CN106911662A - A kind of system and method for the low interaction of malice sample cultivation interaction conversion high - Google Patents

A kind of system and method for the low interaction of malice sample cultivation interaction conversion high Download PDF

Info

Publication number
CN106911662A
CN106911662A CN201610889558.9A CN201610889558A CN106911662A CN 106911662 A CN106911662 A CN 106911662A CN 201610889558 A CN201610889558 A CN 201610889558A CN 106911662 A CN106911662 A CN 106911662A
Authority
CN
China
Prior art keywords
packet data
malicious act
data
network
interaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610889558.9A
Other languages
Chinese (zh)
Other versions
CN106911662B (en
Inventor
康学斌
李拾萱
肖新光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Antan Network Security Technology Co.,Ltd.
Original Assignee
Shenzhen Anzhitian Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Anzhitian Information Technology Co Ltd filed Critical Shenzhen Anzhitian Information Technology Co Ltd
Priority to CN201610889558.9A priority Critical patent/CN106911662B/en
Publication of CN106911662A publication Critical patent/CN106911662A/en
Application granted granted Critical
Publication of CN106911662B publication Critical patent/CN106911662B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of system of malice sample cultivation low interaction of interaction conversion high, including:Interactive module high, for based on, no less than the secondary first packet data for re-running malicious act, obtaining malicious act network service, it is emulated for playback data that constant first packet data are kept in operation in running environment;Low interactive module, for based on the emulated for playback data, the first packet data being sent to identical family's malicious act, monitors and obtains the network information of malicious act communication.The mode that the present invention solves interaction high in the prior art obtains the network information of sample, reaches monitor command with control server or attack inefficiency, it is necessary to expend a large amount of networks and actual resource to realize running environment, can be only achieved the technical problem of effect.

Description

A kind of system and method for the low interaction of malice sample cultivation interaction conversion high
Technical field
The present invention relates to computer security technique field, relate more specifically to a kind of interaction high of malice sample cultivation honey net and turn Change the system and method for low interaction.
Background technology
In the prior art, the sweet network technology of cultivation can be divided into two classes by the level of interaction according to the sweet network data of cultivation:It is low The sweet net of interaction cultivation and the sweet net of interaction cultivation high.The sweet net of low interaction cultivation uses analogue technique, do not have real operating system and Service, level of interaction is low, can only be according to known bugs simulated operating system and the respondent behavior of application program;Height interaction cultivation honey Network operation disposes real application program in real operating system, can construct real service environment, captures more rich Attack data.
It is desirable to researcher cultivates a large amount of malice samples come the network information by obtaining sample in sandbox, reach To monitor command and control server or attack, this mode is referred to as the cultural method of interaction high.The mode reality of height interaction Existing efficiency is more low, and risk is higher, it is necessary to expend a large amount of networks and actual resource to realize running environment, can be only achieved effect Really, long-term high concurrent realizes that cost is larger.
The content of the invention
In order to solve the above-mentioned technical problem, there is provided a kind of low friendship of malice sample cultivation interaction conversion high of the invention Mutual system and method.
According to the first aspect of the invention, there is provided a kind of system of the low interaction of malice sample cultivation interaction conversion high.Should System includes:Interactive module high, for based on malicious act is re-run no less than secondary in running environment, obtaining malicious act net The first packet data of network communication, it is emulated for playback data that constant first packet data are kept in operation;Low interactive module, for based on institute Emulated for playback data are stated, the first packet data are sent to identical family's malicious act, monitor and obtain the net of malicious act communication Network information.
In certain embodiments, the interactive module high includes:Acquisition submodule, be no less than in running environment for obtaining The first packet data that the secondary malicious act for re-running communicates with server foundation first in network communications;Compare submodule Block, secondary first packet data are no less than for comparing, and the first packet data keep constant and are recorded as emulated for playback data.
In certain embodiments, also include:Operation module, for analog network running environment operation malicious act, and Obtain every time after the first packet data, data cleansing is carried out to the analog network running environment before re-running malicious act.
In certain embodiments, the acquisition submodule, for being deployed in network interface, monitoring connection network sends number According to the acquisition first packet data.
In certain embodiments, the first packet data include when re-running for the first time with the server three-way handshake after There is the packet of Content of Communication, sent automatically by the instruction being built in the malicious act.
According to the second aspect of the invention, there is provided a kind of method of the malice sample cultivation low interaction of interaction conversion high, including: Based on malicious act is re-run no less than secondary in running environment, the first packet data of malicious act network service are obtained, in operation It is emulated for playback data to keep constant first packet data;Based on emulated for playback data, first packet is sent to identical family's malicious act Data, monitor and obtain the network information of malicious act communication.
In certain embodiments, it is described based on malicious act is re-run no less than secondary in running environment, obtain malice row It is the first packet data of communication, constant first packet data is kept in operation for emulated for playback data, including:In acquisition running environment not Less than the first packet data that the secondary malicious act for re-running communicates with server foundation first in network communications;Comparison is no less than Secondary first packet data, first packet data keep constant and are recorded as emulated for playback data.
In certain embodiments, also include:Analog network running environment runs malicious act, and is obtaining first packet number every time After, data cleansing is carried out to the analog network running environment before re-running malicious act.
In certain embodiments, it is described obtain no less than the secondary malicious act for re-running in network communications first with clothes Business device sets up the first packet data of communication, and for being deployed in network interface, monitoring connection network sends data, obtains the head Bag data.
In certain embodiments, the first packet data include when re-running for the first time with the server three-way handshake after There is the packet of Content of Communication, sent automatically by the instruction being built in the malicious act.
By using the method for the present invention and system, using the network monitoring of sandbox, real malicious act first packet is obtained, Using limited network and actual resource, the malicious act first packet of emulation high is only sent, play concurrent capability to greatest extent, according to According to the automation module of continuous running, the monitor malicious behavioral activity for continuing, automating is realized.Can meet automation, efficiently Malice sample monitoring, realize that efficient malice sample is monitored using limited Internet resources and other actual resources, obtain The resource of information of newest malice sample.
Brief description of the drawings
In order to illustrate more clearly of technical scheme, letter will be made to the accompanying drawing to be used needed for embodiment below Singly introduce, it should be apparent that, drawings in the following description are only some embodiments described in the present invention, for this area For those of ordinary skill, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic diagram of the application scenarios of the communication system 100 according to the embodiment of the present invention;
Fig. 2 is the block diagram of the system according to a kind of malice sample of embodiment of the present invention cultivation low interaction of interaction conversion high;
Fig. 3 is the system interactive module high according to a kind of malice sample of embodiment of the present invention cultivation low interaction of interaction conversion high Block diagram;
Fig. 4 is the flow chart of the method according to a kind of malice sample of embodiment of the present invention cultivation low interaction of interaction conversion high.
Specific embodiment
With reference to the accompanying drawings to a preferred embodiment of the present invention will be described in detail, eliminate in the course of the description for this It is unnecessary details and function for invention, to prevent the understanding of the present invention from causing to obscure.Show although being shown in accompanying drawing Example property embodiment, it being understood, however, that may be realized in various forms the present invention without that should be limited by embodiments set forth here System.Conversely, there is provided these embodiments are able to be best understood from the disclosure, and can be complete by the scope of the present invention Convey to those skilled in the art.
Fig. 1 shows the schematic diagram of the application scenarios of communication system of the invention 100.As shown in Fig. 1, lead to Letter system 100 can include the production webserver 110 and order with control server 120.The production webserver 110 Can be connected and communicate with order with control server 120 by communication network 130.Communication network 130 can be with It is wired or wireless.Specifically, the example of communication network 130 can be including but not limited to:Wire cable or optical-fiber type Network or WLAN (" WLAN ", it may be possible to WiFi or WiMAX types) or it is also possible to be the wireless short of bluetooth-type Range communication network.
The production webserver 110 sends packet to order with control server 120 in a network environment, and receives life Order is transmitted through next packet with control server 120, carries out network service.The production webserver 110 includes that interaction high is husky Case 111 and low interactive server 112, low interactive server 112 can be operated by user A.According to the present invention, height interaction sandbox 111 can repeatedly cultivate and run malicious code sample, and send and obtain real data with control server 120 to order Bag, by the network interface being deployed in sandbox, multiple first packet data can be obtained, find indeclinable first packet data is activation to Low interactive server 112, is simulated with control server 120 to order by low interactive server 112 and retransmits this first packet data, Monitored simultaneously, to obtain the network information of identical family's sample.
Fig. 2 shows a kind of block diagram of the system of the low interaction of malice sample cultivation interaction conversion high of the invention, such as Fig. 2 Shown, system includes:Interactive module high 210, low interactive module 220 and operation module 230, wherein, operation module 230 is optional 's.
Interactive module high 210, for based on malicious act is re-run no less than secondary in running environment, obtaining malicious act The first packet data of network service, it is emulated for playback data that constant first packet data are kept in operation;
Based on malicious code behavior sample, sample is cultivated in sandbox running environment, by the network for being deployed in sandbox Interactive module high 210 in interface obtains order and controls first packet data related network information and store.Then cleaning number is carried out According to link, second cultivation is carried out in sandbox and order and control first packet data are obtained again, also can repeatedly cultivated and obtain First packet data, as the emulated for playback data of low interaction if first packet data twice are constant.
Here the information being primarily upon is order and interactive module high in the network service of control first packet data, i.e. sandbox 210 first times with order with control server three-way handshake after first packet, this first packet be from local interactive module high 210 to Order has the packet of Content of Communication with control server to send first.Because order is typically with control server first packet Built-in instruction in the sample carries out automatic transmission, in theory for, as long as the automatic feelings given out a contract for a project of instruction in analog sample Condition, it is possible to real to receive the network information that order is beamed back with control server.Further, line command can also be entered with control Behavior, at this moment, the harmful communication data that height interaction can be produced(Such as DDoS data)Harmless treatment is carried out, can effectively be hindered Only attack.
The purpose of operation malicious act sample is to carry out first time screening to existing sample for the first time, and filtering out to be carried out The sample communicated with control is ordered, and records first packet data.
Interactive module high re-runs malicious act 210 2 times, and sample is cultivated by height interaction, to order and control server Real order is sent and obtained with control first packet data.Order and control first packet data to getting twice are contrasted, If first packet data message is constant, then it is assumed that be effective order and control first packet data, and store related network information.
Since it is desired that ensureing that the first packet data for sending are relative orders real with control first packet, just can guarantee that order with control Control server can be received correctly, therefore find the change in the first packet of multiple transmission and constant part.Because in sample The sent first packet data of instruction may depend on some variables, such as time, system configuration information etc..Have found change and Constant part, could send more real order and control first packet, to obtain real communication data, in order to avoid the data for sending Communicated with control because order cannot enter line command with the setting of control server.Secondary cultivation operation malicious act sample, and It is to find variable and constant place in first packet to the purpose that first packet data are compared, to obtain the real order that can be reset It is emulated for playback data with first packet data are controlled.
Low interactive module 220, for based on emulated for playback data, first packet data, prison being sent to identical family's malicious act Listen and obtain the network information of malicious act communication.
Based on the emulated for playback data that interactive module high 210 is obtained, low interactive module 220 is in order and control server Identical family's sample simulation reproduction command and control first packet data, while receive and monitor network communication data, to obtain phase With the network information of family's sample.
Here the information being primarily upon is that order and control first packet are sent to order by low interactive module 220 and control is serviced Device, with order with control server communication, therefore can obtain order with control communication data the network information, to the network information Processed and stored.
In certain embodiments, system also includes:
Operation module 230, for analog network running environment run malicious act, and obtain every time the first packet data it Afterwards, data cleansing is carried out to analog network running environment before re-running malicious act.
Fig. 3 shows a kind of system interactive module high of the low interaction of malice sample cultivation interaction conversion high of the invention Block diagram, as shown in figure 3, interactive module high includes:Acquisition submodule 212, comparison submodule 214.
Acquisition submodule 212, for obtaining in running environment no less than the secondary malicious act for re-running in network service In set up the first packet data that communicate with server first.Here server is order and control server, acquisition submodule 212 Can be used for being deployed in the interaction network interface of sandbox 111 high, monitoring connection network sends data, obtains first packet data.
Submodule 214 is compared, secondary first packet data are no less than for comparing, first packet data keep constant and are recorded as mould Intend replay data.It is to find variable and constant place in first packet to the purpose that first packet data are compared, can be reset with obtaining Real order with control first packet data for emulated for playback data.
Fig. 4 shows a kind of flow chart of the method for the low interaction of malice sample cultivation interaction conversion high of the invention, such as Shown in Fig. 4, method includes:
S410, runs malicious act for the first time in running environment, network service is set up with server first in acquisition network service First packet data 1, server here is order and control server.
Based on malicious code behavior sample, sample is cultivated in sandbox running environment, by being deployed in sandbox Interactive module high 210 in network interface obtains order and controls first packet data related network information and store.
S420, after first packet data are obtained every time, line number is entered before re-running malicious act to analog network running environment According to cleaning.
S430, the secondary first packet data 2 for re-running malicious act, obtaining malicious act network service in running environment.
S440, compares secondary first packet data, and first packet data keep constant and are recorded as emulated for playback data.
The first packet data that instruction in malicious act sample is sent may depend on some variables, such as the time, be System configuration information etc..Change and constant part are have found, more real order and control first packet could be sent, it is true to obtain Communication data, in order to avoid send data because order with control server setting cannot enter line command and control communicate.
First packet data include when re-running for the first time with the server three-way handshake after the packet for having Content of Communication, Sent automatically by the instruction being built in the malicious act.
S450, based on emulated for playback data, first packet data is sent to identical family's malicious act, monitors and obtain malice row It is the network information of communication.
The present invention obtains real order and control first packet, using limited network by using the network monitoring of sandbox And actual resource, order and the control first packet of emulation high are only sent, concurrent capability to greatest extent is played, according to continuous running Automation module, realizes the lasting, monitor command of automation and control activity.Automation, efficient malice sample can be met Monitoring, realize that efficient malice sample is monitored using limited Internet resources and other actual resources, obtain newest malice The resource of information of sample.
So far combined preferred embodiment invention has been described.It should be understood that those skilled in the art are not departing from In the case of the spirit and scope of the present invention, various other changes can be carried out, replace and add.Therefore, model of the invention Enclose and be not limited to above-mentioned specific embodiment, and should be defined by the appended claims.

Claims (10)

1. the system that a kind of malice sample cultivation interaction high converts low interaction, it is characterised in that including:
Interactive module high, for based on malicious act is re-run no less than secondary in running environment, obtaining malicious act network and leading to The first packet data of letter, it is emulated for playback data that constant first packet data are kept in operation;
Low interactive module, for based on the emulated for playback data, the first packet data, prison being sent to identical family's malicious act Listen and obtain the network information of malicious act communication.
2. system according to claim 1, it is characterised in that the interactive module high includes:
Acquisition submodule, for obtain in running environment no less than the secondary malicious act for re-running in network communications first with Server sets up the first packet data of communication;
Submodule is compared, secondary first packet data are no less than for comparing, the first packet data keep constant and are recorded as simulation Replay data.
3. system according to claim 1, it is characterised in that also include:
Operation module, malicious act is run for analog network running environment, and after the first packet data are obtained every time, weight Data cleansing is carried out to the analog network running environment before operation malicious act.
4. system according to claim 2, it is characterised in that the acquisition submodule, for being deployed in network interface, prison Control connection network sends data, obtains the first packet data.
5. the system according to any one of Claims 1-4, it is characterised in that the when the first packet data include re-running Once with the server three-way handshake after the packet for having Content of Communication, entered by the instruction being built in the malicious act Row is automatic to be sent.
6. a kind of method that malice sample cultivation interaction high converts low interaction, it is characterised in that including:
Based on malicious act is re-run no less than secondary in running environment, the first packet data of acquisition malicious act network service are transported It is emulated for playback data that constant first packet data are kept in row;
Based on emulated for playback data, first packet data are sent to identical family's malicious act, monitor and obtain malicious act communication The network information.
7. method according to claim 6, it is characterised in that described based on re-running evil no less than secondary in running environment Meaning behavior, obtains the first packet data of malicious act communication, constant first packet data is kept in operation for emulated for playback data, bag Include:
Set up with server first in network communications no less than the secondary malicious act for re-running in acquisition running environment and communicated First packet data;
Compare and be no less than secondary first packet data, first packet data keep constant and are recorded as emulated for playback data.
8. method according to claim 6, it is characterised in that also include:
Analog network running environment runs malicious act, and after first packet data are obtained every time, it is right before malicious act to re-run The analog network running environment carries out data cleansing.
9. method according to claim 7, it is characterised in that the acquisition exists no less than the secondary malicious act for re-running The first packet data communicated with server foundation first in network service, for being deployed in network interface, monitoring connection network Data are sent, the first packet data are obtained.
10. the method according to any one of claim 6 to 9, it is characterised in that the when the first packet data include re-running Once with the server three-way handshake after the packet for having Content of Communication, entered by the instruction being built in the malicious act Row is automatic to be sent.
CN201610889558.9A 2016-10-12 2016-10-12 System and method for high-interaction to low-interaction conversion of malicious sample culture Active CN106911662B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610889558.9A CN106911662B (en) 2016-10-12 2016-10-12 System and method for high-interaction to low-interaction conversion of malicious sample culture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610889558.9A CN106911662B (en) 2016-10-12 2016-10-12 System and method for high-interaction to low-interaction conversion of malicious sample culture

Publications (2)

Publication Number Publication Date
CN106911662A true CN106911662A (en) 2017-06-30
CN106911662B CN106911662B (en) 2020-11-03

Family

ID=59207454

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610889558.9A Active CN106911662B (en) 2016-10-12 2016-10-12 System and method for high-interaction to low-interaction conversion of malicious sample culture

Country Status (1)

Country Link
CN (1) CN106911662B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112261029A (en) * 2020-10-16 2021-01-22 北京锐驰信安技术有限公司 DDoS malicious code detection and tracing method based on breeding
CN113190835A (en) * 2021-02-04 2021-07-30 恒安嘉新(北京)科技股份公司 Application program violation detection method, device, equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060075099A1 (en) * 2004-09-16 2006-04-06 Pearson Malcolm E Automatic elimination of viruses and spam
CN101087196A (en) * 2006-12-27 2007-12-12 北京大学 Multi-layer honey network data transmission method and system
CN101582907A (en) * 2009-06-24 2009-11-18 成都市华为赛门铁克科技有限公司 Method for enhancing the trapping capability of honeynet and honeynet system
CN102035793A (en) * 2009-09-28 2011-04-27 成都市华为赛门铁克科技有限公司 Botnet detecting method, device and network security protective equipment
CN103561004A (en) * 2013-10-22 2014-02-05 西安交通大学 Cooperative type active defense system based on honey nets
US20150047032A1 (en) * 2013-08-07 2015-02-12 Front Porch Communications, Inc. System and method for computer security
CN105787370A (en) * 2016-03-07 2016-07-20 成都驭奔科技有限公司 Malicious software collecting and analyzing method based on honeypots

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060075099A1 (en) * 2004-09-16 2006-04-06 Pearson Malcolm E Automatic elimination of viruses and spam
CN101087196A (en) * 2006-12-27 2007-12-12 北京大学 Multi-layer honey network data transmission method and system
CN101582907A (en) * 2009-06-24 2009-11-18 成都市华为赛门铁克科技有限公司 Method for enhancing the trapping capability of honeynet and honeynet system
CN102035793A (en) * 2009-09-28 2011-04-27 成都市华为赛门铁克科技有限公司 Botnet detecting method, device and network security protective equipment
US20150047032A1 (en) * 2013-08-07 2015-02-12 Front Porch Communications, Inc. System and method for computer security
CN103561004A (en) * 2013-10-22 2014-02-05 西安交通大学 Cooperative type active defense system based on honey nets
CN105787370A (en) * 2016-03-07 2016-07-20 成都驭奔科技有限公司 Malicious software collecting and analyzing method based on honeypots

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112261029A (en) * 2020-10-16 2021-01-22 北京锐驰信安技术有限公司 DDoS malicious code detection and tracing method based on breeding
CN112261029B (en) * 2020-10-16 2023-05-02 北京锐驰信安技术有限公司 DDoS malicious code detection and tracing method based on cultivation
CN113190835A (en) * 2021-02-04 2021-07-30 恒安嘉新(北京)科技股份公司 Application program violation detection method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN106911662B (en) 2020-11-03

Similar Documents

Publication Publication Date Title
CN102088754B (en) Network access behavior-based access control method and system for wireless local area network
CN103686226B (en) Method and system for monitoring internet access of set top box based on cloud computation and set top box
CN106687974B (en) Attack observation device and attack observation method
CN105450654B (en) Smart home development platform and its business development method based on middleware Technology
US9065556B2 (en) Methods, systems, and computer readable media for processing multiple control and user data flows at a port processor
Neves et al. Future mode of operations for 5G–The SELFNET approach enabled by SDN/NFV
CN105103494A (en) Network switch simulation
CN102130839B (en) Data transmission method and device
CN103023928A (en) P2P (peer-to-peer) node matching system and method
CN105093945A (en) System and method for safely controlling smart household apparatuses based on smart cloud
CN101378573B (en) System and method for testing access gateway performance
CN109525461A (en) A kind of test method of the network equipment, device, equipment and storage medium
CN114500110B (en) Network shooting range concurrent flow dynamic generation system and method
CN111885174B (en) Method and system for processing nodes in different network segments
US20230254383A1 (en) Operations control of network services
CN106911662A (en) A kind of system and method for the low interaction of malice sample cultivation interaction conversion high
CN104317634A (en) Information flow simulation system and method suitable for mode assignment
CN103425486A (en) Remote card content management method and system using synchronous server-side scripting
CN110601912A (en) Internet of things gateway data simulation design system and method
CN106411588B (en) A kind of network device management method, main equipment and management server
CN104994599B (en) A kind of WIFI interacted system based on multiple wlan devices composition
CN104301150B (en) A kind of method for configuring network equipment
CN101645805B (en) P2P streaming media system simulation platform based on NS2
CN105099745A (en) Tracking method and device of business process
CN104902494B (en) A kind of more LTE terminal automatization test systems and its test method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 518000 Shenzhen, Baoan District, Guangdong Xixiang Baoan District street, the source of excellent industrial products display procurement center, block B, 7 floor, No.

Patentee after: Shenzhen Antan Network Security Technology Co.,Ltd.

Address before: 518000 Shenzhen, Baoan District, Guangdong Xixiang Baoan District street, the source of excellent industrial products display procurement center, block B, 7 floor, No.

Patentee before: SHENZHEN ANZHITIAN INFORMATION TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder