360 Security Technology Inc(601360) : annual report of 360 Security Technology Inc(601360) 2021

Company code: 360 Security Technology Inc(601360) company abbreviation: 360 Security Technology Inc(601360) 360 Security Technology Inc(601360)

Annual report for 2021

Important tips

1、 The board of directors, board of supervisors, directors, supervisors and senior managers of the company guarantee the authenticity, accuracy and integrity of the contents of the annual report, and there are no false records, misleading statements or major omissions, and bear individual and joint legal liabilities. 2、 All directors of the company attended the board meeting. 3、 Deloitte Touche Tohmatsu (special general partnership) has issued a standard unqualified audit report for the company. 4、 Zhou Hongyi, the person in charge of the company, Zhang Mao, the person in charge of accounting, and Zhang Hailong, the person in charge of accounting organization (Accounting Supervisor), declare that they guarantee the authenticity, accuracy and integrity of the financial report in the annual report. 5、 The profit distribution plan or the plan of converting accumulation fund into share capital in the reporting period adopted by the resolution of the board of directors

After deliberation at the 8th meeting of the 6th board of directors of the company, the profit distribution plan of the company for 2021 is drawn up as follows: Based on the number of share capital that can be distributed on the equity registration date when the profit distribution plan for 2021 is implemented (the total share capital deducting the share balance of the company’s special repurchase account) as the base, a cash dividend of RMB 1 (including tax) will be distributed for every 10 shares. The above profit distribution plan has been approved by the independent directors of the company and needs to be submitted to the general meeting of shareholders for deliberation and approval. 6、 Risk statement of forward-looking statements √ applicable □ not applicable

The future plans, development strategies and other forward-looking descriptions involved in this report do not constitute the company’s substantive commitment to investors. Please pay attention to investment risks. 7、 Whether there is any non operational occupation of funds by the controlling shareholders and their related parties? VIII. Whether there is any external guarantee in violation of the specified decision-making procedures? IX. whether more than half of the directors cannot guarantee the authenticity, accuracy and integrity of the annual report disclosed by the company? X. major risk tips

During the reporting period, the company did not find any major risks that would adversely affect its future development strategy and sustainable business activities.

The company will take active measures to deal with the possible business risks. For details, see “(IV) possible risks” in “VI. discussion and analysis of the company on the future development” in “section III Management Discussion and analysis” of this report. 11、 Others □ applicable √ not applicable

catalogue

Section 1 interpretation four

Section II Company Profile and main financial indicators Section III Management Discussion and Analysis Section IV corporate governance Section V environmental and social responsibility 79 section VI important matters Section VII changes in shares and shareholders 103 Section VIII preferred shares 114 section IX relevant information of bonds 115 section x financial reporting one hundred and sixteen

Financial statements containing the list of documents signed and sealed by the person in charge of the company, the person in charge of accounting work and the person in charge of accounting institutions for future reference.

The original of the audit report with the seal of the accounting firm and the signature and seal of the certified public accountant.

Originals of all company documents and announcements publicly disclosed during the reporting period.

Section I interpretation

1、 Interpretation in this report, unless the context otherwise requires, the following words have the following meanings: Interpretation of common words

Refers to 360 Security Technology Inc(601360) , formerly known as “Jiangnan Jiajie power company, the company, the group and 360ti Co., Ltd.”, hereinafter referred to as ” 360 Security Technology Inc(601360) ” and “former Jiangnan Jiajie” (collectively referred to as “the group” when including subsidiaries)

Qixin Zhicheng refers to Tianjin Qixin Zhicheng Technology Co., Ltd., which is the controlling shareholder of the company

Refers to 360 Security Technology Inc(601360) Technology Group Co., Ltd., a wholly-owned subsidiary of the company, formerly known as 360 Security Technology Inc(601360) technology ” 360 Security Technology Inc(601360) Technology Co., Ltd”, ” 360 Security Technology Inc(601360) Technology Co., Ltd.” and “Tianjin Qisi Technology Co., Ltd.”

Qihoo 360 refers to Qihoo 360 Technology Co. Ltd., which was listed on the New York Stock Exchange in March 2011 and delisted in July 2016

World Xinghui refers to Beijing World Xinghui Technology Co., Ltd., which is a company directly controlled by the company

Beijing Qiyuan refers to Beijing Qiyuan Technology Co., Ltd., which is indirectly controlled by the company

Beijing qifutong refers to Beijing qifutong Technology Co., Ltd., which is indirectly controlled by the company

360 Security Technology Inc(601360) digital security group refers to 360 Security Technology Inc(601360) Digital Security Technology Group Co., Ltd., formerly known as “Beijing Hongteng Intelligent Technology Co., Ltd”, which is indirectly controlled by the company

Chirui Tiancheng refers to Tianjin chirui Tiancheng equity investment center (limited partnership), which is a partnership indirectly controlled by the company

Qifei international refers to Qifei International Development Co. limited, which is a company indirectly controlled by the company

Hans Anxin refers to Hans Anxin (Beijing) Software Technology Co., Ltd. and its controlled companies, and companies indirectly controlled by the company

Tianjin Jincheng bank refers to Tianjin Jincheng Bank Co., Ltd

Refers to Qi An Xin Technology Group Inc(688561) , formerly known as “Beijing Qi An Xin Technology Group Inc(688561) Ke Qi An Xin Technology Group Inc(688561) Technology Co., Ltd.”, which is the original joint-stock company of the company. In 2019, the company has sold all the equity of the company

Tianjin Zhongxin and Shanghai Guanying refer to Shanghai Guanying enterprise management partnership (limited partnership), formerly known as “Tianjin Zhongxin equity investment partnership (limited partnership)”

Tianjin xinxinsheng refers to Tianjin xinxinsheng equity investment partnership (limited partnership), which is the shareholder of the company

Sequoia Yiyuan refers to Beijing Sequoia Yiyuan equity investment center (limited partnership), which is the shareholder of the company

Confidence Qiyuan refers to Tianjin confidence Qiyuan equity investment partnership (limited partnership), which is the shareholder of the company

Haining Guoan refers to Zhejiang Haining Guoan Ruiwei investment partnership (limited partnership), which is the shareholder of the company

Nezha automobile refers to the automobile brand of Nezha Automobile Co., Ltd., a joint-stock company of the company

Mobile Internet refers to the general name of activities that combine and practice the technology, platform, business model and application of the Internet with mobile communication technology

It refers to the result of the integration of global industrial system with advanced computing, analysis, sensing technology and Internet industrial Internet connection. It is a new network infrastructure to realize the comprehensive interconnection of people, machines and things

PC means personal computer

App refers to the application, which generally refers to the application software installed on the mobile device

H5 refers to the 5th generation HTML (Hypertext Markup Language)

Apt refers to advanced persistent threat

It refers to the world’s largest distributed intelligent security system launched by the company, which has five core abilities: threat 360 security brain perception, reasoning traceability, attack early warning, decision-making assistance and self-learning. It can play an important role in protecting the network security of key infrastructure, society, cities and individuals

Government enterprises refer to customers including but not limited to the party, government, military and enterprises

Refers to the code inserted by the programmer into the computer program that destroys the computer function or data. It is a set of computer instructions or program code that can affect the use of the computer and replicate itself

It refers to the system weakness or system defect caused by defects in the design of application software or operating system, loopholes and errors in coding, design defects in interactive processing or irrationality in logical flow

Cyber space security or cyber security for short, refers to the security threats and protection problems in cyberspace, that is, the threats and defense measures faced by Cyberspace Security in the production, transmission, storage and processing of information in the adversary environment And the threat and protection mechanism of the network and system itself.

Cyberspace Security not only includes the confidentiality, integrity and availability of information studied by traditional information security, but also includes the security and credibility of the infrastructure of Cyberspace

Artificial intelligence / AI refers to the simulation of the information process of human consciousness and thinking, which usually refers to the intelligence realized by ordinary computers

It refers to an Internet-based computing method. In this way, the shared software cloud computing hardware resources and information can be provided to various computer terminals and other devices on demand

It refers to the data set that cannot be captured, managed and processed by conventional software tools within a certain time range. It requires a new processing mode to have a higher quality

- Advertisment -