CN111460480A - Secure ciphertext file sharing method in ciphertext search system - Google Patents
Secure ciphertext file sharing method in ciphertext search system Download PDFInfo
- Publication number
- CN111460480A CN111460480A CN202010244397.4A CN202010244397A CN111460480A CN 111460480 A CN111460480 A CN 111460480A CN 202010244397 A CN202010244397 A CN 202010244397A CN 111460480 A CN111460480 A CN 111460480A
- Authority
- CN
- China
- Prior art keywords
- file
- ciphertext
- data
- search
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/182—Distributed file systems
- G06F16/1824—Distributed file systems implemented using Network-attached Storage [NAS] architecture
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of information security, and discloses a secure ciphertext file sharing method in a ciphertext search system. The invention provides safe ciphertext file sharing service for users based on password management, the users only need to log in own client and select the users, files and file keywords to be shared, and the file sharing can be realized without transmitting search keys in the sharing process. The shared user can obtain the shared file by only updating the ciphertext index of the shared user and obtaining the file key from the ciphertext management, so that the division of the authority is realized, and the security of the file sharing process is improved.
Description
Technical Field
The invention relates to the technical field of information security, in particular to a secure ciphertext file sharing method in a ciphertext search system.
Background
The existing ciphertext search system has the following problems:
(1) file sharing security is low. When the searchable encryption technology shares the ciphertext file, the file key and the search key are directly delivered to the shared user in a 'secure channel' mode, and even if the shared user safely obtains the search key and the decryption key, the key is difficult to prevent from being leaked in subsequent continuous sharing, so that the security of the stored ciphertext file is reduced.
(2) The user experience is poor. When a user shares a ciphertext file, no clear 'safe channel' transmission method is used for engineering realization, and a method for manually transmitting a key through a line is too complicated, so that the application of a searchable encryption technology is hindered.
(3) The file sharing security responsibility boundary is unclear. The ciphertext file is shared and has safety responsibility, the safety responsibility is bound to be caused by simple secret key sharing, one-way responsibility and simple audit, the responsibility traceability in the ciphertext file sharing process is not facilitated, the enthusiasm of all users for sharing the ciphertext file is contused, and the popularization of a ciphertext searching technology is not facilitated.
The ciphertext searching technology has the characteristic that the ciphertext file and the ciphertext index are separated from each other, the size of the ciphertext file is usually far larger than that of the ciphertext file index, different keys held by users are managed and updated by means of a trusted third party, different keys are issued for different users, the key transmission risk is removed, the lightweight ciphertext file safe sharing is realized, the problems of low safety, fuzzy liability division, poor user experience and the like in ciphertext file sharing are solved, and the safety of stored data is improved.
Disclosure of Invention
Aiming at the requirement of ciphertext file sharing among different users in a ciphertext search system, the invention provides a safe ciphertext file sharing method in the ciphertext search system, which does not need to share a search key of a sharer or increase the storage space of a ciphertext file, only needs the sharee to update an index list by using the own key, and distributes a file key through a key management server, so that lightweight, safe and supervised ciphertext file sharing can be realized. The method does not increase the storage cost of the ciphertext file of the shared person, does not share the search key of the user, prevents the risk of ciphertext file leakage caused by leakage of the search key, and effectively supervises the sharing behavior of the ciphertext file.
A secure ciphertext file sharing method in a ciphertext search system comprises the following steps:
s11, a data owner encrypts file data of the data owner to generate a ciphertext index, and uploads the ciphertext file and the ciphertext index to a big data storage platform, wherein the data owner and a shared user have ciphertext searching capability for the ciphertext file;
s12, sharing the search key and the file key to the shared user through a secure channel by the data owner;
and S13, the shared user searches and decrypts the ciphertext file by using the received search key and the file key.
Furthermore, the data owner can store and read the ciphertext file to the big data storage platform through the secret state data search client, and inquire the ciphertext index from the secret state data search service subsystem, and the secret state data search client and the secret state data search service subsystem issue the related secret key through the secret state data secret key management subsystem.
Furthermore, the encrypted data search client can provide encryption and decryption functions of user files, file indexes and search requests, send the encrypted files to the big data storage platform for storage, and send the encrypted search requests to the encrypted data search service subsystem.
Further, the big data storage platform comprises a distributed file system, and the distributed file system is used for providing secret state search service.
Furthermore, the secret state data search client directly stores the ciphertext file to the distributed file system, and positions the ciphertext file stored in the distributed file system based on the keyword index list of the secret state data search service subsystem.
Furthermore, the secret state data search service subsystem is deployed in a single server, and can establish a keyword index list of the ciphertext file, so as to locate the position where the ciphertext file is stored in the distributed file system; the secret state data search service subsystem can respond to the search request of the secret state data search client, search the position of the ciphertext file and return the position to the secret state data search client.
Furthermore, the secret data key management subsystem can provide a search key and a file encryption key for the secret data search client and provide a search key for the secret data search service subsystem.
Further, the ciphertext file sharing method specifically comprises the following steps:
s21, after a data owner selects a file to be shared, a file keyword and a shared user, initiating a sharing request to the secret data key management subsystem through the secret data search client, wherein the request content comprises an ID of the shared user, an ID of the file to be shared and keyword information of the ID;
s22, the secret state data key management subsystem calculates a file encryption key according to request information submitted by a user;
s23, the secret state data key management subsystem informs the shared user of updating the index list and issues a file key to the shared user through a secure channel;
s24, after the shared user receives the shared content through the secret state data searching client, the secret state data searching client updates the own ciphertext index by using the searching key of the shared user and the keyword of the shared file and issues the ciphertext index to the distributed file system;
s25, the distributed file system informs the shared user that the index is updated successfully;
and S26, the secret data key management subsystem informs a data owner of successful file sharing.
The invention has the beneficial effects that: the invention provides safe ciphertext file sharing service for users based on password management, the users only need to log in own client and select the users, files and file keywords to be shared, and the file sharing can be realized without transmitting search keys in the sharing process. The shared user only needs to update the ciphertext index of the shared user, and the shared file can be obtained by obtaining the file key from the crypto tube, so that the division of the authority is realized, the security of the file sharing process is improved, and the method specifically comprises the following advantages:
(1) the cost is low: when the user shares the own file with other users, the ciphertext file does not need to be transmitted to the shared user and then uploaded to the storage server, and the network bandwidth is saved. The shared user only needs to update the ciphertext index list stored in the ciphertext data search service subsystem, and the HDFS of the storage service side does not need to increase new storage overhead, so that the storage cost is saved.
(2) The sex can be monitored. When the user shares the file, the key management server of the trusted third party informs the shared user to update the index list, the trust transfer responsibility is clearly and definitely handed over, and the sharing path of the sensitive file is safely monitored.
(3) Convenience and safety. When the user shares the file, the user does not need to share a search key of the user and send the ciphertext file to the shared user and then upload the ciphertext file to the server for storage, so that the client communication overhead is reduced, and the sharing process is simpler. And issuing a file key by a key management server of a trusted third party through a secure channel to be shared by the users. The shared user updates the index by using the own search key, and in the sharing process, the user completely controls the initiative of own data through a private key, so that a storage end cannot know, steal or reveal the plaintext data of the user. And the search behavior of the user cannot be subjected to correlation analysis, so that the safety is improved.
(4) In ciphertext file sharing, a user can share files without sharing a search key of the user, and the security of the key is ensured.
(5) The user only needs to select the user and the file to be shared at the client and set the keywords, and convenient, fast and light file sharing can be achieved.
(6) And the responsibility boundary in file sharing is clearly divided, and technical support is provided for safe file sharing and supervision sharing behaviors.
Drawings
FIG. 1 is a searchable encryption model;
FIG. 2 ciphertext file sharing model;
fig. 3 is a file security sharing process.
Detailed Description
In order to more clearly understand the technical features, objects, and effects of the present invention, specific embodiments of the present invention will now be described. It should be understood that the detailed description and specific examples, while indicating the preferred embodiment of the invention, are intended for purposes of illustration only and are not intended to limit the scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment provides a secure ciphertext file sharing method in a ciphertext search system, as shown in fig. 1, including the following steps:
s11, a data owner encrypts file data of the data owner to generate a ciphertext index, and uploads the ciphertext file and the ciphertext index to a big data storage platform, wherein the data owner and a shared user have ciphertext searching capability for the ciphertext file;
s12, sharing the search key and the file key to the shared user through a secure channel by the data owner;
and S13, the shared user searches and decrypts the ciphertext file by using the received search key and the file key.
In a preferred embodiment of the present invention, as shown in fig. 2, the data owner can store and read the ciphertext file to the big data storage platform through the secret data search client, and query the ciphertext index from the secret data search service subsystem, and the secret data search client and the secret data search service subsystem issue the related key by the secret data key management subsystem.
In a preferred embodiment of the invention, the encrypted data search client can provide encryption and decryption functions of user files, file indexes and search requests, send the encrypted files to the big data storage platform for storage, and send the encrypted search requests to the encrypted data search service subsystem.
In a preferred embodiment of the present invention, the big data storage platform comprises a Distributed File System (HDFS) for providing a cryptographic search service.
In a preferred embodiment of the present invention, the cryptographic data search client directly stores the cryptographic file to the distributed file system, and locates the cryptographic file stored in the distributed file system based on the key index list of the cryptographic data search service subsystem.
In a preferred embodiment of the present invention, the cryptographic data search service subsystem is deployed in a separate server, and is capable of establishing a keyword index list of the ciphertext file, for locating a position where the ciphertext file is stored in the distributed file system; the secret state data search service subsystem can respond to a search request of the secret state data search client, search the position of the ciphertext file and return to the secret state data search client.
In a preferred embodiment of the present invention, the secret data key management subsystem is capable of providing a search key and a file encryption key for the secret data search client and providing a search key for the secret data search service subsystem.
In a preferred embodiment of the present invention, as shown in fig. 3, the ciphertext file sharing method specifically includes the following steps:
s21, after a data owner selects a file to be shared, a file keyword and a shared user, a sharing request is sent to a secret data key management subsystem through a secret data search client, and the request content comprises an ID of the shared user, an ID of the file to be shared and keyword information of the ID;
s22, the secret state data key management subsystem calculates a file encryption key according to request information submitted by a user;
s23, the secret data key management subsystem informs the shared user of updating the index list and issues a file key to the shared user through a secure channel;
s24, after the shared user receives the shared content through the secret state data searching client, the secret state data searching client updates the own ciphertext index by using the searching key of the shared user and the key words of the shared file and issues the ciphertext index to the distributed file system;
s25, the distributed file system informs the shared user that the index is updated successfully;
and S26, the secret data key management subsystem informs the data owner that the file sharing is successful.
In summary, according to the secure ciphertext file sharing method in the ciphertext search system provided by the present invention, a search key of a sharer does not need to be shared, a storage space of a ciphertext file does not need to be increased, and only a sharee needs to update an index list with its own key and distribute a file key through a key management server, so that lightweight, secure, and monitorable ciphertext file sharing can be achieved. The method does not increase the storage cost of the ciphertext file of the shared person, does not share the search key of the user, prevents the risk of ciphertext file leakage caused by leakage of the search key, and effectively supervises the sharing behavior of the ciphertext file.
The foregoing is illustrative of the preferred embodiments of this invention, and it is to be understood that the invention is not limited to the precise form disclosed herein and that various other combinations, modifications, and environments may be resorted to, falling within the scope of the concept as disclosed herein, either as described above or as apparent to those skilled in the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (8)
1. A secure ciphertext file sharing method in a ciphertext search system is characterized by comprising the following steps:
s11, a data owner encrypts file data of the data owner to generate a ciphertext index, and uploads the ciphertext file and the ciphertext index to a big data storage platform, wherein the data owner and a shared user have ciphertext searching capability for the ciphertext file;
s12, sharing the search key and the file key to the shared user through a secure channel by the data owner;
and S13, the shared user searches and decrypts the ciphertext file by using the received search key and the file key.
2. The method as claimed in claim 1, wherein a data owner can store and read ciphertext files to and from the big data storage platform through a secret data search client, and query a ciphertext index from a secret data search service subsystem, and the secret data search client and the secret data search service subsystem issue related keys from a secret data key management subsystem.
3. The method as claimed in claim 2, wherein the cryptographic data search client is capable of providing encryption and decryption functions of user files, file indexes and search requests, sending the cryptographic files to the big data storage platform for storage, and sending the encrypted search requests to the cryptographic data search service subsystem.
4. The method as claimed in claim 2, wherein the big data storage platform comprises a distributed file system, and the distributed file system is configured to provide a cryptographic search service.
5. The method as claimed in claim 3, wherein the cryptographic data search client directly stores the cryptographic file in the distributed file system, and locates the cryptographic file stored in the distributed file system based on the key index list of the cryptographic data search service subsystem.
6. The method for sharing the safe ciphertext file in the ciphertext search system according to claim 3, wherein the ciphertext data search service subsystem is deployed in a separate server, and is capable of establishing a keyword index list of the ciphertext file, so as to locate a position where the ciphertext file is stored in the distributed file system; the secret state data search service subsystem can respond to the search request of the secret state data search client, search the position of the ciphertext file and return the position to the secret state data search client.
7. The method as claimed in claim 3, wherein the secret data key management subsystem is capable of providing a search key and a file encryption key for the secret data search client, and providing a search key for the secret data search service subsystem.
8. The method for sharing a ciphertext file in a ciphertext search system of claim 3, wherein the method for sharing a ciphertext file specifically comprises the following steps:
s21, after a data owner selects a file to be shared, a file keyword and a shared user, initiating a sharing request to the secret data key management subsystem through the secret data search client, wherein the request content comprises an ID of the shared user, an ID of the file to be shared and keyword information of the ID;
s22, the secret state data key management subsystem calculates a file encryption key according to request information submitted by a user;
s23, the secret state data key management subsystem informs the shared user of updating the index list and issues a file key to the shared user through a secure channel;
s24, after the shared user receives the shared content through the secret state data searching client, the secret state data searching client updates the own ciphertext index by using the searching key of the shared user and the keyword of the shared file and issues the ciphertext index to the distributed file system;
s25, the distributed file system informs the shared user that the index is updated successfully;
and S26, the secret data key management subsystem informs a data owner of successful file sharing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010244397.4A CN111460480B (en) | 2020-03-31 | 2020-03-31 | Secure ciphertext file sharing method in ciphertext search system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010244397.4A CN111460480B (en) | 2020-03-31 | 2020-03-31 | Secure ciphertext file sharing method in ciphertext search system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111460480A true CN111460480A (en) | 2020-07-28 |
CN111460480B CN111460480B (en) | 2022-03-18 |
Family
ID=71679390
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010244397.4A Active CN111460480B (en) | 2020-03-31 | 2020-03-31 | Secure ciphertext file sharing method in ciphertext search system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111460480B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112948903A (en) * | 2021-03-24 | 2021-06-11 | 中国电子科技集团公司第三十研究所 | Secret state search technical architecture and method for big data storage |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101957902A (en) * | 2009-07-20 | 2011-01-26 | 日电(中国)有限公司 | Method and equipment for generating an expanded blinded inverted index table and method and equipment for searching united keywords |
CN102938767A (en) * | 2012-11-13 | 2013-02-20 | 西安电子科技大学 | Efficient verified fuzzy key word searching method based on cloud data subcontract system |
CN103107889A (en) * | 2013-02-06 | 2013-05-15 | 中电长城网际系统应用有限公司 | System and method for cloud computing environment data encryption storage and capable of searching |
CN105471856A (en) * | 2015-11-19 | 2016-04-06 | 中国电子科技网络信息安全有限公司 | System and method used for retrieving and sharing large data center platform encryption files |
US20160299919A1 (en) * | 2013-06-03 | 2016-10-13 | Zettaset, Inc. | Management of Intermediate Data Spills during the Shuffle Phase of a Map-Reduce Job |
CN106131029A (en) * | 2016-07-19 | 2016-11-16 | 南京邮电大学 | A kind of efficient cipher text searching method resisting attribute key abuse |
CN106203171A (en) * | 2016-06-03 | 2016-12-07 | 中国电子科技网络信息安全有限公司 | Big data platform Security Index system and method |
CN106302449A (en) * | 2016-08-15 | 2017-01-04 | 中国科学院信息工程研究所 | A kind of ciphertext storage cloud service method open with searching ciphertext and system |
CN108494768A (en) * | 2018-03-22 | 2018-09-04 | 深圳大学 | A kind of cipher text searching method and system for supporting access control |
CN108664803A (en) * | 2018-04-04 | 2018-10-16 | 中国电子科技集团公司第三十研究所 | A kind of document content fine granularity access control system based on password |
CN110166466A (en) * | 2019-05-28 | 2019-08-23 | 湖南大学 | It is a kind of efficiently the multi-user of renewal authority to can search for encryption method and system |
-
2020
- 2020-03-31 CN CN202010244397.4A patent/CN111460480B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101957902A (en) * | 2009-07-20 | 2011-01-26 | 日电(中国)有限公司 | Method and equipment for generating an expanded blinded inverted index table and method and equipment for searching united keywords |
CN102938767A (en) * | 2012-11-13 | 2013-02-20 | 西安电子科技大学 | Efficient verified fuzzy key word searching method based on cloud data subcontract system |
CN103107889A (en) * | 2013-02-06 | 2013-05-15 | 中电长城网际系统应用有限公司 | System and method for cloud computing environment data encryption storage and capable of searching |
US20160299919A1 (en) * | 2013-06-03 | 2016-10-13 | Zettaset, Inc. | Management of Intermediate Data Spills during the Shuffle Phase of a Map-Reduce Job |
CN105471856A (en) * | 2015-11-19 | 2016-04-06 | 中国电子科技网络信息安全有限公司 | System and method used for retrieving and sharing large data center platform encryption files |
CN106203171A (en) * | 2016-06-03 | 2016-12-07 | 中国电子科技网络信息安全有限公司 | Big data platform Security Index system and method |
CN106131029A (en) * | 2016-07-19 | 2016-11-16 | 南京邮电大学 | A kind of efficient cipher text searching method resisting attribute key abuse |
CN106302449A (en) * | 2016-08-15 | 2017-01-04 | 中国科学院信息工程研究所 | A kind of ciphertext storage cloud service method open with searching ciphertext and system |
CN108494768A (en) * | 2018-03-22 | 2018-09-04 | 深圳大学 | A kind of cipher text searching method and system for supporting access control |
CN108664803A (en) * | 2018-04-04 | 2018-10-16 | 中国电子科技集团公司第三十研究所 | A kind of document content fine granularity access control system based on password |
CN110166466A (en) * | 2019-05-28 | 2019-08-23 | 湖南大学 | It is a kind of efficiently the multi-user of renewal authority to can search for encryption method and system |
Non-Patent Citations (3)
Title |
---|
HADEER MAHMOUD等: "An approach for Big Data Security based on Hadoop Distributed File system", 《网页在线公开:HTTPS://IEEEXPLORE.IEEE.ORG/STAMP/STAMP.JSP?TP=&ARNUMBER=8316608》 * |
许盛伟等: "支持文件动态更新的基于属性可搜索加密方案", 《计算机应用研究》 * |
贾强等: "一种面向密文大型数据集的可搜索加密方案", 《东北大学学报(自然科学版)》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112948903A (en) * | 2021-03-24 | 2021-06-11 | 中国电子科技集团公司第三十研究所 | Secret state search technical architecture and method for big data storage |
Also Published As
Publication number | Publication date |
---|---|
CN111460480B (en) | 2022-03-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11153290B2 (en) | Advanced security protocol for broadcasting and synchronizing shared folders over local area network | |
CN112788033B (en) | Authentication method and authentication system | |
CN103731432B (en) | Multi-user supported searchable encryption method | |
EP2590451B1 (en) | File transmission method based on distributed storage in wireless communication system | |
CN108881195A (en) | Data safety sharing method and device based on cloud environment | |
EP3510743B1 (en) | Interchangeable retrieval of sensitive content via private content distribution networks | |
EP3063919B1 (en) | A system and a method for management of confidential data | |
US20100169321A1 (en) | Method and apparatus for ciphertext indexing and searching | |
KR100944769B1 (en) | Method and system for sharing files by using encryption and decryption to guarantee the privacy | |
US20090300351A1 (en) | Fast searchable encryption method | |
EP3143486A1 (en) | A method for storing of data within a cloud storage and a cloud storage system | |
KR20210064675A (en) | Security system for data trading and data storage based on block chain and method therefor | |
CN112948903A (en) | Secret state search technical architecture and method for big data storage | |
CN107295018A (en) | A kind of safety storage of cloud disc file and sharing method | |
CN114679272B (en) | Cloud storage system and method using quantum key encryption | |
CN114389878B (en) | Block chain slicing method and block chain network system | |
CN111460480B (en) | Secure ciphertext file sharing method in ciphertext search system | |
KR20180130249A (en) | Encryption systems based on cloud storage and method thereof | |
Mahmoud et al. | Privacy-preserving fine-grained data retrieval schemes for mobile social networks | |
KR20040097016A (en) | Method and System of Web Storage Service with Cipher | |
CN115935426A (en) | Remote image feature extraction and retrieval method based on SGX | |
KR102263053B1 (en) | A database structure capable of synchronizing data between devices in a local area network environment and a data synchronization method using the same | |
CA2797633C (en) | System and method for mounting encrypted data based on availability of a key on a network | |
Zebboudj et al. | Big data source location privacy and access control in the framework of IoT | |
JP4719935B2 (en) | Hybrid peer-to-peer communication network system, index server thereof, terminal device, and method of creating mirror peer in the same system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210510 Address after: 610000, No. 6, pioneering Road, hi tech Zone, Sichuan, Chengdu Applicant after: NO. 30 INSTITUTE OF CHINA ELECTRONIC TECHNOLOGY Group Corp. Applicant after: CHINA INFORMATION TECHNOLOGY SECURITY EVALUATION CENTER Address before: 610000, No. 6, pioneering Road, hi tech Zone, Sichuan, Chengdu Applicant before: NO. 30 INSTITUTE OF CHINA ELECTRONIC TECHNOLOGY Group Corp. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |