CN108183789A - The generation of electronic code and authentication method - Google Patents

The generation of electronic code and authentication method Download PDF

Info

Publication number
CN108183789A
CN108183789A CN201711467400.3A CN201711467400A CN108183789A CN 108183789 A CN108183789 A CN 108183789A CN 201711467400 A CN201711467400 A CN 201711467400A CN 108183789 A CN108183789 A CN 108183789A
Authority
CN
China
Prior art keywords
electronic code
key
enterprise
encrypted
generation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711467400.3A
Other languages
Chinese (zh)
Other versions
CN108183789B (en
Inventor
朱涛
刘朝雷
宋西富
祝平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
A Pass Technology Co Ltd
Original Assignee
A Pass Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by A Pass Technology Co Ltd filed Critical A Pass Technology Co Ltd
Priority to CN201711467400.3A priority Critical patent/CN108183789B/en
Publication of CN108183789A publication Critical patent/CN108183789A/en
Application granted granted Critical
Publication of CN108183789B publication Critical patent/CN108183789B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

Generation and authentication method the invention discloses a kind of electronic code, the electronic code are a kind of valuable electronic code of quota for specific science service, are circulated between enterprise and service organization, and systematic unity management is managed by electronic code;The generation and certification of the electronic code include enterprise's application, enterprise contracts, mechanism claims, mechanism is fulfilled, enterprise audits five processes;It is rearranged during each by public key and binarization generates new public key, and then generate encrypted characters string using private key as key on new public base, and the secondary encryption of encrypted characters string is generated into final encrypted characters string result;Certification is using encrypted characters string result as verification foundation.The method of the invention ensures that electronic code cannot be replicated and be usurped, and the electronic code after signing will not arbitrarily be fulfilled by other people, strengthen the safety fulfilled.

Description

The generation of electronic code and authentication method
Technical field
The present invention relates to a kind of information data process field, the generation of specifically a kind of electronic code and authentication method.
Background technology
In order to encourage to support and preferably service " masses start an undertaking, millions of people innovation ", many companies, which all design, has issued one kind For the valuable electronic code of quota of specific science service, the valuable electronic code of quota is realized by " internet management system " It is negotiable, can fulfil.Valuable electronic code and application enterprise or individual, services package by norm(For certain innovation undertaking behavior Special project service is bought from government to the third-party institution for being capable of providing special service, is provided freely to innovator and entrepreneur)With And the effect reached corresponds, management and use of the valuable electronic code of quota follow that open Pu Hui, independently application, special fund are special Principle must not split, transfers the possession of, buys and sells and pledge.The valuable electronic code system of quota is comprising there are five services packages at present:It is high Technology Enterprises services package, intellectual property services package analyze testing service packet, and new three plates offering service with shingle hung out packet newly establishes services package.
Valuable electronic code Electronic Coding is that enterprise is got after the valuable electronic code of quota to ensure that quota is valuable by norm Electronic code safety, is not replicated by others, usurps, and carries out data encryption, establishes private key and public key, and public key is sent to enterprise, private Key preserves in systems.Enterprise's input public key is needed to confirm quota valuable electronic code during signing, it can be valuable by norm again after signing Encryption key is established for mechanism on electronic code, public key is sent to mechanism, and private key preserves in systems, needs machine during fulfilling Structure inputs the confirmation of oneself public key, and enterprise inputs the public key of oneself and confirm, can just complete to fulfil again.Double-encryption is to quota in this way The whole flow process of the circulation of valuable electronic code is a protection.Therefore it needs to design a kind of encryption method.
Invention content
The present invention is exactly to provide generation and the authentication method of a kind of electronic code to solve the above-mentioned problems.
The present invention is implemented according to following technical scheme.
A kind of generation of electronic code and authentication method, the electronic code are a kind of quota for specific science service Valuable electronic code circulates between enterprise and service organization, and systematic unity management is managed by electronic code;The electronics is compiled The generation and certification of code include enterprise's application, enterprise contracts, mechanism claims, mechanism is fulfilled, enterprise audits five processes;
The enterprise claims flow, includes the following steps:
A1:Enterprise claims electronic code, and electronic code management system generation random digit M1 generates random string as public key M2 is as private key;The random digit M1 is 8 random digits;Public key M1 is by short message sending to enterprise;
A2:Electronic code manages system and 8 bit digitals of M1 is rearranged the new key M3 of composition;
A3:Key M3 is converted into binary digit B1 by electronic code management system, with private key M2 as key, uses DES pairs Claim Encryption Algorithm that B1 is encrypted, obtain encrypted character string MB1;
A4:Electronic code management system is encrypted MB1 using md5 encryption algorithm to obtain final encrypted characters string result MB2 is preserved in this electronic code data information, and electronic code data information is corresponding with enterprise ID;
Enterprise's signing flow, includes the following steps:
Q1:Enterprise inputs public key character string M3 in electronic code management system, passes through enterprise ID and signing electronic code data Search corresponding private key character string M2;
Q2:By M3 binarizations, with private key M2 as key, using DES symmetric encipherment algorithms to the sequence after binarization into Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB3 again;Judge MB3=MB2, then signing into Work(;Otherwise signing failure.
The mechanism claims, and includes the following steps:
P1:Electronic code management system generation random digit M4 is as public key, and random string M5 is as private key for generation;It is described with Machine number M4 is 8 random digits;Public key M4 is by short message sending to mechanism;
P2:Electronic code manages system and 8 bit digitals of M4 is rearranged the new key M6 of composition;
P3:Key M6 is converted into binary digit B2 by electronic code management system, with private key M5 as key, uses DES pairs Claim Encryption Algorithm that B2 is encrypted, obtain encrypted character string MB4;
P4:Electronic code management system is encrypted MB4 using md5 encryption algorithm to obtain final encrypted characters string result MB5 is preserved in this electronic code data information, and electronic code data information is corresponding with mechanism ID;
The mechanism is fulfilled, and is included the following steps:
N1:Mechanism inputs public key character string M6 in electronic code management system, passes through mechanism ID and signing electronic code data Search corresponding private key character string M5;
N2:By M6 binarizations, with private key M5 as key, using DES symmetric encipherment algorithms to the sequence after binarization into Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB6 again;Judge MB6=MB3, then fulfil into Work(;Otherwise failure is fulfilled.
Enterprise's audit, includes the following steps:
E1:Enterprise inputs public key character string M6, corresponding private by logon account User ID and signing electronic code data search Key character string M2,
E2:By M6 binarizations, with private key M2 as key, using DES symmetric encipherment algorithms to the sequence after binarization into Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB7 again;Judge MB7=MB2, then audit into Work(;Otherwise audit failure.
Further, it is that M1 is splitted into 8 respective characters using public key M1 generations M3 methods in step A2, S1, S2, S3, S4, S5, S6, S7, S8 are rearranged and are formed new key M3=S6+S4+S5+S2+S1+S7+S8+S3.
Further, it is that M4 is splitted into 8 respective characters using public key M4 generations M6 methods in step P2, R1, R2, R3, R4, R5, R6, R7, R8 are rearranged and are formed new key M6=R6+R4+R5+R2+R1+R7+R8+R3.
Present invention obtains following advantageous effects.
Electronic code is encrypted, and mainly ensures that electronic code cannot be replicated and be usurped, during enterprise's signing Using correct Account Logon, input correct key and just can ensure that and can be contracted using electronic code.Electronic code label About carry out again it is secondary be encrypted as signing mechanism be encrypted, in order to ensure signing after electronic code will not arbitrarily by other people into Row is fulfilled, and strengthens the safety fulfilled, and mechanism needs to log in correct account, and inputting correct key can just carry out fulfilling application, Ensure that mechanism will not malfunction.Pattern is fulfilled in dual confirmation, not only ensure that safety and accuracy that electronic code fulfils, and It will not be to be fulfilled without authorization in the case of servicing in place again also to ensure mechanism, after mechanism application is fulfilled, enterprise is being needed to log in just Normal account inputs correct key confirmation and fulfils.The encryption of electronic code, the audit for process of contracting, fulfil all are to ensure that electronics is compiled Code makes enterprise obtain due service in the case of safe and reliable, is that mechanism obtains due remuneration.
Description of the drawings
Fig. 1 is the step flow that enterprise claims electronic code in the present invention;
Fig. 2 is the step flow of enterprise's signing electronic code in the present invention;
Fig. 3 is the step flow that mechanism claims electronic code in the present invention;
Fig. 4 is the step flow that electronic code is fulfilled by mechanism in the present invention;
Fig. 5 is the step flow of enterprise's audit electronic code in the present invention.
Specific embodiment
Referring to the drawings and embodiment carries out further technology explanation to the present invention.
As shown in Fig. 1~5, a kind of generation of electronic code and authentication method, the electronic code is to be a kind of for specific The valuable electronic code of quota of science service, circulates between enterprise and service organization, and systematic unity is managed by electronic code Management;The generation and certification of the electronic code include enterprise's application, enterprise contracts, mechanism claims, mechanism is fulfilled, enterprise audits Five processes;
The enterprise claims flow, includes the following steps:
A1:Enterprise claims electronic code, and electronic code management system generation random digit M1 generates random string as public key M2 is as private key;The random digit M1 is 8 random digits;Public key M1 is by short message sending to enterprise;
A2:Electronic code manages system and 8 bit digitals of M1 is rearranged the new key M3 of composition;
A3:Key M3 is converted into binary digit B1 by electronic code management system, with private key M2 as key, uses DES pairs Claim Encryption Algorithm that B1 is encrypted, obtain encrypted character string MB1;
A4:Electronic code management system is encrypted MB1 using md5 encryption algorithm to obtain final encrypted characters string result MB2 is preserved in this electronic code data information, and electronic code data information is corresponding with enterprise ID;
Enterprise's signing flow, includes the following steps:
Q1:Enterprise inputs public key character string M3 in electronic code management system, passes through enterprise ID and signing electronic code data Search corresponding private key character string M2;
Q2:By M3 binarizations, with private key M2 as key, using DES symmetric encipherment algorithms to the sequence after binarization into Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB3 again;Judge MB3=MB2, then signing into Work(;Otherwise signing failure.
The mechanism claims, and includes the following steps:
P1:Electronic code management system generation random digit M4 is as public key, and random string M5 is as private key for generation;It is described with Machine number M4 is 8 random digits;Public key M4 is by short message sending to mechanism;
P2:Electronic code manages system and 8 bit digitals of M4 is rearranged the new key M6 of composition;
P3:Key M6 is converted into binary digit B2 by electronic code management system, with private key M5 as key, uses DES pairs Claim Encryption Algorithm that B2 is encrypted, obtain encrypted character string MB4;
P4:Electronic code management system is encrypted MB4 using md5 encryption algorithm to obtain final encrypted characters string result MB5 is preserved in this electronic code data information, and electronic code data information is corresponding with mechanism ID;
The mechanism is fulfilled, and is included the following steps:
N1:Mechanism inputs public key character string M6 in electronic code management system, passes through mechanism ID and signing electronic code data Search corresponding private key character string M5;
N2:By M6 binarizations, with private key M5 as key, using DES symmetric encipherment algorithms to the sequence after binarization into Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB6 again;Judge MB6=MB3, then fulfil into Work(;Otherwise failure is fulfilled.
Enterprise's audit, includes the following steps:
E1:Enterprise inputs public key character string M6, corresponding private by logon account User ID and signing electronic code data search Key character string M2,
E2:By M6 binarizations, with private key M2 as key, using DES symmetric encipherment algorithms to the sequence after binarization into Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB7 again;Judge MB7=MB2, then audit into Work(;Otherwise audit failure.
It is that M1 is splitted into 8 respective characters using public key M1 generations M3 methods in step A2, S1, S2, S3, S4, S5, S6, S7, S8 are rearranged and are formed new key M3=S6+S4+S5+S2+S1+S7+S8+S3.
It is that M4 is splitted into 8 respective characters using public key M4 generations M6 methods in step P2, R1, R2, R3, R4, R5, R6, R7, R8 are rearranged and are formed new key M6=R6+R4+R5+R2+R1+R7+R8+R3.

Claims (3)

1. generation and the authentication method of a kind of electronic code, the electronic code has for a kind of quota for specific science service Valence electron encodes, and circulates between enterprise and service organization, and systematic unity management is managed by electronic code;It is characterized in that, The generation and certification of the electronic code include enterprise's application, enterprise contracts, mechanism claims, mechanism is fulfilled, enterprise audits five Process;
The enterprise claims flow, includes the following steps:
A1:Enterprise claims electronic code, and electronic code management system generation random digit M1 generates random string as public key M2 is as private key;The random digit M1 is 8 random digits;Public key M1 is by short message sending to enterprise;
A2:Electronic code manages system and 8 bit digitals of M1 is rearranged the new key M3 of composition;
A3:Key M3 is converted into binary digit B1 by electronic code management system, with private key M2 as key, uses DES pairs Claim Encryption Algorithm that B1 is encrypted, obtain encrypted character string MB1;
A4:Electronic code management system is encrypted MB1 using md5 encryption algorithm to obtain final encrypted characters string result MB2 is preserved in this electronic code data information, and electronic code data information is corresponding with enterprise ID;
Enterprise's signing flow, includes the following steps:
Q1:Enterprise inputs public key character string M3 in electronic code management system, passes through enterprise ID and signing electronic code data Search corresponding private key character string M2;
Q2:By M3 binarizations, with private key M2 as key, using DES symmetric encipherment algorithms to the sequence after binarization into Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB3 again;Judge MB3=MB2, then signing into Work(;Otherwise signing failure;
The mechanism claims, and includes the following steps:
P1:Electronic code management system generation random digit M4 is as public key, and random string M5 is as private key for generation;It is described with Machine number M4 is 8 random digits;Public key M4 is by short message sending to mechanism;
P2:Electronic code manages system and 8 bit digitals of M4 is rearranged the new key M6 of composition;
P3:Key M6 is converted into binary digit B2 by electronic code management system, with private key M5 as key, uses DES pairs Claim Encryption Algorithm that B2 is encrypted, obtain encrypted character string MB4;
P4:Electronic code management system is encrypted MB4 using md5 encryption algorithm to obtain final encrypted characters string result MB5 is preserved in this electronic code data information, and electronic code data information is corresponding with mechanism ID;
The mechanism is fulfilled, and is included the following steps:
N1:Mechanism inputs public key character string M6 in electronic code management system, passes through mechanism ID and signing electronic code data Search corresponding private key character string M5;
N2:By M6 binarizations, with private key M5 as key, using DES symmetric encipherment algorithms to the sequence after binarization into Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB6 again;Judge MB6=MB3, then fulfil into Work(;Otherwise failure is fulfilled;
Enterprise's audit, includes the following steps:
E1:Enterprise inputs public key character string M6, corresponding private by logon account User ID and signing electronic code data search Key character string M2,
E2:By M6 binarizations, with private key M2 as key, using DES symmetric encipherment algorithms to the sequence after binarization into Row encryption, encrypted result by md5 encryption algorithm, obtain encrypted characters string result MB7 again;Judge MB7=MB2, then audit into Work(;Otherwise audit failure.
2. generation and the authentication method of a kind of electronic code as described in claim 1, which is characterized in that public affairs are used in step A2 Key M1 generations M3 methods are M1 to be splitted into 8 respective characters, S1, S2, S3, S4, S5, S6, S7, S8 are rearranged and formed newly Key M3=S6+S4+S5+S2+S1+S7+S8+S3.
3. generation and the authentication method of a kind of electronic code as described in claim 1, which is characterized in that public affairs are used in step P2 Key M4 generations M6 methods are M4 to be splitted into 8 respective characters, R1, R2, R3, R4, R5, R6, R7, R8 are rearranged and formed newly Key M6=R6+R4+R5+R2+R1+R7+R8+R3.
CN201711467400.3A 2017-12-28 2017-12-28 Electronic code generation and authentication method Active CN108183789B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711467400.3A CN108183789B (en) 2017-12-28 2017-12-28 Electronic code generation and authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711467400.3A CN108183789B (en) 2017-12-28 2017-12-28 Electronic code generation and authentication method

Publications (2)

Publication Number Publication Date
CN108183789A true CN108183789A (en) 2018-06-19
CN108183789B CN108183789B (en) 2023-03-28

Family

ID=62548631

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711467400.3A Active CN108183789B (en) 2017-12-28 2017-12-28 Electronic code generation and authentication method

Country Status (1)

Country Link
CN (1) CN108183789B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852093A (en) * 2006-06-06 2006-10-25 北京易恒信认证科技有限公司 Electronic-seal safety authentication system and method based on CPK
WO2007091002A1 (en) * 2006-02-07 2007-08-16 Nextenders (India) Private Limited Document security management system
CN105635049A (en) * 2014-10-29 2016-06-01 航天信息股份有限公司 Anti-counterfeit tax control method and device based on client identifier password
CN106779645A (en) * 2017-02-08 2017-05-31 政和科技股份有限公司 Information ciphering method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007091002A1 (en) * 2006-02-07 2007-08-16 Nextenders (India) Private Limited Document security management system
CN1852093A (en) * 2006-06-06 2006-10-25 北京易恒信认证科技有限公司 Electronic-seal safety authentication system and method based on CPK
CN105635049A (en) * 2014-10-29 2016-06-01 航天信息股份有限公司 Anti-counterfeit tax control method and device based on client identifier password
CN106779645A (en) * 2017-02-08 2017-05-31 政和科技股份有限公司 Information ciphering method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"天津首推"创通票"激发双创活力" *

Also Published As

Publication number Publication date
CN108183789B (en) 2023-03-28

Similar Documents

Publication Publication Date Title
CN103427987B (en) Method, data verification method and the electronic installation of data encryption
CN1326353C (en) Method and system for integrated protection of data distributed processing in computer networks
US8208627B2 (en) Format-preserving cryptographic systems
KR100668016B1 (en) Mixnet system
CN110677487B (en) Outsourcing data duplicate removal cloud storage method supporting privacy and integrity protection
US11488134B2 (en) Format-preserving cryptographic systems
JP6323338B2 (en) Bit string collation system, method and program
JP4892478B2 (en) Authentication system, authentication device, terminal device, and verification device
CN102222188A (en) Information system user password generation method
KR101282653B1 (en) Data substitution encryption device and method
CN105827411A (en) Information processing method and apparatus
CN112613018A (en) Block chain-based digital certificate using system
CN105281901A (en) Encryption method for cloud tenant key information
CN105827404A (en) Identity authentication method, identity authentication device, and server
CN108183789A (en) The generation of electronic code and authentication method
CN114862388B (en) Identity management method based on digital wallet, computer equipment and storage medium
CN108141367A (en) Code signing service
Abdalrahman A cloud database based on AES 256 GCM encryption through devolving web application of accounting information system
US20090028338A1 (en) Software product authentication
KR101501508B1 (en) Method and system for authentication by data encryption
JP2019102959A (en) Server device, communication device, key sharing system, key sharing method, and program
CN113221074A (en) Offline authorization method
CN113656816B (en) Text encryption method
KR102519141B1 (en) Cloud-based gold wealth management server that enables gold present based on digital gold tokens and operating method thereof
Lavauzelle et al. Generic constructions of PoRs from codes and instantiations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 300384 Room 204, floor 2, Haitai building, No. 6, Meiyuan Road, Huayuan Industrial Zone, Binhai New Area, Tianjin

Applicant after: CHUANGTONGPIAO TECHNOLOGY CO.,LTD.

Address before: 300384 Room 204, 2 tower, Hai Tai Building, 6 Mei Yuan Road, Huayuan Industrial Area, Nankai District, Tianjin.

Applicant before: CHUANGTONGPIAO TECHNOLOGY CO.,LTD.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant