CN103297225B - A kind of clean culture secret communication method and multicast secret communication method based on identity - Google Patents

A kind of clean culture secret communication method and multicast secret communication method based on identity Download PDF

Info

Publication number
CN103297225B
CN103297225B CN201310177224.5A CN201310177224A CN103297225B CN 103297225 B CN103297225 B CN 103297225B CN 201310177224 A CN201310177224 A CN 201310177224A CN 103297225 B CN103297225 B CN 103297225B
Authority
CN
China
Prior art keywords
key
recipient
identity
secret communication
multicast
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310177224.5A
Other languages
Chinese (zh)
Other versions
CN103297225A (en
Inventor
顾纯祥
潘晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gu Chunxiang
Original Assignee
HENAN GONGXING INFORMATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HENAN GONGXING INFORMATION TECHNOLOGY CO LTD filed Critical HENAN GONGXING INFORMATION TECHNOLOGY CO LTD
Priority to CN201310177224.5A priority Critical patent/CN103297225B/en
Publication of CN103297225A publication Critical patent/CN103297225A/en
Application granted granted Critical
Publication of CN103297225B publication Critical patent/CN103297225B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to a kind of clean culture secret communication method and multicast secret communication method based on identity, belong to command, control, communications, and information safe practice field. The present invention is based on identification cipher technology and set up secure communication channel, privacy and the security of validated user operation are ensured, key management is simple, system key administrative center only need to be responsible for every user and creates and distribute private key, master key and one group of common parameter file of security centre are managed, the encapsulation taking identity as tagged keys, as long as know that the other side's identify label can realize the secret communication based on cryptographic technique.

Description

A kind of clean culture secret communication method and multicast secret communication method based on identity
Technical field
The present invention relates to a kind of clean culture secret communication method and multicast secret communication method based on identity, belong to logicalLetter and field of information security technology.
Background technology
In today of network technology develop rapidly, communication encryption is the important means that realizes information security. Tradition peaceFull means adopt public key cryptography technology to realize the foundation of certification and safe lane conventionally, but this type systematic relies onPKI/CA(PublicKeyInfrastructure/CertificateAuthority) PKIX, has peaceFull property advantages of higher, but also there is the deficiencies such as key management complexity simultaneously.
For simplifying the cipher key management considerations of conventional public-key system, within 1984, Shamir proposes based on identification cipher IBC(IdentityBasedCryptography) thought: by disclosed subscriber identity information (as e-mail address,IP address, name etc.) as the right PKI part of client public key/private key, private key for user is called private key by oneGeneration person's (PKG) trusted third party generates. PKI/CA technology, direct based on identification cipher system relativelyTaking user's identity information as PKI, management and discriminating that need not public key certificate bring greatly just in applicationProfit. Calendar year 2001, utilize bilinear map to construct an effective base at American scholar Boneh and FranklinIn identity ciphering system, this achievement makes the Remarkable Progress On Electric Artificial progress based on identification cipher. Subsequently, profitWith bilinear map, people also designed some meet specific cryptosystem demand based on identification cipher algorithm, as:Multistage (Hierarchical) based on identity ciphering system, the label dense body system based on identity, the agency based on identitySignature system, blind signature mechanisms, IKE based on identity, etc. From realizing technology, twoLinear Mapping can utilize Weil on elliptic curve and hyperelliptic curve to Tate to constructing, wherein TateTo thering is better implementation efficiency. Relevant research makes the technology that realizes of IBC more ripe efficient.
2006, International Organization for Standardization provided two based on identity in ISO14888-3Signature system standard. IEEE has organized special in identification cipher working group (IEEEP1363.3), and inDuring February 15 to 15 days Augusts in 2006 in 2006, seek the opinion of based on identification cipher draft standard. IETF'sSMIME working group has also started the standardization effort of applying in Email based on identification cipher. The U.S.NIST sets up IBC working group, and announces to adopt the candidate of IBC as protection sensitive information in July, 2008Technology. In above-mentioned work, China has also started the standardized process based on identification cipher. Along with theoretical andRealize reaching its maturity of technology, in the application of security that requires efficient key management and moderate strength, baseCryptographic system in identity can replace PKI/CA system, becomes a new selection that builds information security system.
Summary of the invention
The object of this invention is to provide a kind of clean culture secret communication method and multicast secret communication side based on identityMethod, conventionally adopts and relies on PKI/CA(PublicKeyInfrastructure/Certificate to solve at presentAuthority) public key cryptography technology of PKIX is realized secret communication and is caused asking of key management complexityTopic.
In order to solve the problems of the technologies described above, also provide can a kind of clean culture secret communication method based on identity in the present invention, shouldThe step of clean culture secret communication method is as follows:
1) recipient of unicast communication obtains identity private key D according to identity information ID, D=(s+H1(ID))-1P,S is master key, parameterWherein G1And G2Be respectively adding of q rankMethod cyclic group and multiplication loop group,Be the bilinear map meeting the demands, P is G1Generator, Ppub=sP,H1And H2For Hash function, wherein
2) transmit leg calls the key encapsulation KEM algorithm Encapsulate based on recipient's identity, and input connectsDebit identifies ID, chooses at random r ∈ Zq, calculate t=H3(r),CalculateR=t(Ppub+H1(ID)P),key=H4(r), whereinH3,H4For Hash function, output sends recipient to and is used for information (R, v) and this locality of session key generation and addsClose session key key;
3) transmit leg, to message m, calls symmetric encipherment algorithm and with session key key, m is encryptedC=Enc (m, key), sends to recipient by (c, (R, v));
4) recipient calls key deblocking algorithm key=Decapsulate (D, (R, v)), input recipient private key D(R, v), output decrypted session key key: calculate Calculatet=H3(r), if R=t is (Ppub+H1(ID) P), export key=H4(r), taking key as session key to closeLiterary composition c is decrypted m=Dec (c, key), obtains clear-text message m, and transmit leg has completed maintaining secrecy to message mCommunication.
In described step 1), the process of recipient's private key D is as follows:
A. recipient submits to security centre by self identity information ID and registers, and security centre accepts registrationRequest, and the identity information in registration request is submitted to key server;
B. key server generates identity private key D according to identity information ID and system master key s, believes by safetyRoad returns to security centre, and security centre returns to recipient by identity private key D by safe lane.
The present invention also provides a kind of multicast secret communication method based on identity for solving the problems of the technologies described above, shouldThe step of multicast secret communication method is as follows:
1) recipient of multi-casting communication is according to identity information ID separately1,ID2,...,IDnObtain respectively identity private keyD1,D2,...,Dn,Di=(s+H1(IDi))-1P, s is master key, parameterWherein G1And G2The addition cyclic group and the multiplication that are respectively q rank followRing group,Be the bilinear map meeting the demands, P is G1Generator, Ppub=sP,H1And H2For Hash function, wherein
2) transmit leg calls the many recipients key encapsulation algorithm based on based on identityMulti-Encapsulate(ID1,ID2,...,IDn), input recipient identifies ID1,ID2,...,IDn, choose at randomr∈Zq, calculate t=H3(r),Calculate Ri=t(Ppub+H1(IDi)P),i=1,2,...,n,key=H4(r), whereinH3,H4ForHash function, output sends recipient to and is used for the information { (ID of session key generationi,Ri,vi)}i=1,...nAnd this localityEncrypted session key key;
3) transmit leg, to message m, calls symmetric encipherment algorithm and with session key key, m is encryptedC=Enc (m, key), by (c, { (IDi,Ri,vi)}i=1,...,n) send to each recipient as multicast message;
4) recipient IDiReceive after multicast message, call multicast key deblocking algorithmkey=Multi-Decapsulate(Di,{(IDi,Ri,vi)}i=1,...,n), input recipient IDiCorresponding private keyDi, according to self IDiMate corresponding (IDi,Ri,vi), calculate MeterCalculate t=H3(r), if Ri=t(Ppub+H1(IDi) P), export key=H4(r), taking key as session keyCiphertext c is decrypted to m=Dec (c, key), obtains clear-text message m, transmit leg has completed and recipient coupleThe secret communication of message m, in like manner, each recipient obtains the cleartext information that transmit leg sends, thereby completesWhole multicast coded communication process.
The recipient ID of multi-casting communication in described step 1)1,ID2,...,IDnObtain each self-corresponding recipient's private keyD1,D2,...,DnProcess as follows:
A. the recipient of multi-casting communication is by self identity information ID1,ID2,...,IDnSubmitting to security centre notesVolume, security centre accepts registration request, and the identity information in registration request is submitted to key server;
B. key server is according to identity information ID1,ID2,...,IDnGenerate body separately with system master key sPart private key D1,D2,...,Dn, returning to security centre by safe lane, security centre is by identity private keyD1,D2,...,DnReturn to each recipient of corresponding multi-casting communication by safe lane. Of the present invention usefulEffect is: the present invention is based on identification cipher technology and set up secure communication channel, ensured validated user operation privacy andSecurity, key management is simple, and system key administrative center only need to be responsible for every user and creates and distribute private key, managesThe master key of good security centre and one group of common parameter file, the encapsulation taking identity as tagged keys, as long as know the other side'sIdentify label can realize the secret communication based on cryptographic technique.
Brief description of the drawings
Fig. 1 is based on identification cipher system architecture diagram in the present invention.
Detailed description of the invention
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described further.
The present invention proposes a kind of clean culture secret communication method and multicast secret communication method based on identity, utilizes basePrivacy and the security of validated user operation have been ensured in identification cipher. With traditional PKI/CA technology mechanism notWith, in based on identification cipher system with the disclosed identity information of user (as e-mail address, IP address, nameEtc.) as the right PKI part of client public key/private key, private key for user is called private key generation person (PKG) by oneTrusted third party generate. One based on identification cipher system as shown in Figure 1, by security centre and groups of usersBecome, security centre provides cipher key management services to user, and user is utilizing security password algorithm to realize key encapsulationDeng crypto-operation and processing. Obtain after identity private key, between application server and user, user, just can utilizeIdentity private key carries out the secret communication based on identity.
The embodiment of a kind of clean culture secret communication method based on identity of the present invention
Concrete scheme and step are as follows:
1. the recipient of unicast communication submits to security centre by identity information ID and registers, and security centre acceptsRegistration request, and the identity information in registration request is submitted to key server, key server is according to this bodyPart Information ID and system master key s generate identity private key D, D=(s+H1(ID))-1P, s is master key, parameterWherein G1And G2Be respectively the addition cyclic group on q rank and take advantage ofMethod cyclic group,Be the bilinear map meeting the demands, P is G1Generator, Ppub=sP,H1And H2For Hash function, wherein Key server is by bodyPart private key D returns to recipient ID by safe lane.
2) transmit leg calls the key encapsulation KEM algorithm Encapsulate based on recipient's identity, and input connectsDebit identifies ID, chooses at random r ∈ Zq, calculate t=H3(r),CalculateR=t(Ppub+H1(ID)P),key=H4(r), whereinH3,H4For Hash function, output sends recipient to and is used for information (R, v) and this locality of session key generation and addsClose session key key.
3) transmit leg, to message m, calls symmetric encipherment algorithm and with session key key, m is encryptedC=Enc (m, key), sends to recipient by (c, (R, v)).
4) recipient calls key deblocking algorithm key=Decapsulate (D, (R, v)), input recipient private key D(R, v), output decrypted session key key: calculate Calculatet=H3(r), if R=t is (Ppub+H1(ID) P), export key=H4(r), taking key as session key to closeLiterary composition c is decrypted m=Dec (c, key), obtains clear-text message m, and transmit leg has completed the clean culture to message mSecret communication.
The embodiment of a kind of multicast secret communication method based on identity of the present invention
1. the recipient of multi-casting communication is by identity information ID separately1,ID2,...,IDnSubmit to respectively security centreRegister, security centre accepts registration request, and the identity information in registration request is submitted to cipher key serviceDevice, key server basis identity information ID separately1,ID2,...,IDnGenerate respectively and generate with system master key sCorresponding identity private key D separately1,D2,...,Dn,Di=(s+H1(IDi))-1P, s is master key, parameterWherein G1And G2Be respectively the addition cyclic group on q rank and take advantage ofMethod cyclic group,Be the bilinear map meeting the demands, P is G1Generator, Ppub=sP,H1And H2For Hash function, wherein Key server generatesIdentity private key D1,D2,...,Dn, returning to security centre by safe lane, security centre is by identity private keyD1,D2,...,DnReturn to each recipient of corresponding multi-casting communication by safe lane.
2 transmit legs call the many recipients key encapsulation algorithm based on based on identityMulti-Encapsulate(ID1,ID2,...,IDn), input recipient identifies ID1,ID2,...,IDn, choose at randomr∈Zq, calculate t=H3(r),Calculate Ri=t(Ppub+H1(IDi)P),i=1,2,...,n,key=H4(r), whereinH3,H4ForHash function, output sends recipient to and is used for the information { (ID of session key generationi,Ri,vi)}i=1,...nAnd this localityEncrypted session key key.
3 transmit legs, to message m, call symmetric encipherment algorithm and with session key key, m are encryptedC=Enc (m, key), by (c, { (IDi,Ri,vi)}i=1,...,n) send to each recipient as multicast message.
4 recipient IDiReceive after multicast message, call multicast key deblocking algorithmkey=Multi-Decapsulate(Di,{(IDi,Ri,vi)}i=1,...,n), input recipient IDiCorresponding private keyDi, according to self IDiMate corresponding (IDi,Ri,vi), calculate MeterCalculate t=H3(r), if Ri=t(Ppub+H1(IDi) P), export key=H4(r), taking key as session keyCiphertext c is decrypted to m=Dec (c, key), obtains clear-text message m, transmit leg has completed and recipient coupleThe secret communication of message m, in like manner, each recipient obtains the cleartext information that transmit leg sends, thereby completesWhole multicast coded communication process.

Claims (4)

1. the clean culture secret communication method based on identity, is characterized in that: this clean culture secret communication methodStep as follows:
1) recipient of unicast communication obtains identity private key D according to identity information ID, D=(s+H1(ID))-1P,S is master key, parameterWherein G1And G2Be respectively adding of q rankMethod cyclic group and multiplication loop group,Be the bilinear map meeting the demands, P is G1Generator, Ppub=sP,H1And H2For Hash function, wherein
2) transmit leg calls the key encapsulation KEM algorithm Encapsulate based on recipient's identity, with identityCarry out key encapsulation for mark, input recipient identifies ID, chooses at random r ∈ Zq, calculate t=H3(r),Calculate R=t (Ppub+H1(ID)P),key=H4(r), whereinH3,H4For Hash function, output sends recipient to and is used for session key generationInformation (R, v) and local cipher session key key;
3) transmit leg, to message m, calls symmetric encipherment algorithm and with session key key, m is encryptedC=Enc (m, key), sends to recipient by (c, (R, v));
4) recipient calls key deblocking algorithm key=Decapsulate (D, (R, v)), input recipient private key D(R, v), output decrypted session key key: calculateCalculatet=H3(r), if R=t is (Ppub+H1(ID) P), export key=H4(r), taking key as session key to closeLiterary composition c is decrypted m=Dec (c, key), obtains clear-text message m, and transmit leg has completed maintaining secrecy to message mCommunication.
2. the clean culture secret communication method based on identity according to claim 1, is characterized in that: described inStep 1) in the process of recipient's private key D as follows:
A. recipient submits to security centre by self identity information ID and registers, and security centre accepts registrationRequest, and the identity information in registration request is submitted to key server;
B. key server generates identity private key D according to identity information ID and system master key s, believes by safetyRoad returns to security centre, and security centre returns to recipient by identity private key D by safe lane.
3. the multicast secret communication method based on identity, is characterized in that: this multicast secret communication methodStep as follows:
1) recipient of multi-casting communication is according to identity information ID separately1,ID2,...,IDnObtain respectively identity private keyD1,D2,...,Dn,Di=(s+H1(IDi))-1P, s is master key, parameterWherein G1And G2The addition cyclic group and the multiplication that are respectively q rank followRing group,Be the bilinear map meeting the demands, P is G1Generator, Ppub=sP,H1And H2For Hash function, wherein
2) transmit leg calls the many recipients key encapsulation algorithm based on identityMulti-Encapsulate(ID1,ID2,...,IDn), carry out key encapsulation taking identity as mark, input recipient markKnow ID1,ID2,...,IDn, choose at random r ∈ Zq, calculate t=H3(r),CalculateRi=t(Ppub+H1(IDi)P),i=1,2,...,n,key=H4(r), whereinH3,H4For Hash function, output sends recipient to and is used for session key generationInformation { (IDi,Ri,vi)}i=1,...nWith local cipher session key key;
3) transmit leg, to message m, calls symmetric encipherment algorithm and with session key key, m is encryptedC=Enc (m, key), by (c, { (IDi,Ri,vi)}i=1,...,n) send to each recipient as multicast message;
4) recipient IDiReceive after multicast message, call multicast key deblocking algorithmkey=Multi-Decapsulate(Di,{(IDi,Ri,vi)}i=1,...,n), input recipient IDiCorresponding private key Di, according to self IDiMate corresponding (IDi,Ri,vi), calculateMeterCalculate t=H3(r), if Ri=t(Ppub+H1(IDi) P), export key=H4(r), taking key as session keyCiphertext c is decrypted to m=Dec (c, key), obtains clear-text message m, transmit leg has completed and recipient coupleThe secret communication of message m, in like manner, each recipient obtains the cleartext information that transmit leg sends, thereby completesWhole multicast coded communication process.
4. the multicast secret communication method based on identity according to claim 3, is characterized in that: described inStep 1) in the recipient ID of multi-casting communication1,ID2,...,IDnObtain each self-corresponding recipient's private keyD1,D2,...,DnProcess as follows:
A. the recipient of multi-casting communication is by self identity information ID1,ID2,...,IDnSubmitting to security centre notesVolume, security centre accepts registration request, and the identity information in registration request is submitted to key server;
B. key server is according to identity information ID1,ID2,...,IDnGenerate identity private key separately with system master key sD1,D2,...,Dn, returning to security centre by safe lane, security centre is by identity private key D1,D2,...,DnLogicalCross each recipient that safe lane returns to corresponding multi-casting communication.
CN201310177224.5A 2013-05-14 2013-05-14 A kind of clean culture secret communication method and multicast secret communication method based on identity Expired - Fee Related CN103297225B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310177224.5A CN103297225B (en) 2013-05-14 2013-05-14 A kind of clean culture secret communication method and multicast secret communication method based on identity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310177224.5A CN103297225B (en) 2013-05-14 2013-05-14 A kind of clean culture secret communication method and multicast secret communication method based on identity

Publications (2)

Publication Number Publication Date
CN103297225A CN103297225A (en) 2013-09-11
CN103297225B true CN103297225B (en) 2016-05-11

Family

ID=49097583

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310177224.5A Expired - Fee Related CN103297225B (en) 2013-05-14 2013-05-14 A kind of clean culture secret communication method and multicast secret communication method based on identity

Country Status (1)

Country Link
CN (1) CN103297225B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103929299B (en) * 2014-04-28 2017-05-10 王小峰 Self-securing lightweight network message transmitting method with address as public key
CN104717074B (en) * 2015-04-02 2019-06-25 东南大学 A kind of shared key safety communicating method merging private information
SG10201504240VA (en) * 2015-05-29 2016-12-29 Huawei Internat Pte Ltd A method and system for secure sms communications
CA3113488A1 (en) 2015-11-17 2017-05-26 Huawei Technologies Co., Ltd. Method and apparatus for video coding
CN109218016B (en) * 2017-07-06 2020-05-26 北京嘀嘀无限科技发展有限公司 Data transmission method and device, server, computer equipment and storage medium
CN111600711A (en) * 2017-07-06 2020-08-28 北京嘀嘀无限科技发展有限公司 Encryption and decryption system and encryption and decryption method for fine-grained mobile access
CN114627580B (en) * 2022-03-11 2023-10-27 青岛海信智慧生活科技股份有限公司 Intelligent door lock, state reporting method thereof and household equipment linkage system
CN118282778B (en) * 2024-05-31 2024-07-26 电科云(北京)科技有限公司 Key management method, data transmission method and system for computing nodes in multi-computing base

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
使用对技术的基于身份密码学研究综述;田野等;《计算机研究与发展》;20061107;正文第1.2节、第2.1节 *

Also Published As

Publication number Publication date
CN103297225A (en) 2013-09-11

Similar Documents

Publication Publication Date Title
CN103297225B (en) A kind of clean culture secret communication method and multicast secret communication method based on identity
CN103248488B (en) Identity-based key generation method and identity-based authentication method
CN101674304B (en) Network identity authentication system and method
CN107196926A (en) A kind of cloud outsourcing privacy set comparative approach and device
CN106712942B (en) SM2 digital signature generation method and system based on privacy sharing
Tseng et al. Privacy‐preserving multireceiver ID‐based encryption with provable security
Zhang et al. Efficient and Privacy‐Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks
Lv et al. Authenticated asymmetric group key agreement based on certificateless cryptosystem
CN103746811A (en) Anonymous signcryption method from identity public key system to certificate public key system
Guo et al. Hierarchical attribute‐based encryption with continuous auxiliary inputs leakage
Zhao et al. Black‐Box and Public Traceability in Multi‐authority Attribute Based Encryption
Wei et al. A practical one-time file encryption protocol for iot devices
Shim Cryptanalysis of two identity-based authenticated key agreement protocols
Zheng et al. Threshold attribute‐based signcryption and its application to authenticated key agreement
CN107294972B (en) Identity-based generalized multi-receiver anonymous signcryption method
Kwon et al. Security analysis and improvement of the efficient password-based authentication protocol
Bai Comparative research on two kinds of certification systems of the public key infrastructure (PKI) and the identity based encryption (IBE)
Jain et al. Identity based and attribute based cryptography: A survey
Zhang et al. New constructions of hierarchical attribute-based encryption for fine-grained access control in cloud computing
Luo et al. An Efficient Biometric Certificateless Signcryption Scheme.
Kwon et al. Efficient group key management of ZigBee network for home automation
He et al. An Improved Direct Anonymous Attestation Scheme for M2 M Networks
Nandhini et al. Provisioning of data security for file transformation on multi-cloud storage
Bhatia et al. Secure group communication with hidden group key
Eldewahi et al. Authenticated key agreement protocol for virtual private network based on certificateless cryptography

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
CB03 Change of inventor or designer information

Inventor after: Gu Chunxiang

Inventor after: Pan Xiaodong

Inventor before: Gu Chunxiang

Inventor before: Wang Yongsheng

Inventor before: Fei Jinlong

Inventor before: Zheng Yonghui

COR Change of bibliographic data
TA01 Transfer of patent application right

Effective date of registration: 20160415

Address after: Bamboo hi tech Industrial Development Zone, Henan province Zhengzhou City 450000 Street No. 6 national 863 Central Software Park Building No. 4 of No. 15

Applicant after: Henan Gongxing Information Technology Co.,Ltd.

Address before: Kim street Zhengzhou City Cultural Road 450002 Henan Province Hospital No. 7 Building No. 19, No. 21

Applicant before: Gu Chunxiang

C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200702

Address after: Room 301, unit 3, building 19, No. 7, Jianxue street, Wenhua Road, Jinshui District, Zhengzhou City, Henan Province

Patentee after: Gu Chunxiang

Address before: Bamboo hi tech Industrial Development Zone, Henan province Zhengzhou City 450000 Street No. 6 national 863 Central Software Park Building No. 4 of No. 15

Patentee before: HENAN GONGXING INFORMATION TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160511

Termination date: 20210514