CN114629709B - Computer network safety system based on distributed big data information interaction - Google Patents

Computer network safety system based on distributed big data information interaction Download PDF

Info

Publication number
CN114629709B
CN114629709B CN202210272863.9A CN202210272863A CN114629709B CN 114629709 B CN114629709 B CN 114629709B CN 202210272863 A CN202210272863 A CN 202210272863A CN 114629709 B CN114629709 B CN 114629709B
Authority
CN
China
Prior art keywords
data
storage
verification
request
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210272863.9A
Other languages
Chinese (zh)
Other versions
CN114629709A (en
Inventor
吴玉红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Goodbye Digital Technology Suzhou Co ltd
Original Assignee
Goodbye Digital Technology Suzhou Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Goodbye Digital Technology Suzhou Co ltd filed Critical Goodbye Digital Technology Suzhou Co ltd
Priority to CN202210272863.9A priority Critical patent/CN114629709B/en
Publication of CN114629709A publication Critical patent/CN114629709A/en
Application granted granted Critical
Publication of CN114629709B publication Critical patent/CN114629709B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a computer network safety system based on distributed big data information interaction, which relates to the technical field of computer systems and solves the technical problems that in the prior art, after the data interaction process, the data file and the user identity are both statically verified, and the data file and the data interaction safety cannot be ensured; the invention carries out linkage verification of rationality, integrity and the like on the reading request or the storage request, carries out comprehensive detection on the data files stored in a plurality of storage servers, generates a verification sequence according to the storage request, further verifies the reading request based on the verification sequence, and comprehensively ensures the safety of the data files and the data interaction process; the storage servers can comprehensively detect the stored data files, and the storage servers can also perform data interaction and can be used as backups mutually, so that the safety of the data files in the storage servers is ensured, and the data interaction safety is also indirectly improved.

Description

Computer network safety system based on distributed big data information interaction
Technical Field
The invention belongs to the field of computer systems, relates to a distributed big data information interaction technology, and particularly relates to a computer network security system based on distributed big data information interaction.
Background
With the rapid development of network technology, the capacity and diversity of data are rapidly increased, but the complexity of a data processing algorithm is difficult to improve, so that the rapidly increasing demand of big data is difficult to meet, and how to efficiently process big data becomes an urgent problem.
The prior art (patent invention with publication number CN 107800787A) discloses a distributed computer network system for real-time exchange and sharing of big data, where a data owner encrypts a data file to a storage server, and when a user submits a query request to a task server, the user identity is verified and a private key is obtained, thereby implementing data interaction. In the prior art, in the data interaction process, both the data file and the user identity are static verification, so that the safety of the data file and the data interaction cannot be ensured; therefore, a computer network security system based on distributed big data information interaction is needed.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art; therefore, the invention provides a computer network security system based on distributed big data information interaction, which is used for solving the technical problem that the data file and data interaction security can not be ensured because the data file and user identity are both statically verified after the data interaction process in the prior art.
The invention carries out linkage verification of rationality, integrity and the like on the reading request or the storage request, carries out comprehensive detection on the data files stored in a plurality of storage servers, generates a verification sequence according to the storage request, further verifies the reading request based on the verification sequence, and comprehensively ensures the safety of the data files and the data interaction process.
In order to achieve the above object, a first aspect of the present invention provides a computer network security system based on distributed big data information interaction, which includes a data server, and a plurality of storage servers and a plurality of intelligent terminals connected to the data server;
a plurality of intelligent terminal: the data server is used for sending a reading request to the data requester; and
the data server is used for sending a storage request and a data file to the data server by a data owner;
a data server: performing chain verification on the reading request, generating a verification sequence based on the reading request after the verification is passed, and calling target data from a plurality of storage servers according to a verification result of the verification sequence; and
performing chain verification on the storage requests, and storing the data files in a plurality of storage servers according to verification results; the linkage verification comprises rationality verification and integrity verification;
a plurality of storage servers: and comprehensively detecting the stored data file, and sending the target data to the data server according to the control instruction of the data server.
Preferably, the storage servers and the intelligent terminals perform data interaction through the data server, and the storage servers are in communication and/or electrical connection; the intelligent terminal comprises an intelligent mobile phone, a computer and a workstation.
Preferably, the data owner performs data storage through the intelligent terminal, and the data storage includes:
encrypting the data file by the data owner;
generating a storage request through an intelligent terminal, and sending the storage request and an encrypted data file to a data server; the storage request comprises shared user information, file time limit and a public key.
Preferably, after receiving the storage request and the data file, the data server performs chain verification based on the storage request, including:
acquiring an intelligent terminal corresponding to the storage request, and verifying the validity of the intelligent terminal;
verifying the rationality of the request frequency corresponding to the storage request;
verifying the integrity of the request content corresponding to the storage request;
and when the legality, the rationality and the integrity are verified, judging that the chain verification of the storage request is passed.
Preferably, after the chain verification of the storage request is passed, the data server sorts the storage request to generate a verification sequence, stores the verification sequence in the data server, and associates the verification sequence with a corresponding data file; and sending the encrypted data file to a plurality of storage servers for storage.
Preferably, the overall detection of the data file by the plurality of storage servers includes:
scanning the stored data files periodically, and cleaning the data files based on the storage request; and
regularly carrying out anomaly detection on the stored data files, and managing the data files according to anomaly detection results; the anomaly detection comprises virus detection and content detection.
Preferably, after the chain verification of the read request passes, the user characteristic information of the data requester, the file time limit of the data file corresponding to the read request and the private key provided by the data requester are verified through the verification sequence.
Preferably, after the verification based on the verification sequence passes, the data server generates a control instruction and sends the control instruction to a corresponding storage server, and the corresponding storage server sends the target data to the data requester through the data server according to the control instruction.
Compared with the prior art, the invention has the beneficial effects that:
1. the invention carries out chain verification of rationality, integrity and the like on the reading request or the storage request, carries out comprehensive detection on the data files stored in a plurality of storage servers, generates a verification sequence according to the storage request, further verifies the reading request based on the verification sequence, and comprehensively ensures the safety of the data files and the data interaction process.
2. The storage servers can comprehensively detect the stored data files, and the storage servers can also perform data interaction and can be used as backup mutually, so that the safety of the data files in the storage servers is ensured, and the data interaction safety is also indirectly improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of the working steps of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The prior art (patent invention with publication number CN 107800787A) discloses a distributed computer network system for real-time exchange and sharing of big data, where a data owner encrypts a data file to a storage server, and when a user submits a query request to a task server, the user identity is verified and a private key is obtained, thereby implementing data interaction. In the prior art, after the data interaction process, only the identity of the intelligent terminal and the identity of the user are verified, and the data file is not verified, so that once the data file is abnormal, the abnormality of other data files of the storage server can be caused, and the safety of the data file and the data interaction can not be ensured.
The invention carries out linkage verification of rationality, integrity and the like on the reading request or the storage request, carries out comprehensive detection on the data files stored in a plurality of storage servers, generates a verification sequence according to the storage request, further verifies the reading request based on the verification sequence, and comprehensively ensures the safety of the data files and the data interaction process.
Referring to fig. 1, a first embodiment of the present application provides a computer network security system based on distributed big data information interaction, including a data server, and a plurality of storage servers and a plurality of intelligent terminals connected thereto;
a plurality of intelligent terminal: the data server is used for sending a reading request to the data requester; and
the data server is used for sending the storage request and the data file to the data server by the data owner;
a data server: performing chain verification on the reading request, generating a verification sequence based on the reading request after the verification is passed, and calling target data from a plurality of storage servers according to a verification result of the verification sequence; and
performing chain verification on the storage requests, and storing the data files in a plurality of storage servers according to verification results;
a plurality of storage servers: and comprehensively detecting the stored data file, and sending the target data to the data server according to the control instruction of the data server.
In the application, a plurality of storage servers and a plurality of intelligent terminals carry out data interaction through data servers, and the storage servers are in communication and/or electrical connection; the intelligent terminal comprises an intelligent mobile phone, a computer, a workstation and the like and is mainly used for sending reading requests and receiving data. It should be noted that several storage servers are connected to each other, and can perform data transmission with each other.
The chain verification in the application comprises rationality verification, integrity verification, validity verification and the like, and mainly verifies whether a reading request or a data request meets a relevant standard, so that the problem of storage or reading of a data file caused by the fact that the data file does not meet the standard is avoided.
In a preferred embodiment, the data owner performs data storage through the intelligent terminal, including:
encrypting the data file by the data owner;
and generating a storage request through the intelligent terminal, and sending the storage request and the encrypted data file to the data server.
It can be understood that before the data file is stored, the data file needs to be encrypted (symmetric encryption algorithm), and after the data file is encrypted, a corresponding public key and a corresponding private key are obtained, the public key is stored in the data server, and the private key is shared with the sharing user.
In this embodiment, the storage request includes shared user information, a file time limit, and a public key. The public user information is used for verifying the authority of the data requester, and comprises biological information, equipment information, position information and the like; the file time limit represents the storage time of the encrypted data file in the storage server, and comprises permanence, one year, one day and the like.
In a preferred embodiment, after receiving the storage request and the data file, the data server performs chain verification based on the storage request, including:
acquiring an intelligent terminal corresponding to the storage request, and verifying the validity of the intelligent terminal;
verifying the rationality of the request frequency corresponding to the storage request;
verifying the integrity of the request content corresponding to the storage request;
and when the legality, the rationality and the integrity are verified, judging that the chain verification of the storage request is passed.
In this embodiment, the storage request and the intelligent terminal related to the storage request are verified, where the validity is to verify whether the intelligent terminal is valid, that is, whether the intelligent terminal meets the authority or qualification for sending the storage request and the data file, and if the IP address of the intelligent terminal is not true, the intelligent terminal is considered to be illegal; when the intelligent terminal is illegal, the related activities performed through the intelligent terminal are also illegal.
The rationality verification is mainly directed to the request frequency of storage requests, and if the request frequency of the same storage request is very high, the storage request is not reasonable and may be controlled by viruses, which may easily cause the crash of the data server and the storage server.
The integrity verification is specific to the request content of the storage request, and if the file time limit in the storage request is empty, the integrity verification of the storage request is not passed, so that management confusion of the data file is avoided.
In a preferred embodiment, after the chain verification of the storage requests is passed, the data server sorts the storage requests to generate a verification sequence, stores the verification sequence in the data server, and associates the verification sequence with a corresponding data file; and sending the encrypted data file to a plurality of storage servers for storage.
In this embodiment, the storage requests are sorted to generate a verification sequence, which is substantially to sort the contents of the storage requests, and the verification sequence is mainly used for verifying the read request sent by the data requester, which illustrates this embodiment:
when the application pursues the processing efficiency of the reading request, the file time limit, the shared user information and the private key can be sequentially sequenced to generate a verification sequence; when the reading request is processed according to the verification sequence, whether the data file corresponding to the certificate is stored in the storage server or not is verified, and then the shared user information and the private key are verified.
It should be noted that, in this embodiment, the encrypted data file is stored in a plurality of storage servers, that is, at least two storage servers, and when the data file of one storage server is damaged, the corresponding data file can be acquired through the other storage server, so that the loss of the data file can be effectively avoided.
In a preferred embodiment, the data file is detected by a plurality of storage servers comprehensively, including:
periodically scanning the stored data files, and cleaning the data files based on the storage request; and
and regularly carrying out abnormity detection on the stored data files, and managing the data files according to an abnormity detection result.
The main purpose of the embodiment is to complete the comprehensive detection of the data file through the storage server; scanning the data file regularly to obtain a corresponding file time limit, and cleaning the data file when the storage time reaches or exceeds the file time limit; stored data files are regularly detected for anomalies, and when the data files carry viruses or are obviously anomalous (incomplete, file size changed), the data files are managed (cleaned or isolated).
The abnormality detection of the present embodiment includes virus detection and content detection; the virus detection is to screen the data file according to a built-in virus detection algorithm, and if the data file has viruses, the data file is cleaned; the content detection is to detect whether the content of the data file in the storage server changes, for example, the file name is modified, or the file content is increased, and then the data file can be isolated.
In a preferred embodiment, after the chain verification of the read request is passed, the user characteristic information of the data requester, the file time limit of the data file corresponding to the read request and the private key provided by the data requester are verified through the verification sequence.
And after the verification based on the verification sequence passes, the data server generates a control instruction and sends the control instruction to the corresponding storage server, and the corresponding storage server control instruction sends the target data to the data requester through the data server.
The technical solution of the present application is exemplified:
1) Data file storage based on technical scheme of application
The data owner encrypts the data file to be stored, generates a storage request through the intelligent terminal, and sends the encrypted data file and the storage request to the data server;
the data servers perform chain verification on the storage requests, and when the chain verification of the storage requests passes, the corresponding data files are sent to at least two storage servers to be stored; meanwhile, a verification sequence is generated according to the storage request and is stored in the data server.
2) Data file reading based on technical scheme of application
A data requester generates a reading request through an intelligent terminal and sends the reading request to a data server;
the data server carries out chain verification on the reading request, when the chain verification is passed, the authority (shared user information and user characteristic information comparison), the file time limit and the secret key of the data requester are sequentially verified through a verification sequence, and after the verification is passed, a corresponding data file (target file) is called from the storage server and sent to the data requester.
The working principle of the invention is as follows:
the intelligent terminals are used for sending reading requests to the data server by a data requester; or for the data owner to send a storage request and a data file to the data server.
The data server performs linkage verification on the reading request, and after the verification is passed, target data are called from a plurality of storage servers based on the reading request; or performing chain verification on the storage requests, and storing the data files in a plurality of storage servers according to verification results.
And the storage servers comprehensively detect the stored data files and send target data to the data servers according to the control instructions of the data servers.
Although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the present invention.

Claims (5)

1. A computer network safety system based on distributed big data information interaction comprises a data server, a plurality of storage servers and a plurality of intelligent terminals, wherein the storage servers and the intelligent terminals are connected with the data server, and the computer network safety system is characterized in that:
a plurality of intelligent terminal: the data server is used for sending a reading request to the data requester; and
the data server is used for sending a storage request and a data file to the data server by a data owner;
a data server: performing chain verification on the reading request, generating a verification sequence based on the storage request after the verification is passed, and calling target data from a plurality of storage servers according to the verification result of the verification sequence; and
performing chain verification on the storage requests, and storing the data files in a plurality of storage servers according to verification results; the linkage verification comprises rationality verification and integrity verification;
a plurality of storage servers: comprehensively detecting the stored data file, and sending target data to the data server according to a control instruction of the data server;
after receiving the storage request and the data file, the data server performs chain verification based on the storage request, and the chain verification comprises the following steps:
acquiring an intelligent terminal corresponding to the storage request, and verifying the validity of the intelligent terminal; verifying the rationality of the request frequency corresponding to the storage request; verifying the integrity of the request content corresponding to the storage request;
when the legality, the rationality and the integrity are verified, judging that the chain verification of the storage request is passed;
after the chain verification of the storage request is passed, the data server sorts the storage request to generate a verification sequence, stores the verification sequence in the data server, and associates the verification sequence with a corresponding data file; sending the encrypted data file to a plurality of storage servers for storage;
a plurality of the storage servers comprehensively detect the data files, including:
periodically scanning the stored data files, and cleaning the data files based on the storage request; and
regularly carrying out anomaly detection on the stored data files, and managing the data files according to anomaly detection results; the anomaly detection comprises virus detection and content detection.
2. The computer network security system based on distributed big data information interaction is characterized in that a plurality of storage servers and a plurality of intelligent terminals perform data interaction through the data server, and the storage servers are in communication and/or electrical connection; the intelligent terminal comprises an intelligent mobile phone, a computer and a workstation.
3. The computer network security system based on distributed big data information interaction as claimed in claim 1, wherein the data owner performs data storage through the intelligent terminal, and the method comprises:
encrypting the data file by the data owner;
generating a storage request through an intelligent terminal, and sending the storage request and an encrypted data file to a data server; the storage request comprises shared user information, file time limit and a public key.
4. The computer network security system based on distributed big data information interaction as claimed in claim 1, wherein after the chain verification of the read request is passed, the user characteristic information of the data requester, the file time limit of the read request corresponding to the data file and the private key provided by the data requester are verified by the verification sequence.
5. The computer network security system based on distributed big data information interaction of claim 4, wherein after the verification based on the verification sequence passes, the data server generates a control instruction and sends the control instruction to the corresponding storage server, and the corresponding storage server sends target data to a data requester through the data server according to the control instruction.
CN202210272863.9A 2022-03-18 2022-03-18 Computer network safety system based on distributed big data information interaction Active CN114629709B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210272863.9A CN114629709B (en) 2022-03-18 2022-03-18 Computer network safety system based on distributed big data information interaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210272863.9A CN114629709B (en) 2022-03-18 2022-03-18 Computer network safety system based on distributed big data information interaction

Publications (2)

Publication Number Publication Date
CN114629709A CN114629709A (en) 2022-06-14
CN114629709B true CN114629709B (en) 2022-11-25

Family

ID=81901927

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210272863.9A Active CN114629709B (en) 2022-03-18 2022-03-18 Computer network safety system based on distributed big data information interaction

Country Status (1)

Country Link
CN (1) CN114629709B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10129211B2 (en) * 2011-09-15 2018-11-13 Stephan HEATH Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms
CN107800787B (en) * 2017-10-23 2020-10-16 图斯崆南京科技有限公司 Distributed big data real-time exchange sharing computer network system
CN110035089A (en) * 2019-04-28 2019-07-19 兰州理工大学 A kind of network security verification method and system of distributed system
CN111291046B (en) * 2020-01-16 2023-07-14 湖南城市学院 Computer big data storage control system and method
CN111885069B (en) * 2020-07-28 2021-11-02 上海易帆数据科技有限公司 Computer network safety system

Also Published As

Publication number Publication date
CN114629709A (en) 2022-06-14

Similar Documents

Publication Publication Date Title
Sutharasan et al. Design intelligence data gathering and incident response model for data security using honey pot system
CN108932189B (en) Method and device for saving server log
Dehalwar et al. Blockchain-based trust management and authentication of devices in smart grid
CN111444273B (en) Data authorization method and device based on block chain
CN105430000A (en) Cloud computing security management system
CN111756702B (en) Data security protection method, device, equipment and storage medium
US9910994B1 (en) System for assuring security of sensitive data on a host
CN111510463B (en) Abnormal behavior recognition system
CN113495920A (en) Content auditing system, method and device based on block chain and storage medium
US20230267234A1 (en) Blockchain auditing system and method
CN112651021A (en) Information security defense system based on big data
CN117040896A (en) Internet of things management method and Internet of things management platform
CN110138731A (en) A kind of network anti-attack method based on big data
CN111680282B (en) Node management method, device, equipment and medium based on block chain network
CN114629709B (en) Computer network safety system based on distributed big data information interaction
CN109413111B (en) Security access system and method based on intelligent data center
Feng et al. Autonomous Vehicles' Forensics in Smart Cities
CN113489710B (en) File sharing method, device, equipment and storage medium
CN113360575A (en) Method, device, equipment and storage medium for supervising transaction data in alliance chain
CN113204773A (en) Electronic notarization data credible exchange method based on public network and application thereof
CN112016131B (en) Distributed cloud evidence obtaining credibility verification system and method thereof
CN112751674B (en) Virtual private network access authentication method, system, equipment and readable storage medium
CN113608933B (en) Distributed backup synchronization system for public cloud tenant service sensitive data
CN114124376B (en) Data processing method and system based on network data acquisition
CN113726740B (en) Data storage method, protection method and system for secondary nodes of marine engineering equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20221102

Address after: Room 2408, Building 5, Pinshang Commercial Center, No. 1168, Xiangcheng Avenue, Xiangcheng District, Suzhou, Jiangsu Province, 215,000

Applicant after: Goodbye Digital Technology (Suzhou) Co.,Ltd.

Address before: 650051 room 1802, block B, Linlan square, Panlong District, Kunming City, Yunnan Province

Applicant before: Yunnan kunzhida Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A Computer Network Security System Based on Distributed Big Data Information Exchange

Granted publication date: 20221125

Pledgee: Bank of China Limited Suzhou Wuzhong sub branch

Pledgor: Goodbye Digital Technology (Suzhou) Co.,Ltd.

Registration number: Y2024980014348