CN201544537U - Fitting encryption device - Google Patents

Fitting encryption device Download PDF

Info

Publication number
CN201544537U
CN201544537U CN2009202780093U CN200920278009U CN201544537U CN 201544537 U CN201544537 U CN 201544537U CN 2009202780093 U CN2009202780093 U CN 2009202780093U CN 200920278009 U CN200920278009 U CN 200920278009U CN 201544537 U CN201544537 U CN 201544537U
Authority
CN
China
Prior art keywords
accessory
encryption device
electronic label
radio
writing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN2009202780093U
Other languages
Chinese (zh)
Inventor
徐峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Force Code Division Information Technology Ltd By Share Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2009202780093U priority Critical patent/CN201544537U/en
Application granted granted Critical
Publication of CN201544537U publication Critical patent/CN201544537U/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model provides a fitting encryption device, which is arranged on a fitting, and is a radio frequency electronic tag. As non-contact radio frequency electronic tag is adopted to encrypt consumable items, the fitting encryption device is not easy to be rusted and damaged, increases reliability, greatly increases initialization speed, facilitates programming multi-group codes, is convenient in production and management, provides the possibility of programming different codes for different requirements, encapsulates modules by physical method; greatly increases steadiness of encryption, and has automatic protection function for ensuring safety of information.

Description

The accessory encryption device
Technical field
The utility model relates to a kind of encryption device, refers to that especially a kind of consumptive material the encryption by radio electronic label has the anti-accessory encryption device that cracks function.
Background technology
Along with the becoming increasingly abundant of functions of the equipments, precision are higher, a lot of equipment in use need constantly to change according to situation about using, typical in ink-cases of printers, colour band, and the drum of color laser printer, powder, such consumptive materials such as the transfer belt of label machine, ink-jet printer is common PRN device, for modern office provides great convenience.For example existing ink-jet printer uses dismountable print cartridge to load mostly and prints the ink that uses, a lot of cartridge cases are equipped with chip, chip is provided with electronic module and is provided with a plurality of contacts, store the relevant information of print cartridge in the electronic module, as information such as print cartridge model, ink color, print cartridge ink inside surplus data.After print cartridge is packed ink-jet printer into, ink-jet printer promptly reads the information that is stored in the electronic module, and judge whether this print cartridge is applicable to this ink-jet printer, judge simultaneously whether sufficient ink is arranged in the print cartridge, have only ink-jet printer to judge that print cartridge is suitable for and when storing sufficient ink, ink-jet printer just prints work.The ink remaining amount data of the electronic module record of existing part ink box chip are controlled by ink-jet printer, before the each printing of ink-jet printer, read the ink remaining amount data of storing in the electronic module earlier, and calculate the quantity of ink of consumption according to the type of each print paper, the quantity of print paper, then original ink remaining amount is deducted quantity of ink that this time print to consume and calculate ink remaining amount in the current print cartridge, at last these ink remaining amount data are write back in the electronic module.
Whether in addition, also some machine is to utilize chip on the master control borad to write down the operating position of each consumptive material, by detecting consumptive material and use in the life span of regulation in that resetting means or chip being set on the consumptive material.
Above scheme has following these common defectives:
1, the chip on the consumptive material all adopts the contact contact to link to each other with main frame, those contact contacts exist easily get rusty, flimsy shortcoming, to such an extent as in start, reset or when monitoring the ink use amount in real time, can't effectively authenticate to consumptive material.
2, those chips are simple data-storing only, are easy to be cracked, and make the use amount of consumptive material to be rewritten arbitrarily, to such an extent as to make the operating position of consumptive material and whether be that the judgement of original-pack consumptive material can not get guaranteeing, thus the normal operation that jeopardizes equipment.
3, those chips need just write corresponding data before being installed on consumptive material, thereby need prepare enough different chips at different consumptive materials when producing, and utilized the content easy crack of machine mainboard control chip, existed serious safety problem.
Because consumptive material itself is the key of the normal operation of system; and existing recognition methods can't be protected the safety of use information; exceed the time limit to use because of user's modification information easily; perhaps use some fake and forged products; and influence the normal operation of equipment; so just need a kind of method that can discern the safety of the consumptive material true and false and behaviour in service, thereby help main frame can judge the legitimacy of consumptive material (consumable accessory), further protect the operation of whole system device.
The utility model content
For the destruction that prevents to use non-original factory and the pseudo-consumptive material that emits that equipment is produced; main purpose of the present utility model is to provide a kind of accessory encryption device; communicate by letter by the method for getting in touch with through enciphered message with radio electronic label by equipment, consumptive material is carried out the device of encipherment protection.
A time purpose of the present utility model is by the method that installs radio electronic label (RFID) on the consumptive material of various device additional, and a kind of encryption device that can convenient and swift flexible identification consumptive material record is provided.
Further purpose of the present utility model is to provide a kind of encryption device of protecting the consumable information safe and complete.
For reaching above-mentioned purpose, the technological means that the utility model adopts is:
A kind of accessory encryption device is arranged at an accessory, and this encryption device is a radio electronic label.
The advantage of method of the present utility model is:
1, adopts contactless radio electronic label that consumptive material is encrypted, overcome that easily get rusty in the contact contact, flimsy shortcoming, increased reliability.
2, adopt contactless radio electronic label that consumptive material is encrypted, can after the consumptive material assembling, carry out initialization to radio electronic label again, improved initialized speed greatly, be convenient to very much work out simultaneously multiple cipher.
3, owing to improved the initialized speed of radio electronic label, be convenient to work out multiple cipher simultaneously, therefore very convenient production and management.For the different password of different demand establishments provides possibility, can pass through the different password of establishment as different clients or zones of different, thus a lot of practical problems such as solution falsifying.
4, owing to add in the RF tag radio frequency module for reading and writing separate processor arranged, the independent program of use, and with physical method module is encapsulated, can't obtain whole keys by the method that cracks mainframe program, thereby improve the stability of encrypting greatly.
5, by automatic protection functions being set, when having the people to attempt to crack encryption, cracking for several times and just damage automatically, ensure information security at radio electronic label.
Description of drawings
Fig. 1 is the structural representation of a kind of accessory encryption device of the utility model.
The specific embodiment
For the purpose of this utility model, technical scheme are further understood, now also be described below in detail in conjunction with the accompanying drawings with specific embodiment:
For the destruction that prevents to use non-original factory and the pseudo-consumptive material that emits that equipment is produced; we have designed a kind of radio electronic label 20 encryption devices; and by apparatus body 10 and radio electronic label 20 by communicating by letter, so that consumptive material is carried out encipherment protection through the method for enciphered message contact.
Of the present utility modelly a kind ofly carry out method of encrypting by 20 pairs of consumptive materials of radio electronic label, radio electronic label 20 at first is installed on consumptive material (easy-consuming fitting), and on apparatus body 10, be provided with a radio frequency module for reading and writing 102 of distinguishing with interpretation RFID in addition, on the radio electronic label 20 of equipment and consumptive material, write authenticate key respectively, version information, authentication information etc.This radio frequency module for reading and writing 102 can integrate with the form of apparatus body 10 with general module, but be preferably separate processor and the independent program used, and this radio frequency module for reading and writing 102 is encapsulated with physical method, thereby can't obtain whole keys by the method that cracks mainframe program, improve the stability of encrypting greatly.In preferred version, key separated into two parts on the apparatus body 10, be stored in respectively and reach in the radio frequency module for reading and writing 102 in the device memory 101 (processing module, memory module), be a complete authenticate key through radio frequency module for reading and writing 102 with two parts cipher key combinations again, then be preset with this complete authenticate key on the label.In device power-up or when resetting, equipment at first needs to use this complete authenticate key that the radio electronic label on the consumptive material 20 is authenticated, promptly the authenticate key that prestores in the password memory block 201 of radio electronic label 20 is read and comparison the two consistent authentication authorization and accounting success.After the authentication success, produce session key by radio frequency module for reading and writing 102.Device Host uses session key, and the radio electronic label on the consumptive material 20 is authenticated once more, starts the ciphertext transmission, and the consumptive material use amount in the data storage area 202 is wherein carried out read-write operation.Equipment can be regularly in executable operations or not timing ground the radio electronic label on the consumptive material 20 is carried out the ciphertext read-write, have only and just carry out relevant operation after reading and writing successfully, equipment will record the quantity situation that each consumptive material uses among the data storage area 202 of radio electronic label 20.After the consumptive material use amount of record in the radio electronic label 20 met or exceeded theoretical value, equipment pointed out consumptive material to finish using automatically, the consumptive material that requires the user more to renew.If detect less than encrypting radio electronic label 20 when equipment uses, can't work.Equipment will be periodically when executable operations judging the use amount of record in 20 data storage areas 202 of the radio electronic label on the consumptive material, have only the consumptive material use amount of data storage area 202 records in the radio electronic label 20 to be lower than under the situation of theoretical value of apparatus settings, equipment could be carried out the operation of being correlated with.In addition, this radio electronic label 20 can be provided with to be prevented cracking function, when the people wants to crack, and three password bads, radio electronic label 20 will damage automatically, forever can't recover.This method also can be applied to above the equipment of those critical components that must regularly replace, and reminds the user regularly to carry out more capable of to prevent the generation of problem.
This radio electronic label 20 is preferably the serial radio-frequency card of the radio-frequency card " Crypto RF Card " by name that meets ISO14443TYPE B standard in present embodiment, its advantage is, it should provide the eeprom memory that 1K bits-64K bits does not wait in the sheet by the series card according to different models, and the card of different models except capacity with number of partitions is different, hardware interface of being supported and command set are compatible fully, make things convenient for the upgrading and the cost control of system; And support memory block planning: EEPROM adopts popular zone configuration in the sheet.The number of partitions of the card of different model is between 4-16; Can pass through password, the configuration of authority realizes the merging and the partition of subregion, is fit to very much one card for multiple uses; The password of this card, key, configuration information are stored in one independently in the configure partition in addition.Do not take the space of user's partition holding, the great like this operating factor of memory space that improved.And help the unified management of card.Especially each key, password all have and independently prevent malicious sabotage error counter SCAC, SC checks when correct, SC is readable and erasable, SC checks when incorrect, and SC can not read with erasable and the SCAC value subtracted one, and the SCAC initial value is 4, SC checks every wrong 1 time SCAC is subtracted 1, SCAC equals at 0 o'clock, and the card self-destruction reverts to initial value 4 if SC checks correct SCAC.This radio-frequency card supports writing of card to latch in addition.
In order further to guarantee the security of information, except utilizing the cryptographic means that has of those radio electronic labels 20 itself, the device that the utility model further provides a kind of printer to cooperate with this radio electronic label 20: (following said main frame refers to processing module and the memory module that has printer now)
At first, carry out the Device Host chip initiation, program in the Device Host must arrive the essential information such as initial configuration of fetch program operation in the encryption chip 103, just can finish the initialization (promptly having the program of sub-fraction key to leave in this encryption chip) of main frame.
Secondly, authenticate key is divided into two parts, write respectively in the radio frequency module for reading and writing 102 on main frame and the main frame, after this radio frequency module for reading and writing 102 is a complete authenticate key with two parts cipher key combinations, and use this complete key that the radio electronic label on the consumptive material 20 is authenticated.
Owing to separate processor is arranged in the main frame radio frequency module for reading and writing 102, the independent program of use, and with physical method module is encapsulated, thereby can guarantee to obtain whole keys by the method that cracks mainframe program, increase the security of information.
Below be that example specifies its implementation process with the thermal transfer printer, and as Device Host in detail this scheme is described in detail, but is not limited to this kind main process equipment with the ARM single-chip microcomputer.
One, the storage of enciphered message
1, at first, a mainboard encryption chip 103 is housed in addition on the mainboard of ARM single-chip microcomputer, the initial key that computer program stored operation in the inside is necessary, version information, authentication information etc., the confidentiality of assurance program.
2, radio electronic label 20 has several data storage areas 202, respectively this independently data storage area 202 can storage version information and authentication information and the access times that are used for the storage print head, consumptive material use amount information such as print length length.
3, in addition, the authenticate key of radio frequency encryption chip authentication divides two parts storage.A part is stored in the ARM single-chip microcomputer; Another part is stored in the ARM single-chip microcomputer radio frequency module for reading and writing 102.
Be responsible for reading key part in the ARM single-chip microcomputer by radio frequency module for reading and writing 102, and in conjunction with the part that is stored in the radio frequency module for reading and writing 102, after authenticate key is integrated, finish the initial authentication process of radio electronic label 20, generation also provides session key for the ARM single-chip microcomputer.The ARM single-chip microcomputer utilizes this session key, carries out the encrypting read/write of data, with the operating position of record ink ribbon.
Two, ciphering process is described:
Device initialize: use PC software before the ARM single-chip microcomputer dispatches from the factory, mainboard encryption chip 103 is carried out initialization (initial key, version information, authentication information etc.).
Radio frequency module for reading and writing 102 initialization: the initialized PC software that utilizes simultaneously of ARM single-chip microcomputer, the part of colour band authenticate key is stored into radio frequency module for reading and writing 102, and another part deposits the device memory 101 (memory of Device Host management) of ARM single-chip microcomputer in.
The colour band initialization: the label on the consumptive material can independently write complete authenticate key on the initialization apparatus before embedding colour band, and relevant authentication information, and access times etc. are initialized as zero, or the available number of input consumptive material.Because of this radio electronic label 20 is contactless, thereby partly or entirely also can before dispatching from the factory, the writing of those information, perhaps returns and reinitialize after factory reproduces.
In device power-up or when resetting, the ARM single-chip microcomputer need use initial key that mainboard encryption chip 103 is authenticated again, behind the authentication success, the ARM single-chip microcomputer is the necessary initializes configuration information of fetch program operation from mainboard encryption chip 103, makes program be able to normal operation.
Print when maybe needing to read consumable information when needs in the program normal course of operation, the ARM single-chip microcomputer passes to radio frequency module for reading and writing 102 with the part colour band authenticate key of its preservation, radio frequency module for reading and writing 102 will be stored in another part key and next synthetic complete authenticate key of set of cipher key of ARM single-chip microcomputer transmission wherein, and use this authenticate key to carry out authentication initialization by the radio electronic label 20 on 104 pairs of consumptive materials of antenna, promptly the authenticate key that prestores in the password memory block 201 of radio electronic label 20 is read and comparison the two consistent authentication authorization and accounting success.After authentication was passed through, radio frequency module for reading and writing 102 produced session key, and the ARM single-chip microcomputer uses this session key that the RF tag on the colour band is authenticated once more, started the ciphertext transmission.The data storage area 202 of this radio electronic label 20 is divided into several independently data storage areas 202, and its quantity is good with 4, described respectively this independently data storage area 202 can storage version information and authentication information.Behind the ciphertext transmission start, can carry out read-write operation to the consumptive material use amount.The use information of colour band is transmitted by radio frequency module for reading and writing 102, and the data of being finished radio electronic label 20 by radio frequency module for reading and writing 102 write.This scheme optimization is for being provided with separate processor in radio frequency module for reading and writing 102, use independent program, and module is encapsulated with physical method, and can be provided with the anti-module that cracks, thereby can't obtain whole keys, thereby improved the stability of encrypting greatly by the method that cracks mainframe program.
In program, the ARM single-chip microcomputer can carry out the ciphertext read-write to mainboard encryption chip 103 or colour band RF tag in not timing ground when carrying out key operation.Have only and just carry out relevant operation after reading and writing successfully.
The advantage of this cipher mode:
Owing to adopted 20 pairs of consumptive materials of contactless radio electronic label to encrypt, overcome that easily get rusty in the contact contact, flimsy shortcoming, increased reliability.
Adopt 20 pairs of consumptive materials of contactless radio electronic label to encrypt, can after the consumptive material assembling, carry out initialization to radio electronic label 20 again, improved initialized speed greatly, be convenient to very much work out simultaneously multiple cipher.
Owing to improved the initialized speed of radio electronic label 20, be convenient to work out multiple cipher simultaneously, therefore very convenient production and management.For the different password of different demand establishments provides possibility, can pass through the different password of establishment as different clients or zones of different, thus a lot of practical problems such as solution falsifying.
Owing to adding in the RF tag radio frequency module for reading and writing 102 separate processor is arranged in addition, the independent program of using, and with physical method module is encapsulated, thereby can't obtain whole keys by the method that cracks mainframe program, thus the stability of encrypting improved greatly.

Claims (10)

1. an accessory encryption device is arranged at an accessory, it is characterized in that, this encryption device is a radio electronic label.
2. a kind of accessory encryption device as claimed in claim 1, it is characterized in that, this accessory is arranged on the apparatus body, and this apparatus body is provided with a device memory that is used for the storage area authenticate key, a radio frequency module for reading and writing that is used to store another part authenticate key.
3. a kind of accessory encryption device as claimed in claim 2 is characterized in that, the mainboard encryption chip that a computer program stored moves necessary initial key, version information, authentication information is housed on the mainboard of this apparatus body in addition.
4. a kind of accessory encryption device as claimed in claim 3 is characterized in that this radio frequency module for reading and writing and this apparatus body integrate, or with physical method to individual packages.
5. as claim 2,3 or 4 described a kind of accessory encryption devices, it is characterized in that this radio electronic label is provided with at least one password memory block that is used to discern radio frequency module for reading and writing key and at least one stores the data storage area of this corollary equipment use amount.
6. a kind of accessory encryption device as claimed in claim 5 is characterized in that the data storage area of this radio electronic label is divided into several independently data storage areas.
7. a kind of accessory encryption device as claimed in claim 6 is characterized in that, described respectively this independently the data storage area be can storage version information and the independent data memory block of authentication information.
8. a kind of accessory encryption device as claimed in claim 7 is characterized in that, this radio electronic label is a Crypto RF Card series radio-frequency card.
9. a kind of accessory encryption device as claimed in claim 8 is characterized in that this apparatus body is a printer, and this accessory is a printer material consumption.
10. a kind of accessory encryption device as claimed in claim 9 is characterized in that this accessory is the easily-consumed products of this equipment.
CN2009202780093U 2009-12-04 2009-12-04 Fitting encryption device Expired - Lifetime CN201544537U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009202780093U CN201544537U (en) 2009-12-04 2009-12-04 Fitting encryption device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009202780093U CN201544537U (en) 2009-12-04 2009-12-04 Fitting encryption device

Publications (1)

Publication Number Publication Date
CN201544537U true CN201544537U (en) 2010-08-11

Family

ID=42599698

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009202780093U Expired - Lifetime CN201544537U (en) 2009-12-04 2009-12-04 Fitting encryption device

Country Status (1)

Country Link
CN (1) CN201544537U (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102145596A (en) * 2010-11-11 2011-08-10 童国海 Method, system and ink box for controlling printing
CN102222244A (en) * 2011-05-20 2011-10-19 海能达通信股份有限公司 Anti-counterfeiting verification method of fitting, configuration method thereof and wireless communication equipment
CN102567614A (en) * 2010-12-07 2012-07-11 重庆微海软件开发有限公司 Ultrasonic treatment equipment consumable management system and method thereof
CN102642405A (en) * 2011-02-18 2012-08-22 北京美科艺数码科技发展有限公司 Ink protection method for ink-jet printer
CN103513943A (en) * 2012-06-18 2014-01-15 深圳市博思得科技发展有限公司 Anti-fake printing method and system
CN105216451A (en) * 2015-09-25 2016-01-06 深圳泓数科技有限公司 For ink storage container and the ink authoring system of Medical ink jet printer
CN106346956A (en) * 2015-07-24 2017-01-25 北大方正集团有限公司 Jet ink information storage and recognition device and jet ink information storage and recognition method
CN110392634A (en) * 2017-04-04 2019-10-29 惠普发展公司,有限责任合伙企业 Consumptive material storage

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102145596A (en) * 2010-11-11 2011-08-10 童国海 Method, system and ink box for controlling printing
CN102567614A (en) * 2010-12-07 2012-07-11 重庆微海软件开发有限公司 Ultrasonic treatment equipment consumable management system and method thereof
CN102567614B (en) * 2010-12-07 2015-11-25 重庆微海软件开发有限公司 A kind of ultrasonic therapeutic apparatus consumable smart media management system and method
CN102642405A (en) * 2011-02-18 2012-08-22 北京美科艺数码科技发展有限公司 Ink protection method for ink-jet printer
CN102222244A (en) * 2011-05-20 2011-10-19 海能达通信股份有限公司 Anti-counterfeiting verification method of fitting, configuration method thereof and wireless communication equipment
CN103513943A (en) * 2012-06-18 2014-01-15 深圳市博思得科技发展有限公司 Anti-fake printing method and system
CN106346956A (en) * 2015-07-24 2017-01-25 北大方正集团有限公司 Jet ink information storage and recognition device and jet ink information storage and recognition method
CN106346956B (en) * 2015-07-24 2018-02-09 北大方正集团有限公司 A kind of ink-jet ink information storage identification device and method
CN105216451A (en) * 2015-09-25 2016-01-06 深圳泓数科技有限公司 For ink storage container and the ink authoring system of Medical ink jet printer
CN110392634A (en) * 2017-04-04 2019-10-29 惠普发展公司,有限责任合伙企业 Consumptive material storage
CN110392634B (en) * 2017-04-04 2022-06-07 惠普发展公司,有限责任合伙企业 Consumable storage

Similar Documents

Publication Publication Date Title
CN201544537U (en) Fitting encryption device
CN102087684B (en) Method for encrypting consumable items through radio frequency identification electronic tag
CN102231054B (en) Chip, data communication method for chip, consumable container and imaging equipment
CN100437632C (en) RFID tag and related determination and management
EP1672553B1 (en) Method of authentication of memory device and device therefor
CN101187987B (en) Information access system, reader/writer device, and active-type contactless information storage device
CN1831838B (en) Authentication tag for software media
CN100541510C (en) Wireless tag system, wireless identification tag and access control apparatus thereof, method
US7430762B2 (en) Identification card manufacturing security
CN103098069A (en) Secure upgrade supplies and methods
CN102145596A (en) Method, system and ink box for controlling printing
JP2004166208A (en) Authentication of electronic tag
CN101082884A (en) Finger print safety storage U disk
CN101410876B (en) Printing method
CN102646075A (en) Storage card locking method and system
CN112123923B (en) Thermal transfer printer, encryption management system and method
CN100419719C (en) Method for automatic protection of U disc by using filtering driver and intelligent key device
CN103927803A (en) Active radio frequency identification (RFID)-based power door lock control system
CN101017462A (en) Portable memory devices having biological date protection mechanism and protection method thereof
CN104915789B (en) Safety impression method, device and its system
CN103235995A (en) Electronic anti-counterfeiting and logistics management system based on NFC (near field communication) mobile phone
CN101246557A (en) EPC enciphering code, RFID chip anti-collision method, structure and reader-writer and system
CN201111157Y (en) Postage label printer
CA3048321C (en) Method and system for controlling the use of a cartridge unit
CN104077085B (en) For the virtual printing system of automation control system

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
DD01 Delivery of document by public notice

Addressee: Xu Feng

Document name: Notification that Application Deemed not to be Proposed

ASS Succession or assignment of patent right

Owner name: BEIJING LABEL + MARK INFORMATION TECHNOLOGY CO., L

Free format text: FORMER OWNER: XU FENG

Effective date: 20141030

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100082 HAIDIAN, BEIJING TO: 100041 SHIJINGSHAN, BEIJING

TR01 Transfer of patent right

Effective date of registration: 20141030

Address after: 100041, Shijingshan District, Beijing double Yu Road, No. three, 51

Patentee after: Beijing force code division information technology Limited by Share Ltd

Address before: 100082, Jin Hui, Jiayuan 1-3-1102, 58 North Street, Haidian District, Beijing, Xizhimen

Patentee before: Xu Feng

CX01 Expiry of patent term

Granted publication date: 20100811

CX01 Expiry of patent term