CN100464549C - Method for realizing data safety storing business - Google Patents

Method for realizing data safety storing business Download PDF

Info

Publication number
CN100464549C
CN100464549C CNB2005101169821A CN200510116982A CN100464549C CN 100464549 C CN100464549 C CN 100464549C CN B2005101169821 A CNB2005101169821 A CN B2005101169821A CN 200510116982 A CN200510116982 A CN 200510116982A CN 100464549 C CN100464549 C CN 100464549C
Authority
CN
China
Prior art keywords
user
file
storage server
usb rod
network storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CNB2005101169821A
Other languages
Chinese (zh)
Other versions
CN1773994A (en
Inventor
沈军
陈珣
金华敏
庄一嵘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Research Institute China Telecom Co ltd
China Telecom Corp Ltd
Original Assignee
GUANGDONG TELECOMMUNICATION CO Ltd INST
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGDONG TELECOMMUNICATION CO Ltd INST filed Critical GUANGDONG TELECOMMUNICATION CO Ltd INST
Priority to CNB2005101169821A priority Critical patent/CN100464549C/en
Publication of CN1773994A publication Critical patent/CN1773994A/en
Application granted granted Critical
Publication of CN100464549C publication Critical patent/CN100464549C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A method for realizing service of data safe storage includes up-transmitting user data to network server after it is enciphered locally for not being stolen in courses of transmission and storage, deciphering file only by using user USB bar and by inputting USN bar protection password correctly, setting USB bar backup mechanism so USB bar can be restored by applying effective status certification when USB bar is lost or damaged.

Description

A kind of implementation method of data safety storing business
Technical field
The present invention relates to a kind of implementation method of data safety storing business, exactly, the data security that relates to a kind of file-level is stored in the implementation method of the new business of network system side, belongs to communication network value-added service technical field.
Background technology
Developing rapidly and popularizing along with what the Internet and diverse network were used, individual and enterprise are more and more the schedule of personal information, client list, commercial activity, and other relevant information all stores on the network.In this process, how guaranteeing to obtain safely, easily data just becomes the focus that the user pays close attention to; Many users wish in office, family even oneself the data of going out can both have access to safely during the journey.
At present, there have been many Internet Service Provider ISP that the network storage service of file-level is provided to the user, by on network storage server, distributing certain memory space for the user, under the situation that network can reach, the data of user's access whenever and wherever possible oneself efficiently solve the convenience problem of data access.Though during the sign-on access network storage server,, must use " user name+password " to carry out the authentication authentication as present most of application systems.But a little less than the fail safe of this mode was highly brittle: the user name and password was easy to be stolen; And the user uses this authentication mode just must be at any time or usually remember complicated the user name and password, very sense inconvenience.In addition, these data mostly adopt expressly form when transmission and storage, do not pass through encryption, very easily stolen and cause the leakage of important information by the disabled user, make the user can't store the critical data of commercial affairs such as the production schedule, financial statement, client list, human resources list, occurrences in human life relievedly thereon, make professional popularization be obstructed; Key is the safety issue of storage, needs to be resolved hurrily.
Now, many encryption and decryption software piece that are used for file are arranged on the market, can carry out encryption to the file and the file of this machine storage, even lose or the hacker invades under the situation of main frame at subscriber's main station (as notebook computer etc.), even Xu Ke personnel have stolen file without permission, also can't declassified document, to know user's important information.But, in case after main frame was lost or encryption key loses, damages, the user just can't fetch the file of oneself; The hacker also can adopt the method for deletion encrypt file to destroy user data.Therefore, use the method for local file encryption and decryption software piece still can't solve the safety issue of storage fully reliably merely.How to solve the file-level data and just become the new problem that those skilled in the art pay close attention in the safe storage of network side.
Summary of the invention
In view of this, the objective of the invention is the network storage and two kinds of technology of file encryption are combined, a kind of implementation method of data safety storing business is provided, and this method is to encrypt at the enterprising line data of subscriber's main station, uploads and be stored in network storage server then.Because data were encrypted before being transferred to network storage server, even the assailant intercepts data in transmission course, also can't be decrypted these data; Simultaneously, because storage is at network side, even subscriber's main station is lost, user storage can not lost in the data of network storage server yet.So the present invention can overcome the simple use network storage or the existing problem of this machine file encryption-decryption, realize the safe storage of data.
In order to achieve the above object, the invention provides a kind of implementation method of data safety storing business, it is characterized in that: comprise the following steps: at least
(1) request for utilization: the system management end requires application to open " network security storage " professional user effective identity certificate, contact telephone number and required storage size is provided, through confirmation true and accept applications after, management end carries out initialization process, and the user obtains one and stored the general-purpose serial bus USB rod of personal information and corresponding USB rod protection password;
(2) connect network storage server: after client detected USB rod insertion main frame, the prompting user imported USB rod protection password; After the user correctly imported USB rod protection password, client read IP address, user name and the password of this user on network storage server of the network storage server of storing in the USB rod, is connected to network storage server then and carries out authentication; After checking is passed through, the memory space of user on network storage server is mapped as a virtual partition of this machine by CIFS (CIFS, Common Internet File System) agreement;
(3) file encryption is uploaded: when the user write virtual partition to file, client received this request, earlier file was encrypted, and by the CIFS agreement file after encrypting was uploaded to network storage server again;
(4) down transmitting file deciphering: when the user reads file in the virtual partition, client is intercepted and captured this request, earlier file is passed to subscriber's main station under network storage server, then file is decrypted, and then the file after will deciphering is shown to the user by the CIFS agreement;
(5) disconnect and being connected of network storage server: client detects the USB rod extract main frame after, just being connected of disconnection and network storage server, former virtual partition disappears from subscriber's main station;
(6) charge: the system management end adopts monthly payment or alternate manner to charge according to the size of user applies memory space.
Described method further comprises following one or more step:
(7) recovery of USB rod: information dropout in the USB rod or damage, and the user is not when this machine backup USB rod information, the system management end requires the user that effective identity certificate is provided, after empirical tests is true, management end is searched User Information Database according to the user identity passport NO., to obtain corresponding USB rod backup file, submit to the user then; After the user took backup file, the identity document number of importing oneself can carry out the recovery of USB rod as password;
(8) backup of network storage server: the system management end regularly uses tape library backup system that the file in the network storage server is backed up.
In the described step (1), after management end was accepted user applies, the initialization process operating procedure of carrying out comprised:
(11) on network storage server, create a user name and corresponding password is set, distribute the memory space of corresponding size then according to customer requirements, and the access rights that this memory space is set are read and write for only allowing this user;
(12) a USB rod is formatd, and the protection password of USB rod is set;
(13) call the interface function of USB rod, in the USB rod, generate user's master key;
(14) in the USB rod, write IP address, user name and the password of this user on network storage server of network storage server;
(15) information in the USB rod is backed up, and the effective identity certificate number of backup password for the user is set;
(16) in User Information Database, create a new user record, wherein comprise address name, effective identity certificate number, telephone number, the user name on network storage server, USB rod backup file.
In the described step (3), the operating procedure that client is encrypted file comprises:
(31) client generates session key by the mode of random number, with session key file is encrypted;
(32) client uses the user's master key in the USB rod that session key is encrypted, and the session key after will encrypting again is attached in the file of having encrypted.
In the described step (4), client comprises the operating procedure that the file that passes down is decrypted:
(41) client reads the encrypted session key that is attached in the file, uses the user's master key in the USB rod that session key is decrypted then;
(42) client is decrypted file with session key.
Described USB rod is based on USB interface on the personal computer, card reader equipment with certain memory space and plug and play, speed is fast, volume is little, easy to carry, can finish various encryption and decryption computings to data, at least comprise: Digital Signature Algorithm (DSA, digital signature algorithm), by Rivest, the RSA public key algorithm of Shamir and Adlernan three people invention, data symmetric encipherment algorithm (DES, dataencryption standard), Secure Hash Algorithm SHA-1 (secure hash algorithm), Message Digest 5 (MD5, message-digest algorithm); It is right that the IC chip that is provided with in the rod can produce 1024,768 or 512 long keys at least, and support right importing and the derivation of key.
The present invention is a kind of implementation method of data safety storing business, and this method has adopted following multiple measure effectively to guarantee the safety of user data in conjunction with the network storage and two kinds of technology of file encryption:
(1) user data uploads to network storage server again behind local cipher, can illegally not stolen when transmitting and store to guarantee user data, makes the user can use this business to carry out the strange land storage of critical data relievedly.
(2) user only holds the USB rod, and after correctly importing USB rod protection password, could be decrypted file.Even therefore uncommitted person find the USB rod also can't the decrypted user file.
(3) have USB rod back mechanism, make the user under the situation of loss of USB rod or damage, still can recover corresponding information.
(4) in the network storage server side tape library backup device is set, the schedule backup user data is guaranteed when meeting with abnormal conditions, also restore data fast;
Description of drawings
Fig. 1 is the operating process block diagram of the implementation method of a kind of data safety storing business of the present invention.
Fig. 2 is the principle schematic of file encryption.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
Referring to Fig. 1 and Fig. 2, the present invention is a kind of implementation method of data safety storing business, mainly carries out associative operation by system management end and client two parts, comprises the following steps:
(1) request for utilization: management end requires application to open " network security storage " professional user effective identity certificate, contact telephone number and required storage size is provided, through confirmation true and accept applications after, management end carries out initialization process, and the user obtains one and stored the USB rod of personal information and corresponding USB rod protection password; The operating procedure of the initialization process of management end comprises:
(11) on network storage server, create a user name, and corresponding password is set, distribute the memory space of corresponding size then according to customer requirements, and the access rights that this memory space is set are read and write for only allowing this user;
(12) a USB rod is formatd, and USB rod protection password is set;
(13) call the interface function of USB rod, in the USB rod, generate user's master key;
(14) in the USB rod, write IP address, user name and the password of user on network storage server of network storage server;
(15) information in the USB rod is backed up, the backup password is set to user's effective identity certificate number;
(16) in User Information Database, create a new user record, wherein comprise address name, effective identity certificate number, telephone number, the user name on network storage server, USB rod backup file.
(2) connect network storage server: after client detected USB rod insertion main frame, the prompting user imported USB rod protection password; After the user correctly imported USB rod protection password, client read IP address, user name and the password of this user on network storage server of the network storage server of storing in the USB rod, is connected to network storage server then and carries out authentication; After checking is passed through, the memory space of user on network storage server is mapped as a virtual partition of this machine by the CIFS agreement.
(3) file encryption is uploaded: when the user write virtual partition to file, client received this request, earlier file was encrypted, and by the CIFS agreement file after encrypting was uploaded to network storage server again;
Wherein to carry out the operating procedure of file encryption be (referring to shown in Figure 2) to client:
(31) client generates session key by the mode of random number, with session key file is encrypted;
(32) client uses the user's master key in the USB rod that session key is encrypted, and the session key after the encryption is attached in the file of having encrypted.
(4) down transmitting file deciphering: when the user reads file in the virtual partition, client is intercepted and captured this request, earlier file is passed to subscriber's main station under network storage server, then file is decrypted, and then show file after the deciphering to the user by the CIFS agreement;
Wherein client to the operating procedure that following transmitting file is decrypted is:
(41) client reads the encrypted session key that is attached in the file, uses the user's master key in the USB rod that session key is decrypted then;
(42) client is decrypted file with session key.
(5) disconnect and being connected of network storage server: client detects the USB rod extract main frame after, just being connected of disconnection and network storage server, former virtual partition disappears from subscriber's main station;
(6) charge: the management end system adopts monthly payment or alternate manner to charge according to the size of user applies memory space.
(7) recovery of USB rod: information dropout in the USB rod or damage, and the user is not when this machine backup USB rod information, management end requires the user that effective identity certificate is provided, after empirical tests is true, management end is searched User Information Database according to the user identity passport NO., to obtain corresponding USB rod backup file, submit to the user then; After the user took backup file, the identity document number of importing oneself can carry out the recovery of USB rod as password;
(8) backup of network storage server: management end regularly uses the tape library backup device that the file in the network storage server is backed up.

Claims (6)

1. the implementation method of a data safety storing business is characterized in that: comprise the following steps: at least
(1) request for utilization: the system management end requires application to open " network security storage " professional user effective identity certificate, contact telephone number and required storage size is provided, through confirmation true and accept applications after, management end carries out initialization process, and the user obtains one and stored the general-purpose serial bus USB rod of personal information and corresponding USB rod protection password;
(2) connect network storage server: after client detected USB rod insertion main frame, the prompting user imported USB rod protection password; After the user correctly imported USB rod protection password, client read IP address, user name and the password of this user on network storage server of the network storage server of storing in the USB rod, is connected to network storage server then and carries out authentication; After checking is passed through, the memory space of user on network storage server is mapped as a virtual partition of this machine by CIFS CIFS agreement;
(3) file encryption is uploaded: when the user write virtual partition to file, client received this request, earlier file was encrypted, and by the CIFS agreement file after encrypting was uploaded to network storage server again;
(4) down transmitting file deciphering: when the user reads file in the virtual partition, client is intercepted and captured this request, earlier file is passed to subscriber's main station under network storage server, then file is decrypted, and then the file after will deciphering is shown to the user by the CIFS agreement;
(5) disconnect and being connected of network storage server: client detects the USB rod extract main frame after, just being connected of disconnection and network storage server, former virtual partition disappears from subscriber's main station;
(6) charge: the system management end adopts monthly payment or alternate manner to charge according to the size of user applies memory space.
2. the implementation method of data safety storing business according to claim 1, it is characterized in that: described method further comprises following one or more step:
(7) recovery of USB rod: information dropout in the USB rod or damage, and the user is not when this machine backup USB rod information, the system management end requires the user that effective identity certificate is provided, after empirical tests is true, management end is searched User Information Database according to the user identity passport NO., to obtain corresponding USB rod backup file, submit to the user then; After the user took backup file, the identity document number of importing oneself can carry out the recovery of USB rod as password;
(8) backup of network storage server: the system management end regularly uses tape library backup system that the file in the network storage server is backed up.
3. the implementation method of data safety storing business according to claim 1, it is characterized in that: in the described step (1), after management end was accepted user applies, the initialization process operating procedure of carrying out comprised:
(11) on network storage server, create a user name and corresponding password is set, distribute the memory space of corresponding size then according to customer requirements, and the access rights that this memory space is set are read and write for only allowing this user;
(12) a USB rod is formatd, and the protection password of USB rod is set;
(13) call the interface function of USB rod, in the USB rod, generate user's master key;
(14) in the USB rod, write IP address, user name and the password of this user on network storage server of network storage server;
(15) information in the USB rod is backed up, and the effective identity certificate number of backup password for the user is set;
(16) in User Information Database, create a new user record, wherein comprise address name, effective identity certificate number, telephone number, the user name on network storage server, USB rod backup file.
4. the implementation method of data safety storing business according to claim 1, it is characterized in that: in the described step (3), the operating procedure that client is encrypted file comprises:
(31) client generates session key by the mode of random number, with session key file is encrypted;
(32) client uses the user's master key in the USB rod that session key is encrypted, and the session key after will encrypting again is attached in the file of having encrypted.
5. the implementation method of data safety storing business according to claim 1 is characterized in that: in the described step (4), client comprises the operating procedure that the file that passes down is decrypted:
(41) client reads the encrypted session key that is attached in the file, uses the user's master key in the USB rod that session key is decrypted then;
(42) client is decrypted file with session key.
6. the implementation method of data safety storing business according to claim 1, it is characterized in that: described USB rod is based on USB interface on the personal computer, has the card reader equipment of certain memory space and plug and play, can finish various encryption and decryption computings to data, at least comprise: Digital Signature Algorithm DSA, by the RSA public key algorithm of Rivest, Shamir and Adlernan three people invention, data symmetric encipherment algorithm DES, Secure Hash Algorithm SHA-1, Message Digest 5 MD5; It is right that the IC chip that is provided with in the rod can produce 1024,768 or 512 long keys at least, and support right importing and the derivation of key.
CNB2005101169821A 2005-10-28 2005-10-28 Method for realizing data safety storing business Active CN100464549C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005101169821A CN100464549C (en) 2005-10-28 2005-10-28 Method for realizing data safety storing business

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005101169821A CN100464549C (en) 2005-10-28 2005-10-28 Method for realizing data safety storing business

Publications (2)

Publication Number Publication Date
CN1773994A CN1773994A (en) 2006-05-17
CN100464549C true CN100464549C (en) 2009-02-25

Family

ID=36760746

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005101169821A Active CN100464549C (en) 2005-10-28 2005-10-28 Method for realizing data safety storing business

Country Status (1)

Country Link
CN (1) CN100464549C (en)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102007012749A1 (en) * 2007-03-16 2008-09-18 Siemens Ag Method and system for providing services to terminals
CN101291244B (en) * 2007-04-16 2011-07-20 深圳市维信联合科技有限公司 Network security management method and system thereof
CN101398744B (en) * 2007-09-26 2011-12-28 新奥特硅谷视频技术有限责任公司 Method and system for implementing network data process by utilizing virtual file system technology
CN101325610B (en) * 2008-07-30 2011-12-28 杭州华三通信技术有限公司 Virtual tape library backup system and magnetic disk power supply control method
CN101877246A (en) * 2009-04-28 2010-11-03 许燕 U disk encryption method
CN102594779B (en) * 2011-01-05 2016-03-02 中国移动通信集团公司 A kind of user data processing method and equipment thereof
CN102123143B (en) * 2011-01-21 2013-09-18 宁波市胜源技术转移有限公司 Method for storing data in network safely
CN102789555B (en) * 2011-05-17 2015-11-18 腾讯科技(深圳)有限公司 A kind of method and system of safety moving file
CN102638568B (en) * 2012-03-02 2015-12-16 深圳市朗科科技股份有限公司 Cloud storage system and data managing method thereof
CN102833075A (en) * 2012-09-05 2012-12-19 北京市科学技术情报研究所 Identity authentication and digital signature method based on three-layered overlapping type key management technology
CN103605937A (en) * 2012-12-11 2014-02-26 深圳市证通电子股份有限公司 Terminal device and safety display module thereof
CN103209179A (en) * 2013-03-15 2013-07-17 苏州九光信息科技有限公司 Secure network storage method and secure network storage system
CN104065680B (en) * 2013-03-21 2017-03-08 华为终端有限公司 Information processing method, search method, device, user terminal and server
CN104426666A (en) * 2013-09-06 2015-03-18 镇江精英软件科技有限公司 Method for realizing user information verification of management system by IC (integrated circuit) board
CN103533402B (en) * 2013-10-23 2015-08-19 腾讯科技(深圳)有限公司 Video channel management method and relevant device and communication system
KR101418797B1 (en) * 2013-11-04 2014-07-11 (주)세이퍼존 Security token device for cloud service, system for providing security cloud service and method thereof
CN104333545B (en) * 2014-10-26 2017-07-14 国网内蒙古东部电力有限公司信息通信分公司 The method that cloud storage file data is encrypted
CN104363093B (en) * 2014-10-26 2017-10-24 重庆智韬信息技术中心 The method encrypted by dynamic authorization code to file data
CN104333544B (en) * 2014-10-26 2017-11-10 重庆智韬信息技术中心 Encryption method based on mobile terminal data file
CN105635055A (en) * 2014-11-01 2016-06-01 江苏威盾网络科技有限公司 Cloud data safety usage method
CN106487496A (en) * 2015-08-25 2017-03-08 中兴通讯股份有限公司 A kind of method controlling storage encryption and terminal
CN105357193A (en) * 2015-10-30 2016-02-24 深圳云聚汇数码有限公司 Anti-blasting data storage method
CN105893281A (en) * 2016-03-30 2016-08-24 苏州美天网络科技有限公司 Intelligent data storage system of computer
CN107749862A (en) * 2017-11-23 2018-03-02 爱国者安全科技(北京)有限公司 A kind of data encryption centrally stored method, server, user terminal and system
CN110633172A (en) * 2019-09-24 2019-12-31 爱国者安全科技(北京)有限公司 USB flash disk and data synchronization method thereof
CN111858153B (en) * 2020-06-03 2023-12-19 深圳市西迪特科技有限公司 Data backup and restore method for network storage device
CN116910781B (en) * 2023-07-12 2024-02-20 南京市公安局 Mobile phone backup data searching device based on background password verification

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040015724A1 (en) * 2002-07-22 2004-01-22 Duc Pham Logical access block processing protocol for transparent secure file storage
CN1558580A (en) * 2004-02-03 2004-12-29 胡祥义 A network data safety protection method based on cryptography
CN1567194A (en) * 2003-06-13 2005-01-19 联想(北京)有限公司 Verification method based on storage medium private space of USB flash memory disc
CN1592197A (en) * 2003-09-01 2005-03-09 台均实业有限公司 Method of identification between user device and local client use or remote-network service

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040015724A1 (en) * 2002-07-22 2004-01-22 Duc Pham Logical access block processing protocol for transparent secure file storage
CN1567194A (en) * 2003-06-13 2005-01-19 联想(北京)有限公司 Verification method based on storage medium private space of USB flash memory disc
CN1592197A (en) * 2003-09-01 2005-03-09 台均实业有限公司 Method of identification between user device and local client use or remote-network service
CN1558580A (en) * 2004-02-03 2004-12-29 胡祥义 A network data safety protection method based on cryptography

Also Published As

Publication number Publication date
CN1773994A (en) 2006-05-17

Similar Documents

Publication Publication Date Title
CN100464549C (en) Method for realizing data safety storing business
CN1689297B (en) Method of preventing unauthorized distribution and use of electronic keys using a key seed
CN101159556B (en) Group key server based key management method in sharing encryption file system
CN106685645B (en) A kind of cipher key backup for safety chip business cipher key and restoration methods and system
US20190370483A1 (en) Data Protection Method and System
CN102123143B (en) Method for storing data in network safely
KR20140126787A (en) Puf-based hardware device for providing one time password, and method for 2-factor authenticating using thereof
CN105426775A (en) Method and system for protecting information security of smartphone
CN112685786B (en) Financial data encryption and decryption method, system, equipment and storage medium
CN103546421A (en) Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system
CN101924739A (en) Method for encrypting, storing and retrieving software certificate and private key
CN102831359A (en) Encryption file system of portable mobile storage device
CN104333545A (en) Method for encrypting cloud storage file data
CN112507296B (en) User login verification method and system based on blockchain
CN110138548A (en) Based on unsymmetrical key pond to and DH agreement quantum communications service station cryptographic key negotiation method and system
CN102468962A (en) Method for personal identity authentication utilizing a personal cryptographic device
TWI476629B (en) Data security and security systems and methods
CN112989320B (en) User state management system and method for password equipment
CN112787996B (en) Password equipment management method and system
CN110098925A (en) Based on unsymmetrical key pond to and random number quantum communications service station cryptographic key negotiation method and system
Hu Study of file encryption and decryption system using security key
CN103916237A (en) Method and system for managing user encrypted-key retrieval
Rakdej et al. Coin recovery from inaccessible cryptocurrency wallet using unspent transaction output
CN113342896B (en) Scientific research data safety protection system based on cloud fusion and working method thereof
CN202495964U (en) Identity authentication system based on mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: CHINA TELECOMMUNICATION STOCK CO., LTD.

Free format text: FORMER OWNER: CHINA TELECOMMUNICATION STOCK CO., LTD. GUANGDONG ACADEME

Effective date: 20091030

C41 Transfer of patent application or patent right or utility model
C56 Change in the name or address of the patentee

Owner name: CHINA TELECOMMUNICATION STOCK CO., LTD. GUANGDONG

Free format text: FORMER NAME: GUANGDONG PROVINCE TELECOMMUNICATION CO., LTD. RESEARCH INSTITUTE

CP03 Change of name, title or address

Address after: 20, building 109, West Zhongshan Avenue, Tianhe District, Guangzhou, Guangdong

Patentee after: GUANGDONG RESEARCH INSTITUTE, CHINA TELECOM Co.,Ltd.

Address before: No. 109, Zhongshan Avenue, Tianhe District, Guangdong, Guangzhou

Patentee before: Guangdong Telecommunication Co.,Ltd. Institude

TR01 Transfer of patent right

Effective date of registration: 20091030

Address after: No. 31, Finance Street, Beijing, Xicheng District

Patentee after: CHINA TELECOM Corp.,Ltd.

Address before: 20, building 109, West Zhongshan Avenue, Tianhe District, Guangzhou, Guangdong

Patentee before: GUANGDONG RESEARCH INSTITUTE, CHINA TELECOM Co.,Ltd.