商用密码产品

Search documents
海南钛格贸易有限公司成立 注册资本100万人民币
Sou Hu Cai Jing· 2025-08-28 10:20
Company Overview - Hainan Taige Trading Co., Ltd. has recently been established with a registered capital of 1 million RMB [1] - The legal representative of the company is Ma Xiaomin [1] Business Scope - The company is involved in the sale of commercial password products, which requires a license for operation [1] - General business activities include wholesale and retail of electronic components, electronic vacuum devices, optoelectronic devices, and electronic measuring instruments [1] - Additional services include network technology services, communication equipment repair, and sales of various electronic and communication devices [1] - The company also engages in the sale of new film materials, second-hand daily necessities, and provides business agency services [1]
上饶市胜饶电子科技有限公司成立 注册资本20万人民币
Sou Hu Cai Jing· 2025-08-28 02:45
天眼查App显示,近日,上饶市胜饶电子科技有限公司成立,法定代表人为黎冬傲,注册资本20万人民 币,经营范围为许可项目:呼叫中心(依法须经批准的项目,经相关部门批准后在许可有效期内方可开 展经营活动,具体经营项目和许可期限以相关部门批准文件或许可证件为准)一般项目:科技中介服 务,信息技术咨询服务,市场营销策划,信息咨询服务(不含许可类信息咨询服务),社会经济咨询服 务,财务咨询,电子产品销售,数字视频监控系统销售,安全系统监控服务,人力资源服务(不含职业 中介活动、劳务派遣服务),办公用品销售,商用密码产品销售,货币专用设备销售,商务代理代办服 务,市场主体登记注册代理(除依法须经批准的项目外,凭营业执照依法自主开展经营活动)。 ...
乌兰察布市数智科技有限公司成立,注册资本1000万人民币
Sou Hu Cai Jing· 2025-08-13 16:50
Company Overview - Ulanqab Smart Technology Co., Ltd. has been established with a registered capital of 10 million RMB [1] - The legal representative of the company is Li Xianbo, and it is wholly owned by Beijing Xurxin Times Information Technology Co., Ltd. [1] Business Scope - The company operates in various sectors including manufacturing and sales of information security equipment, commercial password products, and network devices [1] - Additional services include information system integration, technical services, and consulting [1] - The company is classified under the manufacturing industry, specifically in the production of electronic devices [1] Location and Registration - The company is located in the Central Business Plaza, Building A, 9th Floor, Ulanqab City, Inner Mongolia [1] - It is registered as a limited liability company with an indefinite business duration [1]
迪普科技: 公司章程(2025年8月)
Zheng Quan Zhi Xing· 2025-08-04 16:35
General Information - Hangzhou Deep Technology Co., Ltd. was established as a joint-stock company, inheriting the rights and obligations of the former Hangzhou Deep Technology Co., Ltd. [2][3] - The company was approved by the China Securities Regulatory Commission (CSRC) for its initial public offering of 40.01 million shares on March 22, 2019, and was listed on the Shenzhen Stock Exchange on April 12, 2019 [3][4] - The registered capital of the company is RMB 643,829,039 [4] Company Structure - The company is a permanent stock company, with the legal representative being the chairman of the board [3][4] - Shareholders are liable for the company's debts only to the extent of their subscribed shares, while the company is liable for its debts with all its assets [3][4] Business Scope - The company's business scope includes network and information security software development, commercial password product sales, import and export of goods, manufacturing of information security equipment, and various technology services [4][5] Share Issuance - The company's shares are issued in the form of stocks, with each share having an equal amount [7] - The face value of each share is RMB 1, and the shares are centrally deposited with the China Securities Depository and Clearing Corporation [7][8] - The company initially issued 100 million shares to its founders, with specific shareholdings detailed for each founder [8][9] Shareholder Rights and Obligations - Shareholders have rights to dividends, voting, and other benefits according to their shareholdings [20][21] - Shareholders must comply with laws and regulations, and they cannot withdraw their capital except as legally permitted [24][25] Share Transfer and Trading - Shares must be transferred in accordance with the law, and the company does not accept its shares as collateral [28][29] - Directors and senior management are restricted from trading shares during specific periods related to financial reporting [31][32] Shareholder Meetings - The company holds annual and extraordinary shareholder meetings, with specific procedures for convening and voting [52][53] - Shareholders holding more than 10% of shares can request the board to convene an extraordinary meeting [56][57] Financial Assistance and Guarantees - The company can provide financial assistance for acquiring its shares under certain conditions, with limits on the total amount [12][13] - Any external guarantees exceeding specified thresholds must be approved by the board and disclosed [30][31]
天融信20250718
2025-07-19 14:02
Summary of Conference Call on Stablecoins and Cybersecurity Industry Overview - The discussion revolves around the **stablecoin** industry, which is emerging as a significant tool for **cross-border payments** due to its advantages of convenience, low cost, and real-time transactions [2][3][8]. Key Points and Arguments - **Technological Risks**: Stablecoins face substantial cybersecurity risks, including system vulnerabilities and DDoS attacks, as evidenced by incidents like the theft of 400,000 Ether worth $1.5 billion [5][9]. - **Regulatory Developments**: Various regions are actively developing stablecoin regulations. For instance, Hong Kong is set to implement a stablecoin licensing system, while the U.S. Senate has passed the "Genius Act" to establish a regulatory framework [2][6]. - **Market Opportunities**: The rise of stablecoins is expected to create new opportunities in the cybersecurity market, particularly in infrastructure development and security assurance, as businesses increasingly rely on secure information systems for cross-border transactions [2][8][12]. - **Technological Components**: The technology behind stablecoins includes blockchain, smart contracts, encryption, and user identity verification, all of which are critical for ensuring security [7][12]. Important but Overlooked Content - **Current Stage of Development**: The stablecoin sector is at different stages globally, with the U.S. and Europe having more established infrastructure compared to Hong Kong, which is preparing for pilot projects, and mainland China, which is still in the research phase [11][14]. - **Cybersecurity Solutions**: The need for comprehensive cybersecurity solutions is emphasized, including risk assessments for cross-border data and compliance with data security laws [9][14]. - **Commercial Models**: The commercial model for stablecoin security solutions is still in exploration, focusing on providing integrated security solutions rather than standalone products [15]. - **Market Expansion**: The potential for cybersecurity firms to expand into international markets through stablecoin applications in Hong Kong is highlighted, as it simplifies cross-border transactions [19][21]. Future Outlook - The stablecoin market has significant growth potential, but its expansion is contingent on regulatory clarity. Once policies are established, the growth rate of stablecoins could surpass that of other technologies like quantum-resistant cryptography [22]. - The cybersecurity industry is expected to remain relevant as digitalization continues, with a call for increased attention from capital markets towards cybersecurity firms [23].
达梦数据: 关于变更公司注册地址、经营范围、修订《公司章程》并办理工商变更登记的公告
Zheng Quan Zhi Xing· 2025-06-30 16:23
Core Points - The company, Wuhan Dameng Database Co., Ltd., has announced changes to its registered address and business scope, as well as amendments to its Articles of Association [1][4] - The registered address will change from "999 Gaoxin Avenue, Future Technology Building, C3 Building, 16-19 Floors, Wuhan East Lake New Technology Development Zone" to "39 Jiapuling Street, Wuhan East Lake New Technology Development Zone" [1][2] - The business scope will expand to include big data services, data processing and storage support services, software development, information system integration services, and various other technology-related services [2][3] Business Scope Changes - The previous business scope included database management systems, data centers, data analysis, and related technical services, while the new scope adds big data services, software sales, and cloud computing equipment technology services [2][3] - The new business scope also includes commercial password product production and sales, as well as various import and export services [2][3] Articles of Association Amendments - The amendments to the Articles of Association will reflect the new registered address and updated business scope, with specific changes noted in the relevant sections [3][4] - The revised Articles of Association will be submitted for shareholder approval, and the board of directors will seek authorization to handle the necessary business registration changes [4]
盛邦安全: 关于2024年年度报告的信息披露监管问询函的回复公告
Zheng Quan Zhi Xing· 2025-06-11 11:24
Core Viewpoint - The company experienced a significant decline in performance in 2024, with a notable drop in net profit and cash flow, attributed to increased operational costs and a challenging market environment [2][14][20]. Financial Performance - In 2024, the company achieved operating revenue of 294 million RMB, a year-on-year increase of 0.93%, but the net profit attributable to shareholders was only 1.63 million RMB, down 96.17% [2][15]. - The net cash flow from operating activities was -63.39 million RMB, a decline of 493.39% compared to the previous year [2][15]. - The company’s gross profit margin decreased from 74.19% to 72.64%, reflecting increased costs [15][20]. Business Segments - Revenue from cybersecurity products and services, as well as from the cyberspace mapping business, both saw a decline of 5-6% year-on-year [2][10]. - The newly acquired satellite internet security business generated revenue of 17.94 million RMB in 2024 [2][10]. Customer and Sales Analysis - The company provided detailed information on its top five customers, including contract amounts and sales models, indicating a focus on direct sales and channel partnerships [3][4]. - The sales model includes direct sales to end-users and channel sales through various partnerships [7][10]. Market Context - The overall cybersecurity market in China faced challenges, with 29 listed companies reporting a total revenue decline of 5% in 2024, and 17 companies reported losses, indicating a tough competitive landscape [7][18]. - The company’s performance aligns with industry trends, where many peers also experienced significant profit declines [18][20]. Strategic Initiatives - The company is investing heavily in expanding its sales and R&D teams to enhance its competitive position, with a focus on long-term growth despite short-term financial pressures [14][19]. - The satellite internet security business is seen as a strategic growth area, leveraging existing capabilities in cybersecurity and mapping technologies [12][13][20].
中方再次披露美情报机构对我网攻事件,专家:美攻击我密码产品会危害国家网络安全
Huan Qiu Shi Bao· 2025-04-28 22:50
Core Viewpoint - A report by the China Cybersecurity Association reveals a cyber attack by a U.S. intelligence agency on a major Chinese commercial encryption product provider, posing risks to national cybersecurity and affecting financial transactions that rely on commercial encryption [1][2]. Group 1: Cyber Attack Details - The attack utilized a vulnerability in a customer relationship management system, allowing attackers to upload arbitrary files and delete logs to cover their tracks [1]. - The attack timeline indicates that the attackers implanted a specialized Trojan on March 5, 2024, and began targeting the company's code management system on May 20, 2024, primarily during U.S. business hours [1][2]. Group 2: Data Theft and Impact - From March to September 2024, attackers connected through 14 foreign IPs to steal 950MB of data from the customer relationship management system, which included over 600 users and more than 10,000 contract orders [2]. - Between May and July 2024, 6.2GB of data was stolen from the code management system, which contained critical information on three password research projects [2]. Group 3: Implications for National Security - The stolen data included procurement information from various government units and code information for password research projects, indicating an intent to exploit vulnerabilities in China's domestic encryption products [2]. - The potential consequences of compromised commercial encryption products could be severe, affecting critical information infrastructure and daily life security [3].