CN105871852A - Intelligent router, safety management method of router - Google Patents
Intelligent router, safety management method of router Download PDFInfo
- Publication number
- CN105871852A CN105871852A CN201610216643.9A CN201610216643A CN105871852A CN 105871852 A CN105871852 A CN 105871852A CN 201610216643 A CN201610216643 A CN 201610216643A CN 105871852 A CN105871852 A CN 105871852A
- Authority
- CN
- China
- Prior art keywords
- router
- safety control
- equipment safety
- module
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/60—Router architectures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
Abstract
This invention discloses an intelligent router and a safety management method of the router. The core concept is to divide the router into a router main body and a safety management device connected with the router main body through a USB; only when the safety management device is inserted on the router main body, the network function of the router main body is activated; when the router main body is activated, a login account and password are generated randomly according to a preset period, and the login account and password are sent to a user phone through the safety management device. The intelligent router and the safety management method provided in the invention can effectively prevent a malicious network loiter behavior.
Description
Technical field
The present invention relates to a kind of network security technology, more specifically, it relates to a kind of intelligent router, Router Security management method.
Background technology
Along with the fast development of mobile communication, wireless router is popularized at average family rapidly.Wireless router brings great convenience to everybody life.A lot of smart machines provide substantial amounts of user privacy information in the family lan that wireless router provides.And in order to easy to use, major applications the most simply relies on wireless network to log in encryption to ensure security.The most various wireless networks crack and rub net and apply the most popular, great potential safety hazard is brought to wireless router user, person affects the networking speed of user to rub net, even change wireless routing authority, interference user normally uses, more serious may steal privacy of user, forms very big potential safety hazard.
Summary of the invention
The deficiency existed for prior art, first purpose of the present invention is to provide a kind of intelligent router, and it can effectively prevent malice from rubbing the behavior of net.
For achieving the above object, the technical scheme is that
A kind of intelligent router, the router body arranged including split and equipment safety control;Described router body is connected by USB with equipment safety control;
Described router body includes:
Equipment Inspection module, is used for detecting whether described equipment safety control is connected into router body;
Secret generation module, for when Equipment Inspection module detects that described equipment safety control has been connected on router, according to default cycle stochastic generation login account and password;
Network control module, testing result based on Equipment Inspection module, to control router whether open network function;
Sending module, for when Equipment Inspection module detects that described equipment safety control has been connected on router, the login account generated by secret generation module and password send to equipment safety control;
Described equipment safety control includes:
Memory module, for storing the phone number of secured user;
Gsm module, for providing function of receiving and sending short message for equipment safety control;
Secured user configures module, is identified for the short message content receiving gsm module, if recognizing first kind book character, then separates effective phone number from this short message content, and be deposited into memory module;
Forwarding module, for receiving login account and password from router body, and by gsm module by the login account received and password with note by the way of, be sent in memory module the phone number of all secured users of storage.
Further, if described secured user configures module and is also configured to recognize Equations of The Second Kind book character, then from this short message content, separate effective phone number, and from memory module, delete corresponding phone number.
Further, if described secured user configures module and is also configured to recognize the 3rd class book character, then generate corresponding control instruction based on the 3rd class book character, and described control instruction is sent the secret generation module to router body;
Described secret generation module stops in response to described control instruction, continues stochastic generation login account and password, or refreshes account and password immediately.
Further, described secured user configures module and is also configured to when recognizing first kind book character first, is labeled as the effective phone number separated from short message content managing user;
Described secured user configures module when recognizing first kind book character, Equations of The Second Kind book character or the 3rd class book character, it is judged that whether the phone number sending this note is management user, the most then proceed to operate accordingly.
Further, described equipment safety control also includes prompting module, described prompting module is used for detecting whether equipment safety control disconnects with router body, and after detecting and disconnecting, sends corresponding information to described management user by the way of gsm module is with note.
Further object is that a kind of Router Security management method of offer, it can effectively prevent malice from rubbing the behavior of net.
For achieving the above object, the technical scheme is that
A kind of Router Security management method, implements based on the intelligent router in such scheme, including:
Secured user's configuration step: user sends note by mobile phone to equipment safety control;After equipment safety control receives note, identify short message content, if recognizing first kind book character, then from this short message content, separate effective phone number store, and this phone number is labeled as secured user;
Router activates step: be connected in router body by described equipment safety control;Router body, after detecting that equipment safety control has connected, starts according to default cycle stochastic generation login account and password, and sends this account and password to equipment safety control;
Account number cipher forwards step: it, after getting account and password, is forwarded on all phone numbers of storage by the way of note by equipment safety control.
Further, also include secured user's delete step: user sends the note comprising Equations of The Second Kind book character by mobile phone to equipment safety control, equipment safety control is after receiving this note and identifying Equations of The Second Kind book character, from short message content, separate effective phone number, and be deleted from the phone number classification of storage.
Further, also include that password generates rate-determining steps: user sends the note comprising the 3rd class book character by mobile phone to equipment safety control, equipment safety control is after receiving this note and identifying the 3rd class book character, generate corresponding control instruction based on the 3rd class book character, and described control instruction is sent to router body;Router body, after receiving described control instruction, performs stopping, continuing stochastic generation login account and password, or refresh account and password immediately.
Further, in described secured user's configuration step, if described equipment safety control recognizes first kind book character first from the note received, then it is labeled as the phone number separated from this short message content managing user;Afterwards,
Described equipment safety control is when recognizing first kind book character, Equations of The Second Kind book character or the 3rd class book character, it is judged that whether the phone number sending this note is management user, the most then proceed to operate accordingly.
Further, described method also includes reminding step: after equipment safety control and router body disconnect, and equipment safety control sends corresponding information to described management user in the way of note.
Compared with prior art, the invention have the advantage that
1, user needs to be connected in router body equipment safety control by USB, can activate the network function of router body, thus avoid user not time, by the malicious attack of the person that rubs net;
2, user is after being connected to equipment safety control in router body, router body is according to default cycle stochastic generation login account and password, and by the way of equipment safety control is with note, it is forwarded to corresponding user, like this, only can receive the user of note, online can be continued;The terminal of the person that rubs net the most directly can disconnect, it is impossible to continues online.
Accompanying drawing explanation
Fig. 1 is the structural representation of intelligent router in the present invention;
Fig. 2 is the module principle figure of router body in the present invention;
Fig. 3 is the module principle figure of equipment safety control in the present invention.
Reference: 1, router body, 11, USB female, 2, equipment safety control, 21, USB male joint, 22, sim card slot.
Detailed description of the invention
Below in conjunction with embodiment and accompanying drawing, the present invention is described in further detail, but embodiments of the present invention are not limited only to this.
Embodiment one:
With reference to Fig. 1, a kind of intelligent router, the router body 1 arranged including split and equipment safety control 2;Router body 1 is connected by USB with equipment safety control 2, i.e. the rear side of router body 1 is provided with USB female 11, and equipment safety control 2 uses the structure of USB flash disk, and its front end is provided with USB male joint 21.
With reference to Fig. 2, router body 1 includes Equipment Inspection module, secret generation module, network control module and sending module.
Equipment Inspection module, after detecting that equipment safety control 2 is connected in router body 1, generates and detects instruction accordingly, and sends this detection instruction to secret generation module and network control module.
Secret generation module is after receiving detection instruction, and based on default cycle stochastic generation login account and password, the packed format of password is preferably the combination of numeral+letter+symbol, to increase its complexity, it is to avoid be cracked easily.Secret generation module often generates an account and password, generates one simultaneously and sends instruction, and this transmission instruction is transferred into sending module.
Network control module, after receiving detection instruction, controls the mixed-media network modules mixed-media in router body 1 and opens, thus outwards open network function.
Sending module, after receiving transmission instruction, starts to obtain login account and password from secret generation module, after acquisition, account and password is sent to equipment safety control 2 by USB interface;
With reference to Fig. 3, equipment safety control 2 includes that memory module, gsm module, secured user configure module and forwarding module.
Gsm module provides function of receiving and sending short message for equipment safety control 2, and the rear end of equipment safety control 2 is provided with SIMSIM draw-in groove 22, and during use, Mobile phone card is inserted in SIMSIM draw-in groove 22 by user.After completing operation, user can use the mobile phone Mobile phone card to being inserted on equipment safety control 2 to send note.Gsm module, after receiving note, transmits it to secured user and configures module.
Secured user configures the short message content that module is configured to receive gsm module and is identified, if recognizing first kind book character, then separates effective phone number from this short message content, and is deposited into memory module.Such as, the short message content that user edits for "
TJYH1320576XXXX ", wherein, " TJYH " represents and adds user, and " 1320576XXXX " represents the phone number of the user added.Therefore, secured user configures module after recognizing " TJYH ", can extract 11 bit digital below, and this piece of digital is the phone number of user to be added.It should be noted that when secured user configures module for configuring first, the user added can be marked as managing user, and afterwards, the note that only this management user sends can be configured module identification by secured user.
When managing user and wanting to delete user from memory module, have only to send, with mobile phone, the note comprising Equations of The Second Kind book character, such as " SCYH1521580XXXX ", wherein " SCYH " represents and deletes user, and " 1521580XXXX " represents the phone number of user to be deleted.Secured user configures module after recognizing " SCYH ", can extract 11 bit digital below, and this piece of digital is the phone number of user to be deleted, and after having extracted, i.e. deletes corresponding phone number from memory module.
If it addition, management user wants to control the operational module of the secret generation module in router body 1, can optionally edit corresponding note, send to equipment safety control 2.Such as, management user wants to control router body 1 and stops stochastic generation account and password, the then edit package note containing " TZSCMM ", and " TZSCMM " represents and stop generating password.Secured user configures after module recognizes " TZSCMM ", generates corresponding control instruction, and by USB interface, control instruction is sent the secret generation module to router body 1.After secret generation module receives control instruction, stop immediately generating account and password.Correspondingly, if management user wants to control router body 1 continues stochastic generation account and password, it is only necessary to the edit package note containing " JXSCMM ", " JXSCMM " represents and continues to generate password.If management user wants to refresh current account and password immediately, it is only necessary to the edit package note containing " SXMM ", " SXMM " represents and refreshes password.
Forwarding module for receiving login account and password from router body 1, and by gsm module by the login account received and password with note by the way of, be sent in memory module the phone number of all secured users of storage.The content of note can be " WIFi login account: XXXXXX, login password: XXXXXX ".
In same embodiment, further, equipment safety control 2 also includes prompting module, prompting module is used for detecting whether equipment safety control 2 disconnects with router body 1, and after detecting and disconnecting, corresponding information is sent, to reach reminding effect to management user by the way of gsm module is with note.The content of information can be " equipment safety control is pulled out ".
A kind of Router Security management method, implements based on the intelligent router in such scheme, including:
Secured user's configuration step: user sends note by mobile phone to equipment safety control 2;After equipment safety control 2 receives note, identify short message content, if recognizing first kind book character, then from this short message content, separate effective phone number store, and this phone number is labeled as secured user;
Router activates step: be connected in router body 1 by equipment safety control 2;Router body 1, after detecting that equipment safety control 2 has connected, starts according to default cycle stochastic generation login account and password, and sends this account and password to equipment safety control 2;
Account number cipher forwards step: it, after getting account and password, is forwarded on all phone numbers of storage by the way of note by equipment safety control 2.
Further, also include secured user's delete step: user sends the note comprising Equations of The Second Kind book character by mobile phone to equipment safety control 2, such as " SCYH1521580XXXX ", wherein " SCYH " represents and deletes user, and " 1521580XXXX " represents the phone number of user to be deleted.Equipment safety control 2, after receiving this note and identifying Equations of The Second Kind book character, separates effective phone number from short message content, and is deleted from the phone number classification of storage.
Further, also include that password generates rate-determining steps: user sends the note comprising the 3rd class book character by mobile phone to equipment safety control 2, such as, management user wants to control router body 1 and stops stochastic generation account and password, the then edit package note containing " TZSCMM ", " TZSCMM " represents and stops generating password.After equipment safety control 2 recognizes " TZSCMM ", generate corresponding control instruction, and control instruction is sent to router body 1 by USB interface.After router body 1 receives control instruction, stop immediately generating account and password.Correspondingly, if management user wants to control router body 1 continues stochastic generation account and password, it is only necessary to the edit package note containing " JXSCMM ", " JXSCMM " represents and continues to generate password.If management user wants to refresh current account and password immediately, it is only necessary to the edit package note containing " SXMM ", " SXMM " represents and refreshes password.Therefore, by upper method, user can control router body 1 and perform stopping, continuing stochastic generation login account and password, or refreshes account and password immediately.
It should be understood that in secured user's configuration step, if equipment safety control 2 recognizes first kind book character first from the note received, then be labeled as the phone number separated from this short message content managing user;Afterwards, equipment safety control 2 is when recognizing first kind book character, Equations of The Second Kind book character or the 3rd class book character, it is judged that whether the phone number sending this note is management user, the most then proceed to operate accordingly.So be equivalent to be provided with an authority user, it is to avoid other users at will add secured user, convenient management.
Further, method also includes reminding step: after equipment safety control 2 and router body 1 disconnect, and equipment safety control 2 sends corresponding information to management user in the way of note.The content of information can be " equipment safety control is pulled out ".
Claims (10)
1. an intelligent router, is characterized in that, the router body arranged including split and equipment safety control;Described router body is connected by USB with equipment safety control;
Described router body includes:
Equipment Inspection module, is used for detecting whether described equipment safety control is connected into router body;
Secret generation module, for when Equipment Inspection module detects that described equipment safety control has been connected on router, according to default cycle stochastic generation login account and password;
Network control module, testing result based on Equipment Inspection module, to control router whether open network function;
Sending module, for when Equipment Inspection module detects that described equipment safety control has been connected on router, the login account generated by secret generation module and password send to equipment safety control;
Described equipment safety control includes:
Memory module, for storing the phone number of secured user;
Gsm module, for providing function of receiving and sending short message for equipment safety control;
Secured user configures module, is identified for the short message content receiving gsm module, if recognizing first kind book character, then separates effective phone number from this short message content, and be deposited into memory module;
Forwarding module, for receiving login account and password from router body, and by gsm module by the login account received and password with note by the way of, be sent in memory module the phone number of all secured users of storage.
Intelligent router the most according to claim 1, it is characterized in that, if described secured user configures module and is also configured to recognize Equations of The Second Kind book character, then from this short message content, separate effective phone number, and from memory module, delete corresponding phone number.
Intelligent router the most according to claim 2, it is characterized in that, if described secured user configures module and is also configured to recognize the 3rd class book character, then generate corresponding control instruction based on the 3rd class book character, and described control instruction is sent the secret generation module to router body;
Described secret generation module stops in response to described control instruction, continues stochastic generation account and password, or refreshes account and password immediately.
Intelligent router the most according to claim 3, is characterized in that, described secured user configures module and is also configured to when recognizing first kind book character first, is labeled as the effective phone number separated from short message content managing user;
Described secured user configures module when recognizing first kind book character, Equations of The Second Kind book character or the 3rd class book character, it is judged that whether the phone number sending this note is management user, the most then proceed to operate accordingly.
Intelligent router the most according to claim 4, it is characterized in that, described equipment safety control also includes prompting module, described prompting module is used for detecting whether equipment safety control disconnects with router body, and after detecting and disconnecting, by the way of gsm module is with note, send corresponding information to described management user.
6. a Router Security management method based on the intelligent router described in claim 1, is characterized in that, including:
Secured user's configuration step: user sends note by mobile phone to equipment safety control;After equipment safety control receives note, identify short message content, if recognizing first kind book character, then from this short message content, separate effective phone number store, and this phone number is labeled as secured user;
Router activates step: be connected in router body by described equipment safety control;Router body, after detecting that equipment safety control has connected, starts according to default cycle stochastic generation login account and password, and sends this account and password to equipment safety control;
Account number cipher forwards step: it, after getting account and password, is forwarded on all phone numbers of storage by the way of note by equipment safety control.
Router Security management method the most according to claim 6, it is characterized in that, also include secured user's delete step: user sends the note comprising Equations of The Second Kind book character by mobile phone to equipment safety control, equipment safety control is after receiving this note and identifying Equations of The Second Kind book character, from short message content, separate effective phone number, and be deleted from the phone number classification of storage.
Router Security management method the most according to claim 7, it is characterized in that, also include that password generates rate-determining steps: user sends the note comprising the 3rd class book character by mobile phone to equipment safety control, equipment safety control is after receiving this note and identifying the 3rd class book character, generate corresponding control instruction based on the 3rd class book character, and described control instruction is sent to router body;Router body, after receiving described control instruction, performs stopping, continuing stochastic generation login account and password, or refresh account and password immediately.
Router Security management method the most according to claim 8, it is characterized in that, in described secured user's configuration step, if described equipment safety control recognizes first kind book character first from the note received, then it is labeled as the phone number separated from this short message content managing user;Afterwards,
Described equipment safety control is when recognizing first kind book character, Equations of The Second Kind book character or the 3rd class book character, it is judged that whether the phone number sending this note is management user, the most then proceed to operate accordingly.
Router Security management method the most according to claim 9, it is characterized in that, described method also includes reminding step: after equipment safety control and router body disconnect, and equipment safety control sends corresponding information to described management user in the way of note.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610216643.9A CN105871852B (en) | 2016-04-08 | 2016-04-08 | A kind of intelligent router, Router Security management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610216643.9A CN105871852B (en) | 2016-04-08 | 2016-04-08 | A kind of intelligent router, Router Security management method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105871852A true CN105871852A (en) | 2016-08-17 |
CN105871852B CN105871852B (en) | 2019-03-05 |
Family
ID=56637229
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610216643.9A Expired - Fee Related CN105871852B (en) | 2016-04-08 | 2016-04-08 | A kind of intelligent router, Router Security management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105871852B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107359991A (en) * | 2017-08-22 | 2017-11-17 | 上海斐讯数据通信技术有限公司 | A kind of router, the method for generating cipher code of router guest network and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1089491A2 (en) * | 1999-09-30 | 2001-04-04 | Lucent Technologies Inc. | Method and apparatus for efficient network management using an active network mechanism |
CN1914880A (en) * | 2004-01-29 | 2007-02-14 | 皇家飞利浦电子股份有限公司 | Guest dongle and method of connecting guest apparatuses to wireless home networks |
CN102711110A (en) * | 2012-05-24 | 2012-10-03 | 中兴通讯股份有限公司 | Wi-Fi (wireless fidelity) network management method and wireless router |
CN104683980A (en) * | 2015-02-10 | 2015-06-03 | 四川长虹电器股份有限公司 | Antitheft security management system and method for home wireless router |
CN204733179U (en) * | 2015-07-03 | 2015-10-28 | 广州市安宜电子有限公司 | A kind of multifunctional intellectual gateway |
CN105357670A (en) * | 2015-12-10 | 2016-02-24 | 恒宝股份有限公司 | Router |
-
2016
- 2016-04-08 CN CN201610216643.9A patent/CN105871852B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1089491A2 (en) * | 1999-09-30 | 2001-04-04 | Lucent Technologies Inc. | Method and apparatus for efficient network management using an active network mechanism |
CN1914880A (en) * | 2004-01-29 | 2007-02-14 | 皇家飞利浦电子股份有限公司 | Guest dongle and method of connecting guest apparatuses to wireless home networks |
CN102711110A (en) * | 2012-05-24 | 2012-10-03 | 中兴通讯股份有限公司 | Wi-Fi (wireless fidelity) network management method and wireless router |
CN104683980A (en) * | 2015-02-10 | 2015-06-03 | 四川长虹电器股份有限公司 | Antitheft security management system and method for home wireless router |
CN204733179U (en) * | 2015-07-03 | 2015-10-28 | 广州市安宜电子有限公司 | A kind of multifunctional intellectual gateway |
CN105357670A (en) * | 2015-12-10 | 2016-02-24 | 恒宝股份有限公司 | Router |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107359991A (en) * | 2017-08-22 | 2017-11-17 | 上海斐讯数据通信技术有限公司 | A kind of router, the method for generating cipher code of router guest network and system |
Also Published As
Publication number | Publication date |
---|---|
CN105871852B (en) | 2019-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104603743B (en) | The computer implemented method of portable electric appts and the computer implemented method that the equipment is connected to safe WLAN | |
CN103379451B (en) | The inspection method and its system of burn-after-reading information | |
CN104601324B (en) | A kind of verification method, terminal and system for application | |
CN210006113U (en) | intelligent lock system using two-dimensional code for safe pairing | |
CN104159222A (en) | Terminal, identity identification realization method, and authentication method and apparatus | |
CN108616547A (en) | A kind of method and device of transmission file | |
CN102271133A (en) | Authentication method, device and system | |
CN103067342A (en) | Equipment, system and method using extensible authentication protocol (EAP) to carry out external authentication | |
CN106535357A (en) | Method and system for configuring wifi parameters | |
CN103856919A (en) | Information sending method and device as well as information receiving method and device | |
CN104519482B (en) | A kind of device parameter configuration method and device | |
CN104980899A (en) | Communication method and system for mobile terminal, mobile terminal and server | |
US10691818B2 (en) | Secure interface for displaying of information | |
CN107172618A (en) | Device pairing method | |
CN108495291A (en) | A kind of Bluetooth connecting method and device | |
CN104486488A (en) | Rapid information entry method applied to mobile terminals | |
CN105791520A (en) | Contact list updating method and coresponding apparatus | |
CN106302345A (en) | A kind of terminal authentication method and device | |
CN104581997B (en) | A kind of mobile WIFI hot spot connection method and mobile equipment | |
CN104683212B (en) | Message treatment method and system | |
CN105871852A (en) | Intelligent router, safety management method of router | |
CN108022323A (en) | Data storage method, apparatus, system and vehicle | |
CN104301116B (en) | A kind of method and system of NFC wireless routers private certification mode | |
RU2015129570A (en) | TERMINAL, PROGRAM AND COMMUNICATION SYSTEM | |
CN102724667A (en) | Authentication method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210317 Address after: 215000 room 544, building 1, No.10, Nanhuan East Road, Suzhou City, Jiangsu Province Patentee after: Suzhou Muming Information Technology Co.,Ltd. Address before: 312000 No. 2799 Qunxianzhong Road, Shaoxing City, Zhejiang Province Patentee before: SHAOXING UNIVERSITY YUANPEI College |
|
TR01 | Transfer of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190305 Termination date: 20210408 |
|
CF01 | Termination of patent right due to non-payment of annual fee |