[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106301774B - Safety chip, its encryption key generation method and encryption method - Google Patents

Safety chip, its encryption key generation method and encryption method Download PDF

Info

Publication number
CN106301774B
CN106301774B CN201510288423.2A CN201510288423A CN106301774B CN 106301774 B CN106301774 B CN 106301774B CN 201510288423 A CN201510288423 A CN 201510288423A CN 106301774 B CN106301774 B CN 106301774B
Authority
CN
China
Prior art keywords
key
module
encryption
safety chip
algoritic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510288423.2A
Other languages
Chinese (zh)
Other versions
CN106301774A (en
Inventor
张晓楠
涂志强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chenxin Technology Co ltd
Original Assignee
Chen Core Technology Co Ltd
Datang Semiconductor Design Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chen Core Technology Co Ltd, Datang Semiconductor Design Co Ltd filed Critical Chen Core Technology Co Ltd
Priority to CN201510288423.2A priority Critical patent/CN106301774B/en
Publication of CN106301774A publication Critical patent/CN106301774A/en
Application granted granted Critical
Publication of CN106301774B publication Critical patent/CN106301774B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of safety chip, including primary processor, outer memory module and encryption/decryption module, and the encryption/decryption module includes algoritic module, storage inside module and control module.Dedicated encryption/decryption module is arranged by portion in the chip to manage key and enciphering and deciphering algorithm in the present invention.The encryption/decryption module has hardware random number, by generating unique root key of the random number as chip in production process, is stored in individual storage region, which can only be used by encryption/decryption module, and primary processor can not read the root key.The encryption key generation method and encryption method of safety chip provided by the invention, it requires when subsequent applications generate key using encryption/decryption module, and there is root key to carry out encryption storage to the key of generation automatically, guarantee that the data of every terminal can only be read by the terminal, substantially increases the safety of terminal.

Description

Safety chip, its encryption key generation method and encryption method
Technical field
The present invention relates to field secure communications more particularly to a kind of safety chip, its encryption key generation method and Encryption method.
Background technique
The personal secrets short slab that current apple and Samsung are spilt cruelly, it is potential for domestic encryption mobile phone open one Market, time safety also become home-made cellphone manufacturer and are trimly laid out the emphasis that scheme becomes, and become the characteristic of home-made cellphone.It is specific next It says and relates generally to two aspects: first is that the information security issue spilt cruelly with Android system being weighed by people more Depending on;Second is that being based on national security and network security, individual city requirement officials all use domestic brand smart phone instead, this meaning Future have more units and be added to mobile phone safe ranks.After issuing safe mobile phone strategy one after another from foreign vendor, domestic hand Machine manufacturer turns to promote security level one after another, turns to safe Encryption market.This information security for being primarily due to smart phone is got over To get over the extensive concern by user and industry.
The key of present safe mobile phone strategy is encryption technology, and there are mainly two types of forms for the implementation of encryption technology: Software cryptography and hardware encryption.Software cryptography is primarily directed to application layer, and password storage is in application space, and Encryption Algorithm is by software It realizes, software cryptography is easier to dispose, independent of specific hardware.Hardware encryption depends primarily on hardware algorithm acceleration Device, key can store in the eFuse of external memory space or chip, and encryption efficiency is relatively high, and the hardware that needs to rely on is flat Platform.
The protection for having its source in password of encryption will cause an immeasurable loss if password is revealed.Commercial at present Ciphering terminal key can be customized by users or generate key plain by hardware random number and is stored in piece or chip external memory, such as Fruit terminal can easily get key by root, Malware.Therefore, the safety of the key of existing encryption technology is not still The phenomenon that enough height, Malware steals user key, happens occasionally.
Summary of the invention
In order to solve the problems existing in the prior art, the present invention provides a kind of safety chip, including primary processor, external storage Module and encryption/decryption module;The encryption/decryption module includes:
Algoritic module, to generate the initial key for being encrypted to data according to Encryption Algorithm;
Storage inside module, includes root key, and the storage inside module is only capable of controlled molding block access;
Control module, it is raw for calling the root key to the algoritic module to encrypt to the initial key At encryption key and it is stored in the outer memory module;The control module is also used to call the root key to the calculation Method module is reduced to the initial key so that the encryption key in the outer memory module to be decrypted.
Optionally, only to described in the step of initial key includes public key and private key, encrypts to the initial key Private key is encrypted, the step of to the encryption key decryption in only the private key is decrypted.
Optionally, the algoritic module includes RSA module, generates the initial key by the RSA module.
Optionally, the algoritic module includes AES module, for being added according to the root key to the initial key It is close.
Optionally, the safety chip further includes random number generation module, for generating random number using close as described Key.
Optionally, the control module includes status register, for close by init state mark expression described Key has generated.
The present invention also provides a kind of encryption key generation methods of safety chip, comprising the following steps:
Primary processor sends encryption key and generates request to encryption/decryption module;
Control module calls algoritic module, and the algoritic module generates initial key;
Control module transmits root key to the algoritic module, and the algoritic module encrypts the initial key, generates Encryption key is simultaneously stored in the outer memory module.
Optionally, the encryption key is stored in the outer memory module by the control module.
The present invention also provides a kind of encryption methods of safety chip, including
Carry out above-mentioned encryption key generation step;
Primary processor sends CIPHERING REQUEST and be-encrypted data to encryption/decryption module;
Control module calls algoritic module;
The algoritic module reads the encryption key in the root key and the outer memory module, close to the encryption Key is decrypted, and restores the initial key;And
Algoritic module encrypts data using initial key.
Optionally, the algoritic module includes HASH module, for calculating message digest to the data of encryption, and is added to The information heading of the encryption data.
The present invention provides a kind of safety chip, including primary processor, outer memory module and encryption/decryption module, by core Dedicated encryption/decryption module is set inside piece, manages key and enciphering and deciphering algorithm.The encryption/decryption module simultaneously has hardware random number, By generating unique root key of the random number as chip in production process, it is stored in individual storage region, the root key is only It can be used by encryption/decryption module, primary processor can not read the root key.And subsequent applications generate key require using add solution Close module, and there is root key to carry out encryption storage to the key of generation (or private key of asymmetric arithmetic) automatically, guarantee every portion The data of terminal can only be read by the terminal, substantially increase the safety of terminal.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of safety chip described in one embodiment of the invention.
Fig. 2 is the encryption key generation method schematic diagram of the safety chip structure in conjunction with described in one embodiment of the invention.
Fig. 3 is the encryption method schematic diagram of the safety chip structure in conjunction with described in one embodiment of the invention.
Specific embodiment
The present invention is described in further detail below in conjunction with the drawings and specific embodiments.It is wanted according to following explanation and right Book is sought, advantages and features of the invention will become apparent from.It should be noted that attached drawing is all made of very simplified form and using non- Accurately ratio, only for the purpose of facilitating and clarifying the purpose of the embodiments of the invention.
As shown in Figure 1, safety chip of the present invention includes primary processor 100, outer memory module 200 and encryption and decryption Module 300;The encryption/decryption module 300 includes:
Algoritic module 320, to generate the initial key for being encrypted to data according to Encryption Algorithm;
Storage inside module 330, includes root key, and storage inside module 330 is only capable of being accessed by control module 310;
Control module 310, for calling the root key to the algoritic module 320 to add to the initial key It is close, it generates encryption key and is stored in 200 in the outer memory module;The control module 310 is also used to call described Key, the encryption key in the outer memory module 200 to be decrypted, is reduced to described first to the algoritic module 320 Beginning key.
Wherein, may exist a variety of specific Encryption Algorithm, such as RSA module 322 in algoritic module 320, by described RSA module 322 generates the initial key.At this point, the initial key that RSA module 322 generates is key pair, including public key and private Key only encrypts the private key in the step of encrypting to the initial key, the step of to the encryption key decryption in Only the private key is decrypted.
Algoritic module 320 for example also includes AES module 325, for being carried out according to the root key to the initial key Encryption, to generate encryption key.As previously mentioned, in the present embodiment, in the step of initial key encrypts only to the private key into Row encryption.
When safety chip production of the invention, that is, will do it the initialization process of encryption/decryption module 300 to generate on The root key stated simultaneously is stored among storage inside module 330.Wherein, the control module 310 includes status register, is used for Indicate that the root key has been formed and stored among storage inside module 330 by init state mark;Control module 310 further include random number generation module (RNG module 321), for generating random number using as the root key.
The specific initialization step of encryption/decryption module 300 is as follows:
(1) primary processor 100 sends to encryption/decryption module 300 and instructs, and reads the status register of control module 310 (state_register) whether inquiry encryption/decryption module 300 is initialized, enters (4) if initialization is completed, no Then enter (2);
(2) encryption and decryption control module triggers RNG module 321, generates unique root of the random number of specified digit as chip Key (RootKey), is stored in storage inside module 330, and storage inside module 330 can only be accessed by control module 310.
(3) write state register (state_register) init state identifies, which can only be written once.
(4) returning to initialization to primary processor 310 terminates mark, terminates.
The present invention also provides the encryption key generation methods of above-mentioned safety chip, including
Primary processor 100 sends encryption key and generates request to encryption/decryption module 300;
Control module 310 calls algoritic module 320, and the algoritic module 320 is made to generate initial key;
Control module 310 transmits root key to the algoritic module 320, and algoritic module 320 encrypts the initial key, It generates encryption key and is stored among the outer memory module 200.
Wherein, above-mentioned encryption key is stored in the outer memory module 200 by the control module 310.
When safety chip is applied among specific electronic equipment such as mobile phone, it is controlled by the application program of mobile phone. The encryption key generation method of safety chip is described in detail with an embodiment below, in conjunction with the arrow direction in Fig. 2, encrypts close The step of key generation method includes:
(1) application program sends the order that request generates key, and setting generates the type of key and is stored in piece or piece Outer parameter;
(2) driver generates request instruction according to the encryption key of application program and is packaged data, passes through main place Reason device 100 is sent to encryption and decryption control module 200;
(3) control module 310 receives request instruction, parses to instruction, judges the format calling pair for requesting key The algoritic module answered, such as RSA key pair then call RSA module 322;
(4) RSA module 322 generates key pair: public key (public_key) and private key (private_kes), by key pair Return to control module 310
(5) control module 310 receives key pair, calls AES module 325, and close from the reading root of storage inside module 330 Key (root_key) passes to AES module 325, by AES module 325 using root key (root_key) to private key (private_ Key it) is encrypted, encrypted key is returned into control module 310.
(6) private key after the public key of generation and encryption is stored in outer memory module 200 by control module 310, and to main place It manages device 100 and returns to request results, notice primary processor 100 reads public key and encrypted private key.
The present invention also provides a kind of encryption methods of above-mentioned safety chip, including
First carry out above-mentioned encryption key generation step;
Later, primary processor 100 sends CIPHERING REQUEST and be-encrypted data to encryption/decryption module 300;
Control module 310 calls algoritic module 320;
The algoritic module 320 reads the encryption key in the root key and the outer memory module 200, to described Encryption key is decrypted, and restores the initial key;
Algoritic module 320 encrypts data using initial key.
The algoritic module 320 includes HASH module 323 at this time, for calculating message digest to the data of encryption, and is added It is added to the information heading of the encryption data.
The encryption method of safety chip is described in detail with an embodiment below, in conjunction with the arrow direction in Fig. 3, encryption side The specific steps of method include:
(1) application program sends the CIPHERING REQUEST to data (file);
(2) driver receives request and is packaged data, sends control for CIPHERING REQUEST by primary processor 100 Module 310;
(3) control module 310 parses CIPHERING REQUEST, receives the encryption key and data (file) information of aforementioned generation;
(4) AES module 325 is called, and reads the root key (root_key) of storage inside module 330, it is close to receiving Key is decrypted, and restores the private key (private_key) of generation
(5) RSA module 322 is called, data (file) are encrypted using the private key (private_key) of reduction, it is raw At ciphered data information, guarantee the confidentiality of data;
(6) HASH module 323 is called, message digest is calculated to data (file) according to solicited message, is added to encryption number According to information heading, guarantee the integrality of data.
(7) to 100 returned data encrypted result of primary processor.
The invention designs a kind of security mechanism by improving existing chip, and chip interior has dedicated encryption and decryption mould Block manages key and enciphering and deciphering algorithm.The encryption/decryption module simultaneously has hardware random number, by generating random number in production process As unique root key of chip, it is stored in individual storage region, which can only be used by encryption/decryption module, main process task Device can not read the root key.And subsequent applications generate key and require using encryption/decryption module, and have root key automatically to life At key (or private key of asymmetric arithmetic) carry out encryption storage, guarantee that the data of every terminal can only be read by the terminal It takes, substantially increases the safety of terminal.
Core of the invention is that key and Encryption Algorithm are managed collectively by dedicated encryption/decryption module, and every chips have unique Root key, the key of generation all carries out encryption storage by the root key, guarantees the confidentiality of key.Simultaneously using automatic encryption Technical protection key, prevents malware attacks;Meanwhile data encryption and calculating message digest are all added dedicated in the present invention It is complete inside deciphering module, strengthen the safety of data.
The comparison of the encryption policy of safety chip of the invention and existing encryption policy is as follows:
In conclusion by dedicated encryption/decryption module management key and being added using the encryption method of safety chip of the invention Close algorithm can greatly improve the safety of key, can prevent Malware from stealing user key.
Obviously, those skilled in the art can carry out various modification and variations without departing from spirit of the invention to invention And range.If in this way, these modifications and changes of the present invention belong to the claims in the present invention and its equivalent technologies range it Interior, then the invention is also intended to include including these modification and variations.

Claims (10)

1. a kind of safety chip, which is characterized in that including primary processor, outer memory module and encryption/decryption module;Described plus solution Close module includes:
Algoritic module, to generate the initial key for being encrypted to data according to Encryption Algorithm;
Storage inside module, includes root key, and the storage inside module is only capable of controlled molding block access;
Control module generates and adds for calling the root key to the algoritic module to encrypt to the initial key Key is simultaneously stored in the outer memory module;The control module is also used to call the root key to the algorithm mould Block is reduced to the initial key so that the encryption key in the outer memory module to be decrypted.
2. safety chip as described in claim 1, which is characterized in that the initial key includes public key and private key, to described Only the private key is encrypted in the step of initial key encrypts, the step of to the encryption key decryption in only to the private Key is decrypted.
3. safety chip as described in claim 1, which is characterized in that the algoritic module includes RSA module, by described RSA module generates the initial key.
4. safety chip as described in claim 1, which is characterized in that the algoritic module includes AES module, for according to institute Root key is stated to encrypt the initial key.
5. safety chip as described in claim 1, which is characterized in that it further include random number generation module, it is random for generating Number is using as the root key.
6. safety chip as described in claim 1, which is characterized in that the control module includes status register, for leading to Crossing init state mark indicates that the root key has generated.
7. a kind of encryption key generation method of safety chip as claimed in any one of claims 1 to 6, which is characterized in that packet It includes
Primary processor sends encryption key and generates request to encryption/decryption module;
Control module calls algoritic module, and the algoritic module generates initial key;
Control module transmits root key to the algoritic module, and the algoritic module encrypts the initial key, generates encryption Key is simultaneously stored in the outer memory module.
8. the encryption key generation method of safety chip as claimed in claim 7, which is characterized in that the encryption key passes through The control module is stored in the outer memory module.
9. a kind of encryption method of safety chip, which is characterized in that including
Carry out the encryption key generation step as described in claim 7-8 any one;
Primary processor sends CIPHERING REQUEST and be-encrypted data to encryption/decryption module;
Control module calls algoritic module;
The algoritic module reads the encryption key in the root key and the outer memory module, to the encryption key into Row decryption, restores the initial key;And
Algoritic module encrypts data using initial key.
10. the encryption method of safety chip as claimed in claim 9, which is characterized in that the algoritic module includes HASH mould Block for calculating message digest to the data of encryption, and is added to the information heading of the encryption data.
CN201510288423.2A 2015-05-29 2015-05-29 Safety chip, its encryption key generation method and encryption method Active CN106301774B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510288423.2A CN106301774B (en) 2015-05-29 2015-05-29 Safety chip, its encryption key generation method and encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510288423.2A CN106301774B (en) 2015-05-29 2015-05-29 Safety chip, its encryption key generation method and encryption method

Publications (2)

Publication Number Publication Date
CN106301774A CN106301774A (en) 2017-01-04
CN106301774B true CN106301774B (en) 2019-08-06

Family

ID=57655467

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510288423.2A Active CN106301774B (en) 2015-05-29 2015-05-29 Safety chip, its encryption key generation method and encryption method

Country Status (1)

Country Link
CN (1) CN106301774B (en)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681032B (en) * 2016-01-08 2017-09-12 腾讯科技(深圳)有限公司 Method for storing cipher key, key management method and device
CN107070881B (en) * 2017-02-20 2020-11-27 北京古盘创世科技发展有限公司 Key management method, system and user terminal
CN107292199A (en) * 2017-05-24 2017-10-24 上海泰金电子科技有限公司 A kind of doorway machine safety system
CN107341410A (en) * 2017-05-24 2017-11-10 上海泰金电子科技有限公司 A kind of doorway machine safety system
CN109284603B (en) * 2017-07-20 2022-07-01 腾讯科技(深圳)有限公司 Configuration data processing method and device and storage medium
CN107743062A (en) * 2017-08-29 2018-02-27 苏州惠邦科信息技术有限公司 Mobile phone safe encryption chip
CN108322303A (en) * 2017-12-07 2018-07-24 上海西默通信技术有限公司 A kind of data transmission method
CN108880791A (en) * 2018-05-30 2018-11-23 招商银行股份有限公司 Cryptographic key protection method, terminal and computer readable storage medium
CN109145613A (en) * 2018-07-10 2019-01-04 杨俊佳 Security encryption chip and electronic equipment containing the chip
CN109145654A (en) * 2018-08-15 2019-01-04 阿里巴巴集团控股有限公司 Prevent the chip and method for processing business of cracking trajectory model
CN109697173B (en) * 2018-12-11 2023-05-23 中国航空工业集团公司西安航空计算技术研究所 Information security-oriented embedded computer SiP module design method and circuit
CN109672521B (en) * 2018-12-26 2022-11-29 贵州华芯通半导体技术有限公司 Security storage system and method based on national encryption engine
CN109768862B (en) * 2019-03-12 2019-11-22 北京深思数盾科技股份有限公司 A kind of key management method, key call method and cipher machine
CN109995532A (en) * 2019-04-11 2019-07-09 晏福平 A kind of online management method and system of terminal master key
CN110138556A (en) * 2019-05-28 2019-08-16 上海兆芯集成电路有限公司 Data processing equipment and data processing method
US11398899B2 (en) 2019-05-28 2022-07-26 Shanghai Zhaoxin Semiconductor Co., Ltd. Data processing device and data processing method
CN110138557A (en) * 2019-05-28 2019-08-16 上海兆芯集成电路有限公司 Data processing equipment and data processing method
CN110166236B (en) * 2019-05-31 2022-01-18 北京中金国信科技有限公司 Key processing method, device and system and electronic equipment
CN110837649A (en) * 2019-10-23 2020-02-25 特瓦特能源科技有限公司 Data encryption method and system
CN112149176A (en) * 2020-07-01 2020-12-29 南京中新赛克科技有限责任公司 Key access system and method based on EEPROM
CN114697064B (en) * 2020-12-31 2024-05-03 宸芯科技股份有限公司 Data security interaction method and security chip between multiple data modules
CN113626839B (en) * 2021-03-31 2024-09-10 中汽创智科技有限公司 Encryption and decryption engine system and method based on multithreading concurrent processing and automobile
CN114662135A (en) * 2022-05-19 2022-06-24 深圳市航顺芯片技术研发有限公司 Data access method, computer device and readable storage medium
CN116028958B (en) * 2023-02-21 2024-04-12 广州万协通信息技术有限公司 Key encryption and decryption method and device, security machine and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101582760A (en) * 2008-05-16 2009-11-18 中国科学院研究生院 Key encrypting and storing method based on tree structure
CN1607511B (en) * 2003-10-14 2010-09-08 联想(北京)有限公司 Data protection method and system
US8850227B1 (en) * 2012-09-05 2014-09-30 Google Inc. Cryptographic operations using a key hierarchy
CN104081712A (en) * 2012-02-09 2014-10-01 英特尔公司 Repeatable application-specific encryption key derivation using a hidden root key

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1607511B (en) * 2003-10-14 2010-09-08 联想(北京)有限公司 Data protection method and system
CN101582760A (en) * 2008-05-16 2009-11-18 中国科学院研究生院 Key encrypting and storing method based on tree structure
CN104081712A (en) * 2012-02-09 2014-10-01 英特尔公司 Repeatable application-specific encryption key derivation using a hidden root key
US8850227B1 (en) * 2012-09-05 2014-09-30 Google Inc. Cryptographic operations using a key hierarchy

Also Published As

Publication number Publication date
CN106301774A (en) 2017-01-04

Similar Documents

Publication Publication Date Title
CN106301774B (en) Safety chip, its encryption key generation method and encryption method
CN108234132B (en) Secure communication system and method for main control chip and encryption chip
US10565400B2 (en) Implementation of an integrity-protected secure storage
US10419217B2 (en) Security information configuration method, security verification method, and related chip
CN103067160B (en) A kind of method and system for the dynamic key production for encrypting SD card
CN105812332A (en) Data protection method
CN107508679B (en) Binding and authentication method for intelligent terminal main control chip and encryption chip
CN104094267A (en) Method, device, and system for securely sharing media content from a source device
JP2014053675A (en) Security chip, program, information processing device, and information processing system
TW201010370A (en) Integrated cryptographic security module for a network node
CN103036681B (en) A kind of password safety keyboard device and system
WO2013182154A1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
CN101019368B (en) Method of delivering direct proof private keys to devices using a distribution CD
US11783091B2 (en) Executing entity-specific cryptographic code in a cryptographic coprocessor
CN105653986A (en) Micro SD card-based data protection method and device
CN112507296B (en) User login verification method and system based on blockchain
CN107911221B (en) Key management method for secure storage of solid-state disk data
CN103370718B (en) Use the data guard method of distributed security key, equipment and system
KR20130007097A (en) Security system of smart phone service and secruity method
US20210111901A1 (en) Executing entity-specific cryptographic code in a trusted execution environment
CN202978979U (en) Password security keypad device and password security pad system
CN105184116A (en) Intelligent equipment software encryption and personal authentication device and method
CN111246480A (en) Application communication method, system, equipment and storage medium based on SIM card
CN113010908B (en) Safe storage method suitable for large-capacity SIM card
JP5980301B2 (en) Data access control and encryption method for preventing data outflow and apparatus for executing the same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20170104

Assignee: Shanghai Li Ke Semiconductor Technology Co.,Ltd.

Assignor: LEADCORE TECHNOLOGY Co.,Ltd.

Contract record no.: 2018990000159

Denomination of invention: Security chip, encryption secret key generation method thereof and encryption method

License type: Common License

Record date: 20180615

EE01 Entry into force of recordation of patent licensing contract
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20180827

Address after: 201206 Pudong New Area, Shanghai, China (Shanghai) free trade pilot area, 1258 A406 3 fourth story room.

Applicant after: Chen core technology Co.,Ltd.

Applicant after: DATANG SEMICONDUCTOR DESIGN Co.,Ltd.

Address before: 200233 4 building, No. 333, No. 41, Qinjiang Road, Shanghai, Xuhui District

Applicant before: LEADCORE TECHNOLOGY Co.,Ltd.

Applicant before: DATANG SEMICONDUCTOR DESIGN Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20221123

Address after: 201206 Shanghai Pudong New Area free trade pilot area 1258 moon 3 building fourth floor A406 room

Patentee after: Chen core technology Co.,Ltd.

Patentee after: Chenxin Technology Co.,Ltd.

Address before: 201206 Pudong New Area, Shanghai, China (Shanghai) free trade pilot area, 1258 A406 3 fourth story room.

Patentee before: Chen core technology Co.,Ltd.

Patentee before: DATANG SEMICONDUCTOR DESIGN Co.,Ltd.

TR01 Transfer of patent right
CP01 Change in the name or title of a patent holder

Address after: 201206 Shanghai Pudong New Area free trade pilot area 1258 moon 3 building fourth floor A406 room

Patentee after: Chen core technology Co.,Ltd.

Patentee after: Chenxin Technology Co.,Ltd.

Address before: 201206 Shanghai Pudong New Area free trade pilot area 1258 moon 3 building fourth floor A406 room

Patentee before: Chen core technology Co.,Ltd.

Patentee before: Chenxin Technology Co.,Ltd.

CP01 Change in the name or title of a patent holder
TR01 Transfer of patent right

Effective date of registration: 20241021

Address after: Room 102, Building 16, No. 1699, the Pearl River Road, Huangdao District, Qingdao, Shandong 266499

Patentee after: Chenxin Technology Co.,Ltd.

Country or region after: China

Address before: 201206 Shanghai Pudong New Area free trade pilot area 1258 moon 3 building fourth floor A406 room

Patentee before: Chen core technology Co.,Ltd.

Country or region before: China

Patentee before: Chenxin Technology Co.,Ltd.