CN105049431B - Data access control method and device - Google Patents
Data access control method and device Download PDFInfo
- Publication number
- CN105049431B CN105049431B CN201510375687.1A CN201510375687A CN105049431B CN 105049431 B CN105049431 B CN 105049431B CN 201510375687 A CN201510375687 A CN 201510375687A CN 105049431 B CN105049431 B CN 105049431B
- Authority
- CN
- China
- Prior art keywords
- data packet
- data
- application identities
- packet
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention relates to a kind of data access control method and devices, which comprises receives the data packet that terminal applies are sent;Judge that the data packet is sent to dedicated network, otherwise abandons the data packet by the data packet with the presence or absence of preset application identities if being judged as YES.Using this method, it is avoided that the application access dedicated network of some band viruses or wooden horse, improves the safety of data access.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of data access control method and device.
Background technique
VPN (Virtual Private Network) is Virtual Private Network, and function is established specially in common network
With network, encryption communication is carried out.VPN Virtual Private Line refer to user by internet access VPN, then by VPN foundation with it is dedicated
Network, such as the communication tunnel between corporate intranet.Only user is allowed to access corporate intranet after establishing communication tunnel, no
Allow to access other networks.
In traditional technology, after terminal accesses corporate intranet by VPN, access internet is not allowed for, to prevent black
Visitor invades corporate intranet by the terminal device of internet remote control user.However, if being used before accessing corporate intranet
The terminal device at family has suffered virus, then the still accessible corporate intranet of virus, thus attack and infection corporate intranet, most
After may cause the paralysis of entire corporate intranet.Therefore, its safety of traditional data access control method is not high.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of safer data access control method and device.
A kind of data access control method, comprising:
Receive the data packet that terminal applies are sent;
Receive the data packet that terminal applies are sent;
Judge the data packet with the presence or absence of preset application identities;
If being judged as YES, the data packet is sent to dedicated network, otherwise abandons the data packet.
The step of judgement data packet whether there is preset application identities in one of the embodiments, it
Before, further includes:
Whether the destination address for judging the data packet access is private network address;
If being judged as YES, judge the data packet with the presence or absence of preset application identities.
In one of the embodiments, it is described judge whether to whether there is from the data packet received in get
The step of preset application identities includes:
Extract the data of the regular length of predetermined position in the data packet;
Judge the regular length data whether successful decryption;
If being judged as YES, it is determined that the data of the regular length are the preset application identities.
The data of the regular length are led to before the terminal applies send data packet in one of the embodiments,
Cross the application identities of the hook technology increased encryption of predetermined position in the packet.
The described the step of data packet is sent to dedicated network, includes: in one of the embodiments,
The preset application identities in the data packet are deleted, to obtain raw data packets;
The raw data packets are encrypted, to obtain encrypted packet;
The encrypted packet is sent to dedicated network.
A kind of data access control device, comprising:
Receiving module, for receiving the data packet of terminal applies transmission;
Processing module, for judging the data packet with the presence or absence of preset application identities, if there is described preset
The data packet is then sent to dedicated network by application identities, if cannot get from the data packet received preset
Application identities then abandon the data packet.
In one of the embodiments, the processing module be also used to judge data packet access destination address whether
It is private network address, if so, judging the data packet with the presence or absence of preset application identities again.
The processing module includes: in one of the embodiments,
Extraction unit, for extracting the data of the regular length of predetermined position in the data packet;
Processing unit, for judge the regular length data whether successful decryption, if being judged as YES, it is determined that described
The data of regular length are the preset application identities.
The data of the regular length are led to before the terminal applies send data packet in one of the embodiments,
Cross the application identities of the hook technology increased encryption of predetermined position in the packet.
The processing unit is also used in one of the embodiments,
The preset application identities in the data packet are deleted, to obtain raw data packets;
The raw data packets are encrypted, to obtain encrypted packet;
The encrypted packet is sent to dedicated network.
Above-mentioned data access control method and device judge the data when receiving the data packet that terminal applies are sent
Packet whether there is preset application identities, it is ensured that only pre-set application trusty can just transmit packets to dedicated
Network, it is ensured that the application for accessing dedicated network is application trusty, and viral or wooden horse application may be carried by, which avoiding, visits
Dedicated network is asked to bring security risk to dedicated network, therefore, above-mentioned data access control method and device can improve number
According to the safety of access.
Detailed description of the invention
Fig. 1 is the applied environment figure of one embodiment data access control method;
Fig. 2 is the flow chart of data access control method in one embodiment;
Fig. 3 is the flow chart of data access control method in another embodiment;
Fig. 4 is the flow chart of data access control method in further embodiment;
Fig. 5 is the structural block diagram of data access control device in one embodiment;
Fig. 6 is the structural block diagram of processing module in one embodiment.
Specific embodiment
Data access control method provided by the embodiment of the present invention can be applied in system as shown in Figure 1, with reference to Fig. 1
Shown, data access control device receives the data packet that each terminal is sent, these data packets include the application identities with encryption
Data packet and the application identities without encryption data packet, send the data packet of the application identities of band encryption using being preparatory
The application trusty being arranged, and the application for sending the data packet of application identities without encryption is then considered Virus or non-
Method program.List of application trusty is provided in data access control device in advance, is contained in the list of application credible
Appoint using corresponding application identities.For application identities for unique identification one application, can be Apply Names is either to answer
With the identification number etc. distributed.A kind of data access control method, data access control are run in data access control device
Device receives data packet, data packet is handled with judge whether can from wherein getting corresponding application identities, if
It can get, assert that the data packet is that application trusty is sent, be legal data packet, otherwise regard as being viral journey
What sequence or illegal program were sent.Further, after the data packet encryption that data access control device sends application trusty
Send VPN to, VPN is sent to corporate intranet after data packet is decrypted, and realizes visit of the application trusty to corporate intranet
It asks.
As shown in Fig. 2, in one embodiment, provide a kind of data access control method, this method can be applied to as
In data access control device shown in FIG. 1, specifically includes the following steps:
Step 202, the data packet that terminal applies are sent is received.
Various applications are run in the present embodiment, in terminal, when these application access dedicated network (such as corporate intranets), need to be led to
VPN is crossed to access.It is equipped with data access control device between terminal and VPN, receives the data packet that terminal applies are sent, uses
In access dedicated network.
Step 204, the data packet is judged with the presence or absence of preset application identities, if so, entering step 206, otherwise
Enter step 208.
In the present embodiment, the application identities of trusted application are stored in advance, the application of these corresponding application identities is considered
It is trusty, that is, can accesses and access dedicated network.It is set in advance if can be got from the data packet received
The application identities set, then it is assumed that be the data packet that application trusty is sent, otherwise it is assumed that being Virus or illegal
The data packet come transmitted by program.Specifically, hook technology can be passed through before application sends data packet in the content of data packet
It is middle to be embedded in corresponding application identities, so that data access control device can get corresponding application identities from data packet.
Step 206, if being judged as YES, dedicated network is delivered a packet to.
In the present embodiment, if preset application identities can be got from the data packet received, data are deleted
The application identities in packet, then deliver a packet to dedicated network.Specifically, VPN first can be sent to data packet, by VPN
It is forwarded to dedicated network.Further, dedicated network is re-send to after can encrypting to data packet, further increases data biography
Defeated safety, specifically, the algorithm encrypted to data packet can be asymmetric arithmetic, symmetry algorithm etc..
Step 208, otherwise, then the data packet is abandoned.
In the present embodiment, if obtained from the data packet received less than corresponding application identities, then it is assumed that be virus
The data packet that program or illegal program are sent, abandons the data packet, does not allow to access dedicated network.Certainly, in other realities
Apply in example, can also the legitimacy to the data packet further detected.
In the present embodiment, when receiving the data packet that terminal applies are sent, judge whether to obtain from the data packet received
Get preset application identities, it is ensured that only pre-set application trusty can just transmit packets to dedicated network,
The application for ensuring access dedicated network is application trusty, and the application access for avoiding possible carrying virus or wooden horse is dedicated
Network is to bring security risk to dedicated network, and therefore, above-mentioned data access control method can improve the safety of data access
Property.
As shown in figure 3, in one embodiment, provide a kind of data access control method, this method can be applied to as
In data access control device shown in FIG. 1, specifically include:
Step 302, the data packet that terminal applies are sent is received.
Various applications are run in the present embodiment, in terminal, when these application access dedicated network (such as corporate intranets), need to be led to
VPN is crossed to access.It is equipped with data access control device between terminal and VPN, receives the data packet that terminal applies are sent, uses
In access dedicated network.
Step 304, the data of the regular length of the predetermined position in the data packet are extracted.
In the present embodiment, the predetermined position for the data packet that terminal applies are sent increases the application identities of encryption, described
Predetermined position is preferably the preset byte of the foremost in data packet.
In one embodiment, the data of regular length are to pass through hook technology in number before terminal applies send data packet
According to the application identities of the increased encryption of predetermined position in packet.
Hook technology, also referred to as API HOOK are a kind of technologies for changing API implementing result, by API HOOK,
It can change the original function of API, basic method is the api function entrance modified by HOOK " contact " to needs, is changed
It is directed toward new customized function in the address for becoming it.
In the present embodiment, a SDK packet is provided previously, SDK is included in application trusty, the function which realizes
It can be that the data packet sent to application is linked up with, modify the content of data packet, increase in the most advanced position of packet content
The application identities of encryption, wherein the application identities of encryption are the byte content of regular length.The application for being incorporated into SDK sends number
When according to packet, just the application identities of encryption can be added at the front position of data content by hook technology.
Step 306, judge the regular length data whether successful decryption, if so, enter step 308, otherwise into
Enter step 310.
In the present embodiment, in order to improve the safety of data access, it is to add that terminal applies are increased when sending data packet
Application identities after close, the encrypted application identities are located at data packet predetermined position, and are the data of regular length.It extracts
The data of the regular length are decrypted, and judge the regular length data whether successful decryption.
Step 308, the data for determining the regular length are the preset application identities.
In the present embodiment, if the data of the regular length can successful decryption, confirm the data of the regular length
For the preset application identities, i.e., preset application identities can be got from the data packet received, then delete data
The application identities in packet, then deliver a packet to dedicated network.Specifically, first delivering a packet to VPN, then by VPN
It is forwarded to dedicated network.Further, dedicated network is re-send to after can encrypting to data packet, further increases data biography
Defeated safety, specifically, the algorithm encrypted to data packet can be asymmetric arithmetic, symmetry algorithm etc..Step 310,
Otherwise, then the data packet is abandoned.
In the present embodiment, if the data packet can not successful decryption, confirm that the data of the regular length are not institutes
Preset application identities are stated, i.e., are obtained from the data packet received less than corresponding application identities, then it is assumed that be Virus
Or the data packet that illegal program is sent, the data packet is abandoned, does not allow to access dedicated network.Certainly, in other embodiments
In, can also the legitimacy to the data packet further detected.In the present embodiment, trusty apply is sending number
The application identities of encryption can be increased in packet content according to before packet, if extracted from the data packet received default
The data of regular length at position, and the data of the regular length can be decrypted to obtain corresponding application identities, then show
It is the data packet that application trusty is sent, that is, legal data packet, is sent to dedicated network after handling data packet, it is no
Then abandon the data packet, it is therefore prevented that Virus or illegal program access and access dedicated network improve data access
Safety.
In one embodiment, as shown in figure 4, providing a kind of data access control method, this method can be applied to as
In data access control device shown in FIG. 1, specifically include:
Step 402, the data packet that terminal applies are sent is received.
Step 404, whether the destination address for judging the data packet access is private network address, if being judged as YES,
406 are entered step, otherwise enters step 412.
In the present embodiment, data access control device detects the destination address of data packet, only allows destination address
It is that private network address is just forwarded, ensure that only allows to access dedicated network, forbids accessing internet, it is logical to avoid hacker
The terminal of internet-based control user is crossed to invade dedicated network (such as corporate intranet).
Step 406, the data of the regular length of predetermined position in the data packet are extracted.
In the present embodiment, the predetermined position for the data packet that terminal applies are sent increases the application identities of encryption, described
Predetermined position is preferably the preset byte of the foremost in data packet.The data of regular length are that terminal applies send data packet
Pass through the application identities of the hook technology increased encryption of predetermined position in the packet before.
In the present embodiment, a SDK packet is provided previously, SDK is included in application trusty, the function which realizes
It can be that the data packet sent to application is linked up with, modify the content of data packet, increase in the most advanced position of packet content
The application identities of encryption, wherein the application identities of encryption are the byte content of regular length.The application for being incorporated into SDK sends number
When according to packet, just the application identities of encryption can be added at the front position of data content by hook technology.
Step 408, judge the regular length data whether successful decryption, if so, enter step 410, otherwise into
Enter step 412.
Step 410, the preset application identities in the data packet are deleted, to obtain raw data packets;It re-encrypts
The raw data packets, to obtain encrypted packet;The encrypted packet is sent to dedicated network.
In the present embodiment, when determining that data packet is sent from application trusty, then delete preset in data packet
Application identities, that is, the application identities of the insertion in data packet are deleted, only retain actual content in data packet, then by data
Dedicated network is sent to after packet encryption.Specifically, being sent to VPN after data packet is encrypted, it is forwarded to after being decrypted by VPN specially
Use network.
Step 412, the data packet is abandoned.
In the present embodiment, if terminal applies access is not dedicated network, or corresponding application identities can not be decrypted,
Then direct packet discard avoids Virus or illegal program from accessing dedicated network, improves the safety of data access.
As shown in figure 5, in one embodiment, providing a kind of data access control device, including 502 He of receiving module
Processing module 504, in which:
Receiving module 502, for receiving the data packet of terminal applies transmission.
Processing module 504, for judging the data packet with the presence or absence of preset application identities, if there is described default
Application identities, then the data packet is sent to dedicated network, if cannot get from the data packet received default
Application identities, then abandon the data packet.
In one embodiment, the processing module is also used to judge whether the destination address of the data packet access is special
With network address, if so, judging the data packet with the presence or absence of preset application identities again.
In one embodiment, as shown in fig. 6, processing module 504 includes:
Extraction unit 514, for extracting the data of the regular length of predetermined position in the data packet received.
Processing unit 524 obtains corresponding application identities for judging whether to decrypt, if being judged as YES, it is determined that institute
The data for stating regular length are the preset application identities.
In one embodiment, whether the processing module 504 is also used to judge the corresponding destination address of the data packet
It is private network address, if so, judging the data packet with the presence or absence of preset application identities again.
In one embodiment, the data of the regular length are to pass through extension before the terminal applies send data packet
The application identities of the hook technology increased encryption of predetermined position in the packet.
In one embodiment, processing unit 524 is used to delete the preset application identities in the data packet, with
Obtain raw data packets;The raw data packets are encrypted, to obtain encrypted packet;The encrypted packet is sent to private network
Network.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to protection of the invention
Range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.
Claims (8)
1. a kind of data access control method characterized by comprising
Receive the data packet that terminal applies are sent;
The data packet is judged with the presence or absence of preset application identities, and the preset application identities are to be embedded in the data packet
Application identities in content, the application identities are for unique identification one application;
If being judged as YES, the data packet is sent to dedicated network, otherwise abandons the data packet;
The step of judgement data packet whether there is preset application identities includes: to extract to preset position in the data packet
Set the data of the regular length at place;Judge the regular length data whether successful decryption;If being judged as YES, it is determined that described
The data of regular length are the preset application identities.
2. the method according to claim 1, wherein being answered in the judgement data packet with the presence or absence of preset
Before the step of mark, further includes:
Whether the destination address for judging the data packet access is private network address;
If being judged as YES, judge the data packet with the presence or absence of preset application identities.
3. the method according to claim 1, wherein the data of the regular length are sent out in the terminal applies
Send the application identities for passing through the hook technology increased encryption of predetermined position in the packet before data packet.
4. the method according to claim 1, wherein the described the step of data packet is sent to dedicated network
Include:
The preset application identities in the data packet are deleted, to obtain raw data packets;
The raw data packets are encrypted, to obtain encrypted packet;
The encrypted packet is sent to dedicated network.
5. a kind of data access control device characterized by comprising
Receiving module, for receiving the data packet of terminal applies transmission;
Processing module, for judging the data packet with the presence or absence of preset application identities, the preset application identities are embedding
Enter the application identities in the packet content, if there is the preset application identities, then sends the data packet
The data packet, institute are abandoned to dedicated network if preset application identities cannot be got from the data packet received
Application identities are stated to apply for unique identification one;
The processing module includes: extraction unit, for extracting the data of the regular length of predetermined position in the data packet;
Processing unit, for judge the regular length data whether successful decryption, if being judged as YES, it is determined that the regular length
Data be the preset application identities.
6. device according to claim 5, which is characterized in that the processing module is also used to judge the data packet access
Destination address whether be private network address, if so, judging the data packet with the presence or absence of preset application identities again.
7. device according to claim 5, which is characterized in that the data of the regular length are sent out in the terminal applies
Send the application identities for passing through the hook technology increased encryption of predetermined position in the packet before data packet.
8. device according to claim 5, which is characterized in that the processing unit is also used to
The preset application identities in the data packet are deleted, to obtain raw data packets;
The raw data packets are encrypted, to obtain encrypted packet;
The encrypted packet is sent to dedicated network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510375687.1A CN105049431B (en) | 2015-06-30 | 2015-06-30 | Data access control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510375687.1A CN105049431B (en) | 2015-06-30 | 2015-06-30 | Data access control method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105049431A CN105049431A (en) | 2015-11-11 |
CN105049431B true CN105049431B (en) | 2019-02-15 |
Family
ID=54455642
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510375687.1A Active CN105049431B (en) | 2015-06-30 | 2015-06-30 | Data access control method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105049431B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106529280A (en) * | 2016-10-20 | 2017-03-22 | 乐视控股(北京)有限公司 | Method and device for controlling VPN application of mobile equipment |
CN110035041B (en) * | 2018-01-12 | 2020-11-17 | 华为技术有限公司 | Method and equipment for identifying application attack source |
CN108566643A (en) * | 2018-04-24 | 2018-09-21 | 深信服科技股份有限公司 | APP access control methods, system, terminal device and storage medium |
CN111030976A (en) * | 2019-04-26 | 2020-04-17 | 哈尔滨安天科技集团股份有限公司 | Distributed access control method and device based on secret key and storage equipment |
CN111107078B (en) * | 2019-12-16 | 2023-04-07 | 达闼机器人股份有限公司 | Application access method, robot control unit, server and storage medium |
CN113779021B (en) * | 2021-02-03 | 2024-05-17 | 西安京迅递供应链科技有限公司 | Data processing method, device, computer system and readable storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101636998A (en) * | 2006-08-03 | 2010-01-27 | 思杰系统有限公司 | Systems and methods for application based interception ssi/vpn traffic |
CN103384250A (en) * | 2006-08-03 | 2013-11-06 | 思杰系统有限公司 | Systems and methods for application-based interception and authorization of ssl/vpn traffic |
CN103973712A (en) * | 2014-05-29 | 2014-08-06 | 段超 | Access control method and device for network data |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8826388B2 (en) * | 2012-02-16 | 2014-09-02 | Sonicwall, Inc. | Mobile device identify factor for access control policies |
CN103166960A (en) * | 2013-03-01 | 2013-06-19 | 北京神州绿盟信息安全科技股份有限公司 | Access control method and access control device |
US9143481B2 (en) * | 2013-06-06 | 2015-09-22 | Apple Inc. | Systems and methods for application-specific access to virtual private networks |
-
2015
- 2015-06-30 CN CN201510375687.1A patent/CN105049431B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101636998A (en) * | 2006-08-03 | 2010-01-27 | 思杰系统有限公司 | Systems and methods for application based interception ssi/vpn traffic |
CN103384250A (en) * | 2006-08-03 | 2013-11-06 | 思杰系统有限公司 | Systems and methods for application-based interception and authorization of ssl/vpn traffic |
CN103973712A (en) * | 2014-05-29 | 2014-08-06 | 段超 | Access control method and device for network data |
Also Published As
Publication number | Publication date |
---|---|
CN105049431A (en) | 2015-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105049431B (en) | Data access control method and device | |
US11190494B2 (en) | Application whitelist using a controlled node flow | |
US11381557B2 (en) | Secure data transmission using a controlled node flow | |
US9686294B2 (en) | Protection of communication on a vehicular network via a remote security service | |
US8635441B2 (en) | Encryption-based control of network traffic | |
US8930548B2 (en) | Mobile link system, method and apparatus | |
US20130332724A1 (en) | User-Space Enabled Virtual Private Network | |
US20170195348A1 (en) | Monitoring Traffic in a Computer Network | |
CN104113548B (en) | A kind of message identifying processing method and processing device | |
CN104994094B (en) | Virtual platform safety protecting method based on virtual switch, device and system | |
US20150195251A1 (en) | Packet analysis apparatus and method and virtual private network server | |
KR101847636B1 (en) | Method and apprapatus for watching encrypted traffic | |
CN114979069B (en) | Domain name resolution request processing method, storage medium and electronic equipment | |
KR101040543B1 (en) | Detection system and detecting method for the cryptographic data in SSH | |
KR20130035600A (en) | Method and apparatus for preventing data loss | |
CN105162789B (en) | A kind of data encryption/decryption method and device | |
AU2015301504B2 (en) | End point secured network | |
KR101047994B1 (en) | Network based terminal authentication and security method | |
CN112580056A (en) | Terminal device, data encryption method, data decryption method and electronic device | |
CN105577609B (en) | Method and apparatus for being controlled the content of access | |
US20190334998A1 (en) | Sensor For Detecting Measured Values; Method, Device And Computer-Readable Storage Medium With Instructions For Processing Measured Values From A Sensor | |
KR101713191B1 (en) | Access point for preventing malignant action using prior testing of malignant data and method of the same | |
WO2018112796A1 (en) | Service data policy control method, operator device and server | |
KR20140004703A (en) | Controlled security domains | |
CN107395764B (en) | Method and system for data exchange between devices in different data domains |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 518000 the first floor of A1 building, Nanshan Zhiyuan 1001, Nanshan District Xue Yuan Avenue, Shenzhen, Guangdong. Applicant after: SINFOR Polytron Technologies Inc Address before: 518000 the first floor of A1 building, Nanshan Zhiyuan 1001, Nanshan District Xue Yuan Avenue, Shenzhen, Guangdong. Applicant before: Shenxinfu Electronics Science and Technology Co., Ltd., Shenzhen |
|
GR01 | Patent grant | ||
GR01 | Patent grant |