CN108183789A - The generation of electronic code and authentication method - Google Patents
The generation of electronic code and authentication method Download PDFInfo
- Publication number
- CN108183789A CN108183789A CN201711467400.3A CN201711467400A CN108183789A CN 108183789 A CN108183789 A CN 108183789A CN 201711467400 A CN201711467400 A CN 201711467400A CN 108183789 A CN108183789 A CN 108183789A
- Authority
- CN
- China
- Prior art keywords
- electronic code
- key
- enterprise
- encrypted
- generation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000007726 management method Methods 0.000 claims abstract description 30
- 238000012550 audit Methods 0.000 claims abstract description 15
- 230000008520 organization Effects 0.000 claims abstract description 4
- 230000009897 systematic effect Effects 0.000 claims abstract description 4
- 238000012795 verification Methods 0.000 abstract 1
- 238000012790 confirmation Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Generation and authentication method the invention discloses a kind of electronic code, the electronic code are a kind of valuable electronic code of quota for specific science service, are circulated between enterprise and service organization, and systematic unity management is managed by electronic code;The generation and certification of the electronic code include enterprise's application, enterprise contracts, mechanism claims, mechanism is fulfilled, enterprise audits five processes;It is rearranged during each by public key and binarization generates new public key, and then generate encrypted characters string using private key as key on new public base, and the secondary encryption of encrypted characters string is generated into final encrypted characters string result;Certification is using encrypted characters string result as verification foundation.The method of the invention ensures that electronic code cannot be replicated and be usurped, and the electronic code after signing will not arbitrarily be fulfilled by other people, strengthen the safety fulfilled.
Description
Technical field
The present invention relates to a kind of information data process field, the generation of specifically a kind of electronic code and authentication method.
Background technology
In order to encourage to support and preferably service " masses start an undertaking, millions of people innovation ", many companies, which all design, has issued one kind
For the valuable electronic code of quota of specific science service, the valuable electronic code of quota is realized by " internet management system "
It is negotiable, can fulfil.Valuable electronic code and application enterprise or individual, services package by norm(For certain innovation undertaking behavior
Special project service is bought from government to the third-party institution for being capable of providing special service, is provided freely to innovator and entrepreneur)With
And the effect reached corresponds, management and use of the valuable electronic code of quota follow that open Pu Hui, independently application, special fund are special
Principle must not split, transfers the possession of, buys and sells and pledge.The valuable electronic code system of quota is comprising there are five services packages at present:It is high
Technology Enterprises services package, intellectual property services package analyze testing service packet, and new three plates offering service with shingle hung out packet newly establishes services package.
Valuable electronic code Electronic Coding is that enterprise is got after the valuable electronic code of quota to ensure that quota is valuable by norm
Electronic code safety, is not replicated by others, usurps, and carries out data encryption, establishes private key and public key, and public key is sent to enterprise, private
Key preserves in systems.Enterprise's input public key is needed to confirm quota valuable electronic code during signing, it can be valuable by norm again after signing
Encryption key is established for mechanism on electronic code, public key is sent to mechanism, and private key preserves in systems, needs machine during fulfilling
Structure inputs the confirmation of oneself public key, and enterprise inputs the public key of oneself and confirm, can just complete to fulfil again.Double-encryption is to quota in this way
The whole flow process of the circulation of valuable electronic code is a protection.Therefore it needs to design a kind of encryption method.
Invention content
The present invention is exactly to provide generation and the authentication method of a kind of electronic code to solve the above-mentioned problems.
The present invention is implemented according to following technical scheme.
A kind of generation of electronic code and authentication method, the electronic code are a kind of quota for specific science service
Valuable electronic code circulates between enterprise and service organization, and systematic unity management is managed by electronic code;The electronics is compiled
The generation and certification of code include enterprise's application, enterprise contracts, mechanism claims, mechanism is fulfilled, enterprise audits five processes;
The enterprise claims flow, includes the following steps:
A1:Enterprise claims electronic code, and electronic code management system generation random digit M1 generates random string as public key
M2 is as private key;The random digit M1 is 8 random digits;Public key M1 is by short message sending to enterprise;
A2:Electronic code manages system and 8 bit digitals of M1 is rearranged the new key M3 of composition;
A3:Key M3 is converted into binary digit B1 by electronic code management system, with private key M2 as key, uses DES pairs
Claim Encryption Algorithm that B1 is encrypted, obtain encrypted character string MB1;
A4:Electronic code management system is encrypted MB1 using md5 encryption algorithm to obtain final encrypted characters string result
MB2 is preserved in this electronic code data information, and electronic code data information is corresponding with enterprise ID;
Enterprise's signing flow, includes the following steps:
Q1:Enterprise inputs public key character string M3 in electronic code management system, passes through enterprise ID and signing electronic code data
Search corresponding private key character string M2;
Q2:By M3 binarizations, with private key M2 as key, using DES symmetric encipherment algorithms to the sequence after binarization into
Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB3 again;Judge MB3=MB2, then signing into
Work(;Otherwise signing failure.
The mechanism claims, and includes the following steps:
P1:Electronic code management system generation random digit M4 is as public key, and random string M5 is as private key for generation;It is described with
Machine number M4 is 8 random digits;Public key M4 is by short message sending to mechanism;
P2:Electronic code manages system and 8 bit digitals of M4 is rearranged the new key M6 of composition;
P3:Key M6 is converted into binary digit B2 by electronic code management system, with private key M5 as key, uses DES pairs
Claim Encryption Algorithm that B2 is encrypted, obtain encrypted character string MB4;
P4:Electronic code management system is encrypted MB4 using md5 encryption algorithm to obtain final encrypted characters string result
MB5 is preserved in this electronic code data information, and electronic code data information is corresponding with mechanism ID;
The mechanism is fulfilled, and is included the following steps:
N1:Mechanism inputs public key character string M6 in electronic code management system, passes through mechanism ID and signing electronic code data
Search corresponding private key character string M5;
N2:By M6 binarizations, with private key M5 as key, using DES symmetric encipherment algorithms to the sequence after binarization into
Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB6 again;Judge MB6=MB3, then fulfil into
Work(;Otherwise failure is fulfilled.
Enterprise's audit, includes the following steps:
E1:Enterprise inputs public key character string M6, corresponding private by logon account User ID and signing electronic code data search
Key character string M2,
E2:By M6 binarizations, with private key M2 as key, using DES symmetric encipherment algorithms to the sequence after binarization into
Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB7 again;Judge MB7=MB2, then audit into
Work(;Otherwise audit failure.
Further, it is that M1 is splitted into 8 respective characters using public key M1 generations M3 methods in step A2, S1, S2, S3,
S4, S5, S6, S7, S8 are rearranged and are formed new key M3=S6+S4+S5+S2+S1+S7+S8+S3.
Further, it is that M4 is splitted into 8 respective characters using public key M4 generations M6 methods in step P2, R1, R2, R3,
R4, R5, R6, R7, R8 are rearranged and are formed new key M6=R6+R4+R5+R2+R1+R7+R8+R3.
Present invention obtains following advantageous effects.
Electronic code is encrypted, and mainly ensures that electronic code cannot be replicated and be usurped, during enterprise's signing
Using correct Account Logon, input correct key and just can ensure that and can be contracted using electronic code.Electronic code label
About carry out again it is secondary be encrypted as signing mechanism be encrypted, in order to ensure signing after electronic code will not arbitrarily by other people into
Row is fulfilled, and strengthens the safety fulfilled, and mechanism needs to log in correct account, and inputting correct key can just carry out fulfilling application,
Ensure that mechanism will not malfunction.Pattern is fulfilled in dual confirmation, not only ensure that safety and accuracy that electronic code fulfils, and
It will not be to be fulfilled without authorization in the case of servicing in place again also to ensure mechanism, after mechanism application is fulfilled, enterprise is being needed to log in just
Normal account inputs correct key confirmation and fulfils.The encryption of electronic code, the audit for process of contracting, fulfil all are to ensure that electronics is compiled
Code makes enterprise obtain due service in the case of safe and reliable, is that mechanism obtains due remuneration.
Description of the drawings
Fig. 1 is the step flow that enterprise claims electronic code in the present invention;
Fig. 2 is the step flow of enterprise's signing electronic code in the present invention;
Fig. 3 is the step flow that mechanism claims electronic code in the present invention;
Fig. 4 is the step flow that electronic code is fulfilled by mechanism in the present invention;
Fig. 5 is the step flow of enterprise's audit electronic code in the present invention.
Specific embodiment
Referring to the drawings and embodiment carries out further technology explanation to the present invention.
As shown in Fig. 1~5, a kind of generation of electronic code and authentication method, the electronic code is to be a kind of for specific
The valuable electronic code of quota of science service, circulates between enterprise and service organization, and systematic unity is managed by electronic code
Management;The generation and certification of the electronic code include enterprise's application, enterprise contracts, mechanism claims, mechanism is fulfilled, enterprise audits
Five processes;
The enterprise claims flow, includes the following steps:
A1:Enterprise claims electronic code, and electronic code management system generation random digit M1 generates random string as public key
M2 is as private key;The random digit M1 is 8 random digits;Public key M1 is by short message sending to enterprise;
A2:Electronic code manages system and 8 bit digitals of M1 is rearranged the new key M3 of composition;
A3:Key M3 is converted into binary digit B1 by electronic code management system, with private key M2 as key, uses DES pairs
Claim Encryption Algorithm that B1 is encrypted, obtain encrypted character string MB1;
A4:Electronic code management system is encrypted MB1 using md5 encryption algorithm to obtain final encrypted characters string result
MB2 is preserved in this electronic code data information, and electronic code data information is corresponding with enterprise ID;
Enterprise's signing flow, includes the following steps:
Q1:Enterprise inputs public key character string M3 in electronic code management system, passes through enterprise ID and signing electronic code data
Search corresponding private key character string M2;
Q2:By M3 binarizations, with private key M2 as key, using DES symmetric encipherment algorithms to the sequence after binarization into
Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB3 again;Judge MB3=MB2, then signing into
Work(;Otherwise signing failure.
The mechanism claims, and includes the following steps:
P1:Electronic code management system generation random digit M4 is as public key, and random string M5 is as private key for generation;It is described with
Machine number M4 is 8 random digits;Public key M4 is by short message sending to mechanism;
P2:Electronic code manages system and 8 bit digitals of M4 is rearranged the new key M6 of composition;
P3:Key M6 is converted into binary digit B2 by electronic code management system, with private key M5 as key, uses DES pairs
Claim Encryption Algorithm that B2 is encrypted, obtain encrypted character string MB4;
P4:Electronic code management system is encrypted MB4 using md5 encryption algorithm to obtain final encrypted characters string result
MB5 is preserved in this electronic code data information, and electronic code data information is corresponding with mechanism ID;
The mechanism is fulfilled, and is included the following steps:
N1:Mechanism inputs public key character string M6 in electronic code management system, passes through mechanism ID and signing electronic code data
Search corresponding private key character string M5;
N2:By M6 binarizations, with private key M5 as key, using DES symmetric encipherment algorithms to the sequence after binarization into
Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB6 again;Judge MB6=MB3, then fulfil into
Work(;Otherwise failure is fulfilled.
Enterprise's audit, includes the following steps:
E1:Enterprise inputs public key character string M6, corresponding private by logon account User ID and signing electronic code data search
Key character string M2,
E2:By M6 binarizations, with private key M2 as key, using DES symmetric encipherment algorithms to the sequence after binarization into
Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB7 again;Judge MB7=MB2, then audit into
Work(;Otherwise audit failure.
It is that M1 is splitted into 8 respective characters using public key M1 generations M3 methods in step A2, S1, S2, S3, S4, S5, S6,
S7, S8 are rearranged and are formed new key M3=S6+S4+S5+S2+S1+S7+S8+S3.
It is that M4 is splitted into 8 respective characters using public key M4 generations M6 methods in step P2, R1, R2, R3, R4, R5, R6,
R7, R8 are rearranged and are formed new key M6=R6+R4+R5+R2+R1+R7+R8+R3.
Claims (3)
1. generation and the authentication method of a kind of electronic code, the electronic code has for a kind of quota for specific science service
Valence electron encodes, and circulates between enterprise and service organization, and systematic unity management is managed by electronic code;It is characterized in that,
The generation and certification of the electronic code include enterprise's application, enterprise contracts, mechanism claims, mechanism is fulfilled, enterprise audits five
Process;
The enterprise claims flow, includes the following steps:
A1:Enterprise claims electronic code, and electronic code management system generation random digit M1 generates random string as public key
M2 is as private key;The random digit M1 is 8 random digits;Public key M1 is by short message sending to enterprise;
A2:Electronic code manages system and 8 bit digitals of M1 is rearranged the new key M3 of composition;
A3:Key M3 is converted into binary digit B1 by electronic code management system, with private key M2 as key, uses DES pairs
Claim Encryption Algorithm that B1 is encrypted, obtain encrypted character string MB1;
A4:Electronic code management system is encrypted MB1 using md5 encryption algorithm to obtain final encrypted characters string result
MB2 is preserved in this electronic code data information, and electronic code data information is corresponding with enterprise ID;
Enterprise's signing flow, includes the following steps:
Q1:Enterprise inputs public key character string M3 in electronic code management system, passes through enterprise ID and signing electronic code data
Search corresponding private key character string M2;
Q2:By M3 binarizations, with private key M2 as key, using DES symmetric encipherment algorithms to the sequence after binarization into
Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB3 again;Judge MB3=MB2, then signing into
Work(;Otherwise signing failure;
The mechanism claims, and includes the following steps:
P1:Electronic code management system generation random digit M4 is as public key, and random string M5 is as private key for generation;It is described with
Machine number M4 is 8 random digits;Public key M4 is by short message sending to mechanism;
P2:Electronic code manages system and 8 bit digitals of M4 is rearranged the new key M6 of composition;
P3:Key M6 is converted into binary digit B2 by electronic code management system, with private key M5 as key, uses DES pairs
Claim Encryption Algorithm that B2 is encrypted, obtain encrypted character string MB4;
P4:Electronic code management system is encrypted MB4 using md5 encryption algorithm to obtain final encrypted characters string result
MB5 is preserved in this electronic code data information, and electronic code data information is corresponding with mechanism ID;
The mechanism is fulfilled, and is included the following steps:
N1:Mechanism inputs public key character string M6 in electronic code management system, passes through mechanism ID and signing electronic code data
Search corresponding private key character string M5;
N2:By M6 binarizations, with private key M5 as key, using DES symmetric encipherment algorithms to the sequence after binarization into
Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB6 again;Judge MB6=MB3, then fulfil into
Work(;Otherwise failure is fulfilled;
Enterprise's audit, includes the following steps:
E1:Enterprise inputs public key character string M6, corresponding private by logon account User ID and signing electronic code data search
Key character string M2,
E2:By M6 binarizations, with private key M2 as key, using DES symmetric encipherment algorithms to the sequence after binarization into
Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB7 again;Judge MB7=MB2, then audit into
Work(;Otherwise audit failure.
2. generation and the authentication method of a kind of electronic code as described in claim 1, which is characterized in that public affairs are used in step A2
Key M1 generations M3 methods are M1 to be splitted into 8 respective characters, S1, S2, S3, S4, S5, S6, S7, S8 are rearranged and formed newly
Key M3=S6+S4+S5+S2+S1+S7+S8+S3.
3. generation and the authentication method of a kind of electronic code as described in claim 1, which is characterized in that public affairs are used in step P2
Key M4 generations M6 methods are M4 to be splitted into 8 respective characters, R1, R2, R3, R4, R5, R6, R7, R8 are rearranged and formed newly
Key M6=R6+R4+R5+R2+R1+R7+R8+R3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711467400.3A CN108183789B (en) | 2017-12-28 | 2017-12-28 | Electronic code generation and authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711467400.3A CN108183789B (en) | 2017-12-28 | 2017-12-28 | Electronic code generation and authentication method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108183789A true CN108183789A (en) | 2018-06-19 |
CN108183789B CN108183789B (en) | 2023-03-28 |
Family
ID=62548631
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711467400.3A Active CN108183789B (en) | 2017-12-28 | 2017-12-28 | Electronic code generation and authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108183789B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1852093A (en) * | 2006-06-06 | 2006-10-25 | 北京易恒信认证科技有限公司 | Electronic-seal safety authentication system and method based on CPK |
WO2007091002A1 (en) * | 2006-02-07 | 2007-08-16 | Nextenders (India) Private Limited | Document security management system |
CN105635049A (en) * | 2014-10-29 | 2016-06-01 | 航天信息股份有限公司 | Anti-counterfeit tax control method and device based on client identifier password |
CN106779645A (en) * | 2017-02-08 | 2017-05-31 | 政和科技股份有限公司 | Information ciphering method and device |
-
2017
- 2017-12-28 CN CN201711467400.3A patent/CN108183789B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007091002A1 (en) * | 2006-02-07 | 2007-08-16 | Nextenders (India) Private Limited | Document security management system |
CN1852093A (en) * | 2006-06-06 | 2006-10-25 | 北京易恒信认证科技有限公司 | Electronic-seal safety authentication system and method based on CPK |
CN105635049A (en) * | 2014-10-29 | 2016-06-01 | 航天信息股份有限公司 | Anti-counterfeit tax control method and device based on client identifier password |
CN106779645A (en) * | 2017-02-08 | 2017-05-31 | 政和科技股份有限公司 | Information ciphering method and device |
Non-Patent Citations (1)
Title |
---|
"天津首推"创通票"激发双创活力" * |
Also Published As
Publication number | Publication date |
---|---|
CN108183789B (en) | 2023-03-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103427987B (en) | Method, data verification method and the electronic installation of data encryption | |
CN1326353C (en) | Method and system for integrated protection of data distributed processing in computer networks | |
US8208627B2 (en) | Format-preserving cryptographic systems | |
KR100668016B1 (en) | Mixnet system | |
CN110677487B (en) | Outsourcing data duplicate removal cloud storage method supporting privacy and integrity protection | |
US11488134B2 (en) | Format-preserving cryptographic systems | |
JP6323338B2 (en) | Bit string collation system, method and program | |
JP4892478B2 (en) | Authentication system, authentication device, terminal device, and verification device | |
CN102222188A (en) | Information system user password generation method | |
KR101282653B1 (en) | Data substitution encryption device and method | |
CN105827411A (en) | Information processing method and apparatus | |
CN112613018A (en) | Block chain-based digital certificate using system | |
CN105281901A (en) | Encryption method for cloud tenant key information | |
CN105827404A (en) | Identity authentication method, identity authentication device, and server | |
CN108183789A (en) | The generation of electronic code and authentication method | |
CN114862388B (en) | Identity management method based on digital wallet, computer equipment and storage medium | |
CN108141367A (en) | Code signing service | |
Abdalrahman | A cloud database based on AES 256 GCM encryption through devolving web application of accounting information system | |
US20090028338A1 (en) | Software product authentication | |
KR101501508B1 (en) | Method and system for authentication by data encryption | |
JP2019102959A (en) | Server device, communication device, key sharing system, key sharing method, and program | |
CN113221074A (en) | Offline authorization method | |
CN113656816B (en) | Text encryption method | |
KR102519141B1 (en) | Cloud-based gold wealth management server that enables gold present based on digital gold tokens and operating method thereof | |
Lavauzelle et al. | Generic constructions of PoRs from codes and instantiations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 300384 Room 204, floor 2, Haitai building, No. 6, Meiyuan Road, Huayuan Industrial Zone, Binhai New Area, Tianjin Applicant after: CHUANGTONGPIAO TECHNOLOGY CO.,LTD. Address before: 300384 Room 204, 2 tower, Hai Tai Building, 6 Mei Yuan Road, Huayuan Industrial Area, Nankai District, Tianjin. Applicant before: CHUANGTONGPIAO TECHNOLOGY CO.,LTD. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |