CN109670736A - A kind of risk management method of e-commerce transaction behavior - Google Patents
A kind of risk management method of e-commerce transaction behavior Download PDFInfo
- Publication number
- CN109670736A CN109670736A CN201910113471.6A CN201910113471A CN109670736A CN 109670736 A CN109670736 A CN 109670736A CN 201910113471 A CN201910113471 A CN 201910113471A CN 109670736 A CN109670736 A CN 109670736A
- Authority
- CN
- China
- Prior art keywords
- risk
- transaction
- commerce
- management
- commerce transaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Marketing (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Educational Administration (AREA)
- Game Theory and Decision Science (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a kind of risk management methods of e-commerce transaction behavior, comprising the following steps: S1: establishes transaction system;S2: cross-border transaction monitoring;S3: e-commerce App is established;S4: transaction risk assessment;S5: transaction risk identification;S6: transaction risk analysis;S7: transaction risk control;S8: transaction risk countermeasure management;S9 encrypted transaction data;S10: transaction authentication;S11: setting management system;S12: supervision and management center is established.The present invention is managed collectively by the way that the risk management system of e-commerce transaction behavior is arranged, it uses with the risk management system of e-commerce transaction behavior as basic e-commerce App, establish the safe data channel between trade user and system server, realization is managed collectively e-commerce transaction behavior, the mode of unified supervision, cross-border transaction monitoring is added, the risk management range of e-commerce transaction behavior is improved, improves the safety of e-commerce transaction and invisible.
Description
Technical field
The present invention relates to technical field of electronic commerce, specially a kind of risk management method of e-commerce transaction behavior.
Background technique
With the rapid development of open internet system Internet, the application of e-commerce and promotes very big and changed
Become people's Working and life styles, brings unlimited business opportunity.However, platform-internet that e-commerce development is relied on
Luoque is filled with huge, complicated security risk.The attack of hacker, wreaking havoc etc. for virus are all difficult electronic commerce affair
Safely and conveniently carry out.
In e-commerce financial transaction management, now lack the effective of the risk management of a kind of pair of e-commerce transaction behavior
Method causes risk management uncontrollable, and safety and concealment due to e-commerce transaction confusion in existing management method
Property it is poor, especially in the risk management of cross-border e-commerce financial transaction, due to lacking effective management method, be difficult to protect
Demonstrate,prove the safety of e-commerce transaction.
Summary of the invention
The purpose of the present invention is to provide a kind of risk management methods of e-commerce transaction behavior, to solve above-mentioned background
The problem of being proposed in technology.
To achieve the above object, the invention provides the following technical scheme: a kind of risk management of e-commerce transaction behavior
Method, comprising the following steps:
S1: establishing transaction system, establishes the risk of the e-commerce transaction behavior based on the network equipment centered on internet
Management system;
S2: cross-border transaction monitoring is established cross-border e-commerce transaction according to the risk management system of e-commerce transaction behavior and is supervised
Analysis module is controlled, for coping with cross-border Electronic Finance business transaction;
S3: establishing e-commerce App, is arranged by the risk management system of e-commerce transaction behavior and establishes e-commerce friendship
Easy risk management App, establishes the safe data channel between e-commerce transaction user and system server;
S4: transaction risk assessment relies on e-commerce transaction risk management App to the safety of e-commerce transaction, e-commerce
Status, information to be protected, various assets are adequately assessed and some basic security risk identifications and analysis;
S5: transaction risk identification, on the basis of collecting the information such as related full spectrum of threats, loophole and Related Measures, identification is various can
The security risk of potential threat can be caused to e-commerce system;
S6: transaction risk analysis, operation analysis compare and assess the qualitative and quantitative method of progress, determine e-commerce security
The importance of each risk elements to risk ranking and assesses its possibility consequence to e-commerce system various aspects;
S7: transaction risk control drops to an acceptable level using risk control means with support risk;
S8: transaction risk countermeasure management formulates e-commerce security Countermeasures of Risk Management for eliminating potential threat and safety
Loophole;
S9: encrypted transaction data, by using code or pin mode by important e-commerce transaction information and data from
One plaintext version being understood that is transformed into complicated entanglement, impenetrable seal form, transmits on the line or in number
It is stored according to library, ciphertext is reduced into plain text by other trade users again;
S10: transaction authentication authenticates the identity of trade user in the way of authentication and message authentication;
S11: setting management system establishes Trading Authorization control system, responsibility control system, accounting system and internal check system
With emergency measure system;
S12: establishing supervision and management center, is supervised by establishing supervision and management center to internet electronic business transaction.
Preferably, the network equipment in the step S1 includes computer system, network communication equipment, network communication circuit
And network server.
Preferably, the step S6 Risk Analysis Methods include risk probability, impact evaluation matrix, sensitivity analysis and
Analysis mode.
Preferably, the step S7 risk control means include shifting risk, losing management, insure and assume full responsibility for risks.
Preferably, the step S8 risk countermeasure management includes deep defence strategy, and the deep defence strategy includes
Physical security, periphery defence, cyber-defence, host defence, application program defence and data defence.
Preferably, data encryption mode includes symmetric cryptography and asymmetric encryption in the step S9, and is encrypted basic
Element includes key, encipheror, ciphertext, plaintext and decryption.
Preferably, authentication includes digital signature identification, digital authenticating and authentication techniques, biology in the step S10
Feature identification certification.
Preferably, supervision and management center supervision method includes Third-party payment supervision, network credit prison in the step S12
Pipe, Internet bank's supervision and crowd raise financing supervision.
Compared with prior art, the beneficial effects of the present invention are: the strict control of the present invention e-commerce transaction behavior
The method of risk management, the risk management system by the way that e-commerce transaction behavior is arranged are managed collectively, are used with electronics
The risk management system of business transaction behavior is basic e-commerce App, establishes the peace between trade user and system server
Full data channel, realization are managed collectively e-commerce transaction behavior, the mode of unified supervision, add cross-border transaction prison
Control, improves the risk management range of e-commerce transaction behavior, and traffic is excessively assessed transaction risk, identifies, analyzes, controlled
It with countermeasure management, and is managed using data encryption, transaction authentication mode and supervision center, improves e-commerce transaction
Safety and invisible.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with specific embodiment, to this
Invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, not
For limiting the present invention.
A kind of risk management method of e-commerce transaction behavior, comprising the following steps:
S1: establishing transaction system, establishes the risk of the e-commerce transaction behavior based on the network equipment centered on internet
Management system;
S2: cross-border transaction monitoring is established cross-border e-commerce transaction according to the risk management system of e-commerce transaction behavior and is supervised
Analysis module is controlled, for coping with cross-border Electronic Finance business transaction;
S3: establishing e-commerce App, is arranged by the risk management system of e-commerce transaction behavior and establishes e-commerce friendship
Easy risk management App, establishes the safe data channel between e-commerce transaction user and system server;
S4: transaction risk assessment relies on e-commerce transaction risk management App to the safety of e-commerce transaction, e-commerce
Status, information to be protected, various assets are adequately assessed and some basic security risk identifications and analysis;
S5: transaction risk identification, on the basis of collecting the information such as related full spectrum of threats, loophole and Related Measures, identification is various can
The security risk of potential threat can be caused to e-commerce system;
S6: transaction risk analysis, operation analysis compare and assess the qualitative and quantitative method of progress, determine e-commerce security
The importance of each risk elements to risk ranking and assesses its possibility consequence to e-commerce system various aspects;
S7: transaction risk control drops to an acceptable level using risk control means with support risk;
S8: transaction risk countermeasure management formulates e-commerce security Countermeasures of Risk Management for eliminating potential threat and safety
Loophole;
S9: encrypted transaction data, by using code or pin mode by important e-commerce transaction information and data from
One plaintext version being understood that is transformed into complicated entanglement, impenetrable seal form, transmits on the line or in number
It is stored according to library, ciphertext is reduced into plain text by other trade users again;
S10: transaction authentication authenticates the identity of trade user in the way of authentication and message authentication;
S11: setting management system establishes Trading Authorization control system, responsibility control system, accounting system and internal check system
With emergency measure system;
S12: establishing supervision and management center, is supervised by establishing supervision and management center to internet electronic business transaction.
Specifically, the network equipment in the step S1 includes computer system, network communication equipment, network communication circuit
And network server;The high performance network equipment is selected, building security, convenient and fast E-business applications environment, could be electronics
The information of business transaction provides hardware guarantee.
Specifically, the step S6 Risk Analysis Methods include risk probability, impact evaluation matrix, sensitivity analysis and
Analysis mode;It, can basis since each influence factor quantifies the difficulty in reality when carrying out e-commerce security risk analysis
Actual needs mainly carries out risk analysis using being aided with a small amount of quantitative approach based on qualitative method and combine, for formulation risk
The control of management system and risk provides theoretic foundation.
Specifically, the step S7 risk control means include shifting risk, losing management, insure and assume full responsibility for risks;
The selection of risk control method should fully consider the cost that relative risk causes damages.
Specifically, the step S8 risk countermeasure management includes deep defence strategy, the deep defence strategy includes
Physical security, periphery defence, cyber-defence, host defence, application program defence and data defence;
Physical security is the premise of entire electronic commerce system security.The purpose for formulating e-commerce physical security strategy is to protect
Each e-commerce system hardware entities such as computer system, e-commerce server and communication link are protected from natural calamity and people
Security risk caused by destroy;
Periphery defence is can to play the role of resisting outside world to the protection of network perimeter.E-commerce system should be as far as possible
Certain type of safety equipment is installed to protect each accessed node of network.For technically, firewall is network perimeter
The most important means of defence, e-commerce system should install one or multi-channel firewall, to ensure to reduce to the maximum extent
The risk of outside world, and extraneous unauthorized access and attack are found in time using intrusion detection feature;
Cyber-defence is assessed network system environment, takes certain measure to resist the attack of hacker, to ensure them
It is properly protected.For at present, the network security act of defense is a kind of reflex action of passive type, moreover, defence skill
The development speed of art also without attack technology develop not as it is fast.In order to improve network security defence capability, keep network security anti-
Protecting system is active status in the confrontation attacked and protected, in network security protection system, in addition to using passive-type to pacify
Full tool (firewall, vulnerability scanning etc.) is outside, it is also desirable to which using the initiative type safe safeguard measure, (such as: network trap, invasion are taken
Card, intrusion detection, automatic recovery etc.);
Host defence is to carry out security evaluation to each host in system, then formulates corresponding countermeasure according to assessment result
Being executed with limiting server for task.In host and its environment, safeguard protection object includes the service in user's application environment
Device, client computer and the operating system and application system installed thereon.These application be capable of providing including message reference, storage,
Service including transmission, typing etc..According to Information Assurance Technical Framework, the safeguard protection to host and its environment be first in order to
The defence line Shou Dao for preventing despiteful internal staff's attack is established, followed by external staff's ride through system protects boundary in order to prevent
And last line of defense attacked;
Application program defence is all indispensable a part in any security model.Reinforce protection operating system security only
A degree of protection can be provided.Therefore, the developer of e-commerce system has a responsibility for for safeguard protection being dissolved into using journey
In sequence, so that the region that may have access to application program in architecture provides special protection.Application program is present in system
Environment in;
The protection to e-commerce transaction and related data is reinforced in data defence, to the safety and e-commerce of e-commerce system
The normal operation of project has important practical significance.
Specifically, data encryption mode includes symmetric cryptography and asymmetric encryption in the step S9, and encrypt basic
Element includes key, encipheror, ciphertext, plaintext and decryption;
Symmetric cryptography sender key encrypting plaintext, sends recipient to, and recipient is decrypted with same key, its main feature is that plus
Close and decryption uses the same key;
Asymmetric encryption includes public-key cryptography and private cipher key, and after key pair generates, public-key cryptography is in a manner of unclassified to granddad
It opens, corresponds only to generate the publisher for changing key, private cipher key is then stored in cipher key distribution Fang Shouli, any to obtain public-key cryptography
User the cipher key encryption information can be used to be sent to the publisher of the disclosure key, and publisher obtains encryption information
Afterwards, it is decrypted using with the private cipher key that public-key cryptography is mutually coped with.
Specifically, authentication includes digital signature identification, digital authenticating and authentication techniques, biology in the step S10
Feature identification certification.
Specifically, supervision and management center supervision method includes Third-party payment supervision, network credit prison in the step S12
Pipe, Internet bank's supervision and crowd raise financing supervision.
In summary: the method for the risk management of the strict control of the present invention e-commerce transaction behavior passes through setting electricity
The risk management system of sub- business transaction behavior is managed collectively, and is used with the risk management system of e-commerce transaction behavior
For basic e-commerce App, the safe data channel between trade user and system server is established, realizes and e-commerce is handed over
Easy is to be managed collectively, and the mode of unified supervision adds cross-border transaction monitoring, improves the risk of e-commerce transaction behavior
Range of management, traffic is assessed transaction risk, identified excessively, analyzed, controlled and countermeasure management, and using data encryption, friendship
Easy authentication mode and supervision center are managed, and improve the safety of e-commerce transaction and invisible.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (8)
1. a kind of risk management method of e-commerce transaction behavior, it is characterised in that: the following steps are included:
S1: establishing transaction system, establishes the risk of the e-commerce transaction behavior based on the network equipment centered on internet
Management system;
S2: cross-border transaction monitoring is established cross-border e-commerce transaction according to the risk management system of e-commerce transaction behavior and is supervised
Analysis module is controlled, for coping with cross-border Electronic Finance business transaction;
S3: establishing e-commerce App, is arranged by the risk management system of e-commerce transaction behavior and establishes e-commerce friendship
Easy risk management App, establishes the safe data channel between e-commerce transaction user and system server;
S4: transaction risk assessment relies on e-commerce transaction risk management App to the safety of e-commerce transaction, e-commerce
Status, information to be protected, various assets are adequately assessed and some basic security risk identifications and analysis;
S5: transaction risk identification, on the basis of collecting the information such as related full spectrum of threats, loophole and Related Measures, identification is various can
The security risk of potential threat can be caused to e-commerce system;
S6: transaction risk analysis, operation analysis compare and assess the qualitative and quantitative method of progress, determine e-commerce security
The importance of each risk elements to risk ranking and assesses its possibility consequence to e-commerce system various aspects;
S7: transaction risk control drops to an acceptable level using risk control means with support risk;
S8: transaction risk countermeasure management formulates e-commerce security Countermeasures of Risk Management for eliminating potential threat and safety
Loophole;
S9: encrypted transaction data, by using code or pin mode by important e-commerce transaction information and data from
One plaintext version being understood that is transformed into complicated entanglement, impenetrable seal form, transmits on the line or in number
It is stored according to library, ciphertext is reduced into plain text by other trade users again;
S10: transaction authentication authenticates the identity of trade user in the way of authentication and message authentication;
S11: setting management system establishes Trading Authorization control system, responsibility control system, accounting system and internal check system
With emergency measure system;
S12: establishing supervision and management center, is supervised by establishing supervision and management center to internet electronic business transaction.
2. a kind of risk management method of e-commerce transaction behavior according to claim 1, it is characterised in that: the step
The network equipment in rapid S1 includes computer system, network communication equipment, network communication circuit and network server.
3. a kind of risk management method of e-commerce transaction behavior according to claim 1, it is characterised in that: the step
Rapid S6 Risk Analysis Methods include risk probability, impact evaluation matrix, sensitivity analysis and analysis mode.
4. a kind of risk management method of e-commerce transaction behavior according to claim 1, it is characterised in that: the step
Rapid S7 risk control means include shifting risk, losing management, insure and assume full responsibility for risks.
5. a kind of risk management method of e-commerce transaction behavior according to claim 1, it is characterised in that: the step
Rapid S8 risk countermeasure management includes deep defence strategy, and the deep defence strategy includes physical security, periphery defence, network
Defence, host defence, application program defence and data defence.
6. a kind of risk management method of e-commerce transaction behavior according to claim 1, it is characterised in that: the step
Data encryption mode includes symmetric cryptography and asymmetric encryption in rapid S9, and the fundamental encrypted include key, encipheror,
Ciphertext, plaintext and decryption.
7. a kind of risk management method of e-commerce transaction behavior according to claim 1, it is characterised in that: the step
Authentication includes digital signature identification, digital authenticating and authentication techniques, living things feature recognition certification in rapid S10.
8. a kind of risk management method of e-commerce transaction behavior according to claim 1, it is characterised in that: the step
Supervision and management center supervision method includes that Third-party payment supervision, the supervision of network credit, Internet bank's supervision and crowd raise in rapid S12
Financing supervision.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910113471.6A CN109670736A (en) | 2019-02-12 | 2019-02-12 | A kind of risk management method of e-commerce transaction behavior |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910113471.6A CN109670736A (en) | 2019-02-12 | 2019-02-12 | A kind of risk management method of e-commerce transaction behavior |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109670736A true CN109670736A (en) | 2019-04-23 |
Family
ID=66152044
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910113471.6A Pending CN109670736A (en) | 2019-02-12 | 2019-02-12 | A kind of risk management method of e-commerce transaction behavior |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109670736A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112115474A (en) * | 2020-10-21 | 2020-12-22 | 土流集团有限公司 | Land flow transfer safety transaction system |
CN113408894A (en) * | 2021-06-18 | 2021-09-17 | 南京昊华科技有限公司 | Auction asset risk monitoring and evaluating system and method based on cloud computing |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102710770A (en) * | 2012-06-01 | 2012-10-03 | 汪德嘉 | Identification method for network access equipment and implementation system for identification method |
CN108428173A (en) * | 2018-01-31 | 2018-08-21 | 孙中东 | 1+1+N Internet banks application architecture and its business model application |
CN109167832A (en) * | 2018-09-03 | 2019-01-08 | 许晓山 | A kind of e-commerce system based on cloud computing |
-
2019
- 2019-02-12 CN CN201910113471.6A patent/CN109670736A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102710770A (en) * | 2012-06-01 | 2012-10-03 | 汪德嘉 | Identification method for network access equipment and implementation system for identification method |
CN108428173A (en) * | 2018-01-31 | 2018-08-21 | 孙中东 | 1+1+N Internet banks application architecture and its business model application |
CN109167832A (en) * | 2018-09-03 | 2019-01-08 | 许晓山 | A kind of e-commerce system based on cloud computing |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112115474A (en) * | 2020-10-21 | 2020-12-22 | 土流集团有限公司 | Land flow transfer safety transaction system |
CN113408894A (en) * | 2021-06-18 | 2021-09-17 | 南京昊华科技有限公司 | Auction asset risk monitoring and evaluating system and method based on cloud computing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Barona et al. | A survey on data breach challenges in cloud computing security: Issues and threats | |
Razzaq et al. | Security issues in the Internet of Things (IoT): A comprehensive study | |
Srivastava et al. | XAI for cybersecurity: state of the art, challenges, open issues and future directions | |
Kolokotronis et al. | Secured by blockchain: Safeguarding internet of things devices | |
Bibhu et al. | Robust Secured Framework for Online Business Transactions over Public Network | |
Hamdani et al. | Cybersecurity standards in the context of operating system: Practical aspects, analysis, and comparisons | |
Rani et al. | Cyber security techniques, architectures, and design | |
Bedi et al. | Threat‐oriented security framework in risk management using multiagent system | |
CN109670736A (en) | A kind of risk management method of e-commerce transaction behavior | |
Haruna et al. | Defending against cybersecurity threats to the payments and banking system | |
Telo | Understanding Security Awareness Among Bank Customers: A Study Using Multiple Regression Analysis | |
Erinle et al. | SoK: Design, vulnerabilities and defense of cryptocurrency wallets | |
Valadares et al. | Security challenges and recommendations in 5G-IoT scenarios | |
Uyyala | Multilevel Authentication System Using Hierarchical Intrusion Detection Architecture For Online Banking | |
Waziri et al. | A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania | |
Kujo | Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft tools | |
Gorton | Using incident response trees as a tool for risk management of online financial services | |
Ankele et al. | SoK: Cyber-Attack Taxonomy of Distributed Ledger-and Legacy Systems-based Financial Infrastructures | |
Pitropakis et al. | Cloud security, privacy and trust baselines | |
Noor et al. | A systematic literature review on endpoint vulnerabilities of blockchain applications | |
Gottipati | A proposed cybersecurity model for cryptocurrency exchanges | |
McGee et al. | How to counter cybercrime intrusions | |
Yakubdjanovna et al. | Analysis of Information Security Problems in Electronic Management with Possible Solutions | |
Mohammed | Application of deep learning in fraud detection in payment systems | |
Zhang et al. | Controlling Network Risk in E-commerce |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20190717 Address after: 250300 No. 2399 University Road, Science Park, Changqing University, Jinan City, Shandong Province Applicant after: SHANDONG WOMEN'S University Address before: 276100 No. 29, Group II, Huanglou Village, Tancheng Town, Tancheng County, Linyi City, Shandong Province Applicant before: Huang Hong |
|
TA01 | Transfer of patent application right | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190423 |
|
WD01 | Invention patent application deemed withdrawn after publication |