[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105049431B - Data access control method and device - Google Patents

Data access control method and device Download PDF

Info

Publication number
CN105049431B
CN105049431B CN201510375687.1A CN201510375687A CN105049431B CN 105049431 B CN105049431 B CN 105049431B CN 201510375687 A CN201510375687 A CN 201510375687A CN 105049431 B CN105049431 B CN 105049431B
Authority
CN
China
Prior art keywords
data packet
data
application identities
packet
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510375687.1A
Other languages
Chinese (zh)
Other versions
CN105049431A (en
Inventor
卢艺
姜正文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sangfor Technologies Co Ltd
Original Assignee
Sangfor Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sangfor Technologies Co Ltd filed Critical Sangfor Technologies Co Ltd
Priority to CN201510375687.1A priority Critical patent/CN105049431B/en
Publication of CN105049431A publication Critical patent/CN105049431A/en
Application granted granted Critical
Publication of CN105049431B publication Critical patent/CN105049431B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to a kind of data access control method and devices, which comprises receives the data packet that terminal applies are sent;Judge that the data packet is sent to dedicated network, otherwise abandons the data packet by the data packet with the presence or absence of preset application identities if being judged as YES.Using this method, it is avoided that the application access dedicated network of some band viruses or wooden horse, improves the safety of data access.

Description

Data access control method and device
Technical field
The present invention relates to field of computer technology, more particularly to a kind of data access control method and device.
Background technique
VPN (Virtual Private Network) is Virtual Private Network, and function is established specially in common network With network, encryption communication is carried out.VPN Virtual Private Line refer to user by internet access VPN, then by VPN foundation with it is dedicated Network, such as the communication tunnel between corporate intranet.Only user is allowed to access corporate intranet after establishing communication tunnel, no Allow to access other networks.
In traditional technology, after terminal accesses corporate intranet by VPN, access internet is not allowed for, to prevent black Visitor invades corporate intranet by the terminal device of internet remote control user.However, if being used before accessing corporate intranet The terminal device at family has suffered virus, then the still accessible corporate intranet of virus, thus attack and infection corporate intranet, most After may cause the paralysis of entire corporate intranet.Therefore, its safety of traditional data access control method is not high.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of safer data access control method and device.
A kind of data access control method, comprising:
Receive the data packet that terminal applies are sent;
Receive the data packet that terminal applies are sent;
Judge the data packet with the presence or absence of preset application identities;
If being judged as YES, the data packet is sent to dedicated network, otherwise abandons the data packet.
The step of judgement data packet whether there is preset application identities in one of the embodiments, it Before, further includes:
Whether the destination address for judging the data packet access is private network address;
If being judged as YES, judge the data packet with the presence or absence of preset application identities.
In one of the embodiments, it is described judge whether to whether there is from the data packet received in get The step of preset application identities includes:
Extract the data of the regular length of predetermined position in the data packet;
Judge the regular length data whether successful decryption;
If being judged as YES, it is determined that the data of the regular length are the preset application identities.
The data of the regular length are led to before the terminal applies send data packet in one of the embodiments, Cross the application identities of the hook technology increased encryption of predetermined position in the packet.
The described the step of data packet is sent to dedicated network, includes: in one of the embodiments,
The preset application identities in the data packet are deleted, to obtain raw data packets;
The raw data packets are encrypted, to obtain encrypted packet;
The encrypted packet is sent to dedicated network.
A kind of data access control device, comprising:
Receiving module, for receiving the data packet of terminal applies transmission;
Processing module, for judging the data packet with the presence or absence of preset application identities, if there is described preset The data packet is then sent to dedicated network by application identities, if cannot get from the data packet received preset Application identities then abandon the data packet.
In one of the embodiments, the processing module be also used to judge data packet access destination address whether It is private network address, if so, judging the data packet with the presence or absence of preset application identities again.
The processing module includes: in one of the embodiments,
Extraction unit, for extracting the data of the regular length of predetermined position in the data packet;
Processing unit, for judge the regular length data whether successful decryption, if being judged as YES, it is determined that described The data of regular length are the preset application identities.
The data of the regular length are led to before the terminal applies send data packet in one of the embodiments, Cross the application identities of the hook technology increased encryption of predetermined position in the packet.
The processing unit is also used in one of the embodiments,
The preset application identities in the data packet are deleted, to obtain raw data packets;
The raw data packets are encrypted, to obtain encrypted packet;
The encrypted packet is sent to dedicated network.
Above-mentioned data access control method and device judge the data when receiving the data packet that terminal applies are sent Packet whether there is preset application identities, it is ensured that only pre-set application trusty can just transmit packets to dedicated Network, it is ensured that the application for accessing dedicated network is application trusty, and viral or wooden horse application may be carried by, which avoiding, visits Dedicated network is asked to bring security risk to dedicated network, therefore, above-mentioned data access control method and device can improve number According to the safety of access.
Detailed description of the invention
Fig. 1 is the applied environment figure of one embodiment data access control method;
Fig. 2 is the flow chart of data access control method in one embodiment;
Fig. 3 is the flow chart of data access control method in another embodiment;
Fig. 4 is the flow chart of data access control method in further embodiment;
Fig. 5 is the structural block diagram of data access control device in one embodiment;
Fig. 6 is the structural block diagram of processing module in one embodiment.
Specific embodiment
Data access control method provided by the embodiment of the present invention can be applied in system as shown in Figure 1, with reference to Fig. 1 Shown, data access control device receives the data packet that each terminal is sent, these data packets include the application identities with encryption Data packet and the application identities without encryption data packet, send the data packet of the application identities of band encryption using being preparatory The application trusty being arranged, and the application for sending the data packet of application identities without encryption is then considered Virus or non- Method program.List of application trusty is provided in data access control device in advance, is contained in the list of application credible Appoint using corresponding application identities.For application identities for unique identification one application, can be Apply Names is either to answer With the identification number etc. distributed.A kind of data access control method, data access control are run in data access control device Device receives data packet, data packet is handled with judge whether can from wherein getting corresponding application identities, if It can get, assert that the data packet is that application trusty is sent, be legal data packet, otherwise regard as being viral journey What sequence or illegal program were sent.Further, after the data packet encryption that data access control device sends application trusty Send VPN to, VPN is sent to corporate intranet after data packet is decrypted, and realizes visit of the application trusty to corporate intranet It asks.
As shown in Fig. 2, in one embodiment, provide a kind of data access control method, this method can be applied to as In data access control device shown in FIG. 1, specifically includes the following steps:
Step 202, the data packet that terminal applies are sent is received.
Various applications are run in the present embodiment, in terminal, when these application access dedicated network (such as corporate intranets), need to be led to VPN is crossed to access.It is equipped with data access control device between terminal and VPN, receives the data packet that terminal applies are sent, uses In access dedicated network.
Step 204, the data packet is judged with the presence or absence of preset application identities, if so, entering step 206, otherwise Enter step 208.
In the present embodiment, the application identities of trusted application are stored in advance, the application of these corresponding application identities is considered It is trusty, that is, can accesses and access dedicated network.It is set in advance if can be got from the data packet received The application identities set, then it is assumed that be the data packet that application trusty is sent, otherwise it is assumed that being Virus or illegal The data packet come transmitted by program.Specifically, hook technology can be passed through before application sends data packet in the content of data packet It is middle to be embedded in corresponding application identities, so that data access control device can get corresponding application identities from data packet.
Step 206, if being judged as YES, dedicated network is delivered a packet to.
In the present embodiment, if preset application identities can be got from the data packet received, data are deleted The application identities in packet, then deliver a packet to dedicated network.Specifically, VPN first can be sent to data packet, by VPN It is forwarded to dedicated network.Further, dedicated network is re-send to after can encrypting to data packet, further increases data biography Defeated safety, specifically, the algorithm encrypted to data packet can be asymmetric arithmetic, symmetry algorithm etc..
Step 208, otherwise, then the data packet is abandoned.
In the present embodiment, if obtained from the data packet received less than corresponding application identities, then it is assumed that be virus The data packet that program or illegal program are sent, abandons the data packet, does not allow to access dedicated network.Certainly, in other realities Apply in example, can also the legitimacy to the data packet further detected.
In the present embodiment, when receiving the data packet that terminal applies are sent, judge whether to obtain from the data packet received Get preset application identities, it is ensured that only pre-set application trusty can just transmit packets to dedicated network, The application for ensuring access dedicated network is application trusty, and the application access for avoiding possible carrying virus or wooden horse is dedicated Network is to bring security risk to dedicated network, and therefore, above-mentioned data access control method can improve the safety of data access Property.
As shown in figure 3, in one embodiment, provide a kind of data access control method, this method can be applied to as In data access control device shown in FIG. 1, specifically include:
Step 302, the data packet that terminal applies are sent is received.
Various applications are run in the present embodiment, in terminal, when these application access dedicated network (such as corporate intranets), need to be led to VPN is crossed to access.It is equipped with data access control device between terminal and VPN, receives the data packet that terminal applies are sent, uses In access dedicated network.
Step 304, the data of the regular length of the predetermined position in the data packet are extracted.
In the present embodiment, the predetermined position for the data packet that terminal applies are sent increases the application identities of encryption, described Predetermined position is preferably the preset byte of the foremost in data packet.
In one embodiment, the data of regular length are to pass through hook technology in number before terminal applies send data packet According to the application identities of the increased encryption of predetermined position in packet.
Hook technology, also referred to as API HOOK are a kind of technologies for changing API implementing result, by API HOOK, It can change the original function of API, basic method is the api function entrance modified by HOOK " contact " to needs, is changed It is directed toward new customized function in the address for becoming it.
In the present embodiment, a SDK packet is provided previously, SDK is included in application trusty, the function which realizes It can be that the data packet sent to application is linked up with, modify the content of data packet, increase in the most advanced position of packet content The application identities of encryption, wherein the application identities of encryption are the byte content of regular length.The application for being incorporated into SDK sends number When according to packet, just the application identities of encryption can be added at the front position of data content by hook technology.
Step 306, judge the regular length data whether successful decryption, if so, enter step 308, otherwise into Enter step 310.
In the present embodiment, in order to improve the safety of data access, it is to add that terminal applies are increased when sending data packet Application identities after close, the encrypted application identities are located at data packet predetermined position, and are the data of regular length.It extracts The data of the regular length are decrypted, and judge the regular length data whether successful decryption.
Step 308, the data for determining the regular length are the preset application identities.
In the present embodiment, if the data of the regular length can successful decryption, confirm the data of the regular length For the preset application identities, i.e., preset application identities can be got from the data packet received, then delete data The application identities in packet, then deliver a packet to dedicated network.Specifically, first delivering a packet to VPN, then by VPN It is forwarded to dedicated network.Further, dedicated network is re-send to after can encrypting to data packet, further increases data biography Defeated safety, specifically, the algorithm encrypted to data packet can be asymmetric arithmetic, symmetry algorithm etc..Step 310, Otherwise, then the data packet is abandoned.
In the present embodiment, if the data packet can not successful decryption, confirm that the data of the regular length are not institutes Preset application identities are stated, i.e., are obtained from the data packet received less than corresponding application identities, then it is assumed that be Virus Or the data packet that illegal program is sent, the data packet is abandoned, does not allow to access dedicated network.Certainly, in other embodiments In, can also the legitimacy to the data packet further detected.In the present embodiment, trusty apply is sending number The application identities of encryption can be increased in packet content according to before packet, if extracted from the data packet received default The data of regular length at position, and the data of the regular length can be decrypted to obtain corresponding application identities, then show It is the data packet that application trusty is sent, that is, legal data packet, is sent to dedicated network after handling data packet, it is no Then abandon the data packet, it is therefore prevented that Virus or illegal program access and access dedicated network improve data access Safety.
In one embodiment, as shown in figure 4, providing a kind of data access control method, this method can be applied to as In data access control device shown in FIG. 1, specifically include:
Step 402, the data packet that terminal applies are sent is received.
Step 404, whether the destination address for judging the data packet access is private network address, if being judged as YES, 406 are entered step, otherwise enters step 412.
In the present embodiment, data access control device detects the destination address of data packet, only allows destination address It is that private network address is just forwarded, ensure that only allows to access dedicated network, forbids accessing internet, it is logical to avoid hacker The terminal of internet-based control user is crossed to invade dedicated network (such as corporate intranet).
Step 406, the data of the regular length of predetermined position in the data packet are extracted.
In the present embodiment, the predetermined position for the data packet that terminal applies are sent increases the application identities of encryption, described Predetermined position is preferably the preset byte of the foremost in data packet.The data of regular length are that terminal applies send data packet Pass through the application identities of the hook technology increased encryption of predetermined position in the packet before.
In the present embodiment, a SDK packet is provided previously, SDK is included in application trusty, the function which realizes It can be that the data packet sent to application is linked up with, modify the content of data packet, increase in the most advanced position of packet content The application identities of encryption, wherein the application identities of encryption are the byte content of regular length.The application for being incorporated into SDK sends number When according to packet, just the application identities of encryption can be added at the front position of data content by hook technology.
Step 408, judge the regular length data whether successful decryption, if so, enter step 410, otherwise into Enter step 412.
Step 410, the preset application identities in the data packet are deleted, to obtain raw data packets;It re-encrypts The raw data packets, to obtain encrypted packet;The encrypted packet is sent to dedicated network.
In the present embodiment, when determining that data packet is sent from application trusty, then delete preset in data packet Application identities, that is, the application identities of the insertion in data packet are deleted, only retain actual content in data packet, then by data Dedicated network is sent to after packet encryption.Specifically, being sent to VPN after data packet is encrypted, it is forwarded to after being decrypted by VPN specially Use network.
Step 412, the data packet is abandoned.
In the present embodiment, if terminal applies access is not dedicated network, or corresponding application identities can not be decrypted, Then direct packet discard avoids Virus or illegal program from accessing dedicated network, improves the safety of data access.
As shown in figure 5, in one embodiment, providing a kind of data access control device, including 502 He of receiving module Processing module 504, in which:
Receiving module 502, for receiving the data packet of terminal applies transmission.
Processing module 504, for judging the data packet with the presence or absence of preset application identities, if there is described default Application identities, then the data packet is sent to dedicated network, if cannot get from the data packet received default Application identities, then abandon the data packet.
In one embodiment, the processing module is also used to judge whether the destination address of the data packet access is special With network address, if so, judging the data packet with the presence or absence of preset application identities again.
In one embodiment, as shown in fig. 6, processing module 504 includes:
Extraction unit 514, for extracting the data of the regular length of predetermined position in the data packet received.
Processing unit 524 obtains corresponding application identities for judging whether to decrypt, if being judged as YES, it is determined that institute The data for stating regular length are the preset application identities.
In one embodiment, whether the processing module 504 is also used to judge the corresponding destination address of the data packet It is private network address, if so, judging the data packet with the presence or absence of preset application identities again.
In one embodiment, the data of the regular length are to pass through extension before the terminal applies send data packet The application identities of the hook technology increased encryption of predetermined position in the packet.
In one embodiment, processing unit 524 is used to delete the preset application identities in the data packet, with Obtain raw data packets;The raw data packets are encrypted, to obtain encrypted packet;The encrypted packet is sent to private network Network.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to protection of the invention Range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (8)

1. a kind of data access control method characterized by comprising
Receive the data packet that terminal applies are sent;
The data packet is judged with the presence or absence of preset application identities, and the preset application identities are to be embedded in the data packet Application identities in content, the application identities are for unique identification one application;
If being judged as YES, the data packet is sent to dedicated network, otherwise abandons the data packet;
The step of judgement data packet whether there is preset application identities includes: to extract to preset position in the data packet Set the data of the regular length at place;Judge the regular length data whether successful decryption;If being judged as YES, it is determined that described The data of regular length are the preset application identities.
2. the method according to claim 1, wherein being answered in the judgement data packet with the presence or absence of preset Before the step of mark, further includes:
Whether the destination address for judging the data packet access is private network address;
If being judged as YES, judge the data packet with the presence or absence of preset application identities.
3. the method according to claim 1, wherein the data of the regular length are sent out in the terminal applies Send the application identities for passing through the hook technology increased encryption of predetermined position in the packet before data packet.
4. the method according to claim 1, wherein the described the step of data packet is sent to dedicated network Include:
The preset application identities in the data packet are deleted, to obtain raw data packets;
The raw data packets are encrypted, to obtain encrypted packet;
The encrypted packet is sent to dedicated network.
5. a kind of data access control device characterized by comprising
Receiving module, for receiving the data packet of terminal applies transmission;
Processing module, for judging the data packet with the presence or absence of preset application identities, the preset application identities are embedding Enter the application identities in the packet content, if there is the preset application identities, then sends the data packet The data packet, institute are abandoned to dedicated network if preset application identities cannot be got from the data packet received Application identities are stated to apply for unique identification one;
The processing module includes: extraction unit, for extracting the data of the regular length of predetermined position in the data packet; Processing unit, for judge the regular length data whether successful decryption, if being judged as YES, it is determined that the regular length Data be the preset application identities.
6. device according to claim 5, which is characterized in that the processing module is also used to judge the data packet access Destination address whether be private network address, if so, judging the data packet with the presence or absence of preset application identities again.
7. device according to claim 5, which is characterized in that the data of the regular length are sent out in the terminal applies Send the application identities for passing through the hook technology increased encryption of predetermined position in the packet before data packet.
8. device according to claim 5, which is characterized in that the processing unit is also used to
The preset application identities in the data packet are deleted, to obtain raw data packets;
The raw data packets are encrypted, to obtain encrypted packet;
The encrypted packet is sent to dedicated network.
CN201510375687.1A 2015-06-30 2015-06-30 Data access control method and device Active CN105049431B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510375687.1A CN105049431B (en) 2015-06-30 2015-06-30 Data access control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510375687.1A CN105049431B (en) 2015-06-30 2015-06-30 Data access control method and device

Publications (2)

Publication Number Publication Date
CN105049431A CN105049431A (en) 2015-11-11
CN105049431B true CN105049431B (en) 2019-02-15

Family

ID=54455642

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510375687.1A Active CN105049431B (en) 2015-06-30 2015-06-30 Data access control method and device

Country Status (1)

Country Link
CN (1) CN105049431B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529280A (en) * 2016-10-20 2017-03-22 乐视控股(北京)有限公司 Method and device for controlling VPN application of mobile equipment
CN110035041B (en) * 2018-01-12 2020-11-17 华为技术有限公司 Method and equipment for identifying application attack source
CN108566643A (en) * 2018-04-24 2018-09-21 深信服科技股份有限公司 APP access control methods, system, terminal device and storage medium
CN111030976A (en) * 2019-04-26 2020-04-17 哈尔滨安天科技集团股份有限公司 Distributed access control method and device based on secret key and storage equipment
CN111107078B (en) * 2019-12-16 2023-04-07 达闼机器人股份有限公司 Application access method, robot control unit, server and storage medium
CN113779021B (en) * 2021-02-03 2024-05-17 西安京迅递供应链科技有限公司 Data processing method, device, computer system and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101636998A (en) * 2006-08-03 2010-01-27 思杰系统有限公司 Systems and methods for application based interception ssi/vpn traffic
CN103384250A (en) * 2006-08-03 2013-11-06 思杰系统有限公司 Systems and methods for application-based interception and authorization of ssl/vpn traffic
CN103973712A (en) * 2014-05-29 2014-08-06 段超 Access control method and device for network data

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8826388B2 (en) * 2012-02-16 2014-09-02 Sonicwall, Inc. Mobile device identify factor for access control policies
CN103166960A (en) * 2013-03-01 2013-06-19 北京神州绿盟信息安全科技股份有限公司 Access control method and access control device
US9143481B2 (en) * 2013-06-06 2015-09-22 Apple Inc. Systems and methods for application-specific access to virtual private networks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101636998A (en) * 2006-08-03 2010-01-27 思杰系统有限公司 Systems and methods for application based interception ssi/vpn traffic
CN103384250A (en) * 2006-08-03 2013-11-06 思杰系统有限公司 Systems and methods for application-based interception and authorization of ssl/vpn traffic
CN103973712A (en) * 2014-05-29 2014-08-06 段超 Access control method and device for network data

Also Published As

Publication number Publication date
CN105049431A (en) 2015-11-11

Similar Documents

Publication Publication Date Title
CN105049431B (en) Data access control method and device
US11190494B2 (en) Application whitelist using a controlled node flow
US11381557B2 (en) Secure data transmission using a controlled node flow
US9686294B2 (en) Protection of communication on a vehicular network via a remote security service
US8635441B2 (en) Encryption-based control of network traffic
US8930548B2 (en) Mobile link system, method and apparatus
US20130332724A1 (en) User-Space Enabled Virtual Private Network
US20170195348A1 (en) Monitoring Traffic in a Computer Network
CN104113548B (en) A kind of message identifying processing method and processing device
CN104994094B (en) Virtual platform safety protecting method based on virtual switch, device and system
US20150195251A1 (en) Packet analysis apparatus and method and virtual private network server
KR101847636B1 (en) Method and apprapatus for watching encrypted traffic
CN114979069B (en) Domain name resolution request processing method, storage medium and electronic equipment
KR101040543B1 (en) Detection system and detecting method for the cryptographic data in SSH
KR20130035600A (en) Method and apparatus for preventing data loss
CN105162789B (en) A kind of data encryption/decryption method and device
AU2015301504B2 (en) End point secured network
KR101047994B1 (en) Network based terminal authentication and security method
CN112580056A (en) Terminal device, data encryption method, data decryption method and electronic device
CN105577609B (en) Method and apparatus for being controlled the content of access
US20190334998A1 (en) Sensor For Detecting Measured Values; Method, Device And Computer-Readable Storage Medium With Instructions For Processing Measured Values From A Sensor
KR101713191B1 (en) Access point for preventing malignant action using prior testing of malignant data and method of the same
WO2018112796A1 (en) Service data policy control method, operator device and server
KR20140004703A (en) Controlled security domains
CN107395764B (en) Method and system for data exchange between devices in different data domains

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 518000 the first floor of A1 building, Nanshan Zhiyuan 1001, Nanshan District Xue Yuan Avenue, Shenzhen, Guangdong.

Applicant after: SINFOR Polytron Technologies Inc

Address before: 518000 the first floor of A1 building, Nanshan Zhiyuan 1001, Nanshan District Xue Yuan Avenue, Shenzhen, Guangdong.

Applicant before: Shenxinfu Electronics Science and Technology Co., Ltd., Shenzhen

GR01 Patent grant
GR01 Patent grant