CN110392889B - 用于区块链网络的基于现场可编程门阵列的可信执行环境 - Google Patents
用于区块链网络的基于现场可编程门阵列的可信执行环境 Download PDFInfo
- Publication number
- CN110392889B CN110392889B CN201980001321.4A CN201980001321A CN110392889B CN 110392889 B CN110392889 B CN 110392889B CN 201980001321 A CN201980001321 A CN 201980001321A CN 110392889 B CN110392889 B CN 110392889B
- Authority
- CN
- China
- Prior art keywords
- key
- fpga
- random number
- blockchain
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/76—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mathematical Physics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011097794.XA CN112231708B (zh) | 2019-03-26 | 2019-03-26 | 用于区块链网络的基于现场可编程门阵列的可信执行环境 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/079705 WO2019120315A2 (en) | 2019-03-26 | 2019-03-26 | Field-programmable gate array based trusted execution environment for use in a blockchain network |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011097794.XA Division CN112231708B (zh) | 2019-03-26 | 2019-03-26 | 用于区块链网络的基于现场可编程门阵列的可信执行环境 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110392889A CN110392889A (zh) | 2019-10-29 |
CN110392889B true CN110392889B (zh) | 2020-09-01 |
Family
ID=66994225
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201980001321.4A Active CN110392889B (zh) | 2019-03-26 | 2019-03-26 | 用于区块链网络的基于现场可编程门阵列的可信执行环境 |
CN202011097794.XA Active CN112231708B (zh) | 2019-03-26 | 2019-03-26 | 用于区块链网络的基于现场可编程门阵列的可信执行环境 |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011097794.XA Active CN112231708B (zh) | 2019-03-26 | 2019-03-26 | 用于区块链网络的基于现场可编程门阵列的可信执行环境 |
Country Status (10)
Country | Link |
---|---|
US (1) | US10657293B1 (zh) |
EP (1) | EP3628087B1 (zh) |
JP (1) | JP6840264B2 (zh) |
KR (1) | KR102151904B1 (zh) |
CN (2) | CN110392889B (zh) |
AU (1) | AU2019204735B2 (zh) |
CA (1) | CA3058239C (zh) |
SG (1) | SG11201909112PA (zh) |
TW (1) | TWI715338B (zh) |
WO (1) | WO2019120315A2 (zh) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113157635B (zh) * | 2019-09-25 | 2024-01-05 | 支付宝(杭州)信息技术有限公司 | 在fpga上实现合约调用的方法及装置 |
CN110716724B (zh) * | 2019-09-25 | 2021-01-08 | 支付宝(杭州)信息技术有限公司 | 基于fpga实现隐私区块链的方法及装置 |
CN112927077B (zh) * | 2019-09-25 | 2022-05-24 | 支付宝(杭州)信息技术有限公司 | 基于fpga实现合约调用的方法及装置 |
CN113285802B (zh) * | 2019-09-25 | 2022-08-19 | 支付宝(杭州)信息技术有限公司 | 基于fpga的密钥协商方法及装置 |
CN110750488B (zh) * | 2019-09-25 | 2021-02-19 | 支付宝(杭州)信息技术有限公司 | 在fpga中实现外部调用的方法及装置 |
CN110738567B (zh) * | 2019-09-25 | 2021-02-09 | 支付宝(杭州)信息技术有限公司 | 基于fpga的安全智能合约处理器的交易处理方法及装置 |
CN110716728B (zh) * | 2019-09-25 | 2020-11-10 | 支付宝(杭州)信息技术有限公司 | Fpga逻辑的可信更新方法及装置 |
CN110717203B (zh) * | 2019-09-25 | 2021-04-27 | 支付宝(杭州)信息技术有限公司 | 基于fpga实现隐私区块链的方法及装置 |
CN111538782B (zh) * | 2020-04-14 | 2023-08-08 | 浙江浙燃能源有限公司 | 基于区块链的能源大数据管理系统 |
CN111738859B (zh) * | 2020-07-08 | 2021-07-13 | 支付宝(杭州)信息技术有限公司 | 区块链一体机及区块链网络 |
CN111541553B (zh) | 2020-07-08 | 2021-08-24 | 支付宝(杭州)信息技术有限公司 | 区块链一体机的可信启动方法及装置 |
CN112491812B (zh) * | 2020-07-08 | 2022-03-01 | 支付宝(杭州)信息技术有限公司 | 区块链一体机的哈希更新方法及装置 |
CN111741028B (zh) * | 2020-08-24 | 2020-11-24 | 支付宝(杭州)信息技术有限公司 | 业务处理方法、装置、设备及系统 |
US11681832B2 (en) * | 2020-10-14 | 2023-06-20 | Infineon Technologies Ag | Electronic circuit identification (ID) techniques using both a client-side ID and a supplier-side ID |
CN112765270B (zh) * | 2020-12-31 | 2022-06-17 | 杭州趣链科技有限公司 | 区块链数据处理方法、装置、计算机设备及介质 |
US11379125B1 (en) | 2021-03-31 | 2022-07-05 | International Business Machines Corporation | Trusted field programmable gate array |
US20220417045A1 (en) * | 2021-06-28 | 2022-12-29 | Medellin Applied Research Concepts, LLC | Device for implementing gated array blockchain protection codes for iot devices |
CN114978626B (zh) * | 2022-05-10 | 2023-03-10 | 北京百度网讯科技有限公司 | 基于区块链的可信计算方法、装置、设备及介质 |
CN114969711A (zh) * | 2022-05-13 | 2022-08-30 | 北京百度网讯科技有限公司 | 一种安全认证方法、电子设备及存储介质 |
CN116614317B (zh) * | 2023-07-20 | 2023-09-12 | 中国标准化研究院 | 一种基于区块链的贸易数据处理方法及系统 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016209569A1 (en) * | 2015-06-26 | 2016-12-29 | Intel Corporation | System, apparatus and method for performing cryptographic operations in a trusted execution environment |
CN107046542A (zh) * | 2017-04-24 | 2017-08-15 | 杭州云象网络技术有限公司 | 一种在网络级采用硬件实现共识验证的方法 |
CN107294709A (zh) * | 2017-06-27 | 2017-10-24 | 阿里巴巴集团控股有限公司 | 一种区块链数据处理方法、装置及系统 |
WO2018058441A1 (en) * | 2016-09-29 | 2018-04-05 | Nokia Technologies Oy | Method and apparatus for trusted computing |
CN108055125A (zh) * | 2017-11-23 | 2018-05-18 | 阿里巴巴集团控股有限公司 | 一种产品信息的加密、解密方法及装置 |
WO2018140169A1 (en) * | 2017-01-26 | 2018-08-02 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment using encryption key |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070288765A1 (en) * | 1999-12-22 | 2007-12-13 | Kean Thomas A | Method and Apparatus for Secure Configuration of a Field Programmable Gate Array |
US6904527B1 (en) * | 2000-03-14 | 2005-06-07 | Xilinx, Inc. | Intellectual property protection in a programmable logic device |
US8516268B2 (en) * | 2010-08-23 | 2013-08-20 | Raytheon Company | Secure field-programmable gate array (FPGA) architecture |
US8898480B2 (en) * | 2012-06-20 | 2014-11-25 | Microsoft Corporation | Managing use of a field programmable gate array with reprogammable cryptographic operations |
US9118639B2 (en) * | 2013-03-14 | 2015-08-25 | Intel Corporation | Trusted data processing in the public cloud |
US20140344581A1 (en) * | 2013-05-16 | 2014-11-20 | Cisco Technology, Inc. | Secure Upgrades for Field Programmable Devices |
US11941588B2 (en) * | 2015-11-06 | 2024-03-26 | Cable Television Laboratories, Inc. | Systems and methods for blockchain virtualization and scalability |
US10984081B2 (en) * | 2016-09-30 | 2021-04-20 | Cable Television Laboratories, Inc. | Systems and methods for secure person to device association |
US10594495B2 (en) * | 2016-12-23 | 2020-03-17 | Walmart Apollo, Llc | Verifying authenticity of computer readable information using the blockchain |
US10382485B2 (en) * | 2016-12-23 | 2019-08-13 | Vmware, Inc. | Blockchain-assisted public key infrastructure for internet of things applications |
WO2018125989A2 (en) * | 2016-12-30 | 2018-07-05 | Intel Corporation | The internet of things |
US10476879B2 (en) * | 2017-07-26 | 2019-11-12 | International Business Machines Corporation | Blockchain authentication via hard/soft token verification |
CN109492419B (zh) * | 2018-11-27 | 2022-07-01 | 众安信息技术服务有限公司 | 用于获取区块链中的数据的方法、装置及存储介质 |
-
2019
- 2019-03-26 EP EP19732223.3A patent/EP3628087B1/en active Active
- 2019-03-26 WO PCT/CN2019/079705 patent/WO2019120315A2/en unknown
- 2019-03-26 CN CN201980001321.4A patent/CN110392889B/zh active Active
- 2019-03-26 CA CA3058239A patent/CA3058239C/en active Active
- 2019-03-26 KR KR1020197028792A patent/KR102151904B1/ko active IP Right Grant
- 2019-03-26 SG SG11201909112P patent/SG11201909112PA/en unknown
- 2019-03-26 AU AU2019204735A patent/AU2019204735B2/en active Active
- 2019-03-26 CN CN202011097794.XA patent/CN112231708B/zh active Active
- 2019-03-26 JP JP2019553842A patent/JP6840264B2/ja active Active
- 2019-09-30 US US16/587,451 patent/US10657293B1/en active Active
- 2019-12-09 TW TW108144880A patent/TWI715338B/zh active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016209569A1 (en) * | 2015-06-26 | 2016-12-29 | Intel Corporation | System, apparatus and method for performing cryptographic operations in a trusted execution environment |
WO2018058441A1 (en) * | 2016-09-29 | 2018-04-05 | Nokia Technologies Oy | Method and apparatus for trusted computing |
WO2018140169A1 (en) * | 2017-01-26 | 2018-08-02 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment using encryption key |
CN107046542A (zh) * | 2017-04-24 | 2017-08-15 | 杭州云象网络技术有限公司 | 一种在网络级采用硬件实现共识验证的方法 |
CN107294709A (zh) * | 2017-06-27 | 2017-10-24 | 阿里巴巴集团控股有限公司 | 一种区块链数据处理方法、装置及系统 |
CN108055125A (zh) * | 2017-11-23 | 2018-05-18 | 阿里巴巴集团控股有限公司 | 一种产品信息的加密、解密方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
JP6840264B2 (ja) | 2021-03-10 |
CN110392889A (zh) | 2019-10-29 |
CN112231708A (zh) | 2021-01-15 |
WO2019120315A3 (en) | 2020-02-20 |
WO2019120315A2 (en) | 2019-06-27 |
CA3058239A1 (en) | 2019-06-27 |
AU2019204735A1 (en) | 2019-06-27 |
EP3628087A4 (en) | 2020-06-24 |
CA3058239C (en) | 2021-01-05 |
SG11201909112PA (en) | 2019-10-30 |
EP3628087A2 (en) | 2020-04-01 |
TWI715338B (zh) | 2021-01-01 |
JP2020521343A (ja) | 2020-07-16 |
KR102151904B1 (ko) | 2020-09-03 |
EP3628087B1 (en) | 2021-09-08 |
AU2019204735B2 (en) | 2020-08-27 |
TW202036351A (zh) | 2020-10-01 |
US10657293B1 (en) | 2020-05-19 |
CN112231708B (zh) | 2024-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110392889B (zh) | 用于区块链网络的基于现场可编程门阵列的可信执行环境 | |
CN111066287B (zh) | 使用可信执行环境检索区块链网络的公开数据 | |
CN110998556B (zh) | 区块链网络中的数据隔离 | |
KR102392420B1 (ko) | 다중키 쌍 시그너처를 사용한 프로그램 실행 및 데이터 증명 체계 | |
JP6811339B2 (ja) | 高可用な高信頼実行環境を使用したブロックチェーンネットワークのためのパブリックデータの読み出し | |
AU2019207312B2 (en) | Distributed key management for trusted execution environments | |
JP2020528224A (ja) | 信頼できる実行環境におけるスマート契約動作のセキュアな実行 | |
TW202040398A (zh) | 使用高可用性的可信執行環境檢索區塊鏈網路的存取資料 | |
CN111066019A (zh) | 处理存储在区块链网络中的数据元素 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 40017035 Country of ref document: HK |
|
TR01 | Transfer of patent right |
Effective date of registration: 20201012 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Patentee after: Innovative advanced technology Co.,Ltd. Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Patentee before: Advanced innovation technology Co.,Ltd. Effective date of registration: 20201012 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Patentee after: Advanced innovation technology Co.,Ltd. Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands Patentee before: Alibaba Group Holding Ltd. |
|
TR01 | Transfer of patent right |