CN107403081A - A kind of electronic identity card authentication method and system comprising biological identification technology - Google Patents
A kind of electronic identity card authentication method and system comprising biological identification technology Download PDFInfo
- Publication number
- CN107403081A CN107403081A CN201610911087.7A CN201610911087A CN107403081A CN 107403081 A CN107403081 A CN 107403081A CN 201610911087 A CN201610911087 A CN 201610911087A CN 107403081 A CN107403081 A CN 107403081A
- Authority
- CN
- China
- Prior art keywords
- authentication
- electronic identity
- user
- identity card
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Abstract
The present invention relates to a kind of electronic identity card authentication method and system comprising biological identification technology, including:Headend equipment collection user electronic identity card submits electronic identity authentication application;Check results are simultaneously write risk control management system by the legitimacy of security gateway system verification front end data acquisition equipment;The electronic identity card certification application of legitimate device is submitted to Verification System by security gateway system;Verification System accesses the customizing messages and return authentication result of public security Intranet system verification application authentication user;To user feedback electronic identity card authentication result.The present invention gathers user's electronic identity card information by using public security advance data acquisition system, authentication is initiated to public security Intranet system, so as to instead of the conventional authentication pattern of mutual authentication, effectively increase authentication efficiency, saved the time that user carries out authentication, great convenience is provided for daily life.
Description
Technical field
The present invention relates to a kind of identity identifying method and system of public security system Quick Response Code identification technology, more particularly to one kind
The method and system in electronic identity authentication field.
Background technology
Consideration in social king's peace either personal personal safety as well as the property safety in life, it is often necessary to carry out a large amount of bodies
Part verification and certification work, and with the continuous development of technology, often there is fraction criminal to take illegal means to individual
People's identity information is forged to reach criminal intent.
Therefore identity card combines with biological information carries out confirming to turn into more accurate body to the identity of individual
Part authentication mode, is gradually used by public security system.So traditional authentication mode holds identity card for individual and carries out scene manually
Certification, which is not only poorly efficient time-consuming, for forgetting with for the identity card user that either identity card is lost, can thus into
Greatly puzzlement, the life but to people while safeguard protection is provided are made troubles.
The content of the invention
For insufficient existing for authentication in reality, a kind of electronic identity card comprising biological identification technology of the present invention is recognized
Method and system are demonstrate,proved, propose that one kind gathers user's Quick Response Code form electronic identity card information by front-end collection equipment, by these
Data form specific electronic identity authentication request and are sent to public security electronic identity authentication front-end system, with reference to public security intranet data
The information in storehouse carries out information searching and matching to applying for electronic authentication user, finally returns that user authentication result, and substitution passes
The mutual authentication mode of system mode, has not only saved human resources spending, at the same using smart machine complete the data acquisition and
Verification process, authentication efficiency and accuracy are substantially increased, efficiently solve the worry due to that can not provide identity card and bring,
Great convenience is brought to people's daily life, to ensure that social safety serves obvious action.
The technical solution adopted for the present invention to solve the technical problems comprises the following steps:
Data collection steps, user's electronic identity card information is gathered by front-end collection equipment.
Preferably, the electronic identity card information is gathered in the form of Quick Response Code, also can further gather user biological
Characteristic information.
Preferably, what the electronic identity card information referred to be approved by public security system and be presented to user can be used as user
The encrypted electronic data of identity characteristic mark.
Safety check step, school is carried out to the legitimacy of collecting device and the security of user by security gateway system
Test.
Preferably, if detect equipment be illegality equipment if by the information record to risk control system and terminate certification work
It is dynamic.
Preferably, if detect that user profile is illegal, by the logout to risk control system and certification work is terminated
It is dynamic.
Application step is submitted, legal application request is sent to authentication administrative system request electronic identity by security gateway system
Certification.
Electronic identity authentication step, authentication administrative system access public security Intranet system queries user identity according to certification demand
Information is simultaneously checked.
Preferably, it is described inquiry subscriber identity information and carry out verification refer to according to two-dimensional code data decoding interrogation determine use
The authenticity of family electronic identity card, also application collection in the biological attribute data of public security Intranet and further can be submitted according to user
The user biological feature arrived carries out bio-identification comparison, it is determined that the correctness of request user profile.
Authentication result step is notified, the result that authentication administrative system is inquired about and checked according to public security Intranet is sent out to collecting device
Authentication result is sent to notify user's electronic identity authentication processing result information.
Preferably, if authentication administrative system module detects that the user profile matches with the data message that public security Intranet preserves
During failure, collecting device authentification failure is notified, and the event is write into risk control system.
Preferably, if authentication administrative system module detects that the user profile matches with the data message that public security Intranet preserves
During success, notice collecting device certification is by if authentication administrative system module detects that the electronic identity card alreadys exceed effectively
Phase then notifies collecting device authentification failure, and risk control system will be all write finally for the situation that certification passes through.
The technical solution adopted for the present invention to solve the technical problems is included with lower module:
Front-end collection EM equipment module, for gathering user's electronic identity card information.
Preferably, the acquisition mode of the electronic identity card information be Quick Response Code collection, also can further include to
The collection of family organism card information.
Electronic identity authentication Verification System module, for receiving electronic identity authentication request and believing sending equipment and user
Breath carries out safety check, and electronic identity card is verified and safeguarded.
Preferably, the module includes security gateway system module, for being tested to user and facility information, risk control
System module processed, for record and managing risk information and authentication administrative system module, application is recognized for accessing public security Intranet
Card user profile is authenticated.
Public security Intranet system module, there is provided customer data base is used for data query and information when electronic identity authentication is asked
Verification.
Using above-mentioned technical proposal, the present invention has advantages below:
The present invention relates to a kind of electronic identity card authentication method and system comprising biological identification technology, proposes that one kind passes through
Front-end collection equipment collection user's electronic identity card information forms specific electronic identity authentication request and is sent to public security electronics body
Part certification front-end system, with reference to public security intranet data storehouse information applying for electronic authentication user is carried out information searching and
Match somebody with somebody, finally return that user authentication result, substitute the mutual authentication mode of traditional approach, not only saved human resources spending, together
Shi Caiyong smart machines complete the data acquisition and verification process, substantially increase authentication efficiency and accuracy, efficiently solve
Due to the worry that can not be provided identity card and bring, great convenience is brought to people's daily life, to ensure that social safety plays
Obvious action.
Brief description of the drawings
Fig. 1 is a kind of electronic identity card authentication method comprising biological identification technology of better embodiment of the present invention and is
The step schematic diagram of system.
Fig. 2 is a kind of electronic identity card authentication method comprising biological identification technology of better embodiment of the present invention and is
The module map of system.
Fig. 3 is a kind of electronic identity card authentication method comprising biological identification technology of better embodiment of the present invention and is
The front-end collection EM equipment module identifying procedure figure of system.
Fig. 4 is a kind of electronic identity card authentication method comprising biological identification technology of better embodiment of the present invention and is
The detailed step figure of system.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Whole description, it is clear that described embodiment is only one embodiment of the present of invention, rather than whole embodiments.Based on this
Embodiment in invention, other realities that those of ordinary skill in the art are obtained on the premise of creative work is not made
Example is applied, belongs to the scope of protection of the invention.
The embodiment of the invention discloses a kind of electronic identity card authentication method comprising biological identification technology, referring to Fig. 1 institutes
Show, this method comprises the following steps:
Step S1:The electronic identity card data message of user's Quick Response Code form is gathered by front-end collection equipment, can also be entered
One step includes being acquired user biological body card information.
Step S2:The legitimacy of collecting device and the security of user are verified by security gateway system.
Step S3:Legal application request is sent to authentication administrative system request electronic identity authentication by security gateway system.
Step S4:Authentication administrative system accesses public security Intranet system queries subscriber identity information according to certification demand and carried out
Verification.
Step S5:The result that authentication administrative system is inquired about and checked according to public security Intranet sends authentication result to collecting device
To notify user's electronic identity authentication processing result information.
In the embodiment of the present invention, the electronic identity card information that user's Quick Response Code form is gathered by front-end collection equipment forms
Specific electronic identity authentication request is sent to public security electronic identity authentication front-end system, with reference to the information of public security intranet data storehouse
Information searching and matching are carried out to applying for electronic authentication user, finally return that user authentication result.
It can be seen that substituting traditional mutual authentication mode by the way of headend equipment automatic data collection, not only save
Human resources are paid wages, while complete the data acquisition and verification process using smart machine, substantially increase authentication efficiency and standard
True property, efficiently solves the worry due to that can not provide identity card and bring, and great convenience is brought to people's daily life, to protect
Barrier social safety serves obvious action.
The embodiment of the invention discloses a kind of electronic identity card authentication system comprising biological identification technology, referring to Fig. 2 institutes
Show, the system is included with lower module:
M1:Front-end collection EM equipment module.
Preferably, the module is used for the electronic identity card information for gathering user's Quick Response Code form, also can further gather use
The biology character information at family.
Preferably, the module is additionally operable to show electronic identity card authentication result to user.
M2:Electronic identity authentication Verification System module.
Preferably, the module is used to receive electronic identity authentication request and carries out safe school to sending equipment and user profile
Test, electronic identity card is verified and safeguarded.
Preferably, the module includes security gateway system module, for being tested to user and facility information, risk control
System module processed, for record and managing risk information and authentication administrative system module, application is recognized for accessing public security Intranet
Card user profile is authenticated.
M3:Public security Intranet system module.
Preferably, the module provides the data query and information core when customer data base is used for electronic identity authentication request
It is right.
The embodiment of the invention discloses a kind of electronic identity card authentication system comprising biological identification technology, referring to Fig. 3 institutes
Show, front-end collection EM equipment module verification process comprises the following steps in the system:
I01:Ask device authentication step.
Preferably, front-end collection EM equipment module M1 issues Verification System module M2 to electronic identity and sends request device authentication
Information, and carry the hardware characterize data of the equipment.
102:Forward request step.
Preferably, electronic identity authentication Verification System module M2 submodule security gateway system module M21 receives step
After the certification request that rapid I01 is sent, authentication administrative system module M23 is directly forwarded to.
I03:Issue device certificate step.
Preferably, the hardware information that authentication administrative system module M23 carries according to equipment generates this using special algorithm and set
Standby unique certificate credential, is sent to security gateway system module M21.
I04:Write air control step.
Preferably, security gateway system module M21 is received and the certificate and facility information is write into wind after device certificate voucher
Dangerous control module M22.
I05:Send device certificate step.
Preferably, device certificate voucher is sent to front-end collection EM equipment module M1 by security gateway system module M21, is completed
Device authentication process.
The embodiment of the invention discloses a kind of electronic identity card authentication method and system comprising biological identification technology, referring to
Fig. 4, two embodiments, the present embodiment have made further instruction and optimization to technical scheme relatively above.Specifically include following
Step:
S1:Submit application step.
Preferably, front-end collection EM equipment module M1 is collected after user's electronic identity card information to electronic identity authentication certification
System module M2 submits authentication application.
S21:Verify device step.
Preferably, after M2 submodule security gateway module M21 receives certification request caused by step S1, to the collection
Device end M1 legitimacy is verified, and is performed step S22 if finding the equipment for illegality equipment, is otherwise performed step
S24。
S22:Write air control step.
Preferably, security gateway system terminal M21 will detect the electronic identity authentication request event of illegality equipment initiation
Risk control system module M22 is write, and performs step S23.
S23:Notify illegality equipment step.
Preferably, equipment verification this result that fails is sent to collecting device terminal M1 by security gateway system terminal M21
To notify user's digital certificate to fail and terminate certification activity.
S24:Risk control step.
Preferably, security gateway system module M21 is held to applying for that the identity information of user verifies if failure is verified
Row step S25, otherwise perform step S3.
S25:Write air control step.
Preferably, disabled user's request event is write risk control system module M22 simultaneously by security gateway system module M21
Perform step S26.
S26:Notify illegal request step.
Preferably, security gateway system module M21 by disabled user's request results be sent to collecting device module M1 and by
It notifies that the identity information that user provides is illegal, terminates electronic identity authentication activity.
S3:Application authentication step.
Preferably, the request of user's electronic identity authentication is organized into certification application and is sent to certification by security gateway system M21
Management system module M23.
S41:Cross-check information step.
Preferably, after authentication administrative system module M23 receives the certification request that step S3 is sent, public security Intranet system is accessed
Unite module M3, inquiry application user data record, and by the record data in M3 with application user verification of data, then hold
Row step S42.
S42:Return to checked result step.
Preferably, public security Intranet system module M3 is sent according to the result of inquiry verification to authentication administrative system module M23
Checked result.
S43:Return authentication result step.
Preferably, the verification that authentication administrative system module M23 returns according to public security Intranet system module M3 in step S42
As a result organizing electronic identity authentication result is sent to security gateway system module M21, and performs step S51.
S51:Write air control step.
Preferably, security network management system module M1 as requested by electronic identity card certification by or electronic identity authentication lose
The information write-in risk control system module M22 lost, and perform step S52.
S52:Notify authentication result step.
Preferably, security gateway module M21 by authentication result be sent to collecting device module M1 by its notify user this time
The result of electronic identity authentication.
In summary, user's electronic identity card information is gathered by collecting device module M1, or further gathers user
Step S1 is performed after biology character information information composition electronic identity authentication application is sent to security gateway system module
M21, execution step S21 verifies to the legitimacy of collecting device module after the module receives request, is held if failure is examined
Illegality equipment request authentication event write-in risk control system module M22 is performed step S23 and sent by row step S22
The notification message of authentification failure notifies user's this electronic identity authentication failure to collecting device module M1 by it, while terminates and recognize
Card activity, if step S21 upchecks, step S24 is performed to applying for that the information of user carries out legitimacy verifies, is lost if examining
Lose, then perform the electronic identity authentication application event that step S25 initiates the disabled user and write risk control system module
M22, and perform step S26 and notify user that its identity information provided is by it to the transmission authentication failure notification of collecting device module
Invalid information, certification activity are terminated, and step S3 is performed to authentication administrative system module if being to be proved to be successful if step S24 results
M23 sends electronic identity authentication application, and M23 accesses public security Intranet system module M3 after receiving this application and performs step S41
Inquired about in public security Intranet system module M3 and check user profile, and then perform step S42 to authentication administrative system module M23
Checked result notice is sent, authentication administrative system module M23 performs step S43 to safety net relation according to authentication result is received
The module M21 of uniting sends authentication result notice, in S51 steps security gateway system module M21 according to the authentication result of return aweather
Dangerous control system module M22 write-in authentification failures or successful event information, and then step S52 is performed, to collecting device module
M1 sends this electronic identity authentication result, and the final result explanation of this electronic identity authentication of user is notified by it.Using
The mode of headend equipment automatic data collection substitutes traditional mutual authentication mode, has not only saved human resources spending, simultaneously
The data acquisition and verification process are completed using smart machine, substantially increase authentication efficiency and accuracy, efficiently solve by
In the worry that can not be provided identity card and bring, great convenience is brought to people's daily life, to ensure that social safety serves
Obvious action.
Illustrative is the foregoing is only, rather than is restricted.Those skilled in the art can carry out various change to invention
Dynamic and modification is without departing from the spirit and scope of the present invention.So, if these modifications and variations of the present invention belong to the present invention
Within the scope of claim and its equivalent technologies, then the present invention is also intended to including these changes and modification.
Claims (10)
1. a kind of electronic identity card authentication method comprising biological identification technology, it is characterised in that the method includes the steps of:
Data collection steps, the identity informations such as user's electronic identity card are gathered by front-end collection equipment;
Safety check step, the legitimacy of collecting device and the security of user are verified by security gateway system;
Application step is submitted, legal application request is sent to authentication administrative system request electronic identity by security gateway system to be recognized
Card;
Electronic identity authentication step, authentication administrative system access public security Intranet system queries subscriber identity information according to certification demand
And checked;
Authentication result step is notified, the result that authentication administrative system is inquired about and checked according to public security Intranet is sent to collecting device recognizes
Result is demonstrate,proved to notify user's electronic identity authentication processing result information.
A kind of 2. electronic identity card authentication method comprising biological identification technology as claimed in claim 1, it is characterised in that institute
The electronic identity card information that data collection steps refer to obtain user by the way of two-dimensional code scanning is stated, also can further be adopted
Collect user biological characteristic information.
A kind of 3. electronic identity card authentication method comprising biological identification technology as claimed in claim 1, it is characterised in that institute
State in data collection steps, the electronic identity card information refers to that being approved by public security system and be presented to being used as user uses
The encrypted electronic data of family identity characteristic mark.
A kind of 4. electronic identity card authentication method comprising biological identification technology as claimed in claim 1, it is characterised in that institute
State in safety check step, if detecting, equipment by the information record to risk control system and terminates certification if being illegality equipment
Activity, if detect that user profile is illegal, by the logout to risk control system and terminate certification activity.
A kind of 5. electronic identity card authentication method comprising biological identification technology as claimed in claim 1, it is characterised in that institute
State in electronic identity authentication step, the inquiry subscriber identity information simultaneously carries out verification and referred to according to two-dimensional code data decoding interrogation
The authenticity of user's electronic identity card is determined, also Shen in the biological attribute data of public security Intranet and further can be submitted according to user
The user biological feature that please be collected carries out bio-identification comparison, it is determined that the correctness of request user profile.
A kind of 6. electronic identity card authentication method comprising biological identification technology as claimed in claim 1, it is characterised in that institute
State in notice authentication result step, if authentication administrative system module detects that the user profile is believed with the data that public security Intranet preserves
Breath notifies collecting device authentification failure, and the event is write into risk control system when it fails to match.
A kind of 7. electronic identity card authentication method comprising biological identification technology as claimed in claim 1, it is characterised in that institute
State in notice authentication result step, notified if authentication administrative system module detects that the electronic identity card alreadys exceed the term of validity
Collecting device authentification failure, risk control system will be all write finally for the situation that certification passes through.
A kind of 8. system of the electronic identity card certification comprising biological identification technology as claimed in claim 1, it is characterised in that
The system is included with lower module:
Front-end collection EM equipment module, for gathering user's electronic ID card information, and these information are formed into specific certification and asked
Ask, while to user feedback authentication result;
Electronic identity authentication Verification System module, for receiving electronic identity authentication request and entering to sending equipment and user profile
Row safety check, is verified and is safeguarded to electronic identity card;
Public security Intranet system module, there is provided customer data base is used for data query and information core when electronic identity authentication is asked
It is right.
A kind of 9. system of the electronic identity card certification comprising biological identification technology as claimed in claim 8, it is characterised in that
The front-end collection equipment refers to that electronic identity Quick Response Code gathers.
A kind of 10. electronic identity card authentication system comprising biological identification technology as claimed in claim 1, it is characterised in that
The electronic identity authentication Verification System module includes security gateway system module, for being examined to user and facility information
Test, risk control system module, for record and managing risk information and authentication administrative system module, for accessing public security Intranet
Application authentication user profile is authenticated and managed and verifies front-end collection equipment validity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610911087.7A CN107403081A (en) | 2016-10-19 | 2016-10-19 | A kind of electronic identity card authentication method and system comprising biological identification technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610911087.7A CN107403081A (en) | 2016-10-19 | 2016-10-19 | A kind of electronic identity card authentication method and system comprising biological identification technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107403081A true CN107403081A (en) | 2017-11-28 |
Family
ID=60389513
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610911087.7A Pending CN107403081A (en) | 2016-10-19 | 2016-10-19 | A kind of electronic identity card authentication method and system comprising biological identification technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107403081A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109447048A (en) * | 2018-12-25 | 2019-03-08 | 苏州闪驰数控系统集成有限公司 | A kind of artificial intelligence early warning system |
CN109951423A (en) * | 2017-12-20 | 2019-06-28 | 金联汇通信息技术有限公司 | System, method, apparatus and the server of authentication |
CN111222115A (en) * | 2019-12-25 | 2020-06-02 | 北京中盾安信科技发展有限公司 | Interaction method for network mapping certificate holder, system and verification mechanism |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1951326A (en) * | 2006-11-03 | 2007-04-25 | 北京飞天诚信科技有限公司 | Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal |
CN104994114A (en) * | 2015-07-27 | 2015-10-21 | 尤磊 | Identity authentication system and method based on electronic identification card |
US20150312041A1 (en) * | 2009-11-17 | 2015-10-29 | Unho Choi | Authentication in ubiquitous environment |
CN105305615A (en) * | 2015-09-15 | 2016-02-03 | 成都华兴智造科技有限公司 | Wireless test and data transmission system monitoring method |
-
2016
- 2016-10-19 CN CN201610911087.7A patent/CN107403081A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1951326A (en) * | 2006-11-03 | 2007-04-25 | 北京飞天诚信科技有限公司 | Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal |
US20150312041A1 (en) * | 2009-11-17 | 2015-10-29 | Unho Choi | Authentication in ubiquitous environment |
CN104994114A (en) * | 2015-07-27 | 2015-10-21 | 尤磊 | Identity authentication system and method based on electronic identification card |
CN105305615A (en) * | 2015-09-15 | 2016-02-03 | 成都华兴智造科技有限公司 | Wireless test and data transmission system monitoring method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109951423A (en) * | 2017-12-20 | 2019-06-28 | 金联汇通信息技术有限公司 | System, method, apparatus and the server of authentication |
CN109951423B (en) * | 2017-12-20 | 2021-09-10 | 金联汇通信息技术有限公司 | System, method and device for identity authentication and server |
CN109447048A (en) * | 2018-12-25 | 2019-03-08 | 苏州闪驰数控系统集成有限公司 | A kind of artificial intelligence early warning system |
CN109447048B (en) * | 2018-12-25 | 2020-12-25 | 苏州闪驰数控系统集成有限公司 | Artificial intelligence early warning system |
CN111222115A (en) * | 2019-12-25 | 2020-06-02 | 北京中盾安信科技发展有限公司 | Interaction method for network mapping certificate holder, system and verification mechanism |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5833113B2 (en) | Electronic pen device and system for use with electronic pen device | |
EP3069297B1 (en) | Identity authentication by using human biological characteristics | |
US20150317638A1 (en) | Methods, Devices and Systems for Transaction Initiation | |
CN103036680A (en) | Realm name certification system and method based on biological feature recognition | |
CN104935438A (en) | Method and apparatus for identity verification | |
CN107945080A (en) | A kind of electronic identity card awarding method and system based on biological identification technology | |
TW201407403A (en) | Identity authentication and management device and identity authentication and management method | |
CN105871925A (en) | User terminal, biological recognition cloud server and social security platform server | |
KR20190065340A (en) | Method and apparatus for service implementation | |
CN109285234A (en) | Human face identification work-attendance checking method, device, computer installation and storage medium | |
US9202035B1 (en) | User authentication based on biometric handwriting aspects of a handwritten code | |
CN108140152A (en) | Computer implemented tracking mechanism and data management | |
CN103699996A (en) | Payment authentication method based on human biological characteristics | |
CN107403081A (en) | A kind of electronic identity card authentication method and system comprising biological identification technology | |
CN113111330B (en) | Enterprise legal identity authentication management method and system based on enterprise chain code | |
US20060271788A1 (en) | Access method for wireless authentication login system | |
CN107948287B (en) | Medical services authenticity verification methods based on Internet of Things | |
CN107548059A (en) | A kind of authentication method and system | |
WO2018176020A1 (en) | System and method for confirming a person's identity | |
KR20150024716A (en) | Biometric authentication method, biometric authentication system associated with the same and storage medium storing the same | |
KR101391980B1 (en) | Authentification system and method using code | |
CN105262747A (en) | Polymorphic terminal identity verification system and method based on biological characteristic recognition | |
US10693651B1 (en) | System and method for authentication using biometric hash strings | |
CN107241309A (en) | A kind of identity identifying method, authentication device and Verification System | |
JP2021170224A (en) | Authentication system, terminal device, program, and authentication management communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171128 |