CN108848089B - Data encryption method and data transmission system - Google Patents

Data encryption method and data transmission system Download PDF

Info

Publication number
CN108848089B
CN108848089B CN201810608650.2A CN201810608650A CN108848089B CN 108848089 B CN108848089 B CN 108848089B CN 201810608650 A CN201810608650 A CN 201810608650A CN 108848089 B CN108848089 B CN 108848089B
Authority
CN
China
Prior art keywords
data
dynamic password
key
encrypted
mac
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810608650.2A
Other languages
Chinese (zh)
Other versions
CN108848089A (en
Inventor
蔡光辉
陆道如
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hengbao Intelligent System Technology Co Ltd
Original Assignee
Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengbao Intelligent System Technology Co Ltd filed Critical Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority to CN201810608650.2A priority Critical patent/CN108848089B/en
Publication of CN108848089A publication Critical patent/CN108848089A/en
Application granted granted Critical
Publication of CN108848089B publication Critical patent/CN108848089B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Abstract

The application discloses a data encryption method and a data transmission system, wherein the data encryption method comprises the following steps: generating a first dynamic password from the transaction data; calculating the first dynamic password and counting data of the current transaction to obtain a first key; encrypting the sensitive data by using a first key to form first encrypted data; calculating Mac on the sensitive data by using the device key to form first Mac data; and calculating original data which is formed by the data which is not encrypted in the transaction data, the first encrypted data and the first Mac data by using the device key to generate a second abstract, and attaching the second abstract to the original data and transmitting the second abstract to the server. The invention achieves the technical effects that the data is protected by different keys, the sent data is prevented from being falsified, the data transmission safety is effectively ensured, and the efficiency is high.

Description

Data encryption method and data transmission system
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a data encryption method and a data transmission system.
Background
With the improvement of the living standard, the bank cards are issued in large quantities, and various bank card acceptance terminals are generated, including POS terminals, ATM terminals, telephone payment terminals, and the like, and corresponding payment systems. In order to standardize various acceptance terminals, the national people's bank issues relevant standards of the financial industry. The standard stipulates the software and hardware security requirements of various acceptance terminals, including the requirements of information protection, system security protection, key management, access control, terminal anti-refitting and the like.
At present, a hierarchical key system of a master key/transaction key (MK/SK) is generally adopted by the acceptance terminals of domestic financial institutions. The loading of the master key is performed in a secure environment using a secure physical approach. The transaction key is issued and updated remotely through on-line communication under the encryption of the master key. But the transaction key needs to be updated regularly, otherwise, all ciphertext and plaintext are easy to generate, dictionary attack is formed, and the method is troublesome and safe.
Disclosure of Invention
The invention aims to provide a data encryption method and a data transmission system, so as to achieve the technical effects that data is protected by different keys, sent data is prevented from being tampered, data transmission safety is effectively guaranteed, and the data transmission is efficient.
In order to achieve the purpose, the invention adopts the following technical scheme:
a data encryption method includes generating a first dynamic password from transaction data; calculating the first dynamic password and counting data of the current transaction to obtain a first key; encrypting the sensitive data by using a first key to form first encrypted data; and calculating original data which is formed by the data which is not encrypted in the transaction data, the first encrypted data and the first Mac data by using the device key to generate a second abstract, and attaching the second abstract to the original data and transmitting the second abstract to the server.
Preferably, the method for generating the first dynamic password specifically comprises: and generating a first dynamic password according to sensitive data needing to be protected in the selected transaction data.
Preferably, the data types of the sensitive data include at least PIN, track, and MAC data.
Preferably, the method for obtaining the first key specifically includes: the first dynamic password is used to combine with one or more of the count data of the current transaction and a first digest of the combined data is calculated to derive a digest value from which the first key is derived.
Preferably, the data types in the count data include at least an order number, a serial number, and a batch number.
Preferably, the first dynamic password is a password of different data types at the same time or a password of the same data type at different times.
Preferably, the data of the transaction data that is not encrypted includes at least a device number.
The invention also provides a data transmission system, which comprises an acceptance terminal and a server; the acceptance terminal encrypts the transaction data by using the data encryption method and transmits the data to the server; and the server receives the data transmitted by the acceptance terminal, and decrypts and verifies the encrypted data.
Preferably, the method for decrypting and verifying the encrypted data by the server specifically comprises the following steps: receiving original data and a second abstract transmitted by an acceptance terminal; verifying the correctness of the original data; decrypting the first encrypted data; and verifying the correctness of the decrypted data.
Preferably, the method for decrypting the first encrypted data specifically includes: acquiring a second dynamic password according to the equipment number in the unencrypted data, wherein the method for acquiring the second dynamic password is the same as that when the acceptance terminal acquires the first dynamic password; the second dynamic password is combined with the counting data which is the same as the counting data when the acceptance terminal calculates the first key, and then a second key is calculated; the first encrypted data is decrypted using the second key.
The invention has the beneficial effects that: the technical effects that the data are protected by different keys, the sent data are prevented from being tampered, the data transmission safety is effectively guaranteed, and the efficiency is high are achieved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
FIG. 1 is a flow chart of a method of data transmission;
FIG. 2 is a flow chart of a method of an accepting terminal encrypting transaction data;
FIG. 3 is a flow chart of a method for the server to decrypt and verify encrypted data;
fig. 4 is a flow chart of a method of decrypting first encrypted data.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a data transmission system, which comprises an acceptance terminal and a server, wherein the acceptance terminal encrypts transaction data and transmits the data to the server; and the server receives the data transmitted by the acceptance terminal, and decrypts and verifies the encrypted data.
As shown in fig. 1, the data transmission using the above system includes the following steps:
s110: and importing a fixed device key and a dynamic password key into the acceptance terminal.
Specifically, a fixed device key and a dynamic password key are imported by an encryption machine in a secure environment before the acceptance terminal leaves a factory, and the device key and the dynamic password key cannot be exported again after being imported into the acceptance terminal. The device key is used for verifying the integrity and accuracy of the transmitted data, and the dynamic password key is used for generating a dynamic password according to the data type or the time factor.
S120: the acceptance terminal encrypts transaction data.
Specifically, as shown in fig. 2, the method for encrypting the transaction data by the accepting terminal includes:
s210: selecting the data type of sensitive data needing to be protected in the transaction data to generate a first dynamic password;
further, the data type of the sensitive data includes data such as PIN, track, and MAC data, but is not limited to the data such as PIN, track, and MAC data.
Further, the first dynamic password is a password of different data types at the same time or a password of the same data type at different times.
As an embodiment, the first dynamic password is selected as a password of different data types at the same time, specifically, for example, under the same time factor, a PIN and a track in the protected sensitive data are selected, a PIN dynamic password and a track dynamic password are generated by using a dynamic password key, and the PIN dynamic password and the track dynamic password are used as the first dynamic password for the following first key.
As another embodiment, passwords of the same data type at different times are selected, specifically, for example, MAC data in protected sensitive data are selected, a dynamic password key is used to generate a first MAC data dynamic password at a first time point, a second MAC data dynamic password is generated at a second time point, a third MAC data dynamic password is generated at a third time point, and the like, and the first MAC data dynamic password, the second MAC data dynamic password, and the third MAC data dynamic password are used as the first dynamic password for the first key described below.
As another embodiment, passwords of different data types at different times are selected, and specifically, the PIN is a dynamic password at a first time point (e.g., a first second); the MAC uses the dynamic password at a second point in time (e.g., a time of the previous year); the track uses the dynamic password at the third time point (e.g., a time of the next year) and uses the dynamic passwords at the three time points as the first dynamic password for the first key described below.
Furthermore, when the passwords of the same data type and different data types are used at different times, the accepting terminal needs to update the equipment time.
Specifically, the server obtains encrypted data T2 using a current time factor T1 of the digest encryption server calculated using a device key obtained from a device number in the unencrypted data, calculates a MAC value Tm of the time factor T1 using the device key, attaches the MAC value Tm to the encrypted data T2, and transmits the result to the receiving terminal. After the reception terminal receives the encrypted data T2 and the MAC value Tm, the reception terminal decrypts the encrypted data T2 using the device key to obtain a time factor T3, and calculates the MAC value for the time factor T3 to obtain Ts. And comparing whether Tm is consistent with Ts, if so, transmitting data accurately, and updating the time factor by the acceptance terminal according to the time factor T3.
Furthermore, when the passwords of the same data type and different data types are used at different times, the accepting terminal does not need to update the equipment time.
Specifically, if the accepting terminal does not accept the time factor T1 for updating sent by the server, the server needs to record the error data of the time factor T4 and the time factor T1 of the accepting terminal this time, so that the server can automatically use the time factor T5 checked according to the error data when the device is used next time, and the number of attempts for verifying the accuracy of the decrypted data according to the time factor is reduced.
S220: combining the first dynamic password with one or more of the count data of the current transaction, and calculating a first digest of the combined data to obtain a digest value from which a first key is derived;
further, the data type of the counting data includes, but is not limited to, order number, serial number, and batch number.
Specifically, the first dynamic password may be combined with the order number and then calculated to obtain the digest value, or may be combined with the order number and the batch number and then calculated to obtain the digest value. The digest value may be calculated by a well-known digest calculation method.
S230: encrypting the sensitive data by using a first key to form first encrypted data;
further, the sensitive data encrypted by the digest value may be only the sensitive data to be protected, or may be all the sensitive data, and in this embodiment, it is preferable that only the sensitive data to be protected is used.
S240: mac is calculated for the sensitive data using the device key, forming first Mac data.
S250; and calculating original data which is formed by the data which is not encrypted in the transaction data, the first encrypted data and the first Mac data by using the device key to generate a second abstract, and attaching the second abstract to the original data and transmitting the second abstract to the server.
Further, the data of the transaction data which is not encrypted at least comprises the device number.
Specifically, as an example, when the encrypted sensitive data is data a1, the original data includes unencrypted data, encrypted data a2 in which data a1 is encrypted, and Mac data A3 of data a 1. When the encrypted sensitive data is multiple, for example, the encrypted sensitive data is data a, data B, and data C; the original data includes unencrypted data, Mac data A3 of encrypted data a2 and data a1 of data a1 encrypted, Mac data B3 of encrypted data B2 and data B1 of data B1 encrypted, Mac data C2 of data C1 encrypted, and Mac data C3 of data C1.
S130: the server decrypts and verifies the encrypted data.
Specifically, as shown in fig. 3, the method for decrypting and verifying the encrypted data by the server specifically includes:
s310; and receiving the original data and the second abstract transmitted by the receiving terminal.
S320: and verifying the correctness of the transmitted original data.
Specifically, the server obtains an equipment key identical to the accepting terminal equipment according to the equipment number in the unencrypted data, calculates a Mac (machine-aided Mac) value for the received original data by using the equipment key to obtain a third abstract, compares the third abstract with the second abstract, and judges that the transmitted original data is complete and correct when the third abstract is identical to the second abstract.
S330: the first encrypted data is decrypted.
Further, the method for decrypting the first encrypted data specifically includes:
s410: and acquiring a second dynamic password according to the equipment number in the unencrypted data, wherein the method for acquiring the second dynamic password is the same as that when the accepting terminal acquires the first dynamic password.
S420: the second dynamic password is combined with the same counting data as the accepting terminal calculates the first key to calculate the second key.
S430: the first encrypted data is decrypted using the second key.
S340: and verifying the correctness of the data decrypted by the first encrypted data.
Specifically, the data decrypted by the first encrypted data and the device key are used for calculating second Mac data worth calculating Mac, the second Mac data and the first Mac data are compared, and when the second Mac data is consistent with the first Mac data, the decrypted data is judged to be complete and correct.
Further, based on the dynamic password of the time factor, when the second Mac data is inconsistent with the first Mac data, the data obtained after decryption corresponding to the dynamic password keys corresponding to several adjacent time points also need to be compared, and the data error is effectively reduced.
The invention has the beneficial effects that: the technical effects that the data are protected by different keys, the sent data are prevented from being tampered, the data transmission safety is effectively guaranteed, and the efficiency is high are achieved.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application. It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (8)

1. A method for data encryption, comprising:
selecting the data type of sensitive data needing to be protected in transaction data to generate a first dynamic password, wherein the first dynamic password is different according to different data types of the selected sensitive data;
calculating the first dynamic password and counting data of the current transaction to obtain a first key;
encrypting the sensitive data by using the first key to form first encrypted data;
calculating Mac on the sensitive data by using the device key to form first Mac data;
calculating original data which is composed of unencrypted data, first encrypted data and first Mac data in transaction data by using an equipment key to generate a second abstract, and attaching the second abstract to the original data and transmitting the second abstract to a server;
the first dynamic password is any one of passwords of different data types in the same time, passwords of the same data type in different times or passwords of different data types in different times;
for the first dynamic password based on the time factor, and when the second Mac data is inconsistent with the first Mac data in the process of decrypting and verifying the encrypted data, data obtained after decryption corresponding to dynamic password keys corresponding to several adjacent time points need to be compared.
2. The data encryption method of claim 1, wherein the data types of the sensitive data include at least PIN, track, and MAC data.
3. The data encryption method according to claim 2, wherein the method of obtaining the first key specifically is: and combining the first dynamic password with one or more of the counting data of the current transaction, calculating a first abstract of the combined data to obtain an abstract value, and obtaining a first key according to the abstract value.
4. The data encryption method according to claim 3, wherein the data type in the count data includes at least an order number, a serial number, and a batch number.
5. The data encryption method according to claim 1, wherein the data that is not encrypted in the transaction data includes at least a device number.
6. A data transmission system is characterized by comprising a receiving terminal and a server;
the acceptance terminal encrypts transaction data by using the data encryption method of claims 1-5 and transmits the data to the server;
and the server receives the data transmitted by the acceptance terminal, and decrypts and verifies the encrypted data.
7. The data transmission system according to claim 6, wherein the method for the server to decrypt and verify the encrypted data is specifically:
receiving original data and a second abstract transmitted by an acceptance terminal;
verifying the correctness of the original data;
decrypting the first encrypted data;
and verifying the correctness of the decrypted data.
8. The data transmission system according to claim 7, wherein the method of decrypting the first encrypted data is embodied as:
acquiring a second dynamic password according to the equipment number in the unencrypted data, wherein the method for acquiring the second dynamic password is the same as that when the acceptance terminal acquires the first dynamic password;
the second dynamic password is combined with the counting data which is the same as the counting data when the accepting terminal calculates the first key, and then a second key is calculated;
decrypting the first encrypted data using the second key.
CN201810608650.2A 2018-06-13 2018-06-13 Data encryption method and data transmission system Active CN108848089B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810608650.2A CN108848089B (en) 2018-06-13 2018-06-13 Data encryption method and data transmission system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810608650.2A CN108848089B (en) 2018-06-13 2018-06-13 Data encryption method and data transmission system

Publications (2)

Publication Number Publication Date
CN108848089A CN108848089A (en) 2018-11-20
CN108848089B true CN108848089B (en) 2020-09-01

Family

ID=64201939

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810608650.2A Active CN108848089B (en) 2018-06-13 2018-06-13 Data encryption method and data transmission system

Country Status (1)

Country Link
CN (1) CN108848089B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114650151A (en) * 2020-12-15 2022-06-21 宝能汽车集团有限公司 Data transmission method, device and system based on vehicle CAN bus and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101236673A (en) * 2008-03-07 2008-08-06 北京握奇数据系统有限公司 Method for accomplishing electronic purse off-line charging, complex function card and authorization carrier
CN101635075A (en) * 2009-05-31 2010-01-27 北京飞天诚信科技有限公司 Trading method and trading system
CN102135871A (en) * 2011-03-29 2011-07-27 深圳职业技术学院 Device for generating random number by using chaos theory and dynamic password token thereof
CN102223237A (en) * 2011-07-15 2011-10-19 飞天诚信科技股份有限公司 Data signature authentication method and data signature authentication system
CN102347942A (en) * 2011-07-01 2012-02-08 飞天诚信科技股份有限公司 Information safety method based on image acquisition and system thereof
CN102426592A (en) * 2011-10-31 2012-04-25 北京人大金仓信息技术股份有限公司 Method for initializing database based on dynamic password
CN103095456A (en) * 2013-01-10 2013-05-08 天地融科技股份有限公司 Method and system for processing transaction messages
CN103684759A (en) * 2012-09-11 2014-03-26 中国银联股份有限公司 Terminal data encrypting method and device
CN103927648A (en) * 2013-01-15 2014-07-16 深圳市朗科科技股份有限公司 Method, device and system for achieving remote payment services
CN104361521A (en) * 2014-11-03 2015-02-18 上海众人科技有限公司 Electronic exchange system and method based on mobile terminal
CN106657211A (en) * 2016-09-05 2017-05-10 深圳市双赢伟业科技股份有限公司 Cargo antitheft method and device based on Internet of vehicles

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8843757B2 (en) * 2009-11-12 2014-09-23 Ca, Inc. One time PIN generation

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101236673A (en) * 2008-03-07 2008-08-06 北京握奇数据系统有限公司 Method for accomplishing electronic purse off-line charging, complex function card and authorization carrier
CN101635075A (en) * 2009-05-31 2010-01-27 北京飞天诚信科技有限公司 Trading method and trading system
CN102135871A (en) * 2011-03-29 2011-07-27 深圳职业技术学院 Device for generating random number by using chaos theory and dynamic password token thereof
CN102347942A (en) * 2011-07-01 2012-02-08 飞天诚信科技股份有限公司 Information safety method based on image acquisition and system thereof
CN102223237A (en) * 2011-07-15 2011-10-19 飞天诚信科技股份有限公司 Data signature authentication method and data signature authentication system
CN102426592A (en) * 2011-10-31 2012-04-25 北京人大金仓信息技术股份有限公司 Method for initializing database based on dynamic password
CN103684759A (en) * 2012-09-11 2014-03-26 中国银联股份有限公司 Terminal data encrypting method and device
CN103095456A (en) * 2013-01-10 2013-05-08 天地融科技股份有限公司 Method and system for processing transaction messages
CN103927648A (en) * 2013-01-15 2014-07-16 深圳市朗科科技股份有限公司 Method, device and system for achieving remote payment services
CN104361521A (en) * 2014-11-03 2015-02-18 上海众人科技有限公司 Electronic exchange system and method based on mobile terminal
CN106657211A (en) * 2016-09-05 2017-05-10 深圳市双赢伟业科技股份有限公司 Cargo antitheft method and device based on Internet of vehicles

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"中国金融移动支付-联网联合-第6部分:安全规范";徐大大1121;《百度学术》;20160810;第1-6节 *
"面向Android金融应用的U架构设计与实现";卢逸;《万方数据》;20180525;第四章 *

Also Published As

Publication number Publication date
CN108848089A (en) 2018-11-20

Similar Documents

Publication Publication Date Title
CN109639714B (en) Internet of things identity registration and verification method based on block chain
US9647845B2 (en) Key downloading method, management method, downloading management method, device and system
US20160267493A1 (en) Product anti-counterfeiting method, apparatus and system
US9467293B1 (en) Generating authentication codes associated with devices
CN109547445B (en) Method and system for verifying legality of network request of client
US8386647B2 (en) Method for time source calibration and system thereof
WO2020072551A1 (en) Contactless card emulation system and method
CN106682903B (en) A kind of feedback validation method of bank paying Licensing Authority information
US20070257813A1 (en) Secure network bootstrap of devices in an automatic meter reading network
CN112398853B (en) Method, device and system for realizing alliance chain cross-chain communication
EP2961094A1 (en) System and method for generating a random number
CN103714638A (en) Method and system for quickly locating terminal master key downloading failure
CN103441856A (en) Dynamic password authentication method and device
CN112288434B (en) Privacy transaction method, device, zero knowledge proof system and privacy transaction architecture model
CN110070363B (en) Account management method and verification method in block chain network and terminal equipment
US11711205B2 (en) Unified secure device provisioning
CN110597836B (en) Information inquiry request response method and device based on block chain network
EP3674936A1 (en) Authentication terminal, authentication device and authentication method and system using authentication terminal and authentication device
CN109635610A (en) The read-write system and method for RFID tag data
US20040143741A1 (en) Multi-stage authorisation system
CN108199847A (en) Security processing method, computer equipment and storage medium
CN115242553B (en) Data exchange method and system supporting safe multi-party calculation
CN109302286B (en) Fido equipment key index generation method
CN108848089B (en) Data encryption method and data transmission system
CN111199486A (en) Data processing method and device based on block chain network and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: 801, 8 / F, building 4a, international R & D headquarters park, No. 68, Aoti street, Jianye District, Nanjing, Jiangsu Province, 210019

Patentee after: JIANGSU HENGBAO INTELLIGENT SYSTEM TECHNOLOGY Co.,Ltd.

Address before: 212355 Hengtang Industrial Park, Yunyang Town, Danyang City, Zhenjiang City, Jiangsu Province

Patentee before: JIANGSU HENGBAO INTELLIGENT SYSTEM TECHNOLOGY Co.,Ltd.