WO2017177403A1 - Procédé anti-contrefaçon pour un module fonctionnel de matériel d'un dispositif électronique et puce de sécurité, module fonctionnel matériel, appareil électronique et système associé - Google Patents

Procédé anti-contrefaçon pour un module fonctionnel de matériel d'un dispositif électronique et puce de sécurité, module fonctionnel matériel, appareil électronique et système associé Download PDF

Info

Publication number
WO2017177403A1
WO2017177403A1 PCT/CN2016/079189 CN2016079189W WO2017177403A1 WO 2017177403 A1 WO2017177403 A1 WO 2017177403A1 CN 2016079189 W CN2016079189 W CN 2016079189W WO 2017177403 A1 WO2017177403 A1 WO 2017177403A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
authentication
function module
hardware function
application
Prior art date
Application number
PCT/CN2016/079189
Other languages
English (en)
Chinese (zh)
Inventor
黄晓庆
张哲�
Original Assignee
深圳前海达闼云端智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳前海达闼云端智能科技有限公司 filed Critical 深圳前海达闼云端智能科技有限公司
Priority to PCT/CN2016/079189 priority Critical patent/WO2017177403A1/fr
Priority to CN201680002865.9A priority patent/CN107683463A/zh
Publication of WO2017177403A1 publication Critical patent/WO2017177403A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring

Definitions

  • the present invention relates to the field of holographic image technology, and in particular, to a security chip, a hardware function module, an electronic device, a system and a method thereof for performing anti-counterfeiting on a hardware device in the field of holographic image technology.
  • the holographic reality technology produced in the technical field of holographic images materializes the digital world into the real world through holographic reality technology, and users can view, touch, sense and manipulate holographic information without any head-mounted device, and holography.
  • the images interact.
  • Implementing this technology requires a specific display device, and a program or application software developed by a manufacturer who manufactures content based on the technology also needs to be developed or run on a device including the display device.
  • this particular display device will also have imitations or other alternatives. Therefore, how to prevent this specific hardware device is an urgent problem to be solved.
  • the hardware anti-counterfeiting detection method of the existing electronic device is to independently detect the hardware module, for example, by using an anti-counterfeit label to perform anti-counterfeiting.
  • the electronic device is disassembled to identify whether the hardware module has an anti-counterfeit label, or how true or false the anti-counterfeit label is.
  • this type of detection requires disassembly of the electronic device. Therefore, the method not only has a high authentication cost, but also is not very convenient to identify and is not practical.
  • the technical problem to be solved by the present invention is to provide a convenient and practical anti-counterfeiting method for hardware function modules of electronic devices, and a security chip, a hardware function module, an electronic device and a system.
  • the present invention provides the following technical solutions:
  • the present invention provides a hardware function module anti-counterfeiting method for an electronic device, the method comprising: receiving an authentication instruction when the hardware function module is used or possibly used by an application; according to the authentication The instruction sends an authentication request message to the authentication server, and receives an authentication result returned by the authentication server.
  • the method further includes determining, based on the authentication result, whether the application that needs to use the hardware function module can continue to be developed or installed on the electronic device.
  • the present invention provides a security chip for anti-counterfeiting, which is applied to a hardware function module, wherein the security chip is built in the hardware function module, and the security chip is used to execute the electronic device of the present invention.
  • the hardware function module anti-counterfeiting method provides a method in any one of the specific embodiments.
  • the present invention provides an anti-counterfeiting hardware function module, which is used in an electronic device, and is characterized in that the hardware function module includes any one of the specific embodiments provided by the anti-forgery security chip of the present invention. Security chip in the middle.
  • the hardware function module further includes: a microprocessor and a module storage device; the module storage device is configured to store an authentication management program; and the microprocessor receives the electronic device security management program to send And according to the notification, it is known that an application uses or may use the hardware function module, reads an authentication management program in the module storage device, and sends an authentication instruction to the security chip by the authentication management program. .
  • the present invention provides an anti-counterfeiting electronic device, which includes a central processing unit and a device storage device, wherein the electronic device further includes any one of the specific embodiments provided by the hardware function module of the present invention.
  • a hardware function module wherein the device storage device is configured to store an electronic device security management program; the central processor reads and runs an electronic device security management program in the device storage device; when the user develops on the electronic device Or when installing an application that needs to use the hardware function module, the electronic device security management program triggers an authentication procedure of the hardware function module.
  • determining, according to the authentication result, whether the electronic device can continue to develop or install the application that needs to use the hardware function module, and the electronic device security management program running in the central processor carried out.
  • the present invention provides an anti-counterfeiting security system, characterized in that the security system comprises an authentication server, and an electronic device according to any of the embodiments provided by the electronic device of the present invention; wherein the authentication a server, configured to receive an authentication request message sent by the electronic device, and further The hardware function module in the electronic device is authenticated according to the authentication request message, and then the authentication result is returned to the electronic device.
  • the present invention provides a computer readable storage medium, characterized in that, when the computing program stored in the computer readable storage medium is executed, any one of the hardware function module anti-counterfeiting methods of the electronic device of the present invention is provided. The method in the detailed description.
  • the present invention provides a computer program product stored in a computer internal storage module, the computer program product being executed to perform the method of any one of the specific embodiments provided by the hardware function module anti-counterfeiting method of the electronic device of the present invention. .
  • the beneficial effects of the present invention are that, when the hardware function module is used by the application or may be used, the authentication program is started, and according to the authentication result, whether the application can continue to be developed or installed, thereby The fake hardware function module can be actually in an unusable state, thereby achieving the anti-counterfeiting effect.
  • the anti-counterfeiting method does not need to disassemble the detected electronic device, and can reduce the detection cost, and is convenient and practical.
  • FIG. 1 is a flowchart of an anti-counterfeiting method for a hardware function module of an electronic device according to a first embodiment of the present invention
  • FIG. 2 is a signaling interaction diagram of the anti-forgery method of the hardware function module of FIG. 1 in a specific application scenario
  • FIG. 3 is a structural diagram of an anti-counterfeiting system according to Embodiment 2 of the present invention.
  • FIG. 4 is a circuit block diagram of the electronic device of FIG. 2;
  • FIG. 5 is a circuit block diagram of an anti-forgery hardware function module according to Embodiment 3 of the present invention.
  • FIG. 6 is a circuit block diagram of an anti-forgery hardware function module according to Embodiment 4 of the present invention.
  • microprocessor 131 Module storage device 132 Security chip 133 Authentication server 20
  • FIG. 1 is a flowchart of a method for anti-counterfeiting of a hardware function module of an electronic device according to a first embodiment of the present invention.
  • the hardware function module can be a component of an electronic device that can be independently produced and sold by any manufacturer, such as a display module, a storage module, an audio play module, and the like; the method includes:
  • Step 100 Receive an authentication instruction when the hardware function module is used by the application or may be used;
  • Step 200 Send an authentication request message to the authentication server according to the authentication instruction.
  • Step 300 Receive an authentication result returned by the authentication server.
  • the method further includes: Step 400, processing the development or installation process of the application in the electronic device according to the authentication result. Specifically, according to the authentication result, it is determined whether the electronic device can continue to develop or install an application that needs to use the hardware function module. More specifically, when the authentication result is a failure or no authentication result is returned, the application is developed or installed on the electronic device; when the authentication result is successful, the electronic device can continue to be used. Develop or install the application on.
  • the hardware function module is a fake, and the user continues to develop or install an application that needs to use the hardware function module on the electronic device, so that the imitation is actually in an unavailable state.
  • the anti-counterfeiting method provided by the specific embodiment 1 of the present invention when the hardware function module is used by the application or may be used, starts the electronic device security management program, that is, the authentication program, so that the hardware function module and the authentication function
  • the server performs authentication communication, and determines whether the application can continue to be developed or installed according to the authentication result, thereby enabling the fake hardware function module to be actually not
  • the state is available to achieve anti-counterfeiting effects.
  • the anti-counterfeiting method does not need to disassemble the detected electronic device, and can reduce the detection cost, and is convenient and practical.
  • FIG. 2 it is a signaling interaction diagram in a specific application scenario of the anti-counterfeiting method of FIG.
  • the hardware function module of the electronic device is specifically a hardware function module capable of realizing functions such as hologram image and interaction between the user and the hologram image.
  • a security chip for anti-counterfeiting is built in the hardware function module.
  • an electronic device security management program is set in a software development kit (SDK) in the electronic device, and any content program developer needs to develop an application on the electronic device that needs to use the hardware function module.
  • SDK software development kit
  • the electronic device security management program is triggered, and the authentication communication between the security chip and the authentication server is performed;
  • an API Application Programming Interface
  • the security management program enables authentication communication between the security chip and the authentication server.
  • the electronic device security management program triggers authentication communication between the security chip and the authentication server. Specifically, the electronic device security management program may directly send an authentication command to the security chip for authentication; or may notify the hardware function module first, and then generate an authentication command internally to the security chip. , for authentication.
  • Step S1 when the hardware function module is used by the application or may be used, the security chip receives the authentication instruction, and the security chip is built in a hardware function module;
  • step S1 is implemented in the following two ways:
  • Step S111 the security chip receives an authentication command sent by the electronic device security management program, where the electronic device security management program is an authentication program built in the electronic device; or
  • Step S121 the microcontroller in the hardware function module receives a notification sent by the electronic device security management program, and the notification is used to notify the hardware function module to be used by the application program or may be used by the application program;
  • Step S122 the microcontroller in the hardware function module sends an authentication instruction to the security chip.
  • Step S2 The security chip sends an authentication request message to the authentication server according to the authentication instruction.
  • step S3 the authentication server performs authentication according to the authentication request message, and returns an authentication result.
  • step S4 the security chip receives the authentication result sent by the authentication server.
  • step S5 the security chip sends the authentication result to the electronic device security management program.
  • Step S6 The electronic device security management program determines, according to the authentication result, whether the electronic device can continue to develop or install an application that needs to use the hardware function module. Specifically, when the authentication result is a failure or no authentication result is returned, the electronic device security management program terminates the user to continue to develop or install the application on the electronic device; when the authentication result is successful, the electronic device management The system then allows the user to continue to develop or install the application on the electronic device.
  • FIG. 3 and FIG. 4 an architecture diagram of an anti-counterfeiting system and a circuit block diagram of an electronic device according to Embodiment 2 of the present invention are shown.
  • the anti-counterfeiting system includes: an electronic device 10 and an authentication server 20; the electronic device 10 includes a central processing unit 11, a device storage device 12, and a hardware function module 13.
  • the device storage device 12 is configured to store an electronic device security management program
  • the central processing unit 11 reads and runs an electronic device security management program in the device storage device 12 when the user develops or installs an application that uses the hardware function module 13 on the electronic device 10; the electronic device The security management program triggers the authentication communication between the hardware function module 13 and the server; the electronic device security management program further determines the development or installation process of the application according to the authentication result of the hardware function module 13;
  • the manner in which the electronic device security management program triggers the hardware function module 13 to perform authentication communication may be: the electronic device security management program sends a notification to the hardware function module 13 for notifying the hardware function.
  • the module is used by the application or may be used by the application, and then the hardware function module 13 internally generates an authentication command, so that the hardware function module 13 performs authentication communication with the authentication server; or The electronic device security management program directly to the hardware function module 13 sending an authentication command, so that the hardware function module 13 and the authentication server perform authentication communication.
  • the hardware function module 13 is configured to send an authentication request message to the authentication server 20 for the hardware module that implements a specific function, and receive the authentication result sent back by the authentication server 20, and the authentication is performed. The result is fed back to the electronic device security management program running in the central processing unit 11;
  • the authentication server 20 authenticates the hardware function module 13 according to the authentication request message sent by the hardware function module 13, and returns an authentication result.
  • the hardware function module 13 is triggered to send an authentication request message to the authentication server 20, and the implementation manner may be:
  • the hardware function module 13 After receiving the notification sent by the electronic device security management program, the hardware function module 13 internally generates an authentication command, and then sends an authentication request message to the authentication server 20 according to the authentication command; or
  • the hardware function module 13 After receiving the authentication command sent by the electronic device security management program, the hardware function module 13 sends an authentication request message to the authentication server 20 according to the authentication command.
  • the electronic device security management program running in the central processing unit 11 terminates the development or installation of the application on the electronic device; when the authentication result is Upon success, the electronic device security management program running in the central processing unit 11 allows the application to continue to be developed or installed on the electronic device.
  • the communication between the hardware function module 13 and the authentication server is completed by hardware having a communication function.
  • the hardware having the communication function may be built in the electronic device or may be built in the hardware function module. Since the hardware having the communication function can be obtained according to the prior art, detailed description will not be made here.
  • the hardware function module is a fake, and the user continues to develop or install the application using the hardware function module on the electronic device, so that the fake hardware function module is actually not available. Use status.
  • the electronic device security management program When the electronic device and the hardware function module provided by the second embodiment of the present invention develop or install an application that needs to use the hardware function module on the electronic device, the electronic device security management program is started, and then the hardware function is triggered. Authentication communication between the module and the authentication server, and determining whether the application can continue to be developed or installed according to the authentication result, thereby enabling the fake hardware function module to be practically unavailable, thereby achieving Anti-counterfeiting effect. Moreover, the anti-counterfeiting method does not need to disassemble the detected electronic device, and can reduce the detection cost, and is convenient and practical.
  • the anti-counterfeiting hardware function module 13 includes a security chip 133.
  • the security chip 133 is configured to send an authentication request message to the authentication server after receiving the authentication command, and receive an authentication result sent by the authentication server, and feed back the authentication result to the electronic device security management program.
  • the authentication instruction is sent by the electronic device security management program.
  • the electronic device security management program determines, based on the authentication result, whether the electronic device can continue to develop or install an application that needs to use the hardware function module. Specifically, when the authentication result is a failure or no authentication result is returned, the electronic device security management program terminates the development or installation of the application on the electronic device; when the authentication result is successful, the electronic device security management The program will then allow the user to continue to develop or install the application on the electronic device.
  • the hardware function module is a fake, and the application that terminates on the electronic device is used to continue to send or install the hardware function module, so that the fake hardware function module is actually unavailable.
  • the anti-counterfeiting method does not need to disassemble the detected electronic device, and can reduce the detection cost, and is convenient and practical.
  • the communication between the security chip 133 and the authentication server is completed by hardware having a communication function.
  • the hardware having the communication function may be built in the electronic device or built in the hardware function module, or the security chip itself may have a communication function. Since the hardware having the communication function can be obtained according to the prior art, detailed description will not be made here.
  • the security chip provided by the third embodiment of the present invention when the hardware function module is used by an application or may be used by an application, starts an electronic device security management program, and then triggers a comparison between the security chip and the authentication server.
  • the right communication and according to the result of the authentication, determines whether the application can continue to be developed or installed on the electronic device, thereby making the fake hardware function module practically unavailable, thereby achieving the anti-counterfeiting effect.
  • FIG. 6 is a circuit block diagram of an anti-forgery hardware function module according to Embodiment 4 of the present invention.
  • the anti-counterfeiting hardware function module 13 provided in the fourth embodiment further includes a microprocessor 131 and a module storage device 132.
  • the module storage device 132 is configured to store an authentication management program
  • the microprocessor 131 receives the notification sent by the electronic device security management program, and according to the notification, the application program uses or may use the hardware function module 13 to read the authentication management program in the module storage device 132. And the authentication management program sends an authentication instruction to the security chip.
  • the electronic device security management program determines, based on the authentication result, whether the electronic device can continue to develop or install an application that needs to use the hardware function module. Specifically, when the authentication result is a failure or no authentication result is returned, the electronic device security management program terminates the development or installation of the application on the electronic device; when the authentication result is successful, the electronic device security management The program will then allow the user to continue to develop or install the application on the electronic device.
  • the hardware function module is a fake, and the application that terminates on the electronic device is used to continue to send or install the hardware function module, so that the fake hardware function module is actually unavailable.
  • the anti-counterfeiting method does not need to disassemble the detected electronic device, and can reduce the detection cost, and is convenient and practical.
  • the security chip provided by the fourth embodiment of the present invention when the hardware function module is used by an application or may be used by an application, starts an electronic device security management program, and then triggers a comparison between the security chip and the authentication server. The right communication, and according to the result of the authentication, determines whether the application can continue to be developed or installed on the electronic device, thereby making the fake hardware function module practically unavailable, thereby achieving the anti-counterfeiting effect.
  • the content of the above-mentioned hardware function module, the information exchange between the security chip and the authentication server, the execution process, etc. because the anti-counterfeiting method provided by the specific embodiment 1 of the present invention is based on the same concept, is not exhaustive. For details, refer to the description of the anti-counterfeiting method provided in the specific embodiment 1 of the present invention, and details are not described herein again.
  • ROM Read Only Memory
  • RAM Random Access Memory
  • disk optical disk

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention porte sur un procédé anti-contrefaçon pour un module fonctionnel de matériel (13) d'un dispositif électronique et sur une puce de sécurité (133), sur le module fonctionnel matériel (13), sur un appareil électronique (10) et sur un système associé. Le procédé consiste : lorsqu'un module fonctionnel de matériel (13) est utilisé, ou peut être utilisé, par un programme d'application, à recevoir une instruction d'authentification; en fonction de l'instruction d'authentification, à envoyer un message de demande d'authentification à un serveur d'authentification (20); et à recevoir un résultat d'authentification renvoyé par le serveur d'authentification (20). Puisqu'un programme d'authentification est démarré lorsque le module fonctionnel de matériel (13) est utilisé, ou peut être utilisé, par le programme d'application, et puisqu'il est déterminé en fonction du résultat d'authentification que le programme d'application peut continuer à être développé ou installé, il est possible de permettre à un module fonctionnel de matériel d'imitation (13) d'être en réalité dans un état inutilisable, ce qui permet d'obtenir l'effet d'anti-contrefaçon sans avoir besoin de démonter un appareil électronique détecté (10); de cette manière, les coûts de détection peuvent être réduits et la commodité et le caractère pratique sont réalisés.
PCT/CN2016/079189 2016-04-13 2016-04-13 Procédé anti-contrefaçon pour un module fonctionnel de matériel d'un dispositif électronique et puce de sécurité, module fonctionnel matériel, appareil électronique et système associé WO2017177403A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2016/079189 WO2017177403A1 (fr) 2016-04-13 2016-04-13 Procédé anti-contrefaçon pour un module fonctionnel de matériel d'un dispositif électronique et puce de sécurité, module fonctionnel matériel, appareil électronique et système associé
CN201680002865.9A CN107683463A (zh) 2016-04-13 2016-04-13 一种电子设备的硬件功能模组的防伪方法及其安全芯片、硬件功能模组、电子装置、系统

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/079189 WO2017177403A1 (fr) 2016-04-13 2016-04-13 Procédé anti-contrefaçon pour un module fonctionnel de matériel d'un dispositif électronique et puce de sécurité, module fonctionnel matériel, appareil électronique et système associé

Publications (1)

Publication Number Publication Date
WO2017177403A1 true WO2017177403A1 (fr) 2017-10-19

Family

ID=60042256

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/079189 WO2017177403A1 (fr) 2016-04-13 2016-04-13 Procédé anti-contrefaçon pour un module fonctionnel de matériel d'un dispositif électronique et puce de sécurité, module fonctionnel matériel, appareil électronique et système associé

Country Status (2)

Country Link
CN (1) CN107683463A (fr)
WO (1) WO2017177403A1 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1746807A (zh) * 2005-09-29 2006-03-15 浪潮电子信息产业股份有限公司 一种品牌计算机部件防伪方法
US7058811B2 (en) * 2001-10-31 2006-06-06 Intel Corporation Apparatus and method to prevent a device driver from loading on a counterfeit hardware element
CN102810077A (zh) * 2012-06-29 2012-12-05 北京奇虎科技有限公司 一种异常硬件的检测方法和装置
CN103716794A (zh) * 2013-12-25 2014-04-09 北京握奇数据系统有限公司 一种基于便携式设备的双向安全验证方法及系统
CN103902402A (zh) * 2012-12-30 2014-07-02 航天信息股份有限公司 射频标签安全芯片设备及其数据处理方法
CN203909502U (zh) * 2014-02-28 2014-10-29 深圳市铭为科技有限公司 一种具备配件防伪功能的家用电器

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123029A (zh) * 2011-03-23 2011-07-13 贺春红 一种动态密码防伪令牌及方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7058811B2 (en) * 2001-10-31 2006-06-06 Intel Corporation Apparatus and method to prevent a device driver from loading on a counterfeit hardware element
CN1746807A (zh) * 2005-09-29 2006-03-15 浪潮电子信息产业股份有限公司 一种品牌计算机部件防伪方法
CN102810077A (zh) * 2012-06-29 2012-12-05 北京奇虎科技有限公司 一种异常硬件的检测方法和装置
CN103902402A (zh) * 2012-12-30 2014-07-02 航天信息股份有限公司 射频标签安全芯片设备及其数据处理方法
CN103716794A (zh) * 2013-12-25 2014-04-09 北京握奇数据系统有限公司 一种基于便携式设备的双向安全验证方法及系统
CN203909502U (zh) * 2014-02-28 2014-10-29 深圳市铭为科技有限公司 一种具备配件防伪功能的家用电器

Also Published As

Publication number Publication date
CN107683463A (zh) 2018-02-09

Similar Documents

Publication Publication Date Title
EP3814946B1 (fr) Procédé, appareil et dispositif électronique d'archivage basé sur une chaîne de blocs
CN102693379B (zh) 保护操作系统配置值
KR100402071B1 (ko) 콘텐트 소비 환경의 무결성 보증 및 검증 시스템 및 방법
KR101008448B1 (ko) 소프트웨어 무단 복제 방지를 위한 시스템, 컴퓨터-구현형 방법, 및 컴퓨터 판독 가능 기록 매체
CN109716331B (zh) 符合应用程序数据共享和决策服务平台模式的应用程序部署
US9639794B2 (en) Secure upgrade supplies and methods
JP2020525869A (ja) ブロックチェーンベースの商品追跡方法および装置
WO2020092094A1 (fr) Procédé, appareil et dispositif électronique pour tenue d'enregistrement par chaîne de blocs
CN103902878B (zh) 一种虚拟环境下的License认证方法和装置
US11120119B2 (en) Recording of intrinsic device signatures in block chain for counterfeit prevention
CN103077345B (zh) 基于虚拟机的软件授权方法及系统
KR20150113087A (ko) 컴퓨팅 디바이스 부속물 보안화
AU2012101559A4 (en) Device identification using synthetic device keys
EP2924947B1 (fr) Procédé et appareil de contrôle d'accès
US20230198760A1 (en) Verified presentation of non-fungible tokens
JP2020510924A5 (fr)
CN114207613A (zh) 用于激励式入侵检测系统的技术
CN111985929A (zh) 区块链中的交易验证方法、装置、节点设备及存储介质
KR101034127B1 (ko) 무결성 보증 및 검증을 위한 시스템 및 방법
CN113596030A (zh) 设备配网方法、装置、存储介质及电子设备
WO2017177403A1 (fr) Procédé anti-contrefaçon pour un module fonctionnel de matériel d'un dispositif électronique et puce de sécurité, module fonctionnel matériel, appareil électronique et système associé
US9680816B2 (en) Attesting authenticity of infrastructure modules
US20220405413A1 (en) Information management system, method of controlling the information management system, and storage medium storing program
JP2010287081A (ja) ライセンス管理装置、ライセンス管理方法及びそのプログラム
CN115482132A (zh) 基于区块链的电子合同的数据处理方法、装置和服务器

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16898222

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 21.03.2019)

122 Ep: pct application non-entry in european phase

Ref document number: 16898222

Country of ref document: EP

Kind code of ref document: A1