CN101807994B - Method and system for application data transmission of IC card - Google Patents
Method and system for application data transmission of IC card Download PDFInfo
- Publication number
- CN101807994B CN101807994B CN 200910242887 CN200910242887A CN101807994B CN 101807994 B CN101807994 B CN 101807994B CN 200910242887 CN200910242887 CN 200910242887 CN 200910242887 A CN200910242887 A CN 200910242887A CN 101807994 B CN101807994 B CN 101807994B
- Authority
- CN
- China
- Prior art keywords
- key
- authentication
- random number
- card
- cryptographic key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 110
- 230000005540 biological transmission Effects 0.000 title claims abstract description 35
- 101100059544 Arabidopsis thaliana CDC5 gene Proteins 0.000 description 13
- 101150115300 MAC1 gene Proteins 0.000 description 13
- 101100244969 Arabidopsis thaliana PRL1 gene Proteins 0.000 description 8
- 102100039558 Galectin-3 Human genes 0.000 description 8
- 101100454448 Homo sapiens LGALS3 gene Proteins 0.000 description 8
- 101150051246 MAC2 gene Proteins 0.000 description 8
- 238000012795 verification Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 239000012467 final product Substances 0.000 description 2
- 239000000567 combustion gas Substances 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000000205 computational method Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a method and a system for application data transmission of an IC card, so as to solve the problem of poor safety of the application data transmission of the IC card in the prior art, and the method comprises the following steps: using a first device to receive a first random number generated by a second device, leading the first device and the second device to use the asymmetric encryption way for obtaining a cryptographic key factor, obtaining a first process cryptographic key and a second process cryptographic key according to a transmission safety cryptographic key generated by the cryptographic key factor, leading the second device to use the second process cryptographic key and first common data for carrying out encryption, generating a first authentication code and sending to the first device, using the first device for authenticating the first authentication code, and using the second device to send application data of the IC card encrypted through the second process cryptographic key to the first device when the authentication of the first device passes. As the application data is encrypted through the generated process cryptographic key, the safety is improved.
Description
Technical field
The invention belongs to data communication technology field, particularly a kind of method and system of IC-card application data transmission.
Background technology
At present; The most of urban applications of China the government utility IC-card system of different scales; Issued volume is on the increase; Most IC-card application systems are all selected contactless logic encryption card, and its range of application has covered fields such as public transport, subway, taxi, ferry, running water, combustion gas, landscape gardens and small amount consumption.But the fail safe that a lot of IC-cards are used is all very poor, uses like the all-purpose card that uses logic encryption card.Though having, logic encryption card prevents information in the card is arbitrarily rewritten function; When logic encryption card is operated, must at first check password in the card, only check correct, when seeing correct conditional code in the card off and replying; Could be to sticking into capable operation; Because only carry out an authentication, and do not have other safety precautions, its security performance is very low.More bad is, deposits in the process at the circle of logic encryption card, and key can transmit with the plaintext form; So just be easy to cause the leakage of sensitive data; Illegally stolen by the third party, bring potential safety hazard for the IC-card application system, cause the leakage of password and the generation of pseudo-card.It is thus clear that in existing a lot of IC-cards were used, when in IC-card, writing sensitive data or critical data, fail safe can not get guaranteeing, a little less than the fail safe.
Summary of the invention
In order to solve the more weak problem of IC-card application data transmission fail safe in the prior art, the embodiment of the invention provides a kind of method of IC-card application data transmission, comprising:
First random number that the first device reception, second device generates and sends and the PKI of second device;
First device generates cryptographic key factor, sends the cryptographic key factor by the public key encryption of second device to second device;
First device obtains the first process key according to the cryptographic key factor and first random number;
Second device obtains cryptographic key factor through the private key deciphering of self, obtains the second process key according to the cryptographic key factor and first random number;
Second device uses the second process key that first common data is encrypted and generates first authentication code and install transmission to first;
First device uses the first process key and first common data that first authentication code is carried out authentication;
Second device sends the IC-card application data through the second process secret key encryption to first device after the said first authentication code authentication is passed through.
The embodiment of the invention also provides a kind of system of IC-card application data transmission simultaneously, comprising:
First device; Be used to receive first random number that second device generates and sends and the PKI of second device; And generation cryptographic key factor; Send the cryptographic key factor by the public key encryption of second device to second device, first device uses the cryptographic key factor and first random number to obtain the first process key, uses the first process key and first common data that first authentication code is carried out authentication;
Second device; Be used for obtaining cryptographic key factor through the private key deciphering of self; Use the cryptographic key factor and first random number to obtain the second process key; Using the second process key that first common data is encrypted generates first authentication code and to the first device transmission, after the said first authentication code authentication is passed through, sends the IC-card application data through the second process secret key encryption to first device.
Can find out that by specific embodiments provided by the invention through the process secret key encryption application data of generation, fail safe is improved just.
Description of drawings
Fig. 1 is the first embodiment system construction drawing provided by the invention;
Fig. 2 is the first embodiment method flow diagram provided by the invention;
Fig. 3 is the second embodiment method flow diagram provided by the invention;
Fig. 4 is the 3rd an embodiment method flow diagram provided by the invention;
Fig. 5 is the 4th an embodiment system construction drawing provided by the invention.
Embodiment
In order to solve the problem of the more weak problem of IC-card application data transmission fail safe in the prior art, first embodiment of the invention is a kind of method of IC-card application data transmission, the system that this method is used; As shown in Figure 1; Comprise IC- card 10 and 20 two parts of server, server will pass through encryption and authentication code MAC verification to the application APDU instruction that IC-card sends, and guarantees the transmission security of data like this; After the APDU instruction arrives IC-card; At first decipher and verification MAC, the fail safe of the instruction of the APDU in IC-card is guaranteed by card COS then, guarantees the fail safe of card return state word and response data in the same way.Before the IC-card application issued the APDU instruction, at first by server and the mutual production process key of IC-card, transfer of data was afterwards all carried out under the encryption of process key at server.
Will be the individualized operation to card before the hair fastener, write the card transmission security key to IC-card, transmission security key carries out key through master key to card image (like card application sequence number) to be disperseed to draw.This method flow diagram is as shown in Figure 2, may further comprise the steps:
Step 101: server end generates a random number A.
Step 102: server end is put into an APDU instruction to random number A and server end PKI, is issued to IC-card.This APDU indicates the process of setting up the safety connection to begin simultaneously.Be that this APDU is arranging key APDU.
Step 103:IC card generates a random number B and cryptographic key factor, and cryptographic key factor also is a random number.
Step 104:IC card uses random number A+ random number B+ cryptographic key factor computational process key.The key calculation process is encrypted random number A and random number B for using cryptographic key factor.
Step 105:IC card uses the server end PKI that cryptographic key factor is encrypted, and uses RSA Algorithm.
Step 106:IC card random number B with encrypt after cryptographic key factor as key agreement APDU response pass to server end.
Step 107: server end uses privacy key that the cryptographic key factor after encrypting is deciphered and obtains cryptographic key factor.
Step 108: server end uses random number A+ random number B+ cryptographic key factor computational process key.Computational methods and IC-card generative process key agreement promptly utilize cryptographic key factor that random number A and random number B are encrypted.
Step 109: server use key calculates authentication code MAC1 to some shared data DATA1, is encapsulated in the MAC1 value in the APDU instruction, and this instruction is authentication APDU.Whether whether this authentication APDU be used for authentication arranging key process and distorted with escape way and successfully set up.
Step 110: server end sends authentication APDU.
Step 111:IC card obtains MAC1 from authentication APDU; And use the correctness of the process key and the same data DATA1 authentication MAC1 of own generation; If authentication is correct, IC-card use key calculates MAC2 to same data DATA1, and is encapsulated into MAC2 in the response of authentication APDU.If authentification failure just returns error status code in authentication APDU response.The correctness of authentication MAC1 specifically can be that IC-card uses the process secret key encryption DATA1 that oneself generates to obtain a MAC3, compares the correctness that MAC3 and MAC1 come authentication MAC1.Perhaps IC-card uses the process secret key decryption MAC1 that oneself generates to obtain DATA3, compares the correctness that DATA3 and DATA1 come authentication MAC1.
Step 112:IC card sends authentication APDU response.
Step 113: server is received conditional code in the authentication APDU response for correct, indicates that then server can start working by the use key.And server verification MAC2 is specially the correctness of the process key that uses own generation and same data DATA2 authentication MAC2, if verification is correct, just explains that key agreement process successfully finishes.If the verification failure explains that then the arranging key process is made mistakes or by third party's illegal, server is initiated reset operation execution in step 101 again.
Second embodiment is a kind of method of IC-card application data transmission, and this method flow diagram is as shown in Figure 3, may further comprise the steps:
Step 201:IC card generates a random number B.But to instruct according to the APDU that the server end of receiving sends before, generate random number B according to this APDU instruction IC-card.
Step 202:IC card is put into an APDU instruction to random number B and IC-card PKI, uploads onto the server.This APDU is arranging key APDU.When carrying out this method, in the IC-card hair fastener, preset a pair of public and private key.
Step 203: server end generates a random number A and cryptographic key factor, and cryptographic key factor also is a random number.
Step 204: server end uses random number A+ random number B+ cryptographic key factor computational process key.The key calculation process is encrypted random number A and random number B for using cryptographic key factor.
Step 205: server end uses the IC-card PKI that cryptographic key factor is encrypted, and uses RSA Algorithm.
Step 206: server end random number A with encrypt after cryptographic key factor as key agreement APDU response pass to IC-card.
Step 207:IC card uses the IC-card private key that the cryptographic key factor after encrypting is deciphered and obtains cryptographic key factor.
Step 208:IC card uses random number A+ random number B+ cryptographic key factor computational process key.
Step 209:IC card use key calculates authentication code MAC2 to some shared data DATA1, is encapsulated in the MAC2 value in the APDU instruction, and this instruction is authentication APDU.Whether whether this authentication APDU be used for authentication arranging key process and distorted with escape way and successfully set up.
Step 210:IC card sends authentication APDU.
Step 211: server end obtains MAC2 from authentication APDU; And use the correctness of the process key and the same data DATA1 authentication MAC2 of own generation; If authentication is correct; Server end use key calculates MAC1 to same data DATA1, and is encapsulated into MAC1 in the response of authentication APDU.If authentification failure just returns error status code in authentication APDU response.
Step 212: server end sends authentication APDU response.
Step 213:IC card is received conditional code in the authentication APDU response for correct, indicates that then IC-card can start working by the use key.And IC-card verification MAC1 is specially the correctness of the process key that uses own generation and same data DATA1 authentication MAC1, if verification is correct, just explains that key agreement process successfully finishes.If the verification failure explains that then the arranging key process is made mistakes or by third party's illegal, the IC-card announcement server is initiated reset operation execution in step 201 again.
The 3rd embodiment is a kind of method of IC-card application data transmission, saves as the execution mode of example explanation IC application transport fail safe with the Yikatong network circle that uses the logic encryption card stored value card.
Yikatong network circle system comprises all-purpose card 11 as IC-card 10, as the online recharge system 21 and the bank server 30 of server 20, it is as shown in Figure 4 that circle is deposited flow process:
Step 301: all-purpose card and online recharge system negotiates process key and proof procedure key correctness.The concrete enforcement of this step can be according to step 101-step 112, also can be according to step 201-step 212.
Step 302: the user initiates circle to the online recharge system and deposits request.
Step 303: initiate the request of withholing by the online recharge system to bank server, and receive the response of withholing that bank server returns.
Step 304: after the response of successful of withholing is received by the online recharge system; The online recharge system initiates the two-way authentication request through the process secret key encryption to all-purpose card, and the response data through the wallet two-way authentication of process secret key encryption is sent to the online recharge system in all-purpose card deciphering back.
Step 305: the online recharge system decrypts confirms to accomplish two-way authentication through the response data of the wallet two-way authentication of process secret key encryption.
Step 306: the online recharge system issues to deposit through the circle of process secret key encryption writes card instruction, and the stored value card deciphering is carried out circle and deposited and write card and instruct, and will be through the result notification of process secret key encryption charging system on the net.
When implementing transmission security and transform, at first need transform the all-purpose card card, its less important transformation online recharge system.
On original all-purpose card card electronic wallet application is arranged; When implementing present embodiment; Need to increase the TRANSEC transmission security module; This module can be a software module, independent utility or a safety chip and other module of software and hardware, when the network circle is deposited at first by online recharge system and TRANSEC transmission security module negotiates process key, all afterwards instructions; Comprise that two-way authentication, circle deposit that to write card all be by sending to the TRANSEC transmission security module after the process secret key encryption, by sending to electronic wallet application after the TRANSEC transmission security module decrypts.Electronic wallet application is used original electronic wallet application; So all operation flows of stored value card are all identical with before; Negotiations process key in needs data security transmission only; Then original director data encryption and package is sent to the TRANSEC transmission security module, send to electronic wallet application by the safe transmission module and get final product.
The online recharge system need deposit the process that increases before flow process begins with card safe transmission module negotiates process key at original circle, instructs the use secret key encryption to be handed down to card original card after the success of negotiations process key and gets final product.
Fourth embodiment of the invention is a kind of system of IC-card application data transmission, and is as shown in Figure 5, comprising:
Further, first device 401 also is used to generate second random number and sends second random number to second device, uses cryptographic key factor, second random number and first random number to obtain the first process key;
Further, first device 401 also is used for passing through when the first authentication code authentication, uses the first process key that second common data is encrypted and generates second authentication code and install transmission to second;
Further, first device 401 is an IC-card, and second device 402 is a server.
Further, first device 401 is a server, and second device 402 is an IC-card.
Further, second device 402 also is used for not passing through according to the first authentication code authentication, forbids the IC-card application data of sending through the second process secret key encryption to first device 401.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, belong within the scope of claim of the present invention and equivalent technologies thereof if of the present invention these are revised with modification, then the present invention also is intended to comprise these changes and modification interior.
Claims (12)
1. the method for an IC-card application data transmission is characterized in that, comprising:
First random number that the first device reception, second device generates and sends and the PKI of second device;
First device generates cryptographic key factor, sends the cryptographic key factor by the public key encryption of second device to second device;
First device uses the cryptographic key factor and first random number to obtain the first process key;
Second device obtains cryptographic key factor through the private key deciphering of self, uses the cryptographic key factor and first random number to obtain the second process key;
Second device uses the second process key that first common data is encrypted and generates first authentication code and install transmission to first;
First device uses the first process key and first common data that first authentication code is carried out authentication;
Second device sends the IC-card application data through the second process secret key encryption to first device after the said first authentication code authentication is passed through.
2. the method for claim 1 is characterized in that,
Also comprise after the PKI step that first random number and second that the first device reception, second device generates and sends is installed: first device generates second random number and installs transmission second random number to second;
First device uses cryptographic key factor, second random number and first random number to obtain the first process key;
Second device obtains cryptographic key factor through the private key deciphering of self, uses cryptographic key factor, second random number and first random number to obtain the second process key.
3. the method for claim 1 is characterized in that, first device uses the first process key and first common data that first authentication code is carried out also comprising behind the authenticating step:
When the first authentication code authentication is passed through, first device uses the first process key that second common data is encrypted and generates second authentication code and send to second device;
Second device passes through according to the first authentication code authentication, and the IC-card application data of sending through the second process secret key encryption to first device is specially:
Second device carries out authentication according to the second process key and second common data to second authentication code; Authentication through and receive the response message that the first authentication code authentication that first device sends passes through after, send IC-card application data to first device through the second process secret key encryption.
4. method as claimed in claim 2 is characterized in that, first device is IC-card, and second device is server.
5. method as claimed in claim 2 is characterized in that, first device is server, and second device is IC-card.
6. the method for claim 1 is characterized in that, when second device does not pass through in the said first authentication code authentication, forbids sending the IC-card application data through the second process secret key encryption to first device.
7. the system of an IC-card application data transmission is characterized in that, comprising:
First device; Be used to receive first random number that second device generates and sends and the PKI of second device; And generation cryptographic key factor; Send the cryptographic key factor by the public key encryption of second device to second device, first device uses the cryptographic key factor and first random number to obtain the first process key, uses the first process key and first common data that first authentication code is carried out authentication;
Second device; Be used for obtaining cryptographic key factor through the private key deciphering of self; Use the cryptographic key factor and first random number to obtain the second process key; Using the second process key that first common data is encrypted generates first authentication code and to the first device transmission, after the said first authentication code authentication is passed through, sends the IC-card application data through the second process secret key encryption to first device.
8. system as claimed in claim 7 is characterized in that, first device also is used to generate second random number and sends second random number to second device, uses cryptographic key factor, second random number and first random number to obtain the first process key;
Second device also is used for obtaining cryptographic key factor through the private key deciphering of self, uses cryptographic key factor, second random number and first random number to obtain the second process key.
9. system as claimed in claim 7 is characterized in that, first device also is used for passing through when the first authentication code authentication, uses the first process key that second common data is encrypted and generates second authentication code and install transmission to second;
Second device; Specifically be used for second authentication code being carried out authentication according to the second process key and second common data; Authentication through and receive the response message that the first authentication code authentication that first device sends passes through after, send IC-card application data to first device through the second process secret key encryption.
10. system as claimed in claim 8 is characterized in that, first device is IC-card, and second device is server.
11. system as claimed in claim 8 is characterized in that, first device is server, and second device is IC-card.
12. system as claimed in claim 7 is characterized in that, second device also is used for when the said first authentication code authentication is not passed through, forbidding sending the IC-card application data through the second process secret key encryption to first device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910242887 CN101807994B (en) | 2009-12-18 | 2009-12-18 | Method and system for application data transmission of IC card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910242887 CN101807994B (en) | 2009-12-18 | 2009-12-18 | Method and system for application data transmission of IC card |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101807994A CN101807994A (en) | 2010-08-18 |
CN101807994B true CN101807994B (en) | 2012-07-25 |
Family
ID=42609617
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200910242887 Expired - Fee Related CN101807994B (en) | 2009-12-18 | 2009-12-18 | Method and system for application data transmission of IC card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101807994B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102542451B (en) * | 2010-12-24 | 2015-02-04 | 北大方正集团有限公司 | Electronic paying method, system and device thereof |
CN102611552B (en) * | 2011-01-24 | 2016-10-12 | 必拓电子商务有限公司 | There are the read-write terminal of valency information recording medium, system |
CN102255727B (en) * | 2011-06-23 | 2015-03-25 | 中国电力科学研究院 | Improved anti-attacking intelligent card authentication method based on user defined algorithm environment |
CN102427444B (en) * | 2011-08-25 | 2014-04-30 | 飞天诚信科技股份有限公司 | Method for computer to process data flow |
CN103237004A (en) | 2013-03-15 | 2013-08-07 | 福建联迪商用设备有限公司 | Key download method, key management method, method, device and system for download management |
CN103701812B (en) * | 2013-03-15 | 2017-01-25 | 福建联迪商用设备有限公司 | TMK (Terminal Master Key) secure downloading method and system |
CN103516525B (en) * | 2013-10-22 | 2017-01-18 | 天地融科技股份有限公司 | Dynamic password generation method and system |
CN103532719B (en) * | 2013-10-22 | 2017-01-18 | 天地融科技股份有限公司 | Dynamic password generation method, dynamic password generation system, as well as processing method and processing system of transaction request |
CN104811303B (en) * | 2014-01-24 | 2018-12-18 | 北京中传数广技术有限公司 | The method, apparatus and system of two-way authentication |
CN107171903A (en) * | 2017-05-02 | 2017-09-15 | 青岛海尔空调器有限总公司 | A kind of household electrical appliances distribution method and device |
CN107819576A (en) * | 2017-11-28 | 2018-03-20 | 苏州朗捷通智能科技有限公司 | Communication authentication method and system |
CN110943832B (en) * | 2019-11-19 | 2023-06-06 | 江苏恒宝智能系统技术有限公司 | Data encryption transmission method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1303197A (en) * | 1999-11-02 | 2001-07-11 | 赵敏 | Security data transmission system |
CN1550086A (en) * | 2001-07-18 | 2004-11-24 | ������������ʽ���� | Communication system and method |
CN1564515A (en) * | 2004-03-31 | 2005-01-12 | 刘学明 | Status authentication system based on double dynamic passwords |
-
2009
- 2009-12-18 CN CN 200910242887 patent/CN101807994B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1303197A (en) * | 1999-11-02 | 2001-07-11 | 赵敏 | Security data transmission system |
CN1550086A (en) * | 2001-07-18 | 2004-11-24 | ������������ʽ���� | Communication system and method |
CN1564515A (en) * | 2004-03-31 | 2005-01-12 | 刘学明 | Status authentication system based on double dynamic passwords |
Also Published As
Publication number | Publication date |
---|---|
CN101807994A (en) | 2010-08-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101807994B (en) | Method and system for application data transmission of IC card | |
CN101741565A (en) | Method and system for transmitting IC (integrated circuit)-card application data | |
CN102170357B (en) | Combined secret key dynamic security management system | |
CN103001773B (en) | Fingerprint authentication system and fingerprint authentication method based on near field communication (NFC) | |
KR102381153B1 (en) | Encryption key management based on identity information | |
CN102882683B (en) | Synchronizable RFID (radio-frequency identification) security authentication method | |
CN106603496B (en) | A kind of guard method, smart card, server and the communication system of data transmission | |
CN103326864B (en) | A kind of electronic tag anti-fake authentication method | |
CN103701609A (en) | Bidirectional authentication method and system for server and operating terminal | |
CN103914913A (en) | Intelligent card application scene recognition method and system | |
CN103501191A (en) | Mobile payment device and method thereof based on NFC technology | |
CN104217327A (en) | Financial IC (integrated circuit) card Internet terminal and trading method thereof | |
CN101483654A (en) | Method and system for implementing authentication and data safe transmission | |
CN103067160A (en) | Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD) | |
CN107332671A (en) | A kind of safety mobile terminal system and method for secure transactions based on safety chip | |
CN109412812A (en) | Data safe processing system, method, apparatus and storage medium | |
CN102801730A (en) | Information protection method and device for communication and portable devices | |
CN102542451B (en) | Electronic paying method, system and device thereof | |
CN104851206A (en) | USBKEY (universal serial bus key)-based online electric charge payment system | |
CN106096947A (en) | Half off-line anonymous method of payment based on NFC | |
WO2011076102A1 (en) | Implementing method, system of universal card system and smart card | |
CN104657855B (en) | A kind of mobile payment authentication means with NFC interface | |
CN110011812A (en) | A kind of card method for anti-counterfeit suitable for airport security | |
CN102693478A (en) | Trading method of bid security during bidding procedure and system thereof | |
CN103138925B (en) | Hair fastener method of operation, IC-card sheet and card-issuing equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 100015 Beijing city Chaoyang District Dongzhimen West eight Street No. 2 room Wanhong Yan Dong Business Garden Patentee after: BEIJING WATCHDATA Co.,Ltd. Address before: 100015 Beijing city Chaoyang District Dongzhimen West eight Street No. 2 room Wanhong Yan Dong Business Garden Patentee before: BEIJING WATCH DATA SYSTEM Co.,Ltd. |
|
CP01 | Change in the name or title of a patent holder | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120725 |
|
CF01 | Termination of patent right due to non-payment of annual fee |