CN101261667A - A software protection method - Google Patents

A software protection method Download PDF

Info

Publication number
CN101261667A
CN101261667A CNA2008101037296A CN200810103729A CN101261667A CN 101261667 A CN101261667 A CN 101261667A CN A2008101037296 A CNA2008101037296 A CN A2008101037296A CN 200810103729 A CN200810103729 A CN 200810103729A CN 101261667 A CN101261667 A CN 101261667A
Authority
CN
China
Prior art keywords
functional module
time
software
interval
protecting equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008101037296A
Other languages
Chinese (zh)
Other versions
CN101261667B (en
Inventor
孙吉平
韩勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
SHENSILUOKE DATA PROTECTION CENTER BEIJING
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENSILUOKE DATA PROTECTION CENTER BEIJING filed Critical SHENSILUOKE DATA PROTECTION CENTER BEIJING
Priority to CN2008101037296A priority Critical patent/CN101261667B/en
Publication of CN101261667A publication Critical patent/CN101261667A/en
Application granted granted Critical
Publication of CN101261667B publication Critical patent/CN101261667B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a software protection method, which controls the application of a functional module in a software protection device so as to control the application of the software. The method includes the following steps: an interior timer times according to a CPU clock in the software protection device; the actual application time of the functional module is accumulatively recorded by the timing of the interior timer; the application of the functional module is controlled according to the received instruction of the software protection device and the actual application time of the functional module. The invention realizes the accumulative timing of the actual application time of the software by arranging the interior timer in the software protection device to make use of the CPU clock of the software protection device, and controls each functional module together with the controllers of the functional modules, thus overcoming the higher cost problem of the software protection devices provided with clock chips in the prior art. Furthermore, the method does not directly utilize a systematic time coming from the exterior for timing, thus avoiding the poor security problem of the software brought by the modification to the systematic time.

Description

A kind of method for protecting software
Technical field
The present invention relates to the software protection field, particularly a kind of method for protecting software, be used for software use and the lease process to controlling the service time of software.
Background technology
Along with the develop rapidly of economic technology, software has been deep in the middle of all trades and professions as aid.Software product is software developer and software programming personnel crystallization of wisdom; software developer's survival and development are bases that software product can sufficient supplies, thereby, the copyright of protection software product; prevent software product by piracy, have very important practical sense.
In numerous strategies of the existing protection software product of software developer; majority has adopted a kind of like this mode: extract core algorithm in the software product or key as the key procedure code; described key procedure code and the needed data of this program code are placed in the software protecting equipment with as the functional module in the software protecting equipment, call for external software.That is, functional module is: the code and/or the data that can or be placed on the confession external call in the software protecting equipment that the software developer extracts from software product.Adopt after this mode, when the user uses software product, must have software protecting equipment to move simultaneously, otherwise can't use this software product.
This dominance of strategies is, the key code of software product is placed in the software protecting equipment, and the cracker is difficult to obtain the key procedure code of software product, also is difficult to the clone software protective device, also just is difficult to crack this software product.The process chip of certain described software protecting equipment is that an intelligent card chip with certain safety certification grade just can prevent to be cloned firmly.Just because of this advantage is arranged, increasing software development commercial city has adopted this strategy to protect the software product of oneself both at home and abroad.
Because the marketing strategy, the software developer often need provide software product in limited time.For the software product that uses software protecting equipment, can use the software protecting equipment that has clock chip to realize using of software in limited time.The software protecting equipment that has clock chip uses battery to power as clock chip, thereby can realize accurate timing.But the software protecting equipment that has clock chip is compared with common software protecting equipment, needs to increase the crystal of clock chip, battery and clock chip need of work, thereby needs to increase bigger extra cost.For the software product that does not use software protecting equipment; can only obtain the service time of temporal information by the reading system time with restricted software; but owing to system time is easy to be modified, so realize software is carried out method in limited time, the non-constant of its security based on system time.
Summary of the invention
In view of this, purpose of the present invention just provides the method for protecting software that a kind of cost is lower, security is higher relatively.
Therefore, the present invention proposes a kind of method for protecting software, thereby it is by controlling the use of Control Software to the use of the functional module in the software protecting equipment, this method may further comprise the steps: internal timer carries out timing according to the cpu clock in the software protecting equipment; Utilize the timing of internal timer to come the time used of the functional module in the bulk registration software protecting equipment; The order that receives according to software protecting equipment and the time used of described functional module come the use of control function module, wherein, comprise code and/or the data for the external call that extract in the described functional module from software.
Further, the use of described control function module comprises according to the order that receives and the functional module time used is enabled, called or the disable function module.
Further, do not have to enable corresponding functional modules under the overtime situation at the time used of enabling order and corresponding functional modules of receiving functional module; Under the situation that the call instruction of receiving functional module and corresponding functional modules have been activated, call this functional module; And the functional module of under the situation of the inactive order of receiving functional module, stopping using and being activated accordingly.
Further, the time used of the functional module in the described bulk registration software protecting equipment is the summation of each service time of the functional module of record dead status; Wherein, be meant that functional module is at every turn from being enabled to the time interval that is deactivated described each service time.
Further, the time used of the functional module in the described bulk registration software protecting equipment is the summation of enabling each service time before and this already used time the last time of the functional module of record initiate mode; Wherein, be meant that functional module is at every turn from being enabled to the time interval that is deactivated described each service time; Be meant that the functional module that is in initiate mode is from enabling the current time interval for the last time described this service time.
Further, with pre-set time interval, the time used of the functional module that regular update has started, and this functional module of under the overtime situation of the time used after the renewal of functional module, stopping using.
Further, utilize from the current command, extract external time information and the external time information calculations from last subcommand, extracted go out between these two orders external time at interval; From timer, obtain the internal time interval of the current command and last subcommand; Judge described external time at interval and the difference at internal time interval whether in predefined error range; Fall in described difference under the situation of predefined error range, use the time of external time calibrated timer, thereby make the time used of functional module can be by accurate timing.
Further, if described internal time at interval and external time the interval difference exceeded described predefined error range, then software protecting equipment limits the use of functional module.
The present invention utilizes the cpu clock in the software protecting equipment to carry out timing by the internal timer that is arranged in the software protecting equipment, realize timing to the time used of functional module, and utilize time used to come functional module is controlled, thereby overcome the software protecting equipment cost problem of higher that has clock chip in the prior art, and method of the present invention directly is not used to come timing from outside system time, so can prevent to be modified owing to system time the problem of the software security difference of bringing; Further, the present invention utilizes the temporal information of external system to come internal timer is calibrated, thereby can guarantee the accuracy of internal timer.
Description of drawings
Fig. 1 is the process flow diagram of method for protecting software of the present invention;
The process flow diagram that Fig. 2 utilizes system time that internal timer is calibrated for method for protecting software of the present invention;
Fig. 3 is the structural representation that utilizes the software protecting equipment of method for protecting software of the present invention.
Embodiment
Method of the present invention is used in the software protecting equipment; software protecting equipment is used for the use that operates in the software in the external system is limited, and this restriction is by utilizing method of the present invention that the control of the functional module in the software protecting equipment is realized.Method of the present invention can realize with software mode, describes for convenient, uses " functional module controller " to represent method of the present invention hereinafter.
Below in conjunction with accompanying drawing method for protecting software of the present invention is described in detail.
Describe with an embodiment each step below method for protecting software of the present invention.As shown in Figure 1, this method may further comprise the steps.
Step 200, initialization also starts the internal timer of software protecting equipment;
Initialization to internal timer comprises the initial time that utilizes the current external system time that internal timer is set, and starts internal timer, makes it begin to utilize the cpu clock in the software protecting equipment to pick up counting.
Step 201 is waited for external command;
This step is an armed state, if do not receive any order, then continues to wait for from external system, and after receiving outside order, ability execution in step 202.
Step 202 when receiving external command, judges that the order receive stops using for enabling, call still, when ordering when enabling execution in step 203; When order when calling, execution in step 211; When order when stopping using, execution in step 221;
This step is the step of distribution command, for different command, carries out different subsequent steps.
Whether the functional module that step 203, inspection requirements are enabled is overtime, if not overtime then execution in step 204, if overtime then return step 201;
For enabling order, whether the functional module of can first inspection requirements enabling is overtime, only to not overtime functional module execution in step 204, for overtime functional module, then can disregard, and directly returns step 201 and continues to await orders; In this step, also can be as shown in Figure 1, in overtime, first reports on the implementation wrong step 206 returns step 201 again, can make the user be well understood to the result of being given an order like this.
Step 204 begins the totally service time of this functional module of record according to the output of internal timer.
Step 205, initialization is also enabled this functional module, returns step 201 then.
The sequencing interchangeable of above-mentioned steps 204,205.
Step 211 checks whether this functional module is activated, if enable, then execution in step 212, otherwise return step 201;
If received call instruction in step 202, then in this step 211, whether the audit function module is activated, only enabled functional module is called; For the functional module of not enabled, can directly return step 201, also can behind reports on the implementation wrong step 206, return step 201 more as shown in Figure 1.
Step 212 is called this functional module, returns step 201;
Call the corresponding function module and return and call the result, so promptly finished call instruction, can return step 201 and await orders to external system.
Step 221 checks whether this functional module is activated, if be activated then execution in step 222, if be not activated then directly return step 201;
If received inactive order, then in step 221, can first audit function module whether enable, only to the operation of stopping using of enabled functional module in step 202.
Step 222, this functional module of stopping using, and the service time of upgrading this functional module.
Step 223 stops the functional module timing to being deactivated, and returns step 201;
Inactive above two steps 222 and 223 of comprising of functional module, be mainly and stop timing and upgrade service time, wherein, after functional module is deactivated, should stop timing, be updated to up-to-date information the service time of functional module and upgrade to make service time to its service time.
In addition, may further include in the step 201: whether the value of cycle detection timer has reached pre-set threshold, if the value of timer has reached threshold value, then execution in step 231: the service time of upgrading the functional module that has started.Whether can further include step 232 after step 231, detecting has functional module overtime, if any execution in step 233 then; Otherwise return step 201; Step 233, the relevant overtime functional module of stopping using; Execution in step 223 then, return step 201 then.This cycle detection of step 231-233 makes the functional module controller when the functional module related command is accepted in wait, can be with preset time at interval to detecting the service time of functional module, and the service time of refreshing enabled functional module in time, thereby provide condition for the functional module of in time finding overtime use.This threshold value is more little, and the cycle of then detecting whether overtime use is short more, and is high more for the sensitivity of the control of functional module; Otherwise threshold value is big more, and the cycle of then detecting whether overtime use is long more, and is low more for the sensitivity of the control of functional module.
Because method of the present invention is the service time of coming Control Software by the internal timer of software protecting equipment; and the work of internal timer depends on the cpu clock in the software protecting equipment; and may there be certain error in the frequency of this cpu clock, and therefore there is certain defective in the method for this timing.Can improve the precision of timing by system time and internal timer way of combining at this.All need to be with current system time because send to the order of functional module controller, the functional module controller can utilize the time in the order that external system sends to calibrate internal timer like this.As shown in Figure 2, method of the present invention can also comprise the step of utilizing outside system time that internal timer is calibrated: step 300, extract the time data in the current command data, calculate the external time interval between the time in the order data that imports into this time and last time; Step 301, obtain the current command that internal timer writes down and imported into last time between the order internal time at interval; Step 302 obtains described external time at interval and the difference of internal time between at interval; Step 303 is judged whether described difference drops on to preestablish in the error range, in this way execution in step 304 then; Step 304 is obtained current system time, to calibrating the service time of the functional module that started.For example, if the external time information in the current command is 10 02 seconds, and the external time information that goes up in the subcommand was 9 o'clock sharps, then can obtain external time is spaced apart 1 hour 02 seconds, and if obtained internal time and be spaced apart 1 hour, then the difference in two time intervals is 2 seconds, if and predetermined error range is 3 seconds, then,, at this moment can obtain the current external system time time of internal timer is calibrated so drop in the error range because of 3 seconds>2 seconds.
Exceeded predefined error range if in step 303, judge the difference obtain between described two time intervals, can ignore external time, perhaps also the use of functional module has been limited (step 305).Described restriction can be service time of modify feature module, to reduce the up time of functional module; Even interim inactive or permanent disable function module or the like.
Above-mentioned steps 300-304 among Fig. 2 can carry out between the step 201 and 202 of Fig. 1, after execution in step 305, can reporting errors, and promptly report the information that there is error external time, can return step 201 then, wait for next order.
In addition, in the step 200 of method of the present invention, starting internal timer can just carry out in the beginning of method, also can carry out when receiving first order of enabling functional module, and then enable the functional module of appointment; If carry out when receiving that first enables order, then correspondingly the operation of the threshold value of the inspection timer in the above-mentioned steps 201 must just can be carried out after the timer initiation of software protecting equipment inside.
In addition, the value of the inspection timer in the above-mentioned steps 201 can be finished by interruption.Can to timer a threshold value be set earlier generally speaking, when the value of timer arrived this threshold value, timer can be initiated an interrupt request to CPU.CPU can be in the processing function of interrupt request to finishing renewal the service time of the functional module of having enabled, the whether overtime work of audit function module.
The groundwork flow process that regards to method for protecting software of the present invention down describes.The functional module controller is finished different operations according to different orders after receiving order.If enable the order of functional module, then the functional module controller checks whether this functional module is activated, and, directly returns success (this step does not show in the drawings) if be activated; If be not activated, check then whether this functional module is overtime, if overtime then return mistake; If not overtime, then begin this functional module timing and enable this functional module.If the calling functional modules order checks then whether this functional module enables,, then return mistake if be not activated; If be activated then call this functional module, and return the result that calls of functional module.If the disable function module command checks that then whether this functional module is activated, if be not activated, then returns success; If be activated, then inactive this functional module and the service time of upgrading this functional module.In addition,, can regularly upgrade its service time, and whether the measuring ability module is overtime after renewal, as overtime this functional module of then can stopping using for enabled functional module.
In addition, method of the present invention can be used in as shown in Figure 3 the software protecting equipment, and this device can use USB interface and external system to communicate; And can comprise the order distributor, it is ordered by USB interface reception all from the outside, and the order relevant with functional module is distributed to the functional module controller, and other order is sent to the irrelevant command processor of functional module; The processing procedure (being method for protecting software of the present invention) that the functional module controller receives after the order has a detailed description hereinbefore, does not repeat them here.As shown in Figure 3, comprised two functional modules in this device: in fact first functional module and second functional module it will be understood by those of skill in the art that wherein to comprise more than one any functional module.Control for service time of each different functional module is to carry out the service time separately of passing through to be write down.
Above content is only as exemplary explanation, and is not used in restriction the present invention, and protection scope of the present invention is limited by claims.Those skilled in the art can make various modifications or be equal to replacement in spiritual scope of the present invention the present invention, and these also should be considered as falling within the scope of protection of the present invention.

Claims (8)

1, a kind of method for protecting software, thus its it is characterized in that by the use of the functional module in the software protecting equipment being controlled the use of Control Software, said method comprising the steps of:
Internal timer carries out timing according to the cpu clock in the software protecting equipment;
Utilize the timing of internal timer to come the time used of the functional module in the bulk registration software protecting equipment; And
The order that receives according to software protecting equipment and the time used of described functional module come the use of control function module,
Wherein, comprise code and/or the data that from software, extract in the described functional module for external call.
2, method according to claim 1 is characterized in that, the use of described control function module comprises according to the order that receives and the functional module time used is enabled, called or the disable function module.
3, method according to claim 2 is characterized in that,
Do not have to enable corresponding functional modules under the overtime situation at the time used of enabling order and corresponding functional modules of receiving functional module;
Under the situation that the call instruction of receiving functional module and corresponding functional modules have been activated, call this functional module; And
The functional module of under the situation of the inactive order of receiving functional module, stopping using and being activated accordingly.
4, method according to claim 1 is characterized in that, the time used of the functional module in the described bulk registration software protecting equipment is the summation of each service time of the functional module of record dead status;
Wherein, be meant that functional module is at every turn from being enabled to the time interval that is deactivated described each service time.
5, method according to claim 1, it is characterized in that, the time used of the functional module in the described bulk registration software protecting equipment is the summation of enabling each service time before and this already used time the last time of the functional module of record initiate mode;
Wherein, be meant that functional module is at every turn from being enabled to the time interval that is deactivated described each service time; Be meant that the functional module that is in initiate mode is from enabling the current time interval for the last time described this service time.
6, method according to claim 5, it is characterized in that, with pre-set time interval, the time used of the functional module that regular update has started, and this functional module of under the overtime situation of the time used after the renewal of functional module, stopping using.
7, method according to claim 1 is characterized in that, further comprise,
Utilization from the current command, extract external time information and the external time information calculations from last subcommand, extracted go out between these two orders external time at interval; From timer, obtain the internal time interval of the current command and last subcommand; Judge described external time at interval and the difference at internal time interval whether in predefined error range; Fall in described difference under the situation of predefined error range, use the time of external time calibrated timer, thereby make the time used of functional module can be by accurate timing.
8, method according to claim 7 is characterized in that, further comprise, if described internal time at interval and external time the interval difference exceeded described predefined error range, then software protecting equipment limits the use of functional module.
CN2008101037296A 2008-04-10 2008-04-10 A software protection method Active CN101261667B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101037296A CN101261667B (en) 2008-04-10 2008-04-10 A software protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101037296A CN101261667B (en) 2008-04-10 2008-04-10 A software protection method

Publications (2)

Publication Number Publication Date
CN101261667A true CN101261667A (en) 2008-09-10
CN101261667B CN101261667B (en) 2011-05-18

Family

ID=39962120

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101037296A Active CN101261667B (en) 2008-04-10 2008-04-10 A software protection method

Country Status (1)

Country Link
CN (1) CN101261667B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101847188A (en) * 2010-04-28 2010-09-29 北京飞天诚信科技有限公司 Software protection method for security device based on clock and security device
CN102402656A (en) * 2010-09-19 2012-04-04 邹芬 Method for realizing software authorization by using dual power supply system device independent of host computer in real time
CN102724593A (en) * 2012-06-08 2012-10-10 深圳市九洲电器有限公司 Method for preventing pirating software of sample set top box and set top box
CN102779247A (en) * 2012-06-25 2012-11-14 苏州阔地网络科技有限公司 Software authentication method and system
CN103164641A (en) * 2011-12-08 2013-06-19 北京深思洛克软件技术股份有限公司 Calling method of software protection device external codes
CN103312513A (en) * 2013-06-19 2013-09-18 北京华胜天成科技股份有限公司 Method and system for verifying use authorization in distributed environment
CN103413070A (en) * 2013-07-09 2013-11-27 北京深思数盾科技有限公司 Method and device for calibrating local clock
CN103473486A (en) * 2013-09-04 2013-12-25 深圳市文鼎创数据科技有限公司 Electronic signature tool and software protection method and device based on same
CN104181909A (en) * 2013-05-24 2014-12-03 现代自动车株式会社 Method for determining software error in virtualization based integrated control system
CN105468937A (en) * 2015-11-13 2016-04-06 北京恒华伟业科技股份有限公司 Method and device for controlling encryption lock

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100362522C (en) * 2006-03-31 2008-01-16 北京飞天诚信科技有限公司 Real time clock correcting method in soft ware protecter
CN101038615A (en) * 2007-03-12 2007-09-19 吴晓栋 Method for directly and arbitrary separating code to encryption lock from software to implement protection of software protection

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101847188A (en) * 2010-04-28 2010-09-29 北京飞天诚信科技有限公司 Software protection method for security device based on clock and security device
WO2011134208A1 (en) * 2010-04-28 2011-11-03 北京飞天诚信科技有限公司 Software protection method of security device based on clock and security device
CN102402656A (en) * 2010-09-19 2012-04-04 邹芬 Method for realizing software authorization by using dual power supply system device independent of host computer in real time
CN103164641A (en) * 2011-12-08 2013-06-19 北京深思洛克软件技术股份有限公司 Calling method of software protection device external codes
CN103164641B (en) * 2011-12-08 2018-05-18 北京深思数盾科技股份有限公司 A kind of method for calling software protecting equipment external code
CN102724593A (en) * 2012-06-08 2012-10-10 深圳市九洲电器有限公司 Method for preventing pirating software of sample set top box and set top box
CN102724593B (en) * 2012-06-08 2015-05-06 深圳市九洲电器有限公司 Method for preventing pirating software of sample set top box and set top box
CN102779247A (en) * 2012-06-25 2012-11-14 苏州阔地网络科技有限公司 Software authentication method and system
CN104181909A (en) * 2013-05-24 2014-12-03 现代自动车株式会社 Method for determining software error in virtualization based integrated control system
CN103312513B (en) * 2013-06-19 2016-03-02 北京华胜天成科技股份有限公司 The method and system of use authority are verified under distributed environment
CN103312513A (en) * 2013-06-19 2013-09-18 北京华胜天成科技股份有限公司 Method and system for verifying use authorization in distributed environment
CN103413070B (en) * 2013-07-09 2016-08-10 北京深思数盾科技股份有限公司 A kind of method and device of local clock calibration
CN103413070A (en) * 2013-07-09 2013-11-27 北京深思数盾科技有限公司 Method and device for calibrating local clock
CN103473486A (en) * 2013-09-04 2013-12-25 深圳市文鼎创数据科技有限公司 Electronic signature tool and software protection method and device based on same
CN103473486B (en) * 2013-09-04 2016-09-28 深圳市文鼎创数据科技有限公司 Method for protecting software based on electric signing tools, device and electric signing tools
CN105468937A (en) * 2015-11-13 2016-04-06 北京恒华伟业科技股份有限公司 Method and device for controlling encryption lock

Also Published As

Publication number Publication date
CN101261667B (en) 2011-05-18

Similar Documents

Publication Publication Date Title
CN101261667B (en) A software protection method
US8190941B2 (en) Field control system
JP2013084122A (en) Virtual computer, virtual computer system, and virtual computer control method
CN103257872A (en) Embedded control system for computers and updating method of embedded control system
CN101739305A (en) Operating system kernel level real-time dongle monitoring device and monitoring method thereof
JP6847196B2 (en) Washing machine control methods, controls and control systems
CN102890636A (en) Firmware upgrade method and system under Android system
CN104040519A (en) Host side implementation for hid i2c data bus
CN103413070A (en) Method and device for calibrating local clock
CN106371876B (en) Method and system for upgrading external program of product
CN100585610C (en) Software protector protected by time valve and its realization method
CN100501710C (en) Peripheral apparatus access state checking method
KR101963262B1 (en) Watt-hour meter and operating method thereof
CN109960599A (en) Chip system and its house dog self checking method, electrical equipment
CN101094252A (en) Automatic method for identifying modules of liquid crystal display in handset
US9619355B2 (en) Booting verification method of computer and electronic device
CN106911997B (en) Geographic fence system based on UEFI firmware and implementation method thereof
CN101587520B (en) Authorization system of navigation device and associated authorization method
CN100472497C (en) Protection method and device for transmission wait of LPC interface, and LPC slave equipment of using it
CN105630654B (en) System and method for the IP address for showing BMC
CN108008854B (en) Method, device and terminal equipment for avoiding antenna carrier interference
CN102609080B (en) Input block switching device and its changing method
CN102096377B (en) Method and device for inputting process parameters to dose controller
CN109460305A (en) Use-case calling system and method, the first platform and the second platform
KR102030460B1 (en) Real Time Clock Device and Method Thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: BEIJING SHENSI SHUDUN SCIENCE + TECHNOLOGY CO., LT

Free format text: FORMER OWNER: BEIJING SENSELOCK SOFTWARE TECHNOLOGY CO., LTD.

Effective date: 20150109

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100086 HAIDIAN, BEIJING TO: 100872 HAIDIAN, BEIJING

TR01 Transfer of patent right

Effective date of registration: 20150109

Address after: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Patentee after: BEIJING SHENSI SHUDUN TECHNOLOGY Co.,Ltd.

Address before: 100086 Beijing City, Haidian District Zhongguancun South Street No. 6 Zhucheng building block B room 1201

Patentee before: Beijing Senselock Software Technology Co.,Ltd.

C56 Change in the name or address of the patentee
CP03 Change of name, title or address

Address after: 100193 Beijing, Haidian District, East West Road, No. 10, East Hospital, building No. 5, floor 5, layer 510

Patentee after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Patentee before: BEIJING SHENSI SHUDUN TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder