CN105224830A - A kind of communication software authorizing secure management system and method - Google Patents

A kind of communication software authorizing secure management system and method Download PDF

Info

Publication number
CN105224830A
CN105224830A CN201510602512.XA CN201510602512A CN105224830A CN 105224830 A CN105224830 A CN 105224830A CN 201510602512 A CN201510602512 A CN 201510602512A CN 105224830 A CN105224830 A CN 105224830A
Authority
CN
China
Prior art keywords
module
bluetooth
authorization
bluetooth module
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510602512.XA
Other languages
Chinese (zh)
Other versions
CN105224830B (en
Inventor
田军
唐敏健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Bide Technology Co ltd
Original Assignee
BDE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BDE TECHNOLOGY Co Ltd filed Critical BDE TECHNOLOGY Co Ltd
Priority to CN201510602512.XA priority Critical patent/CN105224830B/en
Publication of CN105224830A publication Critical patent/CN105224830A/en
Application granted granted Critical
Publication of CN105224830B publication Critical patent/CN105224830B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Remote Sensing (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The present invention relates to the use authority technical field of bitcom, be specifically related to a kind of communication software authorizing secure management system and method.The present invention is intended to design with when defining one for low-power consumption bluetooth module product volume production, by unlocking the system and method realizing embedded software authorization control in the air, thus realizes volume production authorization control.This system is made up of bluetooth module, mandate Bluetooth adapter module, softdog module, upper computer software module, by locking to bluetooth module, unlocking operation restriction client can not at random copy out embedded bitcom and be burnt in another undelegated bluetooth module and go from a bluetooth module of having authorized, even if user performs copy function with insisting on, the embedded bitcom be copied still can not normally run in undelegated bluetooth module, thus prevents the piracy of embedded bitcom and the imitation problem of bluetooth module.

Description

A kind of communication software authorizing secure management system and method
Technical field
The present invention relates to the empowerment management technical field of bitcom, be specifically related to a kind of communication software authorizing secure management system and method, be applicable to the embedded software volume production empowerment management of any one wireless telecommunications software module.
Background technology
Along with the rise of technology of Internet of things and the appearance of GreenNet technology, the demand of various intelligent terminal to short-distance radio network technology strengthens day by day, bluetooth, as a kind of short-distance wireless communication technology being widely used in the intelligent terminal such as mobile phone, panel computer, has been widely used in people's daily life.The application of low-power consumption Bluetooth technology is one of important research direction of network energy-saving.Bluetooth technology has as low in energy consumption, radiation is few, support AES-128 encryption etc., be widely used in smart mobile phone, panel computer, home entertainment device etc., but in the early stage, because bluetooth cost is higher and need to solve the problem of co-channel interference between WLAN, its development is restricted, at that time as high-end handsets can arrangement.Along with the progress of technology, the reduction of cost and the concept such as intelligent domestic, smart city are rooted in the hearts of the people gradually, increasing terminal bluetooth enable, Bluetooth technology is applied in smart mobile phone and other intelligent Worn type equipment by rapid, high volume, especially in smart mobile phone, domestic medicine smart machine, support the Medical Devices of low-power consumption Bluetooth technology as: passometer, rhythm of the heart blood pressure monitor, intelligent instrument, sensor Internet of Things etc. release one after another, and greatly expand the range of application of low-power consumption Bluetooth technology.
In daily research and development process; we find; user can at random copy out embedded bitcom and be burnt in another undelegated MCU/ bluetooth module and go from a MCU/ bluetooth module of having authorized; this badly influences the protection of company to relevant knowledge property right; existing technology can not better solve the problem; based on above-mentioned present situation; inventor have developed a kind of communication software authorizing secure management system and method; the method can solve the problem preferably, and achieves good effect.
Summary of the invention
For problems of the prior art, the invention provides a kind of communication software authorizing secure management system and method, the present invention can limit client and can not at random from a MCU/ bluetooth module of having authorized, embedded bitcom be copied out and be burnt in another undelegated MCU/ bluetooth module and go, even if user performs copy function with insisting on, the embedded bitcom be copied still can not normally run in undelegated MCU/ bluetooth module.
To achieve these goals, the embodiment of first aspect present invention provides communication software authorizing secure management system, this model comprises 4 modules: bluetooth module 1, described bluetooth module 1 has authorization control function, be made up of bluetooth storehouse (Lib) and built-in application program (App) two parts, adopt the separate type working method of firmware independent compilation, it is inner that authorization control function is comprised in bluetooth storehouse (Lib); Authorize Bluetooth adapter module 2, described mandate Bluetooth adapter module 2 only comprises bluetooth transceiver and passive Bluetooth adapter; Softdog module 3, described softdog module 3 includes authorized quantity checking and upgrades control module with authorized quantity, for generating the reply message of unlocking request and controlling and upgrade authorized quantity; Upper computer software module 4, the object of described upper computer software module 4 is for client provides a storehouse, allows client oneself can write the Test Application of oneself, and meanwhile, this module has the function of authorizing and unlocking.
Wherein, softdog module 3 integrates with authorizing Bluetooth adapter module 2, and communicating with upper computer software module 4 by means of only an interface, authorize and carry out in this integration module, is enclosed completely.
To achieve these goals, the embodiment of second aspect present invention provides communication software authorizing secure management method, and first this control method adds latching operation to bluetooth module, then carries out unlocking operation.The described bluetooth module operation steps that locks is: S11 judges whether current Bluetooth module 1 exists authorization data; If S12 exists, so just normal operation, otherwise enter unauthorized pattern; S13 is under unauthorized pattern, and described bluetooth storehouse, is gone to judge whether current Bluetooth module 1 runs time-out under unauthorized pattern from the gap that scheduler (gOS) is dispatched each; S14 is after unauthorized bluetooth module 1 runs time-out, size of message is sent to a certain degree, or initialization apparatus application programming interface call number arrives to a certain degree, and bluetooth module 1 will no longer normally run, and notify that subscriber authorisation verifies unsuccessfully, also namely locked.
Described bluetooth module unlocking operation step is: S21 upper computer software module 4 controls to authorize Bluetooth adapter module 2 and bluetooth module 1 to connect, and authorizes to authorizing Bluetooth adapter module 2 to initiate inquiry the message that in Bluetooth adapter module 2, authorization surplus is how many; After S22 authorizes Bluetooth adapter module 2 to receive the how many message of authorization surplus, reply authorization surplus message; Whether S23 upper computer software module 4 is greater than 0 to judge whether according to the surplus of authorizing is carried out unlocking operation; S24 is greater than 0 as authorized surplus, and upper computer software module 4 initiates unlocking operation by authorization requests, and afterwards, upper computer software module 4 waits for returning of authorization response; S25 sends ACL data message to bluetooth transceiver after authorizing Bluetooth adapter module 2 to receive the authorization response of upper computer software module 4, and this message loads authorizes index, and be next used to indicate bluetooth module 1 needs to carry out unlocking operation; After S26 bluetooth transceiver receives this ACL data message, undelegated bluetooth module 1 is given data by LE channel, after undelegated bluetooth module 1 receives data message, need to check the licensing status of oneself, if this module is authorized, then need return authorization failure, in order to avoid produce because of repetitive endowment, if this module unauthorized, then need that equipment is addressed (UID) and issue mandate Bluetooth adapter module 2 as authorization requests; After S27 authorizes Bluetooth adapter module 2 to receive this request, extracted by equipment addressing (UID) in message, then carry out AES-128 computing: D=e (key, UID), wherein key is key, and UID is equipment addressing; After S28 bluetooth module 1 receives authorization response, D is extracted from message, and make to calculate D1=e(key in the same way, UID), then D and D1 is carried out matching ratio comparatively, if comparative result is equal, so by return authorization success, otherwise return authorization failure; S29 authorizes Bluetooth adapter module 2 to receive after mandate returns results, licensing process is regarded as terminating, and according to Authorization result report upper computer software module 4, the passage of report is that HCI order completes event, meanwhile, Bluetooth adapter module 2 is authorized will to carry out reducing to authorized quantity.
After bluetooth module 1 is unlocked, can normal mode of operation be in, and power on later and be all in normal mode of operation at every turn.
The present invention can limit client and can not at random from a MCU/ bluetooth module of having authorized, embedded bitcom be copied out and be burnt in another undelegated MCU/ bluetooth module and go, even if user performs copy function with insisting on, the embedded bitcom be copied still can not normally run in undelegated MCU/ bluetooth module, thus prevent the piracy of embedded bitcom and the imitation problem of bluetooth module, achieve positive technique effect.
Accompanying drawing explanation
Fig. 1 is the bluetooth module volume production authorization control model of the embodiment of the present invention.
Fig. 2 is that the bluetooth module of the embodiment of the present invention locks process flow diagram.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
Being exemplary below by the embodiment be described with reference to the drawings, only for explaining the present invention, and can not limitation of the present invention being interpreted as.On the contrary, embodiments of the invention comprise fall into attached claims spirit and intension within the scope of all changes, amendment and equivalent.
Below with reference to the accompanying drawings heart rate detection method according to the embodiment of the present invention and device are described.
The embodiment of first aspect present invention proposes a kind of communication software authorizing secure management system.
Fig. 1 is the bluetooth module volume production authorization control model of the embodiment of the present invention, this model comprises 4 modules: bluetooth module 1, described bluetooth module 1 has authorization control function, be made up of bluetooth storehouse (Lib) and built-in application program (App) two parts, adopt the separate type working method of firmware independent compilation, it is inner that authorization control function is comprised in bluetooth storehouse (Lib); Authorize Bluetooth adapter module 2, described mandate Bluetooth adapter module 2 only comprises bluetooth transceiver (chip) and passive Bluetooth adapter; Softdog module 3, described softdog module 3 includes authorized quantity checking and upgrades control module with authorized quantity, for generating the reply message of unlocking request and controlling and upgrade authorized quantity; Upper computer software module 4, the object of described upper computer software module 4 is for client provides a storehouse, allows client oneself can write the Test Application of oneself, and meanwhile, this module has the function of authorizing and unlocking.
Wherein, softdog module 3 integrates with authorizing Bluetooth adapter module 2, and communicating with upper computer software module 4 by means of only an interface, authorize and carry out in this integration module, is enclosed completely.
The embodiment of second aspect present invention provides communication software authorizing secure management method, and first this control method adds latching operation to bluetooth module, then carries out unlocking operation.
Fig. 2 is that embodiment of the present invention bluetooth module locks operation steps, the steps include: that S11 judges whether current Bluetooth module 1 exists authorization data; If S12 exists, so just normal operation, otherwise enter unauthorized pattern; S13 is under unauthorized pattern, and described bluetooth storehouse, is gone to judge whether current Bluetooth module 1 runs time-out under unauthorized pattern from the gap that scheduler (gOS) is dispatched each; S14 is after unauthorized bluetooth module 1 runs time-out, size of message is sent to a certain degree, or initialization apparatus application programming interface call number arrives to a certain degree, and bluetooth module 1 will no longer normally run, and notify that subscriber authorisation verifies unsuccessfully, also namely locked.
Described bluetooth module unlocking operation step is: S21 upper computer software module 4 controls to authorize Bluetooth adapter module 2 and bluetooth module 1 to connect, and authorizes to authorizing Bluetooth adapter module 2 to initiate inquiry the message that in Bluetooth adapter module 2, authorization surplus is how many; After S22 authorizes Bluetooth adapter module 2 to receive the how many message of authorization surplus, reply authorization surplus message; Whether S23 upper computer software module 4 is greater than 0 to judge whether according to the surplus of authorizing is carried out unlocking operation; S24 is greater than 0 as authorized surplus, and upper computer software module 4 initiates unlocking operation by authorization requests, and afterwards, upper computer software module 4 waits for returning of authorization response; S25 sends ACL data message to bluetooth transceiver after authorizing Bluetooth adapter module 2 to receive the authorization response of upper computer software module 4, and this message loads authorizes index, and be next used to indicate bluetooth module 1 needs to carry out unlocking operation; After S26 bluetooth transceiver receives this ACL data message, undelegated bluetooth module 1 is given data by LE channel, after undelegated bluetooth module 1 receives data message, need to check the licensing status of oneself, if this module is authorized, then need return authorization failure, in order to avoid produce because of repetitive endowment, if this module unauthorized, then need that equipment is addressed (UID) and issue mandate Bluetooth adapter module 2 as authorization requests; After S27 authorizes Bluetooth adapter module 2 to receive this request, extracted by equipment addressing (UID) in message, then carry out AES-128 computing: D=e (key, UID), wherein key is key, and UID is equipment addressing; After S28 bluetooth module 1 receives authorization response, D is extracted from message, and make to calculate D1=e(key in the same way, UID), then D and D1 is carried out matching ratio comparatively, if comparative result is equal, so by return authorization success, otherwise return authorization failure; S29 authorizes Bluetooth adapter module 2 to receive after mandate returns results, licensing process is regarded as terminating, and according to Authorization result report upper computer software module 4, the passage of report is that HCI order completes event, meanwhile, Bluetooth adapter module 2 is authorized will to carry out reducing to authorized quantity.
After bluetooth module 1 is unlocked, can normal mode of operation be in, and power on later and be all in normal mode of operation at every turn.
The present invention can limit client and can not at random from a MCU/ bluetooth module of having authorized, embedded bitcom be copied out and be burnt in another undelegated MCU/ bluetooth module and go, even if user performs copy function with insisting on, the embedded bitcom be copied still can not normally run in undelegated MCU/ bluetooth module, achieves positive technique effect.
Although illustrate and describe embodiments of the invention, those having ordinary skill in the art will appreciate that: can carry out multiple change, amendment, replacement and modification to these embodiments when not departing from principle of the present invention and aim, scope of the present invention is by claim and equivalents thereof.

Claims (4)

1. a communication software authorizing secure management system, is characterized in that, comprising:
Bluetooth module (1), described bluetooth module has authorization control function, be made up of bluetooth storehouse (Lib) and built-in application program (App) two parts, adopt the separate type working method of firmware independent compilation, authorization control function is comprised in (Lib) in bluetooth storehouse;
Authorize Bluetooth adapter module (2), described mandate Bluetooth adapter module is made up of bluetooth transceiver and passive Bluetooth adapter;
Softdog module (3), described softdog module includes authorized quantity checking and upgrades control module with authorized quantity, for generating the reply message of unlocking request and controlling and upgrade authorized quantity;
Upper computer software module (4), the object of described upper computer software module is for client provides a storehouse, allows client oneself can write the Test Application of oneself, and meanwhile, this module has the function of authorizing and unlocking.
2. communication software authorizing secure management system according to claim 1, is characterized in that: described softdog module (3) integrates with authorizing Bluetooth adapter module (2), communicates with upper computer software module (4) by means of only an interface.
3. a communication software authorizing secure management method, first adds latching operation to bluetooth module (1), then carries out unlocking operation, it is characterized in that, the step that locks of described bluetooth module (1) is:
S11 judges whether current Bluetooth module (1) exists authorization data;
If S12 exists, so just normal operation, otherwise enter unauthorized pattern;
S13 is under unauthorized pattern, and described bluetooth storehouse, is gone to judge whether current Bluetooth module (1) runs time-out under unauthorized pattern from the gap that scheduler (gOS) is dispatched each;
S14 is after unauthorized bluetooth module (1) runs time-out, and size of message is sent to a certain degree, and bluetooth module (1) will no longer normally run, and notifies that subscriber authorisation verifies unsuccessfully, is also namely locked.
4. a kind of communication software authorizing secure management method according to claim 3, it is characterized in that, the unlocked step of described bluetooth module (1) is:
S21 upper computer software module (4) controls to authorize Bluetooth adapter module (2) and bluetooth module (1) to connect, and authorizes to authorizing Bluetooth adapter module (2) to initiate inquiry the message that in Bluetooth adapter module (2), authorization surplus is how many;
After S22 authorizes Bluetooth adapter module (2) to receive the how many message of authorization surplus, reply authorization surplus message;
Whether S23 upper computer software module (4) is greater than 0 to judge whether according to the surplus of authorizing is carried out unlocking operation;
S24 is greater than 0 as authorized surplus, and upper computer software module (4) initiates unlocking operation by authorization requests, and afterwards, upper computer software module (4) waits for returning of authorization response;
S25 sends ACL data message to bluetooth transceiver after authorizing Bluetooth adapter module (2) to receive the authorization response of upper computer software module (4), and this message loads authorizes index, and be next used to indicate bluetooth module needs to carry out unlocking operation;
After S26 bluetooth transceiver receives this ACL data message, undelegated bluetooth module (1) is given data by LE channel, after undelegated bluetooth module (1) receives data message, need to check the licensing status of oneself, if this module is authorized, then return authorization failure, if this module unauthorized, then addresses (UID) using equipment and issues mandate Bluetooth adapter module (2) as authorization requests;
After S27 authorizes Bluetooth adapter module (2) to receive this request, extracted by equipment addressing (UID) in message, then carry out AES-128 computing: D=e (key, UID), wherein key is key, and UID is equipment addressing;
After S28 bluetooth module (1) receives authorization response, D is extracted from message, and make to calculate D1=e(key in the same way, UID), then D and D1 is carried out matching ratio comparatively, if comparative result is equal, so by return authorization success, otherwise return authorization failure;
S29 authorizes Bluetooth adapter module (2) to receive after mandate returns results, licensing process is regarded as terminating, and according to Authorization result report upper computer software module (4), the passage of report is that HCI order completes event, meanwhile, Bluetooth adapter module (2) is authorized reducing will to be carried out to authorized quantity.
CN201510602512.XA 2015-09-21 2015-09-21 A kind of communication software authorizing secure management method Active CN105224830B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510602512.XA CN105224830B (en) 2015-09-21 2015-09-21 A kind of communication software authorizing secure management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510602512.XA CN105224830B (en) 2015-09-21 2015-09-21 A kind of communication software authorizing secure management method

Publications (2)

Publication Number Publication Date
CN105224830A true CN105224830A (en) 2016-01-06
CN105224830B CN105224830B (en) 2018-03-30

Family

ID=54993795

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510602512.XA Active CN105224830B (en) 2015-09-21 2015-09-21 A kind of communication software authorizing secure management method

Country Status (1)

Country Link
CN (1) CN105224830B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101404056A (en) * 2008-10-29 2009-04-08 金蝶软件(中国)有限公司 Software protection method, apparatus and equipment
CN102075217A (en) * 2010-12-22 2011-05-25 华为终端有限公司 Method for managing Bluetooth connection and equipment
CN102184352A (en) * 2011-03-16 2011-09-14 东南大学 Automatic protecting method for computer system based on Bluetooth device authentication
CN102968580A (en) * 2006-01-27 2013-03-13 飞天诚信科技股份有限公司 Method for controlling software product production safety
CN103530161A (en) * 2013-10-22 2014-01-22 北京深思数盾科技有限公司 Wireless information security equipment system and security protection method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102968580A (en) * 2006-01-27 2013-03-13 飞天诚信科技股份有限公司 Method for controlling software product production safety
CN101404056A (en) * 2008-10-29 2009-04-08 金蝶软件(中国)有限公司 Software protection method, apparatus and equipment
CN102075217A (en) * 2010-12-22 2011-05-25 华为终端有限公司 Method for managing Bluetooth connection and equipment
CN102184352A (en) * 2011-03-16 2011-09-14 东南大学 Automatic protecting method for computer system based on Bluetooth device authentication
CN103530161A (en) * 2013-10-22 2014-01-22 北京深思数盾科技有限公司 Wireless information security equipment system and security protection method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
杨胜等: "关于防拷贝软件保护技术的研究", 《咸宁学院学报》 *
熊丽等: "软件保护技术的发展现状与展望", 《软件导刊》 *

Also Published As

Publication number Publication date
CN105224830B (en) 2018-03-30

Similar Documents

Publication Publication Date Title
CN104966340B (en) Access control system, access control method and cloud service platform
Ho et al. Smart locks: Lessons for securing commodity internet of things devices
US10158968B2 (en) Communication method and system
CN106462188B (en) Power management contract for accessory device
US8542833B2 (en) Systems and methods to secure laptops or portable computing devices
US8254992B1 (en) Wireless docking system and pairing protocol for multiple dock environments
CN103729765B (en) A kind of authentication control method, terminal, server, terminal device and system
CA2957182A1 (en) Medical device management and theft inhibitor techniques
US20130031619A1 (en) Remote authentication screen locker for a mobile device
WO2021147442A1 (en) Access control method and apparatus, terminal device, and storage medium
CN103488932A (en) Desktop security intercommunication system for mobile device and personal computer and implementation method thereof
US20150310452A1 (en) Access Control System For Medical And Dental Computer Systems
CN104641669A (en) Apparatus and methods for controlled switching of electronic access clients without requiring network access
KR20170116888A (en) Digital doorlock system
KR20150138632A (en) Method and apparatus for providing the security function
KR20160123604A (en) Method for managing of beacon device, and apparatus thereof
US20090083449A1 (en) Synchronization for Wireless Devices
CN205063666U (en) Intelligent safety box
EP2833330B1 (en) Communication method and system
CN107203147A (en) Internet of Things network control system and method based on cloud platform
CN204303150U (en) A kind of control system of wireless remote control
CN105812140A (en) Authorization access method
CN105325021B (en) Method and apparatus for remote portable wireless device authentication
US10873849B1 (en) System and method for universal mobile device lock using blockchain
CN104796897A (en) WIFI authentication mechanism and algorithm based on handheld device APP

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 510663 Room 403-404, Area B2, Creative Building, No. 162, Science Avenue, Science City, Huangpu District, Guangzhou City, Guangdong Province (office only)

Patentee after: Guangzhou bide Technology Co.,Ltd.

Address before: 510663 C1-1105, Innovation Building, No. 182, Science Avenue, Science City, Development Zone, Guangzhou, Guangdong, China

Patentee before: BDE TECHNOLOGY Co.,Ltd.

CP03 Change of name, title or address
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A security management method of communication software authorization

Effective date of registration: 20221121

Granted publication date: 20180330

Pledgee: Bank of Guangzhou branch of the Bank of Guangzhou Science City Branch

Pledgor: Guangzhou bide Technology Co.,Ltd.

Registration number: Y2022980022657

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Granted publication date: 20180330

Pledgee: Bank of Guangzhou branch of the Bank of Guangzhou Science City Branch

Pledgor: Guangzhou bide Technology Co.,Ltd.

Registration number: Y2022980022657

PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A Communication Software Authorization Security Management Method

Granted publication date: 20180330

Pledgee: Bank of Guangzhou branch of the Bank of Guangzhou Science City Branch

Pledgor: Guangzhou bide Technology Co.,Ltd.

Registration number: Y2024980022702