CN105282175B - Login method and login system based on safety shell protocol of increasing income - Google Patents

Login method and login system based on safety shell protocol of increasing income Download PDF

Info

Publication number
CN105282175B
CN105282175B CN201510778846.2A CN201510778846A CN105282175B CN 105282175 B CN105282175 B CN 105282175B CN 201510778846 A CN201510778846 A CN 201510778846A CN 105282175 B CN105282175 B CN 105282175B
Authority
CN
China
Prior art keywords
user information
login
increasing income
safety shell
shell protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510778846.2A
Other languages
Chinese (zh)
Other versions
CN105282175A (en
Inventor
李智荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Safety Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201510778846.2A priority Critical patent/CN105282175B/en
Publication of CN105282175A publication Critical patent/CN105282175A/en
Priority to PCT/CN2016/101392 priority patent/WO2017080334A1/en
Application granted granted Critical
Publication of CN105282175B publication Critical patent/CN105282175B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention provides a kind of login method and login system based on safety shell protocol of increasing income.The login method based on safety shell protocol of increasing income comprises the following steps:To increasing income, safety shell protocol application module sends system user information;Linux kernel module verifies the system user information;After linux kernel is verified the system user information, performs re-direction applications module and logged in realizing.The login method and login system of the present invention, is redirected twice by re-direction applications module, and the login of SSH user is realized on the basis of it need not change SSH source codes of increasing income, therefore, greatly reduces subsequent upgrade or the cost of operation maintenance.

Description

Login method and login system based on safety shell protocol of increasing income
Technical field
The present invention relates to field of communication technology, more particularly to a kind of login method based on safety shell protocol of increasing income and Login system.
Background technology
Safety shell protocol (Secure Shell, SSH) is relatively reliable at present, aims at telnet session and other networks Service provides the agreement of security.The information leakage problem in remote management procedures not only can be effectively prevented using SSH agreements, The speed of transmission with the data of compression transmission, can be accelerated.SSH has many functions, it can not only replace Telnet, but also can be FTP, PoP, even PPP provides " passage " of a safety.
The network equipment systems such as interchanger have the Command Line Interface (command-line oneself customized Interface, CLI) configuration interface.What is entered when user is logged in by SSH is the CLI configurations circle of embedded device system customization Face rather than the shell interfaces of Linux system.
It is domestic at present, in addition to several are researched and developed the stronger company of strength and understand oneself realization SSH agreement, most network Equipment research and development manufacturer is all based on SSH softwares (such as OpenSSH) of increasing income, and the source of adaptation modification open source software is made for its own system Code realizes SSH user authentication login functions.
However, if company oneself realizes the exploitation of SSH agreements, without using open source software, this is researched and developed successfully height, is suitable only for Minority has the company of certain research and development strength.And numerous companies are done using SSH softwares (such as OpenSSH) of increasing income for its own system Adaptation changes the source code of open source software to realize SSH user authentication login functions.But at present because to change open source software source Code is, it is necessary to learn the source code of open source software, subsequent upgrade open source software version or replacement open source software, system maintenance Personnel's is of high cost.
Therefore, how people in the art is become the login feature not realizing SSH user on the basis of increasing cost One of member's urgent problem to be solved.
The content of the invention
In view of the foregoing deficiencies of prior art, it is an object of the invention to provide one kind based on the Secure Shell association that increases income The login method and login system of view, for solving the problems, such as to realize that SSH user's login feature cost is higher in the prior art.
In order to achieve the above objects and other related objects, the present invention provides a kind of login based on safety shell protocol of increasing income Method, the login method based on safety shell protocol of increasing income comprise the following steps:To safety shell protocol application mould of increasing income Block sends system user information;Linux kernel module verifies the system user information;When linux kernel is to described After system user information is verified, performs re-direction applications module and logged in realizing.
In one embodiment of the invention, it is described execution re-direction applications module to realize login the step of include:Institute It states to establish between re-direction applications module and linux kernel and redirects SSH connections;In the re-direction applications module and prefabricated life It makes and establishes TCP connection between row interface and logged in realizing.
In one embodiment of the invention, length is established between the re-direction applications module and prefabricated Command Line Interface TCP connection.
In one embodiment of the invention, the login method based on safety shell protocol of increasing income further includes:It is logging in After linux system, the add-on system user information into linux kernel, the system user information includes:Username and password.
It is described to include into linux kernel the step of add-on system user information in one embodiment of the invention: The system user information is stored in by linux kernel/etc/shadow and/etc/passwd files in.
In one embodiment of the invention, the system user information is stored in/etc/passwd files by linux kernel When in folder, the execution program after specified system user information is verified in described/etc/passwd files is described heavy Orient application module.
The present invention provides a kind of login system based on safety shell protocol of increasing income, described based on safety shell protocol of increasing income Login system include:It increases income safety shell protocol application module, for reception system user information;Linux kernel, for pair The system user information is verified;Re-direction applications module verifies the system user information for working as linux system By rear, perform the re-direction applications module and logged in realizing.
In one embodiment of the invention, the re-direction applications module includes:First redirects unit, for described It is established between re-direction applications module and linux system kernel and redirects SSH connections;Second redirects unit, for described TCP connection is established between re-direction applications module and prefabricated Command Line Interface and is logged in realizing.
In one embodiment of the invention, it is described second redirect unit the re-direction applications module with it is prefabricated Long TCP connection is established between Command Line Interface.
In one embodiment of the invention, the login system based on safety shell protocol of increasing income further includes:User believes Add module is ceased, for after linux system is logged in, the add-on system user information into linux kernel, the system user to be believed Breath includes:Username and password.
As described above, the login method and login system based on safety shell protocol of increasing income of the present invention, has with following Beneficial effect:
The login method based on safety shell protocol of increasing income of the present invention verifies system user information in linux kernel It by rear, realized and logged in by re-direction applications module, the source code of open source software need not be changed, therefore, after greatly reducing Grade of continuing rising or the cost of system maintenance.
Description of the drawings
Fig. 1 is shown as the signal of the flow in an embodiment the present invention is based on the login method for safety shell protocol of increasing income Figure.
Fig. 2 is shown as the structural representation in an embodiment the present invention is based on the login system for safety shell protocol of increasing income Figure.
Component label instructions
2 login systems based on safety shell protocol of increasing income
21 increase income safety shell protocol application module
22 linux kernels
23 re-direction applications modules
S11~S13 steps
Specific embodiment
Illustrate embodiments of the present invention below by way of specific specific example, those skilled in the art can be by this specification Disclosed content understands other advantages and effect of the present invention easily.The present invention can also pass through in addition different specific realities The mode of applying is embodied or practiced, the various details in this specification can also be based on different viewpoints with application, without departing from Various modifications or alterations are carried out under the spirit of the present invention.It should be noted that in the case where there is no conflict, following embodiment and implementation Feature in example can be mutually combined.
It should be noted that the diagram provided in following embodiment only illustrates the basic structure of the present invention in a schematic way Think, then only the display component related with the present invention rather than component count, shape and size during according to actual implementation in schema It draws, kenel, quantity and the ratio of each component can be a kind of random change during actual implementation, and its assembly layout kenel It is likely more complexity.
As described in the background art, when being logged at present by SSH or oneself develops SSH agreements or profit Realized with SSH softwares are increased income, but no matter which kind of mode, the cost of exploitation is all very high, and the scope of application is very limited.
Referring to Fig. 1, the present invention provides a kind of login method based on safety shell protocol of increasing income, it is described based on peace of increasing income The login method of full shell protocol comprises the following steps:
S11, to increasing income, safety shell protocol application module sends system user information;
S12, Linux kernel module verify the system user information;
S13 after linux kernel is verified the system user information, performs re-direction applications module to realize It logs in.
Specifically, user establishes SSH with OpenSSH by ssh client software (such as SecureCRT) request and is connected, During this SSH username and passwords are sent to OpenSSH.
OpenSSH whether there is to linux inquiries user name and whether the password of user name is correct, if incorrect, refuses The connection request of exhausted user, is otherwise further processed.Specifically, Linux system kernel (linux kernel) is to user Name and password are verified.
OpenSSH is learning user authentication by rear, and performing RdirectIO application programs, (application program is pre- exploitation Re-direction applications module).OpenSSH is redirected when performing RdirectIO, so as to fulfill the login of SSH user. RdirectIO is that realize application program is needed in the present embodiment, and function is with reference to description below.
In the present embodiment, it is described execution re-direction applications module to realize login the step of include:In the redirection It is established between application module and linux kernel and redirects SSH connections;In the re-direction applications module and prefabricated Command Line Interface Between establish TCP connection with realize log in.Specifically, established between the re-direction applications module and prefabricated Command Line Interface Long TCP connection.
In practical applications, OpenSSH creates a pipeline (pipe) when performing RdirectIO.Pass through this pipe Road, the standard IO of RdirectIO can be redirected to ssh connections.Meanwhile RdirectIO and system customization CLI establishes a tcp The standard IO of RdirectIO, is redirected to this tcp connection by connection.
That is, the function of RdirectIO is that the input of system customization CLI is redirected to RdirectIO standards is defeated Go out;Equally, the standard input of RdirectIO is redirected to the output of system customization CLI, it thus can be by determining in system TCP long connections are established between CLI and RdirectIO processed to realize IO redirection functions here.
Specifically, the realization code of the RdirectIO is:
(Input&Output) processing is redirected by above-mentioned two steps IO, after SSH user is by SSH certification login systems, The data inputted on ssh client (such as SecureCRT) are by being redirected to twice up to system CLI interfaces;Conversely, system is determined The data of CLI inputs processed, which also pass through, to be redirected to twice up to ssh client.
Although the data that actually user inputs in SSH connections are to first pass through OpenSSH decryption, the data warp after decryption System customization CLI is just reached after redirecting twice.But using user perceptually in system, user is to be directly entered to be System customization CLI interfaces.In system user perceptually, user is to be directly logged onto system customization CLI interfaces.
In order to realize the verification of system user information, in the present embodiment, the stepping on based on safety shell protocol of increasing income Recording method further includes:After linux system is logged in, the add-on system user information into linux kernel, the system user information Including:Username and password.
Specifically, it is described to include into linux kernel the step of add-on system user information:Linux kernel is by the system System user information be stored in/etc/shadow and/etc/passwd files in.Meanwhile linux kernel is by the system user Information is stored in/etc/passwd files in when, system user information verification is specified in described/etc/passwd files Execution program after is the re-direction applications module.
In practical applications, increase income OpenSSH user authentication be to linux kernel (linux kernel) verify user The correctness of name and its password.User is by serial ports login system, when adding SSH user to system simultaneously to linux Kernel adds the system user of same subscriber name and password.System user and its password are stored in "/etc/ by linux system In shadow " and "/etc/passwd " two files.
For example, user adds the user of entitled admin for interchanger, switch system is adding the user to itself When in configuration file, increase the system user of an entitled admin to linux kernel.System user increase successfully after "/ A record is respectively added in etc/shadow " and "/etc/passwd " two files.Add toward "/etc/passwd " file When adding the record of admin user, the last one ":" content filled in below is being OpenSSH in definite user name and password all just The application program to be performed after really, what is filled in here is RdirectIO application programs.
Specifically, the realization code of shadow files is:
#cat/etc/shadow
Root:5Gg.mRfhg Iz4g:10925:0:99999:7:::
Sshd:kVsqISda3pms.:0:0:99999:7:::
Admin:IjU5ugwlS2HnY:15357:0:99999:7:::
#
The realization code of passwd files is:
#cat/etc/passwd
Root:x:0:0:root:/root/bin/sh
Sshd:x:1000:1000:sshd privsep:/var/empty:/bin/ssh
Admin:x:1001:1001:Linux User,,,:/home:/mnt/app/RdirectIO
#
OpenSSH can create a pipe when performing RdirectIO application programs between OpenSSH and RdirectIO Road (pipe).The data that user inputs on ssh client (such as SecureCRT) are managed after OpenSSH is decrypted by this Road directly reaches RdirectIO.In turn, the standard output of RdirectIO is defeated after OpenSSH is encrypted also by this pipeline Go out to ssh client.Here processing is completed by OpenSSH open source softwares, need not change OpenSSH source codes.
The login method based on safety shell protocol of increasing income of the present embodiment is completed by prefabricated re-direction applications module It redirects twice, so as to fulfill the login of SSH user, and the SSH source codes that need not increase income, therefore, greatly reduce rear of continuing rising Grade or the cost of operation maintenance.
The present invention provides a kind of login system based on safety shell protocol of increasing income, described based on safety of increasing income with reference to figure 2 The login system of shell protocol includes:
It increases income safety shell protocol application module 21, for reception system user information;
Linux kernel 22, for being verified to the system user information;
Re-direction applications module 23, for working as after linux system is verified the system user information, described in execution Re-direction applications module is logged in realizing.
In the present embodiment, the re-direction applications module 23 includes:First, which redirects unit and second, redirects unit (figure Not shown in), described first, which redirects unit, is used to establish weight between the re-direction applications module and linux system kernel Orient SSH connections;The second redirection unit is used to build between the re-direction applications module and prefabricated Command Line Interface Vertical TCP connection is logged in realizing.Specifically, described second unit is redirected in the re-direction applications module and prefabricated life It makes and establishes long TCP connection between row interface.
In the present embodiment, the login system based on safety shell protocol of increasing income further includes:User information add module, For after linux system is logged in, the add-on system user information into linux kernel, the system user information to include:User Name and password.
The specific implementation process of the login system based on safety shell protocol of increasing income of the present embodiment can refer to previously with regard to The detailed description of login method based on safety shell protocol of increasing income, details are not described herein.
In conclusion the login method and login system based on safety shell protocol of increasing income of the present invention, using prefabricated Redirection module realization redirects twice, so as to fulfill the login of SSH user, and need not change SSH source codes of increasing income, so as to Greatly reduce the cost of subsequent upgrading and operation maintenance.So the present invention effectively overcome it is of the prior art it is a variety of lack It puts and has high industrial utilization.
The above-described embodiments merely illustrate the principles and effects of the present invention, and is not intended to limit the present invention.It is any ripe Know the personage of this technology all can carry out modifications and changes under the spirit and scope without prejudice to the present invention to above-described embodiment.Cause This, those of ordinary skill in the art is complete without departing from disclosed spirit and institute under technological thought such as Into all equivalent modifications or change, should by the present invention claim be covered.

Claims (8)

1. a kind of login method based on safety shell protocol of increasing income, which is characterized in that described based on safety shell protocol of increasing income Login method comprise the following steps:
To increasing income, safety shell protocol application module sends system user information;
Linux kernel module verifies the system user information;
After linux kernel is verified the system user information, performs re-direction applications module and logged in realizing;
The step of execution re-direction applications module is to realize login includes:
It is established between the re-direction applications module and linux kernel and redirects SSH connections;
TCP connection, which is established, between the re-direction applications module and prefabricated Command Line Interface is logged in realizing.
2. the login method according to claim 1 based on safety shell protocol of increasing income, it is characterised in that:It is reset described Long TCP connection is established between application module and prefabricated Command Line Interface.
3. the login method according to claim 1 based on safety shell protocol of increasing income, which is characterized in that further include: After logging in linux system, the add-on system user information into linux kernel, the system user information includes:User name and close Code.
4. the login method according to claim 3 based on safety shell protocol of increasing income, which is characterized in that it is described to Include in linux kernel the step of add-on system user information:The system user information is stored in/etc/ by linux kernel In shadow and/etc/passwd files.
5. the login method according to claim 4 based on safety shell protocol of increasing income, which is characterized in that linux kernel The system user information is stored in/etc/passwd files in when, system is specified in described/etc/passwd files Execution program after system user information is verified is the re-direction applications module.
6. a kind of login system based on safety shell protocol of increasing income, which is characterized in that described based on safety shell protocol of increasing income Login system include:
It increases income safety shell protocol application module, for reception system user information;
Linux kernel, for being verified to the system user information;
Re-direction applications module for working as after linux system is verified the system user information, performs the redirection Application module is logged in realizing;
The re-direction applications module includes:
First redirects unit, and SSH companies are redirected for being established between the re-direction applications module and linux system kernel It connects;
Second redirect unit, for established between the re-direction applications module and prefabricated Command Line Interface TCP connection with It realizes and logs in.
7. the login system according to claim 6 based on safety shell protocol of increasing income, which is characterized in that second weight Directed element establishes long TCP connection between the re-direction applications module and prefabricated Command Line Interface.
8. the login system according to claim 6 based on safety shell protocol of increasing income, which is characterized in that further include:With Family information add module, for after linux system is logged in, the add-on system user information into linux kernel, the system to be used Family information includes:Username and password.
CN201510778846.2A 2015-11-13 2015-11-13 Login method and login system based on safety shell protocol of increasing income Active CN105282175B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510778846.2A CN105282175B (en) 2015-11-13 2015-11-13 Login method and login system based on safety shell protocol of increasing income
PCT/CN2016/101392 WO2017080334A1 (en) 2015-11-13 2016-09-30 Login method and login system based on open-source secure shell protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510778846.2A CN105282175B (en) 2015-11-13 2015-11-13 Login method and login system based on safety shell protocol of increasing income

Publications (2)

Publication Number Publication Date
CN105282175A CN105282175A (en) 2016-01-27
CN105282175B true CN105282175B (en) 2018-05-18

Family

ID=55150501

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510778846.2A Active CN105282175B (en) 2015-11-13 2015-11-13 Login method and login system based on safety shell protocol of increasing income

Country Status (2)

Country Link
CN (1) CN105282175B (en)
WO (1) WO2017080334A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282175B (en) * 2015-11-13 2018-05-18 上海斐讯数据通信技术有限公司 Login method and login system based on safety shell protocol of increasing income
CN106060066A (en) * 2016-06-28 2016-10-26 积成电子股份有限公司 Embedded linux-based method for realizing terminal maintenance and information release

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101370009A (en) * 2008-03-12 2009-02-18 武汉理工大学 Construction method for virtual network block frame based on Linux kernel network subsystem
CN103685242A (en) * 2013-11-27 2014-03-26 国家电网公司 Electric power operation and maintenance security defending system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6606708B1 (en) * 1997-09-26 2003-08-12 Worldcom, Inc. Secure server architecture for Web based data management
CN102857520B (en) * 2012-10-11 2015-09-30 德讯科技股份有限公司 Telnet protocol security access system and method for character terminal
CN105282175B (en) * 2015-11-13 2018-05-18 上海斐讯数据通信技术有限公司 Login method and login system based on safety shell protocol of increasing income

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101370009A (en) * 2008-03-12 2009-02-18 武汉理工大学 Construction method for virtual network block frame based on Linux kernel network subsystem
CN103685242A (en) * 2013-11-27 2014-03-26 国家电网公司 Electric power operation and maintenance security defending system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《基于SSH与代理的数据安全传输机制的研究》;尹刚;《电子科学》;20090415;正文第32页和第43页 *

Also Published As

Publication number Publication date
CN105282175A (en) 2016-01-27
WO2017080334A1 (en) 2017-05-18

Similar Documents

Publication Publication Date Title
US11843589B2 (en) Network connection automation
CN103944890B (en) Virtual interaction system based on customer end/server mode and method
CN104348777B (en) The access control method and system of a kind of mobile terminal to third-party server
CN107070880A (en) A kind of method and system of single-sign-on, a kind of authentication center's server
CN109150904A (en) Interface service call method and terminal device
CN109309666A (en) Interface security control method and terminal device in a kind of network security
CN104486343A (en) Method and system for double-factor bidirectional authentication
CN101562621A (en) User authorization method and system and device thereof
CN103067404B (en) A kind of method that user accesses embedded web server
CN103595770B (en) Method and device for achieving file downloading through SDK
CN103188332B (en) A kind of remote desktop access control management method, equipment and system
CN104580211B (en) SOA architecture-based intrusive system
CN105683937A (en) Protocol agnostic storage access in a software defined network topology
CN105282175B (en) Login method and login system based on safety shell protocol of increasing income
CN103577180A (en) Data processing method and data processing device
CN105812345B (en) It is a kind of realize webpage to client communication method and device
CN104283852B (en) The single sign-on authentication method and system and client and server-side of mobile application
CN106992964A (en) A kind of micro services safety proxy system suitable for mixed cloud
CN106302416A (en) Corporate intranet access method, Android terminal, transfer processing method, transfer server
CN104639421A (en) Instant communication information processing method and instant communication information processing system based on intelligent television
CN105323291A (en) Method and device for processing unified login of mobile applications
CN109905490A (en) Virtual Simulative Experiment shared platform framework
CN109327530A (en) A kind of information processing method, device, electronic equipment and storage medium
CN113296744A (en) Application development system and method
CN105306577A (en) Data sharing system and method between handheld devices based on APP

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201207

Address after: Dai Xi Zhen Shang Qiang Lu, Wuxing District, Huzhou City, Zhejiang Province

Patentee after: HUZHOU AIDI ELECTRIC Co.,Ltd.

Address before: 201616 Shanghai city Songjiang District Sixian Road No. 3666

Patentee before: Phicomm (Shanghai) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221221

Address after: Chinatelecom tower, No. 19, Chaoyangmen North Street, Dongcheng District, Beijing 100010

Patentee after: Tianyi Safety Technology Co.,Ltd.

Address before: Dai Xi Zhen Shang Qiang Lu, Wuxing District, Huzhou City, Zhejiang Province

Patentee before: HUZHOU AIDI ELECTRIC Co.,Ltd.

TR01 Transfer of patent right