CN101034986A - Method and system for securely using the intelligent secrete key device - Google Patents

Method and system for securely using the intelligent secrete key device Download PDF

Info

Publication number
CN101034986A
CN101034986A CN 200710062699 CN200710062699A CN101034986A CN 101034986 A CN101034986 A CN 101034986A CN 200710062699 CN200710062699 CN 200710062699 CN 200710062699 A CN200710062699 A CN 200710062699A CN 101034986 A CN101034986 A CN 101034986A
Authority
CN
China
Prior art keywords
identification code
intelligent key
key apparatus
module
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200710062699
Other languages
Chinese (zh)
Other versions
CN100566253C (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CNB2007100626994A priority Critical patent/CN100566253C/en
Publication of CN101034986A publication Critical patent/CN101034986A/en
Application granted granted Critical
Publication of CN100566253C publication Critical patent/CN100566253C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a method and system for safely using an intelligent secret key device, belonging to the safe communication field, and the method comprises: after receiving operation command, the intelligent secret key device generates identification code and then outputs it, and prompts to input confirm code, and after receiving the confirm code, verifies the conform code, and after verification passes, executes the user's operation command. And the system comprises host computer and intelligent secret key device. And the solution can improve the safety of the intelligent secret key device and validity of user's operation command.

Description

A kind of method and system of using intelligent key apparatus safely
Technical field
The present invention relates to information security field, particularly a kind of method and system that make things convenient for user security to use intelligent key apparatus.
Background technology
Along with the high speed development of computer technology, increasing user's custom utilizes the convenient and rich in natural resources of network to finish every work.This has saved the time to a certain extent, has improved work efficiency, promoted the Internet further develop and perfect.But, along with the continuous development of high-tech means, network offer convenience to people and amusement in, also exist great potential safety hazard, for example: the lawless person utilizes network opening to carry out malicious attack, brings very big threat for the computer that inserts the Internet.
Intelligent key apparatus is a kind of small hardware device that has processor and memory, is mainly used in fields such as authentication, software protection.It is connected with computer by the data communication interface of computer, and has the key systematic function, but the safe storage key presets cryptographic algorithm.The intelligent key apparatus computing relevant with key be fully at the device internal operation, and intelligent key apparatus has anti-characteristic of attacking, and fail safe is high.USB Key is a kind of intelligent key apparatus of USB interface, and its built-in single-chip microcomputer or intelligent card chip can be stored user's key or digital certificate.
In the prior art, intelligent key apparatus has been widely used in network safety filed.Because its inside has calculation function, is the computing environment of independence and sealing, therefore can guarantee the fail safe of data processing and storage to a great extent.Yet intelligent key apparatus can't guarantee that but data carry out safety of transmission beyond the exchange channels, and the network malefactor is very easily utilized this weakness of intelligent key apparatus, carries out unlawful activities.Show that mainly present computer is not the computer that isolates, nearly all can get involved the Internet, personal computer becomes an open relatively computer environment, in case user's computer is implanted trojan horse program, when the user uses intelligent cipher key equipment on this computer, network hacker is easy to steal operational order and the operating data that the user sends to intelligent key apparatus by computer, under the situation that the user knows nothing, distort order and data, indiscriminately ad. as one wishes utilize intelligent key apparatus to carry out every illegal operation, cause tremendous economic loss or emotional distress very likely for the validated user of intelligent key apparatus.For example, the user of the Internet bank is when remitting money operation, if intelligent key apparatus be access in one implanted in the computer of trojan horse program, if in time disconnecting with this computer, intelligent key apparatus is not connected, network hacker is easy to utilize trojan horse program to steal remittance information and remittance data that this user sends, and it is illegally distorted, when above-mentioned user carries out the remittance operation, its remittance information no longer is legacy data, in case this user continues to use intelligent key apparatus to signing through the data after distorting and sending, the illegal transaction of network hacker will be gone smoothly, and brings loss difficult to the appraisal for above-mentioned user.
There has been at present a kind of biological identification technology that utilizes to replace merely importing the technology that PIN code is carried out authentication, increased the fail safe of using intelligent key apparatus by the user.But biological characteristic is copied by biotechnology easily, and aspect the user was identified, some utilized biological characteristic to realize that there is certain potential safety hazard in the intelligent key apparatus of identification.
Summary of the invention
To use intelligent key apparatus to have the problem of potential safety hazard in the prior art in order alleviating, to the invention provides a kind of method and system of using intelligent key apparatus safely.Described technical scheme is as follows:
A kind of method of using intelligent key apparatus safely said method comprising the steps of:
Steps A: intelligent key apparatus receives operational order;
Step B: after described intelligent key apparatus is received described operational order, generate identification code, and export described identification code by described intelligent key apparatus;
Step C: described intelligent key apparatus is waited for user's input validation sign indicating number;
Step D: after described intelligent key apparatus is received described confirmation code, verify whether described confirmation code is consistent with described identification code, if consistent, described intelligent key apparatus is carried out described operational order, otherwise returns error message.
Operational order in the described steps A is:
The checking PIN code, generate key to or carry out digital signature.
The described algorithm that carries out digital signature comprises:
RSA Digital Signature Algorithm, DSA Digital Signature Algorithm, elliptic curve or finite automata Digital Signature Algorithm.
The way of output of the described identification code of output among the described step B is specially:
The mode or the voice prompting mode that show.
Identification code among the described step B is one group of random number.
Identification code among the described step B is relevant with operational order, specifically comprises:
Described identification code is the data in the operational order;
Described identification code is by the data in the operational order are carried out generating after the conversion.
Confirmation code among the described step C is that described user imports by main frame.
The present invention provides a kind of system that uses intelligent key apparatus safely simultaneously, comprises main frame and intelligent key apparatus, and described main frame comprises:
MIM message input module, the confirmation code that be used to point out the input validation sign indicating number, receives user's input;
Host interface module is used for main frame is connected with described intelligent key apparatus, realizes data communication;
Described intelligent key apparatus comprises:
The identification code generation module is used to generate identification code;
The identification code output module is used to export the identification code that described identification code generation module generates;
Match comparison module is used to verify whether the confirmation code of input is consistent with the identification code that described identification code generation module generates, if consistent, then allows the command execution module operation command, otherwise, return error message;
Command execution module is used for operation command;
Control module is used for sending order to described identification code generation module, described identification code output module, described match comparison module and described command execution module, and the work of coordinating each intermodule;
Interface module is used for described control module is connected with main frame, realizes data communication.
Described identification code output module specifically comprises:
Display unit is used for exporting described identification code in the mode that shows;
And/or phonation unit, be used for exporting described identification code with voice prompting mode.
Described interface module comprises usb interface module, eSATA interface module, SDIO interface module, pcmcia interface module.
The beneficial effect that technical scheme of the present invention is brought is:
The identification code that intelligent key apparatus among the present invention generates only sends to the identification code output module, the channel that obtains identification code has only by the identification code output module on the intelligent key apparatus and could realize, the identification code that intelligent key apparatus generates does not send to host side, so, even the main frame that links to each other with intelligent key apparatus is implanted trojan horse program, because trojan horse program can't be predicted identification code, therefore malefactor can't be stolen it, thereby can not utilize intelligent key apparatus to carry out any operation.
Though malefactor can be stolen identification code by main frame the user in intelligent key apparatus is imported the process of identification code (confirmation code), because identification code can only be used once, promptly each identification code that generates can only be effective to the once-through operation order, the user can not utilize same identification code order intelligent key apparatus to finish the multi-pass operation task, in fact the malefactor identification code of stealing is cancelled, do not have in all senses, finally contained the illegal act of malefactor.
The present invention has improved the user to a great extent in the validity of using intelligent key apparatus process safe and operational order.
Description of drawings
Fig. 1 is the method flow diagram of the safe handling intelligent key apparatus that provides of the embodiment of the invention 1;
Fig. 2 is the system schematic of the safe handling intelligent key apparatus that provides of the embodiment of the invention 2;
Fig. 3 is the method flow diagram of the safe handling intelligent key apparatus that provides of the embodiment of the invention 3.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but the present invention is not limited to following examples.
Embodiment 1
Present embodiment uses intelligent key apparatus that data are carried out digital signature with the user to be example, the user is when using intelligent key apparatus that data are carried out digital signature, intelligent key apparatus produces identification code at random, and require the user correctly to import this identification code to confirm the validity of its legal identity and operational order, in the present embodiment, intelligent key apparatus is USB Key, and identification code is a string random number.
Referring to Fig. 1, a kind of method of using intelligent key apparatus safely is provided, concrete steps are as follows:
After step 101:USB Key and main frame connected, the prompting user imported PIN code;
Step 102: the user imports PIN code and carries out authentication;
Whether the PIN code of step 103:USB Key internal verification user input is correct, if correct, then execution in step 104, otherwise execution in step 109;
Step 104: the user by authentication after, send one group of data to USB Key, and require USB Key that these data are carried out digital signature;
Step 105:USB Key is inner to generate a string identification code, and is shown to the user by display unit, and this display unit can be a LCD Panel;
Step 106: the user is according to prompting, the input validation sign indicating number, and the confirmation code that at this moment requires the user to import is the identification code that display unit shows;
Whether the confirmation code of step 107:USB Key internal verification user input is consistent with the identification code of generation in the step 105, in the present embodiment, the confirmation code process of checking user's input is that USB Key inside compares the identification code of its generation and the confirmation code of user's input, judge whether the two is consistent, if it is consistent, then execution in step 108, otherwise execution in step 109;
Step 108:USB Key combine digital signature operation.
Digital signature is some data that are attached on the initial data, or by Digital Signature Algorithm initial data is carried out cryptographic transformation.Digital signature is the recipient in order to the source of confirming initial data and the integrality and the protected data of initial data, prevents that other people (for example recipient) forges.Can obtain digital signature based on public-key cryptosystem and private key cryptographic system, mainly be based on the digital signature of public-key cryptosystem at present, different digital signature is closely related with concrete applied environment.
Digital Signature Algorithm comprises: RSA Digital Signature Algorithm, DSA Digital Signature Algorithm, and elliptic curve or finite automata Digital Signature Algorithm, in the present embodiment, the Digital Signature Algorithm of selecting for use is a RSA Algorithm.
Step 109: mistake will be pointed out by system, and refusal is carried out next step operation.
Embodiment 2
Referring to Fig. 2, present embodiment provides a kind of system that uses intelligent key apparatus safely, comprises main frame and intelligent key apparatus, and wherein, main frame comprises:
MIM message input module, the confirmation code that be used to point out the input validation sign indicating number, receives user's input; Generally be prompted to and want the user that uses intelligent key apparatus to operate.
Host interface module is used for main frame is connected with described intelligent key apparatus, realizes data communication;
Intelligent key apparatus comprises:
The identification code generation module is used to generate identification code;
The identification code output module is used to export the identification code that the identification code generation module generates;
Match comparison module is used to verify whether the confirmation code of input is consistent with the identification code that the identification code generation module generates, if consistent, then allows the command execution module operation command, otherwise, the refusal operation;
Command execution module is used for operation command;
Control module is used for sending order to identification code generation module, identification code output module, match comparison module and command execution module, and the work of coordinating each intermodule;
Interface module is used for control module is connected with main frame, realizes data communication.
The intelligent key apparatus of present embodiment is USB Key.
Wherein, the identification code output module specifically comprises:
Display unit is used to the identification code that shows that the identification code generation module generates;
And/or phonation unit, be used for identification code with the form output identification code generation module generation of sound.
In the present embodiment, this system also comprises: data memory module is used for the storing initial key to, root ca certificate, initial password and user's private information.
Above-mentioned host interface module and interface module include line interface module and radio interface module.Specifically have: usb interface module, eSATA (External Serial ATA, external serial advanced technology attachment) interface module, SDIO (input and output of SD card) interface module, PCMCIA (Personal Computer MemoryCard International Association) interface module.
Pcmcia interface also is pc card slot, is the standard facility of notebook computer, belongs to industrial standard (PCMCIA standard), and also extensive use on many medium-sized digital equipments and industrial control equipment is most commonly used to notebook computer.
The wireline interface module comprises usb interface module, serial interface module and parallel interface module.
Serial interface module is SPI (Serial Peripheral Interface, a Serial Peripheral Interface (SPI)) module, is a kind of synchronous serial Peripheral Interface, and it can make control module and various ancillary equipment communicate with exchange message with serial mode.
In the present embodiment, host interface module and interface module all adopt usb interface module.
In the present embodiment, identification code generation module, match comparison module, command execution module, data memory module, control module, interface module are integrated in the process chip, and the SPI interface module is responsible for display unit and process chip are set up being connected physically.
Embodiment 3
In the present embodiment, the identification code that USB Key produces is exported with speech form, replaces the form output of identification code to show among the embodiment 1, and concrete steps are as follows:
Step 301:USB Key and main frame connect, and the prompting user imports PIN code;
Step 302: the user imports PIN code and carries out authentication;
Whether the PIN code of step 303:USB Key internal verification user input is correct, if correct, then execution in step 304, otherwise execution in step 309;
Step 304: the user sends one group of data by authentication to USB Key, and requires USB Key that these data are carried out digital signature;
Step 305:USB Key is inner to generate a string identification code, and exports to the user with the form of voice;
Step 306: the user points out according to main frame, the input validation sign indicating number; At this moment the confirmation code that requires the user to import is the identification code that display unit shows;
Whether the confirmation code of step 307:USB Key internal verification user input is consistent with the identification code of generation in the step 305, in the present embodiment, the process of the confirmation code of checking user input is that USB Key inside compares the identification code of its generation and the identification code of user's input, judgement is whether the two is consistent, if it is consistent, then execution in step 308, otherwise execution in step 309;
Step 308: the identification code of user's input is consistent with the inner identification code that produces of USB Key, USB Key combine digital signature operation;
Step 309: mistake will be pointed out by system, and refusal is carried out next step operation.
More than a kind of method and system of using intelligent key apparatus safely provided by the present invention are introduced, adopt instantiation that principle and execution mode are set forth among the present invention, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, common variation of carrying out in embodiment and range of application and replacement all should be included in protection scope of the present invention.

Claims (10)

1. a method of using intelligent key apparatus safely is characterized in that, said method comprising the steps of:
Steps A: intelligent key apparatus receives operational order;
Step B: after described intelligent key apparatus is received described operational order, generate identification code, and export described identification code by described intelligent key apparatus;
Step C: described intelligent key apparatus is waited for user's input validation sign indicating number;
Step D: after described intelligent key apparatus is received described confirmation code, verify whether described confirmation code is consistent with described identification code, if consistent, described intelligent key apparatus is carried out described operational order, otherwise returns error message.
2. the method for safe handling intelligent key apparatus as claimed in claim 1 is characterized in that, the operational order in the described steps A is:
The checking PIN code, generate key to or carry out digital signature.
3. the method for safe handling intelligent key apparatus as claimed in claim 2 is characterized in that, the described algorithm that carries out digital signature comprises:
RSA Digital Signature Algorithm, DSA Digital Signature Algorithm, elliptic curve or finite automata Digital Signature Algorithm.
4. the method for safe handling intelligent key apparatus as claimed in claim 1 is characterized in that, the way of output of the described identification code of output among the described step B is specially:
The mode or the voice prompting mode that show.
5. the method for safe handling intelligent key apparatus as claimed in claim 1 is characterized in that, the identification code among the described step B is one group of random number.
6. the method for safe handling intelligent key apparatus as claimed in claim 2 is characterized in that, the identification code among the described step B is relevant with operational order, specifically comprises:
Described identification code is the data in the operational order;
Described identification code is by the data in the operational order are carried out generating after the conversion.
7. the method for safe handling intelligent key apparatus as claimed in claim 1 is characterized in that, the confirmation code among the described step C is that described user imports by main frame.
8. a system that uses intelligent key apparatus safely comprises main frame and intelligent key apparatus, it is characterized in that,
Described main frame comprises:
MIM message input module, the confirmation code that be used to point out the input validation sign indicating number, receives user's input;
Host interface module is used for main frame is connected with described intelligent key apparatus, realizes data communication;
Described intelligent key apparatus comprises:
The identification code generation module is used to generate identification code;
The identification code output module is used to export the identification code that described identification code generation module generates;
Match comparison module is used to verify whether the confirmation code of input is consistent with the identification code that described identification code generation module generates, if consistent, then allows the command execution module operation command, otherwise, return error message;
Command execution module is used for operation command;
Control module is used for sending order to described identification code generation module, described identification code output module, described match comparison module and described command execution module, and the work of coordinating each intermodule;
Interface module is used for described control module is connected with main frame, realizes data communication.
9. the system of safe handling intelligent key apparatus as claimed in claim 8 is characterized in that, described identification code output module specifically comprises:
Display unit is used for exporting described identification code in the mode that shows;
And/or phonation unit, be used for exporting described identification code with voice prompting mode.
10. the system of safe handling intelligent key apparatus as claimed in claim 8 is characterized in that, described interface module comprises usb interface module, eSATA interface module, SDIO interface module or pcmcia interface module.
CNB2007100626994A 2007-01-15 2007-01-15 A kind of method and system of using intelligent key apparatus safely Expired - Fee Related CN100566253C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2007100626994A CN100566253C (en) 2007-01-15 2007-01-15 A kind of method and system of using intelligent key apparatus safely

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2007100626994A CN100566253C (en) 2007-01-15 2007-01-15 A kind of method and system of using intelligent key apparatus safely

Publications (2)

Publication Number Publication Date
CN101034986A true CN101034986A (en) 2007-09-12
CN100566253C CN100566253C (en) 2009-12-02

Family

ID=38731306

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2007100626994A Expired - Fee Related CN100566253C (en) 2007-01-15 2007-01-15 A kind of method and system of using intelligent key apparatus safely

Country Status (1)

Country Link
CN (1) CN100566253C (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184107B (en) * 2007-12-17 2010-09-01 北京飞天诚信科技有限公司 Network transaction system and method for executing network transaction using the system
CN102227106A (en) * 2011-06-01 2011-10-26 飞天诚信科技股份有限公司 Method and system for intelligent secret key equipment to communicate with computer
CN103020547A (en) * 2012-11-13 2013-04-03 中兴通讯股份有限公司 Method and device for executing commands, intelligent card and mobile terminal
CN103166754A (en) * 2013-03-12 2013-06-19 飞天诚信科技股份有限公司 Method and device processing commands
CN103617376A (en) * 2013-10-31 2014-03-05 上海动联信息技术股份有限公司 USBKEY with PIN verification function and verification method
CN104036391A (en) * 2014-05-30 2014-09-10 天地融科技股份有限公司 Information interaction method and system, information processing method and electronic key equipment
CN106295375A (en) * 2016-08-23 2017-01-04 记忆科技(深圳)有限公司 A kind of encryption hard disk supporting PCI E interface
CN106326754A (en) * 2016-08-23 2017-01-11 记忆科技(深圳)有限公司 Data transmission encryption device implemented based on PCIE (Peripheral Component Interface Express) interface
CN106850700A (en) * 2017-04-11 2017-06-13 北京深思数盾科技股份有限公司 Safety operation legality identification method and device

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184107B (en) * 2007-12-17 2010-09-01 北京飞天诚信科技有限公司 Network transaction system and method for executing network transaction using the system
CN102227106B (en) * 2011-06-01 2014-04-30 飞天诚信科技股份有限公司 Method and system for intelligent secret key equipment to communicate with computer
CN102227106A (en) * 2011-06-01 2011-10-26 飞天诚信科技股份有限公司 Method and system for intelligent secret key equipment to communicate with computer
CN103020547A (en) * 2012-11-13 2013-04-03 中兴通讯股份有限公司 Method and device for executing commands, intelligent card and mobile terminal
CN103166754B (en) * 2013-03-12 2017-05-10 飞天诚信科技股份有限公司 Method and device processing commands
CN103166754A (en) * 2013-03-12 2013-06-19 飞天诚信科技股份有限公司 Method and device processing commands
CN103617376A (en) * 2013-10-31 2014-03-05 上海动联信息技术股份有限公司 USBKEY with PIN verification function and verification method
CN104036391A (en) * 2014-05-30 2014-09-10 天地融科技股份有限公司 Information interaction method and system, information processing method and electronic key equipment
CN106295375A (en) * 2016-08-23 2017-01-04 记忆科技(深圳)有限公司 A kind of encryption hard disk supporting PCI E interface
CN106326754A (en) * 2016-08-23 2017-01-11 记忆科技(深圳)有限公司 Data transmission encryption device implemented based on PCIE (Peripheral Component Interface Express) interface
CN106295375B (en) * 2016-08-23 2019-09-03 记忆科技(深圳)有限公司 A kind of encryption hard disk for supporting PCI-E interface
CN106326754B (en) * 2016-08-23 2019-10-25 记忆科技(深圳)有限公司 A kind of data transmission encryption device realized based on PCIE interface
CN106850700A (en) * 2017-04-11 2017-06-13 北京深思数盾科技股份有限公司 Safety operation legality identification method and device
CN106850700B (en) * 2017-04-11 2018-11-20 北京深思数盾科技股份有限公司 Safety operation legality identification method and device

Also Published As

Publication number Publication date
CN100566253C (en) 2009-12-02

Similar Documents

Publication Publication Date Title
CN101034986A (en) Method and system for securely using the intelligent secrete key device
CN1288527C (en) Computer security control module and safeguard control method thereof
US8495374B2 (en) Integrity protected smart card transaction
CN1276363C (en) Method of actualizing safety data storage and algorithm storage in virtue of semiconductor memory device
CN1822013A (en) Finger print biological identifying engine system and its identifying method based on credible platform module
CN1758594A (en) Biometric authenticating apparatus and terminal
CN101034991A (en) Secure guiding system, method, code signature construction method and authentication method
CN101072100A (en) Authenticating system and method utilizing reliable platform module
CN101651675A (en) Method and system for enhancing security of network transactions
CN1769637A (en) Electric key and electric lock device and realization method thereof
CN1885315A (en) Embedded single secure chip biological fingerprint recognition system and method thereof
CN102163267A (en) Solid state disk as well as method and device for secure access control thereof
CN106161028A (en) Safety chip, communication terminal and the method improving communication security
CN110674515B (en) Multilevel security storage chip framework
CN1838141A (en) Technology for improving security of accessing computer application system by mobile phone
CN1991800A (en) Fingerprint identification storage device and fingerprint identification method
CN100470572C (en) Method and device for raising safety of data input
CN1956374A (en) Device and method for providing data encipher to identity authentication
CN101059858A (en) Method and device for inquiring conveniently electronic transaction history record
CN1601959A (en) Method and appts for controlling safety updating of software of tax register
CN1949707A (en) Key transmission method and system for multi-stage intelligent key apparatus
CN1959691A (en) Method and devices for enhancing security of electronic signature tool
CN2771917Y (en) Computer safety control module
CN1889431A (en) Multifunction intelligent key equipment and safety controlling method thereof
CN2836094Y (en) Universal serial bus transmission device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: FEITIAN CHENGXIN TECHNOLOGIES CO., LTD.

Free format text: FORMER NAME: BEIJING FEITIAN CHENGXIN SCIENCE + TECHNOLOGY CO. LTD.

CP03 Change of name, title or address

Address after: 100085 Beijing city Haidian District Xueqing Road No. 9 Ebizal building B block 17 layer

Patentee after: Feitian Technologies Co.,Ltd.

Address before: 100083, Haidian District, Xueyuan Road, No. 40 research, 7 floor, 5 floor, Beijing

Patentee before: FEITIAN TECHNOLOGIES Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091202