CN106372474A - Method and system for preventing identification card from being stolen - Google Patents

Method and system for preventing identification card from being stolen Download PDF

Info

Publication number
CN106372474A
CN106372474A CN201610824627.8A CN201610824627A CN106372474A CN 106372474 A CN106372474 A CN 106372474A CN 201610824627 A CN201610824627 A CN 201610824627A CN 106372474 A CN106372474 A CN 106372474A
Authority
CN
China
Prior art keywords
card
information
card reader
mobile device
location
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610824627.8A
Other languages
Chinese (zh)
Inventor
黄铿龙
郑宇�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Henghao Data Technology Co Ltd
Original Assignee
Guangzhou Henghao Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Henghao Data Technology Co Ltd filed Critical Guangzhou Henghao Data Technology Co Ltd
Priority to CN201610824627.8A priority Critical patent/CN106372474A/en
Publication of CN106372474A publication Critical patent/CN106372474A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Position Fixing By Use Of Radio Waves (AREA)

Abstract

The purpose of the invention is to provide a method and a system for preventing an identification card from being stolen. The method comprises the following steps: reading identification card information through an identification card reader which can identify the authenticity of a holder, sending a position of the reader and the identification card information to the system; carrying out real-time comparison on the position information of the reader and the position information of a mobile device held by a legal user by a system background; providing a service for anti-theft of the identification card to the user, wherein the mobile device held by the legal user is acquired through the information registered in real-name by an operator according to the identification card information, and the position information of the mobile device can be acquired through a mobile communication operator positioning technology or a satellite positioning technology. A thought flow chart of the system implementation scheme can be viewed in Figure 1 of an abstract drawing, that is, a flow for anti-theft of the identification card is increased at the third point of a service handling procedure that is before starting of the service handling procedure, the consistency judgment is rapidly carried out on a service handling occurrence place and the position of the mobile device held by the legal user by use of a big data processing technology.

Description

A kind of stolen method and system of prevention identity card
First, technical field
Mobile communication software development identity card safety management, mobile communication carrier's location technology, satellite positioning tech (as gps, Big Dipper bds), card reader
2nd, background technology
1st, concept definition
[defining 1] validated user
Validated user refers to the legal use people corresponding to identity card, any identity card winner or identity card thief all It is not validated user, the identity card holder of forgery is not validated user.
[defining 2] mobile communication carrier's location technology
Obtain the technology of positional information by mobile communication carrier, including but not limited to: cell localization, lbs, hlr, letter Make data locking
[defining 3] satellite positioning tech
Pass through global positioning system (global positioning system) or Beidou satellite navigation system (beidou navigation satellite system, bds) obtains the technology of positional information
2nd, background
Resident identification card is the unique certificate for proving holder's identity, gives citizen by Chinese Government's distribution.It will be made Proof instrument for everyone unique citizenship.From 29 days March in 2004, China's Mainland formally starts to change for resident Send out the No.2 residence card of type built-in contactless ic card intelligent chip, China second-generation identity card surface adopts anti false film and printing anti- Pseudo- technology, using personal photochrome, and available machines used reads the information in digit chip.With resident identification card range Constantly widen, identity card facilitating people's life and carry out the aspects such as tight social management and played important function, As affairs of notarizing, handle application exit formalities, handle individual license, handle personal credit's affairs, handle and take the people Boat aircraft or high ferro formality, hotel of putting up for the night checks in.If resident identification card is stolen after losing, gently then affect normal Live and work is heavy then may bring unnecessary economic loss and bearing legal responsibility.Recent years utilizes resident identification card Break laws and commit crime and also happen occasionally, and the quantity usurping the delinquent case of identity card every year all assumes incremental trend.Using The method that identity card is broken laws and commit crime includes but is not limited to as follows:
1. steal other people identity card false claiming cashes in banks.
2. forge or registered to other unit mechanism using other people identity cards, take this opportunity after accepting betrothal gifts to steal.
3. using stealing, pick up or identity card application bank card that is pseudo-, altering, the credit card is swindled.
3rd, content of the invention
The present invention provides a kind of means using positional information coupling to prevent the stolen method and system of identity card.This Method may apply on a kind of card reader of ID card of the recognizable holder true and false, and this card reader is except distinguishing that identity card is true Moreover it is possible to pass to the position of card reader and ID card information (name and ID (identity number) card No.) outside puppet and reading identity card information Anti-theft system is verified, anti-theft system backstage is by the mobile device being used using position and the validated user of card reader Position is compared in real time, reduces the stolen risk of identity card further.The position of wherein card reader can shift to an earlier date disposably Manual typing is it is also possible to install mobile sim card to obtain, and the position of the mobile device of validated user then utilizes mobile communication to transport Battalion's business's location technology or satellite positioning tech obtain.The mobile device that validated user uses is known by following two steps:
1. the mobile number corresponding to identity card is obtained by the information that operator's system of real name is registered.If (using identity Demonstrate,prove number inquiry less than corresponding mobile number, or when multiple corresponding mobile number occurs, then using name nonproductive poll)
2. the mobile device corresponding to this mobile number is known by mobile communication carrier.
Validated user when using identity card transacting business, first by this card reader reading identity card information, then by Card Reader The position of device and ID card information (name and ID (identity number) card No.) pass to system, and system judges that the movement that validated user is held sets Whether standby location is consistent with the position of card reader, only could handle process by finishing service in position consistency.
The thinking flow process of system realization scheme can check Fig. 1 of accompanying drawing, is mainly starting business in service handling side Before handling flow process, increased identity card tamper-proof checking flow process, read by the card reader of ID card of the recognizable holder true and false ID card information, the position of card reader and ID card information (name and ID (identity number) card No.) are sent to anti-theft system, system The position of card reader is held with validated user mobile device location (by mobile communication carrier's location technology or Satellite positioning tech etc. obtains) quickly compared, judge whether both positions are consistent:
1), when user carries out business handling, service handling side is read using the card reader of ID card of the recognizable holder true and false ID card information, card reader can send checking request to tamper-proof platform, and provides positional information and the identity card letter of card reader Breath (name and ID (identity number) card No.).
2) tamper-proof platform obtains the positional information of the mobile device that validated user is held, and this information is by mobile communication Operator's location technology or satellite positioning tech obtain.
3) tamper-proof platform is by 2) positional information and 1 of mobile device that obtains) positional information of card reader that obtains enters Row compares, and sees whether both are consistent, and comparison result is returned to card reader.The presenting and obtain the following two kinds of the result Mode:
1. the result passes through the display lamp of card reader or display screen shows.
2. other-end (as pc and panel computer etc.) can be crossed api and read the result.
4) service handling side or its operation system accept, according to card reader, the result that tamper-proof platform receives and determine Subsequent processes.(for guarantee user using perception it is ensured that if business handling convenient and quick is it is proposed that both position consistency Then start business handling flow process, both positions are inconsistent then to terminate business handling flow process, if failing to look into according to ID card information Ask the position of the mobile device that validated user is held, when to lead to returning result be to judge, will by service handling side voluntarily Determine follow-up processing flow)
Other identity card tamper-proof schemes have obvious advantage at present for present invention contrast, such as utilize fingerprint to prevent identity Demonstrate,prove the scheme usurped, this scheme has limitation, because current fingerprint and identity card have the data of corresponding relation seldom, compare Under substantial amounts of data basis are then had based on the identity card tamper-proof scheme of positional information coupling, and mobile device is current one Plant the very high equipment of popularity rate.
In addition at present bank and other financial mechanism, for client's handling bank business, have read visitor using card reader of ID card After the ID card information at family, ID card verification is carried out by network verification system, due to remaining a small amount of mistake in network verification system Difference data, this will lead to it is possible that ID (identity number) card No. does not exist in proof procedure, ID (identity number) card No. exist but name not Coupling or feedback photo such as do not correspond at the result.Then need to prove by other supplementary meanss when above-mentioned situation occurs, such as will Ask client to show household registers, passport, other perfect instruments such as motor vehicle driving license auxiliary evidence, or provide online checking knot Fruit proves, period may need to wait the time in one to two weeks, and this will have a strong impact on the business handling of client.By contrast, may be used The card reader of ID card of the identification holder true and false then facilitate a lot, this card reader only need to read complete ID (identity number) card No. and Name can determine whether the holder true and false, largely decreases and various unmatched troubles when ID card verification process. Therefore this card reader goes for a lot of industries, including but not limited to: bank, hotel, department of civil aviaton, high ferro department, handle Entry and exit procedures government department, etc..
4th, brief description
[brief description]
Fig. 1 is the identity card tamper-proof platform process figure being compared based on position;
Fig. 2 is unified administrative region coupling system conceptual scheme;
Fig. 3 is longitude and latitude location information matching scheme figure;
Fig. 4 is that administrative region system positions comprehensive matching conceptual scheme with longitude and latitude;
5th, specific embodiment
Below by example in detail specific embodiment.This example is that description is held identity card and handled, in bank, handss of opening an account In continuous process, the card reader of ID card reading identity card information of the recognizable holder true and false, send out to identity card tamper-proof platform Send checking request, verify whether there is the stolen suspicion of identity card.
First pass through mobile communication carrier's location technology or satellite positioning tech can get user in real time and be held Mobile device particular geographic location, the position of the mobile device that the positional information of card reader and validated user are used by system Confidence breath is contrasted, thus judging whether both positions are consistent, if inconsistent, needing to inform that bank there may be and usurping suspicion Doubt.The position of wherein card reader can be obtained by bank's typing in advance or the mobile sim card being arranged in card reader, and legal use The geographical position of the mobile device that family is held can be obtained by the following two kinds mode:
1., if adopting mobile communication carrier's location technology, need first with ID card information (name and identity card Number) information inquiry registered by operator's system of real name, to corresponding mobile number, gets correspondence further according to mobile number Mobile device, thus getting the positional information of mobile device.
If 2. adopting satellite positioning tech, need specifically to take in upper installation of mobile device (having gps or bds function) Business (or software), to obtain location information.
Because user is limited the waiting time when carrying out business handling, therefore it is required that the judgement energy of location consistency Completed in several seconds.Complete judge process includes searching corresponding mobile number, position enquiring, position ratio according to ID card information To actions such as, result feedbacks.
The scope of application of the present invention includes but is not limited to the scope involved by example.
[technical scheme]
Technical Architecture is described as follows:
Tamper-proof platform can get mobile device by mobile communication carrier's location technology or satellite positioning tech Location information, and provide core coupling engine to carry out location matches, it is fixed that coupling engine is supported by multiple matching strategies The coupling of position information.
Open an account business handling when, the card reader of ID card of the recognizable holder true and false have read ID card information, and to being System provides the positional information of card reader and the ID card information (name and ID (identity number) card No.) of transacting business, and system passes through operator The mobile number corresponding to this identity card for the acquisition of information of system of real name registration, by mobile communication carrier's location technology or defend Star location technology just can inquire the real-time geographical locations of this mobile number, the mobile device that validated user is used by system The positional information of location information and card reader is compared, and judges whether position consistency, and will determine that result returns to Card Reader Device.Card reader calls coupling engine to carry out location matches by the interface service of tamper-proof platform.
The present invention will provide three kinds of solutions:
1. unified administrative region coupling system
System will be mated using unified administrative region between card reader and tamper-proof platform, specific coupling flow process is such as Under:
The card reader of ID card of the recognizable holder true and false initiates checking request, and provides the administration of card reader site The ID card information (name and ID (identity number) card No.) of area information and transacting business, tamper-proof platform is stepped on by operator's system of real name Note mobile number corresponding to this identity card for the acquisition of information, the real-time position information of this mobile number is then transported by mobile communication Battalion's business's location technology or satellite positioning tech obtain, and this positional information is changed into address information, recall unified administrative area Domain division system carries out administrative regions at different levels coupling, and the morphology to the address information described by Chinese natural language and semanteme are carried out After analysis, by country, province, districts and cities, the administrative grade in area is mated respectively.Judge whether country's mismatch, if it is Return abnormal.Judge whether province mismatches, if returning abnormal;Judge whether districts and cities mismatch, if returning abnormal; Judge whether region mismatches, if returning abnormal, judging whether final address is consistent, if unanimously, returning normal, no Consistent then return abnormal.(flow process asks for an interview Fig. 2 in Figure of description)
2. longitude and latitude location information coupling
The card reader of ID card of the recognizable holder true and false initiates checking request, provide card reader geographical location information and ID card information (name and ID (identity number) card No.), tamper-proof platform gets this identity card by operator's system of real name register information Corresponding mobile number, the real-time position information of this mobile number then passes through mobile communication carrier's location technology or satellite Position technical limit spacing.Call longitude and latitude matching module, enter row distance using longitude and latitude location information between the two and calculate, according to The threshold value setting is judged.If the distance between card reader position and position of mobile device exceed this threshold value, it is considered Abnormality.If being less than threshold value, return normal.(flow process asks for an interview Fig. 3 in Figure of description)
3. administrative region system and longitude and latitude comprehensive matching
The card reader of ID card of the recognizable holder true and false initiates checking request, carries out unified administrative region system first After coupling, if system coupling in administrative region is not passed through, enter longitude and latitude location information coupling flow process.(flow process asks for an interview explanation Book accompanying drawing 4).

Claims (7)

1. a kind of solution using mobile communication carrier's location technology or gps (or Big Dipper positioning service) location technology Lai Prevent the stolen system of identity card it is characterised in that reading body using a kind of card reader of ID card of recognizable holder true and false Part card information, and the positional information of card reader and ID card information (name and ID (identity number) card No.) are passed to anti-theft system, The positional information of the mobile device that the position of card reader is held by system with legitimate user is compared, and judges whether position one Cause, and return result to card reader, card reader feeds back to service handling side the result.Include location information services, Location matches engine (matching strategy), interface service module, the result presents and obtains.
2. a kind of card reader of ID card of the recognizable holder true and false as claimed in claim 1, this card reader can not only be distinguished The other identity card true and false, reading identity card information, and can be by card reader position and ID card information (name and identification card number Code) it is sent to anti-theft system and verified.
3. the mobile number corresponding to utilization identity card as claimed in claim 1, refers to according to ID card information, by operator The corresponding mobile number of acquisition of information of system of real name registration.
4. location information services as claimed in claim 1, its feature has two kinds:
(1) adopt mobile communication carrier's location technology, this technology utilize the data of mobile communication carrier or interface (include but It is not limited to cell localization data, lbs, hlr, signaling data) location information of direct access mobile device.
(2) it is then to obtain position using a kind of specific service installed on the mobile apparatus to believe using satellite positioning tech Breath, this service can get the geographical location information (warp of current device in real time by equipment gps (or Big Dipper positioning service) function Latitude or administrative region title).
5. location matches engine as claimed in claim 1 is it is characterised in that location matches engine mainly provides position matching Service, this engine will provide three kinds of matching strategy schemes:
The first scheme is that system uses same set of administrative region system, the body of the recognizable holder true and false with service handling side Part card card reader provides location name and the ID card information (name and ID (identity number) card No.) of card reader, and system passes through mobile communication Operator's location technology or satellite positioning tech obtain the geographical location information of the mobile device that validated user is held.Mobile device Positional information can change into address name, this two address names are analyzed by morphology and semanteme, by country, province, Districts and cities, region, street place is mated respectively.
Second scheme is mated by geo-localisation information (longitude and latitude), the card reader of ID card of the recognizable holder true and false There is provided geo-localisation information and the ID card information of card reader, system passes through mobile communication carrier's location technology or satellite The geo-localisation information of position the held mobile device of technical limit spacing validated user.Position by the positional information of card reader and mobile device Confidence breath is mated, and distance is then normal less than threshold value, exceedes then abnormal.
The third scheme combines the first and second scheme, first passes through unified administrative region system plan-validation, if The match is successful returns normally, if coupling is unsuccessful, enables geographical location information matching scheme.
6. interface service module as claimed in claim 1 is it is characterised in that described module provides the interface of standard for outside system System calls.
7. the result as claimed in claim 1 presents and obtains it is characterised in that following two aspects:
(1) the result can pass through the display lamp of card reader or display screen shows.
(2) other-end (as pc and panel computer etc.) can be crossed api and read the result.
CN201610824627.8A 2016-09-08 2016-09-08 Method and system for preventing identification card from being stolen Pending CN106372474A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610824627.8A CN106372474A (en) 2016-09-08 2016-09-08 Method and system for preventing identification card from being stolen

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610824627.8A CN106372474A (en) 2016-09-08 2016-09-08 Method and system for preventing identification card from being stolen

Publications (1)

Publication Number Publication Date
CN106372474A true CN106372474A (en) 2017-02-01

Family

ID=57896875

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610824627.8A Pending CN106372474A (en) 2016-09-08 2016-09-08 Method and system for preventing identification card from being stolen

Country Status (1)

Country Link
CN (1) CN106372474A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874986A (en) * 2017-02-28 2017-06-20 四川建筑职业技术学院 Differentiate whether I uses identity card and the method for pointing out identity card to lose
CN112950199A (en) * 2021-02-04 2021-06-11 中国联合网络通信集团有限公司 Anti-theft method and server for communication identifier

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103035078A (en) * 2012-11-30 2013-04-10 深圳天源迪科信息技术股份有限公司 Payment security monitoring method based on position
CN105608579A (en) * 2015-10-19 2016-05-25 广州衡昊数据科技有限公司 Method of preventing credit card from embezzlement and system thereof
CN105825379A (en) * 2016-03-14 2016-08-03 广州衡昊数据科技有限公司 Method and system preventing payment means from embezzlement
CN106097221A (en) * 2016-06-06 2016-11-09 上海河广信息科技有限公司 Certificate burglary-resisting system and certificate security system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103035078A (en) * 2012-11-30 2013-04-10 深圳天源迪科信息技术股份有限公司 Payment security monitoring method based on position
CN105608579A (en) * 2015-10-19 2016-05-25 广州衡昊数据科技有限公司 Method of preventing credit card from embezzlement and system thereof
CN105825379A (en) * 2016-03-14 2016-08-03 广州衡昊数据科技有限公司 Method and system preventing payment means from embezzlement
CN106097221A (en) * 2016-06-06 2016-11-09 上海河广信息科技有限公司 Certificate burglary-resisting system and certificate security system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874986A (en) * 2017-02-28 2017-06-20 四川建筑职业技术学院 Differentiate whether I uses identity card and the method for pointing out identity card to lose
CN112950199A (en) * 2021-02-04 2021-06-11 中国联合网络通信集团有限公司 Anti-theft method and server for communication identifier
CN112950199B (en) * 2021-02-04 2023-06-23 中国联合网络通信集团有限公司 Anti-theft method and server for communication identification

Similar Documents

Publication Publication Date Title
US7170391B2 (en) Birth and other legal documents having an RFID device and method of use for certification and authentication
US20090234764A1 (en) Systems and methods for biometric authentication of monetary fund transfer
US8365986B2 (en) Credit card security system and method
CN107886388A (en) The traffic trip credit and safety service platform and its operation method of multicenter are realized based on alliance's chain
CN107798532A (en) A kind of car-mounted terminal method of payment, terminal and computer-readable medium
CN107798541B (en) Monitoring method and system for online service
US20100313037A1 (en) Collectible case authentication system, device and method
US20160300189A1 (en) Electronic system for consulting and verifying the authenticity, validity and restriction of documents using proximity data reading technology
CN110297923A (en) Information processing method, device, electronic equipment and computer readable storage medium
CN105825379A (en) Method and system preventing payment means from embezzlement
EP3140825B1 (en) Authentication method for vehicular number plate recognition
CN105608579A (en) Method of preventing credit card from embezzlement and system thereof
CN1952973A (en) Method and system against false of network identification, verification, supervision and inquiry for graphic context bar code on bank bill
CN101699435A (en) Method for querying and authenticating second-generation ID card based on key information
CN106372474A (en) Method and system for preventing identification card from being stolen
CN112437428A (en) Verification method and server
CN112884487A (en) Oiling machine mobile anti-theft intelligent management platform based on Internet +
CN106097601A (en) Banking system and the method for account is entered without card intelligence
CN101067883A (en) RFID based closed loop tickets antifake system
CN109326020A (en) A kind of subway booking and ticket checking method based on iris recognition
CN102426687A (en) Currency circulation security management system based on code inputting radio-frequency technology
CN106815614A (en) A kind of bank acceptance Antiforge system of use NFC anti-counterfeiting technologies
CN1822058A (en) Anti-theft alarm system for identity rechecking of automatic teller machine
CN111417088B (en) Identity attribute authentication method for Internet of vehicles data
CN100397415C (en) Motor vehicle electronic license plate operating system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 510000 B03, E-PARK Creative Park, yuzhuzhi Valley, 32, Keng Kong Street, Maogang village, Whampoa, Guangzhou, Guangdong

Applicant after: GUANGZHOU HENGHAO DATA TECHNOLOGY CO., LTD.

Address before: 510080 4, No. 3, Ho Group West Road, Yuexiu District, Guangzhou, Guangdong.

Applicant before: GUANGZHOU HENGHAO DATA TECHNOLOGY CO., LTD.

CB02 Change of applicant information
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170201

WD01 Invention patent application deemed withdrawn after publication