1 (en) * | 2007-12-07 | 2010-11-25 | Markany Inc. | Digital information security system, kernal driver apparatus and digital information security method |
US20120233462A1 (en) * | 2010-03-22 | 2012-09-13 | ZTE Corporation ZTE Plaza, Keji Road South | Method and system for automatically logging in a client |
CN103368942A (en) * | 2013-05-25 | 2013-10-23 | 中山市中商港科技有限公司 | Cloud data security storage and management method |
CN106453311A (en) * | 2016-10-11 | 2017-02-22 | 掌握科技无锡有限公司 | Register and login system and method for biological characteristic distributed identity authentication |
CN108390753A (en) * | 2018-01-04 | 2018-08-10 | 中国地质大学(武汉) | A kind of application program account logon method and system based on the retrieval of ciphertext Hash |
CN111107095A (en) * | 2019-12-26 | 2020-05-05 | 淮南师范学院 | Public password management system based on hybrid encryption |
CN111245841A (en) * | 2020-01-14 | 2020-06-05 | 杭州涂鸦信息技术有限公司 | Account authorization method and system |
-
2020
- 2020-09-16 CN CN202010974034.6A patent/CN112149177B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050273600A1 (en) * | 2003-02-03 | 2005-12-08 | Seeman El-Azar | Method and system for file data access within a secure environment |
US20100299759A1 (en) * | 2007-12-07 | 2010-11-25 | Markany Inc. | Digital information security system, kernal driver apparatus and digital information security method |
US20120233462A1 (en) * | 2010-03-22 | 2012-09-13 | ZTE Corporation ZTE Plaza, Keji Road South | Method and system for automatically logging in a client |
CN103368942A (en) * | 2013-05-25 | 2013-10-23 | 中山市中商港科技有限公司 | Cloud data security storage and management method |
CN106453311A (en) * | 2016-10-11 | 2017-02-22 | 掌握科技无锡有限公司 | Register and login system and method for biological characteristic distributed identity authentication |
CN108390753A (en) * | 2018-01-04 | 2018-08-10 | 中国地质大学(武汉) | A kind of application program account logon method and system based on the retrieval of ciphertext Hash |
CN111107095A (en) * | 2019-12-26 | 2020-05-05 | 淮南师范学院 | Public password management system based on hybrid encryption |
CN111245841A (en) * | 2020-01-14 | 2020-06-05 | 杭州涂鸦信息技术有限公司 | Account authorization method and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115208653A (en) * | 2022-07-11 | 2022-10-18 | 苏州协同创新智能制造装备有限公司 | Encryption communication method based on active identification |
CN115208653B (en) * | 2022-07-11 | 2024-04-09 | 苏州协同创新智能制造装备有限公司 | Encryption communication method based on active identification |
Also Published As
Publication number | Publication date |
---|---|
CN112149177B (en) | 2022-03-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10701069B2 (en) | Online identity verification platform and process | |
US10083320B2 (en) | Dynamic content redaction | |
US9177174B1 (en) | Systems and methods for protecting sensitive data in communications | |
US10607035B2 (en) | Method of displaying content on a screen of an electronic processing device | |
EP2371096B1 (en) | Electronic file sending method | |
US20170316187A1 (en) | Systems and Methods for Creating and Sharing Protected Content | |
CN104573548A (en) | Information encryption and decryption methods and devices and terminal | |
CN107256367A (en) | A kind of information processing method and device, terminal device and computer-readable recording medium | |
US20160117520A1 (en) | Method and system for sharing content files using a computer system and data network | |
CN106203141A (en) | The data processing method of a kind of application and device | |
CN112149177B (en) | Bidirectional protection method and system for network information security | |
FR3003974A1 (en) | METHOD AND DEVICE FOR TRANSMITTING A FILE CONTAINING CONTROLLED ACCESS MULTIMEDIA CONTENT | |
US20150347365A1 (en) | System and method for distributing censored and encrypted versions of a document | |
US9652621B2 (en) | Electronic transmission security process | |
JP5840180B2 (en) | Electronic file transmission method | |
GB2566043A (en) | A method of displaying content on a screen of an electronic processing device | |
Kelec et al. | Privacy threats on Android devices—Big brother is watching you | |
CN114553594B (en) | Method and device for protecting data security | |
KR20190026550A (en) | Method and system for providing social media using partition function | |
CN107147702B (en) | File downloading method and device | |
KR101644070B1 (en) | Email service method and system for mobile | |
JP2021081948A (en) | Authentication system | |
CN115203737A (en) | Method for displaying data and electronic equipment | |
CN110851842A (en) | Document display method and device and electronic equipment | |
Swartz | Examining Social Media on Mobile Devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: Room 202 (2) -22, building 5, software park, No. 78, Keling Road, Suzhou high tech Zone, Suzhou, Jiangsu 215000 Patentee after: Suzhou Gelong Network Technology Co.,Ltd. Address before: 052360 A105, 1st floor, innovation building, gate 2, South International Leather City, Xinji City, Shijiazhuang City, Hebei Province Patentee before: HEBEI GAILONG NETWORK TECHNOLOGY Co.,Ltd. |