CN105681417B - Computer virus off-limit file Transmission system and method - Google Patents
Computer virus off-limit file Transmission system and method Download PDFInfo
- Publication number
- CN105681417B CN105681417B CN201610027423.1A CN201610027423A CN105681417B CN 105681417 B CN105681417 B CN 105681417B CN 201610027423 A CN201610027423 A CN 201610027423A CN 105681417 B CN105681417 B CN 105681417B
- Authority
- CN
- China
- Prior art keywords
- data
- virus
- ftp
- module
- memory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Virology (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer And Data Communications (AREA)
- Communication Control (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of computer virus off-limit file Transmission system and methods, including:Receiving module, the data for receiving the transmission of FTP service end, and be stored in the memory of FTP local sides;Antivirus module, for received data to be carried out virus signature scanning in the memory of FTP local sides, according to virus characteristic library judge the data whether virus infection, the data of virus infection are abandoned or are retracted processing, it is state to be forwarded by the data markers of uninfecting virus, and the data address of uninfecting virus is dealt into queue to be sent;Transport protocol conversion module, for the transport protocol of the data of uninfecting virus to be converted to IB agreements by IP agreement;The data of uninfecting virus are stored in the security isolation region of FTP local sides by security isolation region module using rdma protocol.The present invention has many advantages, such as that high speed, stabilization, economy, attack tolerant are good.
Description
Technical field
The invention belongs to file transfer technologies, and in particular to a kind of computer virus off-limit file Transmission system and method.
Background technology
FTP is File Transfer Protocol(File Transfer Protocol)English abbreviation, on Internet
The transmitted in both directions of file is controlled, i.e. user can be uploaded and be downloaded file to distance host by client program.
The advantages of being transmitted using ftp file be:No matter two computers for being connected into internet are how far apart, in no time
File on one computer can be transmitted in another computer, text is replicated just as between the locally disk of meter grate machine
Part sample is very convenient, simple.But there is also problems with using ftp file transmission:
(1)It need to realize that the storage of data forwards using local disk space, hard disk resources can be occupied when transmitting file;
(2)Document transmission method is to be based on TCP/IP agreements, therefore be easy to be attacked by internet worm, file transmission
There are unsafe factors, and TCP is in contrast slow in transmission speed.In order to avoid Preventive Measures for Computer Virus Infection, one
As anti-, virus investigation, antivirus software can be installed on computers, filter possible Virus entry for scanning, and to Virus into
Row is removed, and this mode can play the role of good pre- anti-virus, but this gas defence removing toxic substances mode needs to occupy system CPU
Resource, therefore the start-up course and the speed of service of computer can be delayed.
(3) data of transmission are directed to, traditional data safety isolation transmission mode is:
3a, local hard drive is received and is saved in, data file enters non-security isolated area;
3b, it kills virus to fixed disk file, enters secure isolation zone by the data of virus investigation;
3c, file is decomposed, distributes or be dumped to target location again.
The above this mode the problem is that:Data repeatedly swap between memory and disk file, system resource
Expense is big;System data transmission speed is limited by R/W speed of hard disc;Hardware reliability that frequent disk read-write causes and steady
Qualitative deficiency;And hardware investment is larger.IP agreement is a kind of widely used network addressing agreement, thus loophole technically
It is easy to be utilized with weakness;The risk attacked when using the protocol technology is larger.
Therefore, it is necessary to develop a kind of new computer virus off-limit file Transmission system and method.
Invention content
The object of the present invention is to provide a kind of transmission of the computer virus off-limit file of high speed, stabilization, economy, attack resistance to be
System and method.
Computer virus off-limit file Transmission system of the present invention, including:
Receiving module, the data for receiving the transmission of FTP service end, and be stored in the memory of FTP local sides;
Antivirus module, for received data to be carried out virus signature scanning in the memory of FTP local sides, according to
Virus characteristic library judge the data whether virus infection, the data of virus infection are abandoned or are retracted processing, will not
The data markers of virus infection are state to be forwarded, and the data address of uninfecting virus is dealt into queue to be sent, this is killed
Malicious module is connect with receiving module;
Transport protocol conversion module, for the transport protocol of the data of uninfecting virus to be converted to IB associations by IP agreement
View, the transport protocol conversion module are connect with antivirus module;
The data of uninfecting virus, the safety of FTP local sides is stored in using rdma protocol by security isolation region module
In area of isolation, which connect with transport protocol conversion module.
Further, the receiving module includes at least one File Transfer Protocol port, for FTP local sides and FTP service end it
Between pass through ICP/IP protocol establish connection and transmission data.
Further, further include notification module, for leading to when the data to virus infection are abandoned or retract processing
Know user, which connect with antivirus module.
Virus off-limit file transmission method of the present invention, is passed using computer virus off-limit file of the present invention
Defeated system, includes the following steps:
Step 1, FTP local sides receive the data that FTP service end is sent and are stored in the memory of FTP local sides;
The data of reception are carried out virus signature scanning by step 2, FTP local sides in memory, according to virus characteristic library
Judge the data whether virus infection;If it is confirmed that data virus infection, then abandon the data or retract;Such as
Fruit confirms the data uninfecting virus, then is state to be forwarded by the data markers, and by the data address of uninfecting virus
It is dealt into queue to be sent;
The transport protocol of the data of uninfecting virus is converted to IB agreements by step 3 by IP agreement;
Step 4 is stored in using rdma protocol in the security isolation region module of FTP local sides.
Further, in the step 2, the data of reception are carried out virus signature scanning, root by FTP local sides in memory
Judge whether the specific method of virus infection is the data according to virus characteristic library:
It is scanned for certain segment data or some data slot, the virus of scanned data and virus database is special
Sign data are compareed, if the segment data or any one of this data slot and virus database virus characteristic phase
Match, then judges the segment data or this data slot virus infection.
Further, in the step 1, before the data that FTP local sides receive transmitted by FTP service end, first interpretation FTP
Whether the data transmitted by server-side are legal, if legal, receive the data and are labeled as waiting for virus investigation data, if illegal,
The data are not received.
The present invention has the following advantages:
(1)Front end uses one or more FTP protocol port, is connected by the addresses TCP/IP for outer net or distal end
And transmission data;FTP service realizes data storage forwarding without using local disk file, and carries out storage forwarding using memory,
The efficiency of storage forwarding is substantially increased, the occupancy to hard disk resources is reduced;
(2)Virus in Unified Set is carried out in memory and is killed using viral antivirus processing, the multichannel file data of dispersion is concentrated
Poison processing reduces the demand to node of killing virus;
(3)Using the translation-protocol of IP to IB, the external attack to IP address is shielded, reduces external network and passes through IP
Attack storage modem meeting;
(4)(RDMA) agreement is accessed using remote direct memory, by data directly between the application memory of two systems
It swaps, without carrying out data exchange by operating system memory, reduces and the pressure and resource of operating system are opened
Pin;
(5)Frequent disk read-write is avoided by the way of data address mark in inside to the data of reception.
Description of the drawings
Fig. 1 is the principle of the present invention frame diagram;
Fig. 2 is the principle of the present invention figure;
Fig. 3 is the flow chart of the present invention;
Wherein:1, receiving module, 2, antivirus module, 3, transport protocol conversion module, 4, security isolation region module, 5, logical
Know module.
Specific implementation mode
The invention will be further described below in conjunction with the accompanying drawings.
The computer virus off-limit file Transmission system as depicted in figs. 1 and 2, including receiving module 1, antivirus mould
Block 2, transport protocol conversion module 3, security isolation region module 4 and notification module 5.
Receiving module 1 is used to receive the data of FTP service end transmission, and is stored in the memory of FTP local sides.
Antivirus module 2 is used to received data carrying out virus signature scanning in the memory of FTP local sides, according to
Virus characteristic library judge the data whether virus infection, the data of virus infection are abandoned or are retracted processing, will not
The data markers of virus infection are state to be forwarded, and the data address of uninfecting virus is dealt into queue to be sent, this is killed
Malicious module 2 is connect with receiving module 1.
Transport protocol conversion module 3 is used to the transport protocol of the data of uninfecting virus being converted to IB associations by IP agreement
View, the transport protocol conversion module 3 are connect with antivirus module 2.
The data of uninfecting virus are stored in the safety of FTP local sides using rdma protocol by security isolation region module 4
In area of isolation, which connect with transport protocol conversion module 3.
Notification module 5 when the data to virus infection are abandoned or retract processing for notifying user, the notice
Module 5 is connect with antivirus module 2.
As shown in Fig. 2, the present invention uses one or more FTP protocol port, for FTP local sides and FTP service end
Between pass through ICP/IP protocol establish connection and transmission data.FTP local sides realize data storage forwarding without using local disk,
But storage forwarding is carried out using memory, the efficiency of storage forwarding is substantially increased, the occupancy to hard disk resources is reduced;Using collection
The multichannel file data of middle virus antivirus processing, dispersion carries out viral antivirus processing in Unified Set in memory, reduces to killing
The demand of malicious node;Using IP agreement to the conversion of IB agreements, the external attack to IP address is shielded, external network is reduced
Modem meeting is stored by IP attack;(RDMA) agreement is accessed by data directly answering in two systems using remote direct memory
It is swapped between memory, without carrying out data exchange by operating system memory, reduces the pressure to operating system
Power and resource overhead.
As shown in Figures 2 and 3, viral off-limit file transmission method of the present invention, using calculating of the present invention
Machine virus off-limit file Transmission system, includes the following steps:
Step 1, FTP local sides receive the data that FTP service end is sent and are stored in the memory of FTP local sides.
The data of reception are carried out virus signature scanning by step 2, FTP local sides in memory, according to virus characteristic library
Judge the data whether virus infection;If it is confirmed that data virus infection, then abandon the data or retract, and
Notify user;Then it is state to be forwarded by the data markers if it is confirmed that the data uninfecting virus, and by uninfecting virus
Data address be dealt into queue to be sent.
The transport protocol of the data of uninfecting virus is converted to IB agreements by step 3 by IP agreement.
Step 4 is stored in using rdma protocol in the security isolation region module of FTP local sides.
In step 2 of the present invention, the data of reception are carried out virus signature scanning, root by FTP local sides in memory
Judge whether the specific method of virus infection is the data according to virus characteristic library:
It is scanned for certain segment data or some data slot, by the virus characteristic of scan data and virus database
Data are compareed, if the segment data or any one of this data slot and virus database virus characteristic phase
Match, then judges the segment data or this data slot virus infection.
In step 1 of the present invention, before the data that FTP local sides receive transmitted by FTP service end, first interpretation FTP
Whether the data transmitted by server-side are legal, if legal, receive the data and are labeled as waiting for virus investigation data, if illegal,
The data are not received.
In the present invention:
IP address:So-called IP address is exactly an address of the host assignment to each connection on the internet; IPv4
Address is done using 32 signless integers;IPv6 is that it is used for substituting existing IPv4(Existing IP)A kind of new IP of agreement
Agreement, address is done in the addresses IPv6 using 128 signless integers, due to being widely used by the technology, many technical leak quilts
Exposure causes security risk.
InfiniBand (IB)It is the technology for low layer I/O communication, is the address access protocol of non-IP.It can
To interconnect disk array, SANs, LANs, server and cluster server, external network can also be connected(Such as wide area
Net, Virtual Private Network, internet).Infiniband architecture is that a kind of support mostly concurrently links " Convertion cable " technology,
In this technology, the bandwidth of each link can reach 2.5 Gbps, this is a kind of data transmission technology of very fast high-bandwidth.
RDMA:RDMA(Remote Direct Memory Access)Technology full name remote direct data accesses, RDMA zero
Duplication technology:Pass through NIC(Network interface card)Directly with application memory mutual data transmission, avoid in application memory and kernel
Replicate data needs the bypass of kernel memories to make to call and can order to NIC transmissions using without executing kernel memory between depositing
It enables, reduces the number of the environment changing between kernel memory headroom and user's space when handling network transmission stream.RDMA passes through
Network moves quickly into data the memory block of the directly incoming computer of data in remote system stored device from a system,
Without having any impact to operating system, it eliminates external memory and replicates and data exchange operation, be it is a kind of completely by
Hardware executes the working method that I/O is exchanged, and data exchange is without CPU in this fashion, and directly in memory and I/O device
Between carry out.
Using DMA (direct memory access) mode, the purpose is to reduce the expense of CPU when high-volume data transmission to use
Special DMA controllers (DMAC) generate memory access address and controlling memory access process advantages has operation to be realized by hardware circuit, pass
Defeated speed is fast.
CPU is not intervened substantially, only initialization and at the end of participate in, CPU and peripheral hardware concurrent working are efficient.
The course of work of RDMA is as follows:
(1) when an application execution RDMA reads or writes request, any data duplication is not executed and is not being needed in any
Under conditions of core memory participates in, RDMA requests are sent to local NIC (network interface card) from operation application in the user space.
(2) NIC reads the content of buffering, and passes through transmission of network to long-range NIC.
(3) it has been asked comprising target virtual address, memory key and data itself in the RDMA information of transmission over networks
At can both handle in the user space completely and (complete to arrange by polling user grade), or in application sleep always to asking
Asking to handle .RDMA by kernel memory in the case of completing and operate makes to apply and can be read from the memory of a remote application
Data write data to this memory.
(4) target NIC confirms memory key, directly writes data into application cache, the remote dummy for operation
Memory address is included in RDMA information.
Claims (6)
1. a kind of computer virus off-limit file Transmission system, which is characterized in that including:
Receiving module(1), the data for receiving the transmission of FTP service end, and be stored in the memory of FTP local sides;
Antivirus module(2), for received data to be carried out virus signature scanning in the memory of FTP local sides, according to
Virus characteristic library judge the data whether virus infection, the data of virus infection are abandoned or are retracted processing, will not
The data markers of virus infection are state to be forwarded, and the data address of uninfecting virus is dealt into queue to be sent, this is killed
Malicious module(2)With receiving module(1)Connection;
Transport protocol conversion module(3), for the transport protocol of the data of uninfecting virus to be converted to IB agreements by IP agreement,
The transport protocol conversion module(3)With antivirus module(2)Connection;
Security isolation region module(4), using rdma protocol by the data of uninfecting virus be stored in FTP local sides safety every
From in region, the security isolation region module(4)With transport protocol conversion module(3)Connection.
2. computer virus off-limit file Transmission system according to claim 1, it is characterised in that:The receiving module
(1)Including at least one File Transfer Protocol port, connected for being established by ICP/IP protocol between FTP local sides and FTP service end
And transmission data.
3. computer virus off-limit file Transmission system according to claim 1 or 2, it is characterised in that:It further include notice
Module(5), for notifying user when the data to virus infection are abandoned or retract processing, the notification module and antivirus
Module(2)Connection.
4. a kind of virus off-limit file transmission method, it is characterised in that:Using the computer as described in claims 1 to 3 is any
Viral off-limit file Transmission system, includes the following steps:
Step 1, FTP local sides receive the data that FTP service end is sent and are stored in the memory of FTP local sides;
The data of reception are carried out virus signature scanning by step 2, FTP local sides in memory, are judged according to virus characteristic library
The data whether virus infection;If it is confirmed that data virus infection, then abandon the data or retract;If really
Recognize the data uninfecting virus, is then state to be forwarded by the data markers, and the data address of uninfecting virus is dealt into
In queue to be sent;
The transport protocol of the data of uninfecting virus is converted to IB agreements by step 3 by IP agreement;
Step 4 is stored in using rdma protocol in the security isolation region module of FTP local sides.
5. virus off-limit file transmission method according to claim 4, it is characterised in that:In the step 2, FTP is local
The data of reception are carried out virus signature scanning by end in memory, judge whether the data infect disease according to virus characteristic library
Poison specific method be:
It is scanned for certain segment data or some data slot, by the virus characteristic data of scan data and virus database
It is compareed, if the segment data or any one of this data slot and virus database virus characteristic match,
Judge the segment data or this data slot virus infection.
6. virus off-limit file transmission method according to claim 4 or 5, it is characterised in that:In the step 1, in FTP
Before local side receives the data transmitted by FTP service end, whether the data transmitted by first interpretation FTP service end are legal, if closing
Method then receives the data and labeled as virus investigation data are waited for, if illegal, does not receive the data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610027423.1A CN105681417B (en) | 2016-01-15 | 2016-01-15 | Computer virus off-limit file Transmission system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610027423.1A CN105681417B (en) | 2016-01-15 | 2016-01-15 | Computer virus off-limit file Transmission system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105681417A CN105681417A (en) | 2016-06-15 |
CN105681417B true CN105681417B (en) | 2018-08-14 |
Family
ID=56300987
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610027423.1A Active CN105681417B (en) | 2016-01-15 | 2016-01-15 | Computer virus off-limit file Transmission system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105681417B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101382984A (en) * | 2007-09-05 | 2009-03-11 | 江启煜 | Method for scanning and detecting generalized unknown virus |
CN101431521A (en) * | 2008-11-26 | 2009-05-13 | 北京网康科技有限公司 | Anti-Trojan network security system and method |
CN101599922A (en) * | 2008-06-02 | 2009-12-09 | 北京华凯兴网络科技有限公司 | Application-layer protocol virus protective gateway |
CN101610264A (en) * | 2009-07-24 | 2009-12-23 | 深圳市永达电子股份有限公司 | The management method of a kind of firewall system, safety service platform and firewall system |
EP1988473B1 (en) * | 2007-05-04 | 2012-02-08 | Helge Hofmeister | A server with a core using a virtual file system and a method for securely redirecting a persistent storage device operation to a middleware infrastructure |
CN104022998A (en) * | 2013-03-01 | 2014-09-03 | 北京瑞星信息技术有限公司 | Network transmission data virus detection processing method |
-
2016
- 2016-01-15 CN CN201610027423.1A patent/CN105681417B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1988473B1 (en) * | 2007-05-04 | 2012-02-08 | Helge Hofmeister | A server with a core using a virtual file system and a method for securely redirecting a persistent storage device operation to a middleware infrastructure |
CN101382984A (en) * | 2007-09-05 | 2009-03-11 | 江启煜 | Method for scanning and detecting generalized unknown virus |
CN101599922A (en) * | 2008-06-02 | 2009-12-09 | 北京华凯兴网络科技有限公司 | Application-layer protocol virus protective gateway |
CN101431521A (en) * | 2008-11-26 | 2009-05-13 | 北京网康科技有限公司 | Anti-Trojan network security system and method |
CN101610264A (en) * | 2009-07-24 | 2009-12-23 | 深圳市永达电子股份有限公司 | The management method of a kind of firewall system, safety service platform and firewall system |
CN104022998A (en) * | 2013-03-01 | 2014-09-03 | 北京瑞星信息技术有限公司 | Network transmission data virus detection processing method |
Non-Patent Citations (1)
Title |
---|
网络单向隔离控制***的设计与实现;唐晋;《中国优秀硕士学位论文全文数据库(电子期刊)信息科技辑》;20130531;1-76 * |
Also Published As
Publication number | Publication date |
---|---|
CN105681417A (en) | 2016-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8005022B2 (en) | Host operating system bypass for packets destined for a virtual machine | |
US9794282B1 (en) | Server with queuing layer mechanism for changing treatment of client connections | |
EP1565826B1 (en) | Network interface and protocol supporting mappings of virtual memory locations at different processing devices | |
CN111756712B (en) | Method for forging IP address and preventing attack based on virtual network equipment | |
EP2175603A1 (en) | Dynamic access control policy with port restrictions for a network security appliance | |
US9985977B2 (en) | Direct cache access for network input/output devices | |
Ng et al. | A Waypoint Service Approach to Connect Heterogeneous Internet Address Spaces. | |
CN110505244A (en) | Long-range tunnel access technique gateway and server | |
KR20120121668A (en) | High Performance System and Method for Blocking Harmful Sites Access on the basis of Network | |
CN105681417B (en) | Computer virus off-limit file Transmission system and method | |
Mansley | Engineering a user-level TCP for the CLAN network | |
CN107257352B (en) | DPDK-based URL authentication redirection system and method | |
US8555368B2 (en) | Firewall filtering using network controller circuitry | |
CN114024731A (en) | Message processing method and device | |
CN110581843B (en) | Mimic Web gateway multi-application flow directional distribution method | |
US20060282508A1 (en) | System and method of responding to a flood attack on a data processing system | |
Frey | Zero-copy network communication: An applicability study of iWARP beyond micro benchmarks | |
Mireles et al. | Securing an InfiniBand network and its effect on performance | |
CN113518066A (en) | Scanning system for address proxy conversion and address conversion method | |
CN117714115A (en) | Attack protection method, device, server and storage medium | |
CN115174243A (en) | Malicious IP address blocking processing method, device, equipment and storage medium | |
CN115118459A (en) | Method and equipment for realizing secure data exchange based on security card and isolation card heterogeneous | |
Ganger et al. | Self-Securing Network Interfaces: What, Why and How (CMU-CS-02-144) | |
杨武 et al. | Techniques of Building a Scalable, Efficient Intrusion Monitoring Architecture | |
Liang et al. | Research of Security Router Technology on Internet Environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP02 | Change in the address of a patent holder |
Address after: 400039 No. 24-9, Keyuan Road, Jiulongpo District, Chongqing, 24-9 Patentee after: CHONGQING FANHAN DIGITAL TECHNOLOGY CO., LTD. Address before: 400039 Chongqing City Nan'an District, Asia Pacific Road 9, Rong Chuang nine international 7 29-11 Patentee before: CHONGQING FANHAN DIGITAL TECHNOLOGY CO., LTD. |
|
CP02 | Change in the address of a patent holder |