CN114338172B - Mobile network target range system and network flow attack simulation method - Google Patents

Mobile network target range system and network flow attack simulation method Download PDF

Info

Publication number
CN114338172B
CN114338172B CN202111645230.XA CN202111645230A CN114338172B CN 114338172 B CN114338172 B CN 114338172B CN 202111645230 A CN202111645230 A CN 202111645230A CN 114338172 B CN114338172 B CN 114338172B
Authority
CN
China
Prior art keywords
module
attack
data
simulation
defense
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111645230.XA
Other languages
Chinese (zh)
Other versions
CN114338172A (en
Inventor
谷锎
王建
张泰杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Xipu Sunshine Technology Co.,Ltd.
Beijing Xipu Sunshine Technology Co ltd
Original Assignee
Beijing Xipu Sunshine Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xipu Sunshine Technology Co ltd filed Critical Beijing Xipu Sunshine Technology Co ltd
Priority to CN202111645230.XA priority Critical patent/CN114338172B/en
Publication of CN114338172A publication Critical patent/CN114338172A/en
Application granted granted Critical
Publication of CN114338172B publication Critical patent/CN114338172B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the field of network security, and discloses a mobile network shooting range system and a network flow attack simulation method, which comprise the following steps: the main control module is used for controlling the running and sending of the global instruction and is used as a core control end; the editing and importing module is used for correspondingly editing and inputting the tested system data; the data storage module is used for storing data information generated in the simulation process and supporting writing and reading; and the analysis module is used for analyzing the imported data and matching the corresponding configuration format. According to the invention, the specific defense level of the simulation system is visually compared and tested in the process of simulating the attack, the attack mode can be promoted after the attack fails, the user is helped to evaluate the risk in the defense system in detail, the double tests of anti-hijack and deciphering on the simulation system participating in the test are realized, and the discrimination capability of the simulation system on tampered data information is tested.

Description

Mobile network target range system and network flow attack simulation method
Technical Field
The invention relates to the technical field of network security, in particular to a mobile network shooting range system and a network flow attack simulation method.
Background
The network target range is a technology or a product for simulating and reproducing the running state and running environment of a network architecture, system equipment and a business process in a real network space based on a virtualization technology so as to more effectively realize the behaviors of learning, research, inspection, competition, exercise and the like related to network safety, thereby improving the network safety confrontation level of personnel and institutions, and the network target range is used as an important infrastructure for supporting network space safety technology verification, network weaponry test, attack and defense confrontation exercise and network risk assessment and becomes an important support means for the construction of emerging network safety strategies and professional talent teams;
however, in the process of simulating an attack, the conventional network shooting range system cannot perform an intuitive comparison test on a simulation system participating in the test, so that the specific defense level of the simulation system is not convenient to test, and the attack mode cannot perform promotion operation.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects in the prior art, the invention provides a mobile network shooting range system and a network flow attack simulation method, which can effectively solve the problems that the network shooting range system in the prior art cannot perform visual comparison test on a simulation system participating in the test in the process of simulating the attack, is inconvenient to test the specific defense level of the simulation system, and cannot perform advanced operation in an attack mode.
(II) technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme:
the invention discloses a mobile network target range system, comprising:
the main control module (1) is used for controlling the operation and the sending of the global instruction and is used as a core control end;
the editing and importing module (2) is used for correspondingly editing and inputting the tested system data;
the data storage module (3) is used for storing data information generated in the simulation process and supporting writing and reading;
the analysis module (5) is used for analyzing the imported data and matching the corresponding configuration format;
the simulation construction module (6) is used for constructing the processed system data and simulating a simulation system according to the defense system participating in the test;
the sending module (7) is used for operating the simulation system and sending the data information to the outside;
the data interception module (8) is used for intercepting data information sent by the simulation system and preventing data from flowing out;
the decoding module (9) is used for decoding the intercepted data information and converting the intercepted data information into a proper format for reading;
the replacement module (10) is used for tampering the converted data, and butting the sending end of the simulation system again to replace the original information;
the promotion module (11) is used for promoting all modules in the attack mode after the data interception fails, and promoting the attack strength;
the main control module is connected with information acquisition module and analysis module through editing the leading-in module, analysis module constructs the module through the simulation and connects sending module, sending module connects gradually contrast module, data storage module and host system, sending module passes through the data interception module and connects the module of deciphering, the module of deciphering is connected in advance to the module of deciphering and is replaced the module, contrast module (12) for contrast the result of offending and defending of different test simulation systems, and generate the contrast report.
Furthermore, the editing and importing module (2) is interactively connected with an information acquisition module (4) through a wireless network, and the information acquisition module (4) is used for acquiring editing data of a related defense system in the network and adopting a defense scheme.
Furthermore, the sending module (7) is interactively connected with a comparison module (12) through a wireless network.
Furthermore, the comparison module (12) and the data storage module (3) are connected with each other through a wireless network, and the comparison module (12) submits all the generated results to a database in a graph mode for copying and storing.
In a second aspect, the present invention provides a method for simulating network traffic attacks, where the method is based on the first aspect, and the method includes the following steps:
step1: according to the system participating in the test, relevant data are copied and imported, and a simulation system is set up after analysis and processing;
step2: collecting data information of an external defense system, and submitting the data information to an editing and importing module;
step3: the simulation system starts to operate, and data information is edited and sent;
step4: flow attack is developed, data information sent by the simulation system is intercepted, and direct outflow of data is prevented;
step5: intercepting successfully, decoding the intercepted data information, selecting an adaptive format for conversion, tampering the converted data, and butting the sending end of the simulation system again to replace the original information;
step6: when interception fails, promoting all modules in an attack mode, and improving attack strength;
step7: if all levels of attack modes pass, judging that the defense is successful, otherwise, judging that the defense fails;
step8: and recording the attack and defense results, independently storing the records of different simulation systems, comparing the records with each other, and generating a chart report.
Furthermore, the simulation building requirement technology of the simulation system in Step1 includes: container virtualization, digital simulation, simulator, protocol simulation.
Furthermore, the traffic attack in Step4 is implemented by using a reasonable service request to occupy excessive service resources, so that a legitimate user cannot obtain a response of the service, and a data packet is transmitted from any source to any destination without deviation;
wherein the behaviors defined by the TCP and HTTP protocols are utilized to continuously tie up computing resources to prevent the emulation system from processing normal transactions and requests.
Furthermore, in Step6, promoting is performed on all modules in the attack mode, attack strength is improved, the attack system is graded through advanced editing, independent packaging is performed, and after a promotion condition is triggered, namely after the interception of the simulation system fails, the attack system is upgraded.
Further, the Step8 of recording the attack and defense results records the data of multiple dimensions of flow data, system states and interactive information in the whole attack and defense process, and acquires different types of data information.
Further, the generating attributes of the chart report in Step8 include: testing time, defense success times and defense failure times of the simulation system.
(III) advantageous effects
Compared with the known public technology, the technical scheme provided by the invention has the following beneficial effects:
1. according to the invention, the visual comparison test is carried out on the simulation system participating in the test in the process of simulating the attack, the specific defense level of the simulation system can be conveniently tested, the attack mode can be promoted after the attack fails, the defense difficulty is improved, and the user can be helped to evaluate the risk in the defense system in detail.
2. According to the invention, the data transmission of the defense system is hijacked, so that double tests of hijacking prevention and decoding of the simulation system participating in the test are realized, the discrimination capability of the simulation system on tampered data information can be tested, the defense capability of the simulation system is further tested, and the comprehensiveness of the data is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
FIG. 1 is a schematic diagram of a mobile network range system;
FIG. 2 is a schematic flow chart of a network traffic attack simulation method;
FIG. 3 is a schematic diagram of the architecture of the present invention;
the reference numerals in the drawings denote: 1. a main control module; 2. an editing and importing module; 3. a data storage module; 4. an information acquisition module; 5. an analysis module; 6. a simulation construction module; 7. a sending module; 8. a data interception module; 9. a decoding module; 10. a replacement module; 11. a promotion module; 12. and a comparison module.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
The present invention will be further described with reference to the following examples.
Example 1
A mobile network range system of the present embodiment, as shown in fig. 1 and 3, includes:
the main control module 1 is used for controlling the running and sending of the global instruction and is used as a core control end;
the editing and importing module 2 is used for correspondingly editing and inputting the tested system data;
the data storage module 3 is used for storing data information generated in the simulation process and supporting writing and reading;
the analysis module 5 is used for analyzing the imported data and matching the corresponding configuration format;
the simulation construction module 6 is used for constructing the processed system data and simulating a simulation system according to the defense systems participating in the test;
the sending module 7 is used for operating the simulation system and sending the data information to the outside;
the data interception module 8 is used for hijacking data information sent by the simulation system and preventing data from flowing out;
the decoding module 9 is used for decoding the hijacked data information, converting the hijacked data information into a proper format and reading the converted data information;
the replacement module 10 is used for replacing the decoded data information, covering the original data information and butting the sending end again;
and the promotion module 11 is used for promoting all modules in the attack mode after the data interception fails, so as to improve the attack strength.
As shown in fig. 1, the edit import module 2 is interactively connected to an information acquisition module 4 through a wireless network, and the information acquisition module 4 is configured to acquire edit data of a related defense system in the network and adopt a defense scheme.
As shown in fig. 1, the sending module 7 is interactively connected to a comparison module 12 through a wireless network, and the comparison module 12 is configured to compare attack and defense results of different test simulation systems and generate a comparison report.
As shown in fig. 1, the comparison module 12 and the data storage module 3 are interconnected through a wireless network, and the comparison module 12 submits all the generated results to the database in a graph manner for copying and storing.
When the system is built, the master control module 1 manages the whole situation, the lead-in test system is edited through the edit lead-in module 2, attack and defense data are stored through the data storage module 3, defense system data of an external network are collected through the information collection module 4, the data are analyzed through the analysis module 5, the analysis data are built through the simulation building module 6, a simulation system is formed, the sending of data information is operated through the sending module 7, the data information is hijacked through the data interception module 8, the data information is decoded through the decoding module 9, the data information is tampered through the replacement module 10, after the relevant module in charge of attack fails, promotion is carried out through the promotion module 11, and attack is put into again.
Example 2
In other aspects, this embodiment further provides a network traffic attack simulation method, as shown in fig. 2, including the following steps:
step1: according to the system participating in the test, relevant data are copied and imported, and a simulation system is set up after analysis and processing;
step2: collecting data information of an external defense system and submitting the data information to an importing end;
step3: the simulation system starts to operate, and data information is edited and sent;
step4: flow attack is developed, and data information sent by the simulation system is intercepted and hijacked to prevent the data from flowing out directly;
step5: if the hijacking is successful, decoding the hijacked data, selecting an adaptive format for conversion, tampering the decoded data, and butting the sending end of the simulation system again to replace the original information;
step6: if the hijacking fails, the existing attack unit is upgraded, and the interception and deciphering levels are improved;
step7: judging that the defense is successful through all levels of attack modes, otherwise, judging that the defense is failed;
step8: and (4) recording attack and defense results, independently storing the records of different simulation systems, comparing the records with each other, and producing a chart report.
As shown in fig. 2, the simulation building requirement technology of the simulation system in Step1 includes: container virtualization, digital simulation, simulator, protocol simulation.
As shown in fig. 2, the traffic attack in Step4 is implemented by using a reasonable service request to occupy too many service resources, so that a legitimate user cannot obtain a response of the service, and a data packet is transmitted from any source to any destination without deviation;
the behaviors defined by protocols such as TCP and HTTP are utilized to continuously occupy computing resources so as to prevent the simulation system from processing normal transactions and requests.
As shown in fig. 2, in the Step6, the interception and decryption levels are increased, the attack system is hierarchically processed through pre-editing, and is independently packaged, and after a promotion condition is triggered, that is, after the interception simulation system fails, the attack system is updated.
As shown in fig. 2, the recording of the attack and defense results in Step8 is to record data of multiple dimensions, such as flow data, system state, interaction information, and the like, in the whole attack and defense process, and acquire data information of different types.
As shown in fig. 2, the attributes of generating the chart report in Step8 include: testing time, defense success times and defense failure times of the simulation system.
By means of the device, the simulation system participating in the test can be visually compared and tested in the process of simulating the attack, the specific defense level of the simulation system can be conveniently tested, the attack mode can be promoted after the attack fails, the defense difficulty is improved, and a user is helped to evaluate risks in the defense system in detail.
Example 3
In the embodiment, various attacking and defending tools and methods are put into a network shooting range high-simulation network environment, repeated tests are carried out, the effects of the attacking and defending tools and methods are optimized, and finally effectiveness verification and optimization of a new attacking and defending technology are achieved;
the target network construction can realize virtual simulation of various network nodes, the virtual network nodes run on a computing cluster, the logical separation of a virtual network topology structure and a physical network topology structure at the bottom of the computing cluster is realized, and the integrated interconnection with a physical network can be realized according to the unified configuration requirement of the target network. The system supports virtual machines, lightweight virtualization and other modes to realize the simulation of virtual network nodes, and combines virtual network scheduling management and link virtual simulation technology to realize a large-scale virtual network with flexibly reconfigurable network topology;
the application service simulation provides generation of background flow, the background flow can be generated based on a model, and the flow can be restored for a specified network topology aiming at a specific scene. The multi-point network flow playback can be carried out in the virtual network environment according to the mapping model, further data support is provided for the realistic simulation of the target network, the terminal behaviors of the user can be simulated by applying business simulation, the simulated terminal behaviors can be overlapped, the permutation and combination of different terminal behaviors are realized, and different user behaviors are simulated more truly.
In conclusion, the simulation system participating in the test is visually compared and tested in the process of simulating the attack, so that the specific defense level of the simulation system can be conveniently tested, the attack mode can be promoted after the attack fails, the defense difficulty is improved, and the user can be helped to evaluate the risk in the defense system in detail;
the anti-hijack and decoding dual test of the simulation system participating in the test is realized, the discrimination capability of the simulation system on tampered data information can be tested, the defense capability of the simulation system is further tested, and the comprehensiveness of the data is ensured.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.

Claims (10)

1. A mobile network range system, comprising:
the main control module (1) is used for controlling the operation and the sending of a global instruction and is used as a core control end;
the editing and importing module (2) is used for correspondingly editing and inputting the tested system data;
the data storage module (3) is used for storing data information generated in the simulation process and supporting writing and reading;
the analysis module (5) is used for analyzing the imported data and matching the corresponding configuration format;
the simulation construction module (6) is used for constructing the processed system data and simulating a simulation system according to the defense system participating in the test;
the sending module (7) is used for operating the simulation system and sending the data information to the outside;
the data interception module (8) is used for intercepting data information sent by the simulation system and preventing data from flowing out;
the decoding module (9) is used for decoding the intercepted data information, converting the intercepted data information into a proper format and reading the data information;
the replacement module (10) is used for tampering the converted data, and butting the sending end of the simulation system again to replace the original information;
the promotion module (11) is used for promoting all modules in the attack mode after the data interception fails, and promoting the attack degree;
the main control module is connected with an information acquisition module and an analysis module through an editing and importing module, the analysis module is connected with a sending module through a simulation building module, the sending module is sequentially connected with a comparison module, a data storage module and a main control module, the sending module is connected with a deciphering module through a data intercepting module, the deciphering module is connected with a promotion module and a replacement module, and the comparison module (12) is used for comparing attack and defense results of different test simulation systems and generating a comparison report.
2. The mobile network target range system according to claim 1, wherein the edit import module (2) is interactively connected with an information acquisition module (4) through a wireless network, and the information acquisition module (4) is used for acquiring edit data of relevant defense systems and adopting defense schemes in the network.
3. A mobile network range system according to claim 1, wherein said transmitting module (7) is interactively connected to a comparing module (12) via a wireless network.
4. The mobile network range system according to claim 1, wherein the comparison module (12) and the data storage module (3) are interconnected through a wireless network, and the comparison module (12) presents all generated results to the database in a graph mode for copying and storing.
5. A simulation method of network traffic attack, which is based on the simulation method of network traffic attack of the mobile network shooting range system in claims 1-4, and is characterized by comprising the following steps:
step1: according to a system participating in testing, copying and importing related data, and building a simulation system after analyzing and processing;
step2: collecting data information of an external defense system, and submitting the data information to an editing and importing module;
step3: the simulation system starts to operate, and data information is edited and sent;
step4: flow attack is developed, data information sent by the simulation system is intercepted, and direct outflow of data is prevented;
step5: intercepting successfully, decoding the intercepted data information, selecting an adaptive format for conversion, tampering the converted data, and butting the sending end of the simulation system again to replace the original information;
step6: when interception fails, promoting all modules in an attack mode, and improving attack strength;
step7: if all levels of attack modes pass, judging that the defense is successful, otherwise, judging that the defense fails;
step8: and recording the attack and defense results, independently storing the records of different simulation systems, comparing the records with each other, and generating a chart report.
6. The network traffic attack simulation method according to claim 5, wherein the simulation building requirement technology of the simulation system in Step1 comprises: container virtualization, digital simulation, simulator, protocol simulation.
7. The method for simulating network traffic attack according to claim 5, wherein the traffic attack in Step4 is performed by using reasonable service requests to occupy too much service resources, so that legitimate users cannot obtain service responses, and data packets are transmitted from any source to any destination without bias;
wherein the behaviors defined by the TCP and HTTP protocols are utilized to continuously tie up computing resources to prevent the emulation system from processing normal transactions and requests.
8. The method according to claim 5, wherein Step6 is to promote all modules in the attack mode, to increase attack power, to hierarchically process the attack system by means of pre-editing, to independently package the attack system, and to upgrade the attack system after triggering the promotion condition, that is, after the interception simulation system fails.
9. The network traffic attack simulation method according to claim 5, wherein the Step8 of recording the attack and defense results records the traffic data, the system status, and the data of multiple dimensions of the interaction information of the whole attack and defense process, and collects different types of data information.
10. The network traffic attack simulation method according to claim 5, wherein the attribute of generation of the graph report in Step8 comprises: testing time, defense success times and defense failure times of the simulation system.
CN202111645230.XA 2021-12-30 2021-12-30 Mobile network target range system and network flow attack simulation method Active CN114338172B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111645230.XA CN114338172B (en) 2021-12-30 2021-12-30 Mobile network target range system and network flow attack simulation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111645230.XA CN114338172B (en) 2021-12-30 2021-12-30 Mobile network target range system and network flow attack simulation method

Publications (2)

Publication Number Publication Date
CN114338172A CN114338172A (en) 2022-04-12
CN114338172B true CN114338172B (en) 2022-12-23

Family

ID=81016078

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111645230.XA Active CN114338172B (en) 2021-12-30 2021-12-30 Mobile network target range system and network flow attack simulation method

Country Status (1)

Country Link
CN (1) CN114338172B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114859758A (en) * 2022-06-22 2022-08-05 支付宝(杭州)信息技术有限公司 Attack-defense confrontation simulation test method and system for network model
CN117455228A (en) * 2023-09-28 2024-01-26 永信至诚科技集团股份有限公司 Evaluation method and device for network risk identification capability

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020167539A1 (en) * 2019-02-05 2020-08-20 Qomplx, Inc. System and method for complex it process annotation, tracing, analysis, and simulation
CN112738022A (en) * 2020-12-07 2021-04-30 浙江工业大学 Attack method for ROS message of robot operating system
CN113259392A (en) * 2021-06-28 2021-08-13 四块科技(深圳)有限公司 Network security attack and defense method, device and storage medium
CN113595799A (en) * 2021-08-03 2021-11-02 北京恒安嘉新安全技术有限公司 Mobile network shooting range system and network flow attack simulation method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020167539A1 (en) * 2019-02-05 2020-08-20 Qomplx, Inc. System and method for complex it process annotation, tracing, analysis, and simulation
CN112738022A (en) * 2020-12-07 2021-04-30 浙江工业大学 Attack method for ROS message of robot operating system
CN113259392A (en) * 2021-06-28 2021-08-13 四块科技(深圳)有限公司 Network security attack and defense method, device and storage medium
CN113595799A (en) * 2021-08-03 2021-11-02 北京恒安嘉新安全技术有限公司 Mobile network shooting range system and network flow attack simulation method

Also Published As

Publication number Publication date
CN114338172A (en) 2022-04-12

Similar Documents

Publication Publication Date Title
CN114338172B (en) Mobile network target range system and network flow attack simulation method
JP2021501935A (en) Computer-implemented systems and methods for linking blockchain to a set of digital twins
CN102438173A (en) Method and system for remotely controlling set top box (STB)
Ani et al. Design considerations for building credible security testbeds: Perspectives from industrial control system use cases
CN102857393B (en) Message simulation based non-public cryptographic algorithm SSL (secure sockets layer) VPN (virtual private network) equipment performance testing method
WO2001033349A2 (en) Architectures for netcentric computing systems
CN112905437B (en) Method, device and storage medium for testing cases
CN106506280A (en) The communication protocol method of testing of intelligent home device and system
KR102180592B1 (en) Method and system for testing it system
CN114816499A (en) Electronic resource sharing method and device and storage medium
CN108665271A (en) Block chain data processing method, device, equipment and storage medium
CN112838951A (en) Operation and maintenance method, device and system of terminal equipment and storage medium
CN105391601A (en) Network management equipment performance testing method and system
CN107770153B (en) General electric power information acquisition system based on collaborative safety protection model
CN109657167A (en) Collecting method, device, server and storage medium
CN102089756A (en) System for injecting protocol specific errors during the certification of components in a storage area network
Ustun A critical review of IEC 61850 testing tools
JPH10313341A (en) Method for analyzing illegal communication on network, system for analyzing illegal communication on network using the method, and recording medium readable by computer recording network illegal communication analysis program
CN115859941A (en) Real-time analysis method and device for vehicle-mounted ATC log
KR102254693B1 (en) Cyber security training system having network writing function
CN110162982A (en) Detect method and device, the storage medium, electronic equipment of illegal permission
CN109960660A (en) A kind of electrical network business networking security evaluation method based on Ansible
CN114241847B (en) Simulation training method, device, equipment and medium for ticket selling and checking operation in station hall
Chao [Retracted] Application of Computer Network Technology in Network Music Education System
Lardier Asgards-h: Enabling advanced smart grid cyber-physical attacks, risk and data studies with helics

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100190 room 0001, 1f, block B, No. 18, Zhongguancun Street, Haidian District, Beijing

Applicant after: Beijing Xipu Sunshine Technology Co.,Ltd.

Address before: 100190 room 0001, 1f, block B, No. 18, Zhongguancun Street, Haidian District, Beijing

Applicant before: BEIJING SIMPLEWARE EDUCATION TECHNOLOGY CO.,LTD.

GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: Room 1072, 1st Floor, Building 22, Hefei Luyang Big Data Industrial Park, No. 868 Qinghe Road, Luyang Industrial Park, Luyang District, Hefei City, Anhui Province, 230001

Patentee after: Anhui Xipu Sunshine Technology Co.,Ltd.

Address before: 100190 room 0001, 1f, block B, No. 18, Zhongguancun Street, Haidian District, Beijing

Patentee before: Beijing Xipu Sunshine Technology Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240104

Address after: Room 809, 8th Floor, Building 17, No. 18 Xingmao Third Street, Beijing Economic and Technological Development Zone (Tongzhou), Tongzhou District, Beijing, 101100

Patentee after: Beijing Xipu Sunshine Technology Co.,Ltd.

Address before: Room 1072, 1st Floor, Building 22, Hefei Luyang Big Data Industrial Park, No. 868 Qinghe Road, Luyang Industrial Park, Luyang District, Hefei City, Anhui Province, 230001

Patentee before: Anhui Xipu Sunshine Technology Co.,Ltd.