CN101860548A - Method, device and system for verifying data signature - Google Patents
Method, device and system for verifying data signature Download PDFInfo
- Publication number
- CN101860548A CN101860548A CN 201010209178 CN201010209178A CN101860548A CN 101860548 A CN101860548 A CN 101860548A CN 201010209178 CN201010209178 CN 201010209178 CN 201010209178 A CN201010209178 A CN 201010209178A CN 101860548 A CN101860548 A CN 101860548A
- Authority
- CN
- China
- Prior art keywords
- data
- signature
- client
- server
- submission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000012795 verification Methods 0.000 claims abstract description 22
- 238000012790 confirmation Methods 0.000 claims description 9
- 238000013524 data verification Methods 0.000 claims description 4
- 238000013502 data validation Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 10
- 238000012545 processing Methods 0.000 description 10
- 238000004590 computer program Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a method, a device and a system for verifying data signature in order to solve the problem of longer determination time of data validity on the premise of ensuring data signature verifying process-based data security. The method comprises the following steps of: receiving data and data signature sent by a client through a server, submitting the data to an operation platform after the data validity is determined, verifying the data signature, and maintaining the submitting state of the data if the data signature verification is successful, otherwise, canceling the submission of the data. Because the data signature verification and the submission of the data to the operation platform are processed in parallel, the time of submitting the data to the operation platform is shortened on the premise of ensuring the data signature verifying process-based data security.
Description
Technical Field
The invention belongs to the technical field of information processing, and particularly relates to a method, a device and a system for verifying a data signature.
Background
With the popularization of the internet, people communicate more and more through the internet, and accordingly, business activities through the internet become more and more popular, and people begin to conduct electronic commerce through the internet widely, such as shopping on the internet and stock trading on the internet. However, with the rapid development of electronic commerce, some Internet security problems are also introduced correspondingly. Network-based criminal activities and the proliferation of trojan programs have affected the security of electronic commerce and online security trading systems. In view of these risks, PKI (Public Key Infrastructure-Public Key Infrastructure) solutions are widely adopted to secure e-commerce at present. In addition to ensuring the identity security of a server by adopting a server SSL security authentication certificate, part of electronic commerce systems also start to strengthen the security protection of a client, in order to ensure the authenticity of a user submitting an order in the system, a client digital certificate is introduced to carry out digital signature on data required by transaction, the signature is sent to the server for verification, and after the verification is passed, the system confirms the validity of the data and hangs the data to a system background.
For some electronic commerce systems with high real-time requirements, such as online stock exchange systems, securities dealers and users, attention is paid to the safety of transactions, and attention is paid to the time for the client to send data required for transactions and the time for the system to confirm the data, namely, the time efficiency when the user submits stock orders and the exchange system confirms that the order is successfully hung. In a general security trading system, the time for a user to submit a stock order and obtain confirmation feedback is 100-: on the premise that the data security is guaranteed in the data signature verification process, the data validity confirmation time is long.
Disclosure of Invention
In order to solve the problem that the validation time of data validity is long on the premise that the data security is ensured in the data signature verification process, the embodiment of the invention provides a data signature verification method, which comprises the following steps:
the server receives data and a data signature sent by the client;
after confirming that the data is valid, the server submits the data to an operation platform;
and the server verifies the data signature, if the data signature is successfully verified, the submission state of the data is maintained, and if not, the submission of the data is cancelled.
Meanwhile, the embodiment of the invention also provides a device for verifying the data signature, which comprises the following steps:
the receiving module is used for receiving the data and the data signature sent by the client;
the data confirmation module is used for confirming that the data is valid and then submitting the data to an operation platform;
and the data verification module is used for verifying the data signature, if the data signature is successfully verified, the submission state of the data is maintained, and otherwise, the submission of the data is cancelled.
Meanwhile, the embodiment of the invention also provides a system for verifying the data signature, which comprises the following steps:
the client is used for sending data and a data signature to the server;
and the server is used for receiving the data and the data signature sent by the client, submitting the data to the operation platform after the data is confirmed to be valid, verifying the data signature, if the data signature is successfully verified, maintaining the submission state of the data, and if not, canceling the submission of the data.
According to the specific implementation scheme provided by the invention, the submission state of the data is maintained when the data signature verification is successful, so that the time for submitting the valid data to the operation platform is shortened on the premise that the data security is ensured in the data signature verification process.
Drawings
FIG. 1 is a flow chart of a method of operating a first embodiment of the present invention;
FIG. 2 is a flow chart of a method of operating a second embodiment of the present invention;
FIG. 3 is a schematic diagram of a third embodiment of the apparatus according to the present invention;
fig. 4 is a system structure diagram of a fourth embodiment of the present invention.
Detailed Description
The first embodiment of the invention provides a method for verifying a data signature, which aims to solve the technical problems that the time for submitting the data to an operation platform after confirming the validity of the data is longer, and is explained below by taking a security trading system as an example, the security trading system comprises a client 11 of a user and a server 12 of a security company, the client 11 is connected with the server 12 through a network, the server 12 receives data D and a data signature S sent by the client 11, the server 12 receives the data D sent by the client 11 and submits the data D to the operation platform after confirming the validity of the data D, and the process that the client 11 generates the data signature S and the server 12 verifies the data signature S is synchronously performed, the key of the scheme is that if the data signature D is successfully verified, the validity of the data D is directly confirmed without signature verification, i.e. maintaining the commit status of data D, otherwise, revoking the commit of data D. The method specifically comprises the following steps as shown in figure 1:
step 101: the client 11 starts sending data D for the transaction to the server 12.
Step 102: and the server 12 receives the data D and submits the data D to the operation platform after confirming that the data D is valid.
Step 103: the client 11 starts the signature process on the data D while the server 12 executes step 102.
Step 104: the client 11 sends the data signature S and the data D to the server 12.
Step 105: after receiving the data D and the data signature S, the server 12 verifies the data signature S, if the data signature S passes the step 106, otherwise, the step 107 is executed.
Step 106: the server 12 does not perform any further processing and maintains the commit status for the data D.
Step 107: the commit of the data is cancelled.
In step 101, the user a needs to input data D for trading through the client, for example, buy 1000 shares of the stock with the code 12345 at a price of 5 yuan/stock or sell 2000 shares of the stock with the code 54321 at a price of 10 yuan/stock, and after the input is completed, the data D can be sent to the server 12 through the client 11.
In step 102, after the server 12 receives the data D, it needs to determine whether the data D is valid, for example, whether the payment account of the user a has 5000 yuan or not, and whether the stock account of the user a has 2000 shares of the stock with the code 54321. And after the data D is confirmed to be valid, submitting the data D to a stock trading operation platform.
In step 103, after the user a prepares the data D for transaction, the data D is encrypted, i.e., signed, according to a private key pre-stored in the client 11, and the process is performed in synchronization with the process of receiving the data D by the server 12 in step 102 and confirming whether the data D is valid.
In step 104, after performing signature processing to generate the data signature S, the client 11 sends the data D signed by the private key, that is, the data signature S and the data D, to the server 12, but only the data signature S may be sent in this step, and the data D sent in step 101 is used when the data signature S is verified in the subsequent steps.
Between step 104 and step 105, a step may be further performed in which the server 12 determines whether or not the predetermined time T is reachedAIf the data signature S is received, step 105 is executed if the data signature S is received, otherwise step 107 is executed, which may ensure that if the client 11 and the server 12 have a transmission delay or have a failure and retransmit, a predetermined time is set to prevent the delay from exceeding the validity confirmation time of the normal data D.
In step 105, the server 12 decrypts the data signature S according to the public key, compares the decrypted result with the received data D, and if the decrypted result is the same as the received data D, the verification is deemed to be passed, otherwise, the verification is deemed to be failed.
In step 106, the server 12 does not perform any processing any more and maintains the submission status of the data D. In this step, the client 11 is not immediately notified that the data D is successfully submitted, but the client 11 is notified that the data D is successfully submitted after the data signature S is verified and confirmed.
In step 107, the data submission is cancelled, and in the specific implementation, the data submission cancellation request may be sent to the operation platform, and the client 11 is notified that the data D submission fails, that is, the order withdrawal is submitted to the certificate authority, and the user order failure is fed back.
A second embodiment of the present invention provides a method for verifying a data signature, which is described by taking a security trading system as an example, where the security trading system includes a client 11 and a server 12, and the client 11 and the server 12 are connected via a network, and the method specifically includes the following steps, as shown in fig. 2:
step 201: the client 11 performs signature processing on the data D.
Step 202: the client 11 sends data D for the transaction and a data signature S to the server 12.
Step 203: and the server 12 receives the data D and submits the data D to the operation platform after confirming that the data D is valid.
Step 204: after the server 12 receives the data D and the data signature S, the server performs step 203 and verifies the data signature S, if the step 205 is passed, otherwise, performs step 206.
Step 205: the server 12 does not perform any further processing and maintains the commit status for the data D.
Step 206: the commit of the data is cancelled.
In the second embodiment, the difference from the first embodiment is that the server 12 verifies the data signature S while confirming that the data D is valid, and the embodiment is that the server 12 confirms that the data D is valid in synchronization with the client 11 performing signature processing on the data D.
It can be known from the two embodiments that the key of the above-mentioned scheme is that the process of the server 12 receiving the data D sent by the client 11 and confirming whether the data D is valid or not and the process of the client 11 generating the data signature S, and the server 12 verifying the data signature S are performed synchronously, regardless of the scheme of the first embodiment or the scheme of the second embodiment, the key is that when the data signature D is successfully verified, the submitting state of the data D directly submitted to the operating platform without signature verification is maintained, wherein the time of successful verification of the data signature S is later than the starting time of submitting the data D to the operating platform.
In the following description of the beneficial effects brought by the above solutions, in the prior art, the time for the client 11 to prepare the data D for transaction is T1, the time for the client 11 to sign the data D is T2, the time for the server 12 to verify the data signature S is T3, and the time for the server 12 to confirm that the data D is valid is T4, so that the time required by the whole process from the start of preparing the data D by the client 11 to the final confirmation of the data D by the server 12 is T1+ T2+ T3+ T4. If the scheme of embodiment 1 is adopted, the time required for the whole process from the time when the client 11 starts to prepare the data D to the time when the final server 12 confirms that the data D is valid is T1+ T4. If the scheme of embodiment 2 is adopted, the time required for the whole process from the time when the client 11 starts to prepare the data D to the time when the final server 12 confirms that the data D is valid is T1+ T2+ T4. Of course, for other schemes, the time when the verification of the data signature S succeeds, i.e. the end time point of T3, is later than the start time of submitting the data D to the operating platform, i.e. the start time point of T4, from the time limit. Therefore, the time of the whole process of the scheme can be ensured to be less than T1+ T2+ T3+ T4, and the time for submitting data to an operation platform is shortened on the premise that the data security is ensured in the data signature verification process.
The time for submitting the data is determined to be valid when the data signature is successfully verified and is later than the initial time of the data submitting operation platform, so that the time for submitting the data to the operation platform is shortened on the premise that the data security is ensured in the data signature verification process.
A third embodiment of the present invention provides an apparatus for verifying a data signature, as shown in fig. 3, including:
a receiving module 301, configured to receive data and a data signature sent by a client;
a data confirmation module 302, configured to submit the data to an operation platform after confirming that the data is valid;
and the data verification module 303 is configured to verify the data signature, maintain the submission state of the data if the data signature is successfully verified, and cancel the submission of the data if the data signature is not successfully verified.
Further, the data verification module 303 is further configured to, after the data is determined to be valid, revoke the submission of the data if the data signature is not received within a predetermined time.
Further, the data confirmation module 302 is further configured to receive the data sent by the client and confirm that the data is valid while the client signs the data, or receive the data sent by the client after the client signs the data, and confirm the validity of the data while verifying the data signature.
Further, the receiving module 301 is further configured to receive data and a data packet containing the data and a data signature.
A fourth embodiment of the present invention provides a system for verifying a data signature, as shown in fig. 4, including:
a client 401, configured to send data and a data signature to a server;
and the server 402 is configured to receive the data and the data signature sent by the client, submit the data to the operation platform after the data is confirmed to be valid, verify the data signature, maintain the submission state of the data if the data signature verification is successful, and cancel the submission of the data if the data signature verification is not successful.
Further, the client 401 is further configured to send data and a data packet containing the data and a data signature to the server.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (10)
1. A method of data signature verification, comprising:
the server receives data and a data signature sent by the client;
after confirming that the data is valid, the server submits the data to an operation platform;
and the server verifies the data signature, if the data signature is successfully verified, the submission state of the data is maintained, and if not, the submission of the data is cancelled.
2. The method of claim 1, wherein after the data is validated, the submission of the data is revoked if the server does not receive a signature of the data within a predetermined time.
3. The method of claim 1, wherein the server validating the data is specifically:
the server receives the data sent by the client and confirms that the data is valid while the client signs the data;
or,
after the client signs the data, the server receives the data sent by the client, and the server verifies the data signature and confirms the validity of the data.
4. The method according to claim 1, wherein the step of the server receiving the data sent by the client and the data signature is specifically:
the server receives data and a data packet containing the data and a data signature.
5. An apparatus for data signature verification, comprising:
the receiving module is used for receiving the data and the data signature sent by the client;
the data confirmation module is used for confirming that the data is valid and then submitting the data to an operation platform;
and the data verification module is used for verifying the data signature, if the data signature is successfully verified, the submission state of the data is maintained, and otherwise, the submission of the data is cancelled.
6. The apparatus of claim 5, wherein the data validation module is further configured to revoke the submission of the data if a data signature is not received within a predetermined time after the data is validated.
7. The apparatus of claim 5, wherein the data confirmation module is further configured to receive the data sent by the client and confirm that the data is valid while the client signs the data, or receive the data sent by the client after the client signs the data, and confirm the validity of the data while verifying the data signature.
8. The apparatus of claim 5, wherein the receiving module is further configured to receive data and a data packet comprising the data and a data signature.
9. A system for data signature verification, comprising:
the client is used for sending data and a data signature to the server;
and the server is used for receiving the data and the data signature sent by the client, submitting the data to the operation platform after the data is confirmed to be valid, verifying the data signature, if the data signature is successfully verified, maintaining the submission state of the data, and if not, canceling the submission of the data.
10. The system of claim 9, wherein the client is further configured to send the data and a data packet containing the data and a data signature to the server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201010209178 CN101860548B (en) | 2010-06-17 | 2010-06-17 | Method, device and system for verifying data signature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201010209178 CN101860548B (en) | 2010-06-17 | 2010-06-17 | Method, device and system for verifying data signature |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101860548A true CN101860548A (en) | 2010-10-13 |
CN101860548B CN101860548B (en) | 2012-11-21 |
Family
ID=42946206
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 201010209178 Expired - Fee Related CN101860548B (en) | 2010-06-17 | 2010-06-17 | Method, device and system for verifying data signature |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101860548B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103647650A (en) * | 2013-12-18 | 2014-03-19 | 用友软件股份有限公司 | Rule definition based automatic signature/signature verification device and method |
CN103905384A (en) * | 2012-12-26 | 2014-07-02 | 北京握奇数据系统有限公司 | Embedded inter-terminal session handshake realization method based on security digital certificate |
CN103914329A (en) * | 2014-03-20 | 2014-07-09 | 北京京东尚科信息技术有限公司 | Program compiling method, device and system |
CN107851252A (en) * | 2015-05-26 | 2018-03-27 | 缇零网股份有限公司 | Purpose is obscured in transaction using encryption technology |
US11394560B2 (en) | 2015-02-09 | 2022-07-19 | Tzero Ip, Llc | Crypto integration platform |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1497485A (en) * | 2002-10-01 | 2004-05-19 | 株式会社Ntt都科摩 | Vertification and payment method, device and operation method of its system and its component |
CN1682490A (en) * | 2002-07-18 | 2005-10-12 | 伊奥里金纳尔公司 | System and method for electronic transmission, storage and retrieval of authenticated documents |
WO2010023779A1 (en) * | 2008-08-27 | 2010-03-04 | Gmoグローバルサイン株式会社 | Server certificate issuing system and person authentication method |
-
2010
- 2010-06-17 CN CN 201010209178 patent/CN101860548B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1682490A (en) * | 2002-07-18 | 2005-10-12 | 伊奥里金纳尔公司 | System and method for electronic transmission, storage and retrieval of authenticated documents |
CN1497485A (en) * | 2002-10-01 | 2004-05-19 | 株式会社Ntt都科摩 | Vertification and payment method, device and operation method of its system and its component |
WO2010023779A1 (en) * | 2008-08-27 | 2010-03-04 | Gmoグローバルサイン株式会社 | Server certificate issuing system and person authentication method |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905384A (en) * | 2012-12-26 | 2014-07-02 | 北京握奇数据系统有限公司 | Embedded inter-terminal session handshake realization method based on security digital certificate |
CN103905384B (en) * | 2012-12-26 | 2017-11-24 | 北京握奇数据系统有限公司 | The implementation method of session handshake between built-in terminal based on secure digital certificate |
CN103647650A (en) * | 2013-12-18 | 2014-03-19 | 用友软件股份有限公司 | Rule definition based automatic signature/signature verification device and method |
CN103647650B (en) * | 2013-12-18 | 2017-02-08 | 用友网络科技股份有限公司 | Rule definition based automatic signature/signature verification device and method |
CN103914329A (en) * | 2014-03-20 | 2014-07-09 | 北京京东尚科信息技术有限公司 | Program compiling method, device and system |
CN103914329B (en) * | 2014-03-20 | 2017-05-10 | 北京京东尚科信息技术有限公司 | Program compiling method and device |
US11394560B2 (en) | 2015-02-09 | 2022-07-19 | Tzero Ip, Llc | Crypto integration platform |
CN107851252A (en) * | 2015-05-26 | 2018-03-27 | 缇零网股份有限公司 | Purpose is obscured in transaction using encryption technology |
CN107851252B (en) * | 2015-05-26 | 2022-07-19 | 缇零知识产权有限责任公司 | Obfuscating intent in a transaction using encryption techniques |
Also Published As
Publication number | Publication date |
---|---|
CN101860548B (en) | 2012-11-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11514440B2 (en) | Method for issuing authentication information and blockchain-based server using the same | |
US9992189B2 (en) | Generation and validation of derived credentials | |
CN101848090B (en) | Authentication device and system and method using same for on-line identity authentication and transaction | |
CN110677376B (en) | Authentication method, related device and system and computer readable storage medium | |
KR102621116B1 (en) | Elecronic device and electronic payement method using id-based public key cryptography | |
US20170330180A1 (en) | Method for using and revoking authentication information and blockchain-based server using the same | |
TW201822072A (en) | Two-dimensional code processing method, device and system | |
US20140006247A1 (en) | System, device and method for the interaction of security information | |
US20120254041A1 (en) | One-time credit card numbers | |
CN101527634B (en) | System and method for binding account information with certificates | |
CN105184557B (en) | Payment authentication method and system | |
CN101561956A (en) | Method and system for information interaction | |
CN102956000A (en) | Method and device for payment intermediation transaction data processing and payment intermediation network system | |
KR20220123642A (en) | Methods and devices for automated digital certificate verification | |
CN115760082B (en) | Digital payment processing method, device, equipment, system and medium | |
CN111049806B (en) | Joint authority control method and device, electronic equipment and storage medium | |
CN101860548A (en) | Method, device and system for verifying data signature | |
JP2003150735A (en) | Digital certificate system | |
CN102693478A (en) | Trading method of bid security during bidding procedure and system thereof | |
CN101478547A (en) | Apparatus for trustable digital signature to intelligent cipher key and working method thereof | |
CN115423457A (en) | Cross-border financial payment settlement method and system based on block chain | |
CN112150158B (en) | Block chain transaction delivery verification method and device | |
CN108234133B (en) | Method and system for replacing key of digital currency wallet | |
CN110855442A (en) | PKI (public key infrastructure) technology-based inter-device certificate verification method | |
CN114462990A (en) | Method and device for secret-free payment based on digital currency |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: 100015 Beijing city Chaoyang District Dongzhimen West eight Street No. 2 room Wanhong Yan Dong Business Garden Patentee after: BEIJING WATCHDATA Co.,Ltd. Address before: 100015 Beijing city Chaoyang District Dongzhimen West eight Street No. 2 room Wanhong Yan Dong Business Garden Patentee before: BEIJING WATCH DATA SYSTEM Co.,Ltd. |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20121121 |