CN104486085A - System and method for managing intelligent key device - Google Patents

System and method for managing intelligent key device Download PDF

Info

Publication number
CN104486085A
CN104486085A CN201410818488.9A CN201410818488A CN104486085A CN 104486085 A CN104486085 A CN 104486085A CN 201410818488 A CN201410818488 A CN 201410818488A CN 104486085 A CN104486085 A CN 104486085A
Authority
CN
China
Prior art keywords
cipher key
intelligent cipher
key equipment
equipment
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410818488.9A
Other languages
Chinese (zh)
Inventor
孙吉平
韩勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN201410818488.9A priority Critical patent/CN104486085A/en
Publication of CN104486085A publication Critical patent/CN104486085A/en
Pending legal-status Critical Current

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a system and a method for managing an intelligent key device. The system comprises a server and the intelligent key device, wherein the server comprises a storage module for storing identification information and device state information of the intelligent key device, a loss reporting module for marking the device state of the intelligent key device as a loss-reporting state according to a loss-reporting request submitted by a user and a processing module for searching the device state according to the identification information of the intelligent key device when the intelligent key device is communicated with a server by virtue of a terminal and sending a protection command to the intelligent key device if the device state is the loss reporting state. The intelligent key device comprises a protection module for receiving and analyzing the protection command from the server and implementing protection operation according to the protection command; the protection operation comprises an operation of clearing data stored in the intelligent key device. According to the system and the method, the loss of the lost key device is reported in the server, so that the data security of the user can be ensured.

Description

The system and method for management intelligent cipher key equipment
Technical field
The present invention relates to information security field, particularly a kind of system and method managing intelligent cipher key equipment.
Background technology
Intelligent cipher key equipment is widely used in the ecommerce such as Web bank, E-Government field, it is a kind of small hardware device with processor and memory, data communication interface by terminals such as such as computers is connected with terminal, utilize the built-in certification of key algorithm realization to user identity, usually store key and the digital certificate of user in intelligent cipher key equipment, user data (as personal document's data, photo etc. relate to the data of privacy of user) can also be stored.At present, along with the development of the universal of intelligent mobile terminal and wireless technology, the use of intelligent cipher key equipment is applied to mobile terminal from PC end gradually, and typical product is such as bluetooth-type intelligent cipher key equipment (bluetooth Key).
When intelligent cipher key equipment is lost, although can report the loss to provider and make up a new equipment, but there is safety issue in the key devices lost, the key devices lost is because None-identified is certainly as reporting the loss equipment, even if therefore report the loss equipment by provider to make up, but the key devices of this loss is still available devices, be easy to falsely used by the person of picking up or crack thus obtain privacy of user data.
Summary of the invention
For this reason, the invention provides a kind of system and method managing intelligent cipher key equipment, to solve the problem of data safety after hardware device loss.
One aspect of the present invention provides a kind of system managing intelligent cipher key equipment, comprising: comprise server and described intelligent cipher key equipment, wherein:
Described server comprises:
Memory module, is configured to the identification information and the status information of equipment that store described intelligent cipher key equipment;
Report the loss module, what be configured to submit to according to user reports the loss request, and the equipment state of described intelligent cipher key equipment is labeled as the state of reporting the loss; And
Processing module, be configured at described intelligent cipher key equipment by its equipment state of identification information-enquiry according to described intelligent cipher key equipment when terminal and described server communication, if its equipment state is the state of reporting the loss, then issue protection instruction to this intelligent cipher key equipment;
Described intelligent cipher key equipment comprises:
Protection module, is configured to receive and resolves the described protection instruction from described server, and performs protection operation according to described protection instruction,
Wherein said protection operation comprises the operation of the data removing described intelligent cipher key equipment storage inside.
Preferably, the identification information of described intelligent cipher key equipment is that described server is acquired by described terminal.
Preferably, in described server, described memory module is further configured to the corresponding relation between the identification information storing account and/or password and described intelligent cipher key equipment, described processing module is further configured to account and/or password according to being received from described terminal, utilizes described corresponding relation to find out the identification information of described intelligent cipher key equipment.
Preferably, in described server, described processing module is further configured to when the described identification information utilizing described corresponding relation to find out is not unique, obtains the identification information of described intelligent cipher key equipment from described terminal.
Preferably, described server comprises authentication module further, and described authentication module is configured to pass verifies whether the account of described user input and/or password effectively verify whether described user is authorized user.
Preferably, in described server, described authentication module is further configured to by verifying whether the account that described user inputs and/or password and name and/or identification card number effectively verify whether described user is authorized user.
Preferably, the data of described intelligent cipher key equipment storage inside comprise digital certificate, key and user data.
Preferably, described protection operation also comprises the various functions forbidding described intelligent cipher key equipment and the operation of reporting the loss state in described intelligent cipher key equipment internal labeling.
Preferably, described intelligent cipher key equipment is bluetooth key, and the identification information of described intelligent cipher key equipment comprises: No. ID, MAC Address, unique sequence numbers or other self-defining there is uniquely identified information.
The present invention also provides a kind of method managing intelligent cipher key equipment on the other hand, comprising:
The identification information of server stores intelligent cipher key equipment and status information of equipment;
What described server was submitted to according to user reports the loss request, and the equipment state of described intelligent cipher key equipment is labeled as the state of reporting the loss;
At described intelligent cipher key equipment by its equipment state of identification information-enquiry according to described intelligent cipher key equipment when terminal and described server communication, if its equipment state is the state of reporting the loss, then issue protection instruction to this intelligent cipher key equipment;
Described intelligent cipher key equipment receives and resolves the described protection instruction from described server, and performs protection operation according to described protection instruction,
Wherein said protection operation comprises the operation of the data removing described intelligent cipher key equipment storage inside.
Preferably, the identification information of described intelligent cipher key equipment is that described server is acquired by described terminal.
Preferably, the method comprises further:
Described server is according to the account and/or the password that are received from described terminal, and the corresponding relation between the identification information of the account utilizing it to store and/or password and described intelligent cipher key equipment finds out the identification information of described intelligent cipher key equipment.
Preferably, the method comprises further:
Described server, when the described identification information utilizing described corresponding relation to find out is not unique, obtains the identification information of described intelligent cipher key equipment from described terminal.
Preferably, the method comprises described server further by verifying whether the account that described user inputs and/or password effectively verify whether described user is authorized user.
Preferably, the method comprises described server further by verifying whether the account that described user inputs and/or password and name and/or identification card number effectively verify whether described user is authorized user.
Preferably, described protection operation also comprises the various functions forbidding described intelligent cipher key equipment and the operation of reporting the loss state in described intelligent cipher key equipment internal labeling.
According to system or the method for management intelligent cipher key equipment provided by the present invention; if there is the situation losing intelligent cipher key equipment; equipment state is labeled as by submitting the request of reporting the loss to the state of reporting the loss by user on the server; and afterwards once intelligent cipher key equipment is by terminal and described server communication; server just can inquire its equipment state for the state of reporting the loss according to the identification information of equipment; and make device clear internal data by issuing protection instruction, ensure secure user data.
Accompanying drawing explanation
Fig. 1 is the structural representation of the system of the management intelligent cipher key equipment of the embodiment of the present invention.
Fig. 2 is the schematic flow sheet of the method for the management intelligent cipher key equipment of the embodiment of the present invention.
Embodiment
For making those skilled in the art understand the present invention better, with reference to the accompanying drawings embodiments of the invention are described in detail.
Fig. 1 is the structural representation of the system of the management intelligent cipher key equipment of the embodiment of the present invention.As shown in Figure 1, the system of management intelligent cipher key equipment, comprises server 10 and intelligent cipher key equipment 20 (for convenience of describing, being also called for short " equipment " below), wherein:
Server 10 comprises:
Memory module, is configured to the identification information and the status information of equipment that store intelligent cipher key equipment 20; Wherein, status information of equipment can comprise normal condition, report the loss state, is defaulted as normal condition;
Report the loss module, what be configured to submit to according to user reports the loss request, and the equipment state of intelligent cipher key equipment 20 is labeled as the state of reporting the loss; And
Processing module, is configured to when intelligent cipher key equipment 20 is communicated with server 10 by terminal 30 according to its equipment state of the identification information-enquiry of intelligent cipher key equipment 20, if its equipment state is the state of reporting the loss, then issues protection instruction to intelligent cipher key equipment 20;
Intelligent cipher key equipment 20 comprises:
Protection module, is configured to receive and resolves the protection instruction from server 10, and performs protection operation according to protection instruction, and wherein protection operation comprises the operation of the data removing intelligent cipher key equipment 20 storage inside.
According to the system of the present embodiment; when equipment is lost; user can submit the request of reporting the loss to; and afterwards once intelligent cipher key equipment 20 is communicated with server 10 by terminal 30; server 10 just can inquire its equipment state for the state of reporting the loss according to the identification information of equipment 20; and make equipment 20 protected to remove internal data by issuing protection instruction, protect secure user data.
In the present embodiment, user submits to the mode of request of reporting the loss can have multiple specific implementation, specifically: user can by the account of input and/or password login server 10, server 10 inquires equipment 20 (such as, identification information by equipment 20), then user submits the request of this equipment state of change to; Or submit to after user login services device 10 and report the loss request, report the loss in request the identification information containing this equipment 20, server 10 directly carries out according to the request of reporting the loss the operation changing equipment state; Or user submits to directly to server 10 and reports the loss request, reports the loss in request the identification information containing account and/or password and this equipment 20, server 10 judge to report the loss in request account and/or password effectively after this equipment state is changed to the state of reporting the loss; Again or, user can also after Successful login server 10, and equipment state is labeled as the state of reporting the loss by the user interface provided by server 10; Even in some cases, user can submit to it to report the loss request by the mode such as phone, interview to the contact staff of service provider, after its request of reporting the loss submitted to is by examination & verification, by the technician of service provider one side, the equipment state of this equipment 20 stored in server 10 is modified as the state of reporting the loss.
For guaranteeing the safety and effectiveness reporting the loss operation better, user is preferably the authorized user verified through server 10, thus server 10 correspondingly can comprise authentication module, whether authentication module whether effectively to carry out authentication of users be authorized user if being configured to pass the account of authentication of users input and/or password.For guaranteeing to submit to the user of the request of reporting the loss to be authorized user further, preferably, whether whether the account that inputted by authentication of users of the authentication module of server 10 and/or password and name and/or identification card number effectively carry out authentication of users is authorized user.
The identification information of intelligent cipher key equipment 20 can be that server 10 is acquired by terminal 30.When the equipment lost is obtained by unauthorized user; once equipment is communicated with server 10 by terminal by unauthorized user; server 10 is just by the identification information of terminal 30 equipment 20; such server 10 can by identification information-enquiry to status information of equipment; and when discovering device state is for reporting the loss state, send protection instruction to equipment 20.
Protection operation specifically can comprise the operation of removing the data that device interior stores, and wherein the data of intelligent cipher key equipment 20 storage inside can comprise digital certificate, key and user data, can also comprise status information of equipment and instructions parse algorithm; Secure user data is ensured to maximize.
The various functions of disablement device 20 can also be comprised to the protection operation of equipment 20 and report the loss the operation of state in equipment internal labeling; Thus can make equipment 20 can not use by unauthorized user.
When inquiring the normal condition of equipment state not for the state of reporting the loss, server 10 can with equipment 20 proper communication.
Typical intelligent cipher key equipment 20 is such as bluetooth key.The identification information of equipment 20 can include but not limited to: No. ID, MAC Address, unique sequence numbers or other self-defining there is uniquely identified information.
Server 10 can be physical server or the Cloud Server of networking.
In the system of the management intelligent cipher key equipment of another embodiment of the present invention, memory module in server can also store account and/or the corresponding relation between password and the identification information of intelligent cipher key equipment, processing module can also, according to account and/or the password being received from terminal, utilize corresponding relation to find out the identification information of intelligent cipher key equipment.In not only device losses, and account and/or password are also by the above-mentioned situation revealed, and server also can find out the identification information of equipment according to corresponding relation, and then inquires status information of equipment.Visible, the present embodiment also can ensure secure user data in these cases well.
In the system of another embodiment of the present invention, the processing module in server when the identification information utilizing corresponding relation to find out is not unique, can also obtain the identification information of intelligent cipher key equipment from terminal.In other words, in some cases, single account and/or corresponding codon pair have answered multiple equipment, namely, now by this account and/or the corresponding cipher inquiry identification information to multiple equipment, in the case, server can determine equipment state by the identification information obtaining intelligent cipher key equipment from terminal.
As shown in Figure 2, the embodiment of the present invention additionally provides a kind of method managing intelligent cipher key equipment, comprising:
The identification information of server stores intelligent cipher key equipment and status information of equipment;
What server was submitted to according to user reports the loss request, and the equipment state of intelligent cipher key equipment is labeled as the state of reporting the loss;
At intelligent cipher key equipment by its equipment state of identification information-enquiry according to intelligent cipher key equipment when terminal and server communication, if its equipment state is the state of reporting the loss, then issue protection instruction to this intelligent cipher key equipment;
Intelligent cipher key equipment receives and resolves the protection instruction from server, and performs protection operation according to protection instruction,
Wherein protection operation comprises the operation of the data removing intelligent cipher key equipment storage inside.
Pass through said method; after the intelligent cipher key equipment lost " is reported the loss " by user on the server; for this equipment being again connected to server by terminal; server can check equipment state; if be the state of reporting the loss; then send protection instruction to this equipment, ensure the safety of data in equipment well.
In addition, protection operation can also comprise the various functions of forbidding intelligent cipher key equipment and report the loss the operation of state in intelligent cipher key equipment internal labeling.Make the intelligent cipher key equipment lost can not be continued to use by unauthorized user.
For the acquisition of the identification information of equipment, as in embodiment above, can be acquired by terminal by server.In addition, also can by server according to the account and/or the password that are received from terminal, the account utilizing it to store and/or the corresponding relation between password and the identification information of intelligent cipher key equipment find out the identification information of intelligent cipher key equipment; When the identification information found out is not unique, server can obtain the identification information of intelligent cipher key equipment further from terminal.
The identification information of intelligent cipher key equipment can include but not limited to: No. ID, MAC Address, unique sequence numbers or other self-defining there is uniquely identified information.
For guaranteeing that the user submitting the request of reporting the loss to has corresponding authority, the identity that server generally tackles user is verified, whether whether the account such as inputted by authentication of users and/or password and name and/or identification card number effectively carry out authentication of users is authorized user.
The present invention is not limited to above-mentioned specific embodiment; do not deviating under the present invention's spirit and real situation thereof; those of ordinary skill in the art can make various corresponding change and distortion according to the present invention, but these corresponding changes and distortion all should belong within the protection range of claims of the present invention.

Claims (16)

1. manage a system for intelligent cipher key equipment, comprise server and described intelligent cipher key equipment, wherein:
Described server comprises:
Memory module, is configured to the identification information and the status information of equipment that store described intelligent cipher key equipment;
Report the loss module, what be configured to submit to according to user reports the loss request, and the equipment state of described intelligent cipher key equipment is labeled as the state of reporting the loss; And
Processing module, be configured at described intelligent cipher key equipment by its equipment state of identification information-enquiry according to described intelligent cipher key equipment when terminal and described server communication, if its equipment state is the state of reporting the loss, then issue protection instruction to this intelligent cipher key equipment;
Described intelligent cipher key equipment comprises:
Protection module, is configured to receive and resolves the described protection instruction from described server, and performs protection operation according to described protection instruction,
Wherein said protection operation comprises the operation of the data removing described intelligent cipher key equipment storage inside.
2. the system as claimed in claim 1, wherein, the identification information of described intelligent cipher key equipment is that described server is acquired by described terminal.
3. the system as claimed in claim 1, in described server, described memory module is further configured to the corresponding relation between the identification information storing account and/or password and described intelligent cipher key equipment, described processing module is further configured to account and/or password according to being received from described terminal, utilizes described corresponding relation to find out the identification information of described intelligent cipher key equipment.
4. system as claimed in claim 3, in described server, described processing module is further configured to when the described identification information utilizing described corresponding relation to find out is not unique, obtains the identification information of described intelligent cipher key equipment from described terminal.
5. the system according to any one of Claims 1 to 4, wherein, described server comprises authentication module further, and described authentication module is configured to pass verifies whether the account of described user input and/or password effectively verify whether described user is authorized user.
6. system as claimed in claim 5, in described server, described authentication module is further configured to by verifying whether the account that described user inputs and/or password and name and/or identification card number effectively verify whether described user is authorized user.
7. the system according to any one of Claims 1 to 4, wherein, the data of described intelligent cipher key equipment storage inside comprise digital certificate, key and user data.
8. the system according to any one of Claims 1 to 4, wherein, described protection operation also comprises the various functions forbidding described intelligent cipher key equipment and the operation of reporting the loss state in described intelligent cipher key equipment internal labeling.
9. the system according to any one of Claims 1 to 4, wherein, described intelligent cipher key equipment is bluetooth key, and the identification information of described intelligent cipher key equipment comprises: No. ID, MAC Address, unique sequence numbers or other self-defining there is uniquely identified information.
10. manage a method for intelligent cipher key equipment, comprising:
The identification information of server stores intelligent cipher key equipment and status information of equipment;
What described server was submitted to according to user reports the loss request, and the equipment state of described intelligent cipher key equipment is labeled as the state of reporting the loss;
At described intelligent cipher key equipment by its equipment state of identification information-enquiry according to described intelligent cipher key equipment when terminal and described server communication, if its equipment state is the state of reporting the loss, then issue protection instruction to this intelligent cipher key equipment;
Described intelligent cipher key equipment receives and resolves the described protection instruction from described server, and performs protection operation according to described protection instruction,
Wherein said protection operation comprises the operation of the data removing described intelligent cipher key equipment storage inside.
11. methods as claimed in claim 10, the identification information of wherein said intelligent cipher key equipment is that described server is acquired by described terminal.
12. methods as claimed in claim 10, comprise further:
Described server is according to the account and/or the password that are received from described terminal, and the corresponding relation between the identification information of the account utilizing it to store and/or password and described intelligent cipher key equipment finds out the identification information of described intelligent cipher key equipment.
13. methods as claimed in claim 11, comprise further:
Described server, when the described identification information utilizing described corresponding relation to find out is not unique, obtains the identification information of described intelligent cipher key equipment from described terminal.
14. methods according to any one of claim 10 ~ 13, comprise described server further by verifying whether the account that described user inputs and/or password effectively verify whether described user is authorized user.
15. methods as claimed in claim 14, wherein, the method comprises described server further by verifying whether the account that described user inputs and/or password and name and/or identification card number effectively verify whether described user is authorized user.
16. methods according to any one of claim 10 ~ 13, wherein, described protection operation also comprises the various functions forbidding described intelligent cipher key equipment and the operation of reporting the loss state in described intelligent cipher key equipment internal labeling.
CN201410818488.9A 2014-12-24 2014-12-24 System and method for managing intelligent key device Pending CN104486085A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410818488.9A CN104486085A (en) 2014-12-24 2014-12-24 System and method for managing intelligent key device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410818488.9A CN104486085A (en) 2014-12-24 2014-12-24 System and method for managing intelligent key device

Publications (1)

Publication Number Publication Date
CN104486085A true CN104486085A (en) 2015-04-01

Family

ID=52760593

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410818488.9A Pending CN104486085A (en) 2014-12-24 2014-12-24 System and method for managing intelligent key device

Country Status (1)

Country Link
CN (1) CN104486085A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106452845A (en) * 2016-09-20 2017-02-22 飞天诚信科技股份有限公司 Online unlocking implementation method and apparatus
CN109831300A (en) * 2017-11-23 2019-05-31 航天信息股份有限公司 A kind of cipher key destruction method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040046638A1 (en) * 2002-09-10 2004-03-11 Nec Corporation Terminal lock system comprising key device carried by user and terminal-associated device incorporated in terminal device
CN101309518A (en) * 2008-06-30 2008-11-19 中国移动通信集团公司 Method, apparatus and system for protecting information in SIM card
CN101572741A (en) * 2008-05-04 2009-11-04 英业达股份有限公司 Method for protecting mobile data
CN102170638A (en) * 2010-12-03 2011-08-31 北京握奇数据系统有限公司 Air loss reporting method and equipment
CN102571823A (en) * 2012-02-27 2012-07-11 深圳趋势数码科技有限公司 Remote security protection method for data of flash disk
CN103929306A (en) * 2014-04-02 2014-07-16 天地融科技股份有限公司 Intelligent secret key device and information management method of intelligent secret key device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040046638A1 (en) * 2002-09-10 2004-03-11 Nec Corporation Terminal lock system comprising key device carried by user and terminal-associated device incorporated in terminal device
CN101572741A (en) * 2008-05-04 2009-11-04 英业达股份有限公司 Method for protecting mobile data
CN101309518A (en) * 2008-06-30 2008-11-19 中国移动通信集团公司 Method, apparatus and system for protecting information in SIM card
CN102170638A (en) * 2010-12-03 2011-08-31 北京握奇数据系统有限公司 Air loss reporting method and equipment
CN102571823A (en) * 2012-02-27 2012-07-11 深圳趋势数码科技有限公司 Remote security protection method for data of flash disk
CN103929306A (en) * 2014-04-02 2014-07-16 天地融科技股份有限公司 Intelligent secret key device and information management method of intelligent secret key device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106452845A (en) * 2016-09-20 2017-02-22 飞天诚信科技股份有限公司 Online unlocking implementation method and apparatus
CN106452845B (en) * 2016-09-20 2019-03-29 飞天诚信科技股份有限公司 A kind of implementation method unlocked online and device
CN109831300A (en) * 2017-11-23 2019-05-31 航天信息股份有限公司 A kind of cipher key destruction method and device

Similar Documents

Publication Publication Date Title
CN103001773B (en) Fingerprint authentication system and fingerprint authentication method based on near field communication (NFC)
CN108259164B (en) Identity authentication method and equipment of Internet of things equipment
CN105847247A (en) Authentication system and working method thereof
CN103886661B (en) Access control management method and system
CN104994114A (en) Identity authentication system and method based on electronic identification card
US11539399B2 (en) System and method for smart card based hardware root of trust on mobile platforms using near field communications
CN102761870B (en) Terminal authentication and service authentication method, system and terminal
CN106710043A (en) Time-limited entrance guard management system with visitor authentication and method thereof
CN202353818U (en) System for ensuring secure communication between vehicle-mounted communication equipment and wireless terminal
CN106330812B (en) File security recognition methods and device
CN109729000B (en) Instant messaging method and device
CN105635075A (en) Method of registering cloud terminal, cloud terminal, cloud server and cloud system
CN103914772A (en) Wireless authentication method, system and device for mobile payment
CN103905194A (en) Identity traceability authentication method and system
KR20130108442A (en) System and method for secure containment of sensitive financial information stored in a mobile communication terminal
CN104363589A (en) Identity authentication method, device and terminal
CN105813072A (en) Terminal authentication method, system and cloud server
CN110278084B (en) eID establishing method, related device and system
CN103020505B (en) Based on information management system and the approaches to IM of finger print identifying
CN103401686A (en) User Internet identity authentication system and application method thereof
KR101603963B1 (en) Authentication method using fingerprint information and certification number, user terminal and financial institution server
CN108989331B (en) Use authentication method of data storage device, device and storage medium thereof
CN104486085A (en) System and method for managing intelligent key device
KR101133210B1 (en) Mobile Authentication System and Central Control System
CN103139201A (en) Network strategy acquiring method and data center switchboard

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant after: BEIJING SHENSI SHUDUN SCIENCE & TECHNOLOGY CO., LTD.

Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant before: Beijing Shensi Shudun Technology Co., Ltd.

COR Change of bibliographic data
CB02 Change of applicant information

Address after: 100193 Beijing, Haidian District, East West Road, No. 10, East Hospital, building No. 5, floor 5, layer 510

Applicant after: BEIJING SHENSI SHUDUN SCIENCE & TECHNOLOGY CO., LTD.

Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant before: BEIJING SHENSI SHUDUN SCIENCE & TECHNOLOGY CO., LTD.

COR Change of bibliographic data
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150401