CN115113918B - Custom setting method for financial auditing rules - Google Patents

Custom setting method for financial auditing rules Download PDF

Info

Publication number
CN115113918B
CN115113918B CN202210858349.3A CN202210858349A CN115113918B CN 115113918 B CN115113918 B CN 115113918B CN 202210858349 A CN202210858349 A CN 202210858349A CN 115113918 B CN115113918 B CN 115113918B
Authority
CN
China
Prior art keywords
custom
user
configuration
code
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210858349.3A
Other languages
Chinese (zh)
Other versions
CN115113918A (en
Inventor
王泽�
翁崇凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Lingcai Technology Co ltd
Original Assignee
Beijing Lingcai Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Lingcai Technology Co ltd filed Critical Beijing Lingcai Technology Co ltd
Priority to CN202210858349.3A priority Critical patent/CN115113918B/en
Publication of CN115113918A publication Critical patent/CN115113918A/en
Application granted granted Critical
Publication of CN115113918B publication Critical patent/CN115113918B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to the technical field of custom configuration of financial auditing rules, and discloses a custom setting method of financial auditing rules, which comprises the following steps: the operation and supervision system for constructing the custom setting of the financial auditing rules is characterized in that a custom configuration user obtains custom configuration financial auditing rule authorities on a custom authority determining module, the custom configuration user selects to start the custom financial auditing rules on an operation interface of the custom setting module, and the custom configuration financial auditing rule authorities of the custom configuration user are supervised by a custom control module, and after the custom authority of the custom configuration user is confirmed, the custom setting module is authorized to execute the custom configuration operation of the custom configuration user, so that the custom configuration function of the financial auditing rule custom setting is achieved, the effective supervision of the custom operation authorities is realized, and the custom setting function is stopped from being abused by an unauthorized user.

Description

Custom setting method for financial auditing rules
Technical Field
The invention relates to the technical field of custom configuration of financial auditing rules, in particular to a custom setting method of financial auditing rules.
Background
The financial reimbursement work is the core work of enterprise financial management work, and financial information is timely, safely, truly and normally recorded and analyzed through the financial reimbursement system, so that enterprise financial audit work is completed. With the gradual development of information technology, enterprise-level financial application management systems are continuously upgraded, and more enterprises select to use electronic information auditing systems, so that the working efficiency is improved, and the labor cost is reduced.
The invention provides a self-defining setting method of financial auditing rules based on an electronic information auditing system, which can carry out self-defining setting on the financial auditing rules.
Disclosure of Invention
(one) solving the technical problems
Based on an electronic information auditing system, the invention provides a financial auditing rule custom setting method which has a financial auditing rule custom setting function, effectively supervises custom operation authorities of custom configuration users, and prevents unauthorized users from abusing the custom setting function.
(II) technical scheme
In order to achieve the above purpose, the present invention provides the following technical solutions:
a self-defined setting method of financial auditing rules comprises the following steps:
step1, constructing a financial auditing rule custom setting operation and supervision system, which comprises the following steps: the system comprises a custom setting module, a custom control module, a custom right determining module and a custom user management module;
step2, the custom configuration user acquires custom configuration financial auditing rule authority on a custom authority confirming module, and the custom authority confirming module packages and combines the authority of the custom configuration user into a confirmed authority group and transmits the confirmed authority group to a custom user management module for storage;
step3, the user-defined configuration user selects to start the user-defined financial auditing rule and user-defined configuration of the type and operation of the financial auditing on an operation interface of the user-defined setting module;
step4, supervising the custom configuration financial auditing rule authority of the custom configuration user, comparing the authority parameter calculated according to the authority confirming parameter sent by the custom configuration user with the authority parameter directly sent by the custom configuration user, if the authority parameter is the same as the authority parameter, proving that the custom configuration user is a legal authority confirming user, and confirming the custom authority of the custom configuration user by the custom control module;
step5, after confirming the custom authority of the custom configuration user, the custom control module authorizes the custom setting module to execute the custom configuration operation of the custom configuration user.
Preferably, the custom control module monitors custom configuration financial auditing rule authority of the custom configuration user, and the specific method is as follows:
the user-defined configuration user randomly selects an integer on a cyclic group, then calculates a validation parameter { disposable system self-control code based on the user-defined control module of the user-defined configuration user, disposable authority supervision code based on the user-defined configuration user, disposable authority configuration code based on the user-defined configuration user, disposable user-defined setting code based on the user-defined configuration user }, and sends the validation parameter { disposable system self-control code based on the user-defined configuration user, disposable authority supervision code based on the user-defined configuration user };
after receiving the authorization parameters, the authorization supervision module calculates and obtains a disposable system self-control code according to the authorization parameters, the authorization configuration code of the user and the system self-control code of the user-defined control module, and combines the authorization parameters to calculate and obtain the authorization configuration code of the user-defined configuration, the employee number and the connection character string of the user-defined authorization code, and calculates and obtains the disposable authorization configuration code based on the connection character string and the authorization configuration code of the user-defined configuration.
Preferably, the custom configuration user obtains the custom setting code, the authority configuration code and the custom authority code from the custom authority confirming module, and transmits the employee number of the custom configuration user to the custom authority confirming module, and the custom authority configuration code, the employee number and the custom authority code of the custom configuration user are packed and combined into a right data group to be transmitted to the custom user management module for storage by the custom authority confirming module.
Preferably, the custom control module invokes corresponding data to the custom user management module and the custom right confirming module, monitors custom configuration financial auditing rule rights of the custom configuration user, compares a one-time right configuration code obtained by calculation according to the right confirming parameters sent by the custom configuration user with a one-time right configuration code directly sent by the custom configuration user, if the one-time right configuration code is the same, the custom configuration user is proved to be a legal right confirming user, and the custom control module confirms the custom rights of the custom configuration user.
(III) beneficial technical effects
Compared with the prior art, the invention has the following beneficial technical effects:
the invention has the function of custom setting of financial auditing rules by configuring the custom setting module, monitors the operation authority of the custom setting user by the custom control module, and authorizes the custom setting module to execute the custom setting operation of the custom setting user after confirming the custom authority of the custom setting user, thereby realizing the effective supervision of the custom operation authority of the custom setting user and avoiding the unauthorized user from abusing the custom setting function.
Detailed Description
The self-defining setting method of the financial auditing rule comprises the following steps:
step1, constructing a self-defined setting operation and supervision system of the financial auditing rules, wherein the self-defined setting operation and supervision system comprises a self-defined setting module for self-defining configuration of the financial auditing rules, and an operation interface of the self-defined setting module is configured with: whether to open the custom financial audit rule, whether to custom configure the type and operation of the financial audit;
the operation and supervision system for custom setting of the financial auditing rules further comprises: the custom control module is used for supervising the custom configuration financial auditing rule authority, the custom confirming module is used for acquiring the custom configuration financial auditing rule authority, and the custom user management module is used for storing the authority configuration code and the custom authority code of the custom configuration user;
the custom right confirming module packages and encapsulates the right configuration code and the custom right code distributed to the custom configuration user into an array, and transmits the array to the custom user management module;
the self-defined control module is used for calling corresponding data from the self-defined user management module and the self-defined right confirming module in the process of carrying out operation right supervision on the self-defined configuration user, and authorizing the self-defined setting module to execute self-defined configuration operation of the self-defined configuration user after confirming the self-defined right of the self-defined configuration user;
step2, the custom configuration user acquires custom configuration financial auditing rule authority from the custom right confirming module, and the custom right confirming module performs the following system initialization operation and discloses the following parameters to the custom control module:
selecting two large prime numbers p and q, satisfying the prime factor that q is p-1, namely q| (p-1), and selecting a strong unidirectional hash function h when g is a generator with the upper order q of a finite group GF (p);
the self-defined control module randomly selects one own system self-control code Cc sc ∈Z q * Calculating authority supervision code thereofAnd is also provided withThe authority supervision code Pc sc Transmitting the data to a custom right determining module;
the custom authorization module configures the user U to the custom i Generating element g with public parameter { big prime number p, big prime number q, finite group GF (p) upper order q, strong unidirectional hash function h, authority supervision code Pc of custom control module sc };
Any custom configuration user U i Randomly selecting one self-defined setting code Cc i ∈Z q Calculating the authority configuration code thereofThen the authority configuration code Pc i Associated with the employee number En of its own i Together transmitted to a custom authority-confirming module, and the custom authority-confirming module configures the code Pc according to the authority i And employee number En i Automatically configuring user U for customization i Distributing custom rights code CP i
The custom right determining module configures the user U in a custom way i Permission configuration code Pc i Employee number En i And custom rights code CP i Packing and combining into a weight group { custom configuration user U ] i Rights configuration code Pc i Employee number En i Custom rights code CP i Transmitting the right array to a user-defined user management module for storage;
step3, when the financial system detects that the after-sales department creates the operations of exchanging and making up orders and manually placing and importing orders, the financial auditing system sends instructions to an operation and supervision system of the financial auditing rule custom setting, and the operation and supervision system automatically pops up an operation interface of the custom setting module;
step4, user U is configured in a user-defined manner i In the process of selecting and starting the custom financial auditing rule and custom configuring the type and operation of the financial auditing on the operation interface of the custom setting module, the custom control module aims at the custom configuration user U i Is monitored by custom configuration of financial audit rule authorityThe specific method of the pipe is as follows:
custom configuration user U i Randomly selecting an integer k i ∈Z q The following calculation operations are then performed:
step4-1, calculate Cc sc-F =Pc sc ki modp;
Step4-2, calculate
Step4-3, calculate Pc i-F =h(h((Pc i ||En i ||CP i ))||Pc sc-F ||g ki )modq;
Step4-4, calculate Cc i-F =k i -Cc i Pc i-F modq;
Wherein, the connection of the characters is represented by the coincidence I;
(Pc i ||En i ||CP i ) Representation is based on custom configuration of user U i Permission configuration code Pc i Employee number En i Custom rights code CP i Is a string of connection characters;
Cc sc-F user U whose representation is based on custom configuration i The self-defined control module of the system comprises a disposable system self-control code of the self-defined control module;
Pc sc-F user U whose representation is based on custom configuration i Is a one-time authority supervision code;
Pc i-F user U whose representation is based on custom configuration i Is a one-time authority configuration code;
Cc i-F user U whose representation is based on custom configuration i Is provided with a one-time custom setting code;
custom configuration user U i Will confirm the weight parameter (Pc) sc-F ,Pc i-F ,Cc i-F ) Sending the information to an authority supervision module;
step5, the rights management module receives the validation parameters (Pc) sc-F ,Pc i-F ,Cc i-F ) Firstly, the corresponding user management module and the custom right determining module are calledData, and then begins to perform the following computing operations:
step5-1, calculate
Step5-2, calculate
Step5-3, calculate
Wherein Cc' sc-F Representing the basis of the validation parameters (Pc) sc-F ,Pc i-F ,Cc i-F ) User U for custom configuration i Permission configuration code Pc i System self-control code Cc of self-defined control module sc Calculating the obtained disposable system automatic control code;
(Pc i ||En i ||CP i ) Representing the basis of the validation parameters (Pc) sc-F ,Pc i-F ,Cc i-F ) Combined with disposable system self-control code Cc' sc-F User U with custom configuration obtained by calculation i Permission configuration code Pc i Employee number En i Custom rights code CP i Is a string of connection characters;
Pc′ i-F representation is based on (Pc) i ||En i ||CP i ) ' and custom configuration user- i Permission configuration code Pc i The disposable authority configuration code is obtained through calculation;
pc' i-F Pc directly received by right supervision module i-F In contrast, if the same, it is verified that (Pc i ||En i ||CP i ) ' and the certainty weight group { custom configuration user U ] stored in custom user management Module i Rights configuration code Pc i Employee number En i Custom rights code CP i Identical, certifying custom configuration user U i For legal user, the user-defined control module confirms user-defined configuration userU i Authorization of custom settings module to execute custom configuration user U i Is provided.

Claims (2)

1. A method for custom setting of financial auditing rules, comprising the steps of:
step1, constructing a financial auditing rule custom setting operation and supervision system, which comprises the following steps: the system comprises a custom setting module, a custom control module, a custom right determining module and a custom user management module;
step2, the custom configuration user acquires custom configuration financial auditing rule rights on a custom right confirming module, the custom right confirming module packages and combines the rights of the custom configuration user into a right data group and transmits the right data group to a custom user management module for storage, and the specific process is as follows:
the custom right confirming module performs the following system initialization operation and discloses the following parameters to the custom control module:
selecting two large prime numbers p and q, satisfying the prime factor that q is p-1, namely q| (p-1), and selecting a strong unidirectional hash function h when g is a generator with the upper order q of a finite group GF (p);
the self-defined control module randomly selects one own system self-control code Cc sc ∈Z q * Calculating authority supervision code thereofAnd the authority supervision code Pc sc Transmitting the data to a custom right determining module;
the custom authorization module configures the user U to the custom i The following parameters are disclosed:
big prime number p, big prime number q, generator g with finite group GF (p) upper order q, strong unidirectional hash function h, authority supervision code Pc of custom control module sc
Any custom configuration user U i Randomly selecting one self-defined setting code Cc i ∈Z q * Calculating the authority configuration code thereofThen the authority configuration code Pc i Associated with the employee number En of its own i Together transmitted to a custom authority-confirming module, and the custom authority-confirming module configures the code Pc according to the authority i And employee number En i Automatically configuring user U for customization i Distributing custom rights code CP i
The custom right determining module configures the user U in a custom way i Permission configuration code Pc i Employee number En i And custom rights code CP i Packing and combining into a weight group { custom configuration user U ] i Rights configuration code Pc i Employee number En i Custom rights code CP i };
Step3, the user-defined configuration user selects to start the user-defined financial auditing rule and user-defined configuration of the type and operation of the financial auditing on an operation interface of the user-defined setting module;
step4, supervising the custom configuration financial auditing rule authority of the custom configuration user, comparing the authority parameter calculated according to the authority confirming parameter sent by the custom configuration user with the authority parameter directly sent by the custom configuration user, if the authority parameter is the same, proving the custom configuration user as a legal authority confirming user, and confirming the custom authority of the custom configuration user by a custom control module, wherein the specific process is as follows:
custom configuration user U i Randomly selecting an integer k i ∈Z q * The following calculation operations are then performed:
step4-1, calculate Cc sc-F =Pc sc ki modp;
Step4-2, calculate
Step4-3, calculate Pc i-F =h(h((Pc i ||En i ||CP i ))||Pc sc-F ||g ki )modq;
Step4-4, calculate Cc i-F =k i -Cc i Pc i-F modq;
Wherein, the connection of the characters is represented by the coincidence I;
(Pc i ||En i ||CP i ) User U whose representation is based on custom configuration i Permission configuration code Pc i Employee number En i Custom rights code CP i Is a string of connection characters;
Cc sc-F user U whose representation is based on custom configuration i The self-defined control module of the system comprises a disposable system self-control code of the self-defined control module;
Pc sc-F user U whose representation is based on custom configuration i Is a one-time authority supervision code;
Pc i-F user U whose representation is based on custom configuration i Is a one-time authority configuration code;
Cc i-F user U whose representation is based on custom configuration i Is provided with a one-time custom setting code;
custom configuration user U i Will confirm the weight parameter (Pc) sc-F ,Pc i-F ,Cc i-F ) Sending the information to an authority supervision module;
step5, the rights management module receives the validation parameters (Pc) sc-F ,Pc i-F ,Cc i-F ) Firstly, the corresponding data is called to the user-defined user management module and the user-defined right-confirming module, and then the following calculation operation is started:
step5-1, calculate
Step5-2, calculate
Step5-3, calculate
Wherein Cc ΄ sc-F Representing parameters according to the right of the person(Pc sc-F ,Pc i-F ,Cc i-F ) User U for custom configuration i Permission configuration code Pc i System self-control code Cc of self-defined control module sc Calculating the obtained disposable system automatic control code;
(Pc i ||En i ||CP i ) Representing the basis of the validation parameters (Pc) sc-F ,Pc i-F ,Cc i-F ) Combined disposable system self-control code Cc ΄ sc-F User U with custom configuration obtained by calculation i Permission configuration code Pc i Employee number En i Custom rights code CP i Is a string of connection characters;
Pc΄ i-F representation is based on (Pc) i ||En i ||CP i ) ΄ and custom configuration user U i Permission configuration code Pc i The disposable authority configuration code is obtained through calculation;
pc ΄ i-F Pc directly received by right supervision module i-F In contrast, if the same, it is verified that (Pc i ||En i ||CP i ) ΄ and the certainty weight group { custom configuration user U ] stored in the custom user management module i Rights configuration code Pc i Employee number En i Custom rights code CP i Identical, certifying custom configuration user U i Is a legal and authorized user;
the custom control module authorizes the custom setting module to execute the custom configuration operation of the custom configuration user after confirming the custom authority of the custom configuration user.
2. The method of claim 1, wherein the method is performed on a financial audit rule custom setup operation and supervision system;
the operation and supervision system for custom setting of the financial auditing rules comprises: the system comprises a custom setting module, a custom control module, a custom right determining module and a custom user management module;
the custom setting module is used for custom configuring financial auditing rules, and the operation interface is configured with: whether to open the custom financial audit rule, whether to custom configure the type and operation of the financial audit;
the custom control module is used for supervising custom configuration financial auditing rule authority;
the custom right confirming module is used for obtaining custom configured financial auditing rule rights;
the custom user management module is used for storing the custom configuration code and the custom permission code of the custom configuration user;
the custom authority confirming module packages and encapsulates the authority configuration code and the custom authority code distributed to the custom configuration user into an array, and transmits the array to the custom user management module;
in the process of supervising the operation authority of the user, the user-defined control module needs to call corresponding data to the user-defined user management module and the user-defined authority confirming module, and the user-defined control module authorizes the user-defined setting module to execute the user-defined configuration operation of the user-defined configuration user after confirming the user-defined authority of the user-defined configuration user.
CN202210858349.3A 2022-07-20 2022-07-20 Custom setting method for financial auditing rules Active CN115113918B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210858349.3A CN115113918B (en) 2022-07-20 2022-07-20 Custom setting method for financial auditing rules

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210858349.3A CN115113918B (en) 2022-07-20 2022-07-20 Custom setting method for financial auditing rules

Publications (2)

Publication Number Publication Date
CN115113918A CN115113918A (en) 2022-09-27
CN115113918B true CN115113918B (en) 2023-08-04

Family

ID=83333895

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210858349.3A Active CN115113918B (en) 2022-07-20 2022-07-20 Custom setting method for financial auditing rules

Country Status (1)

Country Link
CN (1) CN115113918B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007096558A2 (en) * 2006-02-21 2007-08-30 France Telecom Access rights monitoring device and local access rights management module
CN102073921A (en) * 2010-12-08 2011-05-25 中国测绘科学研究院 Data management system based on rule knowledge base for automatic check
CN105046446A (en) * 2015-08-14 2015-11-11 北京京东尚科信息技术有限公司 Workflow frame based user-defined permission flow method and system
CN105426754A (en) * 2015-11-13 2016-03-23 上海斐讯数据通信技术有限公司 Permission management method and permission management system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007096558A2 (en) * 2006-02-21 2007-08-30 France Telecom Access rights monitoring device and local access rights management module
CN102073921A (en) * 2010-12-08 2011-05-25 中国测绘科学研究院 Data management system based on rule knowledge base for automatic check
CN105046446A (en) * 2015-08-14 2015-11-11 北京京东尚科信息技术有限公司 Workflow frame based user-defined permission flow method and system
CN105426754A (en) * 2015-11-13 2016-03-23 上海斐讯数据通信技术有限公司 Permission management method and permission management system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
财务共享未来图景;王泽,翁崇凌;《首席财务官》;10-15 *

Also Published As

Publication number Publication date
CN115113918A (en) 2022-09-27

Similar Documents

Publication Publication Date Title
US11362814B1 (en) Autonomous devices
CN103729940B (en) A kind of main cipher key T MK method for safely downloading of terminal and system
CN103138934B (en) Safe key generating means and safe key generate method
JP6349347B2 (en) Physically secure authorization for utility applications
CN102752269B (en) Based on the method for the authentication of cloud computing, system and cloud server
CN102648610B (en) The strong authentication token used together with supplier can be independently applied with multiple
CN102013982B (en) Long-distance encryption method, management method, as well as encryption management method, device and system
CN107534855A (en) The authority of remote control targeted security element and the method for right
KR20200076714A (en) Method and control system for controlling and/or monitoring devices
CN103679062A (en) Intelligent electric meter main control chip and security encryption method
CN110753344B (en) NB-IoT-based smart meter secure access system
WO2011149214A3 (en) Three-factor user authentication method for generating otp using iris information and secure mutual authentication system using otp authentication module of wireless communication terminal
CN115114658B (en) Verifiable data transaction method, device, equipment and medium based on blockchain
CN104283675A (en) Concentrator, electricity meter and message processing method of concentrator and electricity meter
CN205945769U (en) Quantum key chip
CN104125230A (en) Short message authentication service system and authentication method
CN101305542A (en) Method for downloading digital certificate and cryptographic key
US20230299971A1 (en) Data protection apparatus, electronic apparatus, method, and storage medium
CN103780401B (en) Charging method and system
CN115113918B (en) Custom setting method for financial auditing rules
CN116599719A (en) User login authentication method, device, equipment and storage medium
CN116418480A (en) Hash function-based chaotic encryption intelligent ammeter and encryption method thereof
CN114124403A (en) Method, device and system for realizing remote control of equipment
EP3729850B1 (en) A method for controlling by a server the use of at least one data element of a data owner
CN210157214U (en) Internet of things information security transmission system for gas appliances

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 601-022, floor 6, No. 15, wanquanzhuang Road, Haidian District, Beijing 100089

Applicant after: BEIJING LINGCAI TECHNOLOGY CO.,LTD.

Address before: Room 601-022, 6th Floor, No. 15 Wanquanzhuang Road, Mentougou District, Beijing 100089

Applicant before: BEIJING LINGCAI TECHNOLOGY CO.,LTD.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant