CN110233853A - It is a kind of to thumb up data cochain method and its equipment applied to block chain - Google Patents
It is a kind of to thumb up data cochain method and its equipment applied to block chain Download PDFInfo
- Publication number
- CN110233853A CN110233853A CN201910547115.5A CN201910547115A CN110233853A CN 110233853 A CN110233853 A CN 110233853A CN 201910547115 A CN201910547115 A CN 201910547115A CN 110233853 A CN110233853 A CN 110233853A
- Authority
- CN
- China
- Prior art keywords
- data
- client
- thumb
- public key
- thumbs
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Measuring And Recording Apparatus For Diagnosis (AREA)
Abstract
Data cochain method and its equipment are thumbed up applied to block chain this application discloses a kind of, block chain node receives the data cochain that thumbs up that the first client is sent and requests;Triggering verifies intelligent contract, the intelligent contract of the verification verifies the identity of first client, after verification passes through, the data that thumb up are encrypted with first client public key, and execute the cochain process for thumbing up data of the first client public key encryption;The block chain node receives the inquiry request for thumbing up data of the second client, and the inquiry request for thumbing up data includes the second client public key;Triggering verifies intelligent contract, the intelligent contract of the verification verifies the identity of second client, after verification passes through, the data that thumb up are encrypted with second client public key, and execute the cochain process for thumbing up data of the second client public key encryption.The application can will thumb up data cochain, disclose credible.
Description
Technical field
This application involves block chain technical field more particularly to it is a kind of applied to block chain thumb up data cochain method and
Its equipment.
Background technique
Currently, block chain technology is the peer-to-peer network based on decentralization, with open source software Cryptography Principles, when ordinal number
It is combined according to common recognition mechanism, to ensure the coherent of each node in distributed data base and continue, so that information is verified immediately, can
Retrospect, but be difficult to tamper with and can not shield, to create a set of privacy, shareable value system efficiently, safe.
The existing database for thumbing up platform all and being using centralization, saves the like time of commodity, thumbs up the time, uses
Family thumbs up the contents such as the mobile phone used;However, thumbing up the database of platform, there is data to be tampered, the authenticity of data
The problems such as operation platform that cannot be guaranteed, and thumb up modifies the like time of certain commodity, deletes situations such as user's difference is commented.Especially
To it is some it is small thumb up platform, the Information Security and authenticity of commodity all cannot be guaranteed: and commodity or service
To thumb up content untrue, can mislead to user, influence the experience of user.
Therefore, how can not distort based on block chain, the data for thumbing up platform are stored in block chain by believable mode
On, become urgent problem to be solved.
Above content is only used for the technical solution that auxiliary understands the application, does not represent and recognizes that above content is existing skill
Art.
Summary of the invention
To solve the above-mentioned problems, the application provides a kind of thumbing up data cochain method and its set applied to block chain
Standby, this method can allow the data cochain thumbed up so that on chain to thumb up data credible, it is open and clear.
The application first aspect, which provides, a kind of thumbs up data cochain method applied to block chain, which comprises
Block chain node receives the data cochain that thumbs up that the first client is sent and requests, described to thumb up data cochain request packet
Include first client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, verifies
By rear, the data that thumb up are encrypted with first client public key, and execute first client public key and add
The close cochain process for thumbing up data;
The block chain node receives the inquiry request for thumbing up data of the second client, described to thumb up looking into for data
Asking request includes the second client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client, verifies
By rear, the data that thumb up are encrypted with second client public key, and execute second client public key and add
The close cochain process for thumbing up data.
In a kind of possible embodiment, the method also includes: the block chain node receives second client
End sends and thumbs up data inquiry request;
The block chain node sending point praises data query and responds to second client, and the data query that thumbs up is rung
Data should be thumbed up including the encryption of the second client public key, in order to which the second client own private key is to second visitor
The data that thumb up of family end public key encryption are decrypted.
In a kind of possible embodiment, it is described thumb up data be the corresponding user of first client thumb up it is flat
The operation data of platform, including like time, thumb up the time, thumb up content and thumb up type.
In a kind of possible embodiment, the first client own public key thumbs up data encryption, tool to described
Body are as follows: first client is with own public key to the encryption for thumbing up data and carrying out preset ratio.
In a kind of possible embodiment, the data that thumb up include relating attribute and dereferenced attribute;Wherein, described
The attribute value for thumbing up data correlation attribute is superimposed automatically.
The application second aspect provide it is a kind of thumb up data cochain equipment applied to block chain, the equipment is block chain
Node, the equipment include receiving unit and processing unit;Wherein,
The receiving unit receives the data cochain that thumbs up that the first client is sent and requests, and the data cochain that thumbs up is asked
It asks including first client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client
It is verified, after verification passes through, the data that thumb up is encrypted with first client public key, and execute described first
The cochain process for thumbing up data of client public key encryption;
The receiving unit receives the inquiry request for thumbing up data of the second client, described to thumb up looking into for data
Asking request includes the second client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of second client
It is verified, after verification passes through, the data that thumb up is encrypted with second client public key, and execute described second
The cochain process for thumbing up data of client public key encryption.
In a kind of possible embodiment, the equipment includes transmission unit;The receiving unit receives described second
Client transmission thumbs up data inquiry request;
The transmission unit, transmission thumb up data query and respond to second client, and the data query that thumbs up is rung
Data should be thumbed up including the encryption of the second client public key, in order to which the second client own private key is to second visitor
The data that thumb up of family end public key encryption are decrypted.
In a kind of possible embodiment, it is described thumb up data be the corresponding user of first client thumb up it is flat
The operation data of platform, including like time, thumb up the time, thumb up content and thumb up type.
In a kind of possible embodiment, the first client own public key thumbs up data encryption, tool to described
Body are as follows: first client is with own public key to the encryption for thumbing up data and carrying out preset ratio.
In a kind of possible embodiment, the data that thumb up include relating attribute and dereferenced attribute;Wherein, it states a little
The attribute value for praising data correlation attribute is superimposed automatically.
The application can allow the data cochain thumbed up so that on chain to thumb up data credible, it is open and clear.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.
Fig. 1 is provided by the embodiments of the present application a kind of to thumb up data cochain method flow schematic diagram applied to block chain;
Fig. 2 is that another data cochain method flow that thumbs up for being applied to block chain provided by the embodiments of the present application is illustrated
Figure;
Fig. 3 is provided by the embodiments of the present application a kind of to thumb up data cochain device structure schematic diagram applied to block chain.
Specific embodiment
For the clearer general idea for illustrating the application, carry out in an illustrative manner with reference to the accompanying drawings of the specification detailed
It describes in detail bright.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing
Similar object, without being used to describe a particular order or precedence order.It should be understood that the sequence used in this way is in appropriate feelings
It can be interchanged under condition, so that the embodiment of the present invention described herein can be other than those of illustrating or describing herein
Sequence implement.
In addition, term " includes " and " having " and their any deformation, it is intended that covering non-exclusive includes example
Such as, the process, method, system, product or equipment for containing a series of steps or units those of are not necessarily limited to be clearly listed
Step or unit, but may include being not clearly listed or intrinsic for these process, methods, product or equipment other
Step or unit.
So-called block chain node and client in the embodiment of the present application, it can be understood as respond extraneous certain trigger item
Part, and the abstract machine that state is converted is done by certain rule, it can be mobile phone, tablet computer, palm PC, individual's PC computer etc.
It can be according to application software and the equipment that can be networked.
As shown in Figure 1, a kind of thumb up data cochain method applied to block chain, the method includes the steps S101-
S104。
S101, block chain node receives the data cochain that thumbs up that the first client is sent and requests, described to thumb up data cochain
Request includes first client public key.
S102, triggering verify intelligent contract, and the intelligent contract of the verification verifies the identity of first client,
After verification passes through, the data that thumb up are encrypted with first client public key, and it is public to execute first client
The cochain process for thumbing up data of key encryption.
S103, the block chain node receives the inquiry request for thumbing up data of the second client, described to thumb up number
According to inquiry request include the second client public key.
S104, triggering verify intelligent contract, and the intelligent contract of the verification verifies the identity of second client,
After verification passes through, the data that thumb up are encrypted with second client public key, and it is public to execute second client
The cochain process for thumbing up data of key encryption.
In one example, the method also includes: the block chain node receives the second client transmission and thumbs up
Data inquiry request;
The block chain node sending point praises data query and responds to second client, and the data query that thumbs up is rung
Data should be thumbed up including the encryption of the second client public key, in order to which the second client own private key is to second visitor
The data that thumb up of family end public key encryption are decrypted.
In one example, the data that thumb up are the corresponding user of first client in the operand for thumbing up platform
According to, including like time, thumb up the time, thumb up content and thumb up type.
In one example, the first client own public key thumbs up data encryption to described, specifically: described
One client is with own public key to the encryption for thumbing up data and carrying out preset ratio.
In one example, the data that thumb up include relating attribute and dereferenced attribute;Wherein, described to thumb up data pass
Attribute attribute value is superimposed automatically.
In above-mentioned example, the first client is as the operator for thumbing up data, and the second client is as thumbing up looking into for data
Inquiry person;For some specifically thumbs up platform, every user is also possible to thumb up data either thumb up the operator of data
Inquiry.
Below by taking Fig. 2 as an example, the cochain method flow for thumbing up data of the application being applied on block chain is said
Bright, this method includes S201-S209.
S201, the transmission of the first client, which thumbs up data cochain, requests to give block chain node, this is thumbed up in the request of data cochain
Including the first client public key.
S202, triggers the verification intelligence contract on block chain, the verification intelligence contract to the identity of first client into
Row verification, and the point that data are thumbed up to this with first client public key and are encrypted, and first client public key is encrypted
It praises data and executes cochain process.
Block chain node is encrypted with the first client public key to data are thumbed up, which can be that will to thumb up data complete
Portion's field is encrypted, and the part field for being also possible to thumb up this data encrypts, such as: only to the comment content of privacy
It is encrypted;It is also possible to not thumb up data to this and encrypts.
In addition, it includes being divided into two attribute, relating attribute and dereferenced attribute that this, which thumbs up data,.Such as: when user thumbs up
Between, belong to dereferenced attribute, the time that thumbs up of every user may be stored on block chain;Such as: the quantity that user thumbs up,
It is exactly relating attribute, includes thumbing up quantity in the data format of a commodity, as long as there is user to thumb up the commodity, the quotient
The like time of product can be superimposed automatically.
The verification, which refers to, judges whether first client is the user for thumbing up platform, only the user for thumbing up platform
It can just have permission and this is thumbed up into data progress cochain.
It should be noted that upper chain process is the conventional process of this field, without being described in detail.Such as: in workload
It proves to be packaged data under PoW common recognition mode, verify, the block chain node for getting book keeping operation power can be by the packing block
It is placed on next block of current block, as new block cochain.
Thumbing up type includes that commodity evaluation content thumbs up, and personal preference evaluation content thumbs up, the evaluation of clothes clothing matching
Content thumbs up etc.;Such as: individual thumbs up season evaluation content, thumbs up to cuisines comment content, in film comment
That holds thumbs up etc..
S203, the block chain node sending point praise data cochain and respond to first client.
S204, the second client, which sends this and thumbs up data inquiry request, gives block chain node, this thumbs up data inquiry request
Including second client public key.
At this point, the corresponding user of the second client can be after seeing that this thumbs up data, data are thumbed up to this and are looked into
It askes.The first client and the second client are all the terminal devices for being equipped with decentralization application software in the application, all may be used
It is interacted with directly clicking through row information with the block chain link on block chain.
S205, triggers the verification intelligence contract on block chain, which carries out the identity of the second client
Verification thumbs up data to this with second client public key and encrypts, and second client public key is added after verification passes through
The close data that thumb up execute cochain process.
After verification passes through, process is performed the next step;Verification does not pass through, Flow ends.
S206, block chain node hair thumb up data query and respond to the second client.
S207, the transmission of the second client thumb up data inquiry request and give block chain node.
S208, the block chain node sending point praise data query and respond to second client, this thumbs up data query and rings
Data should be thumbed up including the encryption of the second client public key.
S209, the second client are decrypted with the data that thumb up that own private key encrypts second client public key, are obtained
Data are thumbed up to this.
The application can allow the data cochain thumbed up, and the cochain process is open and clear, the same any user for thumbing up platform
It can check that this thumbs up data;It ensure that the authenticity for thumbing up data.
It should be noted that client is directly to carry out the interaction of information, block chain with the node of block chain in the application
Information is stored directly on block chain by node, not the server of centralization, thus allow thumb up data more disclose it is credible;And
It is not that the server of existing client and centralization interacts.
As shown in figure 3, a kind of thumb up data cochain equipment applied to block chain, the equipment is block chain node, institute
Stating equipment includes receiving unit and processing unit.
The receiving unit receives the data cochain that thumbs up that the first client is sent and requests, and the data cochain that thumbs up is asked
It asks including first client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client
It is verified, after verification passes through, the data that thumb up is encrypted with first client public key, and execute described first
The cochain process for thumbing up data of client public key encryption;
The receiving unit receives the inquiry request for thumbing up data of the second client, described to thumb up looking into for data
Asking request includes the second client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of second client
It is verified, after verification passes through, the data that thumb up is encrypted with second client public key, and execute described second
The cochain process for thumbing up data of client public key encryption.
In one example, the equipment includes transmission unit;The receiving unit receives second client and sends
Thumb up data inquiry request;
The transmission unit, transmission thumb up data query and respond to second client, and the data query that thumbs up is rung
Data should be thumbed up including the encryption of the second client public key, in order to which the second client own private key is to second visitor
The data that thumb up of family end public key encryption are decrypted.
In one example, the data that thumb up are the corresponding user of first client in the operand for thumbing up platform
According to, including like time, thumb up the time, thumb up content and thumb up type.
In one example, the first client own public key thumbs up data encryption to described, specifically: described
One client is with own public key to the encryption for thumbing up data and carrying out preset ratio.
In one example, the data that thumb up include relating attribute and dereferenced attribute;Wherein, described to thumb up data pass
Attribute attribute value is superimposed automatically.
The application can allow the data cochain thumbed up, and the cochain process is open and clear, the same any user for thumbing up platform
It can check that this thumbs up data;It ensure that the authenticity for thumbing up data.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure
Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate
The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description.
These functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution.
Professional technician can use different methods to achieve the described function each specific application, but this realization
It is not considered that exceeding scope of the present application.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.
Claims (10)
1. a kind of thumb up data cochain method applied to block chain, which is characterized in that the described method includes:
Block chain node receives the data cochain that thumbs up that the first client is sent and requests, and the data cochain that thumbs up is requested including institute
State the first client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, and verification passes through
Afterwards, the data that thumb up are encrypted with first client public key, and executes the first client public key encryption
Thumb up the cochain process of data;
The block chain node receives the inquiry request for thumbing up data of the second client, and the inquiry for thumbing up data is asked
It asks including the second client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client, and verification passes through
Afterwards, the data that thumb up are encrypted with second client public key, and executes the second client public key encryption
Thumb up the cochain process of data.
2. the method according to claim 1, wherein the method also includes:
The block chain node receives the second client transmission and thumbs up data inquiry request;
The block chain node sending point praises data query and responds to second client, described to thumb up data query response bag
Include the encryption of the second client public key thumbs up data, in order to which the second client own private key is to second client
The data that thumb up of public key encryption are decrypted.
3. the method according to claim 1, wherein the data that thumb up are the corresponding use of first client
Family is in the operation data for thumbing up platform, including like time, thumbs up the time, thumbs up content and thumb up type.
4. the method according to claim 1, wherein the first client own public key thumbs up number to described
According to encryption, specifically:
First client is with own public key to the encryption for thumbing up data and carrying out preset ratio.
5. the method according to claim 1, wherein the data that thumb up include relating attribute and dereferenced category
Property;Wherein,
The attribute value for thumbing up data correlation attribute is superimposed automatically.
6. a kind of thumb up data cochain equipment applied to block chain, which is characterized in that the equipment is block chain node, described
Equipment includes receiving unit and processing unit;Wherein,
The receiving unit receives the data cochain that thumbs up that the first client is sent and requests, described to thumb up data cochain request packet
Include first client public key;
The processing unit, triggering verify intelligent contract, and the intelligence contract that verifies carries out the identity of first client
Verification encrypts the data that thumb up with first client public key, and execute first client after verification passes through
Hold the cochain process for thumbing up data of public key encryption;
The receiving unit, receives the inquiry request for thumbing up data of the second client, and the inquiry for thumbing up data is asked
It asks including the second client public key;
The processing unit, triggering verify intelligent contract, and the intelligence contract that verifies carries out the identity of second client
Verification encrypts the data that thumb up with second client public key, and execute second client after verification passes through
Hold the cochain process for thumbing up data of public key encryption.
7. equipment according to claim 6, which is characterized in that the equipment includes transmission unit;
The receiving unit receives the second client transmission and thumbs up data inquiry request;
The transmission unit, transmission thumbs up data query and responds to second client, described to thumb up data query response bag
Include the encryption of the second client public key thumbs up data, in order to which the second client own private key is to second client
The data that thumb up of public key encryption are decrypted.
8. equipment according to claim 6, which is characterized in that the data that thumb up are the corresponding use of first client
Family is in the operation data for thumbing up platform, including like time, thumbs up the time, thumbs up content and thumb up type.
9. equipment according to claim 6, which is characterized in that the first client own public key thumbs up number to described
According to encryption, specifically:
First client is with own public key to the encryption for thumbing up data and carrying out preset ratio.
10. equipment according to claim 6, which is characterized in that the data that thumb up include relating attribute and dereferenced category
Property;Wherein,
The attribute value for thumbing up data correlation attribute is superimposed automatically.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910547115.5A CN110233853A (en) | 2019-06-24 | 2019-06-24 | It is a kind of to thumb up data cochain method and its equipment applied to block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910547115.5A CN110233853A (en) | 2019-06-24 | 2019-06-24 | It is a kind of to thumb up data cochain method and its equipment applied to block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110233853A true CN110233853A (en) | 2019-09-13 |
Family
ID=67857234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910547115.5A Pending CN110233853A (en) | 2019-06-24 | 2019-06-24 | It is a kind of to thumb up data cochain method and its equipment applied to block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110233853A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111488343A (en) * | 2020-04-08 | 2020-08-04 | 北京瑞策科技有限公司 | E-commerce data uplink method and device based on business data block chain |
-
2019
- 2019-06-24 CN CN201910547115.5A patent/CN110233853A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111488343A (en) * | 2020-04-08 | 2020-08-04 | 北京瑞策科技有限公司 | E-commerce data uplink method and device based on business data block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190052647A1 (en) | Managing Access to User Profile Information via a Distributed Transaction Database | |
WO2015183698A1 (en) | Method and system for implementing data security policies using database classification | |
CN110247918A (en) | Number cochain method and its equipment are shaken applied to block chain | |
CN110232286A (en) | A kind of electric quotient data cochain method and its equipment for applying intelligent contract | |
CN110247923A (en) | Number cochain method and its equipment are shaken based on block chain | |
CN111222075A (en) | Data transmission method based on multiple Webviews, server and storage medium | |
CN110266696A (en) | A kind of evaluation data cochain method and its equipment applied to block chain | |
EP3381166A1 (en) | Systems and methods for cross-channel device binding | |
CN110247921A (en) | A kind of polled data cochain method and its equipment for applying intelligent contract | |
CN110264206A (en) | A kind of electric quotient data cochain method and its equipment based on block chain | |
CN110263529A (en) | Number cochain method and its equipment are shaken using intelligent contract | |
CN110278270A (en) | A kind of polled data cochain method and its equipment based on block chain | |
CN110233853A (en) | It is a kind of to thumb up data cochain method and its equipment applied to block chain | |
CN110263563A (en) | By means of the ad click data cochain method and its equipment of block chain | |
CN110232287A (en) | Pass through the shared economic data cochain method and its equipment of block chain | |
CN110263100A (en) | Using the shared economic data cochain method and its equipment of intelligent contract | |
Prasadreddy et al. | A threat free architecture for privacy assurance in cloud computing | |
CN110213296A (en) | It is a kind of that data cochain method and its equipment are thumbed up based on block chain | |
CN110225056A (en) | A kind of evaluation data cochain method and its equipment for applying intelligent contract | |
CN110266699A (en) | Prize drawing data cochain method and its equipment applied to block chain | |
CN110245512A (en) | Lottery data cochain method and its equipment applied to block chain | |
CN110263562A (en) | A kind of evaluation data cochain method and its equipment based on block chain | |
CN110266695A (en) | Using the lottery data cochain method and its equipment of intelligent contract | |
CN110264205A (en) | A kind of electric quotient data cochain method and its equipment applied to block chain | |
CN110213294A (en) | By means of the community data cochain method and its equipment of block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
CB02 | Change of applicant information |
Address after: No.108, 1 / F, No.9, shangdijiu street, Haidian District, Beijing 100085 Applicant after: Beijing ruice Technology Co.,Ltd. Address before: No.108, 1 / F, No.9, shangdijiu street, Haidian District, Beijing 100085 Applicant before: BEIJING AIMORECE TECHNOLOGY Co.,Ltd. |
|
CB02 | Change of applicant information | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |