CN105260870A - Identity identification method, identity identification system and identity identification terminal - Google Patents

Identity identification method, identity identification system and identity identification terminal Download PDF

Info

Publication number
CN105260870A
CN105260870A CN201510671640.XA CN201510671640A CN105260870A CN 105260870 A CN105260870 A CN 105260870A CN 201510671640 A CN201510671640 A CN 201510671640A CN 105260870 A CN105260870 A CN 105260870A
Authority
CN
China
Prior art keywords
party terminal
quick response
response code
information
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510671640.XA
Other languages
Chinese (zh)
Inventor
王海文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yonyou Network Technology Co Ltd
Original Assignee
Yonyou Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yonyou Network Technology Co Ltd filed Critical Yonyou Network Technology Co Ltd
Priority to CN201510671640.XA priority Critical patent/CN105260870A/en
Publication of CN105260870A publication Critical patent/CN105260870A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an identity identification method, an identity identification system and an identity identification terminal, wherein the identity identification method comprises the steps of acquiring identity information and service information of a user; generating a two-dimensional code identification according to the identity information and the service information, storing the two-dimensional code to a local device; and transmitting the two-dimensional code identification to a user terminal according to the identity information, wherein the user terminal is used as a first-party terminal. The identity identification method, the identity identification system and the identity identification terminal provided by a technical solution have advantages of improving identity identification efficiency and preventing problems of error identification and impersonation. For a logistics enterprise, logistics efficiency is improved. For a visitor scene, convenience in identity identification is improved.

Description

Auth method, authentication system and terminal
Technical field
The present invention relates to field of terminal technology, in particular to a kind of auth method, a kind of authentication system and a kind of terminal.
Background technology
Along with the rise of internet electricity business platform, the also fast development of logistics express delivery industry, shopping at network gets more and more, be exactly thereupon the fast development of express delivery, it is very large that courier generally needs to distribute package quantity for one day, and verification mode is generally that addressee signs for, if addressee cannot get express delivery immediately, usual company or residential quarter can be set up and be withheld a little, first a little sign for by withholding, and then addressee goes to withhold again and a little takes parcel.
So just there is two problems: a problem is wrong neck, because the reason of bearing the same name, possible mistake has taken other people parcel of same name, and courier cannot Timeliness coverage, only verify mobile phone tail number, but general courier is a lot of due to the parcel distributed, and can ignore this link; Another problem is false claiming, has some lawless persons to falsely claim as one's own parcel, as long as know the name of addressee, just can receive parcel, and courier can not judge the true and false of signature; Also has a kind of situation; when addressee cannot go to take parcel in person time; usually colleague or friend can be entrusted to remove the addressee that helps; this situation is for the identity more cannot verifying addressee courier; when there is parcel false claiming or losing; courier needs the loss compensating client, and the loss of more couriers of loss is larger.
In addition, the safety management of some enterprise campus or office building is stricter, visitor needs register information or needs receiver to come in person to connect, visitor is just allowed to enter Office Area, if visitor is many, or garden or office building larger, work efficiency can be affected because authentication efficiency is low.
Therefore, how fast effectively correct checking party identity information becomes technical matters urgently to be resolved hurrily.
Summary of the invention
The present invention just based on above-mentioned technical matters one of at least, propose a kind of new authentication scheme, by generating Quick Response Code mark according to the identity information of user and business information, and be sent to terminal corresponding to identity information using Quick Response Code mark as the foundation of authentication, improve the efficiency of authentication, avoid misdeeming the problem of assuming another's name, for loglstics enterprise, improve logistic efficiency, for visitor's scene, improve the convenience of authentication.
In view of this, the present invention proposes a kind of auth method, comprising: the identity information and the business information that obtain user; Generate Quick Response Code mark according to described identity information and business information, and described Quick Response Code mark is stored in this locality; According to described identity information, described Quick Response Code mark is sent to user terminal, described user terminal is as first party terminal.
In this technical scheme, by generating Quick Response Code mark according to the identity information of user and business information, and be sent to terminal corresponding to identity information using Quick Response Code mark as the foundation of authentication, improve the efficiency of authentication, avoid misdeeming the problem of assuming another's name, for loglstics enterprise, improve logistic efficiency, for visitor's scene, improve the convenience of authentication.
Wherein, identity information comprises the name of user, telephone number and address etc., and business information comprises business tine, as got express delivery, visiting time and visiting object etc.
In technique scheme, preferably, also comprise: obtain the checking mark that second party terminal sends; Judge that the described Quick Response Code whether described checking mark preserves with this locality is marking matched; When judging that described checking mark and the local described Quick Response Code preserved are marking matched, determine to be proved to be successful.
In this technical scheme, the Quick Response Code preserved by checking mark and this locality second party terminal sent is identified and mates, and improves efficiency and the reliability of authentication, improves the experience of user simultaneously.
In technique scheme, preferably, also comprise: judge described checking mark and the local described Quick Response Code preserved identify do not mate time, described checking mark is sent to described first party terminal, verifies for described first party terminal; Judge whether to obtain the instruction of described first party terminal to described checking identity validation; When judging to obtain the instruction of described first party terminal to described checking identity validation, determine to be proved to be successful.
In this technical scheme, if there is the problem verified and do not pass through, then server needs Quick Response Code mark to send to first party terminal, carried out again judging by first party terminal user and confirm, when first party terminal user confirms to be proved to be successful, server is proved to be successful to second party terminal feedback, if further ensure Quick Response Code mark when there is mistake, and still can identity verification information rapidly.
In technique scheme, preferably, when judging not obtain the instruction of described first party terminal to described checking identity validation, to give the alarm information to described first party terminal.
In this technical scheme, by when for obtaining the instruction to checking identity validation of first party terminal, give the alarm information, ensure that the property safety of user further.
In this technical scheme, at least one in described alarm sounds information acoustics information, optics information and vibration prompting information.
In this technical scheme, prompt messages is sent by user's used terminal, and in conjunction with the function of terminal own, the prompting mode prompting user rs authentication mark comprising several terminals such as audio warning, flashlamp flicker, terminal vibrations conventional identifies.
According to a second aspect of the invention, also proposed a kind of authentication system, comprising: acquiring unit, for obtaining identity information and the business information of user; Generation unit, for generating Quick Response Code mark according to described identity information and business information, and is stored in this locality by described Quick Response Code mark; Transmitting element, for described Quick Response Code mark being sent to user terminal according to described identity information, described user terminal is as first party terminal.
In this technical scheme, by generating Quick Response Code mark according to the identity information of user and business information, and be sent to terminal corresponding to identity information using Quick Response Code mark as the foundation of authentication, improve the efficiency of authentication, avoid misdeeming the problem of assuming another's name, for loglstics enterprise, improve logistic efficiency, for visitor's scene, improve the convenience of authentication.
Wherein, identity information comprises the name of user, telephone number and address etc., and business information comprises business tine, as got express delivery, visiting time and visiting object etc.
In technique scheme, preferably, described acquiring unit also for: obtain the checking mark that second party terminal sends; Described authentication system also comprises: judging unit, marking matched for judging the described Quick Response Code whether described checking mark preserves with this locality; Determining unit, for when judging that described checking mark and the local described Quick Response Code preserved are marking matched, determines to be proved to be successful.In this technical scheme, take touch command as medium, open call and/or open APP, starting consistency operation simultaneously, find relevant with/application program businessman to conversation number in database and same category information, complete authentication.
In this technical scheme, the Quick Response Code preserved by checking mark and this locality second party terminal sent is identified and mates, and improves efficiency and the reliability of authentication, improves the experience of user simultaneously.
In technique scheme, preferably, described transmitting element also for: judge described checking mark and the local described Quick Response Code preserved identify do not mate time, described checking mark is sent to described first party terminal, verifies for described first party terminal; Described judging unit also for: judge whether to obtain the instruction of described first party terminal to described checking identity validation; Described determining unit also for: when judging to obtain the instruction of described first party terminal to described checking identity validation, determine to be proved to be successful.
In this technical scheme, if there is the problem verified and do not pass through, then server needs Quick Response Code mark to send to first party terminal, carried out again judging by first party terminal user and confirm, when first party terminal user confirms to be proved to be successful, server is proved to be successful to second party terminal feedback, if further ensure Quick Response Code mark when there is mistake, and still can identity verification information rapidly.
In technique scheme, preferably, described transmitting element also for: when judging not obtain the instruction of described first party terminal to described checking identity validation, to give the alarm information to described first party terminal.
In this technical scheme, by when for obtaining the instruction to checking identity validation of first party terminal, give the alarm information, ensure that the property safety of user further.
According to a third aspect of the invention we, also proposed a kind of terminal, comprising: the authentication system described in above-mentioned any one technical scheme.
In this technical scheme, by generating Quick Response Code mark according to the identity information of user and business information, and be sent to terminal corresponding to identity information using Quick Response Code mark as the foundation of authentication, improve the efficiency of authentication, avoid misdeeming the problem of assuming another's name, for loglstics enterprise, improve logistic efficiency, for visitor's scene, improve the convenience of authentication.
Accompanying drawing explanation
Fig. 1 shows the schematic flow diagram of auth method according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram of authentication system according to an embodiment of the invention;
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 4 shows the schematic diagram of authentication scheme according to an embodiment of the invention.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the schematic flow diagram of auth method according to an embodiment of the invention.
As shown in Figure 1, auth method according to an embodiment of the invention, comprising: step 102, obtains identity information and the business information of user; Step 104, generates Quick Response Code mark according to described identity information and business information, and described Quick Response Code mark is stored in this locality; Step 106, according to described identity information, described Quick Response Code mark is sent to user terminal, described user terminal is as first party terminal.
In this technical scheme, by generating Quick Response Code mark according to the identity information of user and business information, and be sent to terminal corresponding to identity information using Quick Response Code mark as the foundation of authentication, improve the efficiency of authentication, avoid misdeeming the problem of assuming another's name, for loglstics enterprise, improve logistic efficiency, for visitor's scene, improve the convenience of authentication.
Wherein, identity information comprises the name of user, telephone number and address etc., and business information comprises business tine, as got express delivery, visiting time and visiting object etc.
In technique scheme, preferably, also comprise: obtain the checking mark that second party terminal sends; Judge that the described Quick Response Code whether described checking mark preserves with this locality is marking matched; When judging that described checking mark and the local described Quick Response Code preserved are marking matched, determine to be proved to be successful.
In this technical scheme, the Quick Response Code preserved by checking mark and this locality second party terminal sent is identified and mates, and improves efficiency and the reliability of authentication, improves the experience of user simultaneously.
In technique scheme, preferably, also comprise: judge described checking mark and the local described Quick Response Code preserved identify do not mate time, described checking mark is sent to described first party terminal, verifies for described first party terminal; Judge whether to obtain the instruction of described first party terminal to described checking identity validation; When judging to obtain the instruction of described first party terminal to described checking identity validation, determine to be proved to be successful.
In this technical scheme, if there is the problem verified and do not pass through, then server needs Quick Response Code mark to send to first party terminal, carried out again judging by first party terminal user and confirm, when first party terminal user confirms to be proved to be successful, server is proved to be successful to second party terminal feedback, if further ensure Quick Response Code mark when there is mistake, and still can identity verification information rapidly.
In technique scheme, preferably, when judging not obtain the instruction of described first party terminal to described checking identity validation, to give the alarm information to described first party terminal.
In this technical scheme, by when for obtaining the instruction to checking identity validation of first party terminal, give the alarm information, ensure that the property safety of user further.
In this technical scheme, at least one in described alarm sounds information acoustics information, optics information and vibration prompting information.
In this technical scheme, prompt messages is sent by user's used terminal, and in conjunction with the function of terminal own, the prompting mode prompting user rs authentication mark comprising several terminals such as audio warning, flashlamp flicker, terminal vibrations conventional identifies.
Fig. 2 shows the schematic block diagram of authentication system according to an embodiment of the invention.
As shown in Figure 2, authentication system 200 according to an embodiment of the invention, comprising: acquiring unit 202, for obtaining identity information and the business information of user; Generation unit 204, for generating Quick Response Code mark according to described identity information and business information, and is stored in this locality by described Quick Response Code mark; Transmitting element 206, for described Quick Response Code mark being sent to user terminal according to described identity information, described user terminal is as first party terminal.
In this technical scheme, by generating Quick Response Code mark according to the identity information of user and business information, and be sent to terminal corresponding to identity information using Quick Response Code mark as the foundation of authentication, improve the efficiency of authentication, avoid misdeeming the problem of assuming another's name, for loglstics enterprise, improve logistic efficiency, for visitor's scene, improve the convenience of authentication.
Wherein, identity information comprises the name of user, telephone number and address etc., and business information comprises business tine, as got express delivery, visiting time and visiting object etc.
In technique scheme, preferably, described acquiring unit 202 also for: obtain the checking mark that second party terminal sends; Described authentication system 200 also comprises: judging unit 208, marking matched for judging the described Quick Response Code whether described checking mark preserves with this locality; Determining unit 210, for when judging that described checking mark and the local described Quick Response Code preserved are marking matched, determines to be proved to be successful.
In this technical scheme, take touch command as medium, open call and/or open APP, starting consistency operation simultaneously, find relevant with/application program businessman to conversation number in database and same category information, complete authentication.
In this technical scheme, the Quick Response Code preserved by checking mark and this locality second party terminal sent is identified and mates, and improves efficiency and the reliability of authentication, improves the experience of user simultaneously.
In technique scheme, preferably, described transmitting element 206 also for: judge described checking mark and the local described Quick Response Code preserved identify do not mate time, described checking mark is sent to described first party terminal, verifies for described first party terminal; Described judging unit 208 also for: judge whether to obtain the instruction of described first party terminal to described checking identity validation; Described determining unit 210 also for: when judging to obtain the instruction of described first party terminal to described checking identity validation, determine to be proved to be successful.
In this technical scheme, if there is the problem verified and do not pass through, then server needs Quick Response Code mark to send to first party terminal, carried out again judging by first party terminal user and confirm, when first party terminal user confirms to be proved to be successful, server is proved to be successful to second party terminal feedback, if further ensure Quick Response Code mark when there is mistake, and still can identity verification information rapidly.
In technique scheme, preferably, described transmitting element 206 also for: when judging not obtain the instruction of described first party terminal to described checking identity validation, to give the alarm information to described first party terminal.
In this technical scheme, by when for obtaining the instruction to checking identity validation of first party terminal, give the alarm information, ensure that the property safety of user further.
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention.
As shown in Figure 3, terminal 300 according to an embodiment of the invention, comprising: the authentication system 200 described in above-mentioned any one technical scheme.
Fig. 4 shows the schematic diagram of authentication scheme according to an embodiment of the invention.
As shown in Figure 4, authentication scheme according to an embodiment of the invention, manager's terminal is after the identity information obtaining user and business information, be converted into Quick Response Code identify and be sent to the first party terminal corresponding with identity information, as Quick Response Code mark is forwarded to second party terminal by first party terminal, to entrust it on behalf of identity verification, when checking mark sends to manager's terminal to verify by second party terminal, first manager's terminal verifies the local Quick Response Code mark that whether there is coupling, if exist, then business information corresponding for Quick Response Code mark is recalled, to verify that second party terminal has the authority performing above-mentioned business information, if do not exist, then resolve the identity information in checking mark and business information, and according to identity information, checking mark is sent to first party terminal, to ask first party terminal authentication.
Consider the technical matters of the how fast effectively correct checking party identity information proposed in correlation technique, the present invention proposes a kind of new authentication scheme, by generating Quick Response Code mark according to the identity information of user and business information, and be sent to terminal corresponding to identity information using Quick Response Code mark as the foundation of authentication, improve the efficiency of authentication, avoid misdeeming the problem of assuming another's name, for loglstics enterprise, improve logistic efficiency, for visitor's scene, improve the convenience of authentication.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. an auth method, is characterized in that, comprising:
Obtain identity information and the business information of user;
Generate Quick Response Code mark according to described identity information and business information, and described Quick Response Code mark is stored in this locality;
According to described identity information, described Quick Response Code mark is sent to user terminal, described user terminal is as first party terminal.
2. auth method according to claim 1, is characterized in that, also comprises:
Obtain the checking mark that second party terminal sends;
Judge that the described Quick Response Code whether described checking mark preserves with this locality is marking matched;
When judging that described checking mark and the local described Quick Response Code preserved are marking matched, determine to be proved to be successful.
3. auth method according to claim 2, is characterized in that, also comprises:
Judge described checking mark and the local described Quick Response Code preserved identify do not mate time, described checking mark is sent to described first party terminal, verifies for described first party terminal;
Judge whether to obtain the instruction of described first party terminal to described checking identity validation;
When judging to obtain the instruction of described first party terminal to described checking identity validation, determine to be proved to be successful.
4. the auth method according to Claims 2 or 3, is characterized in that, also comprises:
When judging not obtain the instruction of described first party terminal to described checking identity validation, to give the alarm information to described first party terminal.
5. auth method according to claim 4, is characterized in that, at least one in described alarm sounds information acoustics information, optics information and vibration prompting information.
6. an authentication system, is characterized in that, comprising:
Acquiring unit, for obtaining identity information and the business information of user;
Generation unit, for generating Quick Response Code mark according to described identity information and business information, and is stored in this locality by described Quick Response Code mark;
Transmitting element, for described Quick Response Code mark being sent to user terminal according to described identity information, described user terminal is as first party terminal.
7. authentication system according to claim 6, is characterized in that,
Described acquiring unit also for: obtain the checking mark that second party terminal sends;
Described authentication system also comprises:
Judging unit, marking matched for judging the described Quick Response Code whether described checking mark preserves with this locality;
Determining unit, for when judging that described checking mark and the local described Quick Response Code preserved are marking matched, determines to be proved to be successful.
8. authentication system according to claim 7, is characterized in that,
Described transmitting element also for: judge described checking mark and the local described Quick Response Code preserved identify do not mate time, described checking mark is sent to described first party terminal, verifies for described first party terminal;
Described judging unit also for: judge whether to obtain the instruction of described first party terminal to described checking identity validation;
Described determining unit also for: when judging to obtain the instruction of described first party terminal to described checking identity validation, determine to be proved to be successful.
9. the authentication system according to claim 7 or 8, is characterized in that,
Described transmitting element also for: when judging not obtain the instruction of described first party terminal to described checking identity validation, to give the alarm information to described first party terminal.
10. a terminal, is characterized in that, comprising: the authentication system according to any one of claim 6 to 9.
CN201510671640.XA 2015-10-12 2015-10-16 Identity identification method, identity identification system and identity identification terminal Pending CN105260870A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510671640.XA CN105260870A (en) 2015-10-12 2015-10-16 Identity identification method, identity identification system and identity identification terminal

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN2015106574220 2015-10-12
CN201510657422 2015-10-12
CN201510671640.XA CN105260870A (en) 2015-10-12 2015-10-16 Identity identification method, identity identification system and identity identification terminal

Publications (1)

Publication Number Publication Date
CN105260870A true CN105260870A (en) 2016-01-20

Family

ID=55100549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510671640.XA Pending CN105260870A (en) 2015-10-12 2015-10-16 Identity identification method, identity identification system and identity identification terminal

Country Status (1)

Country Link
CN (1) CN105260870A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101140A (en) * 2016-08-04 2016-11-09 上海指真信息科技有限公司 A kind of method of authentification of message and server
CN106779545A (en) * 2016-12-06 2017-05-31 北京华云网际科技有限公司 A kind of method for carrying out getting parcel by Quick Response Code
CN108682062A (en) * 2018-05-11 2018-10-19 星络科技有限公司 A kind of authentication system and method
TWI662498B (en) * 2017-10-17 2019-06-11 中國信託商業銀行股份有限公司 Agency method and system for financial affairs
CN113313224A (en) * 2021-06-02 2021-08-27 哈尔滨华泽数码科技有限公司 Generation system and generation method of office code for government affair service
CN114240283A (en) * 2021-12-13 2022-03-25 南方电网数字电网研究院有限公司 Warehouse management method, warehouse management device, computer equipment, storage medium and program product
WO2024078613A1 (en) * 2022-10-13 2024-04-18 中国移动通信有限公司研究院 Label inventory method, apparatus, node and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103996111A (en) * 2014-06-13 2014-08-20 北京京东尚科信息技术有限公司 Method and system for logging in self-picking cabinet
CN104065621A (en) * 2013-03-21 2014-09-24 腾讯科技(深圳)有限公司 Identify verification method for third-party service, client and system
CN104104657A (en) * 2013-04-07 2014-10-15 腾讯科技(深圳)有限公司 Information validation method, server, terminal and system
CN104967592A (en) * 2014-10-09 2015-10-07 腾讯科技(深圳)有限公司 Identity verification method, apparatus and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065621A (en) * 2013-03-21 2014-09-24 腾讯科技(深圳)有限公司 Identify verification method for third-party service, client and system
CN104104657A (en) * 2013-04-07 2014-10-15 腾讯科技(深圳)有限公司 Information validation method, server, terminal and system
CN103996111A (en) * 2014-06-13 2014-08-20 北京京东尚科信息技术有限公司 Method and system for logging in self-picking cabinet
CN104967592A (en) * 2014-10-09 2015-10-07 腾讯科技(深圳)有限公司 Identity verification method, apparatus and system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101140A (en) * 2016-08-04 2016-11-09 上海指真信息科技有限公司 A kind of method of authentification of message and server
CN106101140B (en) * 2016-08-04 2019-08-30 上海指真信息科技有限公司 A kind of method and server of authentification of message
CN106779545A (en) * 2016-12-06 2017-05-31 北京华云网际科技有限公司 A kind of method for carrying out getting parcel by Quick Response Code
TWI662498B (en) * 2017-10-17 2019-06-11 中國信託商業銀行股份有限公司 Agency method and system for financial affairs
CN108682062A (en) * 2018-05-11 2018-10-19 星络科技有限公司 A kind of authentication system and method
CN113313224A (en) * 2021-06-02 2021-08-27 哈尔滨华泽数码科技有限公司 Generation system and generation method of office code for government affair service
CN113313224B (en) * 2021-06-02 2022-06-28 哈尔滨华泽数码科技有限公司 Generation system and generation method of office code for government affair service
CN114240283A (en) * 2021-12-13 2022-03-25 南方电网数字电网研究院有限公司 Warehouse management method, warehouse management device, computer equipment, storage medium and program product
WO2024078613A1 (en) * 2022-10-13 2024-04-18 中国移动通信有限公司研究院 Label inventory method, apparatus, node and storage medium

Similar Documents

Publication Publication Date Title
CN105260870A (en) Identity identification method, identity identification system and identity identification terminal
KR101281882B1 (en) Caller certification method and system for phishing prevention
US9084071B2 (en) Simple mobile registration mechanism enabling automatic registration via mobile devices
CN102082881B (en) For the method and system of real-time caller position, brief introduction and trusting relationship
CN106850392B (en) Message processing method and device and message receiving method and device
JP6402144B2 (en) Method and system for finding a guardian based on a two-dimensional code
CN106911661B (en) Short message verification method, device, client, server and system
CN101179787B (en) Mobile terminal and service activation method and system
KR20160037213A (en) Processing electronic tokens
CN104092542A (en) Account login method, device and system
US20170104870A1 (en) A method to authenticate calls in a telecommunication system
JP2007264835A (en) Authentication method and system
JP2013005205A (en) Ill-motivated telephone call prevention device and ill-motivated telephone call prevention system
US10044735B2 (en) System and method for authentication of electronic communications
US20190370743A1 (en) Method for acquiring user information and relevant device
CN106936807A (en) A kind of recognition methods of malicious operation and device
CN113946739A (en) Sensitive data query method, device, equipment and storage medium
CN103108316A (en) Authentication method, device and system for aerial card writing
CN105681399A (en) Business card obtaining method and device
KR20150124937A (en) Method for Transforming Address
CN1992591B (en) System and method of group real name verification based on handset binding and WEB mode
KR101854725B1 (en) Electronic document management System between interested parties
US20180376328A1 (en) Passive wireless electronics detection system
KR20140121036A (en) Recording Medium, Method and Device for Message Processing
US8433347B2 (en) Method and apparatus for verifying network management short message of wireless public phone

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160120

RJ01 Rejection of invention patent application after publication