CN106709319A - Two-dimension code encoding and decoding application permission control system and hierarchical authorization method - Google Patents
Two-dimension code encoding and decoding application permission control system and hierarchical authorization method Download PDFInfo
- Publication number
- CN106709319A CN106709319A CN201611153459.0A CN201611153459A CN106709319A CN 106709319 A CN106709319 A CN 106709319A CN 201611153459 A CN201611153459 A CN 201611153459A CN 106709319 A CN106709319 A CN 106709319A
- Authority
- CN
- China
- Prior art keywords
- data
- target
- authority
- encryption data
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The invention discloses a two-dimension code encoding and decoding application permission control system and a hierarchical authorization method. The method includes: acquiring two-dimension code information, and recognizing the same to acquire enciphered data and a data permission allocation list; acquiring user permission, and looking up the data permission allocation list to acquire the enciphered data, authorized by the user permission, in the enciphered data; deciphering the target enciphered data to acquire target data after deciphering. A device comprises a two-dimension code recognition module, a data acquisition module and a data deciphering module. By recognizing the two-dimension code information and acquiring the data permission allocation list and the target enciphered data, two-dimension codes can be decoded locally, and the data permission allocation list can be acquired locally; by looking up the data permission allocation list to acquiring the target enciphered data corresponding to the user permission and deciphering to acquire the target data, permission authentication of the two-dimension codes can be realized offline, and corresponding data can be acquired according to different user permissions.
Description
Technical field
The present embodiments relate to field of computer technology, and in particular to a kind of Quick Response Code coding, decoding application permission control
System processed and hierarchical authorisation method.
Background technology
Quick Response Code is divided in plane according to certain rules as a kind of new data storage method with certain specific geometric figure
The chequered with black and white graphic recording data symbol information of cloth, dexterously using constituting computer-internal logic base on coding
The concept of " 0 " and " 1 " bit stream of plinth, the geometrical body corresponding with binary system using several is believed representing word numerical value
Breath, is automatically processed, with realizing information by image input device or photoelectric scanning device automatically identifying and reading while having certain school
Test function.
Existing 2 D code information processing method for different users, computer or equipment, in order to reach to data
The purpose of controlled output according to control, it is necessary to during Quick Response Code is parsed, require distribution output data, to ensure different use
Different data are obtained after family interpretation Quick Response Code.For different users, carrying out grading authorized rear, it is necessary to read by authority height
Access evidence.And in existing method, the decoding of Quick Response Code is completed under non-network environment, i.e., locally complete decoding in equipment
Function, so authority examination and control remotely cannot carried out using network;Therefore the authority that cannot be completed under off-line state is recognized
Card.
During the embodiment of the present invention is realized, inventor has found that existing method is locally being solved to Quick Response Code
Code, and authority distribution function is located at server end, therefore the purview certification of Quick Response Code cannot be carried out under off-line state.
The content of the invention
Because existing method to Quick Response Code locally decoding, and authority distribution function is located at server end, therefore
The problem of the purview certification of Quick Response Code cannot be carried out under off-line state, the embodiment of the present invention proposes a kind of Quick Response Code coding, solution
Code application authority control system and hierarchical authorisation method.
In a first aspect, the embodiment of the present invention proposes a kind of Quick Response Code coding, decoding hierarchical authorisation method, including:
2 D code information is obtained, the 2 D code information is identified, obtain encryption data and data authority distribution table;
User right is obtained, the data permission allocation table is searched, user right described in the encryption data is obtained and is awarded
The target encryption data of power;
The target encryption data is decrypted, the target data after being decrypted.
Preferably, the different encryption data of authority correspondences different in the data permission allocation table.
Preferably, the target encryption data includes the corresponding encryption data of target authority, and the target authority is little
In the authority of the user right.
Preferably, the acquisition 2 D code information, is identified to the 2 D code information, obtains encryption data and data
Before authority distribution table, also include:
Image in 2 D code is obtained, the image in 2 D code is identified, obtain the 2 D code information.
Preferably, the acquisition user right, further includes:
User account is obtained, the user account is processed, obtain the corresponding user's power of the user account
Limit.
Second aspect, the embodiment of the present invention also proposes a kind of Quick Response Code coding, decoding application authority control system, including:
Quick Response Code identification module, for obtaining 2 D code information, is identified to the 2 D code information, obtains encrypting number
According to data authority distribution table;
Data acquisition module, for obtaining user right, searches the data permission allocation table, obtains the encryption data
Described in user right mandate target encryption data;
Data decryption module, for being decrypted to the target encryption data, the target data after being decrypted.
Preferably, the different encryption data of authority correspondences different in the data permission allocation table.
Preferably, the target encryption data includes the corresponding encryption data of target authority, and the target authority is little
In the authority of the user right.
Preferably, described device also includes:
Two-dimensional code acquisition module, for obtaining image in 2 D code, is identified to the image in 2 D code, obtains described two
Dimension code information.
Preferably, the data acquisition module is further used for obtaining user account, and the user account is processed,
Obtain the corresponding user right of the user account.
As shown from the above technical solution, the embodiment of the present invention obtains encryption data and data by being recognized to 2 D code information
Authority distribution table, locally being decoded to Quick Response Code, and can not only can obtain data permission allocation table local;Pass through
Inquiry data permission allocation table obtains the corresponding target encryption data of user right, and decryption obtains target data, can from
The purview certification of Quick Response Code is carried out under wire state, corresponding data are obtained according to different user rights.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these figures.
A kind of Quick Response Code coding, the schematic flow sheet of decoding hierarchical authorisation method that Fig. 1 is provided for one embodiment of the invention;
Fig. 2 is a kind of one embodiment of the invention Quick Response Code coding for providing, the structure for decoding application authority control system is shown
It is intended to.
Specific embodiment
Below in conjunction with the accompanying drawings, the specific embodiment invented is further described.Following examples are only used for more clear
Chu's ground explanation technical scheme, and can not be limited the scope of the invention with this.
Fig. 1 shows a kind of Quick Response Code coding, the schematic flow sheet of decoding hierarchical authorisation method, bag that the present embodiment is provided
Include:
S101, acquisition 2 D code information, are identified to the 2 D code information, obtain encryption data and data permission point
With table;
Specifically, in first terminal to data genaration Quick Response Code coding stage, the first terminal is according to the use for authenticating
The corresponding user right of family account, sets different pieces of information, forms data permission allocation table, and use different passwords to different pieces of information
It is encrypted.The first terminal is by encryption data and data permission allocation table storage in Quick Response Code.Second terminal is obtained
2 D code information is taken, the 2 D code information is identified, obtain encryption data and data authority distribution table.
Wherein, the first terminal is the terminal for storing data in Quick Response Code and generating two-dimension code image;Described
Two terminals are the terminal for recognizing 2 D code information.
The 2 D code information is the Quick Response Code for storing encryption data and data authority distribution table.
The encryption data is the data after being encrypted, including some partial datas, the correspondence one per partial data
Plant user right.
S102, acquisition user right, search the data permission allocation table, obtain the power of user described in the encryption data
Limit the target encryption data for authorizing;
Specifically, the second terminal obtains user right, is inquired about in the data permission allocation table, obtains institute
State the target encryption data of user right mandate described in encryption data.
For example, user right includes level Four, and respectively 1 grade, 2 grades, 3 grades and 4 grades, encryption data include four parts,
Respectively encryption data A, encryption data B, encryption data C and encryption data D, then user right in the data permission allocation table
1 grade of correspondence encryption data A, 2 grades of correspondence encryption data B of user right, 3 grades of correspondence encryption data C of user right, user right 4
Level correspondence encryption data D.When the user right of certain user is 3 grades, then after the scanning input two-dimension code image, can obtain
Target encryption data is encryption data C.
S103, the target encryption data is decrypted, the target data after being decrypted.
Specifically, the second terminal is decrypted to the target encryption data, the target data after being decrypted, so
Show the target data in the second terminal afterwards.
For example, user right includes level Four, and respectively 1 grade, 2 grades, 3 grades and 4 grades, encryption data include four parts,
Respectively encryption data A, encryption data B, encryption data C and encryption data D, then user right in the data permission allocation table
1 grade of correspondence encryption data A, 2 grades of correspondence encryption data B of user right, 3 grades of correspondence encryption data C of user right, user right 4
Level correspondence encryption data D.When the user right of certain user is 3 grades, then after the scanning input two-dimension code image, can obtain
Target encryption data is encryption data C.The second terminal is decrypted to encryption data C, the data C after being decrypted, number
Target data is according to C.
The present embodiment obtains encryption data and data authority distribution table by being recognized to 2 D code information, can not only be local
Quick Response Code is decoded, and data permission allocation table can be obtained local;Obtained by inquiring about data permission allocation table
The corresponding target encryption data of user right, and decryption obtains target data, and the power of Quick Response Code can be carried out under off-line state
Limit certification, corresponding data are obtained according to different user rights.
Further, on the basis of above method embodiment, authority correspondence different in the data permission allocation table
Different encryption datas.
The encryption data different by setting different authority correspondences, after conveniently subsequently can obtaining user right, can
The corresponding encryption data of quick obtaining.
Further, on the basis of above method embodiment, the target encryption data includes that target authority is corresponding
Encryption data, the target authority is the authority of no more than described user right.
Specifically, rank user right higher can check the corresponding encryption data of the relatively low user right of rank.
The user M of such as highest level user right can obtain the full detail on Quick Response Code, lower-level user's authority
User N can only obtain individual information on Quick Response Code.
By setting the user right of different stage, it is easy to carry out differentiated control to data, while by allowing higher level user
The data of subordinate subscriber can be checked, the work management of personnel can be easy to.
Further, on the basis of above method embodiment, before S101, also include:
S100, acquisition image in 2 D code, are identified to the image in 2 D code, obtain the 2 D code information.
Specifically, the second terminal obtains image in 2 D code, by Quick Response Code recognition application to the Quick Response Code
Image is identified, and obtains the 2 D code information.
Wherein it is possible to obtain image in 2 D code by camera, or the image in 2 D code that other terminals send can be obtained,
Or other obtain the mode of image in 2 D code.
Recognized by obtaining image in 2 D code and obtain 2 D code information, because user can be obtained using various ways
Image in 2 D code so that the acquisition of 2 D code information more facilitates.
Further, on the basis of above method embodiment, user right is obtained described in S102, further bag
Include:
User account is obtained, the user account is processed, obtain the corresponding user's power of the user account
Limit.
Specifically, the second terminal obtains current user account, and the user account is carried out according to preset rules
Treatment, obtains the corresponding user right of the user account.
Wherein, the preset rules can pre-set, for example:Corresponding its user right of last numeral of account.
Fig. 2 shows a kind of Quick Response Code coding, the structural representation of decoding application authority control system that the present embodiment is provided
Figure, described device includes:Quick Response Code identification module 21, data acquisition module 22 and data decryption module 23, wherein:
The Quick Response Code identification module 21 is used to obtain 2 D code information, and the 2 D code information is identified, and obtains
Encryption data and data authority distribution table;
The data acquisition module 22 is used to obtain user right, searches the data permission allocation table, obtains described adding
The target encryption data of user right mandate described in ciphertext data;
The data decryption module 23 is used to be decrypted the target encryption data, the number of targets after being decrypted
According to.
Specifically, the Quick Response Code identification module 21 obtains 2 D code information, and the 2 D code information is identified, and obtains
To encryption data and data authority distribution table;The data acquisition module 22 obtains user right, searches the data permission point
With table, the target encryption data of user right mandate described in the encryption data is obtained;23 pairs of institutes of the data decryption module
State target encryption data to be decrypted, the target data after being decrypted.
The present embodiment obtains encryption data and data authority distribution table by being recognized to 2 D code information, can not only be local
Quick Response Code is decoded, and data permission allocation table can be obtained local;Obtained by inquiring about data permission allocation table
The corresponding target encryption data of user right, and decryption obtains target data, and the power of Quick Response Code can be carried out under off-line state
Limit certification, corresponding data are obtained according to different user rights.
Further, on the basis of said apparatus embodiment, authority correspondence different in the data permission allocation table
Different encryption datas.
Further, on the basis of said apparatus embodiment, the target encryption data includes that target authority is corresponding
Encryption data, the target authority is the authority of no more than described user right.
Further, on the basis of said apparatus embodiment, described device also includes:
Two-dimensional code acquisition module 20, for obtaining image in 2 D code, is identified to the image in 2 D code, obtains described
2 D code information.
Further, on the basis of said apparatus embodiment, the data acquisition module 22 is further used for obtaining
User account, is processed the user account, obtains the corresponding user right of the user account.
A kind of Quick Response Code coding, decoding application authority control system described in the present embodiment can be used for performing the above method
Embodiment, its principle is similar with technique effect, and here is omitted.
Device embodiment described above is only schematical, wherein the unit illustrated as separating component can
To be or may not be physically separate, the part shown as unit can be or may not be physics list
Unit, you can with positioned at a place, or can also be distributed on multiple NEs.It can according to the actual needs be selected
In some or all of module realize the purpose of this embodiment scheme.Those of ordinary skill in the art are not paying creativeness
Work in the case of, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each implementation method can
Realized by the mode of software plus required general hardware platform, naturally it is also possible to by hardware.Based on such understanding, on
Stating the part that technical scheme substantially contributes to prior art in other words can be embodied in the form of software product, should
Computer software product can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including some fingers
Order is used to so that a computer equipment (can be personal computer, server, or network equipment etc.) performs each implementation
Method described in some parts of example or embodiment.
It should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although reference
Previous embodiment has been described in detail to the present invention, it will be understood by those within the art that:It still can be right
Technical scheme described in foregoing embodiments is modified, or carries out equivalent to which part technical characteristic;And this
A little modifications are replaced, and do not make the spirit and model of the essence disengaging various embodiments of the present invention technical scheme of appropriate technical solution
Enclose.
Claims (10)
1. a kind of Quick Response Code is encoded, decodes application authority control system, it is characterised in that including:
Quick Response Code identification module, for obtaining 2 D code information, is identified to the 2 D code information, obtain encryption data and
Data permission allocation table;
Data acquisition module, for obtaining user right, searches the data permission allocation table, obtains institute in the encryption data
State the target encryption data of user right mandate;
Data decryption module, for being decrypted to the target encryption data, the target data after being decrypted.
2. system according to claim 1, it is characterised in that authority correspondences different in the data permission allocation table are not
Same encryption data.
3. system according to claim 2, it is characterised in that the target encryption data include target authority it is corresponding plus
Ciphertext data, the target authority is the authority of no more than described user right.
4. system according to claim 1, it is characterised in that described device also includes:
Two-dimensional code acquisition module, for obtaining image in 2 D code, is identified to the image in 2 D code, obtains the Quick Response Code
Information.
5. the system according to claim any one of 1-4, it is characterised in that the data acquisition module is further used for obtaining
User account is taken, the user account is processed, obtain the corresponding user right of the user account.
6. a kind of Quick Response Code is encoded, decodes hierarchical authorisation method, it is characterised in that including:
2 D code information is obtained, the 2 D code information is identified, obtain encryption data and data authority distribution table;
User right is obtained, the data permission allocation table is searched, user right mandate described in the encryption data is obtained
Target encryption data;
The target encryption data is decrypted, the target data after being decrypted.
7. method according to claim 6, it is characterised in that authority correspondences different in the data permission allocation table are not
Same encryption data.
8. method according to claim 7, it is characterised in that the target encryption data include target authority it is corresponding plus
Ciphertext data, the target authority is the authority of no more than described user right.
9. method according to claim 6, it is characterised in that the acquisition 2 D code information, to the 2 D code information
It is identified, before obtaining encryption data and data authority distribution table, also includes:
Image in 2 D code is obtained, the image in 2 D code is identified, obtain the 2 D code information.
10. the method according to claim any one of 6-9, it is characterised in that the acquisition user right, further bag
Include:
User account is obtained, the user account is processed, obtain the corresponding user right of the user account.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611153459.0A CN106709319B (en) | 2016-12-14 | 2016-12-14 | Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611153459.0A CN106709319B (en) | 2016-12-14 | 2016-12-14 | Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106709319A true CN106709319A (en) | 2017-05-24 |
CN106709319B CN106709319B (en) | 2020-01-07 |
Family
ID=58937124
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611153459.0A Active CN106709319B (en) | 2016-12-14 | 2016-12-14 | Two-dimensional code encoding and decoding application authority control system and hierarchical authorization method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106709319B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108462699A (en) * | 2018-02-09 | 2018-08-28 | 苏州酷豆物联科技有限公司 | Based on the encrypted Quick Response Code generation of sequential and verification method and system |
CN109241220A (en) * | 2018-08-21 | 2019-01-18 | 安徽讯飞智能科技有限公司 | A method of geographical location information is obtained by scanning doorplate |
CN109948760A (en) * | 2019-03-28 | 2019-06-28 | 尤尼泰克(嘉兴)信息技术有限公司 | A kind of information demonstrating method and device based on two dimensional code |
CN109978094A (en) * | 2019-03-28 | 2019-07-05 | 尤尼泰克(嘉兴)信息技术有限公司 | A kind of information graduation rendering method and device based on two dimensional code |
CN110570313A (en) * | 2019-09-27 | 2019-12-13 | 深圳市网心科技有限公司 | data transaction method, data transaction device and system based on block chain |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101174286A (en) * | 2006-10-31 | 2008-05-07 | 佛山市顺德区顺达电脑厂有限公司 | Method for controlling computer use authority by radio frequency recognizing volume label |
CN103077339A (en) * | 2012-12-28 | 2013-05-01 | 广东欧珀移动通信有限公司 | Data protection method and device |
US20150067781A1 (en) * | 2013-09-02 | 2015-03-05 | Alibaba Group Holding Limited | Data Processing Based on Two-Dimensional Code |
CN104794377A (en) * | 2014-06-05 | 2015-07-22 | 合肥星服信息科技有限责任公司 | Right control method for desktop system without database based on quick response code |
-
2016
- 2016-12-14 CN CN201611153459.0A patent/CN106709319B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101174286A (en) * | 2006-10-31 | 2008-05-07 | 佛山市顺德区顺达电脑厂有限公司 | Method for controlling computer use authority by radio frequency recognizing volume label |
CN103077339A (en) * | 2012-12-28 | 2013-05-01 | 广东欧珀移动通信有限公司 | Data protection method and device |
US20150067781A1 (en) * | 2013-09-02 | 2015-03-05 | Alibaba Group Holding Limited | Data Processing Based on Two-Dimensional Code |
CN104794377A (en) * | 2014-06-05 | 2015-07-22 | 合肥星服信息科技有限责任公司 | Right control method for desktop system without database based on quick response code |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108462699A (en) * | 2018-02-09 | 2018-08-28 | 苏州酷豆物联科技有限公司 | Based on the encrypted Quick Response Code generation of sequential and verification method and system |
CN109241220A (en) * | 2018-08-21 | 2019-01-18 | 安徽讯飞智能科技有限公司 | A method of geographical location information is obtained by scanning doorplate |
CN109948760A (en) * | 2019-03-28 | 2019-06-28 | 尤尼泰克(嘉兴)信息技术有限公司 | A kind of information demonstrating method and device based on two dimensional code |
CN109978094A (en) * | 2019-03-28 | 2019-07-05 | 尤尼泰克(嘉兴)信息技术有限公司 | A kind of information graduation rendering method and device based on two dimensional code |
CN109948760B (en) * | 2019-03-28 | 2022-05-17 | 尤尼泰克(嘉兴)信息技术有限公司 | Information presentation method and device based on two-dimensional code |
CN110570313A (en) * | 2019-09-27 | 2019-12-13 | 深圳市网心科技有限公司 | data transaction method, data transaction device and system based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN106709319B (en) | 2020-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106709319A (en) | Two-dimension code encoding and decoding application permission control system and hierarchical authorization method | |
CN102902997B (en) | A kind of Quick Response Code hybrid coding, decoding device and method | |
CN106330464B (en) | A kind of identity identifying method, equipment and system | |
CN106100850B (en) | Intelligent and safe chip signing messages transmission method and system based on two dimensional code | |
CN106610995B (en) | Method, device and system for creating ciphertext index | |
CN1154512A (en) | Security system for protecting information stored in portable storage media | |
CN107204986A (en) | High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device | |
CN106533660B (en) | The acquisition methods and device of secrete key of smart card | |
CN106529643A (en) | Two-dimensional code encoding and decoding generation device and method | |
CN105976005A (en) | Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device | |
CN105786974B (en) | A kind of computer data storage inquiry system | |
CN106408065A (en) | Two-dimensional code encoding method and apparatus | |
CN101739758A (en) | Method for encrypting and decrypting smart card, system and reader-writer | |
CN113129395A (en) | Data compression encryption system | |
CN108848057A (en) | A kind of method and device of remote secure access | |
CN110704854A (en) | Stream type encryption method aiming at text data reserved format | |
CN108256339A (en) | A kind of method and system protected based on Quick Response Code to electronic invoice information | |
CN102135944A (en) | Method for safe data storage in mobile communication equipment | |
CN106357608B (en) | A kind of private data encryption and decryption method towards personal medical treatment & health data | |
Salama et al. | Cancelable biometric system for IoT applications based on optical double random phase encoding | |
CN110516425B (en) | Secret sharing method and system | |
CN106713224A (en) | Document authority control method | |
CN108234126A (en) | For the system and method remotely opened an account | |
CN108616533B (en) | Sensitive data encryption method and device | |
KR101809976B1 (en) | A method for security certification generating authentication key combinating multi-user element |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP02 | Change in the address of a patent holder | ||
CP02 | Change in the address of a patent holder |
Address after: 100176 unit 502, 5 / F, block B, building 11, yard 8, Liangshuihe 2nd Street, economic and Technological Development Zone, Daxing District, Beijing Patentee after: BEIJING LP CENTURY TECHNOLOGY Co.,Ltd. Address before: 100020, No. 25, middle third ring road, Chaoyang District, Beijing, 13, 1315-1319 Patentee before: BEIJING LP CENTURY TECHNOLOGY Co.,Ltd. |