[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN1114164C - Down loading and enciphering method for Internet electronic reading - Google Patents

Down loading and enciphering method for Internet electronic reading Download PDF

Info

Publication number
CN1114164C
CN1114164C CN 99125396 CN99125396A CN1114164C CN 1114164 C CN1114164 C CN 1114164C CN 99125396 CN99125396 CN 99125396 CN 99125396 A CN99125396 A CN 99125396A CN 1114164 C CN1114164 C CN 1114164C
Authority
CN
China
Prior art keywords
user side
download
electron reading
encryption method
mentioned
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN 99125396
Other languages
Chinese (zh)
Other versions
CN1302027A (en
Inventor
陆怡
邱全成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhigu Tech Co Ltd
Original Assignee
Inventec Group Shanghai Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Group Shanghai Electronic Technology Co Ltd filed Critical Inventec Group Shanghai Electronic Technology Co Ltd
Priority to CN 99125396 priority Critical patent/CN1114164C/en
Publication of CN1302027A publication Critical patent/CN1302027A/en
Application granted granted Critical
Publication of CN1114164C publication Critical patent/CN1114164C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention provides a method for downloading and encoding Internet electronic reading materials, which comprises: mark information derived by using a hard disk of a computer host and the sequence number of a software product is transmitted to a server, the mark information is used as the key value for encoding the version of the electronic reading material so as to generate version information, and the version information is integrated into the electronic reading material and transmitted to a user end with the electronic reading material. When the user end wants to execute the electronic reading material, the mark information is generated according to the hard disk and the sequence number of the software product, and the mark information is used as the key value for decoding the version information of the electronic reading material. The method for downloading and encoding can protect copyright of the electronic reading material.

Description

The download of internet electronic reading and encryption method
The present invention relates to a kind of electron reading downloads and encryption method; relate in particular to and in the internet, download electron reading and method of encrypting; this method is being taken into account under user's the legal use rights and interests, only keeps a backup to use for the user, has protected the copyright of electron reading effectively.
Prosperity along with Information technology, the arithmetic capability of computer also strengthens day by day, so only can carry out communication or on PC, work in the past by terminating machine and super computer, seeing through magnetic sheet again comes Data transmission to carry out the mode of information sharing, also gradually by network miscellaneous, such as LAN (Local Area Network) (Local Area Network, LAN) or Wide Area Network (Wide Area Network, WAN) etc. replace, and these networks also can link further and become internet (Internet).So each user side (Client) can inexpensive with the situation of buying more hardware device under, just with the internet on arbitrarily the website carry out line, the information that is provided in order to the server (Server) of seizing this website.
Yet just in internet communication highly developed today; the problem that the people of all kinds that also derive did not run in the past; such as the protection (for example preventing the invasion of hacker or virus) of mode even server and its data of the use of domain name (Domain name), copyright protection on the internet and legal use and legitimacy of data download or the like, all remain technician and law stakeholder to do further research and discussion.Because the data of being transmitted on the internet all belong to electron reading, and the propagation of data is very quick, therefore for institute's data downloaded, as long as after the user downloads required data, the just action that can indiscriminately ad. as one wishes duplicate or copy.Owing to still lack at present copy-right protection method on the internet to data download, therefore when software provider be that what problem appears in Shang Buhui when providing free electron reading for the situation of user's use; But electron reading for the need charge; data download is not being carried out under the situation of any copyright protection; not only author's that this electron reading is provided intellecture property is not discharged the fact of any protection, more grievous injury information software practitioner continues to develop the wish of information software.So need a kind of copy-right protection method of downloading electron reading badly, can under protection user's legal use rights and interests, remove the difficult problem that above-mentioned known technology faces.
In above-mentioned background of invention, data download is not carried out any copyright protection on the internet, so the user can copy and duplicate, the intellecture property of grievous injury author arbitrarily to the electron reading of being downloaded.The present invention promptly at above-mentioned shortcoming propose a kind of in the internet method of the sub-reading matter of live up and down, in order to overcome the problem that known technology faces.
Disclosed method; utilize numbering unique on the user computer main frame; such as numberings such as hard disk and software product sequence numbers; produce the flag information of electron reading; cooperate the electron reading version information after encrypting; in order to reaching in the internet copyright of protection electron reading, and then reach the purpose of maintenance software creator intellecture property.
When user computer main frame desire is downloaded electron reading, with the flag information that utilizes its hard disk and software product sequence number to be derived for parameter to be sent to server; Server is a key value according to this label information again, does encryption in order to the version to electron reading, and then produces the version information of electron reading; Subsequently this version information is incorporated in the data layout of electron reading, be sent to user side more together.
When the user side desire is carried out electron reading, will produce flag information according to its hard disk and software product sequence number; Utilize the flag information that is produced as key value subsequently again, do deciphering in order to version information to electron reading; When the characteristic that can correctly solve electron reading, and this electron reading then is presented at electron reading on the screen of user side when not shifting out user side.
When electron reading when shifting out user side migration purpose user side, shift out user side and will receive the flag information that comes by the purpose user side, it is that the hard disk and the software product sequence number of utilization purpose user side produces; After electron reading is decrypted with the flag information that shifts out user side, utilize the flag information of purpose user side that electron reading is encrypted again subsequently, in order to produce new electron reading version information; Write down after this electron reading shifted out shifting out user side, electron reading is sent to the purpose user side.
Preferred embodiment of the present invention will be aided with following accompanying drawing and do more detailed the elaboration in comment backward:
Fig. 1 has shown the architecture block diagram of preferred embodiment of the present invention;
Fig. 2 shown when downloading e-book by the internet, user side software shown interface synoptic diagram on screen;
Fig. 3 has shown the synoptic diagram the when e-book of being downloaded among Fig. 2 is carried out;
Fig. 4 has shown when the mobile electron book, is shifting out the shown dialog box of user side screen;
Fig. 5 has shown the form of the employed electron reading data of preferred embodiment of the present invention;
Fig. 6 has shown in the preferred embodiment of the present invention, the workflow diagram when downloading electron reading;
Fig. 7 has shown in the preferred embodiment of the present invention, the workflow diagram when showing electron reading; And
Fig. 8 has shown in the preferred embodiment of the present invention, the workflow diagram during the mobile electron reading matter.
Fig. 1 has shown the framework calcspar of preferred embodiment of the present invention, and it is with the media of internet as the transmission electronic reading matter, and any user side that links to each other with the internet 104 can be downloaded data by server 102 by the internet.In fact, disclosed method is not only on the internet available, and the network of any kenel such as frameworks such as LAN or Wide Area Networks, all can utilize method of the present invention to protect its electron reading.In addition, the following live philosophical works is an example, will show interface synoptic diagram as shown in Figure 2 on the user side screen; And when the user use downloaded as e-book the time, shown interface synoptic diagram also can be as shown in Figure 3.
See also Fig. 6, Fig. 6 has shown in the preferred embodiment of the present invention, the workflow diagram when downloading electron reading.At first, in step 602, user side is with the hard disk of its host computer and the product ID of software, in order to produce a flag information; Next in step 604, it is parameter that the host computer of user side will be worked for this flag information, in order to send the request of downloading electron reading to server.Receive the request of user side when server after, the electron reading that will utilize flag information that user side institute desire is downloaded in step 606 is handled (hereinafter can go detailed description) again, and the while also produces the version information of this electron reading; Server will be stored in the version information that is produced in the data layout of electron reading in following step 608; Subsequently will be in step 610, server is sent to user side with the electron reading of finishing dealing with by the internet; User side then receives after the electron reading that this server transmitted in step 612, carries out the operation of stored electrons reading matter.
It should be noted that above-mentioned steps 602 employed hard disks and software product sequence number can be replaced by other " unique " numbering.For example, on PC (PC), can utilize the product ID of central processing unit (CPU) to replace, and (Personal Digital Assistant PDA) in the device, then can get its product ID to handle at personal digital aid (PDA); The software product sequence number then can use operating system, such as the product ID of the Windows 95/98 of Microsoft.In addition, the flag information of server that step 602 is passed to can be the result that hard disk and software product sequence number directly are merged into word string, can also encrypt after being merged into word string; Or above-mentioned two product IDs are carried out sending after the logical process (for example displacement or addition, subtraction operation).Moreover, in above-mentioned steps 606, server can be after receiving the flag information that is transmitted by user side, the characteristic information of utilization electron reading, the for example title of electron reading or information such as author, creation date, merge flag information to carry out cryptographic operation simultaneously, in order to obtain the electron reading flag information.E-book with Fig. 2 to Fig. 4 is an example, promptly can do key value by flag information, " Inventec Ebook Version 1.0 " encrypted, again encrypted result is deposited in subsequently in the data layout of electron reading, to be resent to user side behind the version information as this electron reading.It should be noted that known technology can be modified the preferred embodiment of the invention described above based on spirit of the present invention, but these changes must be included in protection scope of the present invention.
As for the employed electron reading data layout of preferred embodiment of the present invention, then see also synoptic diagram shown in Figure 5.In Fig. 5, the characteristic information of electron reading can leave in the zone 502 as the title of electron reading or author, creation date etc.; And the version information of electron reading and user side flag information then can be stored among regional 504A and the 504B respectively; As for the actual data content of electron reading, then can be stored in the zone 506.In addition, the big I in above-mentioned each zone is decided according to actual application, can come storage data with 128,64,64 bytes (Bytes) respectively such as zone 502,504A, 504B.
It should be noted that above-mentioned data layout only is a usefulness of doing explanation, any change or modification of doing based on above-mentioned form such as adjusting stored interior its amount of capacity etc. that perhaps changes in each zone, must be included within the scope of the present invention.
After finishing the operation of downloading electron reading when user side, just can show or the operation of mobile electron reading matter, and show and the workflow of mobile electron reading matter, then use Fig. 7 and Fig. 8 to represent respectively.At first see also electron reading shown in Figure 7 and show workflow.In step 702, when the user side desire shows (that is use) electron reading, will produce flag information according to the hard disk and the software product sequence number of user side.It should be noted that the flag information of this moment promptly is sent to the parameter of the sub-reading matter of the following live of server.In the following step 704, the user computer main frame will utilize this flag information to be key value, be decrypted in order to version information electron reading, and when correctly solving version information (step 706), execution in step 708 is to read the user side log file, in order to confirm that whether the present electron reading that is read is by the migration elsewhere again.When electron reading is still stayed present user side (step 710), then the user computer main frame will read the data of electron reading and show in step 712.Above-mentioned version information to electron reading do add, the method for decryption oprerations can decide according to the demand of reality.The method that some are known such as methods such as RSA, all can be used in disclosed method.Whether the change as for log file is confirmed, can use hash (Hash) algorithm to produce a proof test value in step 710, be modified in order to the comparison log file.Yun Yong hash algorithm is the MD5 algorithm of standard in the present embodiment.In addition, log file also can promptly be opened after e-file is downloaded, and stores with system file, so the user just is difficult for finding this log file and being difficult for changing.
See also Fig. 8 at last, it has shown in the present invention imitates among the good embodiment workflow diagram of mobile electron reading matter.In step 802, be about to shift out the user side that shifts out of electron reading, with first electron gain reading matter with hard disk on the purpose user side of migration and software product sequence number, in order to produce the flag information of purpose user side.Subsequently in step 804, whether shift out software product sequence number (can get) that user side will compare the purpose user side with own identical by the flag information of purpose user side.When the two product serial not simultaneously, therefore expression uses different laser disc (or magnetic sheet) to come install software between the two, may be different users, so will not carry out the action of mobile electron reading matter.In the following step 806, shifting out user side will be decrypted electron reading according to the flag information of oneself; Again in step 808, utilize and electron reading is encrypted, and change the version information of electron reading simultaneously subsequently at the purpose user side flag information that step 802 obtained; So in following step 810, shift out user side just in log file, write the record that electron reading has been moved out of; Last and in step 812, electron reading is sent to the purpose user side.User's interface required during as for the mobile electron reading matter can be as shown in Figure 4.It should be noted that what Fig. 4 was shown is in dialog box, required path is pointed out, but this embodiment can become according to actual application in the mode of artificial input.
In the judgement of in above-mentioned steps 710 whether electron reading being shifted out, what read promptly is at step 810 recorded data.Moreover, when electron reading by shifting out after user side shifts out, all data that also can directly delete electron reading are in order to save hard drive space; Or stay the data of electron reading, and in case following electron reading is when retracting once more, the direct content of change record file, then just need not carry out network communication transmitting the action of data, but known technology still can change according to the demand of reality.In addition, in step 802, for hard disk and the software product sequence number that makes the purpose user side can correctly be transmitted, can when Network Transmission, carry additionally some data bytes or packet header (Header), as the correctness of confirming that data transmit, all can use in the method for the invention such as circulating duplication check technology such as (CRC).
The workflow diagram of the above-mentioned Fig. 6 to Fig. 7 of foundation significantly, after electron reading is encrypted according to above-mentioned method, only utilizes the flag information of former download host computer to be decrypted, otherwise can't correctly solve the data of electron reading as can be known.In addition, also can learn, after electron reading is moved out of, because the version information of this electron reading was changed, so original host computer just can't be carried out this electron reading again by the flow process of Fig. 8.Therefore can only there be one to download backup during the disclosed method of the present invention can be guaranteed at one time, so reach the purpose of protection electron reading copyright.
Comprehensive the above; disclosed method; utilize numbering unique on the user computer main frame; such as numberings such as hard disk and software product sequence numbers; produce the flag information of electron reading; electron reading version information after cooperate encrypting in order to being implemented in the copyright of protection electron reading in the internet, and then is reached the purpose of maintenance software creator intellecture property.
The above is preferred embodiment of the present invention only, is not in order to limit claim of the present invention; All other waiting of not breaking away under the disclosed spirit to be finished are so change, and such as modifications such as the data storing form of change electron reading or change encryption methods, all should be included in the following claim scope.

Claims (29)

1, the download of internet electronic reading and encryption method, this method comprises the following step at least:
Utilize the characteristic information of user side to produce a flag information;
Send this flag information to server;
Utilize this flag information to produce the version information of this electron reading;
This version information is stored in the data layout of electron reading; And
Server is sent to this user side to this electron reading.
2, download as claimed in claim 1 and encryption method is characterized in that, above-mentioned characteristic information comprises hardware element numbering and software element numbering.
3, download as claimed in claim 2 and encryption method is characterized in that, above-mentioned hardware element numbering is the hard disk product ID of the host computer of this user side.
4, download as claimed in claim 2 and encryption method is characterized in that, the product ID of the central processing unit of the host computer that above-mentioned hardware element numbering is this user side.
5, download as claimed in claim 2 and encryption method is characterized in that, above-mentioned software element numbering is the software product sequence number of this user side.
6, download as claimed in claim 5 and encryption method is characterized in that, above-mentioned software product sequence number is the product ID of operating system.
7, download as claimed in claim 2 and encryption method is characterized in that, above-mentioned flag information is that this hardware element numbering and this software element numbering are merged the word string that is produced.
8, download as claimed in claim 2 and encryption method is characterized in that, above-mentioned flag information is with result that logical operation was produced with this hardware element numbering and this software element numbering.
9, download as claimed in claim 2 and encryption method is characterized in that, above-mentioned version information is to utilize this flag information to be key value, and the characteristic information of this electron reading is encrypted the result who is produced.
10, download as claimed in claim 9 and encryption method is characterized in that, title, author or creation date that above-mentioned electron reading characteristic information is this electron reading.
11, download as claimed in claim 1 and encryption method is characterized in that, also are included in the step that this user side shows this electron reading, and this step display comprises the following step at least:
Utilize the characteristic information of this user side to produce flag information;
Utilize flag information that the version information of electron reading is decrypted;
In the time correctly being decrypted this version information, whether the reading and recording file is moved out of in order to confirm this electron reading; And
When this electron reading does not shift out this user side, on the screen of this user side, show this electron reading.
12, download as claimed in claim 11 and encryption method is characterized in that, above-mentioned log file is a system file.
Whether 13, download as claimed in claim 11 and encryption method is characterized in that, above-mentioned log file is to utilize the hash algorithm to produce a proof test value, changed in order to write down this log file.
14, download as claimed in claim 13 and encryption method is characterized in that, also comprise to check this proof test value, with the step of confirming whether this electron reading is moved out of.
15, download as claimed in claim 1 and encryption method is characterized in that, also comprise the step that moves this electron reading, and this moves step and comprises the following step at least:
The flag information of input purpose user side;
Confirm that this shifts out user side and whether this purpose user side is same user;
The flag information that user side is shifted out in utilization is decrypted the version information of this electron reading;
Utilize the flag information of this purpose user side that its version information is encrypted and changed to the version information of this electron reading;
Writing down this electron reading is shifted out by shifting out user side; And
This electron reading is sent to the purpose user side.
16, download as claimed in claim 15 and encryption method, it is characterized in that, above-mentioned affirmation step is that this software product sequence number that shifts out user side and this purpose user side is compared, and when this software product sequence number that shifts out the software product sequence number of user side and this purpose user side not simultaneously, stop the execution that this moves step.
17, download as claimed in claim 9 and encryption method is characterized in that, above-mentioned hardware element numbering is the hard disk product ID of the host computer of this user side.
18, download as claimed in claim 9 and encryption method is characterized in that, the product ID of the central processing unit of the host computer that above-mentioned hardware element numbering is this user side.
19, download as claimed in claim 9 and encryption method is characterized in that, above-mentioned software element numbering is the software product sequence number of this user side.
20, download as claimed in claim 19 and encryption method is characterized in that, above-mentioned software product sequence number is the product ID of operating system.
22, download as claimed in claim 9 and encryption method is characterized in that, above-mentioned flag information is that this hardware element numbering and software element numbering are merged the word string that is produced.
22, download as claimed in claim 9 and encryption method is characterized in that, above-mentioned flag information is with result that logical operation was produced with this hardware element numbering and software element numbering.
23, download as claimed in claim 9 and encryption method is characterized in that, also comprise one and show the step of this electron reading at this user side, and this step display comprises the following step at least:
Utilize the characteristic information of this user side to produce this flag information;
Utilize this flag information that the version information of this electron reading is decrypted;
In the time correctly being decrypted this version information, whether the reading and recording file is moved out of in order to confirm this electron reading; And
When this electron reading does not shift out the scheme user side, on user's screen, show this electron reading.
24, download as claimed in claim 23 and encryption method is characterized in that, above-mentioned log file is a system file.
25, download as claimed in claim 23 and encryption method is characterized in that, whether above-mentioned log file is to utilize the hash algorithm to produce proof test value, changed in order to write down this log file.
26, download as claimed in claim 23 and encryption method is characterized in that, also comprise to check this proof test value, with the step of confirming whether this electron reading is moved out of.
27, download as claimed in claim 9 and encryption method is characterized in that, also comprise the step that moves this electron reading, and this moves step and comprises the following step at least:
Import the flag information of a purpose user side;
Confirm that this moves user side and whether this purpose user side is same user;
The flag information that user side is shifted out in utilization is decrypted the version information of this electron reading;
Utilize the flag information of this purpose user side that its version information is encrypted and changed to the version information of this electron reading;
Writing down this electron reading is shifted out by shifting out user side; And
This electron reading is sent to the purpose user side.
28, download as claimed in claim 27 and encryption method, it is characterized in that, above-mentioned affirmation step is that this software product sequence number that shifts out user side and this purpose user side is compared, and when the software product sequence number that shift out the software product sequence number of user side and purpose user side not simultaneously, stop the execution that this moves step.
29, download as claimed in claim 9 and encryption method is characterized in that, the characteristic information of above-mentioned electron reading is the title of this electron reading, author or creation date.
CN 99125396 1999-12-27 1999-12-27 Down loading and enciphering method for Internet electronic reading Expired - Lifetime CN1114164C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 99125396 CN1114164C (en) 1999-12-27 1999-12-27 Down loading and enciphering method for Internet electronic reading

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 99125396 CN1114164C (en) 1999-12-27 1999-12-27 Down loading and enciphering method for Internet electronic reading

Publications (2)

Publication Number Publication Date
CN1302027A CN1302027A (en) 2001-07-04
CN1114164C true CN1114164C (en) 2003-07-09

Family

ID=5283922

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 99125396 Expired - Lifetime CN1114164C (en) 1999-12-27 1999-12-27 Down loading and enciphering method for Internet electronic reading

Country Status (1)

Country Link
CN (1) CN1114164C (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7096213B2 (en) * 2002-04-08 2006-08-22 Oracle International Corporation Persistent key-value repository with a pluggable architecture to abstract physical storage
CN101887502B (en) * 2010-07-26 2012-05-23 深圳市永达电子股份有限公司 Authorized downloading method and system for electronic file
TW201344487A (en) * 2012-04-16 2013-11-01 Hui-Chung Che Digital authentication control medium and digital terminal device having network communication function
CN105095691B (en) * 2014-04-24 2019-11-22 厦门简帛信息科技有限公司 A kind of method and apparatus sending digital publication

Also Published As

Publication number Publication date
CN1302027A (en) 2001-07-04

Similar Documents

Publication Publication Date Title
Tan et al. A survey on proof of retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends
JP4759513B2 (en) Data object management in dynamic, distributed and collaborative environments
JP5647754B1 (en) Computerized system, method, computer program, and data storage medium for deletion of content in storage system (deletion of content in storage system)
Castiglione et al. Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
US20070078775A1 (en) System and method for preventing unauthorized use of digital works
WO2004051483A1 (en) License movement device and program
WO2006017362A2 (en) Storing and distributing encrypted digital content
JP2004510367A (en) Protection by data chunk address as encryption key
KR102107438B1 (en) Apparatus for managing electronic document using blockchain and operating method thereof
WO2014136000A1 (en) Secure digital artifact storage and access
CN109344568A (en) Document handling method and device based on block chain
CN1261895C (en) Contents reproducing apparatus, contents reproduction control program and recording medium having a contents reproduction control program recorded thereon
JPWO2009008036A1 (en) File management system, device and program
CA2483760A1 (en) System and method for a secure, scalable wide area file system
JP2002334559A (en) Information recording medium, information management system and copyright protection method
CN1114164C (en) Down loading and enciphering method for Internet electronic reading
JP6755539B2 (en) Methods and equipment for publishing copyrighted works on networks
JP4815353B2 (en) How to record content distribution information in an adjunct to content
Ali et al. Secure block-level data deduplication approach for cloud data centers
Hua et al. Secure data deletion in cloud storage: a survey
KR20230104877A (en) How to ensure confidentiality and integrity of data and metadata stored in untrusted environments
AU2008344947B2 (en) System and method for securely storing information
Khatod et al. Enigma: A hybrid approach to file security in cloud
Mariappan et al. Digital Forensic and Machine Learning
Alkhadhr et al. Cryptography and randomization to dispose of data and boost system security

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: INVENTEC APPLIANCES (SHANGHAI) ELECTRONICS CO., LT

Free format text: FORMER NAME OR ADDRESS: SHANGHAI ELECTRONIC TECHNOLOGY CO., LTD., YINGYEDA GROUP

CP03 Change of name, title or address

Address after: 200233 Shanghai City Guiqin Road No. 7

Patentee after: Inventec (Shanghai) Electronics Co., Ltd.

Address before: 200233 Shanghai City Guiqin Road No. 7

Patentee before: Yingyeda Group (Shanghai) Electronic Technology Co., Ltd.

ASS Succession or assignment of patent right

Owner name: BEIJING Z-GOOD TECHNOLOGY SERVICE CO., LTD.

Free format text: FORMER OWNER: YINGHUADA (SHANGHAI) ELECTRONICS CO LTD.

Effective date: 20150709

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20150709

Address after: 100085 Beijing city Haidian District No. 33 Xiaoying Road 1 1F06 room

Patentee after: BEIJING ZHIGU TECHNOLOGY SERVICES CO., LTD.

Address before: 200233 Shanghai City Guiqin Road No. 7

Patentee before: Inventec (Shanghai) Electronics Co., Ltd.

CX01 Expiry of patent term

Granted publication date: 20030709

CX01 Expiry of patent term