CN106302429A - A kind of communication encryption method - Google Patents

A kind of communication encryption method Download PDF

Info

Publication number
CN106302429A
CN106302429A CN201610650800.7A CN201610650800A CN106302429A CN 106302429 A CN106302429 A CN 106302429A CN 201610650800 A CN201610650800 A CN 201610650800A CN 106302429 A CN106302429 A CN 106302429A
Authority
CN
China
Prior art keywords
information
service end
client
communication interface
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610650800.7A
Other languages
Chinese (zh)
Other versions
CN106302429B (en
Inventor
陈宏亮
张伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Seal information technology (Shanghai) Co.,Ltd.
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201610650800.7A priority Critical patent/CN106302429B/en
Publication of CN106302429A publication Critical patent/CN106302429A/en
Application granted granted Critical
Publication of CN106302429B publication Critical patent/CN106302429B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a kind of communication encryption method, be applied to the service end certification to client, wherein, client is connected with service end;Communication encryption method comprises the following steps: step S1, client send the information of the communication interface that needs communicate to service end;The information of the communication interface received is encrypted by step S2, service end with presetting method, and the information of the communication interface after encryption is returned client;Step S3, client are communicated with service end by the information of communication interface after encryption, service end in communicating, receive encryption after communication interface information after be converted to the information of communication interface according to the inverse approach of presetting method.Having the beneficial effects that of its technical scheme, communicate between client with service end not only safety, and verifying speed is faster, overcomes and needs in prior art to verify client identity every time, makes the defect that server performance declines.

Description

A kind of communication encryption method
Technical field
The present invention relates to communication technical field, particularly relate to a kind of communication encryption method.
Background technology
Along with the high speed development of Internet technology, increasing smart machine can be accessed by Internet thus raw to people Living, work, learn to bring help, and on the other hand network security increasingly comes into one's own, existing smart machine is linked into clothes During business device, the connection request of smart machine can be authenticated by server, as certification accesses service by then this intelligence setting tool is standby The authority of device, thus improve the safety of server, but existing verification mode understands each time please of smart machine transmission Ask and will verify, therefore can take the substantial amounts of resource of server so that the hydraulic performance decline of server work, in turn result in intelligence and set The response speed of standby access server is slack-off.
Summary of the invention
The problems referred to above that there is the requests verification of smart machine for server in prior art, now provide one to be intended to Realize checking safety and the faster communication encryption method of verifying speed.
Concrete technical scheme is as follows:
A kind of communication encryption method, is applied to the service end certification to client, wherein,
Described client is connected with described service end;
Described communication encryption method comprises the following steps:
Step S1, described client send the information of the communication interface that needs communicate to described service end;
The information of the described communication interface received is encrypted by step S2, described service end with presetting method, and will encryption After communication interface information return described client;
Step S3, described client are communicated with described service end by the information of the communication interface after described encryption, described Service end is changed according to the inverse approach of described presetting method after receiving the information of the communication interface after described encryption in communication Information for described communication interface.
Preferably, in described step S1 before, further comprising the steps of:
Step S01, described client send a certification request being encrypted with the first predetermined key to described service end;
Step S02, described service end are decrypted with the second corresponding key after receiving the certification request of described encryption;
Certification request after deciphering is verified by step S03, described service end, step S1 as described in be verified and then perform, Such as checking not by then exiting.
Preferably, in described step S01, described certification request include encryption data bag, described encryption data bag include with The information of the communication interface that the described needs of described first key encryption communicate, and the institute with described first key encryption Stating the summary of the information of the communication interface that needs communicate, the summary of the information of the communication interface that described needs communicate leads to The information crossing the communication interface that a preset algorithm communicates according to described needs calculates acquisition.
Preferably, described service end provides a data base, in order to pre-save the numbering of described client and with described Described second key of numbering association;
In described step S02 further comprising the steps of:
Step S021, described service end are asked according to described certification, obtain described numbering and the institute of corresponding described client State encryption data bag;
Step S022, described service end according to described in be numbered in described data base described second obtained corresponding to described numbering Key;
Step S023, described service end are decrypted with encryption data bag described in described second secret key pair of acquisition, right to obtain The information of the communication interface that the described needs of client described in Ying Yu communicate, and the communication that described needs communicate connects The summary of the information of mouth.
Preferably, in described step S03, comprise the following steps:
The information of the communication interface that described needs communicate is carried out by step S031, described service end by described preset algorithm Calculate to obtain a digest value;
Step S032, the summary of the information of communication interface communicated by the described needs that described digest value and deciphering obtain enter Row compares, as more consistent in ratio, is verified, as less consistent, then and authentication failed.
Preferably, described preset algorithm is hashing algorithm.
Preferably, described presetting method includes:
Thering is provided a mapping relations table, the information of the interface that the described needs sent according to described client communicate generates one only The secret value of one, the information of the interface communicated by described needs and the described secret value of correspondence are saved into described mapping relations Table, using described secret value as encryption after communication interface information return described client.
Preferably, described service end starts timing, as timing then makes more than a Preset Time in time generating described secret value Described secret value lost efficacy.
Preferably, the information of described communication interface is URL address.
Preferably, described secret value is by obtaining random number as needing the information of interface that communicates described in secret key pair It is encrypted acquisition.
Technique scheme has the advantage that or beneficial effect: communicate between client with service end not only safety, and Verifying speed faster, overcomes and needs in prior art to verify client identity every time, make server performance decline Defect.
Accompanying drawing explanation
With reference to appended accompanying drawing, more fully to describe embodiments of the invention.But, appended accompanying drawing be merely to illustrate and Illustrate, be not intended that limitation of the scope of the invention.
Fig. 1 is the flow chart of the present invention a kind of communication encryption method embodiment;
Fig. 2 is in one communication encryption method embodiment of the present invention, about send certification request flow chart;
Fig. 3 is in one communication encryption method embodiment of the present invention, about the flow chart of the deciphering of certification request;
Fig. 4 is in one communication encryption method embodiment of the present invention, about the flow process verifying the certification request after deciphering Figure.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, those of ordinary skill in the art obtained on the premise of not making creative work all its His embodiment, broadly falls into the scope of protection of the invention.
It should be noted that in the case of not conflicting, the embodiment in the present invention and the feature in embodiment can phases Combination mutually.
The invention will be further described with specific embodiment below in conjunction with the accompanying drawings, but not as limiting to the invention.
The present invention includes a kind of communication encryption method.
The embodiment of a kind of communication encryption method, is applied to the service end certification to client, wherein,
Client is connected with service end;
As it is shown in figure 1, authentication authority method comprises the following steps:
Step S1, client send the information of the communication interface that needs communicate to service end;
The information of the communication interface received is encrypted by step S2, service end with presetting method, and by the communication after encryption The information of interface returns client;
Step S3, client are communicated with service end by the information of the communication interface after encryption, and service end connects in communication After receiving the information of the communication interface after encryption, inverse approach according to presetting method is converted to the information of communication interface.
When existing client and service end communicate, the identity of client can be recognized by usual service end every time Card, not only communication speed is slow, and can take the system resource of a large amount of service end, if in the case of client is more, Certification can make the response speed of service end slack-off frequently, makes service end hydraulic performance decline;
In technique scheme, communicate to quickly set up with service end, and make communication process the safest, client The information needing the communication interface of communication can be sent service end, service end is in the information receiving the communication interface needing communication After, by presetting method, the information of communication interface is encrypted, and the information of the communication interface after encryption is back to client End, client then communicates with service end foundation with service end according to the information of the communication interface after encryption, and now service end receives The information of the communication interface after the encryption that client sends, can be by the inverse approach of presetting method, leading to before being converted to encryption The information of letter interface, and then the operation of customer in response end;Wherein, the communication needing communication of the transmission of client is connect by service end The information of mouth is encrypted, and the process that can make communication is the safest, overcomes and needs in prior art every time client Identity is verified, makes the defect that server performance declines.
In one preferably embodiment, in step S1 before, as in figure 2 it is shown, further comprising the steps of:
Step S01, client send a certification request being encrypted with the first predetermined key to service end;
Step S02, service end are decrypted with the second corresponding key after receiving the certification request of encryption;
Certification request after deciphering is verified by step S03, service end, as being verified then execution step S1, such as checking not By then exiting.
Client is such as want to set up with service end to communicate under normal circumstances, and service end all can carry out all carrying out body to client Part checking;
In technique scheme, the method being authenticated the identity of client can send one especially by client to client Being asked to service end by the first secret certification to be encrypted, service end is after receiving this request, by the second secret key pair encryption Certification request is decrypted, and the certification request to deciphering is verified, the most then client sends to service end Need the communication information of the communication interface of communication, such as authentication failed, then it represents that client now does not has the power that service end communicates Limit.
In one preferably embodiment, in step S01, certification request includes encryption data bag, encryption data bag bag Include the information of the communication interface communicated with the needs of the first key encryption, and lead to the needs of the first key encryption The summary of information of the communication interface of letter, need the summary of the information of communication interface that communicates by a preset algorithm according to The information needing the communication interface communicated calculates and obtains.
Teaching in excellent embodiment a kind of, preset algorithm can be hashing algorithm.
In technique scheme, client can will need the communication interface of communication by the algorithm i.e. hashing algorithm preset Information encryption generates summary, and is encrypted by the information of the first secret key pair summary and the communication interface needing communication To form the encryption data bag in certification request.
In one preferably embodiment, service end provides a data base, in order to pre-save the numbering of client with And with the second key of associating of numbering;
As it is shown on figure 3, further comprising the steps of in step S02:
Step S021, service end are asked according to certification, obtain numbering and the encryption data bag of corresponding client;
Step S022, service end are according to being numbered in data base the second key obtained corresponding to numbering;
Step S023, service end are decrypted with the second secret key pair encryption data bag obtained, to obtain corresponding to client Need the information of the communication interface communicated, and need the summary of the information of the communication interface communicated.
In technique scheme, the numbering in the client preserved in service end and the second key, wherein in data base Client numbering and with numbering associate second secret will can be by client when service end is registered, the numbering submitted to And second key, the i.e. first key and the second key are same key;
Service end, after receiving the numbering that client sends, can be searched according to numbering in data base and number, with this, the associated Two key, be decrypted with the encryption data bag sent by the second secret key pair client thus obtain in encryption data bag right Should be in the information of the communication interface needing communication of client and the summary of the information of the communication interface communicated with needs.
In one preferably embodiment, in step S03, as shown in Figure 4, comprise the following steps:
The information needing the communication interface communicated is calculated to obtain one by step S031, service end by preset algorithm Digest value;
Step S032, the summary of the information of communication interface communicated by the needs that digest value and deciphering obtain compare, As more consistent in ratio, it is verified, as less consistent, then authentication failed.
In technique scheme, when the certification request sending client is authenticated, second will obtained can be passed through Secret key pair encryption data bag is decrypted, to obtain the first digest value corresponding to encryption data bag and the communication interface of client Information, and by hashing algorithm, the information of communication interface calculates to obtain the second digest value, and then makes a summary first Value compares with the second digest value, if ratio is more consistent, is verified, as inconsistent in checking, represents client now Do not access the authority of service end.
In one preferably embodiment, presetting method includes:
Thering is provided a mapping relations table, the information of the interface that the needs sent according to client communicate generates one and uniquely encrypts Value, it would be desirable to the information of the interface communicated and the secret value of correspondence are saved into mapping relations table, using secret value as encryption After communication interface information return client.
In one preferably embodiment, the secret value in technique scheme can be by obtaining random number as key The information needing the interface communicated is encrypted acquisition.
In technique scheme, service end in receive client send need communication communication interface information after, By predetermined encryption algorithm and hashing algorithm, the information of the communication interface to needing communication is encrypted with stochastic generation one encryption Value, is stored in this secret value in mapping relations table with the information needing the communication interface communicated, and secret value is back to visitor Family end, client is after receiving secret value, and by this secret value of return, now secret value is as the letter of the communication interface after encryption Breath, the secret value that service end sends according to client, in mapping relations list, finds the communication of the communication corresponding with secret value The information of interface, sets up with client and communicates.
In one preferably embodiment, service end starts timing in time generating secret value, as timing is preset more than one Time then makes secret value lose efficacy.
In technique scheme, by the secret value exceeding Preset Time was lost efficacy, such that it is able to release client and clothes The connection of business end, it is to avoid client takies the resource of service end for a long time.
In one preferably embodiment, the information of the communication interface in technique scheme can be URL address.
In a particular embodiment, when client needs to access service end, certification can be sent by client and ask, service End is asked after certification is passed through according to certification;
Client sends the information such as { " interface ": " http of the communication interface needing communication to service end: // Www.xxx.com/test1 " }, service end is in receiving { " interface ": " http that client sends: // Www.xxx.com/test1 " } after, can be by obtaining random number as secret key pair { " interface ": " http: // Www.xxx.com/test1 " } it is encrypted calculating, obtain corresponding to { " interface ": " http://www.xxx.com/ Test1 " } secret value GDFSS, service end is by { " interface ": " http://www.xxx.com/test1 " } and GDFSS is { " interface ": " http://www.xxx.com/GDFSS " } it is stored in mapping relations table, and by GDFSS Be back to client, client after receiving GDFSS, by GDFSS send to service end, service end according to GDFSS in mapping Relation list obtains { " interface ": " http://www.xxx/test1 corresponding with GDFSS " }, i.e. real with client Existing proper communication.
The foregoing is only preferred embodiment of the present invention, not thereby limit embodiments of the present invention and protection model Enclose, to those skilled in the art, it should can appreciate that done by all utilization description of the invention and diagramatic content Scheme obtained by equivalent and obvious change, all should be included in protection scope of the present invention.

Claims (10)

1. a communication encryption method, is applied to the service end certification to client, it is characterised in that
Described client is connected with described service end;
Described communication encryption method comprises the following steps:
Step S1, described client send the information of the communication interface that needs communicate to described service end;
The information of the described communication interface received is encrypted by step S2, described service end with presetting method, and will encryption After communication interface information return described client;
Step S3, described client are communicated with described service end by the information of the communication interface after described encryption, described Service end is changed according to the inverse approach of described presetting method after receiving the information of the communication interface after described encryption in communication Information for described communication interface.
Communication encryption method the most according to claim 1, it is characterised in that before in described step S1, also includes following Step:
Step S01, described client send a certification request being encrypted with the first predetermined key to described service end;
Step S02, described service end are decrypted with the second corresponding key after receiving the certification request of described encryption;
Certification request after deciphering is verified by step S03, described service end, step S1 as described in be verified and then perform, Such as checking not by then exiting.
Communication encryption method the most according to claim 2, it is characterised in that in described step S01, described certification request bag Including encryption data bag, described encryption data bag includes the communication interface communicated with the described needs of described first key encryption Information, and the summary of the information of communication interface communicated with the described needs of described first key encryption, described need The communication interface that the summary of the information of communication interface to be communicated is communicated according to described needs by a preset algorithm Information calculate obtain.
Communication encryption method the most according to claim 3, it is characterised in that described service end provides a data base, in order to The numbering pre-saving described client and described second key associated with described numbering;
In described step S02 further comprising the steps of:
Step S021, described service end are asked according to described certification, obtain described numbering and the institute of corresponding described client State encryption data bag;
Step S022, described service end according to described in be numbered in described data base described second obtained corresponding to described numbering Key;
Step S023, described service end are decrypted with encryption data bag described in described second secret key pair of acquisition, right to obtain The information of the communication interface that the described needs of client described in Ying Yu communicate, and the communication that described needs communicate connects The summary of the information of mouth.
Communication encryption method the most according to claim 3, it is characterised in that in described step S03, comprise the following steps:
The information of the communication interface that described needs communicate is carried out by step S031, described service end by described preset algorithm Calculate to obtain a digest value;
Step S032, the summary of the information of communication interface communicated by the described needs that described digest value and deciphering obtain enter Row compares, as more consistent in ratio, is verified, as less consistent, then and authentication failed.
6. according to the communication encryption method described in claim 3 or 5, it is characterised in that described preset algorithm is hashing algorithm.
Communication encryption method the most according to claim 3, it is characterised in that described presetting method includes:
Thering is provided a mapping relations table, the information of the interface that the described needs sent according to described client communicate generates one only The secret value of one, the information of the interface communicated by described needs and the described secret value of correspondence are saved into described mapping relations Table, using described secret value as encryption after communication interface information return described client.
Communication encryption method the most according to claim 7, it is characterised in that described service end is in time generating described secret value Start timing, timing more than a Preset Time then make as described in secret value lost efficacy.
Communication encryption method the most according to claim 1, it is characterised in that the information of described communication interface is URL address.
Communication encryption method the most according to claim 7, it is characterised in that described secret value is made by obtaining random number For needing the information of the interface communicated to be encrypted acquisition described in secret key pair.
CN201610650800.7A 2016-08-10 2016-08-10 Communication encryption method Active CN106302429B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610650800.7A CN106302429B (en) 2016-08-10 2016-08-10 Communication encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610650800.7A CN106302429B (en) 2016-08-10 2016-08-10 Communication encryption method

Publications (2)

Publication Number Publication Date
CN106302429A true CN106302429A (en) 2017-01-04
CN106302429B CN106302429B (en) 2020-01-10

Family

ID=57667798

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610650800.7A Active CN106302429B (en) 2016-08-10 2016-08-10 Communication encryption method

Country Status (1)

Country Link
CN (1) CN106302429B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107579964A (en) * 2017-08-25 2018-01-12 上海斐讯数据通信技术有限公司 Data transmission method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101453329A (en) * 2007-12-07 2009-06-10 北京闻言科技有限公司 Method for enhancing system security by pre-login
CN102487376A (en) * 2010-12-01 2012-06-06 金蝶软件(中国)有限公司 Enterprise resource planning system login method, device and system
CN102546579A (en) * 2010-12-31 2012-07-04 北大方正集团有限公司 Method, device and system used for providing system resources
US9374366B1 (en) * 2005-09-19 2016-06-21 Jpmorgan Chase Bank, N.A. System and method for anti-phishing authentication
CN105808990A (en) * 2016-02-23 2016-07-27 平安科技(深圳)有限公司 Method and device for controlling URL access on basis of IOS system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9374366B1 (en) * 2005-09-19 2016-06-21 Jpmorgan Chase Bank, N.A. System and method for anti-phishing authentication
CN101453329A (en) * 2007-12-07 2009-06-10 北京闻言科技有限公司 Method for enhancing system security by pre-login
CN102487376A (en) * 2010-12-01 2012-06-06 金蝶软件(中国)有限公司 Enterprise resource planning system login method, device and system
CN102546579A (en) * 2010-12-31 2012-07-04 北大方正集团有限公司 Method, device and system used for providing system resources
CN105808990A (en) * 2016-02-23 2016-07-27 平安科技(深圳)有限公司 Method and device for controlling URL access on basis of IOS system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107579964A (en) * 2017-08-25 2018-01-12 上海斐讯数据通信技术有限公司 Data transmission method and device

Also Published As

Publication number Publication date
CN106302429B (en) 2020-01-10

Similar Documents

Publication Publication Date Title
CN107426157B (en) Alliance chain authority control method based on digital certificate and CA authentication system
CN111083131B (en) Lightweight identity authentication method for power Internet of things sensing terminal
CN109040067B (en) Physical unclonable technology PUF-based user authentication device and authentication method
CN112272094B (en) Internet of things equipment identity authentication method, system and storage medium based on PUF (physical unclonable function) and CPK (compact public key) algorithm
CN104767731B (en) A kind of Restful move transactions system identity certification means of defence
CN101465735B (en) Network user identification verification method, server and client terminal
CN110099048B (en) Cloud storage method and equipment
CN104935568A (en) Interface authentication signature method facing cloud platform
CN106850207B (en) CA-free identity authentication method and system
CN103475666A (en) Internet of things resource digital signature authentication method
WO2015003503A1 (en) Network device, terminal device and information security improving method
CN105721153A (en) System and method for key exchange based on authentication information
DE102013203257A1 (en) Reading an attribute from an ID token
CN102025503A (en) Data security implementation method in cluster environment and high-security cluster
DE102009030019B3 (en) System and method for reliable authentication of a device
CN106060078A (en) User information encryption method, user registration method and user validation method applied to cloud platform
CN107172027A (en) Certificate management method, storage device, storage medium and device
WO2016109609A1 (en) System and method for providing authenticated communications from a remote device to a local device
CN105553667A (en) Dynamic password generating method
CN109218307A (en) A kind of method of client identity certification
CN107749854B (en) Single sign-on method and system based on client
CN107682321B (en) A kind of method and device of SDN controller cluster single-sign-on
CN113783867A (en) Request authentication method and terminal
CN113505353A (en) Authentication method, device, equipment and storage medium
CN105188057A (en) Method and system for enhancing network access authentication security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201119

Address after: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Jiji Intellectual Property Operation Co., Ltd

Address before: 201600 Shanghai city Songjiang District Sixian Road No. 3666

Patentee before: Phicomm (Shanghai) Co.,Ltd.

TR01 Transfer of patent right

Effective date of registration: 20201221

Address after: 8319 Yanshan Road, Bengbu City, Anhui Province

Patentee after: Bengbu Lichao Information Technology Co.,Ltd.

Address before: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee before: Hangzhou Jiji Intellectual Property Operation Co., Ltd

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210310

Address after: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee after: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Address before: 8319 Yanshan Road, Bengbu City, Anhui Province

Patentee before: Bengbu Lichao Information Technology Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210918

Address after: 200000 Room C, 18th floor, 1255 Xikang Road, Putuo District, Shanghai

Patentee after: Seal information technology (Shanghai) Co.,Ltd.

Address before: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee before: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

TR01 Transfer of patent right