[go: up one dir, main page]

CN107566187B - A SLA violation monitoring method, device and system - Google Patents

A SLA violation monitoring method, device and system Download PDF

Info

Publication number
CN107566187B
CN107566187B CN201710906770.6A CN201710906770A CN107566187B CN 107566187 B CN107566187 B CN 107566187B CN 201710906770 A CN201710906770 A CN 201710906770A CN 107566187 B CN107566187 B CN 107566187B
Authority
CN
China
Prior art keywords
sla
data
violation
suspicious
rule database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710906770.6A
Other languages
Chinese (zh)
Other versions
CN107566187A (en
Inventor
赵洋
李娜
李俊
陈影
朱艳茹
宋泽坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan Leyuan Information Technology Co.,Ltd.
Original Assignee
BEIJING HETIAN ZHIHUI INFORMATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING HETIAN ZHIHUI INFORMATION TECHNOLOGY CO LTD filed Critical BEIJING HETIAN ZHIHUI INFORMATION TECHNOLOGY CO LTD
Priority to CN201710906770.6A priority Critical patent/CN107566187B/en
Publication of CN107566187A publication Critical patent/CN107566187A/en
Application granted granted Critical
Publication of CN107566187B publication Critical patent/CN107566187B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Pharmaceuticals Containing Other Organic And Inorganic Compounds (AREA)

Abstract

The invention relates to an SLA violation monitoring method, device and system, wherein the method comprises the following steps: acquiring a network data packet from a resource layer in real time, analyzing the network data packet and acquiring SLA parameters; establishing a rule database for matching the SLA parameters, adopting the rule database to match the SLA parameters, obtaining SLA violation data and SLA non-violation data, giving an alarm to the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and storing the suspicious rules to the rule database.

Description

SLA violation monitoring method, device and system
Technical Field
The invention relates to an SLA violation monitoring method, device and system.
Background
Cloud computing, as a new IT operating mode, is crucial to ensure reliable quality of service (QoS). The QoS guarantee of cloud computing is the key for improving the service satisfaction degree of cloud users, the utilization rate of cloud resources, the benefits of cloud service providers, the market competitiveness of cloud service providers and the continuous development. Due to the diversity of cloud service modes, virtualization of resources, and dynamic changes in user requirements, QoS implementation for cloud computing is more complex than traditional telecommunication services, web services, and grid services.
Currently, cloud service QoS guarantee is implemented by SLA (service level agreement). The SLA supported by AmazonEC2 provides an "availability" service guarantee, referred to as "percent annual run time," not less than 99.95%. Service "availability" metrics of GoGrid include server uptime, availability of storage, and availability of primary DNS services, and provide some monitoring metrics related to network performance, such as latency, packet loss rate, etc. However, the research on other QoS performance guarantee statements by cloud computing manufacturers is less, so that the deep research on SLA violation monitoring and processing in cloud computing and improvement of cloud service QoS guarantee are a challenge faced by the current cloud computing technology.
At present, some researchers have proposed solutions to different SLA violation monitoring, and the SLA violation detector uses statistical methods, such as statistical hypothesis testing and bayesian inference, and the SLAs-LoM2HiS framework effectively monitors cloud infrastructure, defines a general SLA violation handling template for the monitored SLA violations, and proposes an SLA violation handling flow on the basis of the template, giving application examples. However, these technical methods are all based on a single SLA violation, and are not considered for the situations of multiple SLA violations.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides an SLA violation monitoring method, which is used for further optimizing the matching rules of the conventional SLA violation monitoring and can extract the characteristics of suspicious behaviors from SLA non-violation data, so that a rule database is dynamically updated to cope with the increasingly complex network information interaction process.
The technical scheme of the invention is as follows:
an SLA violation monitoring method comprising:
acquiring a network data packet from a resource layer in real time, analyzing the network data packet and acquiring SLA parameters;
establishing a rule database for matching the SLA parameters, adopting the rule database to match the SLA parameters, obtaining SLA violation data and SLA non-violation data, giving an alarm to the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and storing the suspicious rules to the rule database.
Further, the analyzing the network data packet and obtaining the SLA parameter includes:
obtaining the SLA parameters from the network data packets using a resource metric mapping, the resource metric mapping comprising a single mapping or a functional mapping.
Further, the single mapping comprises: and establishing SLA parameter indexes which are in one-to-one correspondence with the attributes of the resource layer, wherein all the SLA parameter indexes jointly form SLA parameters.
Further, the function mapping includes: according to the attribute of the resource layer, establishing a function taking the attribute as an independent variable, taking the dependent variable of the function as an SLA parameter index, and forming an SLA parameter by all the SLA parameter indexes.
Further, the extracting the suspicious features of the SLA non-violation data at least comprises: memory access speed, hard disk read speed, network latency, network bandwidth, or service availability.
Further, optimizing the rule database includes: and setting precision for the threshold value in the rule database, and changing the threshold value of the rule database in real time according to the data after receiving a plurality of real-time data.
Furthermore, the SLA non-violation data is firstly formatted for composing the service capability parameter of the underlying resource into a parameterized description of a high-level service level, and then suspicious features of the SLA non-violation data are extracted on the basis of the formatting.
Further, the formatting operation includes: definitional description or basic data computation.
The invention also relates to a storage device storing a plurality of instructions, said instructions being loaded by a processor and performing the following:
acquiring a network data packet from a resource layer in real time, analyzing the network data packet and acquiring SLA parameters;
establishing a rule database for matching the SLA parameters, adopting the rule database to match the SLA parameters, obtaining SLA violation data and SLA non-violation data, giving an alarm to the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and storing the suspicious rules to the rule database.
The invention also provides an SLA violation monitoring system, which comprises a processor and a processor, wherein the processor is used for realizing each instruction; and storage means for storing a plurality of instructions, the instructions being loaded by the processor and performing the following:
acquiring a network data packet from a resource layer in real time, analyzing the network data packet and acquiring SLA parameters;
establishing a rule database for matching the SLA parameters, adopting the rule database to match the SLA parameters, obtaining SLA violation data and SLA non-violation data, giving an alarm to the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and storing the suspicious rules to the rule database.
The invention has the beneficial effects that:
the invention further optimizes the matching rules of the prior SLA violation monitoring, not only can match SLA violation information in a historical SLA violation library, but also can extract the characteristics of suspicious behaviors in SLA non-violation data, thereby dynamically updating the rule database to deal with the increasingly complex network information interaction process.
Drawings
FIG. 1 is a SLA parameter metric mapping framework diagram of the present invention
FIG. 2 is a framework diagram of SLA violation detection model in accordance with the present invention
FIG. 3 is an improved Snort component architecture of the present invention.
The specific implementation mode is as follows:
the invention will be further illustrated with reference to the following examples and drawings:
it should be noted that the following detailed description is exemplary and is intended to provide further explanation of the disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments according to the present application. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
As mentioned in the background art, the current SLA violation usually adopts a general SLA violation handling template, and an SLA violation handling process is proposed on the template, but the method is directed to specific SLA violations, and if multiple different SLA violations are targeted, the template method will generate missed judgment and erroneous judgment. The pattern matching detection technology is mainly used for detecting known illegal behaviors. In a large-scale network, the detection time interval left for the detection system between massive parameter data packets is very short, and is calculated in microseconds, so that very high memory space is consumed, and therefore, a pattern matching algorithm is required to be simple and high-speed.
An exemplary embodiment of the present invention is a method for monitoring SLA violations, including: acquiring a network data packet from a resource layer in real time, analyzing the network data packet and acquiring SLA parameters; establishing a rule database for matching SLA parameters, adopting the rule database to match the SLA parameters, obtaining SLA violation data and SLA non-violation data, giving an alarm to the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and simultaneously storing the suspicious rules into the rule database.
As shown in fig. 1, the first step of this embodiment is to obtain a network data packet from a resource layer in real time, analyze the network data packet, and obtain an SLA parameter, where a Snort system is adopted and optimized in this embodiment.
We use this framework to support mapping from underlying resource layer metrics to SLA parameter metrics. The service requester and the service responder agree on the resources used by the service and the QoS attributes through negotiation, and subscribe to the SLA. And stored in the SLA repository through the SLA executor. In the QoS repository, there are two types of static and dynamic storage, which are mainly used to store the service QoS attribute information of information. The SLA executor calculates real-time SLA parameter values by mapping the resource metrics to the SLA parameter metrics at intervals. Both the SLA repository and the QoS repository are stored in a rule base.
The resource metric mapping may be a single mapping or a functional mapping, but is not limited to other mapping modes in which SLA parameter information may be obtained.
The single mapping includes establishing SLA parameter indexes corresponding to the attributes of the resource layer, and all the SLA parameter indexes constitute SLA parameters. For example, one of the attributes of the resource layer is "disk space", which corresponds to the "storage" SLA parameter index of the SLA parameter index.
The function mapping includes: according to the attribute of the resource layer, establishing a function taking the attribute as an independent variable, taking the dependent variable of the function as an SLA parameter index, and forming an SLA parameter by all the SLA parameter indexes. For example, the resource layer has two attributes of normal operation time and downtime, and the two attributes can be used as independent variables to calculate the dependent variable of availability.
Next, we use SLA parameter information to monitor violations, specifically, we use Snort-based system to monitor violations, as shown in FIG. 2.
Snort is a lightweight violation detection system, which comprises a data packet acquisition module, a data packet decoder, a detection engine, a preprocessing module, an output module (a log and alarm subsystem) and the like. Capturing a network data packet by using a Snort system, then preprocessing the network data packet, matching the preprocessed network data packet in a known rule database to obtain SLA violation data and SLA non-violation data, alarming the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and storing the suspicious rules into the rule database, as shown in figure 3.
The rule database stores the characteristics of normal data filtered by Snort, the optimization processing module is responsible for optimizing the rule database according to a certain rule, setting the precision of a threshold value in the rule database, changing the threshold value of the rule database in real time according to data after receiving certain real-time data, extracting the characteristics of suspicious behaviors from the characteristic database, and adding the memory access speed, the hard disk reading speed, the network delay, the network bandwidth and the service availability in the characteristic data of the suspicious behaviors into the abnormal characteristic database of the Snort. The outflow data processing module is responsible for formatting normal data filtered by Snort, and the formatted data accords with a high-level service level and is no longer simple low-level resource service capability. Therefore, when a network violation monitoring module based on rule matching is constructed, a rule matching algorithm and rule establishment in a monitoring engine are mainly considered.
In terms of the configuration of the matching rule, the description is made according to the Snort rule construction method. Based on the currently obtained component database, a relevant rule base is established, and the rule base basically comprises all types of the current violations.
And log output and alarm are carried out on SLA violation data, and response is mainly taken to the determined violation behaviors. The system comprises a log/alarm module, a rule-based monitoring module and a rule-based monitoring module, wherein the log/alarm module is mainly started by two detection engines, and can immediately give an alarm once illegal behaviors are found.
The invention also relates to a storage device storing a plurality of instructions, said instructions being loaded by a processor and performing the following:
acquiring a network data packet from a resource layer in real time, analyzing the network data packet and acquiring SLA parameters;
establishing a rule database for matching the SLA parameters, adopting the rule database to match the SLA parameters, obtaining SLA violation data and SLA non-violation data, giving an alarm to the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and storing the suspicious rules to the rule database.
The invention also provides an SLA violation monitoring system, which comprises a processor and a processor, wherein the processor is used for realizing each instruction; and storage means for storing a plurality of instructions, the instructions being loaded by the processor and performing the following:
acquiring a network data packet from a resource layer in real time, analyzing the network data packet and acquiring SLA parameters;
establishing a rule database for matching the SLA parameters, adopting the rule database to match the SLA parameters, obtaining SLA violation data and SLA non-violation data, giving an alarm to the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and storing the suspicious rules to the rule database.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (4)

1. An SLA violation monitoring method, comprising:
acquiring a network data packet from a resource layer in real time, analyzing the network data packet and acquiring SLA parameters;
establishing a rule database for matching the SLA parameters, adopting the rule database to match the SLA parameters, obtaining SLA violation data and SLA non-violation data, giving an alarm to the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and storing the suspicious rules into the rule database;
optimizing the rules database includes: the rule database stores the characteristic that normal data are filtered out through Snort, the optimization processing module is responsible for optimizing the rule database according to a certain rule, setting the precision of a threshold value in the rule database, and changing the threshold value of the rule database in real time according to data after receiving a plurality of real-time data; the characteristics of suspicious behaviors are extracted from the characteristic database, the memory access speed, the hard disk reading speed, the network delay, the network bandwidth and the service availability in the characteristic data of the suspicious behaviors are added into an abnormal characteristic database of Snort, and the outflow data processing module is responsible for formatting normal data filtered by the Snort; formatting the SLA non-violation data firstly, and using the SLA non-violation data to compose the service capability parameter of the bottom layer resource into high-level service level parametric description, and then extracting suspicious characteristics of the SLA non-violation data on the basis of formatting;
the analyzing the network data packet and obtaining the SLA parameters comprises:
obtaining SLA parameters from network data packets using a resource metric mapping, the resource metric mapping comprising a single mapping or a functional mapping;
the single mapping includes: establishing SLA parameter indexes which are in one-to-one correspondence with the attributes of the resource layer, wherein all the SLA parameter indexes jointly form SLA parameters; the function mapping includes: according to the attribute of the resource layer, establishing a function taking the attribute as an independent variable, taking the dependent variable of the function as an SLA parameter index, and forming an SLA parameter by all the SLA parameter indexes; the service requester and the service responder reach agreement on resources used by the service and QoS attributes through negotiation, and sign an SLA; and stored in SLA warehouse through SLA executor; in the QoS knowledge base, the service QoS attribute information of the main storage information comprises static storage and dynamic storage; the SLA executor calculates and obtains real-time SLA parameter values in a mode of mapping the resource measurement to the SLA parameter measurement at intervals; both the SLA repository and the QoS repository are stored in a rule base.
2. The method according to claim 1, wherein said extracting suspicious features of SLA non-violation data comprises at least: memory access speed, hard disk read speed, network latency, network bandwidth, or service availability.
3. The method of claim 1, wherein the formatting operation comprises: definitional description or basic data computation.
4. An SLA violation monitoring system comprising a processor configured to implement instructions; and storage means for storing a plurality of instructions, the instructions being loaded by the processor and performing the following:
acquiring a network data packet from a resource layer in real time, analyzing the network data packet and acquiring SLA parameters;
generating a rule database for matching the SLA parameters, matching the SLA parameters by adopting the rule database to obtain SLA violation data and SLA non-violation data, alarming the SLA violation data, extracting suspicious characteristics of the SLA non-violation data, establishing suspicious rules according to the suspicious characteristics, and storing the suspicious rules into the rule database;
optimizing the rules database includes: the rule database stores the characteristic that normal data are filtered out through Snort, the optimization processing module is responsible for optimizing the rule database according to a certain rule, setting the precision of a threshold value in the rule database, and changing the threshold value of the rule database in real time according to data after receiving a plurality of real-time data; the characteristics of suspicious behaviors are extracted from the characteristic database, the memory access speed, the hard disk reading speed, the network delay, the network bandwidth and the service availability in the characteristic data of the suspicious behaviors are added into an abnormal characteristic database of Snort, and the outflow data processing module is responsible for formatting normal data filtered by the Snort;
formatting the SLA non-violation data firstly, and using the SLA non-violation data to compose the service capability parameter of the bottom layer resource into high-level service level parametric description, and then extracting suspicious characteristics of the SLA non-violation data on the basis of formatting;
the analyzing the network data packet and obtaining the SLA parameters comprises:
obtaining SLA parameters from network data packets using a resource metric mapping, the resource metric mapping comprising a single mapping or a functional mapping;
the single mapping includes: establishing SLA parameter indexes which are in one-to-one correspondence with the attributes of the resource layer, wherein all the SLA parameter indexes jointly form SLA parameters; the function mapping includes: according to the attribute of the resource layer, establishing a function taking the attribute as an independent variable, taking the dependent variable of the function as an SLA parameter index, and forming an SLA parameter by all the SLA parameter indexes.
CN201710906770.6A 2017-09-29 2017-09-29 A SLA violation monitoring method, device and system Active CN107566187B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710906770.6A CN107566187B (en) 2017-09-29 2017-09-29 A SLA violation monitoring method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710906770.6A CN107566187B (en) 2017-09-29 2017-09-29 A SLA violation monitoring method, device and system

Publications (2)

Publication Number Publication Date
CN107566187A CN107566187A (en) 2018-01-09
CN107566187B true CN107566187B (en) 2021-03-02

Family

ID=60983724

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710906770.6A Active CN107566187B (en) 2017-09-29 2017-09-29 A SLA violation monitoring method, device and system

Country Status (1)

Country Link
CN (1) CN107566187B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112445825B (en) * 2020-11-19 2024-05-14 北京思特奇信息技术股份有限公司 SLA time limit processing method, device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859427A (en) * 2006-03-21 2006-11-08 华为技术有限公司 Method and system for securing service quality in communication network
CN1859227A (en) * 2005-12-28 2006-11-08 华为技术有限公司 Method and system for monitoring service quality according to service level protocol
CN101242314A (en) * 2008-03-12 2008-08-13 华为技术有限公司 A method and device for realizing violation warning
CN101291370A (en) * 2008-02-21 2008-10-22 华为技术有限公司 A method and system for realizing dynamic service quality assurance
CN102413013A (en) * 2011-11-21 2012-04-11 北京神州绿盟信息安全科技股份有限公司 Network abnormal behavior detection method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7278156B2 (en) * 2003-06-04 2007-10-02 International Business Machines Corporation System and method for enforcing security service level agreements

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859227A (en) * 2005-12-28 2006-11-08 华为技术有限公司 Method and system for monitoring service quality according to service level protocol
CN1859427A (en) * 2006-03-21 2006-11-08 华为技术有限公司 Method and system for securing service quality in communication network
CN101291370A (en) * 2008-02-21 2008-10-22 华为技术有限公司 A method and system for realizing dynamic service quality assurance
CN101242314A (en) * 2008-03-12 2008-08-13 华为技术有限公司 A method and device for realizing violation warning
CN102413013A (en) * 2011-11-21 2012-04-11 北京神州绿盟信息安全科技股份有限公司 Network abnormal behavior detection method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
云计算中的SLA管理技术研究;钱琼芬 等;《电信科学》;20121015;第38-44页 *
应用协议的规则提取及优化策略;林楠;《中国优秀硕士学位论文全文数据库信息科技辑》;20110915;第139-214页 *

Also Published As

Publication number Publication date
CN107566187A (en) 2018-01-09

Similar Documents

Publication Publication Date Title
CN111092852B (en) Network security monitoring method, device, equipment and storage medium based on big data
US12206693B1 (en) Graph-based detection of network security issues
US20250133121A1 (en) Machine learning system and method for network security improvement
US12294565B2 (en) Firewall rules intelligence
US8676965B2 (en) Tracking high-level network transactions
CN109587125B (en) Network security big data analysis method, system and related device
US20190065738A1 (en) Detecting anomalous entities
CN104618343A (en) Method and system for detecting website threat based on real-time log
WO2023071761A1 (en) Anomaly positioning method and device
US20250175455A1 (en) Ai-driven defensive cybersecurity strategy analysis and recommendation system
CN112866281B (en) Distributed real-time DDoS attack protection system and method
CN118860800B (en) An operation and maintenance management system based on cloud computing services
US10936401B2 (en) Device operation anomaly identification and reporting system
CN113672912A (en) Network Security Monitoring System Based on Computer Hardware Indication and Behavior Analysis
US20210092159A1 (en) System for the prioritization and dynamic presentation of digital content
CN118709184B (en) Malicious code escape detection method and device
CN114510708A (en) Real-time data warehouse construction, abnormal detection method, device, equipment and product
US9471779B2 (en) Information processing system, information processing device, monitoring device, monitoring method
CN107566187B (en) A SLA violation monitoring method, device and system
CN114422324B (en) Alarm information processing method and device, electronic equipment and storage medium
WO2023093527A1 (en) Alarm association rule generation method and apparatus, and electronic device and storage medium
CN115687455A (en) A method, device and medium for processing user trace data based on a message system
CN108933689A (en) A kind of data collection system and method
US20250184335A1 (en) Security breach detection and mitigation in a cloud-based environment
Chen et al. Fast and Robust Localization of Multi-dimensional Root Causes in Online Service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210308

Address after: Building 5, Qilu Software Park, 1 Shunhua Road, Jinan District, China (Shandong) pilot Free Trade Zone, Jinan City, Shandong Province

Patentee after: SHANDONG HEETIAN INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 100086 2702, 23 / F, building 1, courtyard B 12, Zhongguancun South Street, Haidian District, Beijing

Patentee before: BEIJING HETIAN ZHIHUI INFORMATION TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20241125

Address after: Building 5, Qilu Software Park, No.1 Shunhua Road, Jinan Area, China (Shandong) Pilot Free Trade Zone, Jinan City, Shandong Province, China 250000 (Building E, Entrepreneurship Plaza) B411

Patentee after: Jinan Leyuan Information Technology Co.,Ltd.

Country or region after: China

Address before: Building 5, Qilu Software Park, 1 Shunhua Road, Jinan District, China (Shandong) pilot Free Trade Zone, Jinan City, Shandong Province

Patentee before: SHANDONG HEETIAN INFORMATION TECHNOLOGY Co.,Ltd.

Country or region before: China