CN104851159B - A kind of network-type access control system - Google Patents

A kind of network-type access control system Download PDF

Info

Publication number
CN104851159B
CN104851159B CN201410713170.4A CN201410713170A CN104851159B CN 104851159 B CN104851159 B CN 104851159B CN 201410713170 A CN201410713170 A CN 201410713170A CN 104851159 B CN104851159 B CN 104851159B
Authority
CN
China
Prior art keywords
random number
authentication code
number authentication
intermediate control
upper computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410713170.4A
Other languages
Chinese (zh)
Other versions
CN104851159A (en
Inventor
孙宇翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gaoxinxing Xunmei Chongqing Technology Co ltd
Original Assignee
XUNMEI ELECTRONICS TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XUNMEI ELECTRONICS TECHNOLOGY Co Ltd filed Critical XUNMEI ELECTRONICS TECHNOLOGY Co Ltd
Priority to CN201410713170.4A priority Critical patent/CN104851159B/en
Publication of CN104851159A publication Critical patent/CN104851159A/en
Application granted granted Critical
Publication of CN104851159B publication Critical patent/CN104851159B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The present invention provides a kind of network-type access control system, including host computer, neutral-controlled plant and access controller;The host computer is used to send certification request, and after the encryption data for receiving neutral-controlled plant transmission, is decrypted and obtains random number authentication code, random number authentication code is signed using digital signature then, and data are transferred back into neutral-controlled plant;After the neutral-controlled plant receives the certification request of host computer transmission, generation one random number authentication code is simultaneously encrypted to it, then the data is activation after encryption to host computer and is stored in neutral-controlled plant;And after the data for receiving host computer return, random number authentication code and signature are verified, and instruction execution signals are produced after being proved to be successful;The access controller is used to receive instruction execution signals and controls to open the door.The present invention provide system in access controller it is direct-connected with neutral-controlled plant, and to transmission director data be digitally signed checking, improve security.

Description

Network type access control system
Technical Field
The invention belongs to the field of access control systems, and particularly relates to a network type access control system.
Background
At present, a network type access controller is generally applied to positions such as a bank vault door, a self-service bank note adding room door, a public security armed police military firearms room and the like, an electronic lock is used for replacing a mechanical lock, and an IC card or biological characteristics are used for replacing a traditional key, so that the problems that the traditional mechanical lock is easy to crack and cannot trace back personnel for opening a lock are effectively solved.
When a disaster occurs, legal unlocking personnel may not be on site, so that the disaster can not be avoided by unlocking in the modes of IC card or fingerprint and the like. Therefore, in order to deal with various emergency situations, a network communication protocol is reserved in the network type access controller, and the protocol can enable any upper computer connected to the access controller in the network to have the remote door opening capability.
The application of the bank vault door is taken as an example for explanation: because the network type access controller is directly interacted with the outside in a network communication mode, the network type access controller is directly exposed in a network environment, and because the communication protocol of the access controller is disclosed to a third party developer, the inside of the controller does not have the function of carrying out identity validity verification on an upper computer, therefore, the access controller can obtain the control right of the access controller as long as the communication protocol can be taken by anyone, and thus, the extremely serious potential safety hazard is brought to the bank user. Therefore, aiming at the condition that the communication protocol of the current access controller is open to developers and is not encrypted, the inventor of the invention finds that an intruder (such as a hacker) can easily send a control instruction to the access control through a network, thereby obtaining the control right of the access control and bringing serious security loopholes to security management.
Disclosure of Invention
The invention provides a network type access control system, aiming at the technical problems that in the prior art, the communication protocol of an access controller is open to developers and is not encrypted, and an intruder can easily send a control instruction to an access control through a network, so that the control right of the access control is obtained, and serious security loopholes are brought to security management.
In order to achieve the purpose, the invention adopts the following technical scheme:
a network type access control system comprises an upper computer, intermediate control equipment and an access controller; wherein,
the upper computer is used for sending an authentication request, decrypting the authentication request by adopting an asymmetric key encryption technology after receiving encrypted data sent by the intermediate control equipment to obtain a random number authentication code, signing the random number authentication code by adopting a digital signature, and transmitting a door opening instruction, the random number authentication code and the signed random number authentication code back to the intermediate control equipment;
the intermediate control equipment is used for generating a random number authentication code after receiving an authentication request sent by the upper computer, encrypting the random number authentication code by adopting an asymmetric key encryption technology, sending the encrypted data to the upper computer and storing the encrypted data in the intermediate control equipment; after receiving a door opening instruction, a random number authentication code and a signed random number authentication code returned by the upper computer, verifying the random number authentication code and the signed random number authentication code, and generating a door opening instruction execution signal after the verification is successful;
and the access controller is used for receiving the door opening instruction execution signal and controlling the door to be opened.
The network type access control system provided by the invention is additionally provided with the intermediate control equipment, the access controller is directly connected with the intermediate control equipment, the intermediate control equipment is connected with an upper computer, the access control equipment is not exposed in a public network environment, all communications are transferred by the intermediate control equipment, and the possibility of directly accessing the access control equipment from the outside is physically isolated; the communication protocol is private and encrypted for transmission, and before executing the entrance guard control instruction, the digital signature verification is carried out on the sent instruction data to judge the reliability of the sending end, so that the possibility of invasion of an external invader such as a hacker is eliminated, and the security management safety is improved.
Further, the intermediate control device generates a random number authentication code after receiving an authentication request sent by the upper computer, then adopts an asymmetric key encryption technology, uses a public key built in the intermediate control device to encrypt the random number authentication code by an RSA algorithm, and then sends the encrypted data to the upper computer.
Further, after receiving the encrypted data sent by the intermediate control device, the upper computer performs RSA algorithm decryption by using a private key matched with a public key arranged in the intermediate control device by using an asymmetric key encryption technology to obtain a random number authentication code.
Further, the signing, by the upper computer, the random number authentication code by using the digital signature specifically includes: and encrypting the random number authentication code by adopting SHA coding to generate a digital abstract, and re-encrypting the digital abstract by using a private key of the upper computer to form a digital signature.
Further, the verifying the random number authentication code and the signed random number authentication code by the intermediate control device specifically includes: and decrypting the digital abstract by adopting a public key built in the intermediate control equipment, simultaneously encrypting the received random number authentication code by adopting SHA coding to generate another digital abstract, comparing the decrypted digital abstract with the digital abstract generated by re-encrypting the received random number authentication code, and if the two are consistent, successfully verifying.
Further, the intermediate control device is a small PC or a device provided with an embedded operating system.
Further, the intermediate control device and the entrance guard controller are connected in any one mode of TCP/IP, RS232 and RS 485.
Furthermore, the intermediate control equipment is connected with the upper computer in a TCP/IP mode.
Drawings
Fig. 1 is a schematic diagram of a schematic structure of a network type access control system provided by the invention.
In the figure, 1, a host computer; 2. an intermediate control device; 3. an access controller.
Detailed Description
In order to make the technical means, the creation characteristics, the achievement purposes and the effects of the invention easy to understand, the invention is further explained below by combining the specific drawings.
Referring to fig. 1, a network type access control system includes an upper computer 1, an intermediate control device 2, and an access controller 3; wherein,
the upper computer 1 is used for sending an authentication request, decrypting the authentication request by adopting an asymmetric key encryption technology after receiving encrypted data sent by the intermediate control equipment to obtain a random number authentication code, signing the random number authentication code by adopting a digital signature, and transmitting a door opening instruction, the random number authentication code and the signed random number authentication code back to the intermediate control equipment;
the intermediate control equipment 2 is used for generating a random number authentication code after receiving an authentication request sent by the upper computer, encrypting the random number authentication code by adopting an asymmetric key encryption technology, sending the encrypted data to the upper computer and storing the encrypted data in the intermediate control equipment; after receiving a door opening instruction, a random number authentication code and a signed random number authentication code returned by the upper computer, verifying the random number authentication code and the signed random number authentication code, and generating a door opening instruction execution signal after the verification is successful;
and the access controller 3 is used for receiving the door opening instruction execution signal and controlling the opening of the door.
The network type access control system provided by the invention is additionally provided with the intermediate control equipment, the access controller is directly connected with the intermediate control equipment, the intermediate control equipment is connected with an upper computer, the access control equipment is not exposed in a public network environment, all communications are transferred by the intermediate control equipment, and the possibility of directly accessing the access control equipment from the outside is physically isolated; the communication protocol is private and encrypted for transmission, and before executing the entrance guard control instruction, the digital signature verification is carried out on the sent instruction data to judge the reliability of the sending end, so that the possibility of invasion of an external invader such as a hacker is eliminated, and the security management safety is improved.
Specifically, in the network type access control system provided by the invention, an upper computer, namely a user terminal, cannot directly access the access controller, and a control instruction sent to the access controller can be used for carrying out instruction control on the access controller only after user identity verification is validated through intermediate control equipment, namely a server; that is, before sending a control instruction to the access controller, the user terminal must prove whether the identity of the user terminal is legal or not to the server, so that an external intruder such as a hacker computer can be effectively prevented from illegally intruding the access controller such as a vault access controller, and the possibility of illegal intrusion by the external intruder is avoided.
As a specific embodiment, after receiving the authentication request sent by the upper computer, the intermediate control device generates a random number authentication code, then uses an asymmetric key encryption technology, encrypts the random number authentication code by using a public key built in the intermediate control device through an RSA algorithm, and then sends the encrypted data to the upper computer. Specifically, a public key of a terminal user is set in the intermediate control device, after an authentication request sent by the upper computer, namely the user terminal, is received, the intermediate control device generates a random number authentication code, then the random number authentication code is encrypted by adopting an asymmetric key encryption technology such as an RSA algorithm and the public key built in the intermediate control device, then the encrypted data is sent to the upper computer, namely the user terminal, and meanwhile, the random number authentication code is stored in the intermediate control device, namely the server. In this embodiment, the asymmetric key encryption technique may also use other encryption techniques besides the RSA algorithm encryption.
As a specific embodiment, after receiving the encrypted data sent by the intermediate control device, the upper computer uses an asymmetric key encryption technology and performs RSA algorithm decryption by using a private key matched with a public key built in the intermediate control device to obtain a random number authentication code. Specifically, a U shield is configured in the upper computer, i.e., the user terminal, and a private key matched with a public key in the intermediate control device is arranged in the U shield, so that after the upper computer, i.e., the user terminal, receives encrypted data sent by the intermediate control device, the encrypted data is decrypted by adopting an asymmetric key encryption technology such as an RSA algorithm and a private key arranged in the U shield of the user terminal, and the random number authentication code is obtained. In this embodiment, the asymmetric key encryption technique may also use other encryption techniques besides the RSA algorithm decryption.
As a specific embodiment, the signing, by the upper computer, the random number authentication code by using a digital signature specifically includes: and encrypting the random number authentication code by adopting SHA coding to generate a digital abstract, and re-encrypting the digital abstract by using a private key of the upper computer to form a digital signature. Specifically, the host computer, i.e., the user terminal, decrypts the random number authentication code by using a private key and an RSA Algorithm, encrypts the random number authentication code by using a SHA (Secure Hash Algorithm) code to generate a 128-bit digital digest, re-encrypts the 128-bit digital digest by using the private key in a U shield of the user terminal, thereby forming a digital signature of the user terminal, and then the user terminal transmits a door opening instruction (e.g., "opendoor"), the random number authentication code, and the signed random number authentication code back to the intermediate control device.
As a specific embodiment, the verifying, by the intermediate control device, the random number authentication code and the signed random number authentication code specifically includes: and decrypting the digital abstract by adopting a public key built in the intermediate control equipment, simultaneously encrypting the received random number authentication code by adopting SHA coding to generate another digital abstract, comparing the decrypted digital abstract with the digital abstract generated by re-encrypting the received random number authentication code, and if the two are consistent, successfully verifying. Specifically, after receiving the random number authentication code and the signed random number authentication code returned by the user terminal, the intermediate control device verifies the random number authentication code and the signed random number authentication code to confirm whether the identity of the user terminal is legal, and executes a related door opening instruction after the confirmation is successful. Wherein the process of verifying the random number authentication code and the signed random number authentication code comprises: the intermediate control equipment decrypts the signed random number authentication code, namely the re-encrypted 128-bit digital abstract by using a public key arranged in the equipment, simultaneously encrypts the received random number authentication code by adopting SHA (secure flash) code to generate another digital abstract, compares the decrypted digital abstract with the digital abstract generated by re-encrypting the received random number authentication code, and if the decrypted digital abstract and the received random number authentication code are consistent, indicates that the information is not damaged or tampered in the transmission process, the verification is successful; otherwise, the user terminal will be identified as an invalid, illegal user terminal, and the authentication will fail.
In the authentication process provided by the invention, even if the encrypted data is sent to the upper computer, namely the user terminal, by the intermediate control equipment and intercepted by the network, the ciphertext data encrypted by adopting the asymmetric key encryption technology is obtained, and an intruder cannot decrypt a real authentication code plaintext without a private key matched with a public key used in encryption, so that data imitation cannot be performed to illegally control the access controller. Meanwhile, the upper computer, namely the U shield of the user terminal for storing the private key, cannot be copied.
As a specific embodiment, the intermediate control device is a small PC or a device installed with an embedded operating system. Specifically, the intermediate control device may be a small PC, or may be a device in which an embedded operating system (e.g., WINCE/Android/OS) is installed, the communication protocol is private and encrypted for transmission, and before executing an access control instruction, digital signature verification is performed on transmitted instruction data to determine reliability of a transmitting end, thereby preventing an external intruder such as a hacker from intruding.
As a specific embodiment, the intermediate control device and the gating controller are connected by any one of TCP/IP, RS232, and RS 485. Specifically, the access controller is directly connected with the intermediate control device in any one of the above manners, so that the access controller is not exposed in a public network, all communication is relayed by the intermediate control device such as a small-sized PC, and the possibility of directly accessing the access controller from the outside is physically isolated.
As a specific embodiment, the intermediate control device is connected with an upper computer in a TCP/IP manner, so that the upper computer, i.e., the user terminal, can send a door opening instruction and transmit corresponding data in a TCP/IP manner, thereby implementing control over the access controller.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent structures made by using the contents of the present specification and the drawings can be directly or indirectly applied to other related technical fields, and are within the scope of the present invention.

Claims (6)

1. A network type access control system is characterized by comprising an upper computer, intermediate control equipment and an access controller; wherein,
the upper computer is used for sending an authentication request, decrypting the authentication request by adopting an asymmetric key encryption technology after receiving encrypted data sent by the intermediate control equipment to obtain a random number authentication code, signing the random number authentication code by adopting a digital signature, and transmitting a door opening instruction, the random number authentication code and the signed random number authentication code back to the intermediate control equipment;
the intermediate control equipment is used for generating a random number authentication code after receiving an authentication request sent by the upper computer, encrypting the random number authentication code by adopting an asymmetric key encryption technology, sending the encrypted data to the upper computer and storing the encrypted data in the intermediate control equipment; after receiving a door opening instruction, a random number authentication code and a signed random number authentication code returned by the upper computer, verifying the random number authentication code and the signed random number authentication code, and generating a door opening instruction execution signal after the verification is successful;
the access controller is used for receiving the door opening instruction execution signal and controlling the opening of the door;
the signing of the random number authentication code by the upper computer by adopting the digital signature specifically comprises the following steps: encrypting the random number authentication code by adopting SHA coding to generate a digital abstract, and re-encrypting the digital abstract by using a private key of the upper computer to form a digital signature;
the verifying the random number authentication code and the signed random number authentication code by the intermediate control device specifically includes: and decrypting the digital signature by adopting a public key built in the intermediate control equipment, simultaneously encrypting the received random number authentication code by adopting SHA coding to generate another digital abstract, comparing the decrypted digital abstract with the digital abstract generated by re-encrypting the received random number authentication code, and if the two are consistent, successfully verifying.
2. The network type access control system according to claim 1, wherein the intermediate control device generates a random number authentication code after receiving the authentication request sent by the upper computer, and then uses a public key built in the intermediate control device to encrypt the random number authentication code by an RSA algorithm by using an asymmetric key encryption technology, and then sends the encrypted data to the upper computer.
3. The network type access control system according to claim 2, wherein the upper computer, after receiving the encrypted data sent by the intermediate control device, performs RSA algorithm decryption by using a private key matched with a public key built in the intermediate control device by using an asymmetric key encryption technology to obtain a random number authentication code.
4. A network-type access control system according to any one of claims 1 to 3, wherein the intermediate control device is a small PC or a device equipped with an embedded operating system.
5. The network type access control system of claim 4, wherein the intermediate control device is connected to the access controller by any one of TCP/IP, RS232 and RS 485.
6. The network type access control system according to claim 4, wherein the intermediate control device is connected to the upper computer by means of TCP/IP.
CN201410713170.4A 2014-12-01 2014-12-01 A kind of network-type access control system Active CN104851159B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410713170.4A CN104851159B (en) 2014-12-01 2014-12-01 A kind of network-type access control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410713170.4A CN104851159B (en) 2014-12-01 2014-12-01 A kind of network-type access control system

Publications (2)

Publication Number Publication Date
CN104851159A CN104851159A (en) 2015-08-19
CN104851159B true CN104851159B (en) 2017-06-06

Family

ID=53850786

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410713170.4A Active CN104851159B (en) 2014-12-01 2014-12-01 A kind of network-type access control system

Country Status (1)

Country Link
CN (1) CN104851159B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106875532B (en) * 2017-04-07 2019-03-15 杭州行至云起科技有限公司 A kind of intelligent door lock and control equipment and system and remotely control method for unlocking
CN109218263B (en) * 2017-07-04 2021-06-08 斑马智行网络(香港)有限公司 Control method and device
CN107578511A (en) * 2017-09-15 2018-01-12 林海航 A kind of smart lock and its Intelligent key
CN109035510A (en) * 2018-07-12 2018-12-18 佛山伊苏巨森科技有限公司 A method of controlling the access of express delivery smart lock by block chain
CN109035509A (en) * 2018-07-12 2018-12-18 佛山伊苏巨森科技有限公司 A method of intelligent door lock is opened and closed by block chain
CN109064606B (en) * 2018-08-03 2021-09-03 广州邦讯信息系统有限公司 Access control task execution method and system, access control system and readable storage medium
CN109410406B (en) * 2018-11-14 2021-11-16 北京华大智宝电子系统有限公司 Authorization method, device and system
CN110189457A (en) * 2019-06-28 2019-08-30 飞天诚信科技股份有限公司 A kind of intelligent door lock control method and system based on living things feature recognition
CN110738776B (en) * 2019-10-22 2022-05-27 飞天诚信科技股份有限公司 Method and system for opening Bluetooth access control, Bluetooth device and working method thereof
CN114244529A (en) * 2021-12-17 2022-03-25 北京国泰网信科技有限公司 Method for carrying out SM2 one-time pad bidirectional authentication unlocking by using electronic key
CN114333110A (en) * 2021-12-17 2022-04-12 北京国泰网信科技有限公司 Method for SM2 bidirectional identity authentication by using built-in password chip of lock
CN114973457A (en) * 2022-04-15 2022-08-30 北京国泰网信科技有限公司 Intelligent lock system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101014075A (en) * 2007-03-02 2007-08-08 中兴通讯股份有限公司 Anti-theft system and method realized by mobile terminal
CN101246607A (en) * 2007-02-13 2008-08-20 陈年 Digital authentication control method for access control system and access control system using the same
FR2906952B1 (en) * 2006-10-05 2009-02-27 Inside Contactless Sa METHOD FOR MUTUAL AUTHENTICATION BETWEEN A COMMUNICATION INTERFACE AND A HOST PROCESSOR OF AN NFC CHIPSET
CN102682506A (en) * 2012-05-25 2012-09-19 北京华大信安科技有限公司 Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique
CN102800141A (en) * 2012-07-24 2012-11-28 东信和平科技股份有限公司 Entrance guard controlling method and system based on bidirectional authentication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2906952B1 (en) * 2006-10-05 2009-02-27 Inside Contactless Sa METHOD FOR MUTUAL AUTHENTICATION BETWEEN A COMMUNICATION INTERFACE AND A HOST PROCESSOR OF AN NFC CHIPSET
CN101246607A (en) * 2007-02-13 2008-08-20 陈年 Digital authentication control method for access control system and access control system using the same
CN101014075A (en) * 2007-03-02 2007-08-08 中兴通讯股份有限公司 Anti-theft system and method realized by mobile terminal
CN102682506A (en) * 2012-05-25 2012-09-19 北京华大信安科技有限公司 Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique
CN102800141A (en) * 2012-07-24 2012-11-28 东信和平科技股份有限公司 Entrance guard controlling method and system based on bidirectional authentication

Also Published As

Publication number Publication date
CN104851159A (en) 2015-08-19

Similar Documents

Publication Publication Date Title
CN104851159B (en) A kind of network-type access control system
JP7152466B2 (en) Secure communication method and smart lock system based thereon
CN109410406B (en) Authorization method, device and system
US8321924B2 (en) Method for protecting software accessible over a network using a key device
US20150222436A1 (en) Techniques for securing networked access systems
CN104639516A (en) Method, equipment and system for authenticating identities
Nguyen et al. Cloud-based secure logger for medical devices
CN106464488A (en) Information transmission method and mobile device
CN103634114A (en) Verifying method and system for intelligent secret key
Studer et al. Mobile user location-specific encryption (MULE) using your office as your password
CN107733636B (en) Authentication method and authentication system
CN105099705B (en) A kind of safety communicating method and its system based on usb protocol
CN104636680A (en) Verification of authenticity of a maintenance means and provision and obtainment of a license key for use therein
JP6751545B1 (en) Electronic signature system and anti-tamper device
CN102986161A (en) Method for the cryptographic protection of an application
CN111540093A (en) Access control system and control method thereof
KR20120072032A (en) The system and method for performing mutual authentication of mobile terminal
AU2022291428A1 (en) A Process and Detachable Device for Using and Managing Encryption Keys
CN109951294B (en) Information updating management method in electronic label system and related equipment
CN112530053B (en) Control method and system of intelligent lock, lock equipment, server and storage medium
CN110445774B (en) Security protection method, device and equipment for IoT (Internet of things) equipment
TWI588782B (en) Security method, security gate and server
JP5295999B2 (en) Terminal initial setting method and initial setting device
JP2021111925A (en) Electronic signature system
Jang-Jaccard et al. Portable key management service for cloud storage

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: A road 400041 Jiulongpo District of Chongqing Science Park Innovation Building 7 floor No. 5

Patentee after: XUNMEI TECHNOLOGY CO.,LTD.

Address before: Jiulongpo Branch Park four street 400041 Chongqing City No. 52 Shiqiaopu standard workshop building K first floor

Patentee before: XUNMEI ELECTRONIC TECHNOLOGY CO.,LTD.

CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 400039 7 building, No. 5, Keyuan Road, Kowloon Po, Chongqing.

Patentee after: GAOXIN XINGXUNMEI TECHNOLOGY Co.,Ltd.

Address before: 400041 7th Floor, Innovation Building, No. 5 Keyuan Road, Jiulongpo District, Chongqing

Patentee before: XUNMEI TECHNOLOGY CO.,LTD.

CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 400039 C3009, 3rd Floor, Building C, No. 1 Mopanshan, Jiulongpo District, Chongqing (self committed)

Patentee after: Gaoxinxing Xunmei (Chongqing) Technology Co.,Ltd.

Country or region after: China

Address before: 400039 7 building, No. 5, Keyuan Road, Kowloon Po, Chongqing.

Patentee before: GAOXIN XINGXUNMEI TECHNOLOGY Co.,Ltd.

Country or region before: China