Movatterモバイル変換


[0]ホーム

URL:


CN101384052A - Authentication method, mobile terminal and server - Google Patents

Authentication method, mobile terminal and server
Download PDF

Info

Publication number
CN101384052A
CN101384052ACNA2008102243731ACN200810224373ACN101384052ACN 101384052 ACN101384052 ACN 101384052ACN A2008102243731 ACNA2008102243731 ACN A2008102243731ACN 200810224373 ACN200810224373 ACN 200810224373ACN 101384052 ACN101384052 ACN 101384052A
Authority
CN
China
Prior art keywords
information
server
authentication
mobile terminal
synthesizing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008102243731A
Other languages
Chinese (zh)
Other versions
CN101384052B (en
Inventor
冼广培
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Device Co Ltd
Original Assignee
Shenzhen Huawei Communication Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huawei Communication Technologies Co LtdfiledCriticalShenzhen Huawei Communication Technologies Co Ltd
Priority to CN2008102243731ApriorityCriticalpatent/CN101384052B/en
Publication of CN101384052ApublicationCriticalpatent/CN101384052A/en
Application grantedgrantedCritical
Publication of CN101384052BpublicationCriticalpatent/CN101384052B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Landscapes

Abstract

The invention provides an authentication method, a mobile terminal and server, wherein the mobile terminal comprises a key information loading unit used for receiving key information, an information synthesis unit used for synthesizing the key information to be authentication information according to a pre-defined algorithm and an authentication information output unit used for outputting the authentication information to the server. The embodiment of the invention has the following advantages that image information even audio information provided for the mobile terminal is used for authentication, and a plurality of different systems are simultaneously supported by only installing a service logical program on the basis of unchanging hardware; in addition, only pre-development cost is needed, therefore, the cost is low, and no hardware cost is needed so that the functions of the mobile terminal are more.

Description

Authentication method, mobile terminal and server
Technical Field
The present invention relates to mobile terminal technology, and in particular, to an authentication method, a mobile terminal, and a server.
Background
Many non-contact IC cards are touched in daily life, and users generally need to carry many cards according to different purposes, so that the carrying is troublesome and the cards are easy to lose. The non-contact IC card is also called as radio frequency card, which is composed of IC chip and induction antenna, and is packaged in a standard PVC card, the card is close to the surface of the reader-writer within a certain distance range (usually 5-10 mm), and the read-write operation of data is completed through the transmission of radio wave. An application system of Radio Frequency Identification (RFID) is mainly composed of a reader-writer and an RFID card, wherein the reader-writer is generally used as a computer terminal for realizing data reading-writing and storage of the RFID card and is composed of a control unit, a high-Frequency communication module and an antenna. The RFID card is a passive transponder, which is mainly composed of an integrated circuit chip and an external antenna, wherein the RFID chip is usually integrated with a radio frequency front end, a logic control circuit, a memory, and other circuits, and even the antennas are integrated on the same chip.
In the prior art, a radio frequency reader-writer sends a group of electromagnetic waves with fixed frequency to an IC card, an IC series resonance circuit is arranged in the card, the frequency of the IC series resonance circuit is the same as the frequency emitted by the reader-writer, and thus, under the excitation of the electromagnetic waves, an LC resonance circuit generates resonance, so that electric charges are arranged in a capacitor; the other end of the charge is connected with a one-way conductive electronic pump, the charge in the capacitor is transmitted to the other capacitor for storage, and when the accumulated charge reaches 2V, the capacitor can be used as a power supply to provide working voltage for other circuits, and data in the card is transmitted out or received by a reader-writer. Or after the RFID card enters a radio frequency field of the reader-writer, induced current obtained by an antenna of the RFID card is used as a power supply of the chip through a booster circuit, and digital signals obtained by the induced current with information through a radio frequency front-end circuit are sent to a logic control circuit for information processing; on one hand, the passive RFID card chip needs to obtain enough energy in an electromagnetic field generated by the antenna of the reader-writer when the circuit is started to work; on the other hand, the antenna determines a communication channel and a communication mode between the RFID card and the reader/writer.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art: users need to carry various non-contact cards, so that the use is inconvenient and the cards are easy to lose; moreover, when a plurality of contactless cards are overlapped, the contactless cards are easily unusable.
Disclosure of Invention
The invention aims to provide an authentication method, a mobile terminal and a server, which solve the problems that in the prior art, users need to carry various non-contact cards, so that the users are inconvenient to use and easy to lose; moreover, when a plurality of contactless cards are overlapped, the defects that the contactless cards cannot be used are easily caused.
An authenticated mobile terminal comprising: the key information loading unit is used for receiving key information; the information synthesis unit is used for synthesizing the key information into authentication information according to a preset algorithm; and the authentication information output unit is used for outputting the authentication information to the server.
An authentication server, comprising: an authentication information acquisition unit for acquiring authentication information from the mobile terminal; and the server authentication unit is used for extracting the key information in the authentication information and finishing the verification of the key information.
A method for realizing authentication of a mobile terminal comprises the following steps: receiving key information; synthesizing the key information into authentication information according to a predetermined algorithm; and outputting the authentication information to a server.
The embodiment of the invention has the advantages that the mobile terminal forms the key information into the authentication information and provides the authentication information to the server, and the non-contact card is not used for providing the authentication information; the mobile terminal which can be used for authentication and has richer functions is provided, and a user does not need to carry too many non-contact cards, so that the trouble caused by carrying various non-contact cards is avoided.
Drawings
Fig. 1 is a schematic diagram illustrating a process of performing authentication by a mobile terminal according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a mobile terminal with an authentication function according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a process of authenticating a mobile terminal by a server according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an authentication server according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical features and implementation effects of the present invention clearer, the technical solutions of the present invention will be described in detail with reference to the accompanying drawings and specific embodiments. In the embodiment provided by the invention, the interaction of the authentication information is realized between the mobile terminal and the server for authentication, and the existing wireless non-contact technology is replaced. Namely, firstly, the service logic is integrated in the mobile terminal, and then the data file containing the key information is placed in the mobile terminal or is acquired by the mobile terminal through the network. The mobile terminal service logic converts the key information into static or dynamic authentication information through a certain service logic algorithm, and the Server (Server) end acquires the authentication information through different methods and extracts the key information from the authentication information to perform authentication processing.
At the mobile terminal, business logic needs to be set firstly, and for the mobile terminal which is already on the market, programmed business logic can be provided for optimization, and patches are installed to save cost; for the mobile terminal which is not on the market, the service logic can be realized in an integrated chip and integrated into the mobile terminal.
On one side of the mobile terminal, the embodiment of the invention provides:
a method for realizing authentication of a mobile terminal comprises the following steps: receiving key information; synthesizing the key information into authentication information according to a predetermined algorithm; and outputting the authentication information to a server.
The mobile terminal which can be used for authentication and has richer functions is provided for the user, the user does not need to carry too many non-contact cards, and the trouble caused by carrying various non-contact cards is avoided.
As shown in fig. 1, taking the authentication information as image information as an example, the method includes the following steps:
andstep 201, the mobile terminal reads the data file stored with the key information, or the mobile terminal is connected with a network to obtain the data file stored with the key information.
If the mobile terminal opens the data service, the mobile terminal can select to connect with the network and then download the data file of the key information from the appointed website; meanwhile, certain safety measures are adopted in the pointed website, for example, a data file of key information can be downloaded only once, and the data file is connected by a Secure Socket Layer (SSL) and downloaded after logging in the designated website through an account password.
Step 202, when the user starts the authentication function of the mobile terminal, the key information in the data file is found or converted into matched image information; such as bar codes, two-dimensional codes, holographic pictures, etc.
The security and the sensitivity of key information are considered, and the key information can be converted into more complex image information; in order to avoid the image being printed, a dynamic image can be used for displaying, in the process that the key information is converted into the image information by the algorithm of the business logic, the difficulty of cracking the business logic or copying the image information is increased by combining parameters such as International Mobile Equipment Identity (IMEI) and time, and verification information is added.
If the dynamic image information is adopted, before the mobile terminal displays the image information corresponding to the key information, the appointed image is used as the starting information, and before the mobile terminal does not quit the current authentication process, the starting information and the dynamic image information are played circularly.
Andstep 203, receiving the response information of the server end, completing the current authentication process, or returning tostep 202 again.
Through the technical scheme provided by the embodiment of the invention, the mobile terminal forms the key information into the image information and provides the image information to the server, and the image information serving as the authentication information is not provided by using a non-contact card; the user does not need to carry too many non-contact cards, and the trouble caused by carrying various non-contact cards is avoided.
Those skilled in the art will appreciate that all or part of the steps in the method for implementing the above embodiments may be implemented by using a program to instruct related hardware, where the program may be stored in a storage medium readable by a mobile terminal, and when executed, the program includes the steps in the above method embodiments, and the storage medium includes, for example: SD card, memory chip, etc.
Corresponding to the above method, as shown in fig. 2, the present invention also provides an apparatus of a mobile terminal, including:
a keyinformation loading unit 101, configured to receive a data file containing the key information from a network through a port of a mobile terminal or the mobile terminal that has opened a data service.
And aninformation synthesizing unit 102, configured to synthesize the key information into the authentication information according to a predetermined algorithm.
An authenticationinformation output unit 103, configured to output authentication information. The authentication information at least comprises image information and audio information.
Wherein, theinformation synthesizing unit 102 may be:
an image information synthesizing unit 1021 for synthesizing the key information into final image information according to a predetermined image synthesis algorithm; the synthesized image information is sent as authentication information to the authenticationinformation output unit 103. For example, the atomic images stored in advance may be combined into a complete picture by an image combining algorithm to be used as a concrete representation of the image information.
It should be further explained that the above embodiments provide a method for performing authentication by loading key information with image information; the same is also true if the key information is loaded into the audio information, in which case theinformation synthesis unit 102 may also be:
an audio information synthesizing unit 1022 for synthesizing the key information into final audio information according to a predetermined audio synthesis algorithm; the synthesized audio information is sent to the speaker 1032 as authentication information.
A moving image editing unit 1023 for synthesizing the key information into a moving image as authentication information according to an existing predetermined moving image synthesis algorithm. The specific algorithm for synthesizing the moving picture can generally adopt the existing technology, such as the technology for making the moving picture in the GIF format.
The authenticationinformation output unit 103 may specifically be:
and a display screen 1031 for displaying the image information in the authentication information. Or,
a speaker 1032 is provided for outputting audio information, which is a particular form of authentication information.
An authentication information output port 1033 for outputting the authentication information in the form of a data stream or frame or data file.
The mobile terminal further includes:
and theserver authentication unit 104 is configured to extract the server key information in the server authentication information after acquiring the server authentication information of the server, and complete verification of the server key information.
And a feedback information receiving unit 114, configured to complete a current authentication process according to the feedback information from the server.
Through the technical scheme provided by the embodiment of the invention, the mobile terminal forms the key information into the authentication information and provides the authentication information to the server, and the image information serving as the authentication information is not provided by using a non-contact card; moreover, the output mode to the server is various, and the output mode can be output in a mode which can be sensed by the user, and also can be output in a digital mode, so that the user does not need to carry too many non-contact cards, and the trouble caused by carrying various non-contact cards is avoided.
At a Server (Server), an embodiment of the present invention provides a Server, as shown in fig. 4, including:
an authenticationinformation obtaining unit 701 configured to obtain authentication information from a mobile terminal;
and theserver authentication unit 703 is configured to extract key information in the authentication information, and complete verification of the key information.
The authenticationinformation obtaining unit 701 may specifically be:
and a camera 7011 for capturing image information on the display screen 1031 of the mobile terminal. Or,
a microphone 7012 for receiving audio information from the mobile terminal.
An authentication information input port 7013 is configured to obtain authentication information transmitted in a data stream or frame or data file according to a corresponding protocol.
The mobile terminal may further include:
and aserver authentication unit 703, configured to extract key information in the image information, and verify the correctness of the key information. The method specifically comprises the following steps:
if the mobile terminal supports authentication with audio information, theserver authentication unit 703 in the server should correspondingly be:
a server image authentication unit 7031, configured to, when the authentication information from the mobile terminal is image information, extract key information in the image information, and verify the key information.
Or,
the server audio authentication unit 7032 is configured to, when the authentication information from the mobile terminal is audio information, extract key information in the audio information and verify the key information.
The server may further include:
an image information verification unit 702 for verifying the captured image information.
And the prompting unit 704 is used for notifying the mobile terminal after the authentication is completed or when an error occurs in the authentication process.
As shown in fig. 3, corresponding to the device of the mobile terminal, the embodiment of the present invention provides an authentication method on the server side, still using image information as a specific implementation manner of the authentication information, and the specific flow includes:
and 301, the server acquires image information through the camera.
In different systems, the server can select cameras with different resolutions to acquire the image information of the mobile terminal according to the service scene and the preset conditions.
Step 302, judging whether the image information meets a preset condition, and turning to step 303 if the image information meets the condition;
if the condition is not met, the camera periodically collects the image information and performs the preliminary identification, so the process returns to step 301 to continue to collect the image information in the next period.
And 303, extracting key information contained in the image information through corresponding algorithm logic.
Because the requirements for the confidentiality degree of key information are different in different systems or different service scenes, the algorithm logic is a replaceable part and can be defined in different systems respectively according to needs.
And 304, judging whether the extracted key information is valid, if so, turning to thestep 305, otherwise, turning to thestep 301.
And 305, starting to authenticate the key information.
And step 306, finishing the current authentication, and giving prompt information to the mobile terminal in a mode of sound or a display screen and the like.
Those skilled in the art will appreciate that all or part of the steps in the method according to the above embodiments may be implemented by a program, which is stored in a server-readable storage medium and includes the steps of the above method embodiments when the program is executed, and the storage medium, such as: ROM/RAM, magnetic disk, optical disk, etc.
The technology provided by the invention is not only suitable for scenes with low safety requirements such as opening of door access, various certificates and common payment, but also provides different various embodiments aiming at scenes with high confidentiality requirements or related funds.
In the bidirectional authentication technology provided by the embodiment of the invention, on one hand, the information of the mobile terminal can be counterfeited or cracked; on the other hand, the Server can be counterfeited, and the mobile terminal also needs to verify the legality of the Server, so that the double authentication is used in the occasions with higher safety requirements, after the double authentication is adopted, the flow of processing by the camera at the side of the mobile terminal is increased, the image information of the mobile terminal is not only sent to the Server, but the interaction of data is increased between the mobile terminal and the Server; for example, the key information may be encrypted by a random number and then transmitted, and both sides may determine whether the encrypted key information matches each other by using the same algorithm, thereby determining whether the key information matches each other.
Still regard picture information as the particular implementation of authentication information; a mobile terminal as a mobile terminal, comprising:
firstly, business logic needs to be set, and the mobile terminal which is on the market can provide programmed business logic for optimization so as to save cost; for the mobile terminal which is not on the market, the service logic can be realized in an integrated chip and integrated into the mobile terminal.
And step 401, the mobile terminal reads the data file stored with the key information, or connects to a network to obtain the data file stored with the key information.
If the mobile terminal opens the data service, the mobile terminal can select to connect with the network and then download the data file of the key information from the appointed website; meanwhile, certain safety measures are adopted in the pointed website, for example, a data file of key information can be downloaded only once, the data file is connected by adopting a safety socket layer protocol layer, and the data file is downloaded after logging in the designated website through an account password.
Step 402, finding or converting the key information in the data file into matched first image information; such as bar codes, two-dimensional codes, holographic pictures, etc.
The conversion into more complex first image information is possible in view of the confidentiality and sensitivity of the key information. In order to avoid the image being printed, a dynamic image can be used for displaying, in the process that the key information is converted into the first image information by the algorithm of the business logic, the difficulty of cracking the business logic or copying the first image information is increased by combining parameters such as international mobile equipment identity codes, time and the like, and the verification information is increased.
If the dynamic first image information is adopted, before the mobile terminal displays the first image information corresponding to the key information, the appointed image is used as starting information, and before the mobile terminal does not quit the current authentication process, the starting information and the dynamic first image information are played circularly.
Step 403, if the server verifies the first image information from the mobile terminal, then the second image information should be provided at the server end;
therefore, the mobile terminal side collects the second image information provided by the server and converts the second image information into second data.
And 404, operating on the second data, such as verifying the correctness of the second data.
Step 405, if the authentication result shows that the authentication is successful, step 406 is executed, otherwise step 402 can be executed.
Step 406, prompting that the current authentication process is completed.
The process of processing the camera at the mobile phone side is added, data interaction is mainly increased, and information of the mobile terminal is not simply sent to the Server.
Those skilled in the art will appreciate that all or part of the steps in the method for implementing the above embodiments may be implemented by using a program to instruct related hardware, where the program may be stored in a storage medium readable by a mobile terminal, and when executed, the program includes the steps in the above method embodiments, and the storage medium includes, for example: SD card, memory chip, etc.
Correspondingly, a plurality of unit modules can be added in the mobile terminal to complete the dual authentication function.
And the first camera 106 is configured to capture second image information of the server.
And an image information analyzing unit 107, configured to analyze the second image information and extract second data therein.
In the dual-authentication embodiment, at the Server (Server) side, the embodiment provided by the invention comprises:
and step 501, the server acquires first image information through a camera.
In different systems, the server can select different unit modules to acquire the first image information of the mobile terminal according to the service scene and the preset conditions.
Step 502. if the first image information meets the condition, the step 503 is switched to;
if the condition is not met, the camera periodically acquires the first image information and performs the preliminary identification, so the process returns to step 501 to continue to acquire the first image information in the next period.
And 503, extracting key information contained in the first image information through corresponding algorithm logic.
Because the requirements for the confidentiality degree of key information are different in different systems or different service scenes, the algorithm logic is a replaceable part and can be defined in different systems respectively according to needs.
And step 504, judging whether the extracted key information is valid, if so, turning to step 505, otherwise, turning to step 501.
And 505, processing the key information, if the key information is correct, displaying the second image information at one end of the server, and waiting for the response of the mobile terminal to the second image information.
Step 506, starting and completing subsequent service processing; and prompting the mobile terminal for specific information about authentication.
The development of upper layer commands can be made on the basis of the embodiment.
Correspondingly, a plurality of unit modules can be added in the server to complete the double authentication function.
A server image synthesizing unit 705 for synthesizing the identity authentication information of the server into the second image information.
Between the mobile terminal and the server, authentication information containing key information of the mobile terminal and the server is respectively provided for the other party, and the authentication information is not provided by using a non-contact card; the mobile terminal and the server which can be used for authentication and have richer functions are provided; and the user does not need to carry too many non-contact cards, thus avoiding the trouble caused by carrying various non-contact cards.
Those skilled in the art will appreciate that all or part of the steps in the method according to the above embodiments may be implemented by a program, which is stored in a readable storage medium of a server and includes the steps of the above method embodiments when the program is executed, and the storage medium, such as: ROM/RAM, magnetic disk, optical disk, etc.
The embodiment of the invention has the advantages that the mobile terminal provides image information or even audio information for authentication, and can simultaneously support a plurality of different systems by only installing a program of business logic on the basis of not changing hardware; and only the early development cost is low, the hardware cost is avoided, and the functions of the mobile terminal are richer.
It should be noted that the above embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting, and all the values of the parameters can be adjusted according to the actual situation, and are within the scope of the claims. It will be understood by those skilled in the art that various modifications and equivalent arrangements may be made without departing from the spirit and scope of the present invention and shall be covered by the appended claims.

Claims (12)

CN2008102243731A2008-10-202008-10-20Authentication method, mobile terminal and serverActiveCN101384052B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN2008102243731ACN101384052B (en)2008-10-202008-10-20Authentication method, mobile terminal and server

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN2008102243731ACN101384052B (en)2008-10-202008-10-20Authentication method, mobile terminal and server

Publications (2)

Publication NumberPublication Date
CN101384052Atrue CN101384052A (en)2009-03-11
CN101384052B CN101384052B (en)2012-11-07

Family

ID=40463618

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN2008102243731AActiveCN101384052B (en)2008-10-202008-10-20Authentication method, mobile terminal and server

Country Status (1)

CountryLink
CN (1)CN101384052B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106302944A (en)*2015-05-122017-01-04联想移动通信科技有限公司A kind of method and device identifying mobile terminal
CN107872617A (en)*2016-09-262018-04-03松下电器(美国)知识产权公司 Shooting control method, shooting control system, and shooting control server
CN108305360A (en)*2018-01-162018-07-20厦门中控智慧信息技术有限公司Access control method and relevant apparatus
WO2020010832A1 (en)*2018-07-132020-01-16Oppo广东移动通信有限公司Data acquisition method, mobile terminal, electronic device, production line calibration system, readable storage medium and computer device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106302944A (en)*2015-05-122017-01-04联想移动通信科技有限公司A kind of method and device identifying mobile terminal
CN107872617A (en)*2016-09-262018-04-03松下电器(美国)知识产权公司 Shooting control method, shooting control system, and shooting control server
CN107872617B (en)*2016-09-262020-11-10松下电器(美国)知识产权公司Shooting control method, shooting control system and shooting control server
CN108305360A (en)*2018-01-162018-07-20厦门中控智慧信息技术有限公司Access control method and relevant apparatus
CN108305360B (en)*2018-01-162021-06-15厦门熵基科技有限公司Access control method and related device
WO2020010832A1 (en)*2018-07-132020-01-16Oppo广东移动通信有限公司Data acquisition method, mobile terminal, electronic device, production line calibration system, readable storage medium and computer device

Also Published As

Publication numberPublication date
CN101384052B (en)2012-11-07

Similar Documents

PublicationPublication DateTitle
US20160210491A9 (en)Systems and methods for secure wireless financial transactions
US20100082490A1 (en)Systems and methods for secure wireless transactions
CN101551840A (en)Camera module and authentication system
CN108564688A (en)The method and device and electronic equipment of authentication
US20180247299A1 (en)Watch with SIM and Web browser
CN101384052B (en)Authentication method, mobile terminal and server
CN106408788A (en)Certificate handling equipment
US20170352035A1 (en)Method for supplying data on a payment transaction, corresponding device and program
CN110084021A (en)Cabinet surface terminal, client, cabinet face data exchange method and system
KR101541600B1 (en)Method for Providing Transaction Linking One Time Password Based on Media Identification by using Code Image
CN111586657B (en)Near field communication method, device, storage medium and mobile terminal
RU2741751C1 (en)Method and system for activation of portable contactless payment device
KR20110121113A (en) Store order processing system and mobile terminal and merchant terminal for it
KR100982295B1 (en) New Transaction Processing Method and System Using Video Call and Recording Media
CN210274211U (en)Mobile ticket checking data terminal
KR20130038086A (en)Recording medium, method and system for financial transactions use of automated teller machine
JP4957396B2 (en) Surveillance camera system and method thereof
EP2290619A1 (en)Method and device for verifying secure documents
CN119070857B (en) Communication method and electronic device based on NFC
KR20190143345A (en)Tntegrated payment terminal apparatus and method of the same
US20220391876A1 (en)Payment system and apparatus
KR101760096B1 (en)Method for identifying Store by using Distinction of Pixel Matrix
KR101210264B1 (en)Method and System for Authenticating Code Image, Smart Phone
KR20120107043A (en)Method and system for providing non-facing certification by using camera, handheld device
KR102195456B1 (en)Method for Executing Function of Mobile Terminal by Using Facial Recognition

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C14Grant of patent or utility model
GR01Patent grant
TR01Transfer of patent right
TR01Transfer of patent right

Effective date of registration:20171106

Address after:Metro Songshan Lake high tech Industrial Development Zone, Guangdong Province, Dongguan City Road 523808 No. 2 South Factory (1) project B2 -5 production workshop

Patentee after:HUAWEI terminal (Dongguan) Co., Ltd.

Address before:518129 HUAWEI Technology Co., Ltd. Bantian HUAWEI base, Longgang District, Shenzhen, Guangdong

Patentee before:Huawei Device Co., Ltd.

CP01Change in the name or title of a patent holder
CP01Change in the name or title of a patent holder

Address after:523808 Southern Factory Building (Phase I) Project B2 Production Plant-5, New Town Avenue, Songshan Lake High-tech Industrial Development Zone, Dongguan City, Guangdong Province

Patentee after:Huawei Device Co., Ltd.

Address before:523808 Southern Factory Building (Phase I) Project B2 Production Plant-5, New Town Avenue, Songshan Lake High-tech Industrial Development Zone, Dongguan City, Guangdong Province

Patentee before:HUAWEI terminal (Dongguan) Co., Ltd.


[8]ページ先頭

©2009-2025 Movatter.jp