[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN101056166B - A method for improving the data transmission security - Google Patents

A method for improving the data transmission security Download PDF

Info

Publication number
CN101056166B
CN101056166B CN2007100996737A CN200710099673A CN101056166B CN 101056166 B CN101056166 B CN 101056166B CN 2007100996737 A CN2007100996737 A CN 2007100996737A CN 200710099673 A CN200710099673 A CN 200710099673A CN 101056166 B CN101056166 B CN 101056166B
Authority
CN
China
Prior art keywords
random number
intelligent key
main frame
key apparatus
data transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2007100996737A
Other languages
Chinese (zh)
Other versions
CN101056166A (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CN2007100996737A priority Critical patent/CN101056166B/en
Publication of CN101056166A publication Critical patent/CN101056166A/en
Application granted granted Critical
Publication of CN101056166B publication Critical patent/CN101056166B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to a method of improving the security of data transmitting. An intelligent key device is connected to a host, and the intelligent key device and the host generate a random number respectively; the intelligent key device performs an encrypting computing to the random number and sends the computing result to the host which encrypts the data having been decrypted by the host by using the instantaneous key and sends the result to the intelligent key device to realize the mutual identity authentication. A communication between the host and the intelligent key device is established after the authentication that data is encrypted and transmitted by using the communication key between the host and the intelligent key device, and a instantaneous key/communication key technology is added in the process. In the present invention, the second step of the mutual identity authentication improves the data transmitting safety by using the instantaneous key in the comparing of the prior art. The instantaneous key is used as the communication key in the encrypted data transmitting and the communication key is invalid when the set time is over, thus, the safety of the transmitting is improved.

Description

A kind of method that improves data transmission security
Technical field
The invention belongs to information security field, relate in particular to a kind of method that improves data transmission security.
Background technology
Intelligent key apparatus is a kind of small hardware device that has processor and memory, and it can be connected with computer by the data communication interface of computer.Intelligent key apparatus adopts the legitimacy of PIN code identifying user identity, when carrying out authentication, intelligent key apparatus is linked to each other with computer, the user imports PIN code on computers, the correctness of automatic this PIN code of verification of intelligent key apparatus meeting, when having only the PIN code of importing as the user correct, just allow user's operative intelligence key device.Intelligent key apparatus also has the key systematic function, but and safe storage key and preset cryptographic algorithm.The intelligent key apparatus computing relevant with key be fully at the device internal operation, and intelligent key apparatus has the anti-characteristic of attacking of physics, and fail safe is high, and intelligent key apparatus commonly used links to each other with computer by USB interface.
Modern society is the society of an advanced IT application, and information security has been penetrated into the various aspects of people's daily life.Simultaneously, because the develop rapidly of industries such as bank, traffic, network, communication, the related field of information security is also more and more wider.The difficulty and the importance of information security are also more and more outstanding.Be used to confirm the core technology of the authentication of identity uniqueness and legitimacy, just more and more paid attention to by people as the information security industry.Authentication has also had quite widely in information such as bank, public security system and security fields uses.Yet, for strengthening fail safe, increase work efficiency, require authentication must discern certified person's characteristic information quickly and accurately, verify certified person's true identity.And the authentication in the information security be unable to do without cryptographic technique.
Meat and potatoes is encryption system or cryptographic algorithm in the cryptographic technique.Encryption system has defined a pair of transfer process of data, is called encryption and decryption.Encryption is to carry out being called data expressly, has expressly directly represented the information of certain message with the form of literal or numeral, is intercepted and captured easily.Encrypt and convert clear data to can't understand data mode exactly, be called ciphertext, transmit, improved safety of transmission to a certain extent.Deciphering reverts to original plaintext again with ciphertext exactly.For the fail safe that guarantees that some sensitive datas transmit, the safety issue of key is most important.Yet adopt fixing key or key to transmit, all can not reach gratifying secret effect with data.
Summary of the invention
A kind of method that improves data transmission security, it is characterized in that, at first intelligent key apparatus is linked to each other with main frame, main frame, each self-generating random number of intelligent key apparatus, carry out the encryption and decryption computing to realize bidirectional identity authentication, after authentication was passed through, session was set up, utility cession secret key encryption transmission data between main frame and intelligent key apparatus, realize that the concrete steps of this method are as follows:
Step 1: main frame generates random number X, sends random number X to intelligent key apparatus, proposes authentication request;
Step 2: intelligent key apparatus generates random number Y, Z;
Step 3: main frame, intelligent key apparatus carry out two-way authentication:
Main frame authentication intelligent key device: intelligent key apparatus is done functional operation to random number X, and carries out cryptographic calculation, sends main frame, realizes main frame authentication intelligent key device;
The intelligent key apparatus authenticating host: main frame is done functional operation to the random number Y that intelligent key apparatus produces, and is instantaneous secret key encryption by random number Z, sends intelligent key apparatus, realizes the intelligent key apparatus authenticating host.
Step 4: after authentication is passed through, random number Z as session key, is used this session key transmission data between main frame and intelligent key apparatus.
Described step 3, it is asymmetric arithmetic that main frame authentication intelligent key device is done the used algorithm of encryption and decryption computing, the intelligent key apparatus authenticating host is done the used algorithm of encryption and decryption computing and is comprised symmetry algorithm.
Described asymmetric arithmetic can be replaced by symmetry algorithm.
Described step 3, main frame authentication intelligent key device is specially:
1) intelligent key apparatus is done functional operation to random number X, again the functional operation value is done cryptographic calculation with asymmetric arithmetic, and encrypted result is sent to main frame;
2) main frame is deciphered the functional value that the encrypted result of being sent by intelligent key gets random number X with corresponding algorithm;
3) main frame is done functional operation to the random number X of its generation, and the functional value of the random number X that the functional value that obtains and deciphering are obtained compares, if unanimity as a result, intelligent key begins authenticating host, otherwise main frame continues to search intelligent key apparatus.
Described step 3, the intelligent key apparatus authenticating host is specially:
1) intelligent key apparatus sends to main frame with functional value and the random number Y of random number Z through the asymmetric arithmetic encryption, and the back functional operation result to random number Z of main frame deciphering does the inverse function computing and gets random number Z;
2) main frame is done functional operation to random number Y and is got its value, and with the functional value that random number Z is instantaneous key usefulness symmetric encipherment algorithm encrypted random number Y, sends intelligent key apparatus;
3) intelligent key apparatus is the functional value that decruption key gets random number Y with random number Z, and intelligent key apparatus is done functional operation to random number Y again;
4) functional value of the functional value of the random number Y of intelligent key apparatus contrast function computing gained and the resulting random number Y of deciphering, if unanimity as a result, the main frame authentication is passed through, otherwise, return error message.
Described step 3 also comprises number does the encryption and decryption computing to hardware ID.
Described intelligent key apparatus is done functional operation to random number X and random number Z synchronously.
The functional operation value of described intelligent key apparatus encrypted random number X has been encrypted the functional operation value of random number Y and random number Z simultaneously, and sends simultaneously.
Described asymmetric arithmetic can be replaced by symmetry algorithm.
Described intelligent key apparatus storage inside the symmetry, asymmetric two kinds of algorithms.
Be instantaneous key with Z in the described step 3, described instantaneous key becomes session key after session is set up.
After session was set up in the described step 4, described session key lost efficacy after the time that exceeds the intelligent key apparatus setting;
The time of described setting realizes when the intelligent key apparatus initialization.
After session is set up in the described step 4, after described session key lost efficacy, use the session key function of this session key, return step 1 and restart.
Compared with prior art, beneficial effect of the present invention is:
In the present invention, adopt two-way authentication, wherein the authentication of second step uses instantaneous key to improve safety of data transmission.
In the present invention, adopt the process of instantaneous key, improved safety of data transmission as the session key transfer of data.
In the present invention, described session key lost efficacy after exceeding setting-up time, had improved safety of data transmission.
Description of drawings
Fig. 1 is a kind of method flow diagram that improves data transmission security of embodiment.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but the present invention is not limited to the following examples.
Embodiment
The asymmetric arithmetic that is adopted is a RSA Algorithm in the present embodiment, and the symmetry algorithm of employing is the 3DES algorithm.Referring to Fig. 1, the embodiment of the invention provides a kind of method that improves data transmission security, specifically may further comprise the steps:
Step 101: main frame generates random number X, and sends to intelligent key apparatus, simultaneously the requests verification intelligent key apparatus;
Step 102: intelligent key apparatus generates random number Y, Z;
Step 103: intelligent key apparatus is done functional operation to the random number X that receives and the random number Z of generation, A and C;
Step 104: intelligent key apparatus is used RSA cryptographic algorithms and is encrypted A, Y, C and hardware ID number, and encrypted result is divided into two parts R1, R2;
Step 105: intelligent key apparatus sends to main frame with R1, and under the request of main frame R2 is sent to main frame;
Step 106: main frame becomes whole encrypted result with R1, R2 according to cutting apart rule merging R1, R2;
Step 107: main frame is with corresponding secret key decryption encrypted result, A, Y, C and hardware ID number;
Step 108: main frame is done the functional operation identical with intelligent key apparatus to its random number X that begins to generate, and relatively this value and the A that obtains of deciphering;
Step 109: judge whether to equate, be, execution in step 111, otherwise execution in step 110;
Step 110: search next intelligent key apparatus;
Step 111: main frame is done functional operation to random number Y, gets D, simultaneously functional value C is done the inverse function computing, solves Z;
Step 112: main frame is that instantaneous key is encrypted with the 3DES cryptographic algorithm to functional value D with random number Z, and encrypted result is sent to intelligent key apparatus;
Step 113: as instantaneous key, the encrypted result deciphering to receiving obtains functional value D to intelligent key apparatus random number Z;
Step 114: intelligent key apparatus is done functional operation to random number Y and is got its functional value, and compares D and this functional value;
Step 115: judge whether to equate, equate execution in step 117, otherwise execution in step 116;
Step 116: show mistake;
Step 117: session is set up, and random number Z uses as session key;
Step 118: begin transfer of data between main frame, intelligent key apparatus;
Step 119: judge whether session key exceeds the time that intelligent key apparatus is set;
Step 120: not, transfer of data continues, otherwise, return step 101.
In the present embodiment, RSA Algorithm can be replaced by the 3DES algorithm.
In the present embodiment, the intelligent key apparatus storage inside two kinds of algorithms of RSA, 3DES.
In the present embodiment, hardware ID described in the step 104 number is when intelligent key apparatus is downloaded COS, writes in the intelligent key apparatus.
In the present embodiment, the random number Z in the step 112 is used as instantaneous key.
In the present embodiment, random number Z used as session key after session was set up.
In the present embodiment, random number Z is as session key, loses efficacy after this session key exceeds the time that intelligent key apparatus sets, and returns step 101 and generates new random number Z as session key.
In the present embodiment, the order of main frame authentication intelligent key device and intelligent key apparatus authenticating host can be put upside down.
In the present embodiment, the time that intelligent key apparatus is set is when the intelligent key apparatus initialization, is realized by programming.
Above-described embodiment is a more preferably embodiment of the present invention, and common variation that those skilled in the art carries out in the technical solution of the present invention scope and replacement all should be included in protection scope of the present invention.

Claims (12)

1. method that improves data transmission security, it is characterized in that, at first intelligent key apparatus is linked to each other with main frame, main frame, each self-generating random number of intelligent key apparatus, carry out the encryption and decryption computing to realize bidirectional identity authentication, after authentication was passed through, session was set up, utility cession secret key encryption transmission data between main frame and intelligent key apparatus, realize that the concrete steps of this method are as follows:
Step 1: main frame generates random number X, sends random number X to intelligent key apparatus, proposes authentication request;
Step 2: intelligent key apparatus generates random number Y, Z;
Step 3: main frame, intelligent key apparatus carry out two-way authentication:
Main frame authentication intelligent key device: intelligent key apparatus carries out cryptographic calculation after random number X is done functional operation, sends main frame, realizes main frame authentication intelligent key device;
The intelligent key apparatus authenticating host: main frame is done functional operation to the random number Y that intelligent key apparatus produces, and is instantaneous secret key encryption by random number Z, sends intelligent key apparatus, realizes the intelligent key apparatus authenticating host;
Step 4: after authentication is passed through, random number Z as session key, is used this session key transmission data between main frame and intelligent key apparatus.
2. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described step 3, it is asymmetric arithmetic that main frame authentication intelligent key device is done the used algorithm of encryption and decryption computing, and the intelligent key apparatus authenticating host is done the used algorithm of encryption and decryption computing and comprised symmetry algorithm.
3. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described step 3, main frame authentication intelligent key device is specially:
1) intelligent key apparatus is done functional operation to random number X, the functional operation value is encrypted with rivest, shamir, adelman again, and encrypted result is sent to main frame;
2) main frame is deciphered the functional value that the encrypted result of being sent by intelligent key gets random number X with corresponding algorithm;
3) main frame is done functional operation to the random number X of its generation, and the functional value of the random number X that the functional value that obtains and deciphering are obtained compares, if unanimity as a result, intelligent key begins authenticating host, otherwise main frame continues to search intelligent key apparatus.
4. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described step 3, the intelligent key apparatus authenticating host is specially:
1) intelligent key apparatus sends to main frame with functional value and the random number Y of random number Z through the asymmetric arithmetic encryption, and the back functional operation result to random number Z of main frame deciphering does the inverse function computing and gets random number Z;
2) main frame is done functional operation to random number Y and is got its value, and with the functional value that random number Z is instantaneous key usefulness symmetric encipherment algorithm encrypted random number Y, sends intelligent key apparatus;
3) intelligent key apparatus is the functional value that decruption key gets random number Y with random number Z, and intelligent key apparatus is done functional operation to random number Y again;
4) functional value of the functional value of the random number Y of intelligent key apparatus contrast function computing gained and the resulting random number Y of deciphering, if unanimity as a result, the main frame authentication is passed through, otherwise, return error message.
5. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described step 3 also comprises number does the encryption and decryption computing to hardware ID.
6. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described intelligent key apparatus is done functional operation to random number X and random number Z synchronously.
7. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: the functional operation value of described intelligent key apparatus encrypted random number X has been encrypted the functional operation value of random number Y and random number Z simultaneously, and sends simultaneously.
8. according to the described a kind of method that improves data transmission security of claim 2, it is characterized in that: described asymmetric arithmetic can be replaced by symmetry algorithm.
9. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described intelligent key apparatus storage inside the symmetry, asymmetric two kinds of algorithms.
10. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: after session was set up in the described step 4, described session key lost efficacy after the time that exceeds the intelligent key apparatus setting.
11. according to the described a kind of method that improves data transmission security of claim 10, it is characterized in that: the time of described setting realizes when the intelligent key apparatus initialization.
12., it is characterized in that: after session is set up in the described step 4, after described session key lost efficacy, use the session key function of this session key, return step 1 and restart according to the described a kind of method that improves data transmission security of claim 10.
CN2007100996737A 2007-05-28 2007-05-28 A method for improving the data transmission security Expired - Fee Related CN101056166B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007100996737A CN101056166B (en) 2007-05-28 2007-05-28 A method for improving the data transmission security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007100996737A CN101056166B (en) 2007-05-28 2007-05-28 A method for improving the data transmission security

Publications (2)

Publication Number Publication Date
CN101056166A CN101056166A (en) 2007-10-17
CN101056166B true CN101056166B (en) 2010-04-21

Family

ID=38795797

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007100996737A Expired - Fee Related CN101056166B (en) 2007-05-28 2007-05-28 A method for improving the data transmission security

Country Status (1)

Country Link
CN (1) CN101056166B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8539233B2 (en) * 2007-05-24 2013-09-17 Microsoft Corporation Binding content licenses to portable storage devices
CN101540675B (en) * 2008-12-31 2010-12-29 北京飞天诚信科技有限公司 Smart key equipment and communication method and system of application software
CN101986663A (en) * 2010-11-29 2011-03-16 北京卓微天成科技咨询有限公司 OTP-based cloud storage data storing method, device and system
CN102215106B (en) * 2011-05-31 2015-01-14 飞天诚信科技股份有限公司 Wireless intelligent key device and signature method thereof
CN102427444B (en) * 2011-08-25 2014-04-30 飞天诚信科技股份有限公司 Method for computer to process data flow
CN102394749B (en) * 2011-09-26 2014-03-05 深圳市文鼎创数据科技有限公司 Line protection method, system, information safety equipment and application equipment for data transmission
CN102413132B (en) * 2011-11-16 2014-12-17 北京数码视讯软件技术发展有限公司 Two-way-security-authentication-based data downloading method and system
CN102801730B (en) * 2012-08-16 2015-01-28 厦门市美亚柏科信息股份有限公司 Information protection method and device for communication and portable devices
CN103873227A (en) * 2012-12-13 2014-06-18 艺伦半导体技术股份有限公司 Decoding circuit and decoding method for FPGA encryption data flow
CN103220271A (en) 2013-03-15 2013-07-24 福建联迪商用设备有限公司 Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN104158567B (en) * 2014-07-25 2016-05-18 天地融科技股份有限公司 Matching method between bluetooth equipment and system, data interactive method and system
CN105636037B (en) * 2015-06-29 2019-11-12 宇龙计算机通信科技(深圳)有限公司 Authentication method, device and electronic equipment
CN105813076A (en) * 2016-03-10 2016-07-27 北京芯杰科技有限公司 Communication method and device
CN105871920A (en) * 2016-06-08 2016-08-17 美的集团股份有限公司 Communication system and method of terminal and cloud server as well as terminal and cloud server
CN106650372B (en) * 2016-12-06 2019-05-03 厦门中控智慧信息技术有限公司 The activating method and device of administrator right
CN109165683B (en) * 2018-08-10 2023-09-12 深圳前海微众银行股份有限公司 Sample prediction method, device and storage medium based on federal training
CN110691359A (en) * 2019-09-24 2020-01-14 中国电力科学研究院有限公司 Safety protection method for power marketing professional Bluetooth communication

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5544245A (en) * 1993-06-10 1996-08-06 Kokusai Denshin Denwa Kabushiki Kaisha Mutual authentication/cipher key delivery system
CN1249587A (en) * 1998-07-31 2000-04-05 朗迅科技公司 Method for mutual authentication and cryptographic key agreement
CN1386249A (en) * 2000-06-08 2002-12-18 布尔Cp8公司 Method for secure storage of sensitive data in a silicon chip integrated system storage, in particular a smart carp, and integrated system therefor
CN1564514A (en) * 2004-03-26 2005-01-12 中兴通讯股份有限公司 Self arranged net mode shared key authentication and conversation key consulant method of radio LAN
CN1665183A (en) * 2005-03-23 2005-09-07 西安电子科技大学 Key agreement method in WAPI authentication mechanism
CN1768502A (en) * 2002-06-19 2006-05-03 安全通信公司 Inter-authentication method and device
CN1767429A (en) * 2004-10-29 2006-05-03 大唐移动通信设备有限公司 Mobile communication user certification and key negotiation method
CN1819515A (en) * 2006-03-20 2006-08-16 胡祥义 Realizing method of security symmetric coding algorithm
CN1934821A (en) * 2004-03-22 2007-03-21 三星电子株式会社 Authentication between device and portable storage

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5544245A (en) * 1993-06-10 1996-08-06 Kokusai Denshin Denwa Kabushiki Kaisha Mutual authentication/cipher key delivery system
CN1249587A (en) * 1998-07-31 2000-04-05 朗迅科技公司 Method for mutual authentication and cryptographic key agreement
CN1386249A (en) * 2000-06-08 2002-12-18 布尔Cp8公司 Method for secure storage of sensitive data in a silicon chip integrated system storage, in particular a smart carp, and integrated system therefor
CN1768502A (en) * 2002-06-19 2006-05-03 安全通信公司 Inter-authentication method and device
CN1934821A (en) * 2004-03-22 2007-03-21 三星电子株式会社 Authentication between device and portable storage
CN1564514A (en) * 2004-03-26 2005-01-12 中兴通讯股份有限公司 Self arranged net mode shared key authentication and conversation key consulant method of radio LAN
CN1767429A (en) * 2004-10-29 2006-05-03 大唐移动通信设备有限公司 Mobile communication user certification and key negotiation method
CN1665183A (en) * 2005-03-23 2005-09-07 西安电子科技大学 Key agreement method in WAPI authentication mechanism
CN1819515A (en) * 2006-03-20 2006-08-16 胡祥义 Realizing method of security symmetric coding algorithm

Also Published As

Publication number Publication date
CN101056166A (en) 2007-10-17

Similar Documents

Publication Publication Date Title
CN101056166B (en) A method for improving the data transmission security
US8239679B2 (en) Authentication method, client, server and system
CN102685093B (en) A kind of identity authorization system based on mobile terminal and method
CN113691380B (en) Multidimensional private data aggregation method in smart power grid
JP6417036B2 (en) Entity authentication method and apparatus based on pre-shared key
CN101478548B (en) Data transmission ciphering and integrity checking method
CN102082790B (en) Method and device for encryption/decryption of digital signature
CN104270242B (en) A kind of ciphering and deciphering device for network data encryption transmission
CN104253694A (en) Encrypting method for network data transmission
CN102880836A (en) Security device
CN105471584A (en) Identity authentication method based on quantum key encryption
CN105306194A (en) Multiple encryption method and multiple encryption system for encrypting file and/or communication protocol
CN108347404A (en) A kind of identity identifying method and device
CN109309566B (en) Authentication method, device, system, equipment and storage medium
CN107465665A (en) A kind of file encryption-decryption method based on fingerprint identification technology
JPH0934356A (en) High-bandwidth cryptographic system with low-bandwidth cryptographic module
CN105281910A (en) Internet of things lock with CA digital certificate serving as network access identity identifier and network access identity identification method
CN110061957A (en) Data encryption, decryption method, user terminal, server and data management system
CN204180095U (en) A kind of ciphering and deciphering device for network data encryption transmission
Zhou et al. Implementation of cryptographic algorithm in dynamic QR code payment system and its performance
CN102970676A (en) Method for processing original data, internet of thing system and terminal
CN110191136A (en) A kind of convenient and fast file secure transmission method and equipment
CN111884814B (en) Method and system for preventing intelligent terminal from being counterfeited
CN109922022A (en) Internet of Things communication means, platform, terminal and system
CN113591109B (en) Method and system for communication between trusted execution environment and cloud

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: FEITIAN TECHNOLOGIES CO., LTD.

Free format text: FORMER NAME: BEIJING FEITIAN CHENGXIN TECHNOLOGY CO., LTD.

CP03 Change of name, title or address

Address after: 100085 Beijing city Haidian District Xueqing Road No. 9 Ebizal building B block 17 layer

Patentee after: Feitian Technologies Co.,Ltd.

Address before: 100083, Haidian District, Xueyuan Road, No. 40 research, 7 floor, 5 floor, Beijing

Patentee before: FEITIAN TECHNOLOGIES Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100421