CN103795818A - NAT traversal method - Google Patents

NAT traversal method Download PDF

Info

Publication number
CN103795818A
CN103795818A CN201410039263.3A CN201410039263A CN103795818A CN 103795818 A CN103795818 A CN 103795818A CN 201410039263 A CN201410039263 A CN 201410039263A CN 103795818 A CN103795818 A CN 103795818A
Authority
CN
China
Prior art keywords
terminal use
nat
port
port numbers
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410039263.3A
Other languages
Chinese (zh)
Inventor
何加铭
屈龙
李艳
张延红
樊玲慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Sunrun Electronic Information Technology Development Co., Ltd.
Original Assignee
HANGZHOU SUNRUN INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HANGZHOU SUNRUN INFORMATION TECHNOLOGY Co Ltd filed Critical HANGZHOU SUNRUN INFORMATION TECHNOLOGY Co Ltd
Priority to CN201410039263.3A priority Critical patent/CN103795818A/en
Publication of CN103795818A publication Critical patent/CN103795818A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an NAT traversal method which can increase the success rate of traversal. The NAT traversal method comprises the auxiliary logon procedure of a traversal server and the data exchange procedure. According to the data exchange procedure, after the traversal server receives the request of a terminal user, log-on messages of the terminal user A and a terminal user B are searched for, if the logon message of the terminal user B can be inquired, NAT equipment types of the terminal user A and the terminal user B are determined firstly, and the terminal user A and the terminal user B carry out data transmission through an address and a port number of a direct connection channel.

Description

A kind of NAT penetrating method
Technical field
The present invention relates to Internet communication technology field, is specifically a kind of NAT penetrating method.
Background technology
In the internet arena of fast development; because the internet scale constantly expanding makes address space resource face depleted crisis; therefore people generally adopt a kind of network address translation (network address translation is called for short NAT) technology to alleviate current severe situation.NAT is a kind of Intranet with public network is isolated and private address is converted to the technology of legitimate ip address.In addition, NAT only allows Intranet to initiate connection request to public network, and public network all can be refused to the connection request of Intranet.But along with people constantly increase for P2P application demand, by NAT device, Intranet and public network are coupled together and become the communication pattern that internet address system is generally used, this communication pattern can be realized the direct communication of two nodes in different Intranets.NAT technology temporarily can solve network address resources shortage problem and can protect internal address information on the one hand; But then, the existence of a large amount of NAT device has but hindered carries out P2P communicating requirement in different Intranets between terminal use, therefore must solve NAT penetration problem, could meet the needs of people for a large amount of P2P application, therefore prior art provides a large amount of NAT penetrating methods, but, existing NAT penetrating method does not take into full account the type of NAT device, once and penetrate failure and just do not reattempt and penetrate, further trial is not penetrated and furtherd investigate, therefore, cause existing NAT penetrating method to penetrate success rate still lower.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of and can improve the NAT penetrating method that penetrates success rate.
Technical scheme of the present invention is, NAT penetrating method of the present invention, and it has following process:
1), the auxiliary registration process of pass through server: send log-on message to pass through server after terminal use A and terminal use B power on, the identifying information of pass through server storage terminal user A and B, after information registering success, terminal use A and B utilize this passage to send heartbeat packet, and maintenance is connected with pass through server;
2), realize data exchange process:
Step 1, terminal use A sends request information to pass through server, and request connects terminal use B;
Step 2, pass through server is received after the request of terminal use A, searches the log-on message of terminal use A and B, if can not find the log-on message of terminal use B, replys terminal use A connection error; If can inquire the log-on message of terminal use B, first determine the NAT device type of terminal use A and B, if both sides' NAT device type is complete ConeNAT, restriction Cone NAT, this one of three kinds of port limit Cone NAT performs step three; If both sides' NAT device at least one party is Symmetric NAT, and the opposing party is that complete Cone NAT, restriction Cone NAT, this one of four kinds of port limit Cone NAT, Symmetric NAT perform step four;
Step 3, pass through server by terminal use B and A described 1) in outer net address and the port number information of registration send to the other side, terminal use A and B are according to the partner address and the port information that obtain separately, send and penetrate information to penetrate connecting test mutually, if success, will return to address and the port numbers of direct channel, and turn to step 5, otherwise continue to penetrate connecting test;
Step 4, the port numbers that can be communicated with is determined in random port number test, if the NAT device type of terminal use A is Symmetric NAT, terminal use B carries out random port number test to terminal use A, if the NAT device type of terminal use B is Symmetric NAT, terminal use A carries out random port number test to terminal use B, if the NAT device type of terminal use A and B is Symmetric NAT simultaneously, terminal use A and B start random port number test simultaneously; Once determine the port numbers that can be communicated with, find direct channel, will return to address and the port numbers of direct channel, and turn to step 5, otherwise, repeating step four;
Step 5, terminal use A and B utilize the address of described direct channel and port numbers to carry out transfer of data.
Adopt after above-mentioned NAT penetrating method, the present invention compared with prior art, have the following advantages: due to the NAT device type of distinguishing terminal user A and B, take corresponding strategy according to different NAT device types, described pass through server provides feasibility penetrating strategy according to network detecting result and transmitting procedure for terminal use A and B carry out exchanges data in other words, therefore realize and effectively penetrating, improve and penetrate success rate, penetrate unsuccessfully and also can continue to attempt penetrating by correlation method afterwards, especially be Symmetric NAT for both sides' NAT device at least one party, and the opposing party is complete Cone NAT, restriction Cone NAT, port limit Cone NAT, this this kind of situation of four kinds of Symmetric NAT, conduct in-depth research, thereby in complicated networking environment, can improve and penetrate success rate.
As improvement, the acquisition methods of the port numbers that described random port number is tested is to be divided into three situations below: situation one, if the nat port mapping ruler of terminal use A and B is incremental, the port numbers tested is original port numbers+T, and T is fixing integer value; Situation two, if the nat port mapping ruler of terminal use A and B is random incremental, the port numbers tested is original port numbers+statistics increment; Situation three, if the nat port mapping ruler of terminal use A and B is all stochastic pattern, the port numbers tested is random port number, like this, can more effectively realize and penetrating, and greatly improves the success rate penetrating.
As improvement, pass through server is determined the nat port mapping ruler of terminal use A and B according to historical port numbers statistical information, and obtain tested port numbers, be specially: pass through server receives that terminal use A penetrates after request to terminal use B, the pass through server historical outer end slogan statistical information that first terminal use A and terminal use B produce in test section one, if N continuous time detects that the port rule change in part one is incremental, the port numbers tested is original port numbers+T, and T is fixing integer value; If N continuous time detects that the port rule change in part one is random incremental, the port numbers tested is original port numbers+statistics increment; Random if N continuous time detects that part one middle-end slogan changes, it is the port numbers in random port number and part two that the port numbers tested is obtained scope; Described N is an integer; Described historical port numbers statistical information is divided into two parts, the historical outer end slogan statistical information producing when wherein part one refers to terminal use A and B access pass-through server, the outer end slogan statistical information producing when part two refers to and successfully penetrated between terminal use A and B in the past; Like this, pass through server is determined the nat port mapping ruler of terminal use A and B according to historical port numbers statistical information, and obtain tested port numbers, network environment that can self adaptation reality, make to determine the nat port mapping ruler of terminal use A and B, and obtain this process of tested port numbers and possess intellectuality, adaptive ability, and detect that for N continuous time part one middle-end slogan changes random situation and furthers investigate, provide available strategy, be more conducive to the raising of performance of the present invention.
As improvement, it is in the port numbers in random port number and part two that the described port numbers of testing is obtained scope, and the port numbers in main selected part two is as tested port numbers, like this, can more effectively realize and penetrating, greatly improve the success rate penetrating.
Embodiment
Below in conjunction with example, the invention will be further described.
NAT penetrating method of the present invention, it has following process:
1), the auxiliary registration process of pass through server: send log-on message to pass through server after terminal use A and terminal use B power on, the identifying information of pass through server storage terminal user A and B, after information registering success, terminal use A and B utilize this passage to send heartbeat packet, and maintenance is connected with pass through server;
2), realize data exchange process:
Step 1, terminal use A sends request information to pass through server, and request connects terminal use B;
Step 2, pass through server is received after the request of terminal use A, searches the log-on message of terminal use A and B, if can not find the log-on message of terminal use B, replys terminal use A connection error; If can inquire the log-on message of terminal use B, first determine the NAT device type of terminal use A and B, if both sides' NAT device type is complete Cone NAT, restriction Cone NAT, this one of three kinds of port limit Cone NAT performs step three; If both sides' NAT device at least one party is Symmetric NAT, and the opposing party is that complete Cone NAT, restriction Cone NAT, this one of four kinds of port limit Cone NAT, Symmetric NAT perform step four;
Step 3, pass through server by terminal use B and A described 1) in outer net address and the port number information of registration send to the other side, terminal use A and B are according to the partner address and the port information that obtain separately, send and penetrate information to penetrate connecting test mutually, if success, will return to address and the port numbers of direct channel, and turn to step 5, otherwise continue to penetrate connecting test;
Step 4, the port numbers that can be communicated with is determined in random port number test, if the NAT device type of terminal use A is Symmetric NAT, terminal use B carries out random port number test to terminal use A, if the NAT device type of terminal use B is Symmetric NAT, terminal use A carries out random port number test to terminal use B, if the NAT device type of terminal use A and B is Symmetric NAT simultaneously, terminal use A and B start random port number test simultaneously; Once determine the port numbers that can be communicated with, find direct channel, will return to address and the port numbers of direct channel, and turn to step 5, otherwise, repeating step four;
Step 5, terminal use A and B utilize the address of described direct channel and port numbers to carry out transfer of data.
The acquisition methods of the port numbers that described random port number is tested is, be divided into three situations below: situation one, if the nat port mapping ruler of terminal use A and B is incremental, the port numbers tested is original port numbers+T, T is fixing integer value, such as 1, situation two, if the nat port mapping ruler of terminal use A and B is random incremental, the port numbers tested is original port numbers+statistics increment, the historical outer end slogan accrual accounting information that statistics increment produces while referring to terminal use A and B access pass-through server, such as thering is the first historical outer end slogan, the second historical outer end slogan, the 3rd historical outer end slogan, the 4th historical outer end slogan, the 5th historical outer end slogan, the 6th historical outer end slogan, so, the first historical outer end slogan, the second historical outer end slogan poor, the second historical outer end slogan, the 3rd historical outer end slogan poor, the 3rd historical outer end slogan, the 4th historical outer end slogan poor, the 4th historical outer end slogan, the 5th historical outer end slogan poor, the 5th historical outer end slogan, the 6th historical outer end slogan poor, these poor summations are also average rear as statistics increment, situation three, if the nat port mapping ruler of terminal use A and B is all stochastic pattern, the port numbers tested is random port number.
Described original port numbers refers to port numbers or the random port numbers of setting etc. that the last time penetrates test port numbers used or sets by certain rule.
Pass through server is determined the nat port mapping ruler of terminal use A and B according to historical port numbers statistical information, and obtain tested port numbers, be specially: pass through server receives that terminal use A penetrates after request to terminal use B, the pass through server historical outer end slogan statistical information that first terminal use A and terminal use B produce in test section one, if N continuous time detects that the port rule change in part one is incremental, the port numbers tested is original port numbers+T, and T is fixing integer value; If N continuous time detects that the port rule change in part one is random incremental, the port numbers tested is original port numbers+statistics increment; Random if N continuous time detects that part one middle-end slogan changes, it is the port numbers in random port number and part two that the port numbers tested is obtained scope;
Described N is an integer, such as 20; Described historical port numbers statistical information is divided into two parts, the historical outer end slogan statistical information producing when wherein part one refers to terminal use A and B access pass-through server, the outer end slogan statistical information producing when part two refers to and successfully penetrated between terminal use A and B in the past.
It is in the port numbers in random port number and part two that the described port numbers of testing is obtained scope, port numbers in main selected part two is as tested port numbers, and specific practice is to choose using higher probability the outer end slogan section producing while in the past successfully penetrating between terminal use A and B to penetrate test alternate port number as next time.
The explanation of described complete Cone NAT, restriction Cone NAT, port limit Cone NAT, these four kinds of NAT device types of Symmetric NAT:
1) complete Cone NAT: no matter how are destination address and port, at every turn all this privately owned source IP address/port mapping to same global source address/port; Any main frame of outer net can send message and have access to this internal host to the global address of this mapping, and the static address mapping of router is exactly to belong to this.
2) restriction Cone NAT: the same Cone NAT's completely of situation of address/port mapping, but the main frame of outer net will be accessed intranet host, and this intranet host must first send the address of message to this outer net main frame.
3) port limit Cone NAT: address/port mapping situation is with complete Cone NAT's, but outer net main frame will be accessed intranet host, this intranet host must first send address and the port of message to this outer net main frame, and the NAPT of most of routers belongs to this situation exactly.
4) Symmetric NAT: to different destination address/ports, it is constant that source private address is mapped to source global address, but the global port of mapping can change, outer net main frame must first be received the message of intranet host, just can have access to this intranet host, the NAT of certain router and firewall product belongs to this situation exactly, and Symmetric NAT shines upon new port mode 3 kinds:
A) incremental: in the port numbers (being original port numbers) of front once mapping+fixing integer value T, such as 1.
B) random incremental: in the port numbers of front once mapping, increase or reduce, and the numerical value changing at random one among a small circle in generation.
C) stochastic pattern: such as random port number random in interval (1024,65535) generation.

Claims (4)

1. a NAT penetrating method, is characterized in that, it has following process:
1), the auxiliary registration process of pass through server: send log-on message to pass through server after terminal use A and terminal use B power on, the identifying information of pass through server storage terminal user A and B, after information registering success, terminal use A and B utilize this passage to send heartbeat packet, and maintenance is connected with pass through server;
2), realize data exchange process:
Step 1, terminal use A sends request information to pass through server, and request connects terminal use B;
Step 2, pass through server is received after the request of terminal use A, searches the log-on message of terminal use A and B, if can not find the log-on message of terminal use B, replys terminal use A connection error; If can inquire the log-on message of terminal use B, first determine the NAT device type of terminal use A and B, if both sides' NAT device type is complete Cone NAT, restriction Cone NAT, this one of three kinds of port limit Cone NAT performs step three; If both sides' NAT device at least one party is Symmetric NAT, and the opposing party is that complete Cone NAT, restriction Cone NAT, this one of four kinds of port limit Cone NAT, Symmetric NAT perform step four;
Step 3, pass through server by terminal use B and A described 1) in outer net address and the port number information of registration send to the other side, terminal use A and B are according to the partner address and the port information that obtain separately, send and penetrate information to penetrate connecting test mutually, if success, will return to address and the port numbers of direct channel, and turn to step 5, otherwise continue to penetrate connecting test;
Step 4, the port numbers that can be communicated with is determined in random port number test, if the NAT device type of terminal use A is Symmetric NAT, terminal use B carries out random port number test to terminal use A, if the NAT device type of terminal use B is Symmetric NAT, terminal use A carries out random port number test to terminal use B, if the NAT device type of terminal use A and B is Symmetric NAT simultaneously, terminal use A and B start random port number test simultaneously; Once determine the port numbers that can be communicated with, find direct channel, will return to address and the port numbers of direct channel, and turn to step 5, otherwise, repeating step four;
Step 5, terminal use A and B utilize the address of described direct channel and port numbers to carry out transfer of data.
2. NAT penetrating method according to claim 1, it is characterized in that, the acquisition methods of the port numbers that described random port number is tested is, be divided into three situations below: situation one, if the nat port mapping ruler of terminal use A and B is incremental, the port numbers tested is original port numbers+T, and T is fixing integer value; Situation two, if the nat port mapping ruler of terminal use A and B is random incremental, the port numbers tested is original port numbers+statistics increment; Situation three, if the nat port mapping ruler of terminal use A and B is all stochastic pattern, the port numbers tested is random port number.
3. NAT penetrating method according to claim 2, it is characterized in that, pass through server is determined the nat port mapping ruler of terminal use A and B according to historical port numbers statistical information, and obtain tested port numbers, be specially: pass through server receives that terminal use A penetrates after request to terminal use B, the pass through server historical outer end slogan statistical information that first terminal use A and terminal use B produce in test section one, if N continuous time detects that the port rule change in part one is incremental, the port numbers tested is original port numbers+T, T is fixing integer value, if N continuous time detects that the port rule change in part one is random incremental, the port numbers tested is original port numbers+statistics increment, random if N continuous time detects that part one middle-end slogan changes, it is the port numbers in random port number and part two that the port numbers tested is obtained scope,
Described N is an integer; Described historical port numbers statistical information is divided into two parts, the historical outer end slogan statistical information producing when wherein part one refers to terminal use A and B access pass-through server, the outer end slogan statistical information producing when part two refers to and successfully penetrated between terminal use A and B in the past.
4. NAT penetrating method according to claim 3, is characterized in that, it is in the port numbers in random port number and part two that the described port numbers of testing is obtained scope, and the port numbers in main selected part two is as tested port numbers.
CN201410039263.3A 2014-01-27 2014-01-27 NAT traversal method Pending CN103795818A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410039263.3A CN103795818A (en) 2014-01-27 2014-01-27 NAT traversal method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410039263.3A CN103795818A (en) 2014-01-27 2014-01-27 NAT traversal method

Publications (1)

Publication Number Publication Date
CN103795818A true CN103795818A (en) 2014-05-14

Family

ID=50671083

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410039263.3A Pending CN103795818A (en) 2014-01-27 2014-01-27 NAT traversal method

Country Status (1)

Country Link
CN (1) CN103795818A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660728A (en) * 2015-02-13 2015-05-27 上海交通大学 NAT (network address translator) traversal method based on intelligent home control system
CN105141711A (en) * 2015-08-24 2015-12-09 北京息通网络技术有限公司 Symmetrical NAT traversal method and system based on big data analysis
WO2016169015A1 (en) * 2015-04-23 2016-10-27 华为技术有限公司 Method and apparatus for switching network communication and direct communication
TWI584617B (en) * 2015-11-18 2017-05-21 Walton Advanced Eng Inc Auxiliary data transmission
CN113489810A (en) * 2021-05-31 2021-10-08 普联国际有限公司 Symmetric NAT penetration method, device, storage medium, equipment and system
CN113660419A (en) * 2021-08-12 2021-11-16 北京智芯原动科技有限公司 Parking area remote debugging system

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
孙卫喜、席少龙: "对等网联下NAT穿越问题的研究", 《电子技术应用》 *
孙卫喜: "Symmetric NAT的穿越问题研究", 《计算机技术与自动化》 *
张泽鹏: "P2P网络中NAT穿透技术的研究与实现", 《中国知网硕士学位论文全文库》 *
王勇.等: "基于探测对Symmetric NAT与端口受限NAT的穿透方案", 《计算机应用》 *
石硕.等: "基于端口准随机猜测的UDP穿越symmetric NAT的方法", 《计算机工程与设计》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660728A (en) * 2015-02-13 2015-05-27 上海交通大学 NAT (network address translator) traversal method based on intelligent home control system
CN104660728B (en) * 2015-02-13 2018-01-19 上海交通大学 NAT penetrating methods based on intelligent home control system
WO2016169015A1 (en) * 2015-04-23 2016-10-27 华为技术有限公司 Method and apparatus for switching network communication and direct communication
CN106537854A (en) * 2015-04-23 2017-03-22 华为技术有限公司 Method and apparatus for switching network communication and direct communication
CN106537854B (en) * 2015-04-23 2019-09-13 华为技术有限公司 Switching method and apparatus between network communication and direct communication
CN105141711A (en) * 2015-08-24 2015-12-09 北京息通网络技术有限公司 Symmetrical NAT traversal method and system based on big data analysis
CN105141711B (en) * 2015-08-24 2019-03-26 北京息通网络技术有限公司 A kind of Symmetric NAT traversing method and system based on big data analysis
TWI584617B (en) * 2015-11-18 2017-05-21 Walton Advanced Eng Inc Auxiliary data transmission
CN106713408A (en) * 2015-11-18 2017-05-24 华东科技股份有限公司 Auxiliary data transmission method
CN113489810A (en) * 2021-05-31 2021-10-08 普联国际有限公司 Symmetric NAT penetration method, device, storage medium, equipment and system
CN113489810B (en) * 2021-05-31 2023-03-24 普联国际有限公司 Symmetric NAT penetration method, device, storage medium, equipment and system
CN113660419A (en) * 2021-08-12 2021-11-16 北京智芯原动科技有限公司 Parking area remote debugging system

Similar Documents

Publication Publication Date Title
CN103795819A (en) Inter-terminal data transmission method based on NAT in P2P application
CN103795818A (en) NAT traversal method
CN105827748B (en) A method of the SIP based on ICE passes through Symmetric NAT device
CN102148773B (en) Method and system for converting IPv6 (Internet Protocol Version 6) protocol and IPv4 (Internet Protocol Version 4) protocol
CN102821009B (en) Method for monitoring ring network on basis of link layer discovery protocol and device
CN101286990B (en) Forwarding method and apparatus of double-layer multicast
CN107105026B (en) IPV4/IPV6 exchange application platform
EP3958534A1 (en) Method and apparatus for establishing end-to-end network connection, and network system
CN101340293B (en) Packet safety detection method and device
CN104427010A (en) NAT (network address translation) method and device applied to DVPN (dynamic virtual private network)
CN102299969A (en) Web accessing method, layer seven switching equipment and service network
CN102231763A (en) Sharing method based on NAT (Network Address Translation) penetration
CN105162626A (en) Network traffic depth identification system and method based on many-core processor
CN107222587B (en) A kind of method for remotely accessing private network device
CN102904976A (en) Extended double stateless IPv4(Internet Protocol) -IPv6 translation method based on prefix distribution
CN103281211B (en) Large-scale network node system for managing in groups and management method
CN101977249B (en) Method for penetrating NAT (Network Address Translation) equipment
CN101022371A (en) Automatic discovering and managing method for extendable interconnection network measurement server
CN102571610A (en) Packet forwarding method and edge equipment
CN106254457A (en) Real estate data-sharing systems based on WCF technology and data sharing method
RU2013153811A (en) WAYS TO ENSURE PUBLIC AVAILABILITY AND RELATED SYSTEMS AND DEVICES
CN100463448C (en) Method for realizing network port address conversion
CN102201996A (en) Method and equipment for forwarding message in network address translation (NAT) environment
CN103973832A (en) IPv6 addressing and networking method based on physical space position mapping
CN104348731A (en) Community virtual network connection establishing method and network communication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: NINGBO SUNRUN ELECTRONIC INFORMATION TECHNOLOGY DE

Free format text: FORMER OWNER: HANGZHOU SUNRUN INFORMATION TECHNOLOGY CO., LTD.

Effective date: 20141217

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 310015 HANGZHOU, ZHEJIANG PROVINCE TO: 315211 NINGBO, ZHEJIANG PROVINCE

TA01 Transfer of patent application right

Effective date of registration: 20141217

Address after: 315211 Cao Guangbiao information building, No. 818 Fenghua Road, Jiangbei District, Zhejiang, Ningbo

Applicant after: Ningbo Sunrun Electronic Information Technology Development Co., Ltd.

Address before: 310015, B411, room 1, fourth floor, 38 East Xiang Road, Hangzhou, Zhejiang, Gongshu District, China

Applicant before: HANGZHOU SUNRUN INFORMATION TECHNOLOGY CO., LTD.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140514