CN102404118A - Object certification method based on short-distance communication terminal - Google Patents

Object certification method based on short-distance communication terminal Download PDF

Info

Publication number
CN102404118A
CN102404118A CN2011103303110A CN201110330311A CN102404118A CN 102404118 A CN102404118 A CN 102404118A CN 2011103303110 A CN2011103303110 A CN 2011103303110A CN 201110330311 A CN201110330311 A CN 201110330311A CN 102404118 A CN102404118 A CN 102404118A
Authority
CN
China
Prior art keywords
near field
field communication
terminal
article
nfc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011103303110A
Other languages
Chinese (zh)
Inventor
陈坚
欧阳骏
苏翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Network Technology Co Ltd Fennel
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2011103303110A priority Critical patent/CN102404118A/en
Publication of CN102404118A publication Critical patent/CN102404118A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to an object identity certification method based on a short-distance wireless communication function of a short-distance communication terminal; and by adopting the method, the communication of a non-contact intelligent card and an RFID (radio frequency identification) is realized, the bottleneck that the recognition function of the original electronic tag is unavailable is broken through, and meanwhile, the object identity is difficult to forge and attack by the certification at a server-side by using a public secret key system and a public communication network in terms of technique principle. After the electrical verification is successful, the description for an object and the characteristic information described by characters or images are returned from the server-side, so that a user can compare the object with the actual object. The verification result can be used as commodity data to be stored for market analysis.

Description

A kind of item authentication method based near field communication (NFC) terminal
Technical field
The present invention relates to the digital verification that adopts the cryptography theory that article are carried out, particularly a kind of item authentication method based near field communication (NFC) terminal.
Background technology
The checking of commodity and false proof aspect; Adopt the cryptography principle to carry out online digital verification; Utilize the result of calculation of cloud computing server end to confirm article identity, can obtain antifalse effect preferably, improve attack and counterfeiter's cost greatly with the cost of lower manufacturing side.Technological first ratio with various physics are made repeatedly has advantage.Aspect the product of low side, the method that has had numerous stationary digital codings of setting in advance with businessman to cover printing ink is carried out the checking of product, obtains certain effect.
The code of printing is a stationary digital, though with low cost, there are many drawbacks.Compare with the fixed code of printing; The data of radio frequency sign and contact type intelligent card are to encrypt or dynamically produce, are difficult to copy and clone, and can be multiplexing; This has just greatly improved the threshold that is replicated and attacks, and can more effectively protect the interests of production production firm.
But the present radio frequency sign and the terminal of non intelligent card belong to special-purpose terminal more, and this has just caused fake certification can't popularize with general, only is used in certain scope.Simultaneously, mostly in the data reading terminals, exist this leak that to be attacked to the particularly cryptographic checking flow process of the process of reading of target data.
Near-field communication is claimed in the low coverage communication again; English is Near Field Communicaiton, and abbreviation NFC is a kind of mechanics of communication of being participated in and being developed by numerous international bodies and company; Make short-range wireless telecommunications of term and exchanges data, and compatible mutually with several kinds of RFID commonly used.Such as being operated in the contact type intelligent card that 13.46 megahertzes meet standards such as ISO 14443A and 14443B.Because the advantage of NFC in information exchange, this technology is adopted at mobile communication terminals such as mobile phone and panel computers rapidly.
Summary of the invention
The objective of the invention is to provides a kind of item authentication method based near field communication (NFC) terminal, to overcome the incomplete problem that exists in the item authentication under the prior art to the existing defective of item authentication.
To achieve these goals, the present invention provides a kind of item authentication method based near field communication (NFC) terminal, and its characteristic may further comprise the steps:
Step a: article have the Near Field Communication sign of coding in advance;
Step b: near field communication (NFC) terminal obtains the mark number of article;
Step c: the identification number that will obtain article is sent to background server through network, carries out cryptography arithmetic, obtains verification msg and intrinsic data;
Steps d: the authenticity that verification msg and intrinsic data is turned back to the near field communication (NFC) terminal checking article.
The mark number of the said article of item authentication method in step b based near field communication (NFC) terminal comprises the trade name of article model, article, the trade mark of article, the bar code of article, the sequence number of article, unique sequence number UID of Near Field Communication sign etc.; The obtaining means of the mark number of article can also be used the method input terminal of optical scanner and artificial input except employing Near Field Communication terminal obtains automatically.
Said item authentication method based near field communication (NFC) terminal is in the data of verification msg for producing and obtain according to the cryptography principle described in the step c, is used for and undertaken alternately by the mark number on the authenticating items, to accomplish proof procedure; Said intrinsic data are by the correct result of authenticating items, and determine whether near field communication (NFC) terminal, to show according to the result of checking.
Said item authentication method based near field communication (NFC) terminal in verification msg described in the step c only from background server; Near field communication (NFC) terminal does not carry any function that can individual authentication article authenticity, can only accomplish verification operation through the verification msg that background server returns.
Said intrinsic data can provide by the certified products visual information such as the feature descriptions such as literal, picture of checking article, as supplementary and the manual identification information beyond the checking result.
Adopt logic encryption card like the Near Field Communication sign; Then the verification method of steps d is: verification msg is pairing password and the Card Reader correct result expected; Item Mark is deciphered the information of reading with the password that the employing of low coverage communicating terminal obtains from background server and correct result is compared.
Adopt the CPU contactless smart card like the Near Field Communication sign, then a kind of verification method of steps d is: verification msg comprises the required parameter of password reconciliation signature of encrypted tunnel; Confirmation method is: set up encrypted tunnel with password, read the data of smart card, then data are separated the operation acknowledgement result of signature.
Adopt the CPU contactless smart card like the Near Field Communication sign; Then the another kind of verification method of steps d is: when the Near Field Communication terminal when Near Field Communication sign is set up data and is connected; The Near Field Communication sign is except providing sequence number; Also initiatively send the random challenge data, after these data are read at the Near Field Communication terminal, deliver to the background server end the challenge signature; Send challenge data, expected data and intrinsic data behind the signature back to the Near Field Communication terminal then, do by the CPU in the Near Field Communication sign and separate signature; If signature passes through, the Near Field Communication sign can discharge needed verification msg and give the Near Field Communication terminal; The data that the Near Field Communication sign discharges can directly be compared with the expected data that background server is come, and also can do affirmation with the way of signature verification.
Must store the background server pairing PKI digital certificate of signing in the said CPU contactless smart card, Digital Signature Algorithm can adopt DSA, RSA, the public key algorithm that ECDSA etc. are general.
After said item authentication method based near field communication (NFC) terminal is verified in steps d and finished, near field communication (NFC) terminal will verify that the result is delivered to background server, as the data source of obtaining statistical information.
Through accompanying drawing and embodiment, technical scheme of the present invention is done further detailed description below.
Description of drawings
The flow chart that Fig. 1 provides for first embodiment of the invention based on the item authentication method of near field communication (NFC) terminal;
The flow chart that Fig. 2 provides for second embodiment of the invention based on the item authentication method of near field communication (NFC) terminal;
The flow chart that Fig. 3 provides for third embodiment of the invention based on the item authentication method of near field communication (NFC) terminal.
Embodiment
In order to make the object of the invention, technical scheme and advantage clearer,, the present invention is further elaborated in conjunction with accompanying drawing and embodiment.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
In embodiments of the present invention, at first article have the Near Field Communication sign of coding in advance; Obtain the mark number of article by near field communication (NFC) terminal; And the identification number that will obtain article is sent to background server through network, carries out cryptography arithmetic, obtains verification msg and intrinsic data; Last background server turns back to verification msg and intrinsic data the authenticity of near field communication (NFC) terminal checking article.
The flow chart that Fig. 1 has provided that first embodiment of the invention provides based on the item authentication method of near field communication (NFC) terminal, this flow process is applicable to that the authentication Near Field Communication is masked as the article of logic encryption card, its detailed step is described below:
At first, article have the Near Field Communication sign of coding in advance;
In step x1, near field communication (NFC) terminal obtains the mark number of article.
In embodiments of the present invention, the mark number of article comprises the trade name of article model, article, the trade mark of article, the bar code of article, the sequence number of article, unique sequence number UID of UFC sign etc.; The obtaining means of the mark number of article can also be used the method input terminal of optical scanner and artificial input except employing Near Field Communication terminal obtains automatically.
In step x2, the identification number that near field communication (NFC) terminal will obtain article is sent to background server through network, carries out cryptography arithmetic, obtains verification msg and intrinsic data.
The data of described verification msg for producing and obtain according to the cryptography principle are used for and are undertaken alternately by the mark number on the authenticating items, to accomplish proof procedure; Said intrinsic data are by the correct result of authenticating items, and determine whether near field communication (NFC) terminal, to show according to the result of checking.
In step x3, background server turns back near field communication (NFC) terminal with verification msg and intrinsic data.In embodiments of the present invention, verification msg comprises the Card Reader correct result that access to your password and expected corresponding with the mark number of article.
Described verification msg is only from background server, and near field communication (NFC) terminal does not carry any function that can individual authentication article authenticity, can only accomplish verification operation through the verification msg that background server returns.
Said intrinsic data can provide by the certified products visual information such as the feature descriptions such as literal, picture of checking article, as supplementary and the manual identification information beyond the checking result.
In step x4, Item Mark is deciphered the information of reading with the password that the employing of low coverage communicating terminal obtains from background server and correct result is compared.
At last, if compare successfully then show checking, and show that relevant Item Information supplies the user further to check through information.
After checking finishes, near field communication (NFC) terminal will verify that the result is delivered to background server, as the data source of obtaining statistical information.
The flow chart that Fig. 2 has provided that second embodiment of the invention provides based on the item authentication method of near field communication (NFC) terminal, this flow process is applicable to that the authentication Near Field Communication is masked as the article of CPU contactless smart card, its detailed step is described below:
At first, article have the Near Field Communication sign of coding in advance;
In step y1, near field communication (NFC) terminal obtains the mark number of article.
In embodiments of the present invention, the mark number of article comprises the trade name of article model, article, the trade mark of article, the bar code of article, the sequence number of article, unique sequence number UID of UFC sign etc.; The obtaining means of the mark number of article can also be used the method input terminal of optical scanner and artificial input except employing Near Field Communication terminal obtains automatically.
In step y2, near field communication (NFC) terminal will obtain the identification number of article and set up encryption channel and background server communication as key and contactless smart card, obtain verification msg and intrinsic data.
The data of described verification msg for producing and obtain according to the cryptography principle are used for and are undertaken alternately by the mark number on the authenticating items, to accomplish proof procedure; Said intrinsic data are by the correct result of authenticating items, and determine whether near field communication (NFC) terminal, to show according to the result of checking.
In step y3, background server turns back near field communication (NFC) terminal with verification msg and intrinsic data.In embodiments of the present invention, verification msg comprises the required parameter of password reconciliation signature of encrypted tunnel.
Described verification msg is only from background server, and near field communication (NFC) terminal does not carry any function that can individual authentication article authenticity, can only accomplish verification operation through the verification msg that background server returns.
Said intrinsic data can provide by the certified products visual information such as the feature descriptions such as literal, picture of checking article, as supplementary and the manual identification information beyond the checking result.
In step y4, the data that near field communication (NFC) terminal is read smart card with encrypted tunnel, the result is confirmed in the operation of then data being separated signature.
At last, if compare successfully then show checking, and show that relevant Item Information supplies the user further to check through information.
After checking finishes, near field communication (NFC) terminal will verify that the result is delivered to background server, as the data source of obtaining statistical information.
The flow chart that Fig. 3 has provided that third embodiment of the invention provides based on the item authentication method of near field communication (NFC) terminal, this flow process is applicable to that the authentication Near Field Communication is masked as the article of CPU contactless smart card, its detailed step is described below:
At first, article have the Near Field Communication sign of coding in advance;
In step z1, near field communication (NFC) terminal obtains the mark number of article.
In embodiments of the present invention, the mark number of article comprises the trade name of article model, article, the trade mark of article, the bar code of article, the sequence number of article, unique sequence number UID of UFC sign etc.; The obtaining means of the mark number of article can also be used the method input terminal of optical scanner and artificial input except employing Near Field Communication terminal obtains automatically.
In step z2; When the Near Field Communication sign was set up data and is connected, the Near Field Communication sign also initiatively sent the random challenge data except sequence number is provided when the Near Field Communication terminal; After these data are read at the Near Field Communication terminal, deliver to the background server end to the challenge signature.
The data of described verification msg for producing and obtain according to the cryptography principle are used for and are undertaken alternately by the mark number on the authenticating items, to accomplish proof procedure; Said intrinsic data are by the correct result of authenticating items, and determine whether near field communication (NFC) terminal, to show according to the result of checking.
In step z3, the challenge data after background server will be signed, expectation data and intrinsic data are returned near field communication (NFC) terminal, are done by the CPU in the Near Field Communication sign and separate signature; If signature passes through, the Near Field Communication sign can discharge needed verification msg and give the Near Field Communication terminal.
In step z4, the data that the Near Field Communication sign discharges can directly be compared with the expected data that background server is come, and also can do affirmation with the way of signature verification.
At last, if compare successfully then show checking, and show that relevant Item Information supplies the further artificial nucleus of user right through information.
After checking finishes, near field communication (NFC) terminal will verify that the result is delivered to background server, as the data source of obtaining statistical information.
In embodiments of the present invention, the mark number of article comprises the trade mark of trade name, the article of article itself, article model, article, the bar code of article, the sequence number of article, unique sequence number UID of UFC sign etc., at this not in order to restriction the present invention.
One of ordinary skill in the art will appreciate that all or part of step that realizes in the foregoing description method is to instruct relevant hardware to accomplish through program; Described program can be stored in the computer read/write memory medium; Said storage medium is like ROM/RAM, disk, CD etc.
The above is merely preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of within spirit of the present invention and principle, being done, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. item authentication method based near field communication (NFC) terminal, its characteristic may further comprise the steps:
Step a: article have the Near Field Communication sign of coding in advance;
Step b: near field communication (NFC) terminal obtains the mark number of article;
Step c: the identification number that will obtain article is sent to background server through network, carries out cryptography arithmetic, obtains verification msg and intrinsic data;
Steps d: the authenticity that verification msg and intrinsic data is turned back to the near field communication (NFC) terminal checking article.
2. the item authentication method based near field communication (NFC) terminal as claimed in claim 1, its characteristic comprises:
The mark number of the article in step b comprises the trade name of article model, article, the trade mark of article, the bar code of article, the sequence number of article, unique sequence number UID of Near Field Communication sign etc.; The obtaining means of the mark number of article can also be used the method input terminal of optical scanner and artificial input except employing Near Field Communication terminal obtains automatically.
3. the item authentication method based near field communication (NFC) terminal as claimed in claim 1, its characteristic comprises:
In the data of verification msg described in the step c, be used for and undertaken alternately, to accomplish proof procedure by the mark number on the authenticating items for producing and obtain according to the cryptography principle; Said intrinsic data are by the correct result of authenticating items, and determine whether near field communication (NFC) terminal, to show according to the result of checking.
4. the item authentication method based near field communication (NFC) terminal as claimed in claim 1, its characteristic comprises:
Only from background server, near field communication (NFC) terminal does not carry any function that can individual authentication article authenticity, can only accomplish verification operation through the verification msg that background server returns in verification msg described in the step c.
5. the item authentication method based near field communication (NFC) terminal as claimed in claim 3, its characteristic comprises:
Said intrinsic data can provide by the certified products visual information such as the feature descriptions such as literal, picture of checking article, as supplementary and the manual identification information beyond the checking result.
6. the item authentication method based near field communication (NFC) terminal as claimed in claim 1, its characteristic comprises:
Adopt logic encryption card like the Near Field Communication sign; Then the verification method of steps d is: verification msg is pairing password and the Card Reader correct result expected; Item Mark is deciphered the information of reading with the password that the employing of low coverage communicating terminal obtains from background server and correct result is compared.
7. the item authentication method based near field communication (NFC) terminal as claimed in claim 1, its characteristic comprises:
Adopt the CPU contactless smart card like the Near Field Communication sign, then a kind of verification method of steps d is: verification msg comprises the required parameter of password reconciliation signature of encrypted tunnel; Confirmation method is: set up encrypted tunnel with password, read the data of smart card, then data are separated the operation acknowledgement result of signature.
8. the item authentication method based near field communication (NFC) terminal as claimed in claim 1, its characteristic comprises:
Adopt the CPU contactless smart card like the Near Field Communication sign; Then the another kind of verification method of steps d is: when the Near Field Communication terminal when Near Field Communication sign is set up data and is connected; The Near Field Communication sign is except providing sequence number; Also initiatively send the random challenge data, after these data are read at the Near Field Communication terminal, deliver to the background server end the challenge signature; Send challenge data, expected data and intrinsic data behind the signature back to the Near Field Communication terminal then, do by the CPU in the Near Field Communication sign and separate signature; If signature passes through, the Near Field Communication sign can discharge needed verification msg and give the Near Field Communication terminal; The data that the Near Field Communication sign discharges can directly be compared with the expected data that background server is come, and also can do affirmation with the way of signature verification.
9. the item authentication method based near field communication (NFC) terminal as claimed in claim 8, its characteristic comprises:
Must store the background server pairing PKI digital certificate of signing in the said CPU contactless smart card, Digital Signature Algorithm can adopt DSA, RSA, the public key algorithm that ECDSA etc. are general.
10. the item authentication method based near field communication (NFC) terminal as claimed in claim 1, its characteristic comprises:
After checking finishes in steps d, near field communication (NFC) terminal will verify that the result is delivered to background server, as the data source of obtaining statistical information.
CN2011103303110A 2011-10-19 2011-10-19 Object certification method based on short-distance communication terminal Pending CN102404118A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011103303110A CN102404118A (en) 2011-10-19 2011-10-19 Object certification method based on short-distance communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011103303110A CN102404118A (en) 2011-10-19 2011-10-19 Object certification method based on short-distance communication terminal

Publications (1)

Publication Number Publication Date
CN102404118A true CN102404118A (en) 2012-04-04

Family

ID=45885939

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011103303110A Pending CN102404118A (en) 2011-10-19 2011-10-19 Object certification method based on short-distance communication terminal

Country Status (1)

Country Link
CN (1) CN102404118A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102708347A (en) * 2012-04-12 2012-10-03 福建联迪商用设备有限公司 Bar-code reading method and equipment
WO2013189250A1 (en) * 2012-06-20 2013-12-27 惠州Tcl移动通信有限公司 Augmented reality method and system for mobile communication terminal
CN103824107A (en) * 2013-11-15 2014-05-28 深圳光启创新技术有限公司 Product identification apparatus, terminal, and product information verification system and method
CN106056268A (en) * 2016-05-17 2016-10-26 北京诺士诚国际工程项目管理有限公司 Engineering project management cloud platform system based on material tracking
CN106203556A (en) * 2016-07-18 2016-12-07 智能唯识科技(深圳)有限公司 A kind of method and device of reading electronic labels information
CN107295062A (en) * 2017-05-05 2017-10-24 北京摩拜科技有限公司 Article uses control method, equipment, system and article
CN110533128A (en) * 2019-08-21 2019-12-03 上海唯链信息科技有限公司 A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1684099A (en) * 2004-04-16 2005-10-19 东方惠科防伪技术有限公司 Method for identifying and verifying truth of goods using digital array
CN101520865A (en) * 2009-03-31 2009-09-02 薛忠华 Anti-drug counterfeiting method using radio frequency electronic tag and public key infrastructure

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1684099A (en) * 2004-04-16 2005-10-19 东方惠科防伪技术有限公司 Method for identifying and verifying truth of goods using digital array
CN101520865A (en) * 2009-03-31 2009-09-02 薛忠华 Anti-drug counterfeiting method using radio frequency electronic tag and public key infrastructure

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102708347A (en) * 2012-04-12 2012-10-03 福建联迪商用设备有限公司 Bar-code reading method and equipment
WO2013189250A1 (en) * 2012-06-20 2013-12-27 惠州Tcl移动通信有限公司 Augmented reality method and system for mobile communication terminal
CN103824107A (en) * 2013-11-15 2014-05-28 深圳光启创新技术有限公司 Product identification apparatus, terminal, and product information verification system and method
CN106056268A (en) * 2016-05-17 2016-10-26 北京诺士诚国际工程项目管理有限公司 Engineering project management cloud platform system based on material tracking
CN106203556A (en) * 2016-07-18 2016-12-07 智能唯识科技(深圳)有限公司 A kind of method and device of reading electronic labels information
CN106203556B (en) * 2016-07-18 2019-10-01 智能唯识科技(深圳)有限公司 A kind of method and device reading electronic labeling information
CN107295062A (en) * 2017-05-05 2017-10-24 北京摩拜科技有限公司 Article uses control method, equipment, system and article
CN107295062B (en) * 2017-05-05 2018-06-19 北京摩拜科技有限公司 Article uses control method, equipment, system and article
CN110533128A (en) * 2019-08-21 2019-12-03 上海唯链信息科技有限公司 A kind of anti-fake data processing method of tracing to the source, device, system and medium based on encryption

Similar Documents

Publication Publication Date Title
CN102647276B (en) For the system and method for equipment and data authentication
CN101923660B (en) Dynamic password identity authorization system and method based on RFID
CN106529969B (en) Method and system for checking fake source by NFC
CN103295143B (en) Commodity antifake check method
CN102404118A (en) Object certification method based on short-distance communication terminal
CN103001773B (en) Fingerprint authentication system and fingerprint authentication method based on near field communication (NFC)
US9928390B1 (en) Network-enabled RFID tag endorsement
CN103345690B (en) Anti-counterfeiting method based on RFID and physical unclonable function
CN104680389A (en) NFC mobile phone terminal anti-fake system and method based on time encryption
CN105354604A (en) Effective novel anti-counterfeiting method based on physical unclonable function
CN103150655A (en) Public key infrastructure (PKI)-based radio frequency identification (RFID) anti-counterfeiting system
CN102831529A (en) Radio frequency based commodity information identification method and system
CN101504731B (en) Movable recognition system based on NFC
CN101452539A (en) Mobile identification method based on NFC
CN103530785A (en) Double anti-counterfeiting system and method based on near field communication (NFC) function
CN104243164A (en) Dynamic encryption non-contact type anti-counterfeit label and control method
CN104424568A (en) Authentication false-proof traceability system employing circuit core chip ID number as identification
CN202870898U (en) Radio frequency-based commodity information identification system
CN106385320B (en) RFID anti-counterfeiting device and anti-counterfeiting method based on PUF and digital signature
CN103971245B (en) A kind of combined ciphering system false proof for electronic article
CN106712952B (en) Radio frequency tag security identification method and system
CN111709747B (en) Intelligent terminal authentication method and system
CN103136667B (en) There is the smart card of electronic signature functionality, smart card transaction system and method
Eldefrawy et al. Banknote Validation through an Embedded RFID Chip and an NFC‐Enabled Smartphone
CN109948387A (en) Cluster label authentication method based on quadratic residue lightweight RFID

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
CB03 Change of inventor or designer information

Inventor after: Chen Jian

Inventor after: Ma Zhao

Inventor before: Chen Jian

Inventor before: Ou Yangjun

Inventor before: Su Xiang

COR Change of bibliographic data
TA01 Transfer of patent application right

Effective date of registration: 20151123

Address after: 212000 Zhenjiang City, Jiangsu province Jiefang Road Jingkou District No. 18 1401-1402

Applicant after: Jiangsu Network Technology Co., Ltd. fennel

Address before: 212009 Zhenjiang city in Jiangsu province by twelve Dingmao Road No. 668 707-2

Applicant before: Chen Jian

WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120404

WD01 Invention patent application deemed withdrawn after publication