CN101599959B - Identity-based anonymous mutual authentication method - Google Patents

Identity-based anonymous mutual authentication method Download PDF

Info

Publication number
CN101599959B
CN101599959B CN2009100232898A CN200910023289A CN101599959B CN 101599959 B CN101599959 B CN 101599959B CN 2009100232898 A CN2009100232898 A CN 2009100232898A CN 200910023289 A CN200910023289 A CN 200910023289A CN 101599959 B CN101599959 B CN 101599959B
Authority
CN
China
Prior art keywords
node
pid
field
tkm
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009100232898A
Other languages
Chinese (zh)
Other versions
CN101599959A (en
Inventor
李慧贤
庞辽军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haian Lianfa Zhangshi Yarn Dyed Co ltd
Northwestern Polytechnical University
Original Assignee
Northwestern Polytechnical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwestern Polytechnical University filed Critical Northwestern Polytechnical University
Priority to CN2009100232898A priority Critical patent/CN101599959B/en
Publication of CN101599959A publication Critical patent/CN101599959A/en
Application granted granted Critical
Publication of CN101599959B publication Critical patent/CN101599959B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an identity-based anonymous mutual authentication method, including the steps of node initialization, authentication activation, authentication request, authentication response, private key confirmation and the like. Random selection of pseudonym is adopted, the selected pseudonym is used for mutual authentication with other nodes, so that a network node does not need to distribute a pseudonym set in advance or safely store the pseudonym set; and meanwhile, the actual identity information of the node can not be obtained by tracking communication when the node is attacked, thus improving the security in network use process.

Description

Anonymous bidirectional authentication method based on identity
Technical field
The present invention relates to a kind of anonymous bidirectional authentication method, relate in particular to anonymous bidirectional authentication method based on identity.
Background technology
Confidentiality for sensitive nodes identity in the protecting network in safety certification; The anonymous bidirectional authentication has become a kind of important research means in the cryptography, and its advantage is to prevent that the assailant from utilizing the identity information of sensitive nodes to initiate denial of service various attacks such as (DoS).
Document " Anonymous handshakes in mobile ad hoc networks.2004 IEEE MilitaryCommunications Conference; 31 October--03 November 2004; Monterey, CA.p1193-1199 " discloses a kind of anonymous authentication method based on bilinear mappings that utilizes pseudo-name collection.This method was the pseudo-name set of each network node preassignment before carrying out anonymous authentication; When authentication, each node carries out authentication from the pseudo-name of the concentrated picked at random of pseudo-name of oneself with other node, hides its true identity through the method for the pseudo-name of continuous conversion.But the method is used the preallocated pseudo-name set of static state, has some safety defects, and in a single day the assailant invades certain node success, then can be based on the true identity of all communication nodes of communications records discovery in the past.In addition, this method autgmentability is not strong, needs the manual in advance pseudo-name collection that pre-sets, and each node needs safety to preserve the pseudo-name information of a plurality of nodes, and the safe storage burden is big, causes assailant's attack easily.
Summary of the invention
In order to overcome the deficiency of prior art owing to the poor stability that uses static pseudo-name collection to cause; The present invention provides a kind of anonymous bidirectional authentication method based on identity; Adopt the method for the pseudo-name of picked at random; Puppet name and other node through selected carry out two-way authentication, make network node the pseudo-name of preassignment to collect, and also need not the pseudo-name of safety preservation and collect; And after node is invaded, can not obtain its true identity information through following the tracks of method for communicating, can improve the fail safe in the network use.
The technical solution adopted for the present invention to solve the technical problems: a kind of anonymous bidirectional authentication method based on identity is characterized in may further comprise the steps:
(a) node initializing: the TTP of trusted third party sets up system parameters and is authentication both sides node: node A and Node B are distributed private key, and this system parameters comprises: the cyclic group (G on two q rank 1,+) and (G 2); P is G 1Generator; Make that e is G 1And G 2On bilinear transformation, i.e. e:G 1* G 1→ G 2The private key of the TTP of trusted third party picked at random oneself S TTP ∈ Z q * , Its corresponding PKI is Q TTP=S TTPP ∈ G 1H (x) representes an one-way hash function; The TTP of trusted third party is that node A and Node B distribute the method for private key to be: the identity ID of node A and Node B 1And ID 2Be respectively its PKI, its private key is respectively S 1=S TTPID 1And S 2=S TTPID 2
(b) authentication activates: send authentication by Node B and activate grouping to node A;
This authentication activates packet content and comprises: PID 2Field,
Wherein:
PID 2Field: the pseudo-identity that Node B is current, its computational methods are: Node B is temporary private that only is used for this authentication and key agreement process of picked at random at first b ∈ Z q * , Calculate PID then 2=bID 2
(c) authentication request: after node A received that authentication activates grouping, structure also sent authentication request and divides into groups to Node B;
This authentication request packet content comprises: PID 2Field, PID 1Field, TKM 1Field and MIC 1Field,
Wherein:
PID 2Field: its value activates the PID in dividing into groups with authentication 2Field value is identical;
PID 1Field: the pseudo-identity that node A is current, its computational methods are: node A is temporary private that only is used for this authentication and key agreement process of picked at random at first a ∈ Z q * , Calculate PID then 1=aID 1
TKM 1Field: the interim public key information that node A chooses, its computational methods are: TKM 1=aP;
MIC 1Field: the message integrity check sign indicating number that node A calculates all fields before this field, its computational methods are: MIC 1=h (PID 2, PID 1, TKM 1, e (PID 2, aS 1));
(d) authentication response: after Node B receives that authentication request is divided into groups, Node B checking PID 2Whether be the pseudo-identity of oneself choosing; If not, then abandon this grouping, otherwise, recomputate MIC 1=h (PID 2, PID 1, TKM 1, e (PID 1, bS 2)) and with the MIC that receives 1Compare; If unequal, then abandon this grouping, if equate, structure also sends authentication response and divides into groups to node A;
This authentication response packet content comprises: PID 1Field, TKM 2Field and MIC 2Field,
Wherein:
PID 1Field: the PID during its value is divided into groups with authentication request 1Field value is identical;
TKM 2Field: the interim public key information that Node B is chosen, its computational methods are: TKM 2=bP;
MIC 2Field: the message integrity check sign indicating number that Node B is calculated all fields before this field, its computational methods are: MIC 2=h (PID 1, TKM 1, TKM 2, e (PID 1, bS 2), bTKM 1);
(e) key confirmation: after node A received that authentication response divides into groups, node A verified PID 1Whether be the pseudo-identity of oneself choosing, if not, then abandon this grouping, otherwise, checking TKM 1Whether be the interim public key information of oneself choosing; If not, then abandon this grouping, otherwise, recomputate MIC 2=h (PID 1, TKM 1, TKM 2, e (PID 2, aS 1), aTKM 2) and with the MIC that receives 2Compare; If unequal, then abandon this grouping, if equate, structure also sends key confirmation and divides into groups to Node B; Node A accomplishes the anonymous authentication to Node B, and obtains master key MK=aTKM 2=abP;
This authentication response packet content comprises: PID 1Field, TKM 2Field and MIC 2Field,
Wherein:
PID 1Field: the PID during its value is divided into groups with authentication request 1Field value is identical;
TKM 2Field: the interim public key information that Node B is chosen, its computational methods are: TKM 2=bP;
MIC 2Field: the message integrity check sign indicating number that Node B is calculated all fields before this field, its computational methods are: MIC 2=h (PID 1, TKM 1, TKM 2, e (PID 1, bS 2), bTKM 1);
After Node B receives that key confirmation divides into groups, Node B checking TKM 2Whether be the interim public key information of oneself choosing; If not, then abandon this grouping, otherwise, recomputate MIC 3=h (TKM 2, bTKM 1) and with the MIC that receives 3Compare; If unequal, then abandon this grouping, if equate, anonymous bidirectional authentication and key agreement process success; Node B is accomplished the anonymous authentication to node A, and obtains master key MK=bTKM 1=abP.
The invention has the beneficial effects as follows: because the pseudo-name that adopts dynamic random to choose, each node need not the pseudo-name collection of prior preassignment, also need not safety and preserves pseudo-name information; Pseudo-name according to picked at random is carried out authentication, and the assailant can't obtain node true identity information through following the tracks of method for communicating, thereby has guaranteed the anonymity of node identity in the verification process, has improved the fail safe in the network use.
Below in conjunction with accompanying drawing and embodiment the present invention is elaborated.
Description of drawings
Accompanying drawing is the flow chart that the present invention is based on the anonymous bidirectional authentication method of identity.
Embodiment
With reference to accompanying drawing, present embodiment is chosen two network node A and the B in the network arbitrarily, supposes that A and B will carry out the anonymous bidirectional authentication.Concrete steps are following:
At first, the TTP of trusted third party need set up system parameters and be node A and Node B distribution private key, and this system parameters comprises: the cyclic group (G on two q rank 1,+) and (G 2); P is G 1Generator; Make that e is G 1And G 2On bilinear transformation, i.e. e:G 1* G 1→ G 2The private key of the TTP of trusted third party picked at random oneself S TTP ∈ Z q * , Its corresponding PKI is Q TTP=S TTPP ∈ G 1H (x) representes an one-way hash function.The TTP of trusted third party is that node A and Node B distribute the method for private key to be: the identity ID of node A and Node B 1And ID 2Be respectively its PKI, its private key is respectively S 1=S TTPID 1And S 2=S TTPID 2This step is only used when node initializing.Verification process is following:
The first step, the authentication of Node B structure activates divides into groups to send to node A.Authentication activates packet content and comprises:
PID 2
Wherein:
PID 2Field: the pseudo-identity that Node B is current, its computational methods are: B is temporary private that only is used for this authentication and key agreement process of picked at random at first b ∈ Z q * , Calculate PID then 2=bID 2
Second step, receive that authentication activate to be divided into groups after, node A structure also sends authentication request and divides into groups to Node B.The authentication request packet content comprises:
PID 2 PID 1 TKM 1 MIC 1
Wherein:
PID 2Field: its value activates the PID in dividing into groups with authentication 2Field value is identical;
PID 1Field: the pseudo-identity that node A is current, its computational methods are: A is temporary private that only is used for this authentication and key agreement process of picked at random at first a ∈ Z q * , Calculate PID then 1=aID 1
TKM 1Field: the interim public key information that node A chooses, its computational methods are: TKM 1=aP.
MIC 1Field: the message integrity check sign indicating number that node A calculates all fields before this field, its computational methods are: MIC 1=h (PID 2, PID 1, TKM 1, e (PID 2, aS 1)).
The 3rd step, receive that authentication request is divided into groups after, Node B checking PID 2Whether be the pseudo-identity of oneself choosing.If not, then abandon this grouping, otherwise, recomputate MIC 1=h (PID 2, PID 1, TKM 1, e (PID 1, bS 2)) and with the MIC that receives 1Compare.If unequal, then abandon this grouping, if equate, structure also sends authentication response and divides into groups to node A.The key request packet content comprises:
PID 1 ?TKM 1 ?TKM 2 ?MIC 2
Wherein:
PID 1Field: the PID during its value is divided into groups with authentication request 1Field value is identical;
TKM 2Field: the interim public key information that Node B is chosen, its computational methods are: TKM 2=bP.
MIC 2Field: the message integrity check sign indicating number that Node B is calculated all fields before this field, its computational methods are: MIC 2=h (PID 1, TKM 1, TKM 2, e (PID 1, bS 2), bTKM 1).
The 4th step, receive that authentication response divides into groups after, node A verifies PID 1Whether be the pseudo-identity of oneself choosing, if not, then abandon this grouping, otherwise, checking TKM 1Whether be the interim public key information of oneself choosing.If not, then abandon this grouping, otherwise, recomputate MIC 2=h (PID 1, TKM 1, TKM 2, e (PID 2, aS 1), aTKM 2) and with the MIC that receives 2Compare.If unequal, then abandon this grouping, if equate, structure also sends key confirmation and divides into groups to Node B.Node A accomplishes the anonymous authentication to B, and obtains master key MK=aTKM 2=abP.The key confirmation packet content comprises:
TKM 2 MIC 3
Wherein:
TKM 2Field: the TKM during its value is divided into groups with authentication response 2Field value is identical;
MIC 3Field: the completeness check code that node A calculates all fields before this field, i.e. MIC 3=h (TKM 2, aTKM 2).
The 5th step, receive that key confirmation divides into groups after, Node B checking TKM 2Whether be the interim public key information of oneself choosing.If not, then abandon this grouping, otherwise, recomputate MIC 3=h (TKM 2, bTKM 1) and with the MIC that receives 3Compare.If unequal, then abandon this grouping, if equate, anonymous bidirectional authentication and key agreement process success.Node B is accomplished the anonymous authentication to A, and obtains master key MK=bTKM 1=abP.
Through said process, node A and Node B have realized the anonymous bidirectional authentication, and consult master key MK, and this key can be used to encrypting messages or carry out the message integrity computing.
Wherein, ID 1It is the identity of node A; ID 2It is the identity of Node B; PID 1It is the pseudo-identity that node A chooses; PID 2It is the pseudo-identity that Node B is chosen; TKM 1It is the interim PKI that node A chooses; TKM 2It is the interim PKI that Node B is chosen; MIC is the message integrity check sign indicating number.

Claims (1)

1. anonymous bidirectional authentication method based on identity is characterized in that may further comprise the steps:
(a) node initializing: the TTP of trusted third party sets up system parameters and is node A and Node B distribution private key, and this system parameters comprises: the cyclic group (G on two q rank 1,+) and (G 2); P is G 1Generator; Make that e is G 1And G 2On bilinear transformation, i.e. e:G 1* G 1→ G 2The private key of the TTP of trusted third party picked at random oneself
Figure FSB00000792222200011
Its corresponding PKI is Q TTP=S TTPP ∈ G 1H (x) representes an one-way hash function; The TTP of trusted third party is that node A and Node B distribute the method for private key to be: the identity ID of node A and Node B 1And ID 2Be respectively its PKI, its private key is respectively S 1=S TTPID 1And S 2=S TTPID 2
(b) authentication activates: send authentication by Node B and activate grouping to node A;
This authentication activates packet content and comprises: PID 2Field,
Wherein:
PID 2Field: the pseudo-identity that Node B is current, its computational methods are: Node B is temporary private that only is used for this authentication and key agreement process of picked at random at first
Figure FSB00000792222200012
Calculate PID then 2=bID 2
(c) authentication request: after node A received that authentication activates grouping, structure also sent authentication request and divides into groups to Node B;
This authentication request packet content comprises: PID 2Field, PID 1Field, TKM 1Field and MIC 1Field,
Wherein:
PID 2Field: its value activates the PID in dividing into groups with authentication 2Field value is identical;
PID 1Field: the pseudo-identity that node A is current, its computational methods are: node A is temporary private that only is used for this authentication and key agreement process of picked at random at first
Figure FSB00000792222200013
Calculate PID then 1=aID 1
TKM 1Field: the interim public key information that node A chooses, its computational methods are: TKM 1=aP;
MIC 1Field: the message integrity check sign indicating number that node A calculates all fields before this field, its computational methods are: MIC 1=h (PID 2, PID 1, TKM 1, e (PID 2, aS 1));
(d) authentication response: after Node B receives that authentication request is divided into groups, Node B checking PID 2Whether be the pseudo-identity of oneself choosing; If not, then abandon this grouping, otherwise, recomputate MIC 1=h (PID 2, PID 1, TKM 1, e (PID 1, bS 2)) and with the MIC that receives 1Compare; If unequal, then abandon this grouping, if equate, structure also sends authentication response and divides into groups to node A;
This authentication response packet content comprises: PID 1Field, TKM 2Field and MIC 2Field,
Wherein:
PID 1Field: the PID during its value is divided into groups with authentication request 1Field value is identical;
TKM 2Field: the interim public key information that Node B is chosen, its computational methods are: TKM 2=bP;
MIC 2Field: the message integrity check sign indicating number that Node B is calculated all fields before this field, its computational methods are: MIC 2=h (PID 1, TKM 1, TKM 2, e (PID 1, bS 2), bTKM 1);
(e) key confirmation: after node A received that authentication response divides into groups, node A verified PID 1Whether be the pseudo-identity of oneself choosing, if not, then abandon this grouping, otherwise, checking TKM 1Whether be the interim public key information of oneself choosing; If not, then abandon this grouping, otherwise, recomputate MIC 2=h (PID 1, TKM 1, TKM 2, e (PID 2, aS 1), aTKM 2) and with the MIC that receives 2Compare; If unequal, then abandon this grouping, if equate, structure also sends key confirmation and divides into groups to Node B; Node A accomplishes the anonymous authentication to Node B, and obtains master key MK=aTKM 2=abP;
This key confirmation packet content comprises: TKM 2Field and MIC 3Field,
Wherein:
TKM 2Field: the TKM during its value is divided into groups with authentication response 2Field value is identical;
MIC 3Field: the completeness check code that node A calculates all fields before this field, i.e. MIC 3=h (TKM 2, aTKM 2);
After Node B receives that key confirmation divides into groups, Node B checking TKM 2Whether be the interim public key information of oneself choosing; If not, then abandon this grouping, otherwise, recomputate MIC 3=h (TKM 2, bTKM 1) and with the MIC that receives 3Compare; If unequal, then abandon this grouping, if equate, anonymous bidirectional authentication and key agreement process success; Node B is accomplished the anonymous authentication to node A, and obtains master key MK=bTKM 1=abP.
CN2009100232898A 2009-07-10 2009-07-10 Identity-based anonymous mutual authentication method Expired - Fee Related CN101599959B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100232898A CN101599959B (en) 2009-07-10 2009-07-10 Identity-based anonymous mutual authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100232898A CN101599959B (en) 2009-07-10 2009-07-10 Identity-based anonymous mutual authentication method

Publications (2)

Publication Number Publication Date
CN101599959A CN101599959A (en) 2009-12-09
CN101599959B true CN101599959B (en) 2012-07-25

Family

ID=41421206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100232898A Expired - Fee Related CN101599959B (en) 2009-07-10 2009-07-10 Identity-based anonymous mutual authentication method

Country Status (1)

Country Link
CN (1) CN101599959B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997688B (en) 2010-11-12 2013-02-06 西安西电捷通无线网络通信股份有限公司 Method and system for identifying anonymous entity
CN101984577B (en) * 2010-11-12 2013-05-01 西安西电捷通无线网络通信股份有限公司 Method and system for indentifying anonymous entities
CN103312499B (en) 2012-03-12 2018-07-03 西安西电捷通无线网络通信股份有限公司 A kind of identity identifying method and system
CN103312670A (en) 2012-03-12 2013-09-18 西安西电捷通无线网络通信股份有限公司 Authentication method and system
CN102594569B (en) * 2012-03-24 2014-10-08 成都大学 Certificateless key agreement method adopted during Tor anonymous channel building
CN103813312B (en) * 2014-03-06 2017-05-24 北京交通大学 Method for improving communication security in sensor network
CN104283899B (en) * 2014-10-30 2017-10-13 西安电子科技大学 User anonymity identity identifying method based on k assumed name set in wireless network
CN105141425B (en) * 2015-08-14 2019-03-08 重庆邮电大学 A kind of mutual authentication method for protecting identity based on chaotic maps
CN105429941B (en) * 2015-10-27 2018-07-27 西安电子科技大学 Multi-receiver identity anonymous label decryption method
CN105516201B (en) * 2016-01-20 2018-10-23 陕西师范大学 Lightweight anonymous authentication and cryptographic key negotiation method under a kind of environment of multi-server
CN106611134A (en) * 2016-06-06 2017-05-03 四川用联信息技术有限公司 Cloud data integrity verification method
CN108471402B (en) * 2018-02-11 2021-02-09 安徽师范大学 Internet of things identity authentication method based on joint secret number anonymity
CN108366069B (en) * 2018-02-26 2020-11-13 北京赛博兴安科技有限公司 Bidirectional authentication method and system
CN108632820B (en) * 2018-04-11 2021-09-14 上海电机学院 Identity-based anonymous authentication method in vehicle-mounted ad hoc network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145910A (en) * 2007-10-23 2008-03-19 西安西电捷通无线网络通信有限公司 An entity bidirectional authentication method and its system based on trustable third party
CN101159549A (en) * 2007-11-08 2008-04-09 西安西电捷通无线网络通信有限公司 Bidirectional access authentication method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145910A (en) * 2007-10-23 2008-03-19 西安西电捷通无线网络通信有限公司 An entity bidirectional authentication method and its system based on trustable third party
CN101159549A (en) * 2007-11-08 2008-04-09 西安西电捷通无线网络通信有限公司 Bidirectional access authentication method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李慧贤等.基于双线性变换的课证明安全的秘密共享方案.《通信学报》.2008,第29卷(第10期),45页-50页. *

Also Published As

Publication number Publication date
CN101599959A (en) 2009-12-09

Similar Documents

Publication Publication Date Title
CN101599959B (en) Identity-based anonymous mutual authentication method
CN105812369B (en) A kind of traceable anonymous authentication method based on elliptic curve
Li et al. Practical secure communication for integrating wireless sensor networks into the internet of things
Chen et al. On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol.
Wei et al. A privacy-preserving fog computing framework for vehicular crowdsensing networks
Zhang et al. Intelligent drone-assisted anonymous authentication and key agreement for 5G/B5G vehicular ad-hoc networks
CN103796199B (en) Authenticable asymmetrical group secret key negotiation method in mobile unbalanced network
CN108521401B (en) Method for enhancing safety of MANET network of unmanned aerial vehicle
CN104052608A (en) Certificate-free remote anonymous authentication method based on third party in cloud application
CN104168265A (en) Distributed hash table network-based anonymous communication method
CN101494862A (en) Access authentication method of wireless mesh network
CN102036235A (en) Device and method for identity authentication
Xie et al. Analysis and improvement of a privacy-aware handover authentication scheme for wireless network
Li et al. PROS: A privacy-preserving route-sharing service via vehicular fog computing
Deng et al. A new certificateless signature with enhanced security and aggregation version
Luo et al. A security communication model based on certificateless online/offline signcryption for Internet of Things
Hong et al. An efficient and secure attribute-based online/offline signature scheme for mobile crowdsensing
Wang et al. An ID-based online/offline signature scheme without random oracles for wireless sensor networks
CN101820626B (en) Wireless MESH network ID based partially blind signature method without credible PKG (Private Key Generator)
Pan et al. An efficient heterogeneous authenticated key agreement scheme for unmanned aerial vehicles
Liao et al. Towards location and trajectory privacy preservation in 5G vehicular social network
SIGNCRYPTION Scheme in manet
Xu et al. A cross-domain group authentication scheme for LTE-A based vehicular network
Shan Cryptanalysis of a certificateless hybrid signcryption scheme and a certificateless encryption scheme for Internet of Things
Guo et al. A secure official vehicle communication protocol for VANET

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: NORTHWESTERN POLYTECHNICAL UNIVERSITY

Effective date: 20141125

Owner name: HAIAN LIANFA ZHANGSHI YARN DYED CO., LTD.

Free format text: FORMER OWNER: NORTHWESTERN POLYTECHNICAL UNIVERSITY

Effective date: 20141125

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 710072 XI'AN, SHAANXI PROVINCE TO: 226600 NANTONG, JIANGSU PROVINCE

TR01 Transfer of patent right

Effective date of registration: 20141125

Address after: 226600, No. 162 South Ninghai Road, Haian Development Zone, Haian County, Jiangsu, Nantong

Patentee after: HAIAN LIANFA ZHANGSHI YARN DYED Co.,Ltd.

Patentee after: Northwestern Polytechnical University

Address before: 710072 Xi'an friendship West Road, Shaanxi, No. 127

Patentee before: Northwestern Polytechnical University

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120725