CN105991563A - 一种保护敏感数据安全的方法、装置及三方服务系统 - Google Patents
一种保护敏感数据安全的方法、装置及三方服务系统 Download PDFInfo
- Publication number
- CN105991563A CN105991563A CN201510061344.8A CN201510061344A CN105991563A CN 105991563 A CN105991563 A CN 105991563A CN 201510061344 A CN201510061344 A CN 201510061344A CN 105991563 A CN105991563 A CN 105991563A
- Authority
- CN
- China
- Prior art keywords
- sensitive data
- request
- uniquely tagged
- server side
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/067—Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (19)
Priority Applications (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510061344.8A CN105991563B (zh) | 2015-02-05 | 2015-02-05 | 一种保护敏感数据安全的方法、装置及三方服务系统 |
TW104128646A TWI725940B (zh) | 2015-02-05 | 2015-08-31 | 保護敏感性資料安全的方法、裝置及三方服務系統 |
PL16749620T PL3259868T3 (pl) | 2015-02-05 | 2016-02-04 | Ochrona bezpieczeństwa danych wrażliwych |
EP16749620.7A EP3259868B1 (en) | 2015-02-05 | 2016-02-04 | Protecting sensitive data security |
SG11201705978WA SG11201705978WA (en) | 2015-02-05 | 2016-02-04 | Protecting sensitive data security |
JP2017536865A JP6824885B2 (ja) | 2015-02-05 | 2016-02-04 | 機密データセキュリティの保護 |
PCT/US2016/016656 WO2016130406A2 (en) | 2015-02-05 | 2016-02-04 | Protecting sensitive data security |
US15/016,171 US10425388B2 (en) | 2015-02-05 | 2016-02-04 | Protecting sensitive data security |
ES16749620T ES2874650T3 (es) | 2015-02-05 | 2016-02-04 | Protección de seguridad de datos sensibles |
KR1020177021350A KR102149575B1 (ko) | 2015-02-05 | 2016-02-04 | 민감한 데이터의 보안을 보호하는 기법 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510061344.8A CN105991563B (zh) | 2015-02-05 | 2015-02-05 | 一种保护敏感数据安全的方法、装置及三方服务系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105991563A true CN105991563A (zh) | 2016-10-05 |
CN105991563B CN105991563B (zh) | 2020-07-03 |
Family
ID=56565288
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510061344.8A Active CN105991563B (zh) | 2015-02-05 | 2015-02-05 | 一种保护敏感数据安全的方法、装置及三方服务系统 |
Country Status (10)
Country | Link |
---|---|
US (1) | US10425388B2 (zh) |
EP (1) | EP3259868B1 (zh) |
JP (1) | JP6824885B2 (zh) |
KR (1) | KR102149575B1 (zh) |
CN (1) | CN105991563B (zh) |
ES (1) | ES2874650T3 (zh) |
PL (1) | PL3259868T3 (zh) |
SG (1) | SG11201705978WA (zh) |
TW (1) | TWI725940B (zh) |
WO (1) | WO2016130406A2 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111107066A (zh) * | 2019-12-06 | 2020-05-05 | 中国联合网络通信集团有限公司 | 敏感数据的传输方法和系统、电子设备、存储介质 |
CN113111380A (zh) * | 2021-04-18 | 2021-07-13 | 上海丽人丽妆网络科技有限公司 | 一种交易平台的数据治理方法 |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789014A (zh) * | 2016-12-22 | 2017-05-31 | 上海上讯信息技术股份有限公司 | 一种生成及使用用户终端密钥的方法和设备 |
TWI602077B (zh) * | 2017-02-06 | 2017-10-11 | 蓋特資訊系統股份有限公司 | 資料保護方法與系統 |
US20180375648A1 (en) * | 2017-06-22 | 2018-12-27 | Citrix Systems, Inc. | Systems and methods for data encryption for cloud services |
CN111586177B (zh) * | 2017-06-28 | 2022-11-08 | 杭州云毅网络科技有限公司 | 集群会话防丢失方法及系统 |
US11611541B2 (en) | 2018-08-07 | 2023-03-21 | Citrix Systems, Inc. | Secure method to replicate on-premise secrets in a cloud environment |
WO2021184264A1 (zh) * | 2020-03-18 | 2021-09-23 | 华为技术有限公司 | 数据保存方法、数据访问方法及相关装置、设备 |
US11681787B1 (en) * | 2021-10-15 | 2023-06-20 | T Stamp Inc. | Ownership validation for cryptographic asset contracts using irreversibly transformed identity tokens |
CN114244522B (zh) * | 2021-12-09 | 2024-05-03 | 山石网科通信技术股份有限公司 | 信息保护方法、装置、电子设备及计算机可读存储介质 |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001046773A2 (en) * | 1999-12-20 | 2001-06-28 | Evelocity Corporation | Method and apparatus for transmitting data |
US20070157031A1 (en) * | 2005-12-30 | 2007-07-05 | Novell, Inc. | Receiver non-repudiation |
US20070244877A1 (en) * | 2006-04-12 | 2007-10-18 | Battelle Memorial Institute | Tracking methods for computer-readable files |
CN101159540A (zh) * | 2007-10-15 | 2008-04-09 | 上海华为技术有限公司 | 收发数据流的方法及处理设备 |
CN101184107A (zh) * | 2007-12-17 | 2008-05-21 | 北京飞天诚信科技有限公司 | 网上交易系统及利用该系统进行网上交易的方法 |
CN101204036A (zh) * | 2005-04-25 | 2008-06-18 | 泰克塞科公司 | 带标签数据单元的加密处理和操作控制 |
CN101242264A (zh) * | 2008-02-01 | 2008-08-13 | 深圳华为通信技术有限公司 | 数据传输方法、装置和系统及移动终端 |
US20110040686A1 (en) * | 2006-12-26 | 2011-02-17 | Mark Carlson | Mobile payment system and method using alias |
US20110055563A1 (en) * | 2005-03-16 | 2011-03-03 | International Business Machines Corporation | Encryption of security-sensitive data by re-using a connection |
CN102480481A (zh) * | 2010-11-26 | 2012-05-30 | 腾讯科技(深圳)有限公司 | 一种提高产品用户数据安全性的方法及装置 |
US20130346310A1 (en) * | 2012-06-21 | 2013-12-26 | Microsoft Corporation | Privacy Enhancing Personal Data Brokerage Service |
US20140075205A1 (en) * | 2010-06-30 | 2014-03-13 | International Business Machines Corporation | Method of processing data to enable external storage thereof with minimized risk of information leakage |
CN103686717A (zh) * | 2013-12-23 | 2014-03-26 | 江苏物联网研究发展中心 | 一种物联网传感系统的密钥管理方法 |
US20140143548A1 (en) * | 2012-11-22 | 2014-05-22 | Donglin Wang | Security control method of network storage |
CN104065623A (zh) * | 2013-03-21 | 2014-09-24 | 华为终端有限公司 | 信息处理方法、信任服务器及云服务器 |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB9503738D0 (en) | 1995-02-24 | 1995-04-19 | Int Computers Ltd | Cryptographic key management |
US6370251B1 (en) | 1998-06-08 | 2002-04-09 | General Dynamics Decision Systems, Inc. | Traffic key access method and terminal for secure communication without key escrow facility |
JP2004094677A (ja) * | 2002-08-30 | 2004-03-25 | Toshiba Corp | コンテンツ流通システムの管理装置、閲覧用装置、プログラム及び方法 |
US7284040B2 (en) * | 2002-09-13 | 2007-10-16 | Canon Kabushiki Kaisha | Information processing apparatus for providing image to communication terminal and control method therefor |
US7460052B2 (en) * | 2004-01-20 | 2008-12-02 | Bae Systems Information And Electronic Systems Integration Inc. | Multiple frequency through-the-wall motion detection and ranging using a difference-based estimation technique |
JP4234035B2 (ja) * | 2004-02-26 | 2009-03-04 | 財団法人鉄道総合技術研究所 | Icタグ管理システム |
US7907732B2 (en) | 2004-03-29 | 2011-03-15 | Intel Corporation | Radio frequency identification tag lock and key |
ATE544866T1 (de) * | 2005-06-17 | 2012-02-15 | Baxter Int | Adamts13-haltige zusammensetzungen mit thrombolytischer wirkung |
US9026804B2 (en) * | 2006-02-24 | 2015-05-05 | Qualcomm Incorporated | Methods and apparatus for protected distribution of applications and media content |
US8233619B2 (en) | 2006-06-07 | 2012-07-31 | Stmicroelectronics S.R.L. | Implementation of AES encryption circuitry with CCM |
US8594335B1 (en) | 2007-09-28 | 2013-11-26 | Emc Corporation | Key verification system and method |
US8631227B2 (en) * | 2007-10-15 | 2014-01-14 | Cisco Technology, Inc. | Processing encrypted electronic documents |
US9589110B2 (en) * | 2011-04-11 | 2017-03-07 | Intertrust Technologies Corporation | Information security systems and methods |
US9015857B2 (en) * | 2011-11-14 | 2015-04-21 | Wave Systems Corp. | Security systems and methods for encoding and decoding digital content |
US20140014354A1 (en) * | 2012-07-10 | 2014-01-16 | Schlumberger Technology Corporation | Deployment of cables for landing strings |
US10643222B2 (en) * | 2012-09-27 | 2020-05-05 | David Cristofaro | Selecting anonymous users based on user location history |
US9219607B2 (en) * | 2013-03-14 | 2015-12-22 | Arris Technology, Inc. | Provisioning sensitive data into third party |
US9237019B2 (en) * | 2013-09-25 | 2016-01-12 | Amazon Technologies, Inc. | Resource locators with keys |
US9743375B2 (en) * | 2014-08-05 | 2017-08-22 | Wells Fargo Bank, N.A. | Location tracking |
US9344410B1 (en) * | 2014-10-31 | 2016-05-17 | Sap Se | Telecommunication method for securely exchanging data |
-
2015
- 2015-02-05 CN CN201510061344.8A patent/CN105991563B/zh active Active
- 2015-08-31 TW TW104128646A patent/TWI725940B/zh active
-
2016
- 2016-02-04 US US15/016,171 patent/US10425388B2/en active Active
- 2016-02-04 ES ES16749620T patent/ES2874650T3/es active Active
- 2016-02-04 WO PCT/US2016/016656 patent/WO2016130406A2/en active Application Filing
- 2016-02-04 SG SG11201705978WA patent/SG11201705978WA/en unknown
- 2016-02-04 EP EP16749620.7A patent/EP3259868B1/en active Active
- 2016-02-04 PL PL16749620T patent/PL3259868T3/pl unknown
- 2016-02-04 JP JP2017536865A patent/JP6824885B2/ja active Active
- 2016-02-04 KR KR1020177021350A patent/KR102149575B1/ko active IP Right Grant
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001046773A2 (en) * | 1999-12-20 | 2001-06-28 | Evelocity Corporation | Method and apparatus for transmitting data |
US20110055563A1 (en) * | 2005-03-16 | 2011-03-03 | International Business Machines Corporation | Encryption of security-sensitive data by re-using a connection |
CN101204036A (zh) * | 2005-04-25 | 2008-06-18 | 泰克塞科公司 | 带标签数据单元的加密处理和操作控制 |
US20070157031A1 (en) * | 2005-12-30 | 2007-07-05 | Novell, Inc. | Receiver non-repudiation |
US20070244877A1 (en) * | 2006-04-12 | 2007-10-18 | Battelle Memorial Institute | Tracking methods for computer-readable files |
US20110040686A1 (en) * | 2006-12-26 | 2011-02-17 | Mark Carlson | Mobile payment system and method using alias |
CN101159540A (zh) * | 2007-10-15 | 2008-04-09 | 上海华为技术有限公司 | 收发数据流的方法及处理设备 |
CN101184107A (zh) * | 2007-12-17 | 2008-05-21 | 北京飞天诚信科技有限公司 | 网上交易系统及利用该系统进行网上交易的方法 |
CN101242264A (zh) * | 2008-02-01 | 2008-08-13 | 深圳华为通信技术有限公司 | 数据传输方法、装置和系统及移动终端 |
US20140075205A1 (en) * | 2010-06-30 | 2014-03-13 | International Business Machines Corporation | Method of processing data to enable external storage thereof with minimized risk of information leakage |
CN102480481A (zh) * | 2010-11-26 | 2012-05-30 | 腾讯科技(深圳)有限公司 | 一种提高产品用户数据安全性的方法及装置 |
US20130346310A1 (en) * | 2012-06-21 | 2013-12-26 | Microsoft Corporation | Privacy Enhancing Personal Data Brokerage Service |
US20140143548A1 (en) * | 2012-11-22 | 2014-05-22 | Donglin Wang | Security control method of network storage |
CN104065623A (zh) * | 2013-03-21 | 2014-09-24 | 华为终端有限公司 | 信息处理方法、信任服务器及云服务器 |
CN103686717A (zh) * | 2013-12-23 | 2014-03-26 | 江苏物联网研究发展中心 | 一种物联网传感系统的密钥管理方法 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111107066A (zh) * | 2019-12-06 | 2020-05-05 | 中国联合网络通信集团有限公司 | 敏感数据的传输方法和系统、电子设备、存储介质 |
CN113111380A (zh) * | 2021-04-18 | 2021-07-13 | 上海丽人丽妆网络科技有限公司 | 一种交易平台的数据治理方法 |
Also Published As
Publication number | Publication date |
---|---|
KR102149575B1 (ko) | 2020-08-31 |
JP6824885B2 (ja) | 2021-02-03 |
EP3259868B1 (en) | 2021-04-07 |
US10425388B2 (en) | 2019-09-24 |
WO2016130406A3 (en) | 2016-11-10 |
ES2874650T3 (es) | 2021-11-05 |
KR20170116606A (ko) | 2017-10-19 |
CN105991563B (zh) | 2020-07-03 |
TWI725940B (zh) | 2021-05-01 |
US20160234175A1 (en) | 2016-08-11 |
WO2016130406A2 (en) | 2016-08-18 |
SG11201705978WA (en) | 2017-08-30 |
JP2018504843A (ja) | 2018-02-15 |
TW201629835A (zh) | 2016-08-16 |
PL3259868T3 (pl) | 2021-09-20 |
EP3259868A4 (en) | 2018-12-05 |
EP3259868A2 (en) | 2017-12-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105991563A (zh) | 一种保护敏感数据安全的方法、装置及三方服务系统 | |
CN103107995B (zh) | 一种云计算环境数据安全存储系统和方法 | |
CN104113528A (zh) | 一种基于前置网关的防止敏感信息泄露的方法和系统 | |
US11308234B1 (en) | Methods for protecting data | |
US9344410B1 (en) | Telecommunication method for securely exchanging data | |
JP2014119486A (ja) | 秘匿検索処理システム、秘匿検索処理方法、および秘匿検索処理プログラム | |
WO2015120769A1 (zh) | 密码管理方法及系统 | |
CN109345331A (zh) | 一种带隐私保护的群智感知系统任务分配方法 | |
KR100988198B1 (ko) | 분산 컴퓨팅 기반 유틸리티 컴퓨팅 환경에서의 정보유출 방지를 위한 암호화 방법 및 이를 위한 시스템 | |
Carminati et al. | Secure web service composition with untrusted broker | |
KR102096637B1 (ko) | 블록체인에서 정보 조회 시간의 기록을 위한 분산 원장 장치 | |
CN114615087B (zh) | 数据共享方法、装置、设备及介质 | |
US20190109828A1 (en) | Data processing method, device and system, and storage medium | |
KR102096639B1 (ko) | Uuid를 이용한 블록체인에서 정보 조회 기록의 무결성을 위한 분산 원장 장치 | |
CN112910641A (zh) | 用于跨链交易监管的验证方法、装置、中继链节点及介质 | |
KR102647335B1 (ko) | 프라이버시 보호를 위한 데이터 보안 방법 | |
CN104392153A (zh) | 一种软件保护方法及系统 | |
CN105991284B (zh) | 一种待验证数据发送、数据接收验证方法及装置 | |
Singh et al. | Performance analysis of middleware distributed and clustered systems (PAMS) concept in mobile communication devices using Android operating system | |
US20240111842A1 (en) | License authentication method and apparatus, electronic device, system, and storage medium | |
CN113596027B (zh) | 一种数据加密传输的方法、装置及电子设备 | |
KR102096638B1 (ko) | 하이브리드 암호 방식을 이용한 블록체인에서 정보 조회 기록의 무결성을 위한 분산 원장 장치 | |
CN102624516B (zh) | 对信息进行加解密的方法、系统及网关设备 | |
KR20220069359A (ko) | 캡슐화 기반의 키 복구 시스템 및 키 복구 방법 | |
CN115409913A (zh) | 指标走势图展示方法、终端、服务器及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20201010 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Patentee after: Innovative advanced technology Co.,Ltd. Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Patentee before: Advanced innovation technology Co.,Ltd. Effective date of registration: 20201010 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Patentee after: Advanced innovation technology Co.,Ltd. Address before: Cayman Islands Grand Cayman capital building, a four storey No. 847 mailbox Patentee before: Alibaba Group Holding Ltd. |