CN105227583B - A kind of key encryption method and system, electronic equipment - Google Patents

A kind of key encryption method and system, electronic equipment Download PDF

Info

Publication number
CN105227583B
CN105227583B CN201510745100.1A CN201510745100A CN105227583B CN 105227583 B CN105227583 B CN 105227583B CN 201510745100 A CN201510745100 A CN 201510745100A CN 105227583 B CN105227583 B CN 105227583B
Authority
CN
China
Prior art keywords
key
pseudo
effective
information
effective key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510745100.1A
Other languages
Chinese (zh)
Other versions
CN105227583A (en
Inventor
徐至强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Luo Bicheng
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201510745100.1A priority Critical patent/CN105227583B/en
Publication of CN105227583A publication Critical patent/CN105227583A/en
Application granted granted Critical
Publication of CN105227583B publication Critical patent/CN105227583B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Abstract

The present invention provides a kind of key encryption method and system, electronic equipment.Wherein, key encryption method includes: the pseudo- key information that logon account is arranged, and pseudo- key information includes the total bit and active position information of pseudo- key;It is retrieved as effective key of logon account generation, and effective key is handled according to the pseudo- key information of logon account, generates the effective key of puppet corresponding with effective key;The pseudo- effective key of display.Key cryptographic systems include: pseudo- key information setup module, pseudo- key information are arranged for logon account, pseudo- key information includes the total bit and active position information of pseudo- key;Pseudo- effective key production module, for being retrieved as effective key of logon account generation, and is handled effective key according to the pseudo- key information of logon account, generates the effective key of puppet corresponding with effective key;Pseudo- effectively key display module, for showing pseudo- effective key.Technical solution of the present invention can be improved the safety of two steps certification.

Description

A kind of key encryption method and system, electronic equipment
Technical field
The present invention relates to a kind of safe practices, more particularly to a kind of key encryption method and system, electronic equipment.
Background technique
With the continuous development of computer technology, computer application range is more and more extensive, the peace in computer system Full certification also becomes more and more important.Common safety certifying method includes password authentication, and the course of work probably includes: system With the preparatory prescribed password of user, and user name and cryptographic binding being stored in database, user inputs the user name and password when logging in, If the password matches with content in database, certification passes through, and system allows user to access.In order to improve the safety of certification Property, it uses one-time password (dynamic password) and authenticates.The main thought of one-time password is: being added in login process not really Determine factor (variable), is different from the password information transmitted in logging in every time, even if attacker is allowed to intercept and capture password, this mouth Order has also been cancelled, and can not be used to implement to invade.The advantages of two step authentication methods combine password authentication and dynamic authentication.At present Two step authentication methods require code key equipment by SMS obtain or corresponding software calculate one by algorithm and face When key, meanwhile, the key have certain timeliness, usually behind 30 seconds or 60 seconds i.e. fail.Therefore, this way For relatively traditional step certification, the safety of system is greatly improved.But under this scheme, when two steps of user authenticate It after equipment is obtained by other people, is not still avoided that and is abused by malicious person, touched for logging in the secured account of the owner Sensitive information.
In consideration of it, how to find the technical solution for the safety for further increasing the certification of two steps just becomes art technology Personnel's urgent problem to be solved.
Summary of the invention
In view of the foregoing deficiencies of prior art, the purpose of the present invention is to provide a kind of authentication key encryption method and System, for solving the problems, such as that the safety of two steps certification in the prior art needs to be further increased.
In order to achieve the above objects and other related objects, the present invention provides a kind of key encryption method, the key encryption Method includes: the pseudo- key information that logon account is arranged, and the puppet key information includes the total bit and active position of pseudo- key Information;It is retrieved as effective key of logon account generation, and according to the pseudo- key information of the logon account to described effectively close Key is handled, and the effective key of puppet corresponding with the effective key is generated;Show the effective key of puppet.
Optionally, effective key includes interim effective key.
Optionally, the authentication key encryption method further include: the modification pseudo- key information.
Optionally, the authentication key encryption method further include: the modification pseudo- key information needs to pass through password authentification.
Optionally, the password includes the total bit and active position information of presently described pseudo- key.
Optionally, the password include the total bit of presently described pseudo- key and with the active position information to corresponding Inoperative position information.
Optionally, the specific implementation for obtaining effective key includes receiving effective key by short message.
The present invention provides a kind of key cryptographic systems, and the key cryptographic systems include: pseudo- key information setup module, uses Pseudo- key information is set in logon account, the puppet key information includes the total bit and active position information of pseudo- key;Puppet has Key production module is imitated, is believed for being retrieved as effective key of logon account generation, and according to the pseudo- key of the logon account Breath handles effective key, generates the effective key of puppet corresponding with the effective key;Pseudo- effectively key is shown Module, for showing the effective key of puppet.
Optionally, effective key includes interim effective key.
Optionally, the pseudo- key information setup module is also used to: the modification pseudo- key information.
Optionally, the pseudo- key information setup module is also used to: the modification pseudo- key information needs to test by password Card, the password include the total bit and active position information of presently described pseudo- key.
Optionally, the pseudo- key information setup module is also used to: the modification pseudo- key information needs to test by password Card, the password include the total bit of presently described pseudo- key and with the active position information to corresponding invalid bit confidence Breath.
Optionally, the pseudo- effectively key production module obtains effective key by short message.
The present invention provides a kind of electronic equipment, and the electronic equipment includes key cryptographic systems as described above.
Optionally, the electronic equipment includes mobile phone.
As described above, a kind of key encryption method of the invention and system, electronic equipment, have the advantages that pair Word is obscured in the certain bits addition of two-pass cipher (interim effective key) in two step card systems, even if to realize the certification of two steps After equipment is obtained by other people, it still cannot be used to log in the purpose of owner's account.
Detailed description of the invention
Fig. 1 is shown as a kind of flow diagram of an embodiment of key encryption method of the invention.
Fig. 2 is shown as a kind of module diagram of an embodiment of key cryptographic systems of the invention.
Component label instructions
1 key cryptographic systems
11 pseudo- key information setup modules
12 pseudo- effective key production modules
13 pseudo- effectively key display modules
S1~S3 step
Specific embodiment
Illustrate embodiments of the present invention below by way of specific specific example, those skilled in the art can be by this specification Other advantages and efficacy of the present invention can be easily understood for disclosed content.The present invention can also pass through in addition different specific realities The mode of applying is embodied or practiced, the various details in this specification can also based on different viewpoints and application, without departing from Various modifications or alterations are carried out under spirit of the invention.
It should be noted that the basic conception that only the invention is illustrated in a schematic way is illustrated provided in the present embodiment, Then only shown in schema with it is of the invention in related component rather than component count, shape and size when according to actual implementation draw System, when actual implementation kenel, quantity and the ratio of each component can arbitrarily change for one kind, and its assembly layout kenel can also It can be increasingly complex.
The present invention provides a kind of key encryption method.The key encryption method can be applied in two step verification process, To be encrypted to the secondary key (temporary key) in two step card systems.In one embodiment, the key encryption side Method includes:
The pseudo- key information of logon account is set, and the puppet key information includes the total bit and significance bit confidence of pseudo- key Breath.
It is retrieved as effective key of logon account generation, and according to the pseudo- key information of the logon account to described effective Key is handled, and the effective key of puppet corresponding with the effective key is generated.
Show the effective key of puppet.
In one embodiment, as shown in Figure 1, the key encryption method includes:
Step S1, is arranged the pseudo- key information of logon account, and the puppet key information includes the total bit of pseudo- key and has Imitate location information.The pseudo- key information of logon account can be set in user, and the puppet key information includes the total bit of pseudo- key With active position information.Such as setting 2,3,6,8 significance bits for pseudo- key, the total bit of pseudo- key is 9.I.e. at 9 Pseudo- key in, effective key include 4, be the 2nd, 3,6,8 in pseudo- key.If the digit of effective key is greater than 4, If effective key is 6.The pseudo- key then generated is 9+2=11, and effective key is that the 2nd, 3,6,8 in pseudo- key adds 10th, 11.
Step S2 is retrieved as effective key of logon account generation, and according to the pseudo- key information pair of the logon account Effective key is handled, and the effective key of puppet corresponding with the effective key is generated.Effective key includes facing Shi Youxiao key.In general, the secondary key (effective key) generated in secondary verifying for logon account all with it is certain when Effect property fails usually behind 30 seconds or 60 seconds.The method for obtaining effective key includes being obtained by SMS It takes.
Step S3 shows the effective key of puppet.For example, according to the effective key generation obtained by SMS Pseudo- effective key, and shown by way of short message.Specifically, effective key is obtained by SMS, generates corresponding puppet After effective key, shows the effective key of puppet, i.e., the effective key shown originally is modified as the pseudo- effective key of display.This Pseudo- effective key is shown in SMS, is not available third party intercepts and captures for sample.And user can be according to setting Pseudo- key information, conveniently determine really effective key.
In one embodiment, the authentication key encryption method further include: the modification pseudo- key information.Described in modification Pseudo- key information needs to pass through password authentification.The password may include the total bit and significance bit confidence of presently described pseudo- key Breath.The password can also include the total bit of presently described pseudo- key and with the active position information to corresponding invalid bit Confidence breath.
In one embodiment, the key encryption method include: 1, login user (the registration terminal equipment owner) just Need to set true secondary key (effective key) when secondary use in the key (pseudo- key or pseudo- effective key) after obscuring Location information (active position information) and obscure password total bit (pseudo- key total length), and with the location information and total bit The authentication password gone here and there as the modification next time location information.Such as setting: 2368 be significance bit, obscure length be 9, then under The authentication password of secondary modification scramble data is then 23689.2, secondary key software for calculation will use when computation key The aliasing strategy of one step user setting is obscured the true key completed is calculated, and the key after obscuring can finally be shown Out.The true secondary key for such as calculating acquisition is 3426, according to the obfuscation schemes being arranged before, is always obscured 2368 in position 9 Position is significance bit, eventually obtains the key of x34xx2x6x form (x is any character).4 numbers are greater than for true key The case where for, subsequent true key can be discharged to it is specified obscure length after.Such as true secondary key position 342698, then According to the obfuscation schemes being arranged before, always obscuring in position 9 2368 is significance bit, eventually obtains x34xx2x6x98 form Key (x is any character).3, for using for system of the short message as reception re-authentication key, system can be connect Pipe short message application identifies re-authentication key short message by keyword scan and matching.Key part is intercepted out, passes through The aliasing strategy of one step setting is obscured to the secondary key (effective key) and (is transformed into pseudo- effective key).
The present invention provides a kind of key cryptographic systems.The key cryptographic systems can be encrypted using key as described above Method.In one embodiment, as shown in Fig. 2, the key cryptographic systems are effective including pseudo- key information setup module 11, puppet Key production module 12 and pseudo- effectively key display module 13.Wherein:
Pseudo- key information is arranged for logon account in pseudo- key information setup module 11, and the puppet key information includes pseudo- close The total bit and active position information of key.The pseudo- key information of logon account can be set in user, and the puppet key information includes The total bit and active position information of pseudo- key.Such as setting 2,3,6,8 significance bits for pseudo- key, the total bit of pseudo- key It is 9.I.e. in 9 pseudo- keys, it is the 2nd, 3,6,8 in pseudo- key that effective key, which includes 4,.If effective key Digit be greater than 4, such as effective key be 6.The pseudo- key then generated is 9+2=11, and effective key is in pseudo- key 2nd, 3,6,8 adds the 10th, 11.In one embodiment, the pseudo- key information setup module 11 is also used to: modification is pseudo- Key information.Further, user needs to input and by that could modify pseudo- key information after password authentification.In one embodiment In, the puppet key information setup module 11 is also used to: the modification pseudo- key information is needed through password authentification, the password Total bit and active position information including presently described pseudo- key.In one embodiment, mould is arranged in the pseudo- key information Block 11 is also used to: the modification pseudo- key information is needed through password authentification, and the password includes the total of presently described pseudo- key Digit and with the active position information to corresponding inoperative position information.
Pseudo- effectively key production module 12 is connected with the pseudo- key information setup module 11, for according to the login account The pseudo- key information at family handles effective key, generates the effective key of puppet corresponding with the effective key.Institute Stating effective key includes interim effective key.In general, (effectively close for the secondary key of logon account generation in secondary verifying Key) all there is certain timeliness, it fails usually behind 30 seconds or 60 seconds.Obtain the method packet of effective key It includes and is obtained by SMS.
Pseudo- effectively key display module 13 is connected with the pseudo- effectively key production module 12, for showing the puppet effectively Key.In one embodiment, pseudo- effectively key production module 12 obtains effective key by SMS, generates corresponding puppet After effective key, shows the effective key of puppet, i.e., the effective key shown originally is modified as the pseudo- effective key of display.
The present invention provides a kind of electronic equipment, and the electronic equipment includes key cryptographic systems as described above.The electricity Sub- equipment is as the key devices for receiving secondary key, i.e. re-authentication equipment.The electronic equipment includes mobile phone.Due to only The owner knows the significance bit (pseudo- key information) obscured in key (pseudo- effective key), even if third party is obtaining the two of user After walking authenticating device, discrimination it can not go out true effective key from pseudo- effectively key, so even obtaining on authenticating device The re-authentication key (pseudo- effective key) of display, still cannot be used to the account of the logging device owner.To improve peace Quan Xing.
In conclusion a kind of key encryption method of the invention and system, electronic equipment pass through in two step card systems Two-pass cipher (effective key) carry out puppet key handling, to show pseudo- effective key in two step authenticating devices, only User could determine effective key according to pseudo- effectively key, even if thus after realizing that two step authenticating devices are obtained by other people, still The purpose of owner's account cannot be used to log in.So the present invention effectively overcomes various shortcoming in the prior art and has height Spend value of industrial utilization.
The above-described embodiments merely illustrate the principles and effects of the present invention, and is not intended to limit the present invention.It is any ripe The personage for knowing this technology all without departing from the spirit and scope of the present invention, carries out modifications and changes to above-described embodiment.Cause This, institute is complete without departing from the spirit and technical ideas disclosed in the present invention by those of ordinary skill in the art such as At all equivalent modifications or change, should be covered by the claims of the present invention.

Claims (7)

1. a kind of key encryption method, which is characterized in that the key encryption method includes:
The pseudo- key information of logon account is set, and the puppet key information includes the total bit and active position information of pseudo- key;
It is retrieved as effective key of logon account generation, and according to the pseudo- key information of the logon account to effective key It is handled, generates the effective key of puppet corresponding with the effective key;
Show the effective key of puppet;
The pseudo- key information according to the logon account handles effective key, comprising:
When effective key digit be equal to active position digit, then effective key is sequentially arranged in the significance bit It sets;
When effective key digit be greater than active position digit, then effective key is sequentially arranged in the significance bit It sets and is placed in the remaining part of key of effective key after the total bit of the pseudo- key;
Authentication key encryption method further include: the modification pseudo- key information modifies the pseudo- key information and needs to pass through password Verifying, the password are the total bit and active position information of current pseudo- key.
2. key encryption method according to claim 1, it is characterised in that: effective key includes interim effectively close Key.
3. key encryption method according to claim 1, it is characterised in that: obtain the specific implementation packet of effective key It includes and effective key is received by short message.
4. a kind of key cryptographic systems, it is characterised in that: the key cryptographic systems include: pseudo- key information setup module, are used Pseudo- key information is set in logon account, the puppet key information includes the total bit and active position information of pseudo- key;Puppet has Key production module is imitated, is believed for being retrieved as effective key of logon account generation, and according to the pseudo- key of the logon account Breath handles effective key, generates the effective key of puppet corresponding with the effective key;Pseudo- effectively key is shown Module, for showing the effective key of puppet;
The puppet key information setup module is also used to: the modification pseudo- key information, and the modification pseudo- key information needs logical Password authentification is crossed, the password includes the total bit and active position information of presently described pseudo- key;
Wherein, the pseudo- key information according to the logon account handles effective key, comprising:
When effective key digit be equal to active position digit, then effective key is sequentially arranged in the significance bit It sets;
When effective key digit be greater than active position digit, then effective key is sequentially arranged in the significance bit It sets and is placed in the remaining part of key of effective key after the total bit of the pseudo- key.
5. key cryptographic systems according to claim 4, it is characterised in that: the pseudo- effectively key production module passes through short Letter obtains effective key.
6. a kind of electronic equipment, it is characterised in that: the electronic equipment includes such as any claim institute in claim 4 to 5 The key cryptographic systems stated.
7. electronic equipment according to claim 6, it is characterised in that: the electronic equipment includes mobile phone.
CN201510745100.1A 2015-11-05 2015-11-05 A kind of key encryption method and system, electronic equipment Active CN105227583B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510745100.1A CN105227583B (en) 2015-11-05 2015-11-05 A kind of key encryption method and system, electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510745100.1A CN105227583B (en) 2015-11-05 2015-11-05 A kind of key encryption method and system, electronic equipment

Publications (2)

Publication Number Publication Date
CN105227583A CN105227583A (en) 2016-01-06
CN105227583B true CN105227583B (en) 2019-08-02

Family

ID=54996262

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510745100.1A Active CN105227583B (en) 2015-11-05 2015-11-05 A kind of key encryption method and system, electronic equipment

Country Status (1)

Country Link
CN (1) CN105227583B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878010A (en) * 2017-02-22 2017-06-20 美的智慧家居科技有限公司 Encryption and decryption method and device based on security chip key pair
CN109064602B (en) * 2018-08-01 2021-03-02 夏颖 Identification method based on mobile terminal and two-dimensional code dynamic identity authentication
CN111092721B (en) * 2019-12-03 2023-03-03 深圳前海微众银行股份有限公司 Method and device for setting access password

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101500011A (en) * 2009-03-13 2009-08-05 北京华大智宝电子系统有限公司 Method and system for implementing dynamic password security protection
CN102571330A (en) * 2012-02-01 2012-07-11 王勇 Method for constructing block encryption algorithm based on random function
CN104994115A (en) * 2015-08-06 2015-10-21 上海斐讯数据通信技术有限公司 Login authentication method and system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702191A (en) * 2009-10-31 2010-05-05 浙江德施曼机电有限公司 Device and method for verifying passwords
WO2012159225A1 (en) * 2011-05-26 2012-11-29 Liu Yingjie Dynamic interactive identity authentication method and system
CN103036852B (en) * 2011-09-29 2015-10-28 北大方正集团有限公司 A kind of method and device realizing network entry
CN103973651B (en) * 2013-02-01 2018-02-27 腾讯科技(深圳)有限公司 Setting, querying method and device are identified based on the account password of salt cryptographic libraries is added
CN104320767A (en) * 2014-11-10 2015-01-28 吴东辉 Short message verification system and method
CN104618104B (en) * 2014-12-15 2019-11-29 惠州Tcl移动通信有限公司 Accessory, electronic equipment and the system for realizing accessory certification
CN104618367A (en) * 2015-01-27 2015-05-13 杨勇 Transfer privacy device and data transmission method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101500011A (en) * 2009-03-13 2009-08-05 北京华大智宝电子系统有限公司 Method and system for implementing dynamic password security protection
CN102571330A (en) * 2012-02-01 2012-07-11 王勇 Method for constructing block encryption algorithm based on random function
CN104994115A (en) * 2015-08-06 2015-10-21 上海斐讯数据通信技术有限公司 Login authentication method and system

Also Published As

Publication number Publication date
CN105227583A (en) 2016-01-06

Similar Documents

Publication Publication Date Title
WO2017197974A1 (en) Biometric characteristic-based security authentication method, device and electronic equipment
CN103167491B (en) A kind of mobile terminal uniqueness authentication method based on software digital certificate
CN107113315A (en) Identity authentication method, terminal and server
CN101005361B (en) Server and software protection method and system
CN105554035B (en) A kind of electronic lock system and its control method
CN109600223A (en) Verification method, Activiation method, device, equipment and storage medium
CN103401689B (en) Positional information based dynamic token and encryption method thereof
CN107844946A (en) A kind of method, apparatus and server of electronic contract signature
CN102347957A (en) Cloud network admission identifying system and admission identifying technology
CN106304074A (en) Auth method and system towards mobile subscriber
CN102594820B (en) Secure multi-party computation privacy-protecting evaluation method based on scenes of internet of things
CN106936790A (en) The method that client and server end carries out two-way authentication is realized based on digital certificate
CN106301793B (en) A kind of method of PLC certifications and secure communication
CN105227583B (en) A kind of key encryption method and system, electronic equipment
CN101741565A (en) Method and system for transmitting IC (integrated circuit)-card application data
CN106850207A (en) Identity identifying method and system without CA
CN103188241A (en) User account management method based on mobile intelligent terminal number
CN104994115B (en) A kind of login authentication method and system
CN106576047B (en) Make Password Operations from the method and apparatus of malicious modification
CN106817346A (en) Data transmission method and device and electronic equipment
CN106953732A (en) The key management system and method for chip card
CN105187463A (en) Remote sharing method, VTM terminal, network side equipment, and system
CN105187382A (en) Multi-factor identity authentication method for preventing library collision attacks
CN103401686B (en) A kind of user's OTP WEB Authentication System and application process thereof
CN106656993A (en) Dynamic verification code verifying method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201209

Address after: 313028 Industrial Park, balidian Town, Huzhou City, Zhejiang Province

Patentee after: HUZHOU FENGYUAN AGRICULTURAL EQUIPMENT MANUFACTURE Co.,Ltd.

Address before: 201616 No. 3666 Sixian Road, Songjiang District, Shanghai

Patentee before: Phicomm (Shanghai) Co.,Ltd.

PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A key encryption method, system and electronic equipment

Effective date of registration: 20211203

Granted publication date: 20190802

Pledgee: Zhejiang Tailong Commercial Bank Co.,Ltd. Huzhou Branch

Pledgor: HUZHOU FENGYUAN AGRICULTURAL EQUIPMENT MANUFACTURE Co.,Ltd.

Registration number: Y2021330002446

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20230811

Granted publication date: 20190802

Pledgee: Zhejiang Tailong Commercial Bank Co.,Ltd. Huzhou Branch

Pledgor: HUZHOU FENGYUAN AGRICULTURAL EQUIPMENT MANUFACTURE Co.,Ltd.

Registration number: Y2021330002446

PC01 Cancellation of the registration of the contract for pledge of patent right
TR01 Transfer of patent right

Effective date of registration: 20240319

Address after: No. 6, Group 6, Baiguo Village, Xiaocun Township, Xianfeng County, Enshi Tujia and Miao Autonomous Prefecture, Hubei Province, 445600

Patentee after: Luo Bicheng

Country or region after: Zhong Guo

Address before: 313028 Industrial Park, balidian Town, Huzhou City, Zhejiang Province

Patentee before: HUZHOU FENGYUAN AGRICULTURAL EQUIPMENT MANUFACTURE Co.,Ltd.

Country or region before: Zhong Guo

TR01 Transfer of patent right