CN106452754B - Multi-user online dynamic encryption method and device - Google Patents

Multi-user online dynamic encryption method and device Download PDF

Info

Publication number
CN106452754B
CN106452754B CN201610953682.7A CN201610953682A CN106452754B CN 106452754 B CN106452754 B CN 106452754B CN 201610953682 A CN201610953682 A CN 201610953682A CN 106452754 B CN106452754 B CN 106452754B
Authority
CN
China
Prior art keywords
key
data
different
fragments
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610953682.7A
Other languages
Chinese (zh)
Other versions
CN106452754A (en
Inventor
姜冰
张彬彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guotou Fusion Technology Co.,Ltd.
Original Assignee
Datang Telecom Convergence Communications Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datang Telecom Convergence Communications Co Ltd filed Critical Datang Telecom Convergence Communications Co Ltd
Priority to CN201610953682.7A priority Critical patent/CN106452754B/en
Publication of CN106452754A publication Critical patent/CN106452754A/en
Application granted granted Critical
Publication of CN106452754B publication Critical patent/CN106452754B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a multi-person online dynamic encryption method and a device, wherein the method comprises the steps of obtaining different key fragments input by a plurality of persons online in real time, and mixing the key fragments of the plurality of persons into a key A according to a set mechanism through a background program. And the secret key A is encrypted by using a private key M through an asymmetric encryption algorithm to generate a ciphertext B encrypted by the secret key A. The cipher text B and the data encrypted by the key A are transmitted to a data receiving party, the receiving party decrypts the key B by using a public key M corresponding to a private key M to restore the key A, and then decrypts the encrypted data file by using the key A.

Description

Multi-user online dynamic encryption method and device
Technical Field
The invention relates to the field of online dynamic encryption, in particular to a multi-user online dynamic encryption method and device.
Background
Encryption technology: the encryption technology is the main security measure for electronic information, and is the most common security measure, and the process of the encryption technology utilizes the technical measure to change important data into unreadable random code files (ciphertexts) for transmission, and the unreadable random code files are restored into original data (decrypted) by the same or different measures after reaching a destination. Encryption techniques are mainly classified into symmetric encryption and asymmetric encryption.
And (3) secret key: a key is a parameter that is input in an algorithm that converts plaintext into ciphertext or converts ciphertext into plaintext. Keys are divided into symmetric keys and asymmetric keys. It may exist in the form of a string, digital certificate, or U-shield.
Symmetric encryption: symmetric encryption adopts a symmetric cipher coding technology, and is characterized in that the same key is used for file encryption and decryption, namely, the encryption key can also be used as a decryption key. Due to its fast speed, symmetric encryption is often used when the sender of a message needs to encrypt a large amount of data. Symmetric encryption is also referred to as key encryption. A symmetrically encrypted key is also referred to herein as a unique key.
Asymmetric encryption: asymmetric encryption provides a pair of keys, a public key (public key) and a private key (private key), for encryption and decryption of data. The private key can only be safely kept by one party and cannot be leaked out, while the public key can be sent to any person who requests it. Asymmetric encryption uses one of the pair of keys for encryption, while decryption requires the other key. Asymmetric encryption is more secure than symmetric encryption, but the processing speed is slower.
When large-scale data encryption and decryption are processed, a symmetric encryption algorithm with high efficiency is often needed due to the consideration of operation speed, but keys used by the symmetric algorithm are the same key, and higher risks exist in use management.
Disclosure of Invention
The invention aims to provide a multi-user online dynamic encryption method and a multi-user online dynamic encryption device, which are consistent in encryption and decryption keys of symmetric encryption. The method has two risks, one is that a single custodian of the key masters the complete key, the risk of losing the key exists, in addition, a receiver of the data in the transmission process also has the possibility of losing the key, and although the key has an expiration mechanism, the risk is higher. The present invention reduces the risk of this process primarily through unique key generation and asymmetric key transmission.
In order to achieve the purpose, the invention provides the following scheme: a multi-user online dynamic encryption method comprises the following steps:
A. acquiring a plurality of different key fragments in real time on line;
B. mixing different key fragments into a key A;
C. setting a private key M, and encrypting the secret key A by using an asymmetric encryption algorithm through the private key M to obtain a ciphertext B;
D. acquiring data to be transmitted, encrypting the data to be transmitted by a secret key A to obtain encrypted transmitted data, and sending a ciphertext B and the encrypted data to be transmitted to a data receiver;
E. and receiving the ciphertext B and the data transmitted after encryption, decrypting the ciphertext B through a public key M corresponding to the private key M to obtain a secret key A, and decrypting the data to be transmitted after encryption through the secret key A to obtain the decrypted data.
Optionally, before step a is executed, queue maintenance is performed on a plurality of different key fragment sources.
Optionally, before step a is executed, when the secure data transmission is initiated, the source queues of the multiple different key fragments are notified through a message mechanism, and the multiple different key fragments are collected through the message mechanism.
Optionally, in step B, the unique key is generated by a plurality of different key fragments through the obfuscation procedure, and the unique key is not repeated when the key fragments input each time are different.
The invention also provides a multi-user online dynamic encryption device, which comprises:
a maintaining module, configured to maintain a plurality of different key fragment queues;
the acquisition module is used for acquiring a plurality of different key fragments;
the confusion module is used for mixing different key fragments into a key A;
the encryption module is used for encrypting the secret key A and data to be transmitted;
and the decryption module is used for decrypting the encrypted secret key A and the transmitted data.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects: the mode of dynamically generating the key by inputting the key segments on line by a plurality of persons enables the encrypted password to be changed every time without setting the failure time limit, and meanwhile, the key is dispersed in hands of the plurality of persons, and the whole key cannot be obtained by any key segment, and the information transmission is safer by the technical mode of transmitting the symmetric encryption key through asymmetric encryption. And finally, the symmetric encryption is used to ensure the decryption speed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
FIG. 1 is a schematic flow chart of a multi-user online dynamic encryption method and apparatus according to the present invention;
FIG. 2 is a schematic diagram of a structural module of a multi-user online dynamic encryption method and apparatus according to the present invention;
fig. 3 is a schematic flowchart of a multi-user online dynamic encryption method and apparatus in embodiment 1 of the present invention;
fig. 4 is a flowchart illustrating a multi-user online dynamic encryption method and apparatus in embodiment 2 of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a multi-user online dynamic encryption method and a device, comprising the following steps: A. acquiring a plurality of different key fragments in real time on line; B. mixing different key fragments into a key A; C. setting a private key M, and encrypting the secret key A by using an asymmetric encryption algorithm through the private key M to obtain a ciphertext B; D. acquiring data to be transmitted, encrypting the data to be transmitted by a secret key A to obtain encrypted transmitted data, and sending a ciphertext B and the encrypted data to be transmitted to a data receiver; E. and receiving the ciphertext B and the data transmitted after encryption, decrypting the ciphertext B through a public key M corresponding to the private key M to obtain a secret key A, and decrypting the data to be transmitted after encryption through the secret key A to obtain the decrypted data. Before step a is executed, queue maintenance is performed on a plurality of different key fragment sources. Before step A is executed, when secret data transmission is initiated, a plurality of different secret key fragment source queues are informed through a message mechanism, and a plurality of different secret key fragments are collected through the message mechanism in a unified mode. In the step B, the plurality of different key fragments generate the unique key through the obfuscation procedure, and the unique key is not repeated when the key fragments input each time are different.
The invention also provides a multi-user online dynamic encryption device, which comprises: a maintaining module, configured to maintain a plurality of different key fragment queues; the acquisition module is used for acquiring a plurality of different key fragments; the confusion module is used for mixing different key fragments into a key A; the encryption module is used for encrypting the secret key A and data to be transmitted; and the decryption module is used for decrypting the encrypted secret key A and the transmitted data.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Example one
The invention relates to a software program realized by J2EE, which has the main principle that a plurality of people are supported to input different key fragments mastered by themselves in real time on line, and the key fragments of the plurality of people are mixed into a key A according to a set mechanism through a background program. And the secret key A is encrypted by using a private key M through an asymmetric encryption algorithm to generate a ciphertext B encrypted by the secret key A. And transmitting the ciphertext B and the data encrypted by the key A to a data receiving party, decrypting the key B by the receiving party by using a public key M corresponding to the private key M to restore the key A, and decrypting the encrypted data file by using the key A.
The mode of dynamically generating the key by inputting the key segments on line by a plurality of persons enables the encrypted password to be changed every time without setting the failure time limit, and meanwhile, the key is dispersed in hands of the plurality of persons, and the whole key cannot be obtained by any key segment, and the information transmission is safer by the technical mode of transmitting the symmetric encryption key through asymmetric encryption. And finally, the symmetric encryption is used to ensure the decryption speed.
A secret key generator is adopted to generate a public key and a private key, a private key data sending party is used for encrypting data, and a public key data receiving party is used for decrypting data.
In the embodiment of the invention, a plurality of persons participate in the key generation, and any person is absent and cannot generate the same key again, so that the possibility of key leakage is reduced. The data adopts symmetric encryption, and the secret key adopts asymmetric encryption, thereby not only ensuring the transmission safety, but also ensuring the performance of big data encryption and decryption
Example two
The invention is used in the process of encrypting and transmitting the passwords of the rechargeable cards to the cooperative card makers so as to produce the rechargeable cards in batches.
During transfer, a plurality of employees of the operator input own key fragments on line (the data transfer input is different each time), and when all the employees complete the input, the key fragments are synthesized into a unique key by using a obfuscation program. And then encrypting the password data of the rechargeable card by using the unique key, simultaneously transmitting the unique key to a third-party card manufacturer through asymmetric encryption, restoring the unique key by using a decryption logic built in a decryption program at the card manufacturer side, and restoring the encrypted file by using the unique key.
In the process, the invention properly solves the problems of safe generation of the encryption key, encrypted transmission of the rechargeable card password and password decryption of a third party cooperation card manufacturer.
When the recharging card password is transmitted, in consideration of confidentiality, a plurality of persons participate in the encryption key generation process at the same time, and the risk of leakage of the plurality of persons at the same time is very low. And in the process of each key generation, because the password segments input by a plurality of people can be different (actually, the password segments input by a plurality of people are different each time), the encryption keys generated by the password data of the rechargeable card are different each time, and the risk range is reduced.
The cooperation card manufacturer outsourcing an enterprise for a third party, considering safety, the timeliness required by the encryption key is as short as possible, the timeliness is only limited to the transmission because the encryption keys transmitted each time are different, and meanwhile, the third party manufacturer takes the encryption text of the unique key, so that the leakage risk is reduced.
The number of the rechargeable cards is large, and although asymmetric encryption and decryption are used for key transmission, symmetric encryption and decryption are used for final decryption, so that the performance is high.
Firstly, configuring an employee list needing to participate in password generation, logging all employees in the employee list into a system when generating a rechargeable card password, and maintaining an employee online queue by the system.
The system sends an encryption key making application to the employees of the employee queue.
The queue uses websocket to notify the employees online, and after the employees receive the online message, everyone inputs the key fragment (alphanumeric chinese combined string).
And collecting all the password fragments in the employee queue through a message collection function.
And the obfuscating program exchanges the characters in all the code segments for multiple positions, and then carries out code conversion again to generate a unique key for symmetrically encrypting data.
The original data to be transmitted is encrypted using 3DES using the unique key to form an encrypted file a.
The operator holds the private key of asymmetric RSA and the card maker holds the public key. The operator re-encrypts the unique key with RSA using the private key to generate encrypted file B.
The encrypted files a and B are separately passed to the card manufacturer.
And the card manufacturer decrypts the encrypted file B by using the public key to obtain the unique public key.
And the card manufacturer decrypts the encrypted file A by using the unique public key to obtain the original data.
In the embodiment of the invention, two or more persons participate in the key generation, and any person is absent and cannot generate the same key again, so that the possibility of key leakage is reduced. The data is encrypted symmetrically, and the key is encrypted asymmetrically, so that the transmission safety is ensured, and the encryption and decryption performance of the big data is also ensured.
The principles and embodiments of the present invention are explained herein using various embodiments, which are merely used to help understand the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.

Claims (3)

1. A multi-user online dynamic encryption method is characterized by comprising the following steps:
A. acquiring a plurality of different key fragments in real time on line;
B. mixing the different key fragments into a key A;
C. setting a private key M, and encrypting the secret key A by using an asymmetric encryption algorithm through the private key M to obtain a ciphertext B;
D. acquiring data to be transmitted, encrypting the data to be transmitted by the secret key A to obtain encrypted data, and sending the ciphertext B and the encrypted data to be transmitted to a data receiver;
E. receiving the ciphertext B and the encrypted transmitted data, decrypting the ciphertext B through a public key corresponding to the private key M to obtain a secret key A, and decrypting the encrypted transmitted data through the secret key A to obtain decrypted data;
in the step B, the plurality of different key fragments generate the unique key through a confusion program, and the unique key cannot be repeated when the key fragments input each time are different;
before the step A, when the secure data transmission is initiated, notifying the source queues of the different key fragments through a message mechanism, and uniformly collecting the different key fragments through the message mechanism.
2. The multi-user online dynamic encryption method of claim 1, wherein before step A, the method further comprises maintaining a queue of the plurality of different key fragment sources.
3. An apparatus for implementing the multi-person online dynamic encryption method according to any one of claims 1 and 2, comprising:
a maintaining module, configured to maintain a plurality of different key fragment queues;
the acquisition module is used for acquiring a plurality of different key fragments;
the confusion module is used for mixing different key fragments into a key A; the plurality of different key fragments generate the unique key through the obfuscation program, and the unique key cannot be repeated when the key fragments input each time are different;
the encryption module is used for encrypting the secret key A and data to be transmitted;
and the decryption module is used for decrypting the encrypted secret key A and the transmitted data.
CN201610953682.7A 2016-11-03 2016-11-03 Multi-user online dynamic encryption method and device Active CN106452754B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610953682.7A CN106452754B (en) 2016-11-03 2016-11-03 Multi-user online dynamic encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610953682.7A CN106452754B (en) 2016-11-03 2016-11-03 Multi-user online dynamic encryption method and device

Publications (2)

Publication Number Publication Date
CN106452754A CN106452754A (en) 2017-02-22
CN106452754B true CN106452754B (en) 2020-09-08

Family

ID=58179283

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610953682.7A Active CN106452754B (en) 2016-11-03 2016-11-03 Multi-user online dynamic encryption method and device

Country Status (1)

Country Link
CN (1) CN106452754B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108540486A (en) * 2018-04-23 2018-09-14 湖南东方华龙信息科技有限公司 The generation of cloud key and application method
CN111614667A (en) * 2020-05-20 2020-09-01 北京科东电力控制系统有限责任公司 Safety encryption method, device and system for real-time data transmission of power grid regulation and control information
CN114745134B (en) * 2022-03-30 2024-05-31 恒玄科技(上海)股份有限公司 Method, system, device and computer readable medium for streaming media data stream

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338106A (en) * 2013-07-18 2013-10-02 曙光云计算技术有限公司 Methods and devices for ciphering and deciphering file
CN104935565A (en) * 2015-04-15 2015-09-23 浙江师范大学 Vote processing system used for network voting system, vote processing method used for network voting system and vote processing device used for network voting system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100536393C (en) * 2005-01-14 2009-09-02 中兴通讯股份有限公司 Secret shared key mechanism based user management method
US8705730B2 (en) * 2010-12-23 2014-04-22 Morega Systems Inc. Elliptic curve cryptography with fragmented key processing and methods for use therewith
CN104868996A (en) * 2014-02-25 2015-08-26 中兴通讯股份有限公司 Data encryption and decryption method, device thereof, and terminal
CN103986583B (en) * 2014-05-29 2019-11-29 上海斐讯数据通信技术有限公司 A kind of dynamic encrypting method and its cryptographic communication system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338106A (en) * 2013-07-18 2013-10-02 曙光云计算技术有限公司 Methods and devices for ciphering and deciphering file
CN104935565A (en) * 2015-04-15 2015-09-23 浙江师范大学 Vote processing system used for network voting system, vote processing method used for network voting system and vote processing device used for network voting system

Also Published As

Publication number Publication date
CN106452754A (en) 2017-02-22

Similar Documents

Publication Publication Date Title
CN101043326B (en) Dynamic information encrypting system and method
CN102546181A (en) Cloud storage encrypting and deciphering method based on secret key pool
CN107196926A (en) A kind of cloud outsourcing privacy set comparative approach and device
CN105812366B (en) Server, anti-crawler system and anti-crawler verification method
CN104052658A (en) Privacy protection system and method based on social network
CN105376261B (en) Encryption method and system for instant messaging message
CN104253694A (en) Encrypting method for network data transmission
CN109005027B (en) Random data encryption and decryption method, device and system
CN105554031A (en) Encryption method, encryption apparatus, decryption method, decryption apparatus and terminal
CN107181584B (en) Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof
CN102833075A (en) Identity authentication and digital signature method based on three-layered overlapping type key management technology
CN106452754B (en) Multi-user online dynamic encryption method and device
CN103701596A (en) Document access method, system and equipment and document access request response method, system and equipment
CN204180095U (en) A kind of ciphering and deciphering device for network data encryption transmission
CN104486756B (en) A kind of encryption and decryption method and system of close writing paper short message
CN101431411A (en) Dynamic encryption method for network game data
CN104113410A (en) Method and device for data encryption transmission based on multi-table encryption method
Kuppuswamy et al. New Innovation of Arabic language Encryption Technique using New symmetric key algorithm
CN108650277A (en) A kind of data encryption and transmission method
KR101602803B1 (en) The encryption and decryption Method of using to polarization
CN116962067A (en) Information encryption method, device and equipment
CN106487509B (en) A kind of method and host equipment generating key
CN112149166B (en) Unconventional password protection method and intelligent bank machine
CN102025743A (en) Method and device for exporting mirror image of virtual machine in cloud computing
KR101793528B1 (en) Certificateless public key encryption system and receiving terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: Room 1004, 10th Floor, Building 26, No. 40 Xueyuan Road, Haidian District, Beijing, 100089

Patentee after: Guotou Fusion Technology Co.,Ltd.

Country or region after: China

Address before: Room 1004, 10th Floor, Building 26, No. 40 Xueyuan Road, Haidian District, Beijing, 100089

Patentee before: DATANG TELECOM CONVERGENCE COMMUNICATIONS CO.,LTD.

Country or region before: China