CN105260870A - Identity identification method, identity identification system and identity identification terminal - Google Patents
Identity identification method, identity identification system and identity identification terminal Download PDFInfo
- Publication number
- CN105260870A CN105260870A CN201510671640.XA CN201510671640A CN105260870A CN 105260870 A CN105260870 A CN 105260870A CN 201510671640 A CN201510671640 A CN 201510671640A CN 105260870 A CN105260870 A CN 105260870A
- Authority
- CN
- China
- Prior art keywords
- party terminal
- quick response
- response code
- information
- mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides an identity identification method, an identity identification system and an identity identification terminal, wherein the identity identification method comprises the steps of acquiring identity information and service information of a user; generating a two-dimensional code identification according to the identity information and the service information, storing the two-dimensional code to a local device; and transmitting the two-dimensional code identification to a user terminal according to the identity information, wherein the user terminal is used as a first-party terminal. The identity identification method, the identity identification system and the identity identification terminal provided by a technical solution have advantages of improving identity identification efficiency and preventing problems of error identification and impersonation. For a logistics enterprise, logistics efficiency is improved. For a visitor scene, convenience in identity identification is improved.
Description
Technical field
The present invention relates to field of terminal technology, in particular to a kind of auth method, a kind of authentication system and a kind of terminal.
Background technology
Along with the rise of internet electricity business platform, the also fast development of logistics express delivery industry, shopping at network gets more and more, be exactly thereupon the fast development of express delivery, it is very large that courier generally needs to distribute package quantity for one day, and verification mode is generally that addressee signs for, if addressee cannot get express delivery immediately, usual company or residential quarter can be set up and be withheld a little, first a little sign for by withholding, and then addressee goes to withhold again and a little takes parcel.
So just there is two problems: a problem is wrong neck, because the reason of bearing the same name, possible mistake has taken other people parcel of same name, and courier cannot Timeliness coverage, only verify mobile phone tail number, but general courier is a lot of due to the parcel distributed, and can ignore this link; Another problem is false claiming, has some lawless persons to falsely claim as one's own parcel, as long as know the name of addressee, just can receive parcel, and courier can not judge the true and false of signature; Also has a kind of situation; when addressee cannot go to take parcel in person time; usually colleague or friend can be entrusted to remove the addressee that helps; this situation is for the identity more cannot verifying addressee courier; when there is parcel false claiming or losing; courier needs the loss compensating client, and the loss of more couriers of loss is larger.
In addition, the safety management of some enterprise campus or office building is stricter, visitor needs register information or needs receiver to come in person to connect, visitor is just allowed to enter Office Area, if visitor is many, or garden or office building larger, work efficiency can be affected because authentication efficiency is low.
Therefore, how fast effectively correct checking party identity information becomes technical matters urgently to be resolved hurrily.
Summary of the invention
The present invention just based on above-mentioned technical matters one of at least, propose a kind of new authentication scheme, by generating Quick Response Code mark according to the identity information of user and business information, and be sent to terminal corresponding to identity information using Quick Response Code mark as the foundation of authentication, improve the efficiency of authentication, avoid misdeeming the problem of assuming another's name, for loglstics enterprise, improve logistic efficiency, for visitor's scene, improve the convenience of authentication.
In view of this, the present invention proposes a kind of auth method, comprising: the identity information and the business information that obtain user; Generate Quick Response Code mark according to described identity information and business information, and described Quick Response Code mark is stored in this locality; According to described identity information, described Quick Response Code mark is sent to user terminal, described user terminal is as first party terminal.
In this technical scheme, by generating Quick Response Code mark according to the identity information of user and business information, and be sent to terminal corresponding to identity information using Quick Response Code mark as the foundation of authentication, improve the efficiency of authentication, avoid misdeeming the problem of assuming another's name, for loglstics enterprise, improve logistic efficiency, for visitor's scene, improve the convenience of authentication.
Wherein, identity information comprises the name of user, telephone number and address etc., and business information comprises business tine, as got express delivery, visiting time and visiting object etc.
In technique scheme, preferably, also comprise: obtain the checking mark that second party terminal sends; Judge that the described Quick Response Code whether described checking mark preserves with this locality is marking matched; When judging that described checking mark and the local described Quick Response Code preserved are marking matched, determine to be proved to be successful.
In this technical scheme, the Quick Response Code preserved by checking mark and this locality second party terminal sent is identified and mates, and improves efficiency and the reliability of authentication, improves the experience of user simultaneously.
In technique scheme, preferably, also comprise: judge described checking mark and the local described Quick Response Code preserved identify do not mate time, described checking mark is sent to described first party terminal, verifies for described first party terminal; Judge whether to obtain the instruction of described first party terminal to described checking identity validation; When judging to obtain the instruction of described first party terminal to described checking identity validation, determine to be proved to be successful.
In this technical scheme, if there is the problem verified and do not pass through, then server needs Quick Response Code mark to send to first party terminal, carried out again judging by first party terminal user and confirm, when first party terminal user confirms to be proved to be successful, server is proved to be successful to second party terminal feedback, if further ensure Quick Response Code mark when there is mistake, and still can identity verification information rapidly.
In technique scheme, preferably, when judging not obtain the instruction of described first party terminal to described checking identity validation, to give the alarm information to described first party terminal.
In this technical scheme, by when for obtaining the instruction to checking identity validation of first party terminal, give the alarm information, ensure that the property safety of user further.
In this technical scheme, at least one in described alarm sounds information acoustics information, optics information and vibration prompting information.
In this technical scheme, prompt messages is sent by user's used terminal, and in conjunction with the function of terminal own, the prompting mode prompting user rs authentication mark comprising several terminals such as audio warning, flashlamp flicker, terminal vibrations conventional identifies.
According to a second aspect of the invention, also proposed a kind of authentication system, comprising: acquiring unit, for obtaining identity information and the business information of user; Generation unit, for generating Quick Response Code mark according to described identity information and business information, and is stored in this locality by described Quick Response Code mark; Transmitting element, for described Quick Response Code mark being sent to user terminal according to described identity information, described user terminal is as first party terminal.
In this technical scheme, by generating Quick Response Code mark according to the identity information of user and business information, and be sent to terminal corresponding to identity information using Quick Response Code mark as the foundation of authentication, improve the efficiency of authentication, avoid misdeeming the problem of assuming another's name, for loglstics enterprise, improve logistic efficiency, for visitor's scene, improve the convenience of authentication.
Wherein, identity information comprises the name of user, telephone number and address etc., and business information comprises business tine, as got express delivery, visiting time and visiting object etc.
In technique scheme, preferably, described acquiring unit also for: obtain the checking mark that second party terminal sends; Described authentication system also comprises: judging unit, marking matched for judging the described Quick Response Code whether described checking mark preserves with this locality; Determining unit, for when judging that described checking mark and the local described Quick Response Code preserved are marking matched, determines to be proved to be successful.In this technical scheme, take touch command as medium, open call and/or open APP, starting consistency operation simultaneously, find relevant with/application program businessman to conversation number in database and same category information, complete authentication.
In this technical scheme, the Quick Response Code preserved by checking mark and this locality second party terminal sent is identified and mates, and improves efficiency and the reliability of authentication, improves the experience of user simultaneously.
In technique scheme, preferably, described transmitting element also for: judge described checking mark and the local described Quick Response Code preserved identify do not mate time, described checking mark is sent to described first party terminal, verifies for described first party terminal; Described judging unit also for: judge whether to obtain the instruction of described first party terminal to described checking identity validation; Described determining unit also for: when judging to obtain the instruction of described first party terminal to described checking identity validation, determine to be proved to be successful.
In this technical scheme, if there is the problem verified and do not pass through, then server needs Quick Response Code mark to send to first party terminal, carried out again judging by first party terminal user and confirm, when first party terminal user confirms to be proved to be successful, server is proved to be successful to second party terminal feedback, if further ensure Quick Response Code mark when there is mistake, and still can identity verification information rapidly.
In technique scheme, preferably, described transmitting element also for: when judging not obtain the instruction of described first party terminal to described checking identity validation, to give the alarm information to described first party terminal.
In this technical scheme, by when for obtaining the instruction to checking identity validation of first party terminal, give the alarm information, ensure that the property safety of user further.
According to a third aspect of the invention we, also proposed a kind of terminal, comprising: the authentication system described in above-mentioned any one technical scheme.
In this technical scheme, by generating Quick Response Code mark according to the identity information of user and business information, and be sent to terminal corresponding to identity information using Quick Response Code mark as the foundation of authentication, improve the efficiency of authentication, avoid misdeeming the problem of assuming another's name, for loglstics enterprise, improve logistic efficiency, for visitor's scene, improve the convenience of authentication.
Accompanying drawing explanation
Fig. 1 shows the schematic flow diagram of auth method according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram of authentication system according to an embodiment of the invention;
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 4 shows the schematic diagram of authentication scheme according to an embodiment of the invention.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the schematic flow diagram of auth method according to an embodiment of the invention.
As shown in Figure 1, auth method according to an embodiment of the invention, comprising: step 102, obtains identity information and the business information of user; Step 104, generates Quick Response Code mark according to described identity information and business information, and described Quick Response Code mark is stored in this locality; Step 106, according to described identity information, described Quick Response Code mark is sent to user terminal, described user terminal is as first party terminal.
In this technical scheme, by generating Quick Response Code mark according to the identity information of user and business information, and be sent to terminal corresponding to identity information using Quick Response Code mark as the foundation of authentication, improve the efficiency of authentication, avoid misdeeming the problem of assuming another's name, for loglstics enterprise, improve logistic efficiency, for visitor's scene, improve the convenience of authentication.
Wherein, identity information comprises the name of user, telephone number and address etc., and business information comprises business tine, as got express delivery, visiting time and visiting object etc.
In technique scheme, preferably, also comprise: obtain the checking mark that second party terminal sends; Judge that the described Quick Response Code whether described checking mark preserves with this locality is marking matched; When judging that described checking mark and the local described Quick Response Code preserved are marking matched, determine to be proved to be successful.
In this technical scheme, the Quick Response Code preserved by checking mark and this locality second party terminal sent is identified and mates, and improves efficiency and the reliability of authentication, improves the experience of user simultaneously.
In technique scheme, preferably, also comprise: judge described checking mark and the local described Quick Response Code preserved identify do not mate time, described checking mark is sent to described first party terminal, verifies for described first party terminal; Judge whether to obtain the instruction of described first party terminal to described checking identity validation; When judging to obtain the instruction of described first party terminal to described checking identity validation, determine to be proved to be successful.
In this technical scheme, if there is the problem verified and do not pass through, then server needs Quick Response Code mark to send to first party terminal, carried out again judging by first party terminal user and confirm, when first party terminal user confirms to be proved to be successful, server is proved to be successful to second party terminal feedback, if further ensure Quick Response Code mark when there is mistake, and still can identity verification information rapidly.
In technique scheme, preferably, when judging not obtain the instruction of described first party terminal to described checking identity validation, to give the alarm information to described first party terminal.
In this technical scheme, by when for obtaining the instruction to checking identity validation of first party terminal, give the alarm information, ensure that the property safety of user further.
In this technical scheme, at least one in described alarm sounds information acoustics information, optics information and vibration prompting information.
In this technical scheme, prompt messages is sent by user's used terminal, and in conjunction with the function of terminal own, the prompting mode prompting user rs authentication mark comprising several terminals such as audio warning, flashlamp flicker, terminal vibrations conventional identifies.
Fig. 2 shows the schematic block diagram of authentication system according to an embodiment of the invention.
As shown in Figure 2, authentication system 200 according to an embodiment of the invention, comprising: acquiring unit 202, for obtaining identity information and the business information of user; Generation unit 204, for generating Quick Response Code mark according to described identity information and business information, and is stored in this locality by described Quick Response Code mark; Transmitting element 206, for described Quick Response Code mark being sent to user terminal according to described identity information, described user terminal is as first party terminal.
In this technical scheme, by generating Quick Response Code mark according to the identity information of user and business information, and be sent to terminal corresponding to identity information using Quick Response Code mark as the foundation of authentication, improve the efficiency of authentication, avoid misdeeming the problem of assuming another's name, for loglstics enterprise, improve logistic efficiency, for visitor's scene, improve the convenience of authentication.
Wherein, identity information comprises the name of user, telephone number and address etc., and business information comprises business tine, as got express delivery, visiting time and visiting object etc.
In technique scheme, preferably, described acquiring unit 202 also for: obtain the checking mark that second party terminal sends; Described authentication system 200 also comprises: judging unit 208, marking matched for judging the described Quick Response Code whether described checking mark preserves with this locality; Determining unit 210, for when judging that described checking mark and the local described Quick Response Code preserved are marking matched, determines to be proved to be successful.
In this technical scheme, take touch command as medium, open call and/or open APP, starting consistency operation simultaneously, find relevant with/application program businessman to conversation number in database and same category information, complete authentication.
In this technical scheme, the Quick Response Code preserved by checking mark and this locality second party terminal sent is identified and mates, and improves efficiency and the reliability of authentication, improves the experience of user simultaneously.
In technique scheme, preferably, described transmitting element 206 also for: judge described checking mark and the local described Quick Response Code preserved identify do not mate time, described checking mark is sent to described first party terminal, verifies for described first party terminal; Described judging unit 208 also for: judge whether to obtain the instruction of described first party terminal to described checking identity validation; Described determining unit 210 also for: when judging to obtain the instruction of described first party terminal to described checking identity validation, determine to be proved to be successful.
In this technical scheme, if there is the problem verified and do not pass through, then server needs Quick Response Code mark to send to first party terminal, carried out again judging by first party terminal user and confirm, when first party terminal user confirms to be proved to be successful, server is proved to be successful to second party terminal feedback, if further ensure Quick Response Code mark when there is mistake, and still can identity verification information rapidly.
In technique scheme, preferably, described transmitting element 206 also for: when judging not obtain the instruction of described first party terminal to described checking identity validation, to give the alarm information to described first party terminal.
In this technical scheme, by when for obtaining the instruction to checking identity validation of first party terminal, give the alarm information, ensure that the property safety of user further.
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention.
As shown in Figure 3, terminal 300 according to an embodiment of the invention, comprising: the authentication system 200 described in above-mentioned any one technical scheme.
Fig. 4 shows the schematic diagram of authentication scheme according to an embodiment of the invention.
As shown in Figure 4, authentication scheme according to an embodiment of the invention, manager's terminal is after the identity information obtaining user and business information, be converted into Quick Response Code identify and be sent to the first party terminal corresponding with identity information, as Quick Response Code mark is forwarded to second party terminal by first party terminal, to entrust it on behalf of identity verification, when checking mark sends to manager's terminal to verify by second party terminal, first manager's terminal verifies the local Quick Response Code mark that whether there is coupling, if exist, then business information corresponding for Quick Response Code mark is recalled, to verify that second party terminal has the authority performing above-mentioned business information, if do not exist, then resolve the identity information in checking mark and business information, and according to identity information, checking mark is sent to first party terminal, to ask first party terminal authentication.
Consider the technical matters of the how fast effectively correct checking party identity information proposed in correlation technique, the present invention proposes a kind of new authentication scheme, by generating Quick Response Code mark according to the identity information of user and business information, and be sent to terminal corresponding to identity information using Quick Response Code mark as the foundation of authentication, improve the efficiency of authentication, avoid misdeeming the problem of assuming another's name, for loglstics enterprise, improve logistic efficiency, for visitor's scene, improve the convenience of authentication.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. an auth method, is characterized in that, comprising:
Obtain identity information and the business information of user;
Generate Quick Response Code mark according to described identity information and business information, and described Quick Response Code mark is stored in this locality;
According to described identity information, described Quick Response Code mark is sent to user terminal, described user terminal is as first party terminal.
2. auth method according to claim 1, is characterized in that, also comprises:
Obtain the checking mark that second party terminal sends;
Judge that the described Quick Response Code whether described checking mark preserves with this locality is marking matched;
When judging that described checking mark and the local described Quick Response Code preserved are marking matched, determine to be proved to be successful.
3. auth method according to claim 2, is characterized in that, also comprises:
Judge described checking mark and the local described Quick Response Code preserved identify do not mate time, described checking mark is sent to described first party terminal, verifies for described first party terminal;
Judge whether to obtain the instruction of described first party terminal to described checking identity validation;
When judging to obtain the instruction of described first party terminal to described checking identity validation, determine to be proved to be successful.
4. the auth method according to Claims 2 or 3, is characterized in that, also comprises:
When judging not obtain the instruction of described first party terminal to described checking identity validation, to give the alarm information to described first party terminal.
5. auth method according to claim 4, is characterized in that, at least one in described alarm sounds information acoustics information, optics information and vibration prompting information.
6. an authentication system, is characterized in that, comprising:
Acquiring unit, for obtaining identity information and the business information of user;
Generation unit, for generating Quick Response Code mark according to described identity information and business information, and is stored in this locality by described Quick Response Code mark;
Transmitting element, for described Quick Response Code mark being sent to user terminal according to described identity information, described user terminal is as first party terminal.
7. authentication system according to claim 6, is characterized in that,
Described acquiring unit also for: obtain the checking mark that second party terminal sends;
Described authentication system also comprises:
Judging unit, marking matched for judging the described Quick Response Code whether described checking mark preserves with this locality;
Determining unit, for when judging that described checking mark and the local described Quick Response Code preserved are marking matched, determines to be proved to be successful.
8. authentication system according to claim 7, is characterized in that,
Described transmitting element also for: judge described checking mark and the local described Quick Response Code preserved identify do not mate time, described checking mark is sent to described first party terminal, verifies for described first party terminal;
Described judging unit also for: judge whether to obtain the instruction of described first party terminal to described checking identity validation;
Described determining unit also for: when judging to obtain the instruction of described first party terminal to described checking identity validation, determine to be proved to be successful.
9. the authentication system according to claim 7 or 8, is characterized in that,
Described transmitting element also for: when judging not obtain the instruction of described first party terminal to described checking identity validation, to give the alarm information to described first party terminal.
10. a terminal, is characterized in that, comprising: the authentication system according to any one of claim 6 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510671640.XA CN105260870A (en) | 2015-10-12 | 2015-10-16 | Identity identification method, identity identification system and identity identification terminal |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2015106574220 | 2015-10-12 | ||
CN201510657422 | 2015-10-12 | ||
CN201510671640.XA CN105260870A (en) | 2015-10-12 | 2015-10-16 | Identity identification method, identity identification system and identity identification terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105260870A true CN105260870A (en) | 2016-01-20 |
Family
ID=55100549
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510671640.XA Pending CN105260870A (en) | 2015-10-12 | 2015-10-16 | Identity identification method, identity identification system and identity identification terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105260870A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106101140A (en) * | 2016-08-04 | 2016-11-09 | 上海指真信息科技有限公司 | A kind of method of authentification of message and server |
CN106779545A (en) * | 2016-12-06 | 2017-05-31 | 北京华云网际科技有限公司 | A kind of method for carrying out getting parcel by Quick Response Code |
CN108682062A (en) * | 2018-05-11 | 2018-10-19 | 星络科技有限公司 | A kind of authentication system and method |
TWI662498B (en) * | 2017-10-17 | 2019-06-11 | 中國信託商業銀行股份有限公司 | Agency method and system for financial affairs |
CN113313224A (en) * | 2021-06-02 | 2021-08-27 | 哈尔滨华泽数码科技有限公司 | Generation system and generation method of office code for government affair service |
CN114240283A (en) * | 2021-12-13 | 2022-03-25 | 南方电网数字电网研究院有限公司 | Warehouse management method, warehouse management device, computer equipment, storage medium and program product |
WO2024078613A1 (en) * | 2022-10-13 | 2024-04-18 | 中国移动通信有限公司研究院 | Label inventory method, apparatus, node and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103996111A (en) * | 2014-06-13 | 2014-08-20 | 北京京东尚科信息技术有限公司 | Method and system for logging in self-picking cabinet |
CN104065621A (en) * | 2013-03-21 | 2014-09-24 | 腾讯科技(深圳)有限公司 | Identify verification method for third-party service, client and system |
CN104104657A (en) * | 2013-04-07 | 2014-10-15 | 腾讯科技(深圳)有限公司 | Information validation method, server, terminal and system |
CN104967592A (en) * | 2014-10-09 | 2015-10-07 | 腾讯科技(深圳)有限公司 | Identity verification method, apparatus and system |
-
2015
- 2015-10-16 CN CN201510671640.XA patent/CN105260870A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065621A (en) * | 2013-03-21 | 2014-09-24 | 腾讯科技(深圳)有限公司 | Identify verification method for third-party service, client and system |
CN104104657A (en) * | 2013-04-07 | 2014-10-15 | 腾讯科技(深圳)有限公司 | Information validation method, server, terminal and system |
CN103996111A (en) * | 2014-06-13 | 2014-08-20 | 北京京东尚科信息技术有限公司 | Method and system for logging in self-picking cabinet |
CN104967592A (en) * | 2014-10-09 | 2015-10-07 | 腾讯科技(深圳)有限公司 | Identity verification method, apparatus and system |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106101140A (en) * | 2016-08-04 | 2016-11-09 | 上海指真信息科技有限公司 | A kind of method of authentification of message and server |
CN106101140B (en) * | 2016-08-04 | 2019-08-30 | 上海指真信息科技有限公司 | A kind of method and server of authentification of message |
CN106779545A (en) * | 2016-12-06 | 2017-05-31 | 北京华云网际科技有限公司 | A kind of method for carrying out getting parcel by Quick Response Code |
TWI662498B (en) * | 2017-10-17 | 2019-06-11 | 中國信託商業銀行股份有限公司 | Agency method and system for financial affairs |
CN108682062A (en) * | 2018-05-11 | 2018-10-19 | 星络科技有限公司 | A kind of authentication system and method |
CN113313224A (en) * | 2021-06-02 | 2021-08-27 | 哈尔滨华泽数码科技有限公司 | Generation system and generation method of office code for government affair service |
CN113313224B (en) * | 2021-06-02 | 2022-06-28 | 哈尔滨华泽数码科技有限公司 | Generation system and generation method of office code for government affair service |
CN114240283A (en) * | 2021-12-13 | 2022-03-25 | 南方电网数字电网研究院有限公司 | Warehouse management method, warehouse management device, computer equipment, storage medium and program product |
WO2024078613A1 (en) * | 2022-10-13 | 2024-04-18 | 中国移动通信有限公司研究院 | Label inventory method, apparatus, node and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105260870A (en) | Identity identification method, identity identification system and identity identification terminal | |
KR101281882B1 (en) | Caller certification method and system for phishing prevention | |
US9084071B2 (en) | Simple mobile registration mechanism enabling automatic registration via mobile devices | |
CN102082881B (en) | For the method and system of real-time caller position, brief introduction and trusting relationship | |
CN106850392B (en) | Message processing method and device and message receiving method and device | |
JP6402144B2 (en) | Method and system for finding a guardian based on a two-dimensional code | |
CN106911661B (en) | Short message verification method, device, client, server and system | |
CN101179787B (en) | Mobile terminal and service activation method and system | |
KR20160037213A (en) | Processing electronic tokens | |
CN104092542A (en) | Account login method, device and system | |
US20170104870A1 (en) | A method to authenticate calls in a telecommunication system | |
JP2007264835A (en) | Authentication method and system | |
JP2013005205A (en) | Ill-motivated telephone call prevention device and ill-motivated telephone call prevention system | |
US10044735B2 (en) | System and method for authentication of electronic communications | |
US20190370743A1 (en) | Method for acquiring user information and relevant device | |
CN106936807A (en) | A kind of recognition methods of malicious operation and device | |
CN113946739A (en) | Sensitive data query method, device, equipment and storage medium | |
CN103108316A (en) | Authentication method, device and system for aerial card writing | |
CN105681399A (en) | Business card obtaining method and device | |
KR20150124937A (en) | Method for Transforming Address | |
CN1992591B (en) | System and method of group real name verification based on handset binding and WEB mode | |
KR101854725B1 (en) | Electronic document management System between interested parties | |
US20180376328A1 (en) | Passive wireless electronics detection system | |
KR20140121036A (en) | Recording Medium, Method and Device for Message Processing | |
US8433347B2 (en) | Method and apparatus for verifying network management short message of wireless public phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160120 |
|
RJ01 | Rejection of invention patent application after publication |