CN103812696A - Shuffled frog leaping algorithm based internet of things node reputation evaluation method - Google Patents
Shuffled frog leaping algorithm based internet of things node reputation evaluation method Download PDFInfo
- Publication number
- CN103812696A CN103812696A CN201410040848.7A CN201410040848A CN103812696A CN 103812696 A CN103812696 A CN 103812696A CN 201410040848 A CN201410040848 A CN 201410040848A CN 103812696 A CN103812696 A CN 103812696A
- Authority
- CN
- China
- Prior art keywords
- node
- frog
- nodes
- group
- neighbor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Disclosed is a shuffled frog leaping algorithm based internet of things node reputation evaluation method. The shuffled frog leaping algorithm based internet of things node reputation evaluation method includes analyzing local features of nodes in the internet of things, calculating importance of the nodes in internet of things autonomous domains, using the calculated node importance as a basis for node screen, using a shuffled frog leaping algorithm for clustering the nodes, selecting a kind of nodes with higher importance as neighbor nodes of reputation evaluation, using the neighbor nodes to perform reputation evaluation on nodes to be evaluated according to a reputation evaluation algorithm, calculating a more accurate node reputation value according to current reputation and history reputation of the nodes, setting a threshold value, comparing the node reputation value with the threshold value to judge whether the nodes are credible, judging the nodes are incredible nodes when the reputation value is lower than the set threshold hold, and otherwise, judging the nodes are credible nodes. According to the shuffled frog leaping algorithm based internet of things node reputation evaluation method, the problem that incredible nodes interfere evaluation results in traditional reputation evaluation systems can be effectively avoided.
Description
Technical field
The present invention relates to communication technical field, relate to specifically a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm.
Background technology
At present, mainly concentrate on credible management and credible evaluation two aspects for the credibility research of distributed system, the essence of credible management is the access control model based on authentication and authorization and method in.Method for evaluating trust is that to close with the recommendation trust of inter-entity be basis, in conjunction with self experience, entity confidence level is made to evaluation, then carries out decision-making according to confidence level.Classical Prestige Management technology asks prestige mean value scheme, Bayesian network and cluster to filter.Between node, between territory, break the wall of mistrust very importantly, in general, the information that level of trust can generate corresponding event by the behavior of neighbor node and they be assessed.But node is very easily under attack, and then provide feedback insecure or malice, affect real node credit value.
Existing methodical defect has:
1, credit rating assessment lacks indirect prestige recommendation
Common credit rating assessment need to be considered the factor of subjective and objective two aspects, and the direct credit worthiness of the evaluation of user's credibility not only being obtained by this locality as resource determines, also should consider to calculate the indirect prestige recommendation (reputation) that Agency obtains; Determined by the user who uses this node and the evaluation of the node degree of reliability is not single yet, need to consider that equally the user in other self-control territories recommends the prestige of this node.Consider the subjective objective factor in prestige and the credit assessment process of user, node.
2, the interference of unreliable node to credit assessment
The high isomery and the height that have due to Internet of Things self mix feature, and the node in Autonomous Domain is probably subjected to illegal invasion and attacks, thereby does the degrees of comparison evaluation making mistake, and final assessment result is disturbed to the accuracy of impact evaluation result.
Summary of the invention
The present invention is directed to the insincere node that may occur in traditional credit standing evaluation system and assessment result is produced to the problem of disturbing, propose a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm.
The technical solution adopted in the present invention is: a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm, and described method comprises the following steps:
The Local Features of node in step 1, analyte networking, the importance of the node in calculating Internet of Things Autonomous Domain;
The foundation of step 2, the screening using the node importance after calculating as node, utilizes shuffled frog leaping algorithm to carry out cluster to node;
The higher category node of the node importance that obtains in step 3, selecting step 2 is as the neighbor node of credit assessment;
Step 4, according to credit assessment algorithm, use the neighbor node that obtains of step 3 to carry out credit assessment to the node of needs assessment;
Step 5, calculate node credit value more accurately according to the current prestige of node and historical prestige;
Whether credible step 6, setting threshold, compare predicate node by the node credit value obtaining in step 5 and this threshold value; When credit value is during lower than setting threshold, predicate node is insincere node, and no person is trusted node.
The computational methods of the node importance in described step 1 comprise the following steps:
Step 201, net list is shown to two tuple YK, EY, node set is expressed as
, the set expression on the limit of connected node is
, wherein, n and m represent nodes and the limit number of network, the more important node in limit of connected node is just more important;
Step 202, utilize formula
calculate the weight on limit, wherein
represent the limit number being connected with node i;
Step 203, the weights on limit that node i connects are sued for peace
represent the weight of node i;
The hybrid algorithm that leapfrogs in described step 2 comprises the following steps:
Step 301, take node importance as screening foundation, utilize shuffled frog leaping algorithm to screen neighbor node, each frog individuality
can represent the importance of a node
and utilize formula
calculate the fitness of frog;
Step 303, carry out descending according to the fitness of every the frog calculating, the frog individuality of functional value optimum is made as
;
Step 304, whole frog colony is divided into F group, each group comprises G frog, therefore
, first frog enters the 1st group, and second frog enters the 2nd group, and F frog enters F group, and F+1 frog enters again the 1st group afterwards, and F+2 frog enters the 2nd group, by that analogy, until all frog is divided complete;
Step 305, group carry out partial-depth search to each group after dividing, and has individuality optimum and the poorest fitness to be in each group
with
, iteration is for the poorest fitness each time
carry out, update strategy is: frog displacement
, upgrade the poorest frog position
(
) wherein,
be
between random number,
be the ultimate range that allows frog to move, by above formula, group's the poorest frog individuality of endoadaptation degree upgraded, each group carries out the Local Search number of times of setting;
Step 306, the group that will search for through partial-depth merge a new group of composition, and judge whether to meet the end condition of algorithm, complete the reliable neighbor node of screening.
Credit assessment in described step 4 specifically comprises the following steps:
According to the node obtaining after screening, using them as neighbor node, at T
pin cycle, have multiple neighbor nodes and observe evaluated node, each node has and safeguards the neighbor node list of self, in list, comprise the information such as No. ID, neighbor node and credit value, in the time that node i sends packet to node n, need intermediate node j to forward, node calculates node point reliability by existing monitoring condition
,
computing formula as follows:
, wherein
represent the quantity of node i requesting node j forwarding data bag;
represent that j is the quantity of i forwarding data bag, in the cycle
in, the more reliabilitys of packet that j forwards are higher.
Provide too high right to speak for fear of the high node of credit value, cause subjective deviation, introduce overall prestige R as parameter, be used for reducing risk, reduce the concrete formula of subjective deviation as follows:
Wherein, i is the neighbor node of N, S
nthe set of the neighbor node of N,
be to provide the credit value of monitoring node, T is reliability threshold value, can be considered to bad node, the parameter of introducing lower than the nodes ' behavior of threshold value
, wherein
for adjustment function,
, M
ikifor the total transaction amount of node i,
to expect with respect to the local prestige of its neighbor node according to node i, and
.
Beneficial effect of the present invention: the present invention filters the node in network before node is carried out to credit assessment, filtration show that node importance is higher as neighbours, avoid preferably the interference of unreliable neighbours to credit assessment result, improved the accuracy of credit assessment; The present invention utilizes shuffled frog leaping algorithm, local and the overall situation is searched for, and then node is screened, and has convergence and stronger robustness faster.
Accompanying drawing explanation
Fig. 1 is structured flowchart of the present invention.
Embodiment
As shown in the figure, a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm, described method comprises the following steps:
The Local Features of node in step 1, analyte networking, the importance of the node in calculating Internet of Things Autonomous Domain;
The foundation of step 2, the screening using the node importance after calculating as node, utilizes shuffled frog leaping algorithm to carry out cluster to node;
The higher category node of the node importance that obtains in step 3, selecting step 2 is as the neighbor node of credit assessment;
Step 4, according to credit assessment algorithm, use the neighbor node that obtains of step 3 to carry out credit assessment to the node of needs assessment;
Step 5, calculate node credit value more accurately according to the current prestige of node and historical prestige;
Whether credible step 6, setting threshold, compare predicate node by the node credit value obtaining in step 5 and this threshold value; When credit value is during lower than setting threshold, predicate node is insincere node, and no person is trusted node.
The computational methods of the node importance in described step 1 comprise the following steps:
Step 201, net list is shown to two tuple YK, EY, node set is expressed as
, the set expression on the limit of connected node is
, wherein, n and m represent nodes and the limit number of network, the more important node in limit of connected node is just more important;
Step 202, utilize formula
calculate the weight on limit, wherein
represent the limit number being connected with node i;
Step 203, the weights on limit that node i connects are sued for peace
represent the weight of node i;
The hybrid algorithm that leapfrogs in described step 2 comprises the following steps:
Step 301, take node importance as screening foundation, utilize shuffled frog leaping algorithm to screen neighbor node, each frog individuality
can represent the importance of a node
and utilize formula
calculate the fitness of frog;
Step 303, carry out descending according to the fitness of every the frog calculating, the frog individuality of functional value optimum is made as
;
Step 304, whole frog colony is divided into F group, each group comprises G frog, therefore
, first frog enters the 1st group, and second frog enters the 2nd group, and F frog enters F group, and F+1 frog enters again the 1st group afterwards, and F+2 frog enters the 2nd group, by that analogy, until all frog is divided complete;
Step 305, group carry out partial-depth search to each group after dividing, and has individuality optimum and the poorest fitness to be in each group
with
, iteration is for the poorest fitness each time
carry out, update strategy is: frog displacement
, upgrade the poorest frog position
(
) wherein,
be
between random number,
be the ultimate range that allows frog to move, by above formula, group's the poorest frog individuality of endoadaptation degree upgraded, each group carries out the Local Search number of times of setting;
Step 306, the group that will search for through partial-depth merge a new group of composition, and judge whether to meet the end condition of algorithm, complete the reliable neighbor node of screening.
Credit assessment in described step 4 specifically comprises the following steps:
According to the node obtaining after screening, using them as neighbor node, at T
pin cycle, have multiple neighbor nodes and observe evaluated node, each node has and safeguards the neighbor node list of self, in list, comprise the information such as No. ID, neighbor node and credit value, in the time that node i sends packet to node n, need intermediate node j to forward, node calculates node point reliability by existing monitoring condition
,
computing formula as follows:
, wherein
represent the quantity of node i requesting node j forwarding data bag;
represent that j is the quantity of i forwarding data bag, in the cycle
in, the more reliabilitys of packet that j forwards are higher.
?provide too high right to speak for fear of the high node of credit value, cause subjective deviation, introduce overall prestige R as parameter, be used for reducing risk, reduce the concrete formula of subjective deviation as follows:
Wherein, i is the neighbor node of N, S
nthe set of the neighbor node of N,
be to provide the credit value of monitoring node, T is reliability threshold value, can be considered to bad node, the parameter of introducing lower than the nodes ' behavior of threshold value
, wherein
for adjustment function,
, M
ikifor the total transaction amount of node i,
to expect with respect to the local prestige of its neighbor node according to node i, and
.
Participate in that the neighbor node number of credit rating is more and volume of transmitted data is larger, the expectation of overall prestige is just more accurate.
Node in Internet of Things is because have the feature of mobility, and relatively inexpensive.If be identified as the unreliable node of passive forwarding data bag just seems and is unfair because of accidental cause.Therefore we also need historical credit value to take into account in the time calculating current credit value, form new credit value.Concrete formula is as follows:
therefore,, according to different Autonomous Domain environment, we can be by regulating the α factor to weigh the proportion of historical credit value to present node prestige.
The present invention filters the node in network before node is carried out to credit assessment, filters and show that node importance is higher as neighbours, has avoided preferably the interference of unreliable neighbours to credit assessment result, has improved the accuracy of credit assessment; The present invention utilizes shuffled frog leaping algorithm, local and the overall situation is searched for, and then node is screened, and has convergence and stronger robustness faster.
Claims (5)
1. the Internet of things node credit assessment method based on shuffled frog leaping algorithm, is characterized in that: described method comprises the following steps:
The Local Features of node in step 1, analyte networking, the importance of the node in calculating Internet of Things Autonomous Domain;
The foundation of step 2, the screening using the node importance after calculating as node, utilizes shuffled frog leaping algorithm to carry out cluster to node;
The higher category node of the node importance that obtains in step 3, selecting step 2 is as the neighbor node of credit assessment;
Step 4, according to credit assessment algorithm, use the neighbor node that obtains of step 3 to carry out credit assessment to the node of needs assessment;
Step 5, calculate node credit value more accurately according to the current prestige of node and historical prestige;
Whether credible step 6, setting threshold, compare predicate node by the node credit value obtaining in step 5 and this threshold value; When credit value is during lower than setting threshold, predicate node is insincere node, and no person is trusted node.
2. a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm as claimed in claim 1, is characterized in that: the computational methods of the node importance in described step 1 comprise the following steps:
Step 201, net list is shown to two tuple YK, EY, node set is expressed as
, the set expression on the limit of connected node is
, wherein, n and m represent nodes and the limit number of network, the more important node in limit of connected node is just more important;
Step 202, utilize formula
calculate the weight on limit, wherein
represent the limit number being connected with node i;
Step 203, the weights on limit that node i connects are sued for peace
represent the weight of node i;
3. a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm as claimed in claim 1, is characterized in that: the hybrid algorithm that leapfrogs in described step 2 comprises the following steps:
Step 301, take node importance as screening foundation, utilize shuffled frog leaping algorithm to screen neighbor node, each frog individuality
can represent the importance of a node
and utilize formula
calculate the fitness of frog;
Step 303, carry out descending according to the fitness of every the frog calculating, the frog individuality of functional value optimum is made as
;
Step 304, whole frog colony is divided into F group, each group comprises G frog, therefore
, first frog enters the 1st group, and second frog enters the 2nd group, and F frog enters F group, and F+1 frog enters again the 1st group afterwards, and F+2 frog enters the 2nd group, by that analogy, until all frog is divided complete;
Step 305, group carry out partial-depth search to each group after dividing, and has individuality optimum and the poorest fitness to be in each group
with
, iteration is for the poorest fitness each time
carry out, update strategy is: frog displacement
, upgrade the poorest frog position
(
) wherein,
be
between random number,
be the ultimate range that allows frog to move, by above formula, group's the poorest frog individuality of endoadaptation degree upgraded, each group carries out the Local Search number of times of setting;
Step 306, the group that will search for through partial-depth merge a new group of composition, and judge whether to meet the end condition of algorithm, complete the reliable neighbor node of screening.
4. a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm as claimed in claim 1, is characterized in that: the credit assessment in described step 4 specifically comprises the following steps:
According to the node obtaining after screening, using them as neighbor node, at T
pin cycle, have multiple neighbor nodes and observe evaluated node, each node has and safeguards the neighbor node list of self, in list, comprise the information such as No. ID, neighbor node and credit value, in the time that node i sends packet to node n, need intermediate node j to forward, node calculates node point reliability by existing monitoring condition
,
computing formula as follows:
, wherein
represent the quantity of node i requesting node j forwarding data bag;
represent that j is the quantity of i forwarding data bag, in the cycle
in, the more reliabilitys of packet that j forwards are higher.
5. a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm as claimed in claim 4, it is characterized in that: provide too high right to speak for fear of the high node of credit value, cause subjective deviation, introduce overall prestige R as parameter, be used for reducing risk, reduce the concrete formula of subjective deviation as follows:
Wherein, i is the neighbor node of N, S
nthe set of the neighbor node of N,
be to provide the credit value of monitoring node, T is reliability threshold value, can be considered to bad node, the parameter of introducing lower than the nodes ' behavior of threshold value
, wherein
for adjustment function,
, M
ikifor the total transaction amount of node i,
to expect with respect to the local prestige of its neighbor node according to node i, and
.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410040848.7A CN103812696B (en) | 2014-01-28 | 2014-01-28 | A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410040848.7A CN103812696B (en) | 2014-01-28 | 2014-01-28 | A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103812696A true CN103812696A (en) | 2014-05-21 |
CN103812696B CN103812696B (en) | 2017-07-28 |
Family
ID=50708938
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410040848.7A Active CN103812696B (en) | 2014-01-28 | 2014-01-28 | A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103812696B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104467999A (en) * | 2014-11-18 | 2015-03-25 | 北京邮电大学 | Spectrum sensing algorithm based on quantum leapfrog |
US10785125B2 (en) | 2018-12-03 | 2020-09-22 | At&T Intellectual Property I, L.P. | Method and procedure for generating reputation scores for IoT devices based on distributed analysis |
CN112185419A (en) * | 2020-09-30 | 2021-01-05 | 天津大学 | Glass bottle crack detection method based on machine learning |
CN116862021A (en) * | 2023-07-31 | 2023-10-10 | 山东省计算中心(国家超级计算济南中心) | anti-Bayesian-busy attack decentralization learning method and system based on reputation evaluation |
CN116862021B (en) * | 2023-07-31 | 2024-05-03 | 山东省计算中心(国家超级计算济南中心) | Anti-Bayesian-busy attack decentralization learning method and system based on reputation evaluation |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060042483A1 (en) * | 2004-09-02 | 2006-03-02 | Work James D | Method and system for reputation evaluation of online users in a social networking scheme |
CN102223627A (en) * | 2011-06-17 | 2011-10-19 | 北京工业大学 | Beacon node reputation-based wireless sensor network safety locating method |
CN102378217A (en) * | 2011-11-01 | 2012-03-14 | 北京工业大学 | Beacon node credit assessment method in localization in wireless sensor networks |
-
2014
- 2014-01-28 CN CN201410040848.7A patent/CN103812696B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060042483A1 (en) * | 2004-09-02 | 2006-03-02 | Work James D | Method and system for reputation evaluation of online users in a social networking scheme |
CN102223627A (en) * | 2011-06-17 | 2011-10-19 | 北京工业大学 | Beacon node reputation-based wireless sensor network safety locating method |
CN102378217A (en) * | 2011-11-01 | 2012-03-14 | 北京工业大学 | Beacon node credit assessment method in localization in wireless sensor networks |
Non-Patent Citations (10)
Title |
---|
吴庆涛,张旭龙,张明川,郑瑞娟,娄颖: "一种面向云服务的自主信誉管理机制", 《武汉大学学报(理学版)》 * |
吴庆涛,郑瑞娟,华彬,杨馨桐: "可信网络连接中的可信度仿真评估", 《计算机应用研究》 * |
吴庆涛,郑瑞娟,张明川,魏汪洋,李冠峰: "基于自律计算的系统可信性自调节模型", 《计算机工程与应用》 * |
孔凡光,何建华,唐奎: "协同多目标攻击的混合蛙跳融合蚁群算法研究", 《计算机工程与应用》 * |
崔文华,刘晓冰,王伟,王介生: "混合蛙跳算法研究综述", 《控制与决策》 * |
朱丽娜,吴庆涛,娄颖,郑瑞娟: "基于自律计算的系统服务可信性自优化方法", 《微电子学与计算机》 * |
葛宇, 王学平, 梁静: "自适应混沌变异蛙跳算法", 《计算机应用研究》 * |
赖积保,王慧强,刘效武,梁颖,郑瑞娟,赵国生: "WNN-Based Network Security Situation Quantitive Prediction Method and Its Optimization", 《COMPUTER SCIENCE AND TECHNOLOGY》 * |
邹采荣,张潇丹,赵力: "混合蛙跳算法综述", 《信息化研究》 * |
郑瑞娟,张明川,吴庆涛,李冠峰,魏汪洋: "基于信赖域的系统可信性自调节算法", 《河南科技大学学报:自然科学版》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104467999A (en) * | 2014-11-18 | 2015-03-25 | 北京邮电大学 | Spectrum sensing algorithm based on quantum leapfrog |
US10785125B2 (en) | 2018-12-03 | 2020-09-22 | At&T Intellectual Property I, L.P. | Method and procedure for generating reputation scores for IoT devices based on distributed analysis |
CN112185419A (en) * | 2020-09-30 | 2021-01-05 | 天津大学 | Glass bottle crack detection method based on machine learning |
CN116862021A (en) * | 2023-07-31 | 2023-10-10 | 山东省计算中心(国家超级计算济南中心) | anti-Bayesian-busy attack decentralization learning method and system based on reputation evaluation |
CN116862021B (en) * | 2023-07-31 | 2024-05-03 | 山东省计算中心(国家超级计算济南中心) | Anti-Bayesian-busy attack decentralization learning method and system based on reputation evaluation |
Also Published As
Publication number | Publication date |
---|---|
CN103812696B (en) | 2017-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kang et al. | Reliable federated learning for mobile networks | |
CN105282160B (en) | Dynamic accesses control method based on prestige | |
CN104009959B (en) | A kind of cloud access control method that can verify that based on XACML | |
Chen et al. | An adaptive trust model based on recommendation filtering algorithm for the Internet of Things systems | |
CN103414711B (en) | Internet group abnormality perception method based on trust | |
Chen et al. | Dealing with dishonest recommendation: The trials in reputation management court | |
CN104618908B (en) | The method and apparatus that distributed cognition wireless network is attacked anti-distort perception data | |
Jiang et al. | A new evidential trust model for open distributed systems | |
CN108270723A (en) | A kind of acquisition methods in electric power networks Forecast attack path | |
Stefanova et al. | Off-policy q-learning technique for intrusion response in network security | |
CN103812696A (en) | Shuffled frog leaping algorithm based internet of things node reputation evaluation method | |
CN115378988A (en) | Data access abnormity detection and control method and device based on knowledge graph | |
WO2022242181A1 (en) | Method and apparatus for evaluating health degree indexes of layers of smart substation | |
Suryani et al. | ConTrust: a trust model to enhance the privacy in internet of things | |
Huang et al. | Using reputation measurement to defend mobile social networks against malicious feedback ratings | |
CN105049354A (en) | Trustful routing method based on OSPF | |
Malladi et al. | Decentralized aggregation design and study of federated learning | |
CN109474461A (en) | Wireless sensor network trust management method and system based on prestige Poisson distribution | |
CN108966210A (en) | A kind of design method of wireless network Trust Valuation Model | |
CN106332131B (en) | A kind of clone's nodal test method and system of wireless sensor network | |
Dubey et al. | Bayesian network based trust model with time window for pure P2P computing systems | |
CN106469346B (en) | A kind of risk control method and equipment based on region | |
Seo et al. | IoDM: A study on a IoT-based organizational deception modeling with adaptive general-sum game competition | |
Li et al. | A hybrid trust management framework for wireless sensor and actuator networks in cyber-physical systems | |
Lin et al. | ACO-BTM: a behavior trust model in cloud computing environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20191104 Address after: 471000 Room 202, building 3-1, science and Technology Park, Luoyang National University, Longyu Road, Jianxi District, Luoyang area, China (Henan) pilot Free Trade Zone, Luoyang City, Henan Province Patentee after: Henan gunz Information Technology Co., Ltd Address before: 471000 Xiyuan Road, Jianxi District, Henan, No. 48, No. Patentee before: Henan University of Science and Technology |
|
TR01 | Transfer of patent right |