CN105224830B - A kind of communication software authorizing secure management method - Google Patents

A kind of communication software authorizing secure management method Download PDF

Info

Publication number
CN105224830B
CN105224830B CN201510602512.XA CN201510602512A CN105224830B CN 105224830 B CN105224830 B CN 105224830B CN 201510602512 A CN201510602512 A CN 201510602512A CN 105224830 B CN105224830 B CN 105224830B
Authority
CN
China
Prior art keywords
module
bluetooth
authorization
bluetooth module
unauthorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510602512.XA
Other languages
Chinese (zh)
Other versions
CN105224830A (en
Inventor
田军
唐敏健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Bide Technology Co ltd
Original Assignee
BDE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BDE TECHNOLOGY Co Ltd filed Critical BDE TECHNOLOGY Co Ltd
Priority to CN201510602512.XA priority Critical patent/CN105224830B/en
Publication of CN105224830A publication Critical patent/CN105224830A/en
Application granted granted Critical
Publication of CN105224830B publication Critical patent/CN105224830B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Remote Sensing (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The present invention relates to the use authorization technique field of bitcom, and in particular to a kind of communication software authorizing secure management system and method.It is contemplated that when design is used for low-power consumption bluetooth module product volume production with definition one kind, the system and method for embedded software authorization control is realized by unlocking in the air, so as to realize volume production authorization control.The system is made up of bluetooth module, mandate Bluetooth adapter module, softdog module, upper computer software module, pass through the locking to bluetooth module, unblock operation limitation client arbitrarily can not copy out embedded bitcom and be burnt in the bluetooth module of another unauthorized from a bluetooth module authorized, even if user performs copy function with insisting on, the embedded bitcom being copied still is not normally functioning in the bluetooth module of unauthorized, so as to prevent the piracy of embedded bitcom and the imitation problem of bluetooth module.

Description

A kind of communication software authorizing secure management method
Technical field
The present invention relates to the empowerment management technical field of bitcom, and in particular to a kind of communication software authorizing secure management System
System and method, suitable for the embedded software volume production empowerment management of any wireless telecommunications software module.
Background technology
With the rise of technology of Internet of things and the appearance of GreenNet technology, various intelligent terminals are to short-distance radio network The demand of technology increasingly strengthens, and bluetooth is as a kind of short-distance wireless for being widely used in the intelligent terminals such as mobile phone, tablet personal computer Mechanics of communication, it has been widely used in people's daily life.Low-power consumption bluetooth technology application is the important research of network energy-saving One of direction.Bluetooth technology possesses as low in energy consumption, and radiation is few, supports AES-128 encryptions etc., is widely used in smart mobile phone, puts down Plate computer, home entertainment device etc., but in the early stage, because bluetooth cost is higher and needs the co-channel interference for solving between WLAN Problem, its development are restricted, and be only used as high-end handsets at that time can arrangement.With advances in technology, the reduction of cost And the concept such as intelligent domestic, smart city is gradually rooted in the hearts of the people, increasing terminal possesses Bluetooth function, Bluetooth technology quilt Rapid, high volume is applied in smart mobile phone and other intelligent Worn type equipment, especially smart mobile phone, domestic medicine smart machine In, support the Medical Devices of low-power consumption bluetooth technology such as:Pedometer, rhythm of the heart blood pressure monitor, intelligence instrument, sensor Internet of Things Etc. releasing one after another, the application of low-power consumption bluetooth technology is greatly expanded.
During daily research and development, it has been found that user can be arbitrarily from the MCU/ authorized a bluetooth mould Copies of firmware is come out and is burnt in the MCU/ bluetooth modules of another unauthorized in block, this seriously affects company to phase The protection of intellectual property is closed, and then influences development of company, existing technology can not preferably solve the above problems, based on above-mentioned existing Shape, inventor have developed a kind of bluetooth module volume production authorization control model and method, and this method can preferably solve above-mentioned ask Topic, and achieve preferable effect.
The content of the invention
For problems of the prior art, the invention provides a kind of communication software authorizing secure management system and side Method, the present invention, which can limit client, arbitrarily to be copied embedded bitcom from the MCU/ authorized a bluetooth module Shellfish comes out and is burnt in the MCU/ bluetooth modules of another unauthorized, even if user performs copy function, quilt with insisting on The embedded bitcom of copy is still not normally functioning in the MCU/ bluetooth modules of unauthorized.
To achieve these goals, the embodiment of first aspect present invention provides bluetooth module volume production authorization control mould Type, the model include 4 modules:Bluetooth module 1, the bluetooth module 1 has authorization control function, by bluetooth storehouse and App two Part is formed, and using the separate type working method of firmware independent compilation, authorization control function is comprised in bluetooth storehouse;Authorize blue Tooth adaptor module 2, the mandate Bluetooth adapter module 2 only include EM9301(Chip)With passive Bluetooth adapter;Encryption Dog module 3, the softdog module 3 include authorized quantity checking and authorized quantity renewal control module, please for generating unblock The reply message asked and control and renewal authorized quantity;Upper computer software module 4, the purpose of the upper computer software module 4 are A storehouse is provided for client, allows client oneself can write the test application of oneself, meanwhile, the module has the work(for authorizing unblock Energy.
Wherein, softdog module 3 with authorize Bluetooth adapter module 2 integrate, only by an interface with it is upper Position
Machine software module 4 is communicated, and is authorized and is carried out in the integration module, is entirely enclosed.
To achieve these goals, the embodiment of second aspect of the present invention provides communication software authorizing secure manager Method,
The control method locks to bluetooth module operate first, then is unlocked operation.The bluetooth module locks operation Step is:
S11 judges that current Bluetooth module 1 whether there is authorization data;S12 is no if it is present, with regard to normal operation Then enter unauthorized pattern;S13 is under unauthorized pattern, and the bluetooth storehouse is every time from scheduler(gOS)The gap of scheduling In, go to judge whether current Bluetooth module 1 runs time-out under unauthorized pattern;S14 is run when unauthorized bluetooth module 1 After time-out, size of message is sent to a certain extent, or initialization apparatus application programming interface call number reaches to a certain degree Afterwards, bluetooth module 1 will no longer normal operation, and notify user to authorize verification failure, namely be locked.
The bluetooth module unlocks operating procedure:The control of S21 upper computer softwares module 4 authorizes Bluetooth adapter module 2
Establish and connect with bluetooth module 1, and Bluetooth adapter mould is authorized to authorizing Bluetooth adapter module 2 to initiate inquiry The how many message of authorization surplus in block 2;S22 authorizes Bluetooth adapter module 2 to receive the how many report of authorization surplus Wen Hou, reply authorization surplus message;Whether S23 upper computer softwares module 4 is more than 0 to judge according to the surplus of mandate Whether operation is unlocked;For S24 as authorized surplus to be more than 0, upper computer software module 4 initiates unblock behaviour by authorization requests Make, afterwards, upper computer software module 4 waits the return of authorization response;S25 authorizes Bluetooth adapter module 2 to receive host computer ACL data messages are sent to bluetooth transceiver after the authorization response of software module 4, the message, which loads, authorizes index, for referring to Show that next needs are unlocked operation to bluetooth module 1;After S26 bluetooth transceivers receive the ACL data messages, pass through LE Channel gives data the bluetooth module 1 of unauthorized, the bluetooth module 1 of unauthorized receive after data message, it is necessary to oneself Licensing status is checked, if this module has authorized, needs to return to authorization failure, in order to avoid produce because of repetitive endowment, if This module unauthorized, then need equipment to address(UID)Issued as authorization requests and authorize Bluetooth adapter module 2;S27 is awarded After power Bluetooth adapter module 2 receives the request, the equipment in message is addressed(UID)Extract, then carry out AES- 128 computings:D=e (key, UID), wherein key are keys, and UID is equipment addressing;S28 bluetooth modules 1 receive mandate After response, D is extracted from message, and make to calculate D1=e in the same way(key, UID), then by D and D1 Matching comparison is carried out, if comparative result is equal, then authorized returning successfully, otherwise return to authorization failure;S29 authorizes blue After tooth adaptor module 2 receives mandate returning result, licensing process is considered as terminating, and reports that host computer is soft according to Authorization result Part module 4, the passage of report is HCI order completion events, meanwhile, authorize Bluetooth adapter module 2 to enter to authorized quantity Row reducing.
After bluetooth module 1 is unlocked every time, you can in normal mode of operation, and upper electricity is in normal later Work
Operation mode.
The present invention can limit client can not be arbitrarily from the MCU/ authorized a bluetooth module embedded communication Software
Copy out and be burnt in the MCU/ bluetooth modules of another unauthorized, copied even if user performs with insisting on Shellfish operates,
The embedded bitcom being copied still is not normally functioning in the MCU/ bluetooth modules of unauthorized, so as to anti- It is only embedded
The piracy of bitcom and the imitation problem of bluetooth module, achieve positive technique effect.
Brief description of the drawings
Fig. 1 is the bluetooth module volume production authorization control model of the embodiment of the present invention.
Fig. 2 is that the bluetooth module of the embodiment of the present invention locks flow chart.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete It is whole
Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole implementation Example.Based on this
Embodiment in invention, the institute that those of ordinary skill in the art are obtained under the premise of creative work is not made There are other implementations
Example, belongs to the scope of protection of the invention.
The embodiments described below with reference to the accompanying drawings are exemplary, be only used for explain the present invention, and it is not intended that It is right
The limitation of the present invention.On the contrary, embodiments of the invention include falling into the spirit and intension of attached claims In the range of institute
Change, change and equivalent.
Below with reference to the accompanying drawings heart rate detection method and device according to embodiments of the present invention are described.
The embodiment of first aspect present invention proposes a kind of communication software authorizing secure management system.
Fig. 1 is the bluetooth module volume production authorization control model of the embodiment of the present invention, and the model includes 4 modules:Bluetooth Mould
Block 1, the bluetooth module 1 has authorization control function, by bluetooth storehouse(Lib)And built-in application program(App) Two
It is grouped into, using the separate type working method of firmware independent compilation, authorization control function is comprised in bluetooth storehouse (Lib)In;
Bluetooth adapter module 2 is authorized, the mandate Bluetooth adapter module 2 only includes bluetooth transceiver(Chip)With Passive bluetooth
Adapter;Softdog module 3, the softdog module 3 include authorized quantity checking and controlled with authorized quantity renewal Module, use
In the reply message of generation unlocking request and control and renewal authorized quantity;Upper computer software module 4, it is described upper Machine software mould
The purpose of block 4 is to provide a storehouse for client, allows client oneself can write the test application of oneself, meanwhile, should Module has
Authorize the function of unblock.
Wherein, softdog module 3 with authorize Bluetooth adapter module 2 integrate, only by an interface with it is upper Position
Machine software module 4 is communicated, and is authorized and is carried out in the integration module, is entirely enclosed.
The embodiment of second aspect of the present invention provides communication software authorizing secure management method, and the control method is right first Bluetooth module locks operation, then is unlocked operation.
Fig. 2 is that bluetooth module of the embodiment of the present invention locks operating procedure, and its step is:S11 judges current Bluetooth module 1
With the presence or absence of authorization data;S12 is if it is present, with regard to normal operation, otherwise into unauthorized pattern;S13 In unauthorized
Under pattern, the bluetooth storehouse is every time from scheduler(gOS)In the gap of scheduling, go to judge current Bluetooth module 1 Whether
Time-out is run under unauthorized pattern;For S14 after unauthorized bluetooth module 1 runs time-out, size of message is sent to one Determine degree,
Or after initialization apparatus application programming interface call number reaches to a certain degree, bluetooth module 1 will no longer just Often operation, and notify user to authorize verification failure, namely be locked.
The bluetooth module unlocks operating procedure:The control of S21 upper computer softwares module 4 authorizes Bluetooth adapter module 2
Establish and connect with bluetooth module 1, and Bluetooth adapter mould is authorized to authorizing Bluetooth adapter module 2 to initiate inquiry The how many message of authorization surplus in block 2;S22 authorizes Bluetooth adapter module 2 to receive the how many report of authorization surplus Wen Hou, reply authorization surplus message;Whether S23 upper computer softwares module 4 is more than 0 to judge according to the surplus of mandate Whether operation is unlocked;For S24 as authorized surplus to be more than 0, upper computer software module 4 initiates unblock behaviour by authorization requests Make, afterwards, upper computer software module 4 waits the return of authorization response;S25 authorizes Bluetooth adapter module 2 to receive host computer ACL data messages are sent to bluetooth transceiver after the authorization response of software module 4, the message, which loads, authorizes index, for referring to Show that next needs are unlocked operation to bluetooth module 1;After S26 bluetooth transceivers receive the ACL data messages, pass through LE Channel gives data the bluetooth module 1 of unauthorized, the bluetooth module 1 of unauthorized receive after data message, it is necessary to oneself Licensing status is checked, if this module has authorized, needs to return to authorization failure, in order to avoid produce because of repetitive endowment, if This module unauthorized, then need equipment to address(UID)Issued as authorization requests and authorize Bluetooth adapter module 2;S27 is awarded After power Bluetooth adapter module 2 receives the request, the equipment in message is addressed(UID)Extract, then carry out AES- 128 computings:D=e (key, UID), wherein key are keys, and UID is equipment addressing;S28 bluetooth modules 1 receive mandate After response, D is extracted from message, and make to calculate D1=e in the same way(key, UID), then by D and D1 Matching comparison is carried out, if comparative result is equal, then authorized returning successfully, otherwise return to authorization failure;S29 authorizes blue After tooth adaptor module 2 receives mandate returning result, licensing process is considered as terminating, and reports that host computer is soft according to Authorization result Part module 4, the passage of report is HCI order completion events, meanwhile, authorize Bluetooth adapter module 2 to enter to authorized quantity Row reducing.
After bluetooth module 1 is unlocked every time, you can in normal mode of operation, and upper electricity is in normal later Work
Operation mode.
The present invention can limit client can not be arbitrarily from the MCU/ authorized a bluetooth module embedded communication Software
Copy out and be burnt in the MCU/ bluetooth modules of another unauthorized, copied even if user performs with insisting on Shellfish operates,
The embedded bitcom being copied still is not normally functioning in the MCU/ bluetooth modules of unauthorized, is achieved Positive skill
Art effect.
Although an embodiment of the present invention has been shown and described, it will be understood by those skilled in the art that:Not It is de-
From the present invention principle and objective in the case of can to these embodiments carry out it is a variety of change, modification, replace and Modification, this hair
Bright scope is limited by claim and its equivalent.

Claims (1)

  1. A kind of 1. communication software authorizing secure management method, first to bluetooth module(1)Operation is locked, then is unlocked operation, Characterized in that, the bluetooth module(1)Locking step be:
    S11 judges current Bluetooth module(1)With the presence or absence of authorization data;
    S12 is if it is present, with regard to normal operation, otherwise into unauthorized pattern;
    S13 is under unauthorized pattern, and the bluetooth storehouse is every time from scheduler(gOS)In the gap of scheduling, go to judge current indigo plant Tooth module(1)Whether time-out is run under unauthorized pattern;
    S14 works as unauthorized bluetooth module(1)After operation time-out, bluetooth module(1)By no longer normal operation, and notify user Verification failure is authorized, namely is locked;
    The bluetooth module(1)Unlocked step be:
    S21 upper computer software modules(4)Control authorizes Bluetooth adapter module(2)With bluetooth module(1)Establish and connect, and to Authorize Bluetooth adapter module(2)Initiate inquiry and authorize Bluetooth adapter module(2)The how many message of middle authorization surplus;
    S22 authorizes Bluetooth adapter module(2)After receiving the how many message of authorization surplus, authorization surplus report is replied Text;
    S23 upper computer software modules(4)Unblock operation is judged whether to according to whether the surplus of mandate is more than 0;
    S24 is as authorized surplus to be more than 0, upper computer software module(4)Unblock operation, afterwards, host computer are initiated by authorization requests Software module(4)Wait the return of authorization response;
    S25 authorizes Bluetooth adapter module(2)Receive upper computer software module(4)Authorization response after give bluetooth transceiver hair ACL data messages are sent, the message, which loads, authorizes index, for indicating next bluetooth module needs to be unlocked operation;
    After S26 bluetooth transceivers receive the ACL data messages, data are given by LE channels the bluetooth module of unauthorized (1), the bluetooth module of unauthorized(1)Receive after data message, it is necessary to check the licensing status of oneself, if this module It has been authorized that, then return to authorization failure, if this module unauthorized, equipment has been addressed UID and issues mandate indigo plant as authorization requests Tooth adaptor module(2);
    S27 authorizes Bluetooth adapter module(2)After receiving the request, the equipment addressing UID in message is extracted, then Carry out AES-128 computings:D=e (key, UID), wherein key are keys, and UID is equipment addressing;
    S28 bluetooth modules(1)After receiving authorization response, D is extracted from message, and make to calculate D1 in the same way =e(key, UID), D and D1 is then subjected to matching comparison, if comparative result is equal, then authorized returning successfully, it is no Then return to authorization failure;
    S29 authorizes Bluetooth adapter module(2)Receiving after authorizing returning result, licensing process is considered as terminating, and according to mandate As a result upper computer software module is reported(4), the passage of report is HCI order completion events, meanwhile, authorize Bluetooth adapter mould Block(2)Reducing will be carried out to authorized quantity.
CN201510602512.XA 2015-09-21 2015-09-21 A kind of communication software authorizing secure management method Active CN105224830B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510602512.XA CN105224830B (en) 2015-09-21 2015-09-21 A kind of communication software authorizing secure management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510602512.XA CN105224830B (en) 2015-09-21 2015-09-21 A kind of communication software authorizing secure management method

Publications (2)

Publication Number Publication Date
CN105224830A CN105224830A (en) 2016-01-06
CN105224830B true CN105224830B (en) 2018-03-30

Family

ID=54993795

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510602512.XA Active CN105224830B (en) 2015-09-21 2015-09-21 A kind of communication software authorizing secure management method

Country Status (1)

Country Link
CN (1) CN105224830B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101404056A (en) * 2008-10-29 2009-04-08 金蝶软件(中国)有限公司 Software protection method, apparatus and equipment
CN102184352A (en) * 2011-03-16 2011-09-14 东南大学 Automatic protecting method for computer system based on Bluetooth device authentication
CN102968580A (en) * 2006-01-27 2013-03-13 飞天诚信科技股份有限公司 Method for controlling software product production safety
CN103530161A (en) * 2013-10-22 2014-01-22 北京深思数盾科技有限公司 Wireless information security equipment system and security protection method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075217B (en) * 2010-12-22 2014-04-30 华为终端有限公司 Method for managing Bluetooth connection and equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102968580A (en) * 2006-01-27 2013-03-13 飞天诚信科技股份有限公司 Method for controlling software product production safety
CN101404056A (en) * 2008-10-29 2009-04-08 金蝶软件(中国)有限公司 Software protection method, apparatus and equipment
CN102184352A (en) * 2011-03-16 2011-09-14 东南大学 Automatic protecting method for computer system based on Bluetooth device authentication
CN103530161A (en) * 2013-10-22 2014-01-22 北京深思数盾科技有限公司 Wireless information security equipment system and security protection method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
关于防拷贝软件保护技术的研究;杨胜等;《咸宁学院学报》;20100630;第30卷(第6期);全文 *
软件保护技术的发展现状与展望;熊丽等;《软件导刊》;20051231(第19期);全文 *

Also Published As

Publication number Publication date
CN105224830A (en) 2016-01-06

Similar Documents

Publication Publication Date Title
CN103229184B (en) For the method and system of the access to secure resources
CN100487637C (en) Touching external connection keyboard
CN102231693A (en) Method and apparatus for managing access authority
CN102468971A (en) Authority management method and device, and authority control method and device
CN203849784U (en) NFC-based access control system
CN105701873B (en) A kind of Non-contact attendance recording method and attendance record system
CN106156589A (en) Wearable device, wearable device control method and the system thereof of terminal
WO2015167832A1 (en) Access control system for medical and dental computer systems
CN110097674A (en) A kind of access control method and system based on two dimensional code
CN108650119A (en) A kind of method and system of Remote configuration terminal device
CN205281615U (en) Portable electronic lock and electronic lock system
TW201028883A (en) Secure platform management device
CN105429660B (en) A kind of intelligence wearable device
CN105788035A (en) With the passive intelligence lock that has NFC function card reader mode mobile communication
CN109448171A (en) A kind of method and smart lock of unlocking
CN206292898U (en) A kind of multiple-authentication safety-protection system
CN105224830B (en) A kind of communication software authorizing secure management method
CN100488073C (en) Method and system for completing blue-tooth on-line match program by wire interface
CN108270798A (en) A kind of mobile terminal device safety management system
CN106156549A (en) Application program authorization processing method and device
CN104579639A (en) Realizing for multi-party cooperation authorization key and system adopting same for mobile wireless control
CN103198257B (en) Security under mixed information treatment facility environment is reused
CN109979053A (en) A kind of offline model Internet of Things lock device and cipher key transmission methods based on MULTIPLE DYNAMIC key
CN206224646U (en) A kind of lease mansion intelligent door lock
Ting et al. Wireless monitoring system based on bluetooth smart phones

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 510663 Room 403-404, Area B2, Creative Building, No. 162, Science Avenue, Science City, Huangpu District, Guangzhou City, Guangdong Province (office only)

Patentee after: Guangzhou bide Technology Co.,Ltd.

Address before: 510663 C1-1105, Innovation Building, No. 182, Science Avenue, Science City, Development Zone, Guangzhou, Guangdong, China

Patentee before: BDE TECHNOLOGY Co.,Ltd.

CP03 Change of name, title or address
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A security management method of communication software authorization

Effective date of registration: 20221121

Granted publication date: 20180330

Pledgee: Bank of Guangzhou branch of the Bank of Guangzhou Science City Branch

Pledgor: Guangzhou bide Technology Co.,Ltd.

Registration number: Y2022980022657

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Granted publication date: 20180330

Pledgee: Bank of Guangzhou branch of the Bank of Guangzhou Science City Branch

Pledgor: Guangzhou bide Technology Co.,Ltd.

Registration number: Y2022980022657