Jiayuan Technology: Citic Securities Company Limited(600030) listing recommendation letter on the company’s initial public offering and listing on the gem

Citic Securities Company Limited(600030)

about

Jiayuan Technology Co., Ltd. initial public offering and listing on the gem

Listing recommendation

(North block, excellence Times Plaza (phase II), No. 8, Zhongxin Third Road, Futian District, Shenzhen, Guangdong)

November, 2001

catalogue

Declare that Section 1 basic information of this securities issuance 3 I. Basic information of the issuer 3. II. This offering 15 III. sponsor representative, Project Co sponsor and other members of the project team 16 IV. relationship between the sponsor and the issuer Section II sponsor’s commitments Section III recommendation conclusion of the sponsor on the issuance and listing of Securities 20 I. this offering has fulfilled the necessary decision-making procedures 2. The sponsor’s explanation on whether the company meets the listing conditions specified in the Shenzhen Stock Exchange GEM Listing Rules 20 III. work arrangement during the continuous supervision of the company twenty-one

Statement

Citic Securities Company Limited(600030) (hereinafter referred to as ” Citic Securities Company Limited(600030) “, “sponsor” or “sponsor”) and its sponsor representative have been in accordance with the company law of the people’s Republic of China (hereinafter referred to as “company law”) and the securities law And other laws and regulations and relevant provisions of the CSRC and Shenzhen Stock Exchange, be honest, trustworthy, diligent and responsible, issue the listing recommendation letter in strict accordance with the business rules and industry self-discipline norms formulated according to law, and ensure that the documents issued are true, accurate and complete.

Unless otherwise specified, the abbreviation in this listing recommendation letter has the same meaning as the abbreviation in the prospectus of Jiayuan Technology Co., Ltd. for initial public offering and listing on GEM.

Section 1 basic information of this securities issuance

1、 Basic information of the issuer

(i) Basic information of the issuer

Company name: Jiayuan Technology Co., Ltd

Registered capital: RMB 69190000

Legal representative: Wang Jin

Date of establishment: August 30, 1994

No. 399, west section of Fucheng Avenue, Chengdu hi tech Zone, China (Sichuan) pilot free trade zone address:

No. 1, 17th floor, 18th floor, building 10

Main place of production and operation: 11th floor, tianzijie commercial building, No. 46, East fifth section of the first ring road, Chengdu (Sichuan), China Postal Code: 610041

Tel.: 028-86938681

Fax No.: 028-62122223

Email: [email protected].

Type of securities issuance: initial public offering of RMB common shares (A shares)

The office of the board of directors of the company is responsible for information disclosure and investor relations management. The person in charge is Yin Mingjun, Tel.: 028-86938681.

(2) Main business of the issuer

The issuer is a provider of comprehensive solutions for information services and network information security, focusing on the fields of national defense, military industry, medical health and government services. During the reporting period, the issuer mainly provided customers in the fields of medical and health care, national defense and military industry, government services, etc. with the self-developed data platform system as the core and integrating intelligent system construction and industry informatization customization application, the issuer provided an “integrated software and hardware” informatization comprehensive solution. At the same time, relying on the profound accumulation in the information field, the issuer vigorously carries out the research and development of network information security products for China

Customers in key industries such as defense and military industry provide network information security related products with the company’s self-developed coding application technology as the core, including software systems, hardware platforms and special chips, providing independent and controllable security support and technical support for defense and military industry.

The issuer has been deeply engaged in the field of informatization and network information security for more than ten years, serving the national development strategy of building a “network power”. At present, it has the development and integration ability of independent software / embedded software, the design, development, production and testing ability of products related to network information security, and the design and deployment ability of comprehensive informatization solutions. Relying on the issuer’s business model of “integration of software and hardware”, the issuer has achieved coverage of customers in key fields of information service and network information security industry, and has strong service and management advantages.

During the reporting period, the issuer’s main business income is as follows:

Unit: 10000 yuan,%

January June 2021 2019 2018

Project proportion proportion proportion income (%) income (%) income (%) income (%)

Comprehensive informatization 7452.1655.00 937,158.3837. 5610,363.8179. 119,954.7096. 41 solutions

Including: project 7010.8552 613,906.1220. 503,181.5224. 286,266.4060. Item 69

Product sales 441.313 313,182.6416. 705,525.2642. 173,688.3035. seventy-two

Software development — 69.620 371,657.0312. 65–

Network information security 5820.9043 6811,658.6861. 182,015.6015. 39 — all products

Including: entrusted 2848.5821 384,809.7725. 242,015.6015. 39 — R & D

Product sales 2972.3222 316,848.9235. 94—-

Technical services 51.940 39238.951. 25721.635. 51370.253. fifty-nine

Total 13325.00100.00 0019,056.02100. 0013,101.04100. 0010,324.96100. 00

(3) Core technology and R & D of the issuer

1. Core technology and technology source of the issuer

At present, the core technologies, technical uses, core technology advanced nature, specific characteristics, application fields and technology sources of the issuer are as follows:

Technology name, technology, application, core technology, advanced technology and specific application technology.

source

1. Distributed messages are decoupled, asynchronous and peak shaving. Based on the rabbitmq open source framework, it supports clustering and application in de-noising

Technical name, technology use, advanced technology and specific application of the core technology.

High availability deployment architecture, highly reliable message support and information service should be innovated to decouple complex systems and provide system solutions for complex links

The asynchronous call can also be coupled at the peak clipping of the instantaneous peak

reason

Efficient statistics based on Hadoop distributed database

Beijing Vastdata Technology Co.Ltd(603138) is used for business implementation and retrieval functions, and combined with various index algorithms, it is applied to decision-making

2. Evaluate the effect of decision analysis in real time, conduct real-time analysis and statistics of business data, use the original framework of policy analysis to judge and predict the future, establish a mathematical model, predict the future trend of platform innovation, and realize the control of operation decision-making in combination with visualization technology

guidance

It is used to automatically pull the data of multiple payment channels. It is actually used for the automatic verification of transaction cash financial accounts under the Caiyuan 3 automatic reconciliation payment method, and the reconciliation of long and short accounts

It is used to realize internal and external application

4. The external and internal system traffic of the unified gateway integrates the internal system interface to realize the unified access of the original exchange data of the application department of the hospital department and the unified standard entrance system for exchange with the external system

RSA and AES encryption algorithms are integrated and then applied to the front

5 interface authority the unique encryption mode of system interface call establishes a set of authority verification mode of original authority verification after interface call, which is used to protect the innovation of data security end interface. Request mode

Through the application of off-line unstructured image data and structure to politics

6 archives digitization is used for linear correlation of digitized archival data to realize the automatic merging of documents into the original management of sub departments, efficient classification and query, and improve the efficiency of document retrieval. Innovative management of Archives

It is used for the system generation, adopts the segmented data asynchronous processing technology, and uses

The fast log transfer engine for logs with efficient log storage enables the persistence of massive logs without affecting the actual business application to the persistent storage of original 7 storage technologies, and the system log innovation affects the actual business efficiency to the database. record

rate

The national standard document is self used for real-time generation. It adopts document anti parsing and dynamic configuration, combined with the value applied to the original 8 dynamic generation framework hlv7 industry standard domain control and other technologies to realize real-time generation of patient medical information

 

- Advertisment -