CN205829777U - A kind of cellphone information protection lock - Google Patents
A kind of cellphone information protection lock Download PDFInfo
- Publication number
- CN205829777U CN205829777U CN201620807909.2U CN201620807909U CN205829777U CN 205829777 U CN205829777 U CN 205829777U CN 201620807909 U CN201620807909 U CN 201620807909U CN 205829777 U CN205829777 U CN 205829777U
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- protection lock
- lock
- information
- secret key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The utility model proposes a kind of cellphone information protection lock, belong to digital product technical field of burglary prevention.Including protection lock, plug and mobile phone, protection lock may be designed as one with data wire.The biological characteristic storing user respectively in protection lock and mobile phone and the unique key accordingly generated are as protection checking information, it is ensured that protect the unique corresponding relation of lock and mobile phone.When mobile phone outwards transmits personal information, need to connect unique corresponding protection lock;Thus connect computer at mobile phone, connect network, and lose, stolen or when transferring the possession of, all etc. protected comprehensively and effectively, prevent the leakage of personal information being stored in mobile phone, and other people utilize mobile phone to bring loss to owner.This utility model has that cost is extremely low, safety is high, logic is simple, easy and simple to handle, do not affect the advantages such as normal use, in terms of the protection of mobile phone personal information and data, have good application prospect.
Description
Technical field
This utility model relates to a kind of cellphone information protection lock, a kind of mobile phone protection lock utilizing secret key to verify.
Belong to digital product technical field of burglary prevention.
Background technology
Along with the development of communication apparatus, mobile phone attainable function diversification day by day, it is possible to achieve pay the bill, transfer accounts,
Transmitting various file, picture etc., preserve or be associated with a large amount of personal information, therefore mobile phone information safety problem the most increasingly causes
People pay close attention to.When mobile phone is the most stolen, loses or resell, when falling in his staff, other people can by the personal information in mobile phone and
File is derived and is used, and the mobile phone owner of lost property can be caused the heavy losses of property.
Current personal information anti-leak means and anti-theft method of mobile phone are the most comparatively laborious, more typical such as screen locking password
Unlock with biological characteristic, the inconvenience that cause the user uses;Further, i.e. allow to utilize password or biological characteristic to mobile phone
Carry out screen locking, when mobile phone connects computer, can directly pass through computer to access handset content;Individual brand can not directly access,
Also can be by the unblock that cracks accordingly.Visible, both protected mode reliabilities are the highest.Especially as user, mobile phone is turned
Sell or give when using to other people, even if after manually deleting personal information, the recovery of data also can be realized by some technological means,
It cannot be guaranteed that user information safety.And, the memorizer (such as SD card) of mobile phone etc. can also be taken out by other people, reads on computers
The individual privacy information of user.
This domain variability of present stage does not has the application technology of the most perfect a kind of protection user information safety, current domestic mobile phone
Antitheft and information leakage preventing means mainly have following several: the first is the steel wire connection user's clothes that such as stretched by material object
Realizing antitheft with mobile phone, or controlled in mobile phone distance users certain limit by wireless signal, this method must carry it
His auxiliary equipment, normally uses mobile phone to user to put to no little inconvenience, and can not protect privacy of user, practicality and reliable
Property all has much room for improvement;The second is that the induction apparatus that carries of application mobile phone detects surrounding environment change, is prevented by software control realization
Steal and report to the police, need user manually opened and close software, complex operation, in-convenience in use;The third is to control hands by software
Machine can only be answered, it is impossible to dialing, this method can not effectively prevent the information leakage of user;Chinese patent is " a kind of based on ear
Mobile phone antitheft system that machine unlocks and method " (application number: 201410303821.2) propose one by earphone inserted mode solution
The information leakage preventing method of lock mobile phone, although mobile phone screen locking can be kept in certain time, but if mobile phone connects computer, or
Can directly access handset content, it is seen that reliability is the highest.
In sum, existing antitheft mobile phone measure and method impact have carries inconvenience, and complex operation affects user
Normally use mobile phone, the shortcomings such as safety and reliability is the highest, especially can not improve and effectively ensure user information safety.
Summary of the invention
In order to overcome the deficiencies in the prior art, this utility model provides a kind of cellphone information protection lock.Need not carry and remove
Other auxiliary equipment beyond part that mobile phone is indispensable, easy to use, will not cause the user trouble;Protection process is the completeest
Become, it is not necessary to user operation, optimize the mobile phone experience of user.User profile is stored in coded lock as secret key,
Mating with information in mobile phone, effectively prevent information in mobile phone to be stolen, safety is high, practical.User can basis
Changing secret key checking information after the service condition checking identity of oneself, motility is high, easy and simple to handle.And volume is little, cost pole
Low, there is good application prospect.
This utility model solves its technical problem and be the technical scheme is that
Described cellphone information protection lock, its structure includes protection lock (1), joint (2), mobile phone (3), protection lock (1) bag
Include memorizer (101) and auxiliary circuit (102), be connected with mobile phone (3) through joint (2);
Memorizer (101) is used for preserving secret key, mates with the secret key in mobile phone (3), and auxiliary circuit (102) is to ensure that protection
The necessary circuitry that lock (1) works;
Mobile phone (3) is designed as having unblock, locks and locked three kinds of duties;
1) any operation of routine can be carried out during released state;
2) monitor in real time during locking state and relate to bank, network payment, short message verification code class key message, and forbid phase
Closing operation, other operations are normal;
3) can only incoming call answering and dial default assigned number during locking state;
When mobile phone (3) is in released state, automatically or during user's manual-lock screen, mobile phone (3) enters locking state;
When protection lock (1) is connected with mobile phone (3), mobile phone (3) reads the secret key preserved in memorizer (101) automatically, and checking secret key is
No coupling, if it does, then mobile phone (3) enters released state, reads and does not mates less than secret key or secret key, then mobile phone (3) enters
Locking state;When mobile phone (3) is in locking state, uses protection lock (1) of coupling to connect mobile phone (3) and get final product automatic unlocking.
When mobile phone (3) normally uses, checking is at running background automatically, thus abnormal to user use causes puzzlement.
Being in locking state when the mobile phone overwhelming majority, monitoring i.e. in real time relates to bank, network payment, short message verification code class key letter
Breath, and forbid associative operation, then the most of operation of user is impregnable;And once unlock, as long as not closing
Screen, will be always maintained at released state, during that is to say user operation Net silver, as long as not closing screen, nor affects on
Operation.After mobile phone is lost or be stolen, middle have screen closing process, i.e. mobile phone certainly in his staff, is certainly in locking
State, relates to sensitive operation, it is desirable to connect protection lock, and the protection of coupling usually can not be had in his staff to lock, hands
Machine will enter locking state.During locking state, it is possible to receive calls, dial preset number, it is to set up owner and taking
Mobile phone other people between communication channels, it is simple to getting back mobile phone.
In order to simplify protection lock construction, described protection lock (1) and joint (2) are designed as with the data wire (4) of mobile phone (3)
Integrally, and not the normal function of data wire (4) is affected;
When general mobile phone is lost or be stolen, seldom having and occur with data wire (4) together with, therefore, data wire (4) is the most suitable
In key, big probability is saved in the hands of original user oneself;The use as long as protection lock (1) and mobile phone (3) are not together, with regard to energy
Ensure mobile phone information safety, it is achieved thereby that prevent, when mobile phone (3) connects computer, the function that in mobile phone (3), information is stolen.
When mobile phone (3) utilizes data wire (4) charging or is connected with other electronic equipments (5), mobile phone (3) carries out close automatically
Spoon checking, just can be charged or connect other electronic equipments (5) during checking coupling, read and do not mate less than secret key or secret key,
Then mobile phone (3) enters locking state.
Owing to the data wire (4) of protection lock (1) and joint (2) and mobile phone (3) is designed as integrally, accessory that need not be extra,
Need not be additionally provided power supply to protection lock (2), be user-friendly to;Data wire (4) is that user is charged or connects computer
Deng equipment time required, thus automatic proof procedure is fused in routine use, does not cause the extra puzzlement of user.Formed only
After one corresponding relation, only this data wire (4) could mate use with this mobile phone, therefore, after mobile phone (3) is stolen, with other
Data wire (4) just cannot use this mobile phone (3).
Described when mobile phone (3) uses for the first time, the biological characteristic of initial user need to be enrolled, and accordingly generate the closeest
Spoon, is stored into biological characteristic and key information in the memorizer (102) of protection lock (1), completes to add the initialization of confidential information, real
Now this protection lock (1) and the unique corresponding relation of this mobile phone (3).
Biological characteristic is utilized to initialize, it is ensured that mobile phone and the unique corresponding relation of user;If needing to revise this mobile phone
User, then, after needing the biological characteristic validation of initial user to pass through, just can be carried out.If it is to say, mobile phone is lost or stolen,
Initial user biological characteristic cannot be obtained, the most just cannot obtain information in mobile phone, reach to protect the purpose of information.
When protection lock (1) changed by described mobile phone (3), need to verify that the biological characteristic of initial user, checking coupling then generate
New secret key, writes the secret key in new protection lock (1), and more new cell-phone (3).
Former protection lock (1) is damaged or user thinks that (1) is locked in the protection more renewed, it is necessary to by the biological characteristic of initial user
After being verified, just can carry out.Newly protecting lock (1) can be copy mode, and the most original protection lock (1) also can be used, now
Form the relation of the corresponding mobile phone (3) of a plurality of data lines (4);Can also be establishment mode, the most original protection lock (1) be made
Useless, the most newly-generated protection lock (1) can be mutually matched, to keep the unique corresponding relation of protection lock (1) and mobile phone (3).
General recommendations uses establishment mode, prevents former protection lock (1) to be used by people after losing.
When user changed by described mobile phone (3), need to verify that protection is then locked by the biological characteristic of initial user, checking coupling
And mobile phone (3) all returns to factory state (1);Meanwhile, mobile phone (3) is automatically deleted all non-information of dispatching from the factory of crush storage.
This is to ensure that when mobile phone (3) transfers other people, does not reveal individual privacy, can sets itself with stylish user
Oneself add confidential information, improving while safety, do not affecting user and normally transfer the possession of dealing, allow user use and have no
Trouble and worry, is not concerned about unbinding and rebuild the loaded down with trivial details of user.And, delete and pulverize user profile, be use special as covered
The method of rear deletion, compared with manual deletion, speed is exceedingly fast, delete after irrecoverable, thus the effective guarantee information of user
Safety.
When SIM changed by described mobile phone (3), need to connect protection lock (1) and verify, checking coupling then updates protection lock
(1) the binding SIM card information and stored in mobile phone (3).After mobile phone is lost or be stolen, other people shut down the most at once, even pull out
Except SIM.Even if mobile phone replacing SIM also cannot use after departing from protection lock, i.e. mobile phone does not has any use in his staff
Place, this also contributes to promote other people that mobile phone is returned owner, also can effectively prevent other people from utilizing this by the way of changing SIM
Portion's mobile phone.Further, it is also possible to after mobile phone (3) finds that SIM is changed, be sent to this SIM card information in mobile phone preset finger
Fixed phone number or E-mail address, or cloud server, notice initial user has abnormal conditions to occur.
Described mobile phone (3) be spaced a certain setting time do not connect protection lock (1), then automatically into locking state;Institute
State the setting time at interval, set by after initialising subscriber checking secret key coupling.
If user does not use this mobile phone (3), after spending certain time, mobile phone (3) will be automatically locked;Even if by this hands
Machine (3) is sold as refuse, is also not result in that individual privacy is revealed, thus ensures information security.The battery of mobile phone (3) all has
The use time, as long as so being set greater than the max-endurance of battery, during charging the most just by this locked interval time
Unlock, without the use of user being made troubles and perplexing.The method can ensure the information security of user to the full extent,
Prevent because user neglects the information leakage caused.
After described mobile phone (3) receives the encrypted instruction that initial user is sent by other mobile phones, or mobile phone (3) checking
Protection lock (1) is when makeing mistakes, and automatically starts photographic head on backstage and takes pictures, automatically starts GPS location, is certainly dynamically connected network, and by position
Confidence breath and photo are sent to preset the phone number specified or E-mail address, or cloud server;Meanwhile, remote manual control
Make or automatically carry out the transmission backup of personal information in mobile phone, and delete destruction.
Mobile phone is lost or stolen, after owner finds, is sent the instruction of encryption to the mobile phone of oneself by other mobile phones, permissible
The information that active obtaining is emergent, and actively backup, destruction privacy data;The purpose of instruction encryption is to prevent mobile phone from not losing
Lose and utilized this function by other people.
Above-mentioned have multiple situation to cause protection lock validation failure, according to design of the present utility model, as long as mobile phone is initially
In user's hands, checking coupling can be ensured;It is to say, the validation failure overwhelming majority may lose exactly with stolen, therefore
Emergency measure to be started.
Which the transmission backup user of personal information can be preset with, it is contemplated that the situation is critical, and usually capacity is relatively
Little, important address list etc..
Compared with prior art, this utility model has the advantage that
1) protection lock construction is simple, and cost is extremely low, easily produces in batches;By being integrated into data wire, it is not necessary to use
Other auxiliary equipments are carried at family, are automatically incorporated by proof procedure in the routine operation of cellphone subscriber, will not make when user uses
Become inconvenience.
2) mobile phone lose or stolen after, other people make a profit mode be two aspects, one be mobile phone itself can change hands sell or
Recycling, two is the information such as the privacy information of initial user, personal information and the bank on acquisition mobile phone;Therefore, this practicality is new
Type makes both of which not exist so that theft mobile phone loses meaning, and the mobile phone simultaneously lost does not has any use for other people
Place, also improves the probability returning former owner.
3) use biological characteristic as checking information, it is ensured that the uniqueness of key information, can effectively solve mobile phone stolen,
The problems such as leakage of personal information.
Accompanying drawing explanation
Fig. 1: protection lock construction figure.
Fig. 2: with the protection lock construction figure of data wire one.
Fig. 3: secret key checking initial work flow chart.
Fig. 4: change secret key workflow diagram.
Fig. 5: change user workflow diagrams.
Fig. 6: time-out, change SIM, based data output workflow diagram.
Fig. 7: mobile phone receives encrypted instruction workflow diagram.
In figure: 1-protects lock, 2-joint, 3-mobile phone, 4-data wire, 101-memorizer, 102-auxiliary circuit.
Detailed description of the invention
Below in conjunction with the accompanying drawings this utility model is described in further detail:
As it is shown in figure 1, mobile phone of the present utility model protection lock construction includes protection lock (1), joint (2), mobile phone (3).Protect
Protecting lock (1) and include memorizer (101) and auxiliary circuit (102), be connected with mobile phone (3) through joint (2), auxiliary circuit (102) is
Ensureing other necessary circuitry that protection lock (1) works, memorizer (101) is used for preserving secret key.
In order to make this utility model the most succinctly facilitate, as in figure 2 it is shown, (1) and joint (2) and mobile phone (3) are locked in protection
Data wire (4) is designed as one, and mobile phone (3) is connected with charger or apparatus such as computer by data wire (4), then at charging or hands
When machine connects computer, the most just complete proof procedure.As long as data wire coded lock is correct, feel completely from user perspective
Feel less than the existence protecting lock.
In order to further illustrate this utility model work protection situation in all cases, below using fingerprint as biology
The example of feature, illustrates the workflow of protection lock.
During as it is shown on figure 3, user uses mobile phone (3) for the first time, need mobile phone (3) and protection lock (1) are initially set
Putting, i.e. typing user biological feature, user profile leaves in mobile phone (3) and protection lock (1) bin (101) simultaneously.
As shown in Figure 4, when user needs amendment protection to lock the information in (1), it is necessary first to verify life on mobile phone (3)
Thing feature, is proved to be successful the biological information that rear typing is new, generates new checking secret key, is saved in protection lock (1) and mobile phone
(3) in.
As it is shown in figure 5, user is when reselling mobile phone (3), to first verify that user identity, checking correctly can remove secret key
And biological information, then delete userspersonal information, when other people are continuing with this mobile phone (3), as long as re-typing biology
Characteristic information just can use as before.When again starting shooting after mobile phone (3) shutdown every time, biological characteristic will be verified, test
Card by being just continuing with, authentication failed, and the function shown in Fig. 4 cooperates and prevent other people from changing battery to keep mobile phone
(3) continuation of the journey.
As shown in Figure 6 and Figure 7, do not verify secret key for a long time when mobile phone (3), change SIM individual relevant with outwards transmission
During the data of information, information protection management Automatic Program requests verification, now accesses protection lock (1) or checking user biological feature
And can normally use mobile phone (3) after correct.
When mobile phone (3) receives the instruction that initial user sends encryption by other mobile phones, locked mobile phone (3), take pictures, determine
Position the network that is certainly dynamically connected, be sent to preset the phone number specified or E-mail address, or high in the clouds by positional information and photo
Server;Meanwhile, remote manual controls or automatically carries out the transmission backup of personal information in mobile phone, and deletes destruction.Guarantee
Other people can not steal the information in mobile phone (3) by data wire by the way of being wirelessly transferred, it is ensured that the information security of user.
The foregoing is only preferable embodiment of the present utility model, not in order to limit this utility model, all in this reality
Within novel spirit and principle, any modification, equivalent substitution and improvement etc. made, should be included in of the present utility model
Within protection domain.
Claims (8)
1. a cellphone information protection lock, it is characterised in that: include protection lock (1), joint (2), mobile phone (3), protection lock (1) bag
Include memorizer (101) and auxiliary circuit (102), be connected with mobile phone (3) through joint (2);
Memorizer (101) is used for preserving secret key, mates with the secret key preserved in mobile phone (3), and auxiliary circuit (102) is to ensure that protection
The necessary circuitry that lock (1) works;
Mobile phone (3) has unblock, locks and locked three kinds of duties;
1) any operation of routine can be carried out during released state;
2) monitor in real time during locking state and relate to bank, network payment, short message verification code class key message, and forbid relevant behaviour
Making, other operations are normal;
3) can only incoming call answering and dial default assigned number during locking state;
When mobile phone (3) is in released state, automatically or during user's manual-lock screen, mobile phone (3) enters locking state;Work as guarantor
Protecting lock (1) when being connected with mobile phone (3), mobile phone (3) reads the secret key preserved in memorizer (101) automatically, and whether checking secret key is
Join, if it does, then mobile phone (3) enters released state, read and do not mate less than secret key or secret key, then mobile phone (3) enters locked
State;When mobile phone (3) is in locking state, uses protection lock (1) of coupling to connect mobile phone (3) and get final product automatic unlocking.
A kind of cellphone information protection lock the most according to claim 1, it is characterised in that: protection lock (1) and joint (2) and hands
The data wire (4) of machine (3) is designed as one, and does not affect the normal function of data wire (4);
When mobile phone (3) utilizes data wire (4) charging or is connected with other electronic equipments (5), mobile phone (3) automatically carries out secret key and tests
Card, just can be charged or connect other electronic equipments (5) during checking coupling, read and do not mate less than secret key or secret key, then hands
Machine (3) enters locking state.
A kind of cellphone information protection lock the most according to claim 1, it is characterised in that: when mobile phone (3) uses for the first time, need
The biological characteristic of admission initial user, and accordingly generate unique secret key, biological characteristic and key information are stored into protection lock
(1) in memorizer (102), complete to add the initialization of confidential information, it is achieved this protection lock (1) is unique corresponding with this mobile phone (3)
Relation.
A kind of cellphone information protection lock the most according to claim 1, it is characterised in that: protection lock (1) changed by mobile phone (3)
Time, need to verify that the biological characteristic of initial user, checking coupling then generate new secret key, write new protection lock (1), and more new hand
Secret key in machine (3).
A kind of cellphone information protection lock the most according to claim 1, it is characterised in that: when user changed by mobile phone (3), need to test
The biological characteristic of card initial user, protection lock (1) and mobile phone (3) are then all returned to factory state by checking coupling;Meanwhile, mobile phone
(3) all non-information of dispatching from the factory of crush storage it is automatically deleted.
A kind of cellphone information protection lock the most according to claim 1, it is characterised in that: when SIM changed by mobile phone (3), need
Connecting protection lock (1) to verify, checking coupling then updates the binding SIM card information of storage in protection lock (1) and mobile phone (3).
A kind of cellphone information protection lock the most according to claim 1, it is characterised in that: mobile phone (3) is spaced a certain when setting
Between do not connect protection lock (1), then automatically into locking state;The setting time at described interval, initialising subscriber verify close
Set after spoon coupling.
A kind of cellphone information protection lock the most according to claim 1, it is characterised in that: initial user is sent out by other mobile phones
Send the instruction of encryption, after mobile phone (3) receives, or when mobile phone (3) checking protection lock (1) is made mistakes, automatically start shooting on backstage
Head is taken pictures, startup GPS positions automatically, be dynamically connected network certainly, and is sent to positional information and photo preset the cell-phone number specified
Code or E-mail address, or cloud server;Meanwhile, remote manual controls or automatically to carry out the transmission of personal information in mobile phone standby
Part, and delete destruction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620807909.2U CN205829777U (en) | 2016-07-29 | 2016-07-29 | A kind of cellphone information protection lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620807909.2U CN205829777U (en) | 2016-07-29 | 2016-07-29 | A kind of cellphone information protection lock |
Publications (1)
Publication Number | Publication Date |
---|---|
CN205829777U true CN205829777U (en) | 2016-12-21 |
Family
ID=57559826
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201620807909.2U Expired - Fee Related CN205829777U (en) | 2016-07-29 | 2016-07-29 | A kind of cellphone information protection lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN205829777U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109492439A (en) * | 2018-09-29 | 2019-03-19 | 南昌与德通讯技术有限公司 | Information protecting method, terminal device and computer readable storage medium |
-
2016
- 2016-07-29 CN CN201620807909.2U patent/CN205829777U/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109492439A (en) * | 2018-09-29 | 2019-03-19 | 南昌与德通讯技术有限公司 | Information protecting method, terminal device and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7184750B2 (en) | Smart terminal remote lock and format | |
CN101252703B (en) | Terminal data protecting method, system as well as mobile communication terminal | |
CN101026834A (en) | Locking method and unlocking method | |
CN102404328B (en) | Electronic identity card verification system | |
CN102693381B (en) | Method, device and system for anti-theft of portable computer equipment | |
CN102694920B (en) | Mobile phone antitheft method | |
CN106231092A (en) | A kind of phone information security protection method | |
CN106101438A (en) | A kind of cellphone information protection lock | |
JP4695040B2 (en) | Remote lock system and communication terminal | |
CN105530356A (en) | Mobile communication terminal and data protection method and apparatus thereof | |
US20130029640A1 (en) | Fingerprint sensor and charging system | |
CN104574616B (en) | Intelligent electronic door lock control method and control device | |
CN102883026A (en) | Method for implementing start-up protection on mobile terminal | |
CN104700050A (en) | Mobile terminal safety positioning method and device | |
EP2840818B1 (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
CN108010166A (en) | Electronic door lock system | |
CN106126994A (en) | The user management method of a kind of mobile terminal and system | |
JP2006279321A (en) | Security software for mobile terminal and security communication system | |
CN100413368C (en) | A method for verifying user card validity | |
CN101895829A (en) | Method and system for retrieving FLASH data from mobile telephone, and mobile telephone | |
BRPI1105431A2 (en) | Method and system for controlling the execution of a function protected by authentication, memory module, and electronic entity | |
CN205829777U (en) | A kind of cellphone information protection lock | |
CN104408360A (en) | Encryption equipment and method based on mobile terminal | |
CN106453057B (en) | A kind of method and terminal for preventing short message to be stolen | |
JP4372034B2 (en) | Mobile phone terminal system, mobile phone terminal unauthorized use prevention method, and mobile phone terminal unauthorized use prevention program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20161221 Termination date: 20170729 |