CN100345083C - Method for protecting content of digital works for hand-held devices - Google Patents

Method for protecting content of digital works for hand-held devices Download PDF

Info

Publication number
CN100345083C
CN100345083C CNB2005100841224A CN200510084122A CN100345083C CN 100345083 C CN100345083 C CN 100345083C CN B2005100841224 A CNB2005100841224 A CN B2005100841224A CN 200510084122 A CN200510084122 A CN 200510084122A CN 100345083 C CN100345083 C CN 100345083C
Authority
CN
China
Prior art keywords
time
period
temporal information
time period
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2005100841224A
Other languages
Chinese (zh)
Other versions
CN1702596A (en
Inventor
王长桥
汤帜
贾爱霞
王叶红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Leade Technology Development Co., Ltd.
Peking University
Peking University Founder Group Co Ltd
Original Assignee
Peking University
Beijing Founder Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University, Beijing Founder Electronics Co Ltd filed Critical Peking University
Priority to CNB2005100841224A priority Critical patent/CN100345083C/en
Publication of CN1702596A publication Critical patent/CN1702596A/en
Application granted granted Critical
Publication of CN100345083C publication Critical patent/CN100345083C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to a method for protecting the contents of digital works on hand-held devices, which belongs to the technical field of protecting the contents of the digital works. In the prior art, the problem that users can make digital works not in authorized time segment still effective by using a certain method exists. The present invention firstly judges whether an effective time information file exists on a hand-held device or not; if the effective time information file exists or the time information file exists but is ineffective, then the time information file is formed in a permanent storage region and a special device number of the time segment and the time information structure are written in. then, two monitoring modules are started in a background to respectively monitor modification and arousal events of system time; when the events occur, the cumulative time information structure is updated in definite time. Finally, when in use, if the time information file is ineffective or the reference time is not in the time segment, then the time information file is not used, else the time information file is deciphered by the special device number of the time segment. The method of the present invention effectively solves the technical problem of protecting the copyright of digital works with authorized time segment on the hand-held device.

Description

A kind of guard method of content of digital works for hand-held devices
Technical field
The invention belongs to digital copyright technological means protection field, be specifically related to a kind of guard method of content of digital works for hand-held devices.
Background technology
Along with the continuous development of infotech, occurred variously based on as handheld devices such as electronic dictionary, PDA, smart mobile phones on the market, these equipment bring great convenience for people's life, working and learning.Simultaneously, a large amount of copyrights also gos deep into enriching people's culture life, and can reading or appreciate on various handheld devices in the people's work study day by day.Thing followed problem is; the copyright owner of copyright, publishing house; it is also more and more important how the library effectively protects digital copyright; so how on these handheld devices, realize copyright in the copyright protection of authorizing the time period, how judging correctly promptly whether it surpassed the operating period of relevant copyright owner's permission and can not remain valid is a crucial technical barrier that faces at present.
On handheld device, carry out the copyright of free section and crossed the operating period realization, generally adopt following several technical scheme:
(1) first kind of scheme adopts system time to add that certain algorithm realizes.Because the system time on the handheld device can be revised, under the situation of hard reset and power down, system time also can return to the time of making the product.Therefore judge that by the device systems time it's the operating period whether has past copyright is irrational.
(2) second kinds of schemes write the temporal information of passage wherein by the modification certificate file and realize the operating period.The drawback of this scheme if the user covers amended certificate file again with initial certificate file, can remain valid again just can cause having passed through the copyright of operating period originally.
Therefore, for the copyright that has passed through the operating period, the user makes that by the employing said method having passed through the copyright of operating period still can remain valid at an easy rate.Should cross the copyright of operating period and but can not really spend the operating period, obviously not meet original intention the digital copyright protection of free section restriction.And in the prior art, also do not have technological means very effectively to protect the digital copyright protection problem of free section restriction.
Summary of the invention
At the defective that exists in the prior art; purpose of the present invention provides a kind of guard method of content of digital works for hand-held devices; this method can judge effectively that having on the handheld device authorize the problem of whether having spent the operating period of the copyright of time period restriction, thereby reaches the purpose to the technical protection of the digital copyright of free section restriction.
For reaching above purpose, the technical solution used in the present invention is: the technical protection method of the digital copyright of free section restriction on a kind of handheld device may further comprise the steps:
(1) initialization module judges whether there is effective temporal information file on the handheld device, though if there is no or exist but invalid, then in this equipment permanent storage area, generate a temporal information file, and time period specialized equipment number and temporal information structure are write in this document;
(2) backstage starts the monitoring module that two responsible times add up, and supervisory system time modification and equipment wake events respectively are when incident takes place or periodically with in the temporal information structure write time message file that adds up;
(3) when the user uses the copyright with time period restriction, whether time period specialized equipment security module at first judgement time message file is effective, then regenerate it as if invalid, can not use this copyright, if effectively, expired judge module is then read the temporal information structure in the file, calculate the reference time, if the reference time is in the time period, then with number deciphering of time period specialized equipment, deciphering back user can normally use copyright, otherwise judges that it's the operating period past this copyright, can not use.
Further, time period specialized equipment in the step (1) number and non-time period device number separate management, described non-time period device number are equipment real equipment number, and time period specialized equipment number carries out cryptographic digest by equipment real equipment number and random value and generates.
In the step (2), time period specialized equipment number and the time of adding up are bound, if the time of adding up, then can regenerate time period specialized equipment number by accidental modification, and each time period specialized equipment that generates number all is different.
The temporal information structure that adds up described in the step (2) comprises the time that current system time and system are moved.
In the step (2), each update time is message structure the time, all need will current system time and each random value cryptographic digest after be saved in the temporal information file header structure, and the last modification time of file is set to current system time.
Whether effective method may further comprise the steps the judgement time message file in the step (3):
1) at first, after carrying out cryptographic digest according to equipment real equipment number, add up time and random value, number compare with the time period specialized equipment that is kept at the temporal information file, if equate that then time period specialized equipment security module judgement time section specialized equipment is number true, otherwise invalid;
2) then last modification time of the file of preserving in the temporal information file and the last modification time of file that obtains are compared, if equate then effective, otherwise invalid.
It is as follows to judge in the step (3) whether free section copyright that limits has crossed the method for operating period:
1) at first whether proving time message file and time period specialized equipment be number effective, if invalid temporal information file and the time period specialized equipment number of then regenerating, and it's the operating period have been past prompting number works;
2) then, judge that system time whether in the valid period, if not before the deadline, then spent the operating period to the user prompt copyright;
3) judge whether to exist two background monitoring modules of needs, do not spent the operating period, otherwise the temporal information structure in the readout time message file calculates the reference time if do not exist then;
4) judge whether system time is correct, if incorrect then point out the user to make amendment and spent the operating period;
5) according to effectively the start time judges whether the reference time is correct, if it is incorrect, temporal information structure in the update time message file also recomputates the reference time, carry out the judgement it's the operating period whether has past copyright according to the reference time, if do not have the operating period, number be decrypted copyright with the time period specialized equipment again, normally use for the user.
Calculate reference time T in the step 5) RAlgorithm as follows, at first readout time message structure, i.e. system time T 1How long moved T with system 2, obtain current system then and how long moved T 3, calculate reference time T at last R=T 1+ (T 3-T 2).
Judge in the step 5) reference time, whether correct method was as follows, if effective start time T of time period BGreater than T R, then update time, message structure was T BAdd T 2
Effect of the present invention is: adopt method of the present invention; for the copyright that has passed through the operating period on the handheld device; the user can't normally use by existing method again, thereby has solved the technical protection problem of the digital copyright of free section restriction of the prior art.
Description of drawings
Fig. 1 is a principle schematic of the present invention;
Fig. 2 is overall flow figure of the present invention;
Fig. 3 is the add up monitoring module process flow diagram of time of backstage of the present invention;
Fig. 4 is the process flow diagram of the expired module of judgement of the present invention;
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments.
As shown in Figure 1 and Figure 2, the technical protection method of the digital copyright of free section restriction on a kind of handheld device may further comprise the steps:
(1) at first initialization module judges whether there is effective temporal information file on the handheld device, and if there is no temporal information file, or existence but invalid then generates it in the equipment permanent storage area, still exist after restarting firmly with assurance equipment.And time period specialized equipment number and temporal information structure write in this document.
In the present embodiment with time period specialized equipment number and non-time period device number separate management, in fact non-time period device number is exactly equipment real equipment number, and the time period specialized equipment number is to carry out the cryptographic digest generation by equipment real equipment number and random value with specific algorithm.
Because the seed algorithm that random value of the present invention generates guarantees that seed is all inequality at every turn, so each random value that generates can be thought inequality.Guaranteeing that each time period specialized equipment that generates number all is different, thereby guarantee the security of time period specialized equipment number.
(2) then, as shown in Figure 3, the backstage starts the monitoring module that two responsible times add up, supervisory system time modification and equipment wake events respectively, when incident takes place or timing with in the temporal information structure write time message file that adds up.
The temporal information structure that adds up comprises current system time (Green) and calculates from current system time, and how long system has moved (is unit with the millisecond).
Concrete condition when the following describes generation systems time modification incident, equipment wake events and the time interval:
1) when system time modification incident takes place, obtains current system and how long moved T 3, calculate reference time T R, with T RAnd T 3Be saved in the temporal information structure.
2) when the device power-up incident takes place, calculate reference time T R, and obtain system time T 1How long moved T with system 2If, T R<T 1, then use T 1And T 2Update time, message structure otherwise was used T RAnd T 2Update time message structure.
3) each update time message structure the time, all need will current system time and each random value cryptographic digest after be saved in the temporal information file header structure, and the last modification time of file is set to current system time.
(3) last, as shown in Figure 4, when the user used the copyright with time period restriction, whether time period specialized equipment security module at first judgement time message file was effective, then regenerated it as if invalid, can not use copyright.If effectively, judge that then expired module reads the temporal information structure in the file, calculate the reference time.If the reference time is in the time period then with time period specialized equipment number deciphering, otherwise judge expired.Specify below:
At first, carry out cryptographic digest according to equipment real equipment number, add up time and random value after, number compare with the time period specialized equipment that is kept at the temporal information file, thereby whether judgement time section specialized equipment number true.If true, more last modification time of the file of preserving in the temporal information file and the last modification time of file that obtains are compared, thereby whether the judgement time message file is effective.If untrue or invalid temporal information file and the time period specialized equipment number of then regenerating, and judge that copyright has passed through the operating period.
Then, judge that system time is whether during the effective time section in, then expired if do not exist, give user prompt simultaneously, so that remind the user that incorrect system time is modified as correct (if incorrect words).
Secondly, judge whether to exist two background monitoring modules of needs, if do not exist then expired.Otherwise the temporal information structure in the readout time message file calculates the reference time.
Then, judge system time (promptly being not less than the reference time) whether correctly, incorrect prompting user makes amendment and is expired.
At last, judge according to effective start time of time period whether the reference time is correct.If incorrect, the temporal information structure in the update time message file also recomputates the reference time.Carry out expired judgement of time according to the reference time.If not expired, number be decrypted the significant figure works with the time period specialized equipment again.
In the present embodiment, calculate reference time T RMethod as follows: readout time message structure (system time T 1How long moved T with system 2), and obtain current system and how long moved T 3, T R=T 1+ (T 3-T 2).
In the present embodiment, judge the reference time, whether correct method was as follows: the start time T in the note time period BGreater than reference time T R, then update time, message structure was (T BHow long+current system has transported T 2).
Below several special circumstances in the invention process process are done to describe further:
First kind of situation, during initialization, if there is no the temporal information file at first generates.Otherwise whether the judgement time message file is effective, if the new temporal information file of invalid generation.Start two background monitoring modules simultaneously.
Second kind of situation: equipment enters the situation of dormancy.
The timer that system provides added up automatically to the time of passage.Carry out dormant state at equipment, the equipment time totalizer stops to add up, but system time still can normally move.
When the background monitoring module monitors to system from the dormancy awakening incident, at first calculate the reference time, then with current system time relatively, if the reference time less than system time, then how long moved message structure update time with current system time and current system time.Thereby guarantee that the time that the reason owing to dormancy does not add up is added up by this method.
The third situation: the situation that system time is revised, the background monitoring module monitors is initiatively used reference time and current system to move and how long is gone message structure update time to this incident.
The 4th kind of situation: under the power down and the situation of restarting firmly, system time returns to the time of making the product.Because the temporal information file is kept at permanent storage area, so can not lose.Read the temporal information structure of preservation from the temporal information file, it doesn't matter for the reference time that calculates and the system time of replacement, thereby guarantee that the time of adding up is increasing always.
If after the device looses power, just use the copyright that is subjected to time period protection after the operating period up to having crossed, because the temporal information structure can not get upgrading power down the time, cause these lot number word works still can be effective.But this situation can be used by new copyright from a collection of free section restriction of downloaded at once, be improved, because the effective start time with reference time and time period in the algorithm compares (from downloaded, substantially can praise), if the reference time less than effective start time, is then used effective start time and current system and has moved how long come message file update time.Then first copyright of having spent the operating period has just been spent the operating period at once.
The 5th kind of situation:, then need to regenerate the time period specialized equipment and number write in the file if the temporal information file has been deleted by the user.And time period specialized equipment number is by equipment real equipment number and random value, carries out with specific algorithm that cryptographic digest generates.Because the seed algorithm that random value generates guarantees that seed is all inequality at every turn, so each random value that generates can be thought inequality.To guarantee that each time period specialized equipment that generates number all is different.Because the time period specialized equipment of twice generation is number inequality, then just spent the operating period with the copyright of free section restriction of previous time period specialized equipment number.
The 6th kind of situation: if the user copies the copy of temporal information file to other places, cover the temporal information file of permanent storage area after having spent the operating period again with copy, quite user's modification add up the time.In this case, the authenticity judge module of time period specialized equipment number, the true ID of equipment carried out cryptographic digest with add up time and random value after since the time of adding up be modified, then the time period specialized equipment is number also inequality, thereby it is number invalid to judge the time period specialized equipment.Need regenerate in the specialized equipment write time time period message file, then the copyright of the time period of number borrowing with previous time period specialized equipment just can not use.
Method of the present invention is not limited to the embodiment described in the embodiment, and those skilled in the art's technical scheme according to the present invention draws other embodiment, belongs to technological innovation scope of the present invention equally.

Claims (8)

1. the guard method of a content of digital works for hand-held devices may further comprise the steps:
(1) initialization module judges whether there is effective temporal information file on the handheld device, though if there is no or exist but invalid, then in this equipment permanent storage area, generate a temporal information file, and time period specialized equipment number and temporal information structure are write in this document;
(2) backstage starts the monitoring module that two responsible times add up, and supervisory system time modification and equipment wake events respectively are when incident takes place or periodically with in the temporal information structure write time message file that adds up;
(3) when the user uses the copyright with time period restriction, whether time period specialized equipment security module at first judgement time message file is effective, if invalid this copyright that then makes can not be used by the user, and regenerate it, if effectively, then expired judge module is read the temporal information structure in the file, calculate the reference time, if the reference time is in the time period, then with number deciphering of time period specialized equipment, deciphering back user can normally use copyright, otherwise judges that it's the operating period past this copyright, can not use;
Wherein, it is as follows to judge in the step (3) whether free section copyright that limits has crossed the method for operating period:
Whether step 1) at first proving time message file and time period specialized equipment is number effective, if invalid temporal information file and the time period specialized equipment number of then regenerating, and it's the operating period have been past prompting number works;
Step 2) judges that system time whether in the valid period, if not before the deadline, spent the operating period then for the user prompt copyright;
Step 3) judges whether to exist two background monitoring modules of needs, if do not exist then and do not spent the operating period, otherwise the temporal information structure in the readout time message file calculates the reference time;
Step 4) judges whether system time is correct, if incorrect then point out the user to make amendment and spent the operating period;
Step 5) is according to effectively the start time judges whether the reference time is correct, if it is incorrect, temporal information structure in the update time message file also recomputates the reference time, carry out the judgement it's the operating period whether has past copyright according to the reference time, if do not have the operating period, number be decrypted copyright with the time period specialized equipment again, normally use for the user;
Above-mentioned steps 5) calculates reference time T in RAlgorithm as follows, at first readout time message structure, i.e. system time T 1How long moved T with system 2, obtain current system then and how long moved T 3, calculate reference time T at last R=T 1+ (T 3-T 2).
2. the guard method of a kind of content of digital works for hand-held devices as claimed in claim 1; it is characterized in that: time period specialized equipment in the step (1) number and non-time period device number separate management; described non-time period device number is an equipment real equipment number, and time period specialized equipment number carries out cryptographic digest by equipment real equipment number and random value and generates.
3. the guard method of a kind of content of digital works for hand-held devices as claimed in claim 1; it is characterized in that: in the step (2); time period specialized equipment number and the time of adding up are bound; if the time of adding up is by accidental modification; then can regenerate time period specialized equipment number, generate different time period specialized equipment number at every turn.
4. the guard method of a kind of content of digital works for hand-held devices as claimed in claim 3 is characterized in that: the temporal information structure that adds up described in the step (2) comprises the time that current system time and system are moved.
5. the guard method of a kind of content of digital works for hand-held devices as claimed in claim 1; it is characterized in that: in the step (2); each update time is message structure the time; all need and to be saved in the temporal information file header structure after current system time and each random value cryptographic digest, and the last modification time of file is set to current system time.
6. the guard method of a kind of content of digital works for hand-held devices as claimed in claim 1 is characterized in that whether effective method may further comprise the steps the middle judgement time message file of step (3):
1) at first, after carrying out cryptographic digest according to equipment real equipment number, add up time and random value, number compare with the time period specialized equipment that is kept at the temporal information file, if equate that then time period specialized equipment security module judgement time section specialized equipment is number true, otherwise be judged as invalid;
2) then last modification time of the file of preserving in the temporal information file and the last modification time of file that obtains are compared, if equate then effective, otherwise be judged as invalid.
7. the guard method of a kind of content of digital works for hand-held devices as claimed in claim 1 is characterized in that: judge in the step 5) reference time, whether correct method was as follows, if effective start time T of time period BGreater than T R, then update time, message structure was T BAdd T 2
8. a kind of guard method of content of digital works for hand-held devices according to claim 1, described handheld device comprises: PDA, mobile phone, E-book reader.
CNB2005100841224A 2005-07-08 2005-07-08 Method for protecting content of digital works for hand-held devices Expired - Fee Related CN100345083C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100841224A CN100345083C (en) 2005-07-08 2005-07-08 Method for protecting content of digital works for hand-held devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100841224A CN100345083C (en) 2005-07-08 2005-07-08 Method for protecting content of digital works for hand-held devices

Publications (2)

Publication Number Publication Date
CN1702596A CN1702596A (en) 2005-11-30
CN100345083C true CN100345083C (en) 2007-10-24

Family

ID=35632370

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100841224A Expired - Fee Related CN100345083C (en) 2005-07-08 2005-07-08 Method for protecting content of digital works for hand-held devices

Country Status (1)

Country Link
CN (1) CN100345083C (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103377567A (en) * 2012-04-23 2013-10-30 北大方正集团有限公司 Method and device for reading digital electronic book
EP2902940B1 (en) * 2013-09-05 2017-04-19 Huawei Technologies Co., Ltd. Storage system and method for processing data operation request
CN105426751A (en) * 2015-10-27 2016-03-23 珠海市君天电子科技有限公司 Method and device for preventing system time from being tampered
CN105808980B (en) * 2016-03-07 2019-06-11 深圳市新产业生物医学工程股份有限公司 The detection method and device of unauthorized use of software

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1414490A (en) * 2001-10-22 2003-04-30 日本胜利株式会社 Recording device, playback device and recording medium
JP2003208406A (en) * 2002-11-18 2003-07-25 Fuji Xerox Co Ltd Service providing system, authentication device, and computer-readable recording medium recording authentication program
CN1749907A (en) * 2004-09-15 2006-03-22 株式会社日立制作所 System and method for managing expiration date for use of contents in removable media

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1414490A (en) * 2001-10-22 2003-04-30 日本胜利株式会社 Recording device, playback device and recording medium
JP2003208406A (en) * 2002-11-18 2003-07-25 Fuji Xerox Co Ltd Service providing system, authentication device, and computer-readable recording medium recording authentication program
CN1749907A (en) * 2004-09-15 2006-03-22 株式会社日立制作所 System and method for managing expiration date for use of contents in removable media

Also Published As

Publication number Publication date
CN1702596A (en) 2005-11-30

Similar Documents

Publication Publication Date Title
CN1662869A (en) Sleep protection
Ren et al. Design space exploration and optimization of path oblivious ram in secure processors
CN1271898A (en) Computer system and method of protecting contents
CN100345083C (en) Method for protecting content of digital works for hand-held devices
CN1288527C (en) Computer security control module and safeguard control method thereof
CN100504899C (en) Software watchdog system and method
US20080235791A1 (en) System and Method for Distributed Module Authentication
CN106686014A (en) Prevention method and prevention device of cyber attacks
CN1602600A (en) Content processing apparatus and content protection program
CN1881924A (en) Group communication safety distribution media recording and retaking method and device
CN101996293A (en) Software authentication method based on softdog
CN108573176B (en) Method and system for safely deleting data of mobile terminal encrypted by key derivation
CN1968467A (en) Mobile terminal and terminal user information protection method
US20130247210A1 (en) Method and System for Protecting Software Authorization
CN101034421A (en) Control method for preventing indulging network game and device thereof
CN101038615A (en) Method for directly and arbitrary separating code to encryption lock from software to implement protection of software protection
CN101047701A (en) System and method for ensuring safety operation of applied program
CN1627275A (en) Method and system for storing divided files and restoring treatment
CN101320389B (en) File management method and apparatus
CN111859379B (en) Processing method and device for protecting data model
CN103020523B (en) For the data ferry-boat control device of high level of security computer
CN110532293B (en) Data stream life cycle management method and system based on block chain technology
CN1904862A (en) Code protection system and method of basic input/output system
US20030128843A1 (en) Method and apparatus for preserving a strong random number across battery replacement in a security subsystem
CN101036095A (en) Method for operating a data transmission network using licence data and associated device network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: BEIJING FANGZHENG APABI TECHNOLOGY CO., LTD.; PEK

Free format text: FORMER OWNER: BEIJING FOUNDER ELECTRONICS CO., LTD.; PEKING UNIVERSITY

Effective date: 20080425

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20080425

Address after: Twelve floor, central tower, No. 52, North Fourth Ring Road, Haidian District, Beijing, zip code: 100085

Co-patentee after: Peking University

Patentee after: Beijing Fangzheng apapi Technology Co., Ltd.

Address before: Beijing Haidian District Haidian District five street 9 founder building zip code: 100085

Co-patentee before: Peking University

Patentee before: Beijing Beida Founder Electronics Co., Ltd.

ASS Succession or assignment of patent right

Owner name: BEIJING UNIVERSITY FOUNDER GROUP CO.

Free format text: FORMER OWNER: BEIJING FANGZHENG APABI TECHNOLOGY CO., LTD.

Effective date: 20090918

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20090918

Address after: Building 298, Cheng Cheng Road, Beijing, Haidian District, China: 100871

Co-patentee after: Beijing Founder Feiyue Media Technology Co., Ltd.

Patentee after: Peking University Founder Group Corp

Co-patentee after: Peking University

Address before: Twelve floor, central tower, No. 52, North Fourth Ring Road, Haidian District, Beijing, zip code: 100085

Co-patentee before: Peking University

Patentee before: Beijing Fangzheng apapi Technology Co., Ltd.

ASS Succession or assignment of patent right

Owner name: LIDE TECHNOLOGY DEVELOPMENT CO., LTD. BEIJING UNIV

Free format text: FORMER OWNER: BEIJING FOUNDER FEIYUE MEDIA TECHNOLOGY CO., LTD. BEIJING UNIV.

Effective date: 20120120

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20120120

Address after: 100871 Beijing, Haidian District, into the mansion building, No. 298

Co-patentee after: Leade Technology Development Co., Ltd.

Patentee after: Peking Founder Group Co., Ltd.

Co-patentee after: Peking University

Address before: 100871 Beijing, Haidian District, into the mansion building, No. 298

Co-patentee before: Beijing Founder Feiyue Media Technology Co., Ltd.

Patentee before: Peking Founder Group Co., Ltd.

Co-patentee before: Peking University

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20071024

Termination date: 20170708

CF01 Termination of patent right due to non-payment of annual fee