CN109492358A - A kind of open interface uniform authentication method - Google Patents

A kind of open interface uniform authentication method Download PDF

Info

Publication number
CN109492358A
CN109492358A CN201811118944.3A CN201811118944A CN109492358A CN 109492358 A CN109492358 A CN 109492358A CN 201811118944 A CN201811118944 A CN 201811118944A CN 109492358 A CN109492358 A CN 109492358A
Authority
CN
China
Prior art keywords
interface
certificate server
called side
server
signing messages
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811118944.3A
Other languages
Chinese (zh)
Inventor
高灵超
葛华利
董爱强
吴嘉生
刘立威
许传波
王小平
余仰淇
陈坤
靖稳峰
李继红
陈建
秦俊宁
卜京
王志强
江樱
孔文杰
卢文达
周洋
戴波
王红凯
王剑
白万建
李东
王勇
刘范范
汤琳琳
郭刚
张福华
郭健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Science and Technology
State Grid Information and Telecommunication Co Ltd
Xian Jiaotong University
Information and Telecommunication Branch of State Grid Zhejiang Electric Power Co Ltd
Information and Telecommunication Branch of State Grid Shandong Electric Power Co Ltd
Original Assignee
Nanjing University of Science and Technology
State Grid Information and Telecommunication Co Ltd
Xian Jiaotong University
Information and Telecommunication Branch of State Grid Zhejiang Electric Power Co Ltd
Information and Telecommunication Branch of State Grid Shandong Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Science and Technology, State Grid Information and Telecommunication Co Ltd, Xian Jiaotong University, Information and Telecommunication Branch of State Grid Zhejiang Electric Power Co Ltd, Information and Telecommunication Branch of State Grid Shandong Electric Power Co Ltd filed Critical Nanjing University of Science and Technology
Priority to CN201811118944.3A priority Critical patent/CN109492358A/en
Publication of CN109492358A publication Critical patent/CN109492358A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to a kind of open interface uniform authentication methods, the method is as follows: before initiating interface call request, interface called side reads random number from certificate server and is used for digital signature interface called side;Interface called side will carry signing messages to interface provider's request call;Interface provider is sent to certificate server after receiving call request, by the IP address of the signing messages received and interface provider together;Whether there is access authority between the signing messages of certificate server verification interface called side and the IP address of interface provider;The information for receiving certificate server if certificate server certification has access authority is sent to signature server;Signature server verifies the validity of the signing messages of interface called side and verification result is fed back to certificate server after receiving information;The verification result of feedback is fed back to interface provider by certificate server.The present invention improves safety and easy to operate, improves authentication efficiency.

Description

A kind of open interface uniform authentication method
Technical field
The present invention relates to computer field more particularly to a kind of open interface uniform authentication methods.
Background technique
Currently, each component of large software system uses the external exposed interface of rest mode, and to be connect between each component Mouth, which calls, to be passed through by safety certification, and the method for custom interface certification is that have authentication interface to be used to make in each component Safety certification work, it requires height to the certification work amount of component interface to this authentication mode by between interface and interface, It bears larger, it is therefore desirable to which a kind of mode of unified certification substitutes the authentication relationship of this larger transportation load.
Interface is to send authentication to certificate server to ask sending call request in the method for existing unified certification It asks, due to there is no encryption to be arranged, is easy the risk for being trapped and maliciously being usurped.
Summary of the invention
The technical problem to be solved by the present invention is to the prior art there are aiming at the problem that provide security performance it is high and Convenient for a kind of open interface uniform authentication method of operation.
The technical scheme of the invention to solve the technical problem is: a kind of open interface uniform authentication method, It is characterized in that, the method is as follows:
For interface called side before initiating interface call request, interface called side reads random number for counting from certificate server Word signature;
Interface called side will carry signing messages to interface provider's request call;
Interface provider is after receiving call request, by the IP address one of the signing messages received and interface provider And it is sent to certificate server;
Whether there is access between the signing messages of certificate server verification interface called side and the IP address of interface provider Permission;
The information for receiving certificate server if certificate server certification has access authority is sent to signature server; If certificate server is authenticated without access authority, then it represents that can not be called between interface, certificate server will be unable to call result hair Interface provider is given, interface provides direction interface called side and sends the result that can not be called;
Signature server verifies the validity of the signing messages of interface called side and by verification result after receiving information Feed back to certificate server;
The verification result of feedback is fed back to interface provider by certificate server;
If feedback result is determined as effectively by signature server, interface provider allows interface called side call operation, And the result called will be allowed to be sent to interface called side;If feedback result is determined as that interface mentions in vain by signature server Supplier does not allow jiont strip called side to call, and the result called would not allow for be sent to interface called side.
Further, with the registration information of each interface on the certificate server, registration information includes each interface IP address, each interface correspond to digital certificate information, the digital certificate information is provided by signature server, in corresponding interface With have setting on certificate server, and corresponding interface is identical with the digital certificate on certificate server.
Further, the generation of the signing messages includes the following steps:
The random number obtained from certificate server passes through Hash operation before sending signing messages, obtains cryptographic Hash one;
Obtained cryptographic Hash is encrypted using the digital certificate of interface called side, generates digital signature;
By the timestamp before the IP address and calling of digital signature and interface called side with the shape of token (token) parameter Formula is used as signing messages together.
Further, the verification step of the certificate server is as follows:
Certificate server extracts digital signature after the information for receiving interface provider;
Digital signature is decrypted by the digital certificate of corresponding interface in certificate server, obtains cryptographic Hash two;
Hash operation is carried out to the information of interface provider, obtains cryptographic Hash three;
It compares cryptographic Hash two and cryptographic Hash three and is determined with access authority if the two is identical;If the two is different, determine Without access authority;
Further, the verification step of the signature server is identical as certificate server.
Further, when subsequent each interface calls, each signing messages of interface called side is different from.
Further, the signing messages has timeliness.
Compared with prior art, beneficial effects of the present invention are as follows: the present invention is authenticated using identity authority and digital signature Verifying double verification mode improves the security performance of certification, and the information sent by way of digital signature to interface adds Close decryption first passes through certificate server decryption digital signature, utilizes the black and white lists strategy management group one step ahead of certificate server Access between part interface limits power, then is determined by validity of the signature server to digital signature, avoids certification letter The risk for being trapped and maliciously being usurped is ceased, and easy to operate, certification effect can be improved with each component interface of unified certification Rate.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of open interface uniform authentication method of the present invention.
Fig. 2 is the product process schematic diagram of the signing messages provided in the present embodiment.
Fig. 3 is the checking process schematic diagram of the certificate server provided in the present embodiment.
Specific embodiment
The present invention will be described in further detail below with reference to the embodiments of the drawings.
As shown in Figure 1, a kind of open interface uniform authentication method, its step are as follows:
For interface called side before initiating interface call request, interface called side reads random number for counting from certificate server Word signature;
Interface called side will carry signing messages to interface provider's request call;
Interface provider is after receiving call request, by the IP address one of the signing messages received and interface provider And it is sent to certificate server;
Whether there is access between the signing messages of certificate server verification interface called side and the IP address of interface provider Permission;
The information for receiving certificate server if certificate server certification has access authority is sent to signature server; If certificate server is authenticated without access authority, then it represents that can not be called between interface, certificate server will be unable to call result hair Interface provider is given, interface provides direction interface called side and sends the result that can not be called;
Signature server verifies the validity of the signing messages of interface called side and by verification result after receiving information Feed back to certificate server;
The verification result of feedback is fed back to interface provider by certificate server;
If feedback result is determined as effectively by signature server, interface provider allows interface called side call operation, And the result called will be allowed to be sent to interface called side;If feedback result is determined as that interface mentions in vain by signature server Supplier does not allow jiont strip called side to call, and the result called would not allow for be sent to interface called side.
Preferably, with the registration information of each interface on certificate server, registration information includes the IP of each interface Location, each interface correspond to digital certificate information, and the digital certificate information is provided by signature server, in corresponding interface and certification There is setting on server, and corresponding interface is identical with the digital certificate on certificate server.
The present embodiment carries out representing the stream that can be passed through verifying and complete interface calling according to sequence indicated in Fig. 1 Journey.
As shown in Fig. 2, the generation of signing messages includes the following steps:
A1, the random number obtained from certificate server pass through Hash operation before sending signing messages, obtain cryptographic Hash one;
A2 encrypts obtained cryptographic Hash using the digital certificate of interface called side, generates digital signature;
A3, by the timestamp before the IP address and calling of digital signature and interface called side with token (token) parameter Form is used as signing messages together.
As shown in figure 3, the verification step of certificate server is as follows:
B1, certificate server extract digital signature after the information for receiving interface provider;
B2 is decrypted digital signature by the digital certificate of corresponding interface in certificate server, obtains cryptographic Hash two;
B3 carries out Hash operation to the information of interface provider, obtains cryptographic Hash three;
B4 compares cryptographic Hash two and cryptographic Hash three if the two is identical and is determined with access authority;If the two is different, sentence Determine without access authority;
Preferably, the verification step of signature server is identical as certificate server.
Preferably, when subsequent each interface calls, each signing messages of interface called side is different from, due to recognizing The random number obtained on card server is all different, and the permutation and combination relationship of number is different, therefore signing messages all uses every time Different permutation and combination methods.
Preferably, signing messages has timeliness, caused by can effectively prevent due to long-time is using same signing messages The stolen risk of signing messages.
Advantages of the present invention are as follows: the present invention is improved using identity authority certification and digital signature authentication double verification mode The security performance of certification carries out encrypting and decrypting to the information that interface is sent by way of digital signature, first passes through authentication service Device decrypts digital signature, and using the black and white lists strategy of certificate server, the access between management assembly interface limits power one step ahead, Again determined by validity of the signature server to digital signature, avoids authentication information and be trapped and maliciously usurped Risk, and it is easy to operate, authentication efficiency can be improved with each component interface of unified certification.
The foregoing is merely the preferred embodiment of the present invention, it is noted that for those of ordinary skills, Under the premise of not departing from the principle of the present invention, a variety of remodeling or improvement can be carried out to the present invention, these are regarded as the present invention Protection scope within.

Claims (7)

1. a kind of open interface uniform authentication method, which is characterized in that the method is as follows:
For interface called side before initiating interface call request, interface called side reads random number for number label from certificate server Name;
Interface called side will carry signing messages to interface provider's request call;
Interface provider is concurrent by the IP address one of the signing messages received and interface provider after receiving call request It send to certificate server;
Whether there is access authority between the signing messages of certificate server verification interface called side and the IP address of interface provider;
The information for receiving certificate server if certificate server certification has access authority is sent to signature server;If recognizing Server authentication is demonstrate,proved without access authority, then it represents that can not call between interface, certificate server will be unable to call result and be sent to Interface provider, interface provide direction interface called side and send the result that can not be called;
Signature server verifies the validity of the signing messages of interface called side and feeds back verification result after receiving information To certificate server;
The verification result of feedback is fed back to interface provider by certificate server;
If feedback result is determined as effectively by signature server, interface provider allows interface called side call operation, and will The result called is allowed to be sent to interface called side;If feedback result is determined as in vain by signature server, interface provider Do not allow jiont strip called side to call, and the result called would not allow for be sent to interface called side.
2. a kind of open interface uniform authentication method as described in claim 1, which is characterized in that have on the certificate server There is a registration information of each interface, registration information includes that the IP address of each interface, each interface correspond to digital certificate information, institute State digital certificate information to be provided by signature server, there is setting on corresponding interface and certificate server, and corresponding interface and Digital certificate on certificate server is identical.
3. a kind of open interface uniform authentication method as described in claim 1, which is characterized in that the generation of the signing messages Include the following steps:
The random number obtained from certificate server passes through Hash operation before sending signing messages, obtains cryptographic Hash one;
Obtained cryptographic Hash is encrypted using the digital certificate of interface called side, generates digital signature;
By the timestamp before the IP address and calling of digital signature and interface called side one in the form of token (token) parameter And as signing messages.
4. a kind of open interface uniform authentication method as claimed in claim 3, which is characterized in that the school of the certificate server Test that steps are as follows:
Certificate server extracts digital signature after the information for receiving interface provider;
Digital signature is decrypted by the digital certificate of corresponding interface in certificate server, obtains cryptographic Hash two;
Hash operation is carried out to the information of interface provider, obtains cryptographic Hash three;
It compares cryptographic Hash two and cryptographic Hash three and is determined with access authority if the two is identical;If the two is different, determine without visit Ask permission.
5. a kind of open interface uniform authentication method as claimed in claim 4, which is characterized in that the signature server is tested It is identical as certificate server to demonstrate,prove step.
6. a kind of open interface uniform authentication method as described in claim 1, which is characterized in that subsequent each interface called When, each signing messages of interface called side is different from.
7. a kind of open interface uniform authentication method as described in claim 1, which is characterized in that when the signing messages has Effect property.
CN201811118944.3A 2018-09-25 2018-09-25 A kind of open interface uniform authentication method Pending CN109492358A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811118944.3A CN109492358A (en) 2018-09-25 2018-09-25 A kind of open interface uniform authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811118944.3A CN109492358A (en) 2018-09-25 2018-09-25 A kind of open interface uniform authentication method

Publications (1)

Publication Number Publication Date
CN109492358A true CN109492358A (en) 2019-03-19

Family

ID=65689968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811118944.3A Pending CN109492358A (en) 2018-09-25 2018-09-25 A kind of open interface uniform authentication method

Country Status (1)

Country Link
CN (1) CN109492358A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110365490A (en) * 2019-07-25 2019-10-22 中国工程物理研究院电子工程研究所 A kind of integration of information system security strategy based on token encryption certification
CN110569132A (en) * 2019-08-29 2019-12-13 高新兴科技集团股份有限公司 Electronic signature printing method, device and computer readable storage medium
CN110673892A (en) * 2019-09-17 2020-01-10 中电万维信息技术有限责任公司 Interface unified calling method based on component configuration
WO2021203817A1 (en) * 2020-04-08 2021-10-14 中兴通讯股份有限公司 Open interface management method, electronic device, and storage medium
CN114338050A (en) * 2022-03-14 2022-04-12 麒麟软件有限公司 Application program interface safety management and control method, system and device
CN114422266A (en) * 2022-02-28 2022-04-29 深圳市中悦科技有限公司 IDaaS system based on dual verification mechanism
CN114697396A (en) * 2020-12-29 2022-07-01 北京国双科技有限公司 Request processing method and device, electronic equipment and readable storage medium
CN117786756A (en) * 2024-02-23 2024-03-29 四川大学华西医院 Method and system for realizing safe sharing of user patient data based on skin database

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515932A (en) * 2009-03-23 2009-08-26 中兴通讯股份有限公司 Method and system for accessing Web service safely
CN103078827A (en) * 2011-10-25 2013-05-01 腾讯数码(天津)有限公司 Open platform system called by third-party applications and implementation method for open platform system
CN103312801A (en) * 2013-06-05 2013-09-18 上海西本网络科技有限公司 Application devices, interaction method and system for data between application devices and server
CN105187372A (en) * 2015-06-09 2015-12-23 深圳市腾讯计算机系统有限公司 Method for data processing based on mobile application entrance, device and system
CN105634743A (en) * 2015-12-30 2016-06-01 中国银联股份有限公司 Authentication method used for open interface calling
CN106101258A (en) * 2016-07-08 2016-11-09 腾讯科技(深圳)有限公司 A kind of interface interchange method of mixed cloud, Apparatus and system
CN107135073A (en) * 2016-02-26 2017-09-05 北京京东尚科信息技术有限公司 Interface interchange method and apparatus
CN107135206A (en) * 2017-04-18 2017-09-05 北京思特奇信息技术股份有限公司 Safe precaution method and system that a kind of internet environment lower interface is called
CN107465650A (en) * 2016-06-06 2017-12-12 阿里巴巴集团控股有限公司 A kind of access control method and device
CN107634973A (en) * 2017-10-31 2018-01-26 深圳竹云科技有限公司 A kind of service interface secure calling method
CN107911381A (en) * 2017-12-01 2018-04-13 济南浪潮高新科技投资发展有限公司 Access method, system, server-side and the client of application programming interface
CN108365961A (en) * 2018-01-02 2018-08-03 深圳壹账通智能科技有限公司 The response method and server that interface call method and terminal device, interface call

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515932A (en) * 2009-03-23 2009-08-26 中兴通讯股份有限公司 Method and system for accessing Web service safely
CN103078827A (en) * 2011-10-25 2013-05-01 腾讯数码(天津)有限公司 Open platform system called by third-party applications and implementation method for open platform system
CN103312801A (en) * 2013-06-05 2013-09-18 上海西本网络科技有限公司 Application devices, interaction method and system for data between application devices and server
CN105187372A (en) * 2015-06-09 2015-12-23 深圳市腾讯计算机系统有限公司 Method for data processing based on mobile application entrance, device and system
CN105634743A (en) * 2015-12-30 2016-06-01 中国银联股份有限公司 Authentication method used for open interface calling
CN107135073A (en) * 2016-02-26 2017-09-05 北京京东尚科信息技术有限公司 Interface interchange method and apparatus
CN107465650A (en) * 2016-06-06 2017-12-12 阿里巴巴集团控股有限公司 A kind of access control method and device
CN106101258A (en) * 2016-07-08 2016-11-09 腾讯科技(深圳)有限公司 A kind of interface interchange method of mixed cloud, Apparatus and system
CN107135206A (en) * 2017-04-18 2017-09-05 北京思特奇信息技术股份有限公司 Safe precaution method and system that a kind of internet environment lower interface is called
CN107634973A (en) * 2017-10-31 2018-01-26 深圳竹云科技有限公司 A kind of service interface secure calling method
CN107911381A (en) * 2017-12-01 2018-04-13 济南浪潮高新科技投资发展有限公司 Access method, system, server-side and the client of application programming interface
CN108365961A (en) * 2018-01-02 2018-08-03 深圳壹账通智能科技有限公司 The response method and server that interface call method and terminal device, interface call

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110365490A (en) * 2019-07-25 2019-10-22 中国工程物理研究院电子工程研究所 A kind of integration of information system security strategy based on token encryption certification
CN110365490B (en) * 2019-07-25 2022-06-21 中国工程物理研究院电子工程研究所 Information system integration security policy method based on token encryption authentication
CN110569132A (en) * 2019-08-29 2019-12-13 高新兴科技集团股份有限公司 Electronic signature printing method, device and computer readable storage medium
CN110569132B (en) * 2019-08-29 2022-07-12 高新兴科技集团股份有限公司 Electronic signature printing method, device and computer readable storage medium
CN110673892A (en) * 2019-09-17 2020-01-10 中电万维信息技术有限责任公司 Interface unified calling method based on component configuration
CN110673892B (en) * 2019-09-17 2023-01-03 中电万维信息技术有限责任公司 Interface unified calling method based on component configuration
WO2021203817A1 (en) * 2020-04-08 2021-10-14 中兴通讯股份有限公司 Open interface management method, electronic device, and storage medium
CN114697396A (en) * 2020-12-29 2022-07-01 北京国双科技有限公司 Request processing method and device, electronic equipment and readable storage medium
CN114422266A (en) * 2022-02-28 2022-04-29 深圳市中悦科技有限公司 IDaaS system based on dual verification mechanism
CN114338050A (en) * 2022-03-14 2022-04-12 麒麟软件有限公司 Application program interface safety management and control method, system and device
CN117786756A (en) * 2024-02-23 2024-03-29 四川大学华西医院 Method and system for realizing safe sharing of user patient data based on skin database
CN117786756B (en) * 2024-02-23 2024-05-14 四川大学华西医院 Method and system for realizing safe sharing of user patient data based on skin database

Similar Documents

Publication Publication Date Title
CN109492358A (en) A kind of open interface uniform authentication method
CN102377788B (en) Single sign-on (SSO) system and single sign-on (SSO) method
CN104580250A (en) System and method for authenticating credible identities on basis of safety chips
CN111698225B (en) Application service authentication encryption method suitable for power dispatching control system
CN110069918A (en) A kind of efficient double factor cross-domain authentication method based on block chain technology
CN106327184A (en) Intelligent mobile terminal payment system and intelligent mobile terminal payment method based on safe hardware isolation
CN109257328B (en) Safe interaction method and device for field operation and maintenance data
US20140281493A1 (en) Provisioning sensitive data into third party
CN104753881A (en) WebService security certification access control method based on software digital certificate and timestamp
CN104735068A (en) SIP security authentication method based on commercial passwords
CN103634265B (en) Method, equipment and the system of safety certification
CN103312691A (en) Method and system for authenticating and accessing cloud platform
CN110061849A (en) Verification method, server, mobile unit and the storage medium of mobile unit
CN106953732B (en) Key management system and method for chip card
CN106713279A (en) Video terminal identity authentication system
CN111210287A (en) Tax UKey-based invoicing method and system
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN106060078A (en) User information encryption method, user registration method and user validation method applied to cloud platform
CN113312664B (en) User data authorization method and user data authorization system
CN103701787A (en) User name password authentication method implemented on basis of public key algorithm
CN109905384B (en) Data migration method and system
CN116232593B (en) Multi-password module sensitive data classification and protection method, equipment and system
CN111435390A (en) Safety protection method for operation and maintenance tool of power distribution terminal
CN102065092A (en) Method and system for authorizing digital signature of application program of set top box
CN106953731A (en) The authentication method and system of a kind of terminal management person

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Gao Lingchao

Inventor after: Jingwenfeng

Inventor after: Li Jihong

Inventor after: Chen Jian

Inventor after: Qin Junning

Inventor after: Bu Jing

Inventor after: Wang Zhiqiang

Inventor after: Jiang Ying

Inventor after: Kong Wenjie

Inventor after: Lu Wenda

Inventor after: Zhou Yang

Inventor after: Ge Huali

Inventor after: Dai Bo

Inventor after: Wang Hongkai

Inventor after: Wang Jian

Inventor after: Bai Wanjian

Inventor after: Li Dong

Inventor after: Wang Yong

Inventor after: Liu Fanfan

Inventor after: Tang Linlin

Inventor after: Guo Gang

Inventor after: Zhang Fuhua

Inventor after: Dong Aiqiang

Inventor after: Guo Jian

Inventor after: Wu Jiasheng

Inventor after: Liu Liwei

Inventor after: Xu Chuanbo

Inventor after: Wang Xiaoping

Inventor after: Yu Yangqi

Inventor after: Chen Kun

Inventor before: Gao Lingchao

Inventor before: Jingwenfeng

Inventor before: Li Jihong

Inventor before: Chen Jian

Inventor before: Qin Junning

Inventor before: Bu Jing

Inventor before: Wang Zhiqiang

Inventor before: Jiang Ying

Inventor before: Kong Wenjie

Inventor before: Lu Wenda

Inventor before: Zhou Yang

Inventor before: Ge Huali

Inventor before: Dai Bo

Inventor before: Wang Hongkai

Inventor before: Wang Jian

Inventor before: Bai Wanjian

Inventor before: Li Dong

Inventor before: Wang Yong

Inventor before: Liu Fanfan

Inventor before: Tang Linlin

Inventor before: Guo Gang

Inventor before: Zhang Fuhua

Inventor before: Dong Aiqiang

Inventor before: Guo Jian

Inventor before: Wu Jiasheng

Inventor before: Liu Liwei

Inventor before: Xu Chuanbo

Inventor before: Wang Xiaoping

Inventor before: Yu Yangqi

Inventor before: Chen Kun

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190319