CN106372474A - Method and system for preventing identification card from being stolen - Google Patents
Method and system for preventing identification card from being stolen Download PDFInfo
- Publication number
- CN106372474A CN106372474A CN201610824627.8A CN201610824627A CN106372474A CN 106372474 A CN106372474 A CN 106372474A CN 201610824627 A CN201610824627 A CN 201610824627A CN 106372474 A CN106372474 A CN 106372474A
- Authority
- CN
- China
- Prior art keywords
- card
- information
- card reader
- mobile device
- location
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Position Fixing By Use Of Radio Waves (AREA)
Abstract
The purpose of the invention is to provide a method and a system for preventing an identification card from being stolen. The method comprises the following steps: reading identification card information through an identification card reader which can identify the authenticity of a holder, sending a position of the reader and the identification card information to the system; carrying out real-time comparison on the position information of the reader and the position information of a mobile device held by a legal user by a system background; providing a service for anti-theft of the identification card to the user, wherein the mobile device held by the legal user is acquired through the information registered in real-name by an operator according to the identification card information, and the position information of the mobile device can be acquired through a mobile communication operator positioning technology or a satellite positioning technology. A thought flow chart of the system implementation scheme can be viewed in Figure 1 of an abstract drawing, that is, a flow for anti-theft of the identification card is increased at the third point of a service handling procedure that is before starting of the service handling procedure, the consistency judgment is rapidly carried out on a service handling occurrence place and the position of the mobile device held by the legal user by use of a big data processing technology.
Description
First, technical field
Mobile communication software development identity card safety management, mobile communication carrier's location technology, satellite positioning tech
(as gps, Big Dipper bds), card reader
2nd, background technology
1st, concept definition
[defining 1] validated user
Validated user refers to the legal use people corresponding to identity card, any identity card winner or identity card thief all
It is not validated user, the identity card holder of forgery is not validated user.
[defining 2] mobile communication carrier's location technology
Obtain the technology of positional information by mobile communication carrier, including but not limited to: cell localization, lbs, hlr, letter
Make data locking
[defining 3] satellite positioning tech
Pass through global positioning system (global positioning system) or Beidou satellite navigation system
(beidou navigation satellite system, bds) obtains the technology of positional information
2nd, background
Resident identification card is the unique certificate for proving holder's identity, gives citizen by Chinese Government's distribution.It will be made
Proof instrument for everyone unique citizenship.From 29 days March in 2004, China's Mainland formally starts to change for resident
Send out the No.2 residence card of type built-in contactless ic card intelligent chip, China second-generation identity card surface adopts anti false film and printing anti-
Pseudo- technology, using personal photochrome, and available machines used reads the information in digit chip.With resident identification card range
Constantly widen, identity card facilitating people's life and carry out the aspects such as tight social management and played important function,
As affairs of notarizing, handle application exit formalities, handle individual license, handle personal credit's affairs, handle and take the people
Boat aircraft or high ferro formality, hotel of putting up for the night checks in.If resident identification card is stolen after losing, gently then affect normal
Live and work is heavy then may bring unnecessary economic loss and bearing legal responsibility.Recent years utilizes resident identification card
Break laws and commit crime and also happen occasionally, and the quantity usurping the delinquent case of identity card every year all assumes incremental trend.Using
The method that identity card is broken laws and commit crime includes but is not limited to as follows:
1. steal other people identity card false claiming cashes in banks.
2. forge or registered to other unit mechanism using other people identity cards, take this opportunity after accepting betrothal gifts to steal.
3. using stealing, pick up or identity card application bank card that is pseudo-, altering, the credit card is swindled.
3rd, content of the invention
The present invention provides a kind of means using positional information coupling to prevent the stolen method and system of identity card.This
Method may apply on a kind of card reader of ID card of the recognizable holder true and false, and this card reader is except distinguishing that identity card is true
Moreover it is possible to pass to the position of card reader and ID card information (name and ID (identity number) card No.) outside puppet and reading identity card information
Anti-theft system is verified, anti-theft system backstage is by the mobile device being used using position and the validated user of card reader
Position is compared in real time, reduces the stolen risk of identity card further.The position of wherein card reader can shift to an earlier date disposably
Manual typing is it is also possible to install mobile sim card to obtain, and the position of the mobile device of validated user then utilizes mobile communication to transport
Battalion's business's location technology or satellite positioning tech obtain.The mobile device that validated user uses is known by following two steps:
1. the mobile number corresponding to identity card is obtained by the information that operator's system of real name is registered.If (using identity
Demonstrate,prove number inquiry less than corresponding mobile number, or when multiple corresponding mobile number occurs, then using name nonproductive poll)
2. the mobile device corresponding to this mobile number is known by mobile communication carrier.
Validated user when using identity card transacting business, first by this card reader reading identity card information, then by Card Reader
The position of device and ID card information (name and ID (identity number) card No.) pass to system, and system judges that the movement that validated user is held sets
Whether standby location is consistent with the position of card reader, only could handle process by finishing service in position consistency.
The thinking flow process of system realization scheme can check Fig. 1 of accompanying drawing, is mainly starting business in service handling side
Before handling flow process, increased identity card tamper-proof checking flow process, read by the card reader of ID card of the recognizable holder true and false
ID card information, the position of card reader and ID card information (name and ID (identity number) card No.) are sent to anti-theft system, system
The position of card reader is held with validated user mobile device location (by mobile communication carrier's location technology or
Satellite positioning tech etc. obtains) quickly compared, judge whether both positions are consistent:
1), when user carries out business handling, service handling side is read using the card reader of ID card of the recognizable holder true and false
ID card information, card reader can send checking request to tamper-proof platform, and provides positional information and the identity card letter of card reader
Breath (name and ID (identity number) card No.).
2) tamper-proof platform obtains the positional information of the mobile device that validated user is held, and this information is by mobile communication
Operator's location technology or satellite positioning tech obtain.
3) tamper-proof platform is by 2) positional information and 1 of mobile device that obtains) positional information of card reader that obtains enters
Row compares, and sees whether both are consistent, and comparison result is returned to card reader.The presenting and obtain the following two kinds of the result
Mode:
1. the result passes through the display lamp of card reader or display screen shows.
2. other-end (as pc and panel computer etc.) can be crossed api and read the result.
4) service handling side or its operation system accept, according to card reader, the result that tamper-proof platform receives and determine
Subsequent processes.(for guarantee user using perception it is ensured that if business handling convenient and quick is it is proposed that both position consistency
Then start business handling flow process, both positions are inconsistent then to terminate business handling flow process, if failing to look into according to ID card information
Ask the position of the mobile device that validated user is held, when to lead to returning result be to judge, will by service handling side voluntarily
Determine follow-up processing flow)
Other identity card tamper-proof schemes have obvious advantage at present for present invention contrast, such as utilize fingerprint to prevent identity
Demonstrate,prove the scheme usurped, this scheme has limitation, because current fingerprint and identity card have the data of corresponding relation seldom, compare
Under substantial amounts of data basis are then had based on the identity card tamper-proof scheme of positional information coupling, and mobile device is current one
Plant the very high equipment of popularity rate.
In addition at present bank and other financial mechanism, for client's handling bank business, have read visitor using card reader of ID card
After the ID card information at family, ID card verification is carried out by network verification system, due to remaining a small amount of mistake in network verification system
Difference data, this will lead to it is possible that ID (identity number) card No. does not exist in proof procedure, ID (identity number) card No. exist but name not
Coupling or feedback photo such as do not correspond at the result.Then need to prove by other supplementary meanss when above-mentioned situation occurs, such as will
Ask client to show household registers, passport, other perfect instruments such as motor vehicle driving license auxiliary evidence, or provide online checking knot
Fruit proves, period may need to wait the time in one to two weeks, and this will have a strong impact on the business handling of client.By contrast, may be used
The card reader of ID card of the identification holder true and false then facilitate a lot, this card reader only need to read complete ID (identity number) card No. and
Name can determine whether the holder true and false, largely decreases and various unmatched troubles when ID card verification process.
Therefore this card reader goes for a lot of industries, including but not limited to: bank, hotel, department of civil aviaton, high ferro department, handle
Entry and exit procedures government department, etc..
4th, brief description
[brief description]
Fig. 1 is the identity card tamper-proof platform process figure being compared based on position;
Fig. 2 is unified administrative region coupling system conceptual scheme;
Fig. 3 is longitude and latitude location information matching scheme figure;
Fig. 4 is that administrative region system positions comprehensive matching conceptual scheme with longitude and latitude;
5th, specific embodiment
Below by example in detail specific embodiment.This example is that description is held identity card and handled, in bank, handss of opening an account
In continuous process, the card reader of ID card reading identity card information of the recognizable holder true and false, send out to identity card tamper-proof platform
Send checking request, verify whether there is the stolen suspicion of identity card.
First pass through mobile communication carrier's location technology or satellite positioning tech can get user in real time and be held
Mobile device particular geographic location, the position of the mobile device that the positional information of card reader and validated user are used by system
Confidence breath is contrasted, thus judging whether both positions are consistent, if inconsistent, needing to inform that bank there may be and usurping suspicion
Doubt.The position of wherein card reader can be obtained by bank's typing in advance or the mobile sim card being arranged in card reader, and legal use
The geographical position of the mobile device that family is held can be obtained by the following two kinds mode:
1., if adopting mobile communication carrier's location technology, need first with ID card information (name and identity card
Number) information inquiry registered by operator's system of real name, to corresponding mobile number, gets correspondence further according to mobile number
Mobile device, thus getting the positional information of mobile device.
If 2. adopting satellite positioning tech, need specifically to take in upper installation of mobile device (having gps or bds function)
Business (or software), to obtain location information.
Because user is limited the waiting time when carrying out business handling, therefore it is required that the judgement energy of location consistency
Completed in several seconds.Complete judge process includes searching corresponding mobile number, position enquiring, position ratio according to ID card information
To actions such as, result feedbacks.
The scope of application of the present invention includes but is not limited to the scope involved by example.
[technical scheme]
Technical Architecture is described as follows:
Tamper-proof platform can get mobile device by mobile communication carrier's location technology or satellite positioning tech
Location information, and provide core coupling engine to carry out location matches, it is fixed that coupling engine is supported by multiple matching strategies
The coupling of position information.
Open an account business handling when, the card reader of ID card of the recognizable holder true and false have read ID card information, and to being
System provides the positional information of card reader and the ID card information (name and ID (identity number) card No.) of transacting business, and system passes through operator
The mobile number corresponding to this identity card for the acquisition of information of system of real name registration, by mobile communication carrier's location technology or defend
Star location technology just can inquire the real-time geographical locations of this mobile number, the mobile device that validated user is used by system
The positional information of location information and card reader is compared, and judges whether position consistency, and will determine that result returns to Card Reader
Device.Card reader calls coupling engine to carry out location matches by the interface service of tamper-proof platform.
The present invention will provide three kinds of solutions:
1. unified administrative region coupling system
System will be mated using unified administrative region between card reader and tamper-proof platform, specific coupling flow process is such as
Under:
The card reader of ID card of the recognizable holder true and false initiates checking request, and provides the administration of card reader site
The ID card information (name and ID (identity number) card No.) of area information and transacting business, tamper-proof platform is stepped on by operator's system of real name
Note mobile number corresponding to this identity card for the acquisition of information, the real-time position information of this mobile number is then transported by mobile communication
Battalion's business's location technology or satellite positioning tech obtain, and this positional information is changed into address information, recall unified administrative area
Domain division system carries out administrative regions at different levels coupling, and the morphology to the address information described by Chinese natural language and semanteme are carried out
After analysis, by country, province, districts and cities, the administrative grade in area is mated respectively.Judge whether country's mismatch, if it is
Return abnormal.Judge whether province mismatches, if returning abnormal;Judge whether districts and cities mismatch, if returning abnormal;
Judge whether region mismatches, if returning abnormal, judging whether final address is consistent, if unanimously, returning normal, no
Consistent then return abnormal.(flow process asks for an interview Fig. 2 in Figure of description)
2. longitude and latitude location information coupling
The card reader of ID card of the recognizable holder true and false initiates checking request, provide card reader geographical location information and
ID card information (name and ID (identity number) card No.), tamper-proof platform gets this identity card by operator's system of real name register information
Corresponding mobile number, the real-time position information of this mobile number then passes through mobile communication carrier's location technology or satellite
Position technical limit spacing.Call longitude and latitude matching module, enter row distance using longitude and latitude location information between the two and calculate, according to
The threshold value setting is judged.If the distance between card reader position and position of mobile device exceed this threshold value, it is considered
Abnormality.If being less than threshold value, return normal.(flow process asks for an interview Fig. 3 in Figure of description)
3. administrative region system and longitude and latitude comprehensive matching
The card reader of ID card of the recognizable holder true and false initiates checking request, carries out unified administrative region system first
After coupling, if system coupling in administrative region is not passed through, enter longitude and latitude location information coupling flow process.(flow process asks for an interview explanation
Book accompanying drawing 4).
Claims (7)
1. a kind of solution using mobile communication carrier's location technology or gps (or Big Dipper positioning service) location technology Lai
Prevent the stolen system of identity card it is characterised in that reading body using a kind of card reader of ID card of recognizable holder true and false
Part card information, and the positional information of card reader and ID card information (name and ID (identity number) card No.) are passed to anti-theft system,
The positional information of the mobile device that the position of card reader is held by system with legitimate user is compared, and judges whether position one
Cause, and return result to card reader, card reader feeds back to service handling side the result.Include location information services,
Location matches engine (matching strategy), interface service module, the result presents and obtains.
2. a kind of card reader of ID card of the recognizable holder true and false as claimed in claim 1, this card reader can not only be distinguished
The other identity card true and false, reading identity card information, and can be by card reader position and ID card information (name and identification card number
Code) it is sent to anti-theft system and verified.
3. the mobile number corresponding to utilization identity card as claimed in claim 1, refers to according to ID card information, by operator
The corresponding mobile number of acquisition of information of system of real name registration.
4. location information services as claimed in claim 1, its feature has two kinds:
(1) adopt mobile communication carrier's location technology, this technology utilize the data of mobile communication carrier or interface (include but
It is not limited to cell localization data, lbs, hlr, signaling data) location information of direct access mobile device.
(2) it is then to obtain position using a kind of specific service installed on the mobile apparatus to believe using satellite positioning tech
Breath, this service can get the geographical location information (warp of current device in real time by equipment gps (or Big Dipper positioning service) function
Latitude or administrative region title).
5. location matches engine as claimed in claim 1 is it is characterised in that location matches engine mainly provides position matching
Service, this engine will provide three kinds of matching strategy schemes:
The first scheme is that system uses same set of administrative region system, the body of the recognizable holder true and false with service handling side
Part card card reader provides location name and the ID card information (name and ID (identity number) card No.) of card reader, and system passes through mobile communication
Operator's location technology or satellite positioning tech obtain the geographical location information of the mobile device that validated user is held.Mobile device
Positional information can change into address name, this two address names are analyzed by morphology and semanteme, by country, province,
Districts and cities, region, street place is mated respectively.
Second scheme is mated by geo-localisation information (longitude and latitude), the card reader of ID card of the recognizable holder true and false
There is provided geo-localisation information and the ID card information of card reader, system passes through mobile communication carrier's location technology or satellite
The geo-localisation information of position the held mobile device of technical limit spacing validated user.Position by the positional information of card reader and mobile device
Confidence breath is mated, and distance is then normal less than threshold value, exceedes then abnormal.
The third scheme combines the first and second scheme, first passes through unified administrative region system plan-validation, if
The match is successful returns normally, if coupling is unsuccessful, enables geographical location information matching scheme.
6. interface service module as claimed in claim 1 is it is characterised in that described module provides the interface of standard for outside system
System calls.
7. the result as claimed in claim 1 presents and obtains it is characterised in that following two aspects:
(1) the result can pass through the display lamp of card reader or display screen shows.
(2) other-end (as pc and panel computer etc.) can be crossed api and read the result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610824627.8A CN106372474A (en) | 2016-09-08 | 2016-09-08 | Method and system for preventing identification card from being stolen |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610824627.8A CN106372474A (en) | 2016-09-08 | 2016-09-08 | Method and system for preventing identification card from being stolen |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106372474A true CN106372474A (en) | 2017-02-01 |
Family
ID=57896875
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610824627.8A Pending CN106372474A (en) | 2016-09-08 | 2016-09-08 | Method and system for preventing identification card from being stolen |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106372474A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106874986A (en) * | 2017-02-28 | 2017-06-20 | 四川建筑职业技术学院 | Differentiate whether I uses identity card and the method for pointing out identity card to lose |
CN112950199A (en) * | 2021-02-04 | 2021-06-11 | 中国联合网络通信集团有限公司 | Anti-theft method and server for communication identifier |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103035078A (en) * | 2012-11-30 | 2013-04-10 | 深圳天源迪科信息技术股份有限公司 | Payment security monitoring method based on position |
CN105608579A (en) * | 2015-10-19 | 2016-05-25 | 广州衡昊数据科技有限公司 | Method of preventing credit card from embezzlement and system thereof |
CN105825379A (en) * | 2016-03-14 | 2016-08-03 | 广州衡昊数据科技有限公司 | Method and system preventing payment means from embezzlement |
CN106097221A (en) * | 2016-06-06 | 2016-11-09 | 上海河广信息科技有限公司 | Certificate burglary-resisting system and certificate security system |
-
2016
- 2016-09-08 CN CN201610824627.8A patent/CN106372474A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103035078A (en) * | 2012-11-30 | 2013-04-10 | 深圳天源迪科信息技术股份有限公司 | Payment security monitoring method based on position |
CN105608579A (en) * | 2015-10-19 | 2016-05-25 | 广州衡昊数据科技有限公司 | Method of preventing credit card from embezzlement and system thereof |
CN105825379A (en) * | 2016-03-14 | 2016-08-03 | 广州衡昊数据科技有限公司 | Method and system preventing payment means from embezzlement |
CN106097221A (en) * | 2016-06-06 | 2016-11-09 | 上海河广信息科技有限公司 | Certificate burglary-resisting system and certificate security system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106874986A (en) * | 2017-02-28 | 2017-06-20 | 四川建筑职业技术学院 | Differentiate whether I uses identity card and the method for pointing out identity card to lose |
CN112950199A (en) * | 2021-02-04 | 2021-06-11 | 中国联合网络通信集团有限公司 | Anti-theft method and server for communication identifier |
CN112950199B (en) * | 2021-02-04 | 2023-06-23 | 中国联合网络通信集团有限公司 | Anti-theft method and server for communication identification |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7170391B2 (en) | Birth and other legal documents having an RFID device and method of use for certification and authentication | |
US20090234764A1 (en) | Systems and methods for biometric authentication of monetary fund transfer | |
US8365986B2 (en) | Credit card security system and method | |
CN107886388A (en) | The traffic trip credit and safety service platform and its operation method of multicenter are realized based on alliance's chain | |
CN107798532A (en) | A kind of car-mounted terminal method of payment, terminal and computer-readable medium | |
CN107798541B (en) | Monitoring method and system for online service | |
US20100313037A1 (en) | Collectible case authentication system, device and method | |
US20160300189A1 (en) | Electronic system for consulting and verifying the authenticity, validity and restriction of documents using proximity data reading technology | |
CN110297923A (en) | Information processing method, device, electronic equipment and computer readable storage medium | |
CN105825379A (en) | Method and system preventing payment means from embezzlement | |
EP3140825B1 (en) | Authentication method for vehicular number plate recognition | |
CN105608579A (en) | Method of preventing credit card from embezzlement and system thereof | |
CN1952973A (en) | Method and system against false of network identification, verification, supervision and inquiry for graphic context bar code on bank bill | |
CN101699435A (en) | Method for querying and authenticating second-generation ID card based on key information | |
CN106372474A (en) | Method and system for preventing identification card from being stolen | |
CN112437428A (en) | Verification method and server | |
CN112884487A (en) | Oiling machine mobile anti-theft intelligent management platform based on Internet + | |
CN106097601A (en) | Banking system and the method for account is entered without card intelligence | |
CN101067883A (en) | RFID based closed loop tickets antifake system | |
CN109326020A (en) | A kind of subway booking and ticket checking method based on iris recognition | |
CN102426687A (en) | Currency circulation security management system based on code inputting radio-frequency technology | |
CN106815614A (en) | A kind of bank acceptance Antiforge system of use NFC anti-counterfeiting technologies | |
CN1822058A (en) | Anti-theft alarm system for identity rechecking of automatic teller machine | |
CN111417088B (en) | Identity attribute authentication method for Internet of vehicles data | |
CN100397415C (en) | Motor vehicle electronic license plate operating system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 510000 B03, E-PARK Creative Park, yuzhuzhi Valley, 32, Keng Kong Street, Maogang village, Whampoa, Guangzhou, Guangdong Applicant after: GUANGZHOU HENGHAO DATA TECHNOLOGY CO., LTD. Address before: 510080 4, No. 3, Ho Group West Road, Yuexiu District, Guangzhou, Guangdong. Applicant before: GUANGZHOU HENGHAO DATA TECHNOLOGY CO., LTD. |
|
CB02 | Change of applicant information | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170201 |
|
WD01 | Invention patent application deemed withdrawn after publication |