CN111277414A - Distributed public key generation method and device based on RSA algorithm and intelligent contract - Google Patents

Distributed public key generation method and device based on RSA algorithm and intelligent contract Download PDF

Info

Publication number
CN111277414A
CN111277414A CN202010052550.3A CN202010052550A CN111277414A CN 111277414 A CN111277414 A CN 111277414A CN 202010052550 A CN202010052550 A CN 202010052550A CN 111277414 A CN111277414 A CN 111277414A
Authority
CN
China
Prior art keywords
key
intelligent contract
public key
key generation
rsa algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010052550.3A
Other languages
Chinese (zh)
Other versions
CN111277414B (en
Inventor
吴蒙
孙悦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Posts and Telecommunications filed Critical Nanjing University of Posts and Telecommunications
Priority to CN202010052550.3A priority Critical patent/CN111277414B/en
Publication of CN111277414A publication Critical patent/CN111277414A/en
Application granted granted Critical
Publication of CN111277414B publication Critical patent/CN111277414B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a distributed public key generation method based on an RSA algorithm and an intelligent contract, wherein a block chain intelligent contract presets a triggering condition, meets the prefabricating condition and triggers the intelligent contract to execute; acquiring a trigger trader address, and calling a key generation unit by a key management unit of the intelligent contract to generate a public-private key pair by using a key generation algorithm according to the current system time, the trader address and the contract execution times as parameters; storing the address of the trader and the public key and the private key pair in an intelligent contract key storage unit; the intelligent contract key management unit outputs the public key of the key pair, and after the transaction is confirmed, the whole network can check the transaction result to obtain the public key information.

Description

Distributed public key generation method and device based on RSA algorithm and intelligent contract
Technical Field
The invention relates to a distributed public key generation method and device based on an RSA algorithm and an intelligent contract, and belongs to the field of Internet of things and block chain information security.
Background
The block chain is considered as the next generation core technology, is fused with the technology of the Internet of things, and has wide development prospect in the fields of intelligent logistics, medical treatment, industry and the like. The internet of things is a completely open environment, and faces various security threats, such as identity spoofing, data forgery and theft, malicious attacks on the environment of the internet of things such as illegal access, and possibly security threats caused by the self-generation of device technologies, such as abuse of the internet of things, unsafe application programs, unsafe underlying devices, and the like. In order to solve the security threat of the Internet of things, a set of secure key protection system is firstly established to provide the most basic protection for the security of the Internet of things.
The public key system is one of the most deeply studied and applied cryptosystems, and the RSA algorithm is the most typical and influential representative of the cryptosystems. From the earliest E-mail, electronic credit card system, network security protocol authentication, to the present various security or authentication fields such as vehicle management and cloud computing, the cryptographic algorithm can resist most malicious attack modes, and is therefore recommended as an industry standard for public key encryption.
The advent of blockchain technology has enabled and enabled new definitions for intelligent contracts. The contract encapsulates various scripts and algorithms and is a programmable embodiment of a block chain. The intelligent contract considers the network as a 'distributed computer', any node can upload and execute any application program, and the execution of the program can be guaranteed. The intelligent contract is a block chain feature, and is a unitized, reusable, and automatically executed script that runs on a block chain, and can implement a series of functions such as data processing and data management. At the time of deployment, the contract is compiled by the virtual machine into code and stored on the blockchain, and there is a corresponding storage mechanism. When the preset condition occurs, a trade is sent to the intelligent contract address, the whole network nodes execute the code compiled by the contract script, and the intelligent contract can form a system controlled by the program in any block chain data as an embedded type programmed contract.
Disclosure of Invention
The purpose of the invention is as follows: in order to overcome the defects of the prior art, the invention provides a distributed public key generation method based on an RSA algorithm and an intelligent contract, which is used for solving the information security problem of the Internet of things based on a block chain.
It is another object of the present invention to provide a distributed public key generation apparatus based on the RSA algorithm and the intelligent contract.
The technical scheme is as follows: in order to achieve the above object, the present invention provides a distributed public key generation method and device based on RSA algorithm and intelligent contract, so as to solve the information security problem of the internet of things based on a block chain.
In order to solve the problems, the technical scheme adopted by the invention is as follows: a distributed public key generating method and device based on RSA algorithm and intelligent contract is characterized in that the method comprises the following steps:
s1: triggering a block chain intelligent contract preset condition, meeting a prefabrication condition, and triggering an intelligent contract to execute;
s2: acquiring a transaction trigger address, and calling a key generation unit by a key management unit of the intelligent contract to generate a public key and a private key according to the current system time, the address of the transaction person and the contract execution times as parameters by a key generation algorithm;
s3: storing the public key, the private key and the address of the transaction trigger in an intelligent contract key storage unit;
s4: the intelligent contract key management unit outputs the public key of the key pair, and after the transaction is confirmed, the whole network can check the transaction result to obtain the public key information.
In the above scheme, the smart contract is composed of a key generation unit, a key storage unit, and a key management unit.
In the above scheme, the key generation unit generates the public key and the private key by using a classical RSA key algorithm.
Further, the large prime number in the RSA key generation algorithm is selected from any large prime number within a random number generated by calculating the HASH value through an encryption function Keccak-256 of an Ethern according to the parameters of system time, the address of a transaction trigger and the contract calling times. The large prime number within the random number in the algorithm is screened by an Eastothrix method.
In the above scheme, the key storage unit stores the public key and the private key in pair matching, and then stores the key pair and the address of the transactor in the system correspondingly.
Further, the public key and the private key are stored in a pair matching way, namely the public key and the private key are stored in a mapping way.
Further, the key pair and the transaction trigger address are stored in the system in a manner of mapping the key pair and the transaction trigger address in a mapping manner.
In the above scheme, the key management unit defaults that the key pair owner is a transaction trigger, the key management unit outputs the public key, and after the transaction is confirmed, the whole network can check the public key by inquiring the transaction.
Further, the key management unit determines the key pair owner with the trader identity.
Has the advantages that: compared with the prior art, the distributed public key generation method and device based on the RSA algorithm and the intelligent contract have the following advantages that:
1. the distributed public key generation method based on the RSA algorithm and the intelligent contract utilizes the advantages of a native decentralized technology and the advantage of the common key storage of the nodes in the Internet of things network to embed the key storage into the network composition nodes, and can provide better response performance and anti-jamming capability compared with the traditional centralized public key system.
2. The distributed public key generation method based on the RSA algorithm and the intelligent contract utilizes the distributed characteristic of the block chain, and compared with a traditional centralized public key system, the method can improve the updating efficiency of the secret key.
3. The distributed public key generation method and device based on the RSA algorithm and the intelligent contract promote the establishment of the key system of the Internet of things, the mutual communication among the nodes can encrypt information according to the public key provided by one party, and the private key can be obtained for decryption according to the address of a trader and the public key after the encrypted information is received, so that the safety of data transmission is improved.
4. A distributed public key generation method and device based on an RSA algorithm and an intelligent contract judge a key owner according to a transaction trigger address, and ensure that encrypted data is not decrypted and obtained by a malicious party.
Drawings
FIG. 1 is a flow chart of a distributed public key generation method based on RSA algorithm and intelligent contracts;
fig. 2 is a block diagram of a distributed public key generation apparatus based on the RSA algorithm and the intelligent contract.
Detailed Description
The embodiment of the invention provides a distributed public key generation method and device based on an RSA algorithm and an intelligent contract, which can provide a safe key protection system for Internet of things equipment based on a block chain, solve the security threat existing in the Internet of things to a certain extent and provide the most basic protection for the security of the Internet of things.
As shown in fig. 1, an embodiment of a distributed public key generation method based on RSA algorithm and intelligent contract includes:
101. acquiring a transaction trigger address, acquiring current system time and contract calling times, and calculating a HASH value by taking the transaction trigger address, the system time and the contract calling times as parameters through an encryption function Keccak-256 of an Ethern to generate a random number;
102. acquiring the generated random number, and acquiring prime numbers within the random number according to an Eastofiltonian method;
further, randomly selecting a first large prime number and a second large prime number;
103. acquiring a first large prime number and a second large prime number, and generating a public key and a private key through an RSA encryption algorithm;
104. acquiring a public key and a private key, and storing the public key and the private key in a mapping manner in a matching manner;
further, the address of the transaction trigger is obtained and is matched and stored with the stored key pair in a mapping mode;
105. and acquiring the public key, printing the public key after the transaction is confirmed, and acquiring the public key through a transaction result by the whole network.
The above is a detailed description of a distributed public key generation method based on an RSA algorithm and an intelligent contract, and a specific application scenario is described below as an application of the distributed public key generation method based on the RSA algorithm and the intelligent contract, where the application scenario includes:
(1) the transaction trigger initiates a transaction and the contract obtains the address of the transaction trigger.
(2) Acquiring the address of a transaction trigger, the current system time and the total contract calling times as parameters, and calculating a HASH value through Ether house (Keccak-256) to generate a random number;
(3) obtaining all prime numbers in the random number by using an Eastocent sieve method, and selecting two large prime numbers;
(4) generating a public key and a private key according to an RSA encryption algorithm by using two large prime numbers;
(5) the algorithm is as follows:
selecting two large prime numbers p and q;
calculating n ═ pq, and the euler function phi (n) ═ p-1 (q-1);
randomly selecting a positive integer e to satisfy the greatest common divisor GCD (e, phi (n)) of e and phi (n) as 1, wherein 1 < e < phi (n), and the public key is (e, n);
calculating a decryption key d so that the decryption key d meets ed ≡ 1(mod phi (n)), wherein d is more than 0 and less than phi (n), and the private key is (d, n);
(6) and (4) confirming the transaction, printing the public key, and checking the transaction result through the whole network to obtain the public key.
As shown in fig. 2, an embodiment of a distributed public key generation apparatus based on RSA algorithm and intelligent contract includes:
a key management unit 201, configured to obtain an address of a transaction trigger and trigger a key generation unit;
the key generation unit 202 is configured to generate a random number, select two arbitrary large prime numbers in the random number, generate a public key and private key pair according to the two large prime numbers, and trigger the key storage unit;
the key storage unit 203 is used for matching and storing the public key and the private key pair in a mapping manner, and then matching and storing the transaction trigger address and the key pair in a mapping manner;
and the key management unit 204 is configured to obtain the public key and print the output public key in the transaction result.
Therefore, in the Internet of things system in the open environment, the public key generation method based on the RSA algorithm and the intelligent contract can not only avoid the interference of malicious behaviors on the normal execution of the contract, but also solve the malicious threats to the Internet of things environment, such as data stealing, illegal access and the like.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (8)

1. A distributed public key generation method based on an RSA algorithm and an intelligent contract is characterized by comprising the following steps:
s1: presetting a trigger condition for the block chain intelligent contract, and triggering the intelligent contract to execute when the preset condition is met;
s2: acquiring a trigger trader address, and calling a key generation unit by a key management unit of the intelligent contract to generate a public-private key pair by using a key generation algorithm according to the current system time, the trader address and the contract execution times as parameters;
s3: storing the address of the trader and the public key and the private key pair in an intelligent contract key storage unit;
s4: the intelligent contract key management unit outputs the public key of the key pair, and after the transaction is confirmed, the whole network can check the transaction result to obtain the public key information.
2. A distributed public key generating device based on RSA algorithm and intelligent contract is characterized in that: the intelligent contract comprises a key generation unit, a key storage unit and a key management unit.
3. A distributed public key generation apparatus based on an RSA algorithm and an intelligent contract according to claim 2, characterized in that: the intelligent contract key generation unit generates a public key pair and a private key pair by adopting an RSA algorithm.
4. A distributed public key generation apparatus based on an RSA algorithm and an intelligent contract according to claim 3, characterized in that: the RSA key generation algorithm selects any large prime number within a random number generated by calculating a HASH value through an encryption function Keccak-256 of an Ethern according to system time, a transaction trigger address and contract calling times serving as parameters.
5. A distributed public key generation apparatus based on an RSA algorithm and an intelligent contract according to claim 4, characterized in that: the large prime number within the random number in the RSA key generation algorithm is screened by an Elationsttni method.
6. A distributed public key generation apparatus based on an RSA algorithm and an intelligent contract according to claim 2, characterized in that: the key storage unit is used for matching and storing the public key and the private key in a mapping manner, and then storing the key pair stored in the mapping manner and the transaction trigger address in the system in a mapping manner.
7. A distributed public key generation apparatus based on an RSA algorithm and an intelligent contract according to claim 2, characterized in that: the secret key management unit defaults that the secret key is a transaction trigger to the owner, the secret key management unit outputs the public key, and after the transaction is confirmed, the whole network checks the public key by inquiring a transaction result.
8. A distributed public key generation apparatus based on an RSA algorithm and an intelligent contract according to claim 7, characterized in that: the key management unit judges the owner of the key pair through the identity of the trader.
CN202010052550.3A 2020-01-17 2020-01-17 Distributed public key generation method and device based on RSA algorithm and intelligent contract Active CN111277414B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010052550.3A CN111277414B (en) 2020-01-17 2020-01-17 Distributed public key generation method and device based on RSA algorithm and intelligent contract

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010052550.3A CN111277414B (en) 2020-01-17 2020-01-17 Distributed public key generation method and device based on RSA algorithm and intelligent contract

Publications (2)

Publication Number Publication Date
CN111277414A true CN111277414A (en) 2020-06-12
CN111277414B CN111277414B (en) 2023-06-20

Family

ID=71001101

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010052550.3A Active CN111277414B (en) 2020-01-17 2020-01-17 Distributed public key generation method and device based on RSA algorithm and intelligent contract

Country Status (1)

Country Link
CN (1) CN111277414B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111736783A (en) * 2020-06-23 2020-10-02 湖南天河国云科技有限公司 Self-service printing method based on block chain
CN112437089A (en) * 2020-11-26 2021-03-02 交控科技股份有限公司 Train control system key management method and device based on block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008736A (en) * 2019-01-31 2019-07-12 阿里巴巴集团控股有限公司 The method and node, storage medium of secret protection are realized in block chain
CN110245506A (en) * 2019-05-30 2019-09-17 阿里巴巴集团控股有限公司 Intelligent contract administration method and device based on block chain, electronic equipment
CN110430039A (en) * 2019-07-19 2019-11-08 瑞纳智能设备股份有限公司 A kind of production management system and method based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008736A (en) * 2019-01-31 2019-07-12 阿里巴巴集团控股有限公司 The method and node, storage medium of secret protection are realized in block chain
CN110245506A (en) * 2019-05-30 2019-09-17 阿里巴巴集团控股有限公司 Intelligent contract administration method and device based on block chain, electronic equipment
CN110430039A (en) * 2019-07-19 2019-11-08 瑞纳智能设备股份有限公司 A kind of production management system and method based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111736783A (en) * 2020-06-23 2020-10-02 湖南天河国云科技有限公司 Self-service printing method based on block chain
CN112437089A (en) * 2020-11-26 2021-03-02 交控科技股份有限公司 Train control system key management method and device based on block chain

Also Published As

Publication number Publication date
CN111277414B (en) 2023-06-20

Similar Documents

Publication Publication Date Title
US10678525B2 (en) Secure machine executable code deployment and execution method and system
CN101479984B (en) Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks
JP2022033913A (en) Blockchain implemented method and system
USRE42762E1 (en) Device and method for authenticating user&#39;s access rights to resources
CN107302438B (en) Private key protection method, system and device based on key updating
US20100115260A1 (en) Universal secure token for obfuscation and tamper resistance
US9531540B2 (en) Secure token-based signature schemes using look-up tables
CN113301022B (en) Internet of things equipment identity security authentication method based on block chain and fog calculation
CN110505055B (en) External network access identity authentication method and system based on asymmetric key pool pair and key fob
Chow et al. Server-aided signatures verification secure against collusion attack
CN110601855B (en) Root certificate management method and device, electronic equipment and storage medium
CN111277414B (en) Distributed public key generation method and device based on RSA algorithm and intelligent contract
Hosen et al. SPTM-EC: A security and privacy-preserving task management in edge computing for IIoT
CN106657002A (en) Novel crash-proof base correlation time multi-password identity authentication method
Kvarda et al. Software implementation of secure firmware update in IoT concept
Mishra et al. MPoWS: Merged proof of ownership and storage for block level deduplication in cloud storage
CN109302425A (en) Identity identifying method and terminal device
CN107026729B (en) Method and device for transmitting software
CN115396443B (en) Time factor-based alliance chain consensus method, device, equipment and storage medium
CN116797227A (en) Method and system for secure exchange protection of client privacy information based on homomorphic encryption
Mishra et al. RCDSD: RSA based cross domain secure deduplication on cloud storage
CN111460463A (en) Electronic deposit certificate storage and notarization method, device, equipment and storage medium
CN111651740B (en) Trusted platform sharing system for distributed intelligent embedded system
CN114117471A (en) Confidential data management method, electronic device, storage medium, and program product
CN110086627B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and time stamp

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 210003 Gulou District, Jiangsu, Nanjing new model road, No. 66

Applicant after: NANJING University OF POSTS AND TELECOMMUNICATIONS

Address before: Yuen Road Qixia District of Nanjing City, Jiangsu Province, No. 9 210000

Applicant before: NANJING University OF POSTS AND TELECOMMUNICATIONS

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant