Movatterモバイル変換


[0]ホーム

URL:


CN1773994A - Method for realizing data safety storing business - Google Patents

Method for realizing data safety storing business
Download PDF

Info

Publication number
CN1773994A
CN1773994ACN 200510116982CN200510116982ACN1773994ACN 1773994 ACN1773994 ACN 1773994ACN 200510116982CN200510116982CN 200510116982CN 200510116982 ACN200510116982 ACN 200510116982ACN 1773994 ACN1773994 ACN 1773994A
Authority
CN
China
Prior art keywords
user
file
storage server
usb rod
network storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510116982
Other languages
Chinese (zh)
Other versions
CN100464549C (en
Inventor
沈军
陈珣
金华敏
庄一嵘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Research Institute China Telecom Co ltd
China Telecom Corp Ltd
Original Assignee
GUANGDONG TELECOMMUNICATION CO Ltd INST
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGDONG TELECOMMUNICATION CO Ltd INSTfiledCriticalGUANGDONG TELECOMMUNICATION CO Ltd INST
Priority to CNB2005101169821ApriorityCriticalpatent/CN100464549C/en
Publication of CN1773994ApublicationCriticalpatent/CN1773994A/en
Application grantedgrantedCritical
Publication of CN100464549CpublicationCriticalpatent/CN100464549C/en
Anticipated expirationlegal-statusCritical
Activelegal-statusCriticalCurrent

Links

Images

Landscapes

Abstract

A method for realizing service of data safe storage includes up-transmitting user data to network server after it is enciphered locally for not being stolen in courses of transmission and storage, deciphering file only by using user USB bar and by inputting USN bar protection password correctly, setting USB bar backup mechanism so USB bar can be restored by applying effective status certification when USB bar is lost or damaged.

Description

A kind of implementation method of data safety storing business
Technical field
The present invention relates to a kind of implementation method of data safety storing business, exactly, the data security that relates to a kind of file-level is stored in the implementation method of the new business of network system side, belongs to the communication network value-added service
Technical field.
Background technology
Developing rapidly and popularizing along with what the Internet and diverse network were used, individual and enterprise are more and more the schedule of personal information, client list, commercial activity, and other relevant information all stores on the network.In this process, how guaranteeing to obtain safely, easily data just becomes the focus that the user pays close attention to; Many users wish in office, family even oneself the data of going out can both have access to safely during the journey.
At present, there have been many Internet Service Provider ISP that the network storage service of file-level is provided to the user, by on network storage server, distributing certain memory space for the user, under the situation that network can reach, the data of user's access whenever and wherever possible oneself efficiently solve the convenience problem of data access.Though during the sign-on access network storage server,, must use " user name+password " to carry out the authentication authentication as present most of application systems.But a little less than the fail safe of this mode was highly brittle: the user name and password was easy to be stolen; And the user uses this authentication mode just must be at any time or usually remember complicated the user name and password, very sense inconvenience.In addition, these data mostly adopt expressly form when transmission and storage, do not pass through encryption, very easily stolen and cause the leakage of important information by the disabled user, make the user can't store the critical data of commercial affairs such as the production schedule, financial statement, client list, human resources list, occurrences in human life relievedly thereon, make professional popularization be obstructed; Key is the safety issue of storage, needs to be resolved hurrily.
Now, many encryption and decryption software piece that are used for file are arranged on the market, can carry out encryption to the file and the file of this machine storage, even lose or the hacker invades under the situation of main frame at subscriber's main station (as notebook computer etc.), even Xu Ke personnel have stolen file without permission, also can't declassified document, to know user's important information.But, in case after main frame was lost or encryption key loses, damages, the user just can't fetch the file of oneself; The hacker also can adopt the method for deletion encrypt file to destroy user data.Therefore, use the method for local file encryption and decryption software piece still can't solve the safety issue of storage fully reliably merely.How to solve the file-level data and just become the new problem that those skilled in the art pay close attention in the safe storage of network side.
Summary of the invention
In view of this, the objective of the invention is the network storage and two kinds of technology of file encryption are combined, a kind of implementation method of data safety storing business is provided, and this method is to encrypt at the enterprising line data of subscriber's main station, uploads and be stored in network storage server then.Because data were encrypted before being transferred to network storage server, even the assailant intercepts data in transmission course, also can't be decrypted these data; Simultaneously, because storage is at network side, even subscriber's main station is lost, user storage can not lost in the data of network storage server yet.So the present invention can overcome the simple use network storage or the existing problem of this machine file encryption-decryption, realize the safe storage of data.
In order to achieve the above object, the invention provides a kind of implementation method of data safety storing business, it is characterized in that: comprise the following steps: at least
(1) request for utilization: the system management end requires application to open " network security storage " professional user effective identity certificate, contact telephone number and required storage size is provided, through confirmation true and accept applications after, management end carries out initialization process, and the user obtains one and stored the general-purpose serial bus USB rod of personal information and corresponding USB rod protection password;
(2) connect network storage server: after client detected USB rod insertion main frame, the prompting user imported USB rod protection password; After the user correctly imported USB rod protection password, client read IP address, user name and the password of this user on network storage server of the network storage server of storing in the USB rod, is connected to network storage server then and carries out authentication; After checking is passed through, the memory space of user on network storage server is mapped as a virtual partition of this machine by CIFS (CIFS, Common Internet File System) agreement;
(3) file encryption is uploaded: when the user write virtual partition to file, client received this request, earlier file was encrypted, and by the CIFS agreement file after encrypting was uploaded to network storage server again;
(4) down transmitting file deciphering: when the user reads file in the virtual partition, client is intercepted and captured this request, earlier file is passed to subscriber's main station under network storage server, then file is decrypted, and then the file after will deciphering is shown to the user by the CIFS agreement;
(5) disconnect and being connected of network storage server: client detects the USB rod extract main frame after, just being connected of disconnection and network storage server, former virtual partition disappears from subscriber's main station;
(6) charge: the system management end adopts monthly payment or alternate manner to charge according to the size of user applies memory space.
Described method further comprises following one or more step:
(7) recovery of USB rod: information dropout in the USB rod or damage, and the user is not when this machine backup USB rod information, the system management end requires the user that effective identity certificate is provided, after empirical tests is true, management end is searched User Information Database according to the user identity passport NO., to obtain corresponding USB rod backup file, submit to the user then; After the user took backup file, the identity document number of importing oneself can carry out the recovery of USB rod as password;
(8) backup of network storage server: the system management end regularly uses tape library backup system that the file in the network storage server is backed up.
In the described step (1), after management end was accepted user applies, the initialization process operating procedure of carrying out comprised:
(11) on network storage server, create a user name and corresponding password is set, distribute the memory space of corresponding size then according to customer requirements, and the access rights that this memory space is set are read and write for only allowing this user;
(12) a USB rod is formatd, and the protection password of USB rod is set;
(13) call the interface function of USB rod, in the USB rod, generate user's master key;
(14) in the USB rod, write IP address, user name and the password of this user on network storage server of network storage server;
(15) information in the USB rod is backed up, and the effective identity certificate number of backup password for the user is set;
(16) in User Information Database, create a new user record, wherein comprise address name, effective identity certificate number, telephone number, the user name on network storage server, USB rod backup file.
In the described step (3), the operating procedure that client is encrypted file comprises:
(31) client generates session key by the mode of random number, with session key file is encrypted;
(32) client uses the user's master key in the USB rod that session key is encrypted, and the session key after will encrypting again is attached in the file of having encrypted.
In the described step (4), client comprises the operating procedure that the file that passes down is decrypted:
(41) client reads the encrypted session key that is attached in the file, uses the user's master key in the USB rod that session key is decrypted then;
(42) client is decrypted file with session key.
Described USB rod is based on USB interface on the personal computer, card reader equipment with certain memory space and plug and play, speed is fast, volume is little, easy to carry, can finish various encryption and decryption computings to data, at least comprise: Digital Signature Algorithm (DSA, digital signature algorithm), by Rivest, the RSA public key algorithm of Shamir and Adlernan three people invention, data symmetric encipherment algorithm (DES, dataencryption standard), Secure Hash Algorithm SHA-1 (secure hash algorithm), Message Digest 5 (MD5, message-digest algorithm); It is right that the IC chip that is provided with in the rod can produce 1024,768 or 512 long keys at least, and support right importing and the derivation of key, to satisfy various application.
The present invention is a kind of implementation method of data safety storing business, and this method has adopted following multiple measure effectively to guarantee the safety of user data in conjunction with the network storage and two kinds of technology of file encryption:
(1) user data uploads to network storage server again behind local cipher, can illegally not stolen when transmitting and store to guarantee user data, makes the user can use this business to carry out the strange land storage of critical data relievedly.
(2) user only holds the USB rod, and after correctly importing USB rod protection password, could be decrypted file.Even therefore uncommitted person find the USB rod also can't the decrypted user file.
(3) have USB rod back mechanism, make the user under the situation of loss of USB rod or damage, still can recover corresponding information.
(4) in the network storage server side tape library backup device is set, the schedule backup user data is guaranteed when meeting with abnormal conditions, also restore data fast;
Description of drawings
Fig. 1 is the operating process block diagram of the implementation method of a kind of data safety storing business of the present invention.
Fig. 2 is the principle schematic of file encryption.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
Referring to Fig. 1 and Fig. 2, the present invention is a kind of implementation method of data safety storing business, mainly carries out associative operation by system management end and client two parts, comprises the following steps:
(1) request for utilization: management end requires application to open " network security storage " professional user effective identity certificate, contact telephone number and required storage size is provided, through confirmation true and accept applications after, management end carries out initialization process, and the user obtains one and stored the USB rod of personal information and corresponding USB rod protection password; The operating procedure of the initialization process of management end comprises:
(11) on network storage server, create a user name, and corresponding password is set, distribute the memory space of corresponding size then according to customer requirements, and the access rights that this memory space is set are read and write for only allowing this user;
(12) a USB rod is formatd, and USB rod protection password is set;
(13) call the interface function of USB rod, in the USB rod, generate user's master key;
(14) in the USB rod, write IP address, user name and the password of user on network storage server of network storage server;
(15) information in the USB rod is backed up, the backup password is set to user's effective identity certificate number;
(16) in User Information Database, create a new user record, wherein comprise address name, effective identity certificate number, telephone number, the user name on network storage server, USB rod backup file.
(2) connect network storage server: after client detected USB rod insertion main frame, the prompting user imported USB rod protection password; After the user correctly imported USB rod protection password, client read IP address, user name and the password of this user on network storage server of the network storage server of storing in the USB rod, is connected to network storage server then and carries out authentication; After checking is passed through, the memory space of user on network storage server is mapped as a virtual partition of this machine by the CIFS agreement.
(3) file encryption is uploaded: when the user write virtual partition to file, client received this request, earlier file was encrypted, and by the CIFS agreement file after encrypting was uploaded to network storage server again;
Wherein to carry out the operating procedure of file encryption be (referring to shown in Figure 2) to client:
(31) client generates session key by the mode of random number, with session key file is encrypted;
(32) client uses the user's master key in the USB rod that session key is encrypted, and the session key after the encryption is attached in the file of having encrypted.
(4) down transmitting file deciphering: when the user reads file in the virtual partition, client is intercepted and captured this request, earlier file is passed to subscriber's main station under network storage server, then file is decrypted, and then show file after the deciphering to the user by the CIFS agreement;
Wherein client to the operating procedure that following transmitting file is decrypted is:
(41) client reads the encrypted session key that is attached in the file, uses the user's master key in the USB rod that session key is decrypted then;
(42) client is decrypted file with session key.
(5) disconnect and being connected of network storage server: client detects the USB rod extract main frame after, just being connected of disconnection and network storage server, former virtual partition disappears from subscriber's main station;
(6) charge: the management end system adopts monthly payment or alternate manner to charge according to the size of user applies memory space.
(7) recovery of USB rod: information dropout in the USB rod or damage, and the user is not when this machine backup USB rod information, management end requires the user that effective identity certificate is provided, after empirical tests is true, management end is searched User Information Database according to the user identity passport NO., to obtain corresponding USB rod backup file, submit to the user then; After the user took backup file, the identity document number of importing oneself can carry out the recovery of USB rod as password;
(8) backup of network storage server: management end regularly uses the tape library backup device that the file in the network storage server is backed up.

Claims (6)

CNB2005101169821A2005-10-282005-10-28Method for realizing data safety storing businessActiveCN100464549C (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CNB2005101169821ACN100464549C (en)2005-10-282005-10-28Method for realizing data safety storing business

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CNB2005101169821ACN100464549C (en)2005-10-282005-10-28Method for realizing data safety storing business

Publications (2)

Publication NumberPublication Date
CN1773994Atrue CN1773994A (en)2006-05-17
CN100464549C CN100464549C (en)2009-02-25

Family

ID=36760746

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CNB2005101169821AActiveCN100464549C (en)2005-10-282005-10-28Method for realizing data safety storing business

Country Status (1)

CountryLink
CN (1)CN100464549C (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101877246A (en)*2009-04-282010-11-03许燕U disk encryption method
CN102123143A (en)*2011-01-212011-07-13宁波市胜源技术转移有限公司Method for storing data in network safely
CN101291244B (en)*2007-04-162011-07-20深圳市维信联合科技有限公司Network security management method and system thereof
CN101398744B (en)*2007-09-262011-12-28新奥特硅谷视频技术有限责任公司Method and system for implementing network data process by utilizing virtual file system technology
CN101325610B (en)*2008-07-302011-12-28杭州华三通信技术有限公司Virtual tape library backup system and disk power supply control method
CN102594779A (en)*2011-01-052012-07-18中国移动通信集团公司User data processing method and device thereof
CN102638568A (en)*2012-03-022012-08-15深圳市朗科科技股份有限公司Cloud storage system and data management method thereof
CN102789555A (en)*2011-05-172012-11-21腾讯科技(深圳)有限公司Method and system for safely moving file
CN102833075A (en)*2012-09-052012-12-19北京市科学技术情报研究所Identity authentication and digital signature method based on three-layered overlapping type key management technology
CN103209179A (en)*2013-03-152013-07-17苏州九光信息科技有限公司Secure network storage method and secure network storage system
CN103605937A (en)*2012-12-112014-02-26深圳市证通电子股份有限公司Terminal device and safety display module thereof
CN104065680A (en)*2013-03-212014-09-24华为终端有限公司Information processing method and apparatus, information retrieval method and apparatus, user terminal and server
CN104333545A (en)*2014-10-262015-02-04重庆智韬信息技术中心Method for encrypting cloud storage file data
CN104333544A (en)*2014-10-262015-02-04重庆智韬信息技术中心Encryption method for data file based on mobile terminal
CN104363093A (en)*2014-10-262015-02-18重庆智韬信息技术中心Method for encrypting file data by dynamic authorization code
CN104426666A (en)*2013-09-062015-03-18镇江精英软件科技有限公司Method for realizing user information verification of management system by IC (integrated circuit) board
CN101647254B (en)*2007-03-162015-04-01西门子公司 Method and system for providing services to terminal devices
WO2015058537A1 (en)*2013-10-232015-04-30腾讯科技(深圳)有限公司Video channel management method and related device, and communication system
CN104615929A (en)*2013-11-042015-05-13安全地带株式会社Security key device for secure cloud services, and system and method of providing security cloud services
CN105357193A (en)*2015-10-302016-02-24深圳云聚汇数码有限公司Anti-blasting data storage method
CN105635055A (en)*2014-11-012016-06-01江苏威盾网络科技有限公司Cloud data safety usage method
CN105893281A (en)*2016-03-302016-08-24苏州美天网络科技有限公司Intelligent data storage system of computer
WO2016131330A1 (en)*2015-08-252016-08-25中兴通讯股份有限公司Method and terminal for controlling storage encryption
CN107749862A (en)*2017-11-232018-03-02爱国者安全科技(北京)有限公司A kind of data encryption centrally stored method, server, user terminal and system
CN110633172A (en)*2019-09-242019-12-31爱国者安全科技(北京)有限公司USB flash disk and data synchronization method thereof
CN111858153A (en)*2020-06-032020-10-30高榕科技(深圳)有限公司Data backup and recovery method of network storage device
CN116910781A (en)*2023-07-122023-10-20南京拓界信息技术有限公司Mobile phone backup data searching device based on background password verification

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7334124B2 (en)*2002-07-222008-02-19Vormetric, Inc.Logical access block processing protocol for transparent secure file storage
CN1302382C (en)*2003-06-132007-02-28联想(北京)有限公司Verification method based on storage medium private space of USB flash memory disc
CN100426719C (en)*2003-09-012008-10-15台均科技(深圳)有限公司Method of identification between user device and local client use or remote-network service
CN1558580B (en)*2004-02-032010-04-28胡祥义A network data safety protection method based on cryptography

Cited By (37)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101647254B (en)*2007-03-162015-04-01西门子公司 Method and system for providing services to terminal devices
CN101291244B (en)*2007-04-162011-07-20深圳市维信联合科技有限公司Network security management method and system thereof
CN101398744B (en)*2007-09-262011-12-28新奥特硅谷视频技术有限责任公司Method and system for implementing network data process by utilizing virtual file system technology
CN101325610B (en)*2008-07-302011-12-28杭州华三通信技术有限公司Virtual tape library backup system and disk power supply control method
CN101877246A (en)*2009-04-282010-11-03许燕U disk encryption method
CN102594779A (en)*2011-01-052012-07-18中国移动通信集团公司User data processing method and device thereof
CN102594779B (en)*2011-01-052016-03-02中国移动通信集团公司A kind of user data processing method and equipment thereof
CN102123143A (en)*2011-01-212011-07-13宁波市胜源技术转移有限公司Method for storing data in network safely
CN102123143B (en)*2011-01-212013-09-18宁波市胜源技术转移有限公司Method for storing data in network safely
CN102789555A (en)*2011-05-172012-11-21腾讯科技(深圳)有限公司Method and system for safely moving file
CN102789555B (en)*2011-05-172015-11-18腾讯科技(深圳)有限公司A kind of method and system of safety moving file
CN102638568A (en)*2012-03-022012-08-15深圳市朗科科技股份有限公司Cloud storage system and data management method thereof
CN102833075A (en)*2012-09-052012-12-19北京市科学技术情报研究所Identity authentication and digital signature method based on three-layered overlapping type key management technology
CN103605937A (en)*2012-12-112014-02-26深圳市证通电子股份有限公司Terminal device and safety display module thereof
CN103209179A (en)*2013-03-152013-07-17苏州九光信息科技有限公司Secure network storage method and secure network storage system
CN104065680B (en)*2013-03-212017-03-08华为终端有限公司Information processing method, search method, device, user terminal and server
CN104065680A (en)*2013-03-212014-09-24华为终端有限公司Information processing method and apparatus, information retrieval method and apparatus, user terminal and server
CN104426666A (en)*2013-09-062015-03-18镇江精英软件科技有限公司Method for realizing user information verification of management system by IC (integrated circuit) board
WO2015058537A1 (en)*2013-10-232015-04-30腾讯科技(深圳)有限公司Video channel management method and related device, and communication system
CN104615929A (en)*2013-11-042015-05-13安全地带株式会社Security key device for secure cloud services, and system and method of providing security cloud services
CN104333545A (en)*2014-10-262015-02-04重庆智韬信息技术中心Method for encrypting cloud storage file data
CN104333544A (en)*2014-10-262015-02-04重庆智韬信息技术中心Encryption method for data file based on mobile terminal
CN104363093B (en)*2014-10-262017-10-24重庆智韬信息技术中心The method encrypted by dynamic authorization code to file data
CN104333544B (en)*2014-10-262017-11-10重庆智韬信息技术中心Encryption method based on mobile terminal data file
CN104363093A (en)*2014-10-262015-02-18重庆智韬信息技术中心Method for encrypting file data by dynamic authorization code
CN104333545B (en)*2014-10-262017-07-14国网内蒙古东部电力有限公司信息通信分公司The method that cloud storage file data is encrypted
CN105635055A (en)*2014-11-012016-06-01江苏威盾网络科技有限公司Cloud data safety usage method
WO2016131330A1 (en)*2015-08-252016-08-25中兴通讯股份有限公司Method and terminal for controlling storage encryption
CN106487496A (en)*2015-08-252017-03-08中兴通讯股份有限公司A kind of method controlling storage encryption and terminal
CN105357193A (en)*2015-10-302016-02-24深圳云聚汇数码有限公司Anti-blasting data storage method
CN105893281A (en)*2016-03-302016-08-24苏州美天网络科技有限公司Intelligent data storage system of computer
CN107749862A (en)*2017-11-232018-03-02爱国者安全科技(北京)有限公司A kind of data encryption centrally stored method, server, user terminal and system
CN110633172A (en)*2019-09-242019-12-31爱国者安全科技(北京)有限公司USB flash disk and data synchronization method thereof
CN111858153A (en)*2020-06-032020-10-30高榕科技(深圳)有限公司Data backup and recovery method of network storage device
CN111858153B (en)*2020-06-032023-12-19深圳市西迪特科技有限公司Data backup and restore method for network storage device
CN116910781A (en)*2023-07-122023-10-20南京拓界信息技术有限公司Mobile phone backup data searching device based on background password verification
CN116910781B (en)*2023-07-122024-02-20南京市公安局Mobile phone backup data searching device based on background password verification

Also Published As

Publication numberPublication date
CN100464549C (en)2009-02-25

Similar Documents

PublicationPublication DateTitle
CN100464549C (en)Method for realizing data safety storing business
CN112134695B (en)Cloud platform management method and system based on quantum key distribution technology
CN106131048B (en)Non-trust remote transaction file safe storage system for block chain
KR102055116B1 (en)Data security service
EP2830282B1 (en)Storage method, system and apparatus
CN110519049A (en)A kind of cloud data protection system based on credible performing environment
CN105740725B (en)A kind of document protection method and system
CN112685786B (en)Financial data encryption and decryption method, system, equipment and storage medium
CN108809936B (en) A kind of intelligent mobile terminal identity verification method based on hybrid encryption algorithm and its implementation system
CN103546421A (en)Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system
US7970142B2 (en)System, method and apparatus for decrypting data stored on removable media
TWI476629B (en) Data security and security systems and methods
CN112583772B (en)Data acquisition and storage platform
CN110222809B (en)Information combination and encryption method of two-dimensional code and two-dimensional code encryption machine
CN112787996B (en)Password equipment management method and system
CN112989320B (en)User state management system and method for password equipment
CN114745115A (en) An information transmission method, device, computer equipment and storage medium
CN102761559B (en)Network security based on private data shares method and communication terminal
CN202495964U (en)Identity authentication system based on mobile terminal
WO2024088145A1 (en)Data processing method and apparatus, and program product, computer device and storage medium
CN116015646A (en) A hardware cryptographic module based on a domestic commercial cryptographic algorithm and its implementation method
CN115412236A (en)Method for key management and password calculation, encryption method and device
HuStudy of file encryption and decryption system using security key
CN110445756A (en)It can search for the implementation method of cryptographic audit log in cloud storage
CN118250079B (en) A method, device and system for secure transmission of multi-terminal application data

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C14Grant of patent or utility model
GR01Patent grant
ASSSuccession or assignment of patent right

Owner name:CHINA TELECOMMUNICATION STOCK CO., LTD.

Free format text:FORMER OWNER: CHINA TELECOMMUNICATION STOCK CO., LTD. GUANGDONG ACADEME

Effective date:20091030

C41Transfer of patent application or patent right or utility model
C56Change in the name or address of the patentee

Owner name:CHINA TELECOMMUNICATION STOCK CO., LTD. GUANGDONG

Free format text:FORMER NAME: GUANGDONG PROVINCE TELECOMMUNICATION CO., LTD. RESEARCH INSTITUTE

CP03Change of name, title or address

Address after:20, building 109, West Zhongshan Avenue, Tianhe District, Guangzhou, Guangdong

Patentee after:GUANGDONG RESEARCH INSTITUTE, CHINA TELECOM Co.,Ltd.

Address before:No. 109, Zhongshan Avenue, Tianhe District, Guangdong, Guangzhou

Patentee before:Guangdong Telecommunication Co.,Ltd. Institude

TR01Transfer of patent right

Effective date of registration:20091030

Address after:No. 31, Finance Street, Beijing, Xicheng District

Patentee after:CHINA TELECOM Corp.,Ltd.

Address before:20, building 109, West Zhongshan Avenue, Tianhe District, Guangzhou, Guangdong

Patentee before:GUANGDONG RESEARCH INSTITUTE, CHINA TELECOM Co.,Ltd.


[8]ページ先頭

©2009-2025 Movatter.jp