CN106911662A - A kind of system and method for the low interaction of malice sample cultivation interaction conversion high - Google Patents
A kind of system and method for the low interaction of malice sample cultivation interaction conversion high Download PDFInfo
- Publication number
- CN106911662A CN106911662A CN201610889558.9A CN201610889558A CN106911662A CN 106911662 A CN106911662 A CN 106911662A CN 201610889558 A CN201610889558 A CN 201610889558A CN 106911662 A CN106911662 A CN 106911662A
- Authority
- CN
- China
- Prior art keywords
- packet data
- malicious act
- data
- network
- interaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of system of malice sample cultivation low interaction of interaction conversion high, including:Interactive module high, for based on, no less than the secondary first packet data for re-running malicious act, obtaining malicious act network service, it is emulated for playback data that constant first packet data are kept in operation in running environment;Low interactive module, for based on the emulated for playback data, the first packet data being sent to identical family's malicious act, monitors and obtains the network information of malicious act communication.The mode that the present invention solves interaction high in the prior art obtains the network information of sample, reaches monitor command with control server or attack inefficiency, it is necessary to expend a large amount of networks and actual resource to realize running environment, can be only achieved the technical problem of effect.
Description
Technical field
The present invention relates to computer security technique field, relate more specifically to a kind of interaction high of malice sample cultivation honey net and turn
Change the system and method for low interaction.
Background technology
In the prior art, the sweet network technology of cultivation can be divided into two classes by the level of interaction according to the sweet network data of cultivation:It is low
The sweet net of interaction cultivation and the sweet net of interaction cultivation high.The sweet net of low interaction cultivation uses analogue technique, do not have real operating system and
Service, level of interaction is low, can only be according to known bugs simulated operating system and the respondent behavior of application program;Height interaction cultivation honey
Network operation disposes real application program in real operating system, can construct real service environment, captures more rich
Attack data.
It is desirable to researcher cultivates a large amount of malice samples come the network information by obtaining sample in sandbox, reach
To monitor command and control server or attack, this mode is referred to as the cultural method of interaction high.The mode reality of height interaction
Existing efficiency is more low, and risk is higher, it is necessary to expend a large amount of networks and actual resource to realize running environment, can be only achieved effect
Really, long-term high concurrent realizes that cost is larger.
The content of the invention
In order to solve the above-mentioned technical problem, there is provided a kind of low friendship of malice sample cultivation interaction conversion high of the invention
Mutual system and method.
According to the first aspect of the invention, there is provided a kind of system of the low interaction of malice sample cultivation interaction conversion high.Should
System includes:Interactive module high, for based on malicious act is re-run no less than secondary in running environment, obtaining malicious act net
The first packet data of network communication, it is emulated for playback data that constant first packet data are kept in operation;Low interactive module, for based on institute
Emulated for playback data are stated, the first packet data are sent to identical family's malicious act, monitor and obtain the net of malicious act communication
Network information.
In certain embodiments, the interactive module high includes:Acquisition submodule, be no less than in running environment for obtaining
The first packet data that the secondary malicious act for re-running communicates with server foundation first in network communications;Compare submodule
Block, secondary first packet data are no less than for comparing, and the first packet data keep constant and are recorded as emulated for playback data.
In certain embodiments, also include:Operation module, for analog network running environment operation malicious act, and
Obtain every time after the first packet data, data cleansing is carried out to the analog network running environment before re-running malicious act.
In certain embodiments, the acquisition submodule, for being deployed in network interface, monitoring connection network sends number
According to the acquisition first packet data.
In certain embodiments, the first packet data include when re-running for the first time with the server three-way handshake after
There is the packet of Content of Communication, sent automatically by the instruction being built in the malicious act.
According to the second aspect of the invention, there is provided a kind of method of the malice sample cultivation low interaction of interaction conversion high, including:
Based on malicious act is re-run no less than secondary in running environment, the first packet data of malicious act network service are obtained, in operation
It is emulated for playback data to keep constant first packet data;Based on emulated for playback data, first packet is sent to identical family's malicious act
Data, monitor and obtain the network information of malicious act communication.
In certain embodiments, it is described based on malicious act is re-run no less than secondary in running environment, obtain malice row
It is the first packet data of communication, constant first packet data is kept in operation for emulated for playback data, including:In acquisition running environment not
Less than the first packet data that the secondary malicious act for re-running communicates with server foundation first in network communications;Comparison is no less than
Secondary first packet data, first packet data keep constant and are recorded as emulated for playback data.
In certain embodiments, also include:Analog network running environment runs malicious act, and is obtaining first packet number every time
After, data cleansing is carried out to the analog network running environment before re-running malicious act.
In certain embodiments, it is described obtain no less than the secondary malicious act for re-running in network communications first with clothes
Business device sets up the first packet data of communication, and for being deployed in network interface, monitoring connection network sends data, obtains the head
Bag data.
In certain embodiments, the first packet data include when re-running for the first time with the server three-way handshake after
There is the packet of Content of Communication, sent automatically by the instruction being built in the malicious act.
By using the method for the present invention and system, using the network monitoring of sandbox, real malicious act first packet is obtained,
Using limited network and actual resource, the malicious act first packet of emulation high is only sent, play concurrent capability to greatest extent, according to
According to the automation module of continuous running, the monitor malicious behavioral activity for continuing, automating is realized.Can meet automation, efficiently
Malice sample monitoring, realize that efficient malice sample is monitored using limited Internet resources and other actual resources, obtain
The resource of information of newest malice sample.
Brief description of the drawings
In order to illustrate more clearly of technical scheme, letter will be made to the accompanying drawing to be used needed for embodiment below
Singly introduce, it should be apparent that, drawings in the following description are only some embodiments described in the present invention, for this area
For those of ordinary skill, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic diagram of the application scenarios of the communication system 100 according to the embodiment of the present invention;
Fig. 2 is the block diagram of the system according to a kind of malice sample of embodiment of the present invention cultivation low interaction of interaction conversion high;
Fig. 3 is the system interactive module high according to a kind of malice sample of embodiment of the present invention cultivation low interaction of interaction conversion high
Block diagram;
Fig. 4 is the flow chart of the method according to a kind of malice sample of embodiment of the present invention cultivation low interaction of interaction conversion high.
Specific embodiment
With reference to the accompanying drawings to a preferred embodiment of the present invention will be described in detail, eliminate in the course of the description for this
It is unnecessary details and function for invention, to prevent the understanding of the present invention from causing to obscure.Show although being shown in accompanying drawing
Example property embodiment, it being understood, however, that may be realized in various forms the present invention without that should be limited by embodiments set forth here
System.Conversely, there is provided these embodiments are able to be best understood from the disclosure, and can be complete by the scope of the present invention
Convey to those skilled in the art.
Fig. 1 shows the schematic diagram of the application scenarios of communication system of the invention 100.As shown in Fig. 1, lead to
Letter system 100 can include the production webserver 110 and order with control server 120.The production webserver 110
Can be connected and communicate with order with control server 120 by communication network 130.Communication network 130 can be with
It is wired or wireless.Specifically, the example of communication network 130 can be including but not limited to:Wire cable or optical-fiber type
Network or WLAN (" WLAN ", it may be possible to WiFi or WiMAX types) or it is also possible to be the wireless short of bluetooth-type
Range communication network.
The production webserver 110 sends packet to order with control server 120 in a network environment, and receives life
Order is transmitted through next packet with control server 120, carries out network service.The production webserver 110 includes that interaction high is husky
Case 111 and low interactive server 112, low interactive server 112 can be operated by user A.According to the present invention, height interaction sandbox
111 can repeatedly cultivate and run malicious code sample, and send and obtain real data with control server 120 to order
Bag, by the network interface being deployed in sandbox, multiple first packet data can be obtained, find indeclinable first packet data is activation to
Low interactive server 112, is simulated with control server 120 to order by low interactive server 112 and retransmits this first packet data,
Monitored simultaneously, to obtain the network information of identical family's sample.
Fig. 2 shows a kind of block diagram of the system of the low interaction of malice sample cultivation interaction conversion high of the invention, such as Fig. 2
Shown, system includes:Interactive module high 210, low interactive module 220 and operation module 230, wherein, operation module 230 is optional
's.
Interactive module high 210, for based on malicious act is re-run no less than secondary in running environment, obtaining malicious act
The first packet data of network service, it is emulated for playback data that constant first packet data are kept in operation;
Based on malicious code behavior sample, sample is cultivated in sandbox running environment, by the network for being deployed in sandbox
Interactive module high 210 in interface obtains order and controls first packet data related network information and store.Then cleaning number is carried out
According to link, second cultivation is carried out in sandbox and order and control first packet data are obtained again, also can repeatedly cultivated and obtain
First packet data, as the emulated for playback data of low interaction if first packet data twice are constant.
Here the information being primarily upon is order and interactive module high in the network service of control first packet data, i.e. sandbox
210 first times with order with control server three-way handshake after first packet, this first packet be from local interactive module high 210 to
Order has the packet of Content of Communication with control server to send first.Because order is typically with control server first packet
Built-in instruction in the sample carries out automatic transmission, in theory for, as long as the automatic feelings given out a contract for a project of instruction in analog sample
Condition, it is possible to real to receive the network information that order is beamed back with control server.Further, line command can also be entered with control
Behavior, at this moment, the harmful communication data that height interaction can be produced(Such as DDoS data)Harmless treatment is carried out, can effectively be hindered
Only attack.
The purpose of operation malicious act sample is to carry out first time screening to existing sample for the first time, and filtering out to be carried out
The sample communicated with control is ordered, and records first packet data.
Interactive module high re-runs malicious act 210 2 times, and sample is cultivated by height interaction, to order and control server
Real order is sent and obtained with control first packet data.Order and control first packet data to getting twice are contrasted,
If first packet data message is constant, then it is assumed that be effective order and control first packet data, and store related network information.
Since it is desired that ensureing that the first packet data for sending are relative orders real with control first packet, just can guarantee that order with control
Control server can be received correctly, therefore find the change in the first packet of multiple transmission and constant part.Because in sample
The sent first packet data of instruction may depend on some variables, such as time, system configuration information etc..Have found change and
Constant part, could send more real order and control first packet, to obtain real communication data, in order to avoid the data for sending
Communicated with control because order cannot enter line command with the setting of control server.Secondary cultivation operation malicious act sample, and
It is to find variable and constant place in first packet to the purpose that first packet data are compared, to obtain the real order that can be reset
It is emulated for playback data with first packet data are controlled.
Low interactive module 220, for based on emulated for playback data, first packet data, prison being sent to identical family's malicious act
Listen and obtain the network information of malicious act communication.
Based on the emulated for playback data that interactive module high 210 is obtained, low interactive module 220 is in order and control server
Identical family's sample simulation reproduction command and control first packet data, while receive and monitor network communication data, to obtain phase
With the network information of family's sample.
Here the information being primarily upon is that order and control first packet are sent to order by low interactive module 220 and control is serviced
Device, with order with control server communication, therefore can obtain order with control communication data the network information, to the network information
Processed and stored.
In certain embodiments, system also includes:
Operation module 230, for analog network running environment run malicious act, and obtain every time the first packet data it
Afterwards, data cleansing is carried out to analog network running environment before re-running malicious act.
Fig. 3 shows a kind of system interactive module high of the low interaction of malice sample cultivation interaction conversion high of the invention
Block diagram, as shown in figure 3, interactive module high includes:Acquisition submodule 212, comparison submodule 214.
Acquisition submodule 212, for obtaining in running environment no less than the secondary malicious act for re-running in network service
In set up the first packet data that communicate with server first.Here server is order and control server, acquisition submodule 212
Can be used for being deployed in the interaction network interface of sandbox 111 high, monitoring connection network sends data, obtains first packet data.
Submodule 214 is compared, secondary first packet data are no less than for comparing, first packet data keep constant and are recorded as mould
Intend replay data.It is to find variable and constant place in first packet to the purpose that first packet data are compared, can be reset with obtaining
Real order with control first packet data for emulated for playback data.
Fig. 4 shows a kind of flow chart of the method for the low interaction of malice sample cultivation interaction conversion high of the invention, such as
Shown in Fig. 4, method includes:
S410, runs malicious act for the first time in running environment, network service is set up with server first in acquisition network service
First packet data 1, server here is order and control server.
Based on malicious code behavior sample, sample is cultivated in sandbox running environment, by being deployed in sandbox
Interactive module high 210 in network interface obtains order and controls first packet data related network information and store.
S420, after first packet data are obtained every time, line number is entered before re-running malicious act to analog network running environment
According to cleaning.
S430, the secondary first packet data 2 for re-running malicious act, obtaining malicious act network service in running environment.
S440, compares secondary first packet data, and first packet data keep constant and are recorded as emulated for playback data.
The first packet data that instruction in malicious act sample is sent may depend on some variables, such as the time, be
System configuration information etc..Change and constant part are have found, more real order and control first packet could be sent, it is true to obtain
Communication data, in order to avoid send data because order with control server setting cannot enter line command and control communicate.
First packet data include when re-running for the first time with the server three-way handshake after the packet for having Content of Communication,
Sent automatically by the instruction being built in the malicious act.
S450, based on emulated for playback data, first packet data is sent to identical family's malicious act, monitors and obtain malice row
It is the network information of communication.
The present invention obtains real order and control first packet, using limited network by using the network monitoring of sandbox
And actual resource, order and the control first packet of emulation high are only sent, concurrent capability to greatest extent is played, according to continuous running
Automation module, realizes the lasting, monitor command of automation and control activity.Automation, efficient malice sample can be met
Monitoring, realize that efficient malice sample is monitored using limited Internet resources and other actual resources, obtain newest malice
The resource of information of sample.
So far combined preferred embodiment invention has been described.It should be understood that those skilled in the art are not departing from
In the case of the spirit and scope of the present invention, various other changes can be carried out, replace and add.Therefore, model of the invention
Enclose and be not limited to above-mentioned specific embodiment, and should be defined by the appended claims.
Claims (10)
1. the system that a kind of malice sample cultivation interaction high converts low interaction, it is characterised in that including:
Interactive module high, for based on malicious act is re-run no less than secondary in running environment, obtaining malicious act network and leading to
The first packet data of letter, it is emulated for playback data that constant first packet data are kept in operation;
Low interactive module, for based on the emulated for playback data, the first packet data, prison being sent to identical family's malicious act
Listen and obtain the network information of malicious act communication.
2. system according to claim 1, it is characterised in that the interactive module high includes:
Acquisition submodule, for obtain in running environment no less than the secondary malicious act for re-running in network communications first with
Server sets up the first packet data of communication;
Submodule is compared, secondary first packet data are no less than for comparing, the first packet data keep constant and are recorded as simulation
Replay data.
3. system according to claim 1, it is characterised in that also include:
Operation module, malicious act is run for analog network running environment, and after the first packet data are obtained every time, weight
Data cleansing is carried out to the analog network running environment before operation malicious act.
4. system according to claim 2, it is characterised in that the acquisition submodule, for being deployed in network interface, prison
Control connection network sends data, obtains the first packet data.
5. the system according to any one of Claims 1-4, it is characterised in that the when the first packet data include re-running
Once with the server three-way handshake after the packet for having Content of Communication, entered by the instruction being built in the malicious act
Row is automatic to be sent.
6. a kind of method that malice sample cultivation interaction high converts low interaction, it is characterised in that including:
Based on malicious act is re-run no less than secondary in running environment, the first packet data of acquisition malicious act network service are transported
It is emulated for playback data that constant first packet data are kept in row;
Based on emulated for playback data, first packet data are sent to identical family's malicious act, monitor and obtain malicious act communication
The network information.
7. method according to claim 6, it is characterised in that described based on re-running evil no less than secondary in running environment
Meaning behavior, obtains the first packet data of malicious act communication, constant first packet data is kept in operation for emulated for playback data, bag
Include:
Set up with server first in network communications no less than the secondary malicious act for re-running in acquisition running environment and communicated
First packet data;
Compare and be no less than secondary first packet data, first packet data keep constant and are recorded as emulated for playback data.
8. method according to claim 6, it is characterised in that also include:
Analog network running environment runs malicious act, and after first packet data are obtained every time, it is right before malicious act to re-run
The analog network running environment carries out data cleansing.
9. method according to claim 7, it is characterised in that the acquisition exists no less than the secondary malicious act for re-running
The first packet data communicated with server foundation first in network service, for being deployed in network interface, monitoring connection network
Data are sent, the first packet data are obtained.
10. the method according to any one of claim 6 to 9, it is characterised in that the when the first packet data include re-running
Once with the server three-way handshake after the packet for having Content of Communication, entered by the instruction being built in the malicious act
Row is automatic to be sent.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610889558.9A CN106911662B (en) | 2016-10-12 | 2016-10-12 | System and method for high-interaction to low-interaction conversion of malicious sample culture |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610889558.9A CN106911662B (en) | 2016-10-12 | 2016-10-12 | System and method for high-interaction to low-interaction conversion of malicious sample culture |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106911662A true CN106911662A (en) | 2017-06-30 |
CN106911662B CN106911662B (en) | 2020-11-03 |
Family
ID=59207454
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610889558.9A Active CN106911662B (en) | 2016-10-12 | 2016-10-12 | System and method for high-interaction to low-interaction conversion of malicious sample culture |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106911662B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112261029A (en) * | 2020-10-16 | 2021-01-22 | 北京锐驰信安技术有限公司 | DDoS malicious code detection and tracing method based on breeding |
CN113190835A (en) * | 2021-02-04 | 2021-07-30 | 恒安嘉新(北京)科技股份公司 | Application program violation detection method, device, equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060075099A1 (en) * | 2004-09-16 | 2006-04-06 | Pearson Malcolm E | Automatic elimination of viruses and spam |
CN101087196A (en) * | 2006-12-27 | 2007-12-12 | 北京大学 | Multi-layer honey network data transmission method and system |
CN101582907A (en) * | 2009-06-24 | 2009-11-18 | 成都市华为赛门铁克科技有限公司 | Method for enhancing the trapping capability of honeynet and honeynet system |
CN102035793A (en) * | 2009-09-28 | 2011-04-27 | 成都市华为赛门铁克科技有限公司 | Botnet detecting method, device and network security protective equipment |
CN103561004A (en) * | 2013-10-22 | 2014-02-05 | 西安交通大学 | Cooperative type active defense system based on honey nets |
US20150047032A1 (en) * | 2013-08-07 | 2015-02-12 | Front Porch Communications, Inc. | System and method for computer security |
CN105787370A (en) * | 2016-03-07 | 2016-07-20 | 成都驭奔科技有限公司 | Malicious software collecting and analyzing method based on honeypots |
-
2016
- 2016-10-12 CN CN201610889558.9A patent/CN106911662B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060075099A1 (en) * | 2004-09-16 | 2006-04-06 | Pearson Malcolm E | Automatic elimination of viruses and spam |
CN101087196A (en) * | 2006-12-27 | 2007-12-12 | 北京大学 | Multi-layer honey network data transmission method and system |
CN101582907A (en) * | 2009-06-24 | 2009-11-18 | 成都市华为赛门铁克科技有限公司 | Method for enhancing the trapping capability of honeynet and honeynet system |
CN102035793A (en) * | 2009-09-28 | 2011-04-27 | 成都市华为赛门铁克科技有限公司 | Botnet detecting method, device and network security protective equipment |
US20150047032A1 (en) * | 2013-08-07 | 2015-02-12 | Front Porch Communications, Inc. | System and method for computer security |
CN103561004A (en) * | 2013-10-22 | 2014-02-05 | 西安交通大学 | Cooperative type active defense system based on honey nets |
CN105787370A (en) * | 2016-03-07 | 2016-07-20 | 成都驭奔科技有限公司 | Malicious software collecting and analyzing method based on honeypots |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112261029A (en) * | 2020-10-16 | 2021-01-22 | 北京锐驰信安技术有限公司 | DDoS malicious code detection and tracing method based on breeding |
CN112261029B (en) * | 2020-10-16 | 2023-05-02 | 北京锐驰信安技术有限公司 | DDoS malicious code detection and tracing method based on cultivation |
CN113190835A (en) * | 2021-02-04 | 2021-07-30 | 恒安嘉新(北京)科技股份公司 | Application program violation detection method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106911662B (en) | 2020-11-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102088754B (en) | Network access behavior-based access control method and system for wireless local area network | |
CN103686226B (en) | Method and system for monitoring internet access of set top box based on cloud computation and set top box | |
CN106687974B (en) | Attack observation device and attack observation method | |
CN105450654B (en) | Smart home development platform and its business development method based on middleware Technology | |
US9065556B2 (en) | Methods, systems, and computer readable media for processing multiple control and user data flows at a port processor | |
Neves et al. | Future mode of operations for 5G–The SELFNET approach enabled by SDN/NFV | |
CN105103494A (en) | Network switch simulation | |
CN102130839B (en) | Data transmission method and device | |
CN103023928A (en) | P2P (peer-to-peer) node matching system and method | |
CN105093945A (en) | System and method for safely controlling smart household apparatuses based on smart cloud | |
CN101378573B (en) | System and method for testing access gateway performance | |
CN109525461A (en) | A kind of test method of the network equipment, device, equipment and storage medium | |
CN114500110B (en) | Network shooting range concurrent flow dynamic generation system and method | |
CN111885174B (en) | Method and system for processing nodes in different network segments | |
US20230254383A1 (en) | Operations control of network services | |
CN106911662A (en) | A kind of system and method for the low interaction of malice sample cultivation interaction conversion high | |
CN104317634A (en) | Information flow simulation system and method suitable for mode assignment | |
CN103425486A (en) | Remote card content management method and system using synchronous server-side scripting | |
CN110601912A (en) | Internet of things gateway data simulation design system and method | |
CN106411588B (en) | A kind of network device management method, main equipment and management server | |
CN104994599B (en) | A kind of WIFI interacted system based on multiple wlan devices composition | |
CN104301150B (en) | A kind of method for configuring network equipment | |
CN101645805B (en) | P2P streaming media system simulation platform based on NS2 | |
CN105099745A (en) | Tracking method and device of business process | |
CN104902494B (en) | A kind of more LTE terminal automatization test systems and its test method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 518000 Shenzhen, Baoan District, Guangdong Xixiang Baoan District street, the source of excellent industrial products display procurement center, block B, 7 floor, No. Patentee after: Shenzhen Antan Network Security Technology Co.,Ltd. Address before: 518000 Shenzhen, Baoan District, Guangdong Xixiang Baoan District street, the source of excellent industrial products display procurement center, block B, 7 floor, No. Patentee before: SHENZHEN ANZHITIAN INFORMATION TECHNOLOGY Co.,Ltd. |
|
CP01 | Change in the name or title of a patent holder |