CN106709319B - Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method - Google Patents
Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method Download PDFInfo
- Publication number
- CN106709319B CN106709319B CN201611153459.0A CN201611153459A CN106709319B CN 106709319 B CN106709319 B CN 106709319B CN 201611153459 A CN201611153459 A CN 201611153459A CN 106709319 B CN106709319 B CN 106709319B
- Authority
- CN
- China
- Prior art keywords
- data
- encrypted data
- authority
- user
- dimension code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The invention discloses a two-dimension code coding and decoding application authority control system and a grading authorization method, wherein the method comprises the following steps: acquiring two-dimension code information, and identifying the two-dimension code information to obtain encrypted data and a data authority distribution table; acquiring user authority, searching a data authority distribution table, and acquiring encrypted data authorized by the user authority in the encrypted data; and decrypting the target encrypted data to obtain decrypted target data. The device comprises: the device comprises a two-dimensional code identification module, a data acquisition module and a data decryption module. By identifying the two-dimension code information and acquiring the data authority distribution table and the target encrypted data, the two-dimension code can be decoded locally, and the data authority distribution table can be acquired locally; the target encrypted data corresponding to the user authority is obtained by inquiring the data authority distribution table and is decrypted to obtain the target data, the authority authentication of the two-dimensional code can be carried out in an off-line state, and the corresponding data can be obtained according to different user authorities.
Description
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to a two-dimensional code coding and decoding application authority control system and a hierarchical authorization method.
Background
The two-dimensional code as a new data storage mode records data symbol information by using black and white alternate patterns of a certain specific geometric figure distributed on a plane according to a certain rule, ingeniously utilizes the concepts of '0' and '1' bit streams forming the internal logic basis of a computer in code compilation, uses a plurality of geometric shapes corresponding to a binary system to represent character numerical value information, automatically reads the information by an image input device or a photoelectric scanning device to realize automatic information processing, and has a certain verification function.
In order to achieve the purpose of controlling and outputting data for different users, computers or devices, the existing two-dimensional code information processing method needs to distribute output data according to control requirements in the process of analyzing the two-dimensional code so as to ensure that different users can obtain different data after interpreting the two-dimensional code. For different users, after hierarchical authorization is carried out, data needs to be read according to the authority. In the existing method, the decoding of the two-dimensional code is completed in a non-network environment, namely, the decoding function is completed locally on the equipment, so that the authority discrimination and control can not be performed remotely by using a network; therefore, the authority authentication in the offline state cannot be completed.
In the process of implementing the embodiment of the present invention, the inventor finds that the existing method decodes the two-dimensional code locally, and the authority distribution function is located at the server side, so that the authority authentication of the two-dimensional code cannot be performed in an offline state.
Disclosure of Invention
The embodiment of the invention provides a two-dimension code encoding and decoding application authority control system and a hierarchical authorization method, and solves the problem that the two-dimension code cannot be authenticated in an off-line state because the two-dimension code is locally decoded and the authority distribution function is located at a server end in the existing method.
In a first aspect, an embodiment of the present invention provides a two-dimensional code encoding and decoding hierarchical authorization method, including:
acquiring two-dimension code information, and identifying the two-dimension code information to obtain encrypted data and a data authority distribution table;
acquiring user authority, searching the data authority distribution table, and acquiring target encrypted data authorized by the user authority in the encrypted data;
and decrypting the target encrypted data to obtain decrypted target data.
Preferably, different rights in the data rights allocation table correspond to different encrypted data.
Preferably, the target encrypted data includes encrypted data corresponding to a target authority, and the target authority is an authority not greater than the user authority.
Preferably, before the obtaining the two-dimension code information and identifying the two-dimension code information to obtain the encrypted data and the data authority distribution table, the method further includes:
and acquiring a two-dimensional code image, and identifying the two-dimensional code image to obtain the two-dimensional code information.
Preferably, the acquiring the user right further includes:
and acquiring a user account, and processing the user account to obtain the user authority corresponding to the user account.
In a second aspect, an embodiment of the present invention further provides a two-dimensional code encoding and decoding application permission control system, including:
the two-dimension code identification module is used for acquiring two-dimension code information, identifying the two-dimension code information and obtaining encrypted data and a data authority distribution table;
the data acquisition module is used for acquiring user permission, searching the data permission distribution table and obtaining target encrypted data authorized by the user permission in the encrypted data;
and the data decryption module is used for decrypting the target encrypted data to obtain decrypted target data.
Preferably, different rights in the data rights allocation table correspond to different encrypted data.
Preferably, the target encrypted data includes encrypted data corresponding to a target authority, and the target authority is an authority not greater than the user authority.
Preferably, the apparatus further comprises:
and the two-dimension code acquisition module is used for acquiring a two-dimension code image, identifying the two-dimension code image and obtaining the two-dimension code information.
Preferably, the data obtaining module is further configured to obtain a user account, and process the user account to obtain the user right corresponding to the user account.
According to the technical scheme, the embodiment of the invention identifies the two-dimension code information to obtain the encrypted data and the data authority distribution table, so that the two-dimension code can be decoded locally, and the data authority distribution table can be obtained locally; the target encrypted data corresponding to the user authority is obtained by inquiring the data authority distribution table and is decrypted to obtain the target data, the authority authentication of the two-dimensional code can be carried out in an off-line state, and the corresponding data can be obtained according to different user authorities.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a two-dimensional code encoding and decoding hierarchical authorization method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a two-dimensional code encoding and decoding application permission control system according to an embodiment of the present invention.
Detailed Description
The following further describes embodiments of the invention with reference to the drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
Fig. 1 shows a schematic flow chart of a two-dimensional code encoding and decoding hierarchical authorization method provided by this embodiment, including:
s101, acquiring two-dimension code information, and identifying the two-dimension code information to obtain encrypted data and a data authority distribution table;
specifically, in the stage of generating a two-dimensional code for data by a first terminal, the first terminal sets different data according to the user authority corresponding to the authenticated user account, forms a data authority distribution table, and encrypts the different data by using different passwords. And the first terminal stores the encrypted data and the data authority distribution table in a two-dimensional code. And the second terminal acquires the two-dimension code information, identifies the two-dimension code information and obtains encrypted data and a data authority distribution table.
The first terminal stores data in the two-dimensional code and generates a two-dimensional code picture; the second terminal is a terminal for identifying the two-dimensional code information.
The two-dimension code information is a two-dimension code which stores encrypted data and a data authority distribution table.
The encrypted data is data subjected to encryption processing and comprises a plurality of parts of data, and each part of data corresponds to a user authority.
S102, obtaining user authority, searching the data authority distribution table, and obtaining target encrypted data authorized by the user authority in the encrypted data;
specifically, the second terminal obtains the user right, and queries in the data right distribution table to obtain the target encrypted data authorized by the user right in the encrypted data.
For example, the user right includes four levels, which are level 1, level 2, level 3 and level 4, and the encrypted data includes four portions, which are encrypted data a, encrypted data B, encrypted data C and encrypted data D, respectively, so that the user right level 1 in the data right distribution table corresponds to the encrypted data a, the user right level 2 corresponds to the encrypted data B, the user right level 3 corresponds to the encrypted data C, and the user right level 4 corresponds to the encrypted data D. When the user authority of a certain user is level 3, the user scans the two-dimensional code picture, and the target encrypted data which can be obtained is encrypted data C.
S103, decrypting the target encrypted data to obtain decrypted target data.
Specifically, the second terminal decrypts the target encrypted data to obtain decrypted target data, and then displays the target data in the second terminal.
For example, the user right includes four levels, which are level 1, level 2, level 3 and level 4, and the encrypted data includes four portions, which are encrypted data a, encrypted data B, encrypted data C and encrypted data D, respectively, so that the user right level 1 in the data right distribution table corresponds to the encrypted data a, the user right level 2 corresponds to the encrypted data B, the user right level 3 corresponds to the encrypted data C, and the user right level 4 corresponds to the encrypted data D. When the user authority of a certain user is level 3, the user scans the two-dimensional code picture, and the target encrypted data which can be obtained is encrypted data C. And the second terminal decrypts the encrypted data C to obtain decrypted data C, wherein the data C is the target data.
In the embodiment, the encrypted data and the data authority distribution table are acquired by identifying the two-dimension code information, so that not only can the two-dimension code be decoded locally, but also the data authority distribution table can be acquired locally; the target encrypted data corresponding to the user authority is obtained by inquiring the data authority distribution table and is decrypted to obtain the target data, the authority authentication of the two-dimensional code can be carried out in an off-line state, and the corresponding data can be obtained according to different user authorities.
Further, on the basis of the above method embodiment, different permissions in the data permission allocation table correspond to different encrypted data.
Different authorities are set to correspond to different encrypted data, so that the corresponding encrypted data can be quickly acquired after the user authority is conveniently acquired subsequently.
Further, on the basis of the above method embodiment, the target encrypted data includes encrypted data corresponding to a target authority, and the target authority is an authority not greater than the user authority.
Specifically, the user right with the higher level may view the encrypted data corresponding to the user right with the lower level.
For example, the user M with the highest level of user authority can acquire all information on the two-dimensional code, and the user N with the lower level of user authority can only acquire individual information on the two-dimensional code.
Through setting up the user authority of different ranks, be convenient for carry out hierarchical management to the data, simultaneously through letting higher level's user can look over subordinate user's data, can be convenient for personnel's work management.
Further, on the basis of the above embodiment of the method, before S101, the method further includes:
s100, acquiring a two-dimensional code image, and identifying the two-dimensional code image to obtain two-dimensional code information.
Specifically, the second terminal acquires a two-dimensional code image, and identifies the two-dimensional code image through a two-dimensional code identification application program to obtain the two-dimensional code information.
The two-dimensional code image can be acquired through the camera, or the two-dimensional code image sent by other terminals can be acquired, or other modes of acquiring the two-dimensional code image can be acquired.
The two-dimension code information is obtained by acquiring the two-dimension code image, and the user can acquire the two-dimension code image in multiple modes, so that the two-dimension code information is more convenient to acquire.
Further, on the basis of the foregoing method embodiment, the acquiring the user right in S102 further includes:
and acquiring a user account, and processing the user account to obtain the user authority corresponding to the user account.
Specifically, the second terminal acquires a current user account, processes the user account according to a preset rule, and obtains the user authority corresponding to the user account.
The preset rule may be preset, for example: the last digit of the account number corresponds to the user authority.
Fig. 2 shows a schematic structural diagram of a two-dimensional code encoding and decoding application authority control system provided in this embodiment, where the apparatus includes: two-dimensional code identification module 21, data acquisition module 22 and data decryption module 23, wherein:
the two-dimension code identification module 21 is configured to obtain two-dimension code information, identify the two-dimension code information, and obtain encrypted data and a data authority distribution table;
the data obtaining module 22 is configured to obtain a user right, search the data right distribution table, and obtain target encrypted data authorized by the user right in the encrypted data;
the data decryption module 23 is configured to decrypt the target encrypted data to obtain decrypted target data.
Specifically, the two-dimension code recognition module 21 obtains two-dimension code information, and recognizes the two-dimension code information to obtain encrypted data and a data authority distribution table; the data obtaining module 22 obtains the user right, searches the data right distribution table, and obtains the target encrypted data authorized by the user right in the encrypted data; the data decryption module 23 decrypts the target encrypted data to obtain decrypted target data.
In the embodiment, the encrypted data and the data authority distribution table are acquired by identifying the two-dimension code information, so that not only can the two-dimension code be decoded locally, but also the data authority distribution table can be acquired locally; the target encrypted data corresponding to the user authority is obtained by inquiring the data authority distribution table and is decrypted to obtain the target data, the authority authentication of the two-dimensional code can be carried out in an off-line state, and the corresponding data can be obtained according to different user authorities.
Further, on the basis of the above device embodiment, different permissions in the data permission distribution table correspond to different encrypted data.
Further, on the basis of the above device embodiment, the target encrypted data includes encrypted data corresponding to a target authority, and the target authority is an authority not greater than the user authority.
Further, on the basis of the above embodiment of the apparatus, the apparatus further comprises:
the two-dimensional code obtaining module 20 is configured to obtain a two-dimensional code image, and identify the two-dimensional code image to obtain the two-dimensional code information.
Further, on the basis of the above device embodiment, the data obtaining module 22 is further configured to obtain a user account, and process the user account to obtain the user right corresponding to the user account.
The two-dimensional code encoding and decoding application authority control system described in this embodiment may be used to implement the above method embodiments, and the principle and technical effect are similar, which are not described herein again.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
It should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. A two-dimensional code coding and decoding application authority control system is characterized by comprising:
the two-dimension code identification module is used for acquiring two-dimension code information, identifying the two-dimension code information and obtaining encrypted data and a data authority distribution table;
the data acquisition module is used for acquiring user permission, searching the data permission distribution table and obtaining target encrypted data authorized by the user permission in the encrypted data;
the data decryption module is used for decrypting the target encrypted data to obtain decrypted target data;
the system is specifically configured to:
in the stage of generating a two-dimensional code on data by a first terminal, the first terminal sets different data according to the user authority corresponding to the authenticated user account to form a data authority distribution table, and encrypts the different data by adopting different passwords; the first terminal stores the encrypted data and the data authority distribution table in two-dimensional code information;
correspondingly, the two-dimensional code recognition module is specifically configured to:
and acquiring the two-dimension code information through a second terminal, and identifying the two-dimension code information to obtain encrypted data and a data authority distribution table.
2. The system of claim 1, wherein different permissions in the data permission allocation table correspond to different encrypted data.
3. The system of claim 2, wherein the target encrypted data comprises encrypted data corresponding to a target permission, and the target permission is a permission that is not greater than the user permission.
4. The system of claim 1, further comprising:
and the two-dimension code acquisition module is used for acquiring a two-dimension code image, identifying the two-dimension code image and obtaining the two-dimension code information.
5. The system according to any one of claims 1 to 4, wherein the data obtaining module is further configured to obtain a user account, and process the user account to obtain the user right corresponding to the user account.
6. A two-dimensional code encoding and decoding hierarchical authorization method is characterized by comprising the following steps:
acquiring two-dimension code information, and identifying the two-dimension code information to obtain encrypted data and a data authority distribution table;
acquiring user authority, searching the data authority distribution table, and acquiring target encrypted data authorized by the user authority in the encrypted data;
decrypting the target encrypted data to obtain decrypted target data;
before the steps of obtaining the two-dimension code information, identifying the two-dimension code information and obtaining the encrypted data and the data authority distribution table, the method further comprises:
in the stage of generating a two-dimensional code on data by a first terminal, the first terminal sets different data according to the user authority corresponding to the authenticated user account to form a data authority distribution table, and encrypts the different data by adopting different passwords; the first terminal stores the encrypted data and the data authority distribution table in two-dimensional code information;
correspondingly, the obtaining of the two-dimension code information and the identifying of the two-dimension code information to obtain the encrypted data and the data authority distribution table include:
and acquiring the two-dimension code information through a second terminal, and identifying the two-dimension code information to obtain encrypted data and a data authority distribution table.
7. The method of claim 6, wherein different permissions in the data permission allocation table correspond to different encrypted data.
8. The method of claim 7, wherein the target encrypted data comprises encrypted data corresponding to a target permission, and wherein the target permission is a permission that is not greater than the user permission.
9. The method of claim 6, wherein before the obtaining the two-dimensional code information and identifying the two-dimensional code information to obtain the encrypted data and the data right distribution table, the method further comprises:
and acquiring a two-dimensional code image, and identifying the two-dimensional code image to obtain the two-dimensional code information.
10. The method according to any one of claims 6-9, wherein the obtaining of the user right further comprises:
and acquiring a user account, and processing the user account to obtain the user authority corresponding to the user account.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611153459.0A CN106709319B (en) | 2016-12-14 | 2016-12-14 | Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611153459.0A CN106709319B (en) | 2016-12-14 | 2016-12-14 | Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106709319A CN106709319A (en) | 2017-05-24 |
CN106709319B true CN106709319B (en) | 2020-01-07 |
Family
ID=58937124
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611153459.0A Active CN106709319B (en) | 2016-12-14 | 2016-12-14 | Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106709319B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108462699A (en) * | 2018-02-09 | 2018-08-28 | 苏州酷豆物联科技有限公司 | Based on the encrypted Quick Response Code generation of sequential and verification method and system |
CN109241220A (en) * | 2018-08-21 | 2019-01-18 | 安徽讯飞智能科技有限公司 | A method of geographical location information is obtained by scanning doorplate |
CN109948760B (en) * | 2019-03-28 | 2022-05-17 | 尤尼泰克(嘉兴)信息技术有限公司 | Information presentation method and device based on two-dimensional code |
CN109978094A (en) * | 2019-03-28 | 2019-07-05 | 尤尼泰克(嘉兴)信息技术有限公司 | A kind of information graduation rendering method and device based on two dimensional code |
CN110570313A (en) * | 2019-09-27 | 2019-12-13 | 深圳市网心科技有限公司 | data transaction method, data transaction device and system based on block chain |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101174286A (en) * | 2006-10-31 | 2008-05-07 | 佛山市顺德区顺达电脑厂有限公司 | Method for controlling computer use authority by radio frequency recognizing volume label |
CN103077339A (en) * | 2012-12-28 | 2013-05-01 | 广东欧珀移动通信有限公司 | Data protection method and device |
CN104794377A (en) * | 2014-06-05 | 2015-07-22 | 合肥星服信息科技有限责任公司 | Right control method for desktop system without database based on quick response code |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104424492B (en) * | 2013-09-02 | 2017-12-05 | 阿里巴巴集团控股有限公司 | A kind of data processing method and device based on Quick Response Code |
-
2016
- 2016-12-14 CN CN201611153459.0A patent/CN106709319B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101174286A (en) * | 2006-10-31 | 2008-05-07 | 佛山市顺德区顺达电脑厂有限公司 | Method for controlling computer use authority by radio frequency recognizing volume label |
CN103077339A (en) * | 2012-12-28 | 2013-05-01 | 广东欧珀移动通信有限公司 | Data protection method and device |
CN104794377A (en) * | 2014-06-05 | 2015-07-22 | 合肥星服信息科技有限责任公司 | Right control method for desktop system without database based on quick response code |
Also Published As
Publication number | Publication date |
---|---|
CN106709319A (en) | 2017-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106709319B (en) | Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method | |
US10469253B2 (en) | Methods and apparatus for migrating keys | |
EP3241129B1 (en) | User terminal, service providing apparatus, driving method of user terminal, driving method of service providing apparatus, and encryption indexing-based search system | |
CN103906054B (en) | Method and system for authorization of software function modules of internet of things | |
CN107948152B (en) | Information storage method, information acquisition method, information storage device, information acquisition device and information acquisition equipment | |
CN101014944A (en) | Method and apparatus for digital rights management | |
JP6123353B2 (en) | Document authority management system, terminal device, document authority management method, and program | |
CN110708291B (en) | Data authorization access method, device, medium and electronic equipment in distributed network | |
CN102724552A (en) | Image coding method, image decoding method and device | |
JP6930053B2 (en) | Data encryption method and system using device authentication key | |
CN109039997B (en) | Secret key obtaining method, device and system | |
WO2019077198A1 (en) | Media content privacy control | |
KR20170038542A (en) | Security certification apparatus using biometric information and security certification method | |
CN110598421B (en) | Two-dimensional code encryption method and device and two-dimensional code decryption method and device | |
CN104573475A (en) | Method and system for authenticating transcoding service program | |
CN103457723B (en) | A kind of encryption method and the encryption device based on it | |
US20180314807A1 (en) | File permission control method | |
KR101809976B1 (en) | A method for security certification generating authentication key combinating multi-user element | |
CN111625802A (en) | Projector authorization use method | |
CN104580262A (en) | Safety method applicable to wireless internet of things | |
CN111131270B (en) | Data encryption and decryption method and device, electronic equipment and storage medium | |
CN109413449B (en) | Video encryption and decryption method and system | |
CN114092488A (en) | Image processing method, image processing device, electronic equipment and storage medium | |
Zhang et al. | Compressive sensing | |
KR102469380B1 (en) | Method and system for de-identifying and restoring personal information of image data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP02 | Change in the address of a patent holder |
Address after: 100176 unit 502, 5 / F, block B, building 11, yard 8, Liangshuihe 2nd Street, economic and Technological Development Zone, Daxing District, Beijing Patentee after: BEIJING LP CENTURY TECHNOLOGY Co.,Ltd. Address before: 100020, No. 25, middle third ring road, Chaoyang District, Beijing, 13, 1315-1319 Patentee before: BEIJING LP CENTURY TECHNOLOGY Co.,Ltd. |
|
CP02 | Change in the address of a patent holder |