CN109687958A - A kind of design of art work certificate and verification method based on fidelity block chain - Google Patents
A kind of design of art work certificate and verification method based on fidelity block chain Download PDFInfo
- Publication number
- CN109687958A CN109687958A CN201811616876.3A CN201811616876A CN109687958A CN 109687958 A CN109687958 A CN 109687958A CN 201811616876 A CN201811616876 A CN 201811616876A CN 109687958 A CN109687958 A CN 109687958A
- Authority
- CN
- China
- Prior art keywords
- certificate
- block chain
- art work
- fidelity
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Abstract
The invention discloses a kind of design of art work certificate and verification method based on fidelity block chain, it is characterized in that, fidelity block chain is constructed using art work certifying organization as node, all nodes in fidelity block chain obtain public private key by privacy sharing, it is signed using identical private key to the characteristic information by the art work after Jianzhen, as the anti-fake verification mark in the art work certificate, the certificate of generation is saved into fidelity block chain, arbitrary node can be verified by certificate of the public private key to the art work on the block chain;The specific steps of this method include update and revocation of (1) building fidelity block chain (2) using group's public key PK Generative Art product certificate (3) the verifying certificate true and false (4) certificate.
Description
Technical field
The invention belongs to network communication technology fields, further relate to one of technical field of network security and are based on protecting
The art work certificate of true block chain designs and verification method.Present invention can apply to carry out digitlization guarantor to the art work after Jianzhen
Very, when needing to identify the true and false of a certain part art work, the method verified to it based on block chain certificate.
Background technique
Global art work industry is annoying to the fidelity of the art work, the Jianzhen and fidelity process to the art work can be by artificial
Manipulation, subjective colo(u)r is serious, value float it is excessive, it would be highly desirable to standardize.Block chain technology applies mould with believable account book
Formula utilizes the chain structures such as hash function and Merkel tree, it is ensured that data are open and clear, no under the framework of decentralization
It is tampered.The art work is subjected to digitized processing and persistence in combination with technologies such as image procossing, finger prints processings, also can be used as
The voucher of anti-fake Jianzhen.
Secret sharing techniques are an important research contents of information security field, and it is total that equal rights are held since its is multiple
It is similar to the decentralization feature of block chain to enjoy the features such as secret, it can be further combined with realization block chain node key agreement.
The domestic cryptographic algorithm in China is increasingly developed, and such as SM2, SM3, SM4, SM9 etc. is combined with domestic password, pushes information security
The progress in field.
Summary of the invention
It is an object of the invention in view of the above-mentioned problems, propose it is a kind of based on fidelity block chain the art work certificate design and
Verification method realizes the verifying of the art work identity under fidelity block chain using the method for block chain certificate.
Realizing the thinking of the object of the invention is: fidelity block chain, fidelity area are constructed using art work certifying organization as node
All nodes in block chain obtain public private key by privacy sharing, using identical private key to the art work after passing through Jianzhen
Characteristic information is signed, and as the anti-fake verification mark in the art work certificate, the certificate of generation is saved into fidelity block
Chain, arbitrary node can be verified by certificate of the public private key to the art work on the block chain.
The specific steps of this method include the following:
(1) fidelity block chain is constructed:
(1a) determines the art work verification machine that fidelity chain is added according to the quantity of the open ended node of block chain communication capacity
Structure node VA1, VA2...VAn;
(1b) selects { x according to number of nodes on finite field (1-N)1, x2L xnCorresponding with each node and openly;
(1c) each node combines the IDi of itself successively to calculate using hash 256 domestic password SM3 algorithmsAnd wherein a certain node VAi is issued in order, whereinIndicate xiI power;
(1d) VAi calculates generation system private key SK secrecy, successively calculatesIt sends
To VA1, calculateIt is sent to VA2... calculatingIt is sent to VAn, is finally calculatedSecret is protected
It deposits, generates the corresponding public key of PK and openly, whereinIndicate xiI power;
(1e) all nodes can be calculated by shamir privacy sharing algorithm and obtain SK;
(1f) if there is new node be added when, can only by include system again in n node authentication after obtain
m1-mn, and then SK is calculated;
(2) PK Generative Art product certificate is utilized:
(2a) arbitrary node VAi generates the anti-counterfeit certificate of the art work after art work is accredited as genuine piece between one,
1: the certificate serial number .2: issuer Information ID that Time of Day etc. automatically forms i.3 the content of certificate includes: identifying the art work
When extracted characteristic information, massage.4 is obtained after digital processing: the cryptographic Hash Hash of characteristic information
(massage) the signing messages Sign (massage) that .5:VAi is signed using public public key PK and domestic cryptographic algorithm SM9
6: current value and current owner's information .7: other relevant informations such as circulation process;
The certificate of the art work is stored in block chain by (2b) VAi;
(3) the certificate true and false is verified:
When any one node needs to verify the art work true and false on (3a) fidelity block chain, the art work certificate is extracted,
Extract the characteristic information newmassage of the art work again simultaneously;
(3b) inquires the state of the certificate on block chain, no to then follow the steps if state is very, to then follow the steps (3c)
(3f);
Whether (3c) calculates Hash (massage) and sees identical as in certificate, if so, thening follow the steps (3d), otherwise holds
Row step (3f);
Whether (3d) calculating Hash (newmassage) is identical as Hash (massage) in certificate, if so, executing step
Suddenly (3e), it is no to then follow the steps (3f);
(3e) utilizes SM9 signature verification algorithm and private key SK, verifies the correctness of signing messages, returns to verifying if correct
Otherwise success executes (3f);
(3f) terminates certification;
(4) certificate update and revocation:
(4a) inquires the art work certificate, if certificate shape if the verified art work is fakement on block chain
State is very, then certificate to be newly stored into block chain, and state is set as cancelling;
(4b) is if the verified art work is genuine piece, but when needing to change its current value or owner information, is needed
Former certificate status is set as cancelling, updates signing messages, update need to change information, regenerate certificate and upload to block
Chain.
2. the design of art work certificate and verification method according to claim 1 based on fidelity block chain, feature
It is, inquiry certificate status described in step (3b) (4a) refers to, is with the deposit of certificate cryptographic Hash when certificate is stored in block chain
, the state for returning to certificate can be set in query interface: true or revocation, the state can be carried out by the node on fidelity block chain
Inquiry.
Compared with the prior art, the present invention has the following advantages:
First, since the present invention constructs fidelity block chain, realized by the privacy sharing between fidelity block chain interior joint
Key agreement overcomes the prior art and needs to carry out key distribution and maintenance by centring system, causes maintenance load is increased to ask
Topic, so that the present invention has the advantages that better practicability and scalability in art work fidelity field.
Second, due to the certificate after persistence Jianzhen of the present invention, all art work relevant informations are stored in certificate, are passed through
Fidelity block chain carries out data safety preservation and update, optimizes the existing art work and saves system, so that the present invention is in the art work
There is good practicability in fidelity industry.
Detailed description of the invention
Fig. 1 is flow chart of the invention.
Specific embodiment
1 couple of present invention is described further with reference to the accompanying drawing.
Step 1, fidelity block chain is constructed:
According to the quantity of the open ended node of block chain communication capacity, the art work certifying organization section that fidelity chain is added is determined
Point VA1, VA2...Van,
According to number of nodes, { x is selected on finite field (1-N)1, x2L xnCorresponding with each node and openly;
Each node combines the IDi of itself successively to calculate using hash 256 domestic password SM3 algorithmsAnd wherein a certain node VAi is issued in order, whereinIndicate xiI power;
VAi calculates generation system private key SK secrecy, successively calculatesIt is sent to
VA1 is calculatedIt is sent to VA2... calculating
It is sent to VAn, is finally calculatedSecret saves, and generates the corresponding public key of PK and openly,
WhereinIndicate xiI power;
All nodes can be calculated by shamir privacy sharing algorithm and obtain SK;
If there is new node be added when, can only by include system again in n node authentication after obtain m1-mn,
And then SK is calculated.
Step 2, PK Generative Art product certificate is utilized:
Arbitrary node VAi generates the anti-counterfeit certificate of the art work, certificate after the art work is accredited as genuine piece between one
Content 1: the certificate serial number .2: issuer Information ID that Time of Day etc. automatically forms i.3 include: identify art work when institute
The characteristic information of extraction, obtains massage.4 after digital processing: cryptographic Hash Hash (massage) .5 of characteristic information:
VAi utilizes public public key PK and signing messages Sign (massage) 6 that domestic cryptographic algorithm SM9 signs: other related letters
Breath;
The certificate of the art work is stored in block chain by VAi.
Step 3, the certificate true and false is verified:
When any one node needs to verify the art work true and false on fidelity block chain, the art work certificate is extracted, simultaneously
Again the characteristic information newmassage of the art work is extracted;
The state of the certificate is inquired on block chain, if state is revocation, terminates to authenticate;
The inquiry certificate status refers to, when certificate is stored in block chain, is stored in certificate cryptographic Hash, query interface
The state for returning to certificate can be set: true or revocation, the state can be inquired by the node on fidelity block chain;
It calculates Hash (massage) and whether identical as in certificate sees, terminate to authenticate if not identical;
Whether calculating Hash (newmassage) is identical as Hash (massage) in certificate, terminates to recognize if not identical
Card;
Using SM9 signature verification algorithm and private key SK, verify the correctness of signing messages, if correct return authentication at
Function terminates to authenticate if incorrect.
Step 4, certificate update and revocation:
If the verified art work is fakement, the art work certificate is inquired on block chain, if certificate status is
Very, then certificate is newly stored into block chain, and state is set as cancelling;
The inquiry certificate status refers to, when certificate is stored in block chain, is stored in certificate cryptographic Hash, query interface
The state for returning to certificate can be set: true or revocation, the state can be inquired by the node on fidelity block chain;
If the verified art work is genuine piece, but when needing to change its current value or owner information, needing will be former
Certificate status is set as cancelling, and updates signing messages, and update need to change information, regenerate certificate and upload to block chain.
Claims (2)
1. a kind of design of art work certificate and verification method based on fidelity block chain, which is characterized in that with art work verification machine
Structure constructs fidelity block chain as node, and all nodes in fidelity block chain obtain public private key by privacy sharing, utilizes
Identical private key signs to the characteristic information by the art work after Jianzhen, as the anti-fake verification in the art work certificate
Mark, is saved into fidelity block chain for the certificate of generation, arbitrary node can be by public private key to the art work on the block chain
Certificate is verified;The specific steps of this method include the following:
(1) fidelity block chain is constructed:
(1a) determines the art work certifying organization section that fidelity chain is added according to the quantity of the open ended node of block chain communication capacity
Point VA1, VA2...VAn;
(1b) selects { x according to number of nodes on finite field (1-N)1, x2L xnCorresponding with each node and openly;
1c) each node combines the IDi of itself successively to calculate using hash 256 domestic password SM3 algorithmsAnd wherein a certain node VAi is issued in order, whereinIndicate xiI power;
(1d) VAi calculates generation system private key SK secrecy, successively calculatesIt is sent to
VA1 is calculatedIt is sent to VA2... calculating
It is sent to VAn, is finally calculatedSecret saves, and generates the corresponding public key of PK and openly,
WhereinIndicate xiI power;
(1e) all nodes can be calculated by shamir privacy sharing algorithm and obtain SK;
(1f) if there is new node be added when, can only by include system again in n node authentication after obtain m1-mn,
And then SK is calculated;
(2) PK Generative Art product certificate is utilized:
(2a) arbitrary node VAi generates the anti-counterfeit certificate of the art work, certificate after the art work is accredited as genuine piece between one
Content 1: the certificate serial number .2: issuer Information ID that Time of Day etc. automatically forms i.3 include: identify art work when institute
The characteristic information of extraction, obtains massage.4 after digital processing: cryptographic Hash Hash (massage) .5 of characteristic information:
The signing messages Sign (massage) 6: current value that VAi is signed using public public key PK and domestic cryptographic algorithm SM9 with
Current owner's information .7: other relevant informations such as circulation process;
The certificate of the art work is stored in block chain by (2b) VAi;
(3) the certificate true and false is verified:
When any one node needs to verify the art work true and false on (3a) fidelity block chain, the art work certificate is extracted, simultaneously
Again the characteristic information newmassage of the art work is extracted;
(3b) inquires the state of the certificate on block chain, no to then follow the steps if state is very, to then follow the steps (3c)
(3f);
Whether (3c) calculates Hash (massage) and sees identical as in certificate, if so, thening follow the steps (3d), otherwise executes step
Suddenly (3f);
Whether (3d) calculating Hash (newmassage) is identical as Hash (massage) in certificate, if so, thening follow the steps
(3e), it is no to then follow the steps (3f);
(3e) utilizes SM9 signature verification algorithm and private key SK, verifies the correctness of signing messages, returned if correct verifying at
Otherwise function executes (3f);
(3f) terminates certification;
(4) certificate update and revocation:
(4a) inquires the art work certificate, if certificate status is if the verified art work is fakement on block chain
Very, then certificate is newly stored into block chain, and state is set as cancelling;
(4b) is if the verified art work is genuine piece, but when needing to change its current value or owner information, needing will be former
Certificate status is set as cancelling, and updates signing messages, and update need to change information, regenerate certificate and upload to block chain.
2. the design of art work certificate and verification method according to claim 1 based on fidelity block chain, which is characterized in that
Inquiry certificate status described in step (3b) (4a) refers to, when certificate is stored in block chain, is to be stored in certificate cryptographic Hash, looks into
Asking interface can be set the state for returning to certificate: true or revocation, the state can be inquired by the node on fidelity block chain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811616876.3A CN109687958A (en) | 2018-12-28 | 2018-12-28 | A kind of design of art work certificate and verification method based on fidelity block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811616876.3A CN109687958A (en) | 2018-12-28 | 2018-12-28 | A kind of design of art work certificate and verification method based on fidelity block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109687958A true CN109687958A (en) | 2019-04-26 |
Family
ID=66190064
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811616876.3A Pending CN109687958A (en) | 2018-12-28 | 2018-12-28 | A kind of design of art work certificate and verification method based on fidelity block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109687958A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080195862A1 (en) * | 2007-02-12 | 2008-08-14 | Research In Motion Limited | Providing personal certificate warnings in a system and method for processing messages composed by a user |
CN101547099A (en) * | 2009-05-07 | 2009-09-30 | 张键红 | Elliptical curve-based method and elliptical curve-based device for self-authenticating signature |
CN106503994A (en) * | 2016-11-02 | 2017-03-15 | 西安电子科技大学 | Block chain private data access control method based on encryption attribute |
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
CN106991573A (en) * | 2017-04-07 | 2017-07-28 | 中链科技有限公司 | Art work fidelity method and server based on block chain technology |
CN107769925A (en) * | 2017-09-15 | 2018-03-06 | 山东大学 | Public key infrastructure system and its certificate management method based on block chain |
CN108712261A (en) * | 2018-05-10 | 2018-10-26 | 杭州智块网络科技有限公司 | A kind of key generation method, device and medium based on block chain |
CN108768630A (en) * | 2018-05-25 | 2018-11-06 | 全链通有限公司 | The encryption communication method and system of block chain node |
US20180322491A1 (en) * | 2017-03-31 | 2018-11-08 | Vijay K. Madisetti | Method and System for Blockchain-Based Combined Identity, Ownership, Integrity and Custody Management |
-
2018
- 2018-12-28 CN CN201811616876.3A patent/CN109687958A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080195862A1 (en) * | 2007-02-12 | 2008-08-14 | Research In Motion Limited | Providing personal certificate warnings in a system and method for processing messages composed by a user |
CN101547099A (en) * | 2009-05-07 | 2009-09-30 | 张键红 | Elliptical curve-based method and elliptical curve-based device for self-authenticating signature |
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
CN106503994A (en) * | 2016-11-02 | 2017-03-15 | 西安电子科技大学 | Block chain private data access control method based on encryption attribute |
US20180322491A1 (en) * | 2017-03-31 | 2018-11-08 | Vijay K. Madisetti | Method and System for Blockchain-Based Combined Identity, Ownership, Integrity and Custody Management |
CN106991573A (en) * | 2017-04-07 | 2017-07-28 | 中链科技有限公司 | Art work fidelity method and server based on block chain technology |
CN107769925A (en) * | 2017-09-15 | 2018-03-06 | 山东大学 | Public key infrastructure system and its certificate management method based on block chain |
CN108712261A (en) * | 2018-05-10 | 2018-10-26 | 杭州智块网络科技有限公司 | A kind of key generation method, device and medium based on block chain |
CN108768630A (en) * | 2018-05-25 | 2018-11-06 | 全链通有限公司 | The encryption communication method and system of block chain node |
Non-Patent Citations (1)
Title |
---|
马晓婷等: ""基于区块链技术的跨域认证方案"", 《电子学报》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107342867B (en) | Signature verification method and device | |
CN107948143B (en) | Identity-based privacy protection integrity detection method and system in cloud storage | |
CN103268460B (en) | A kind of cloud integrity of data stored verification method | |
CN114143080A (en) | Block chain data privacy protection and sharing method based on zero knowledge proof | |
KR101425552B1 (en) | Group signature system and schemes with controllable linkability | |
CN106789090A (en) | Public key infrastructure system and semi-random participating certificate endorsement method based on block chain | |
CN108646983A (en) | The treating method and apparatus of storage service data on block chain | |
CN104994110A (en) | Method for assigning verifier for auditing cloud storage data | |
CN110264200A (en) | Block chain data processing method and device | |
CN101951388A (en) | Remote attestation method in credible computing environment | |
CN109861829B (en) | Cloud data justice auditing system supporting dynamic updating and auditing method thereof | |
CN109670826B (en) | Anti-quantum computation block chain transaction method based on asymmetric key pool | |
CN108768635A (en) | A kind of cipher mark administrative model and method suitable for Internet of things system | |
CN105721153A (en) | System and method for key exchange based on authentication information | |
CN110737915B (en) | Anti-quantum-computation anonymous identity recognition method and system based on implicit certificate | |
CN103634788A (en) | Certificateless multi-proxy signcryption method with forward secrecy | |
CN108768975A (en) | Support the data integrity verification method of key updating and third party's secret protection | |
CN104079412A (en) | Trusted PKG-free threshold proxy signature method based on identity safety of smart power grid | |
CN106611136A (en) | Data tampering verification method in cloud storage | |
Bellare et al. | Deterring certificate subversion: efficient double-authentication-preventing signatures | |
CN105187218A (en) | Digital record signature method for multicore infrastructure and verification method | |
Zhao et al. | Fuzzy identity-based dynamic auditing of big data on cloud storage | |
CN108664814A (en) | A kind of group data integrity verification method based on agency | |
CN110278081B (en) | Control method and device for group digital signature | |
CN110266653A (en) | A kind of method for authenticating, system and terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing Applicant after: IALLCHAIN Co.,Ltd. Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing. Applicant before: IALLCHAIN Co.,Ltd. |
|
CB02 | Change of applicant information | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190426 |
|
WD01 | Invention patent application deemed withdrawn after publication |