CN1285039C - Method for enciphering concealed data having virtual space - Google Patents

Method for enciphering concealed data having virtual space Download PDF

Info

Publication number
CN1285039C
CN1285039C CNB031061036A CN03106103A CN1285039C CN 1285039 C CN1285039 C CN 1285039C CN B031061036 A CNB031061036 A CN B031061036A CN 03106103 A CN03106103 A CN 03106103A CN 1285039 C CN1285039 C CN 1285039C
Authority
CN
China
Prior art keywords
signal conditioning
conditioning package
virtual
data base
accumulation device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB031061036A
Other languages
Chinese (zh)
Other versions
CN1523508A (en
Inventor
黄文昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fineart Technology Co Ltd
Original Assignee
Fineart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fineart Technology Co Ltd filed Critical Fineart Technology Co Ltd
Priority to CNB031061036A priority Critical patent/CN1285039C/en
Publication of CN1523508A publication Critical patent/CN1523508A/en
Application granted granted Critical
Publication of CN1285039C publication Critical patent/CN1285039C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to a hidden data encrypting method having virtual space. Data of files is stored in a cipher text way by an encrypted mechanism and can be read by a user only by an embedded type information storage device, a path for storing the files in an information processing device is hidden simultaneously, and the safety and the confidentiality of the data are increased by dual protection to realize the purpose of safe information management.

Description

Method with Virtual Space enciphering hiding data
Technical field
The present invention relates to a kind of embedded information accumulation device, particularly a kind of method that is applied to embedded information accumulation device and has Virtual Space enciphering hiding data.
Background technology
In science and technology today at a tremendous pace, signal conditioning package has been widely used in each field, along with the continuous progress of science and technology, the also more and more polynary change of the function of signal conditioning package, but in the epoch of this information explosion, comparatively speaking, signal conditioning package comes the management information for the user except the various different functions of needs, also needs enough spaces to put huge information simultaneously.
By above-mentioned situation as can be known, be the epoch of the communication that takes concerted action, portable information accumulation device then becomes outfit indispensable in the signal conditioning package, because of portable information accumulation device has Portability easily, but its shortcoming is that then capacity is too little, can't store a large amount of information, face capacity as flexible plastic disc (Floppy Disk) and do not applied the awkward situation of using, and eliminated gradually by market, at above-mentioned shortcoming, then there is prior art to develop and micro hard disk (Micro Driver), flash memory card (Memory Stick; MS) ... or the like; reach the function of storage; but on Data Protection, do not see its significant effect always; and following table has illustrated general existing file secrecy system; learn that from table many secrecy systems also still have many disadvantages; important confidential data, also need to be keep secret of archives in a lot of individuals, the enterprise; even if also use general cipher mechanism or software mode to present yet maintain secrecy; as mentioned above; how to make information accumulation device have highly confidential function; reaching by external hardware devices again, is a technical task that waits to solve in fact.
Classification Exemplary program Operation is described Shortcoming
Safe cabinet (secret catalogue) Maintain secrecy and coil i-key Pull archives into particular category, can encrypt, can decipher otherwise haul out Can't be at encryption menu executive routine or archives, must earlier archives be hauled out, after having operated, must remember to pull into, and the plaintext archives of deletion outside.
Archives are encrypted to another archives WinZip etc. can change profile name Be usually designed to right mouse button archives are carried out encryption and decryption The same, but operation inconvenience more
System can encrypt the archives of controlling oneself and producing voluntarily Word, Excel etc. Can inquire password when holding grade Only specific (oneself produces) archives are encrypted, it is a lot of to crack program
The transparent mode encryption and decryption GoodLock After the archives encryption, can keep former shelves name, if smart card exists, then identical with general archives operation, otherwise promptly can't understand archives. Only data are encrypted, but enciphered data can exist hard disk any one
Summary of the invention
In view of this, the objective of the invention is to overcome the deficiencies in the prior art and defective, a kind of method with Virtual Space enciphering hiding data is provided, its fundamental purpose is the data file with user's secret, archives and application program are installed on the virtual data base that signal conditioning package or embedded information accumulation device provide, through detecting, duplicate, move, modes such as deletion, with employed path, information and course are hidden, avoid stealing and using of person who is ambitious or tenacious of purpose, in addition by a kind of virtual hard disk encryption technology (On-the-fly Encryption), all are deposited in the data encryption of signal conditioning package or embedded information accumulation device, has only the moment that needs data, just can read expressly, and not by deciphering, data are ciphertext forever, and each different embedded information accumulation device has different passwords, do not have any association, and decryption device of the present invention is embedded information accumulation device, have the embedded information accumulation device of installation only and can decipher in the signal conditioning package under it, just an embedded information accumulation device can only corresponding its information specific treating apparatus.
For reaching above-mentioned purpose; the invention provides a kind of method, be applied on the embedded information accumulation device, by encipheror protection archives with Virtual Space enciphering hiding data; and the data in hiding this embedded information accumulation device and the signal conditioning package, this method includes the following step:
This embedded information accumulation device is installed in a signal conditioning package;
Set up a virtual data base in this signal conditioning package, cut a zone, a destination path of this virtual data base is built on this zone by the storage area that this signal conditioning package provided; Perhaps set up a virtual data base in this embedded information accumulation device, cut a zone, a destination path of this virtual data base is built on this zone by the storage area that this embedded information accumulation device provided;
Hold this virtual data base of setting by a user;
Deposit archives in this virtual data base, archives are encrypted data by an encryption mechanism; Duplicate a particular path by this virtual data base, this particular path is meant any information and the course that retains in this signal conditioning package of these archives; Duplicate and this particular path is moved to this storage area after finishing;
Whether detect this embedded information accumulation device still is installed in this signal conditioning package, if embedded information accumulation device is not installed in this signal conditioning package, then deletion deposits this particular path in this storage area in, whether then return this embedded information accumulation device of detecting still is installed in this signal conditioning package, continue to repeat detecting, until finally reaching next step;
If embedded information accumulation device still is installed in this signal conditioning package, then this signal conditioning package continues normal operation, and process ends.
The disclosed method according to the present invention is used the dual important data of pattern protection user of saving from damage with data, and other people also can't use in other signal conditioning package even if lose embedded information accumulation device, to reach the function that personal data are maintained secrecy.The present invention comprises the following step at least: embedded information accumulation device is installed in signal conditioning package and set up at least one virtual data base in signal conditioning package, then hold the setting virtual data base by the user, and deposit archives in virtual data base, whether detect embedded information accumulation device afterwards and still be installed in the signal conditioning package, hiding at last archives are shown in the particular path in the signal conditioning package.
Description of drawings
Fig. 1 has the synoptic diagram of Virtual Space enciphering hiding data method for the present invention;
Fig. 2-a, Fig. 2-b and Fig. 2-c have the process flow diagram of Virtual Space enciphering hiding data method for the present invention;
Fig. 3-a and Fig. 3-b have user's interface schema of Virtual Space enciphering hiding data method for the present invention;
Fig. 4-a, Fig. 4-b, Fig. 4-c, Fig. 4-d have the enforcement figure of Virtual Space enciphering hiding data method for the present invention.
Symbol description among the figure
10 virtual data bases
20 archives
30 signal conditioning packages
Step 100 is installed an embedded information accumulation device in a signal conditioning package
Step 110 is set up at least one virtual data base in this signal conditioning package
Step 112 is cut a zone by the storage area that this signal conditioning package provided
Step 114 builds on this zone with a destination path of this virtual data base
Step 116 is cut a zone by the storage area that this embedded information accumulation device provided
Step 118 builds on this zone with a destination path of this virtual data base
Step 120 is held by a user and is set this virtual data base
Step 130 deposits archives in this virtual data base
These archives of step 132 are encrypted data by an encryption mechanism
Step 134 is duplicated this particular path by this virtual data base
Step 136 moves this particular path to this storage area
Whether this embedded information accumulation device of step 140 detecting still is installed in this signal conditioning package
This signal conditioning package of step 150 continues normal operation
Hiding these archives of step 160 are shown in the particular path in this signal conditioning package
Step 162 deletion deposits this particular path in this storage area in
Embodiment
The present invention is a kind of method with Virtual Space enciphering hiding data, please refer to Fig. 1, and the synoptic diagram for the present invention has Virtual Space enciphering hiding data method is described as follows:
After the present invention at first is installed on embedded information accumulation device on the signal conditioning package 30, just can begin to activate, and all can provide a virtual data base 10 in signal conditioning package 30 and the embedded information accumulation device in order to master files and significant data, when the user deposits archives 20 in virtual data base 10, virtual data base 10 just can be encrypted archives 20 according to a kind of encryption technology, only in process of reading, the user just can see expressly, and the path of archives and course are returned when depositing signal conditioning package 30 in, this virtual data base 10 just can capture and write down its eigenstate, when removing embedded information accumulation device, just hide all information, avoid person who is ambitious or tenacious of purpose's use, yet as figure, can set up complex virtual data base 10 (being referred to as virtual disk), deposit different pieces of information, more can be managed by different setting patterns; And archives 20 can be the specific item of application program processing.
Above-mentioned embedded information accumulation device is connected with signal conditioning package 30 by a connecting interface, and connecting interface can be high density transmission connecting interface (IEEE1394), also can be a universal serial interface (USB interface), yet that signal conditioning package 30 can be desktop PC, laptop computer (NB), PDA(Personal Digital Assistant), mobile phone, hand held signal conditioning package is any.Embedded in addition information accumulation device can be that portable reservoir, integrated circuit card (IC CARD) and smart card (SMART CARD) are any.
Please refer to Fig. 2-a, Fig. 2-a is the process flow diagram that the present invention has Virtual Space enciphering hiding data method, is described as follows:
One embedded information accumulation device at first is installed in a signal conditioning package 30 (step 100), after the installation, just then set up at least one virtual data base 10 in this signal conditioning package or embedded information accumulation device (step 110), after setting up the EOP (end of program) of virtual data base 10, just hold by a user and set this virtual data base 10 (step 120), setting is divided into four kinds of patterns, treat that flow process finishes explanation in detail again, after setting is finished, deposit archives 20 in this virtual data base 10 (step 130), then whether this embedded information accumulation device of detecting still is installed in this signal conditioning package 30 (step 140), if embedded information accumulation device still is installed in this signal conditioning package 30, then this signal conditioning package 30 continues normal operation (step 150), and process ends; If embedded information accumulation device is not installed in this signal conditioning package 30, then hiding these archives 20 are shown in the particular path in this signal conditioning package 30, then can get back to step 140, continue detecting and also repeat above-mentioned flow process, and finish this flow process.
Four kinds of above-mentioned patterns can be divided into carry/shutdown mode, space management pattern, cipher mode and backup/reduction-mode, are respectively described below:
1. carry/shutdown mode: refer to this user is held activation (enable)/this specific virtual data base of decapacitation (disable); The user can produce not limited number virtual data base 10 in signal conditioning package 30, but the numerical limitations of carry is simultaneously arranged.And a virtual data base 10 must could use at the state of carry.
2. space management pattern: refer to that this user holds the amount of capacity of this virtual data base of change.If the capacity of virtual data base 10 is not enough, and the hard disk at its place still has living space, can strengthen with this order.
3. cipher mode: rescue password keyholed back plate in addition when this user holds this embedded information accumulation device of loss is provided, more limits a specific rescue number of times and enter the state of read-only this virtual data base.If embedded information accumulation device is not for the moment not at one's side, the user still wants to use virtual data base 10, at this moment, just can utilize the rescue pin mode to come carry virtual data base 10.It is to increase virtual data base 10 newly that one restriction is arranged.
4. backup/reduction-mode: refer to this user hold required data from this virtual data library backup in this signal conditioning package, and reduction-mode be from this signal conditioning package restoring data to this virtual data base.The good working custom is often data to be backed up, and in case of necessity the Backup Data reduction is used." backup " can be compressed into .zip archives with whole virtual data base 10, leaves in user's designated directory.
" reduction " can be reduced into virtual data base 10 archives with the .zip archives that " backup " produces, and leaves in our designated directory.The preceding archives of shelves names and backup are identical.
Next just steps A among the present invention and the step B thin portion flow process of setting up virtual data base 10 is illustrated, and steps A is meant that step 110 sets up virtual data base 10 in this signal conditioning package 30; Step B is meant that step 110 sets up virtual data base 10 in embedded information accumulation device.And both steps A and B select one to carry out, and the user can order the zone that virtual data base 10 is set up certainly, please refer to Fig. 2-b.
After the steps A, then a storage area that is provided by this signal conditioning package 30 cuts a zone (step 112), and the storage area can be a hard disk (Hard Disk; HD), and should be formed by the block (block) of logical storage area in the zone, after cutting is finished, a destination path of this virtual data base 10 is built on this zone (step 114), can change the amount of capacity of virtual data base 10 and can carry out hiding of confidential data by the method.
And if the user selects step B, just then cut a zone (step 116) by the storage area that this embedded information accumulation device provided, after cutting is finished, one destination path of this virtual data base 10 is built on this zone (step 118), can change the amount of capacity of virtual data base 10 and can carry out hiding of confidential data by the method.
And above-mentioned at least one virtual data base this signal conditioning package in the step 110 of this signal conditioning package of setting up can replace by this embedded information accumulation device.And steps A and step B can't carry out simultaneously.
Deposit virtual data base 10 in regard to the step C archives 20 among the present invention then and be illustrated, please refer to Fig. 2-c with the thin portion flow process that step D hides the particular path of archives 20.
After the step C, then these archives 20 are encrypted (step 132) by an encryption mechanism with data, this encryption mechanism is a kind of virtual hard disk encryption technology (On-the-flyEncryption), duplicate this particular path (step 134) by this virtual data base 10 then, duplicate finish after, this particular path is moved to this storage area (step 136).
After the step D, then deletion deposits this particular path (step 162) in this storage area in, and particular path is meant any information and the course that retains in this signal conditioning package of these archives, just can all information and course are hiding fully, reach purpose of the present invention.
Before the above-mentioned virtual hard disk encryption technology of carrying is meant that data are by the hard disk read-in programme, be decrypted automatically.Before otherwise program deposits data in hard disk, can be automatically encrypt, whole encryption and decryption action is transparent fully, and the user also need not hypermnesia, and which archives is expressly or ciphertext, and is therefore in the operation, fully identical with general custom.Further say: have only the moment that program need data, just can read expressly, the data on the hard disk are ciphertext forever, and the sufficient and necessary condition of deciphering is that embedded information accumulation device is installed on the signal conditioning package.
Please refer to Fig. 3-a and Fig. 3-b, the user's interface schema that has Virtual Space enciphering hiding data method for the present invention, illustrated among the figure that the user sets up the interface and the interface of setting virtual data base 10 of virtual data base 10, then just can use the mentioned all functions of the present invention to operate.Then please refer to Fig. 4-a, Fig. 4-b, Fig. 4-c, Fig. 4-d, have the enforcement figure of Virtual Space enciphering hiding data method for the present invention.
Can easier understanding the present invention by present embodiment, the particular path that is meant in the step 160 especially to be carried, this particular path is meant and is used for necessary path shown under the Microsft Windows operating system in the present embodiment; Certainly must if must having other different path under different operating system, use need hide, to reach the present invention's effect not in order to limit the present invention; And owing to hide specific path; If the user will have identical effect on other computing machine, need have again another embedded information accumulation device can, the computing machine so an embedded information accumulation device is only arranged in pairs or groups.
At first choosing (it is logical that Dr.eye 98 translates allusion quotation) application software is installed on the virtual data base, when not pulling out embedded information accumulation device, software on the virtual data base it will be appreciated that in four positions such as " procedure sets; desktop; install/remove; Facility Column ", as Fig. 4-a, shown in Fig. 4-b, after pulling out embedded information accumulation device, virtual data base can disappear automatically, the data of software on the virtual data base in four positions such as " procedure set; desktop; install/remove; Facility Column " all can disappear, after turning back to embedded information accumulation device, these data all can be reduced fully, be not affected, as mentioned above, " procedure set; desktop; install/remove; Facility Column ", the just aforementioned particular path of carrying, comprise all courses and information and all will be hidden, and more augment the secrecy of data security.
Though the present invention discloses as above with aforesaid preferred embodiment; right its is not in order to limit the present invention; those skilled in the art; without departing from the spirit and scope of the present invention; when can doing a little change and retouching, so protection scope of the present invention is as the criterion as the scope person of defining that look claims.

Claims (16)

1. method with Virtual Space enciphering hiding data; be applied on the embedded information accumulation device, by encipheror protection archives, and the data in hiding this embedded information accumulation device and the signal conditioning package; it is characterized in that this method includes the following step:
This embedded information accumulation device is installed in a signal conditioning package;
Set up a virtual data base in this signal conditioning package, cut a zone, a destination path of this virtual data base is built on this zone by the storage area that this signal conditioning package provided; Perhaps set up a virtual data base in this embedded information accumulation device, cut a zone, a destination path of this virtual data base is built on this zone by the storage area that this embedded information accumulation device provided;
Hold this virtual data base of setting by a user;
Deposit archives in this virtual data base, archives are encrypted data by an encryption mechanism; Duplicate a particular path by this virtual data base, this particular path is meant any information and the course that retains in this signal conditioning package of these archives; Duplicate and this particular path is moved to this storage area after finishing;
Whether detect this embedded information accumulation device still is installed in this signal conditioning package, if embedded information accumulation device is not installed in this signal conditioning package, then deletion deposits this particular path in this storage area in, whether then return this embedded information accumulation device of detecting still is installed in this signal conditioning package, continue to repeat detecting, until finally reaching next step;
If embedded information accumulation device still is installed in this signal conditioning package, then this signal conditioning package continues normal operation, and process ends.
2. the method with Virtual Space enciphering hiding data as claimed in claim 1 is characterized in that, this embedded information accumulation device is connected with this signal conditioning package by a connecting interface.
3. the method with Virtual Space enciphering hiding data as claimed in claim 2 is characterized in that, this connecting interface is a high density transmission connecting interface.
4. the method with Virtual Space enciphering hiding data as claimed in claim 2 is characterized in that, this connecting interface is a universal serial interface.
5. the method with Virtual Space enciphering hiding data as claimed in claim 1, it is characterized in that this signal conditioning package can select one arbitrarily from the combination of desktop PC, laptop computer, personal digital assistant, mobile phone, hand held signal conditioning package.
6. the method with Virtual Space enciphering hiding data as claimed in claim 1 is characterized in that, this sets up a virtual data base in the step of this signal conditioning package, more comprises the following step:
Cut a zone by the storage area that this signal conditioning package provided; And
One destination path of this virtual data base is built on this zone.
7. the method with Virtual Space enciphering hiding data as claimed in claim 6 is characterized in that this storage area can be a hard disk, and should be made up of the block of logical storage area in the zone.
8. the method with Virtual Space enciphering hiding data as claimed in claim 1 is characterized in that, this sets up a virtual data base this signal conditioning package in the step of this signal conditioning package, can replace by this embedded information accumulation device.
9. the method with Virtual Space enciphering hiding data as claimed in claim 8 is characterized in that, this embedded information accumulation device can be set up a virtual data base, comprises the following step:
Cut a zone by the storage area that this embedded information accumulation device provided; And
One destination path of this virtual data base is built on this zone.
10. the method with Virtual Space enciphering hiding data as claimed in claim 1, it is characterized in that, this user holds and sets this virtual data base, comprises following setting pattern: one carry/shutdown mode, a space management pattern, a cipher mode and a backup/reduction-mode.
11. the method with Virtual Space enciphering hiding data as claimed in claim 10 is characterized in that, this carry/shutdown mode refers to this user is held this specific virtual data base of activation/decapacitation.
12. the method with Virtual Space enciphering hiding data as claimed in claim 10 is characterized in that, this space management pattern refers to that this user holds the amount of capacity of this virtual data base of change.
13. the method with Virtual Space enciphering hiding data as claimed in claim 10, it is characterized in that, this cipher mode, provide rescue password keyholed back plate in addition when this user holds this embedded information accumulation device of loss, more limit a specific rescue number of times and enter the state of read-only this virtual data base.
14. the method with Virtual Space enciphering hiding data as claimed in claim 10, it is characterized in that, this backup/reduction-mode, be with this user hold required data from this virtual data library backup in this signal conditioning package, and reduction-mode be from this signal conditioning package restoring data to this virtual data base.
15. the method with Virtual Space enciphering hiding data as claimed in claim 1 is characterized in that, these archives can be an application program and handle specific item.
16. the method with Virtual Space enciphering hiding data as claimed in claim 1 is characterized in that, this embedded information accumulation device can select one arbitrarily from the combination of portable reservoir, integrated circuit card and smart card.
CNB031061036A 2003-02-18 2003-02-18 Method for enciphering concealed data having virtual space Expired - Fee Related CN1285039C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031061036A CN1285039C (en) 2003-02-18 2003-02-18 Method for enciphering concealed data having virtual space

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031061036A CN1285039C (en) 2003-02-18 2003-02-18 Method for enciphering concealed data having virtual space

Publications (2)

Publication Number Publication Date
CN1523508A CN1523508A (en) 2004-08-25
CN1285039C true CN1285039C (en) 2006-11-15

Family

ID=34282679

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031061036A Expired - Fee Related CN1285039C (en) 2003-02-18 2003-02-18 Method for enciphering concealed data having virtual space

Country Status (1)

Country Link
CN (1) CN1285039C (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100392597C (en) * 2005-09-15 2008-06-04 首都信息发展股份有限公司 Virtual hardware accelerating method and system
KR100755701B1 (en) * 2005-12-27 2007-09-05 삼성전자주식회사 Apparatus and method of demanding paging for embedded system
CN102662797A (en) * 2012-04-11 2012-09-12 无锡华御信息技术有限公司 Virtualization-based software backup method
CN109308163A (en) * 2017-07-26 2019-02-05 英业达科技有限公司 Non-volatility memory magnetic region planing method

Also Published As

Publication number Publication date
CN1523508A (en) 2004-08-25

Similar Documents

Publication Publication Date Title
US7257717B2 (en) Method with the functions of virtual space and data encryption and invisibility
Deshmukh et al. Transparent Data Encryption--Solution for Security of Database Contents
CN101196855B (en) Mobile encrypted memory device and cipher text storage area data encrypting and deciphering processing method
CN1786867A (en) Method for ciphering and diciphering of file, safety managing storage apparatus and system method thereof
CN101650693B (en) Security control method for mobile hard disk and security mobile hard disk
CN1592877A (en) Method and device for encryption/decryption of data on mass storage device
US8539250B2 (en) Secure, two-stage storage system
CN1776563A (en) File encrypting device based on USB interface
US7809142B2 (en) Data scrambling and encryption of database tables
CN1694415A (en) Method and device for safety of storaged network data
CN100511187C (en) Safety mobile hard disc
EP2662798A1 (en) Information storage device and method
CN101452512B (en) Method and apparatus for implementing file safety storage, and file reading apparatus
CN1285039C (en) Method for enciphering concealed data having virtual space
CN1794210A (en) Data safety storage and processing method of mobile storage equipment
CN101930521A (en) File protecting method and device thereof
CN1845136A (en) Method and apparatus for monitoring and managing secret-involved file between computer and mobile storage device
CN103049705A (en) Virtualization based method, terminal and system for secure storage
US20100174902A1 (en) Portable storage media with high security function
CN113239370A (en) Embedded software encryption design method based on SOC hardware identification code
CN102270182B (en) Encrypted mobile storage equipment based on synchronous user and host machine authentication
CN2824145Y (en) Memory card with ID identification
CN107368745A (en) A kind of Filesystem security implementation method based on biological identification technology
CN1967472A (en) Circumstance rebuilding method of application software
Wang Application of AES and DES Algorithms in File Management

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1068983

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20061115

Termination date: 20120218