CN109934009A - A kind of personal information data query interaction authorization method - Google Patents

A kind of personal information data query interaction authorization method Download PDF

Info

Publication number
CN109934009A
CN109934009A CN201910142816.0A CN201910142816A CN109934009A CN 109934009 A CN109934009 A CN 109934009A CN 201910142816 A CN201910142816 A CN 201910142816A CN 109934009 A CN109934009 A CN 109934009A
Authority
CN
China
Prior art keywords
user
terminal
information
personal information
dimensional code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910142816.0A
Other languages
Chinese (zh)
Other versions
CN109934009B (en
Inventor
何晓明
吴卫
李永栋
茹文秀
李志晖
钟家晖
黄玲
伍国林
谢煜
刘树文
陈韵
邱浩锋
黎浩云
陈惠敏
郑晓彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Planning And Natural Resources Automation Center Guangzhou Basic Geographic Information Center
Guangzhou Urban Planning Technology Development Service Co ltd
Original Assignee
GUANGZHOU CITY PLANNING AUTOMATION CENTER
Guangzhou Urban Planning Technology Development Service Department
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGZHOU CITY PLANNING AUTOMATION CENTER, Guangzhou Urban Planning Technology Development Service Department filed Critical GUANGZHOU CITY PLANNING AUTOMATION CENTER
Priority to CN201910142816.0A priority Critical patent/CN109934009B/en
Publication of CN109934009A publication Critical patent/CN109934009A/en
Application granted granted Critical
Publication of CN109934009B publication Critical patent/CN109934009B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of personal information data query interaction authorization methods, comprising: first terminal obtains the facial information of the first user and needs the personal information of external authorization query, and generates two dimensional code according to first user's facial information and personal information;After second terminal scans the two-dimensional code progress data interaction, second terminal obtains the personal information of second user and the facial information of second user, and by internet to second user personal information and second user facial information carry out matching verify whether it is consistent, if matching is consistent, confirmation message is sent to first terminal;After first terminal obtains confirmation message, the interim facial information record of active user is obtained, and interim facial information match with first user's facial information associated in two dimensional code and is verified whether unanimously, if unanimously, sending authorized order to second terminal;After second terminal obtains authorized order, obtains and show personal information.

Description

A kind of personal information data query interaction authorization method
Technical field
The present invention relates to information inquiry field more particularly to a kind of personal information data query interaction authorization methods.
Background technique
Personal house property information belongs to than more sensitive individual privacy information, under normal circumstances not external disclosure, but certain It specific occasion at present can only be by consulting property ownership certificate as needed to disclose house property information to specific shareholder when house deal To realize.The approach for having official at this stage allows house property information of the public in internet checking under one's name, but none Allow the public to apply by mobile phone and oneself personal house property information is licensed to the method or process that designated person inquires in internet. Based on actual demand, the present invention proposes an authorizing information querying method based on recognition of face.
Summary of the invention
The present invention provides a kind of personal information data query interaction authorization methods, cannot pass through end to solve the prior art End is the technical issues of oneself personal information is licensed to designated person's inquiry by internet, so that personal information is associated in two dimension In code, and by user's facial information and personal information double verification, and then realizes and license to designated person's querying individual information While, guarantee user information safety.
In order to solve the above-mentioned technical problem, the embodiment of the invention provides a kind of personal information data query interaction authorized parties Method, comprising:
First terminal obtains the facial information of the first user and needs the personal information of external authorization query, and according to institute It states first user's facial information and the personal information generates two dimensional code;
After second terminal scans the two dimensional code progress data interaction, the second terminal obtains the personal letter of second user The facial information of breath and the second user, and by internet to the second user personal information and the second user face Portion's information carries out matching and verifies whether unanimously, if matching is consistent, sends confirmation message to the first terminal;
After the first terminal obtains the confirmation message, the interim facial information record of active user is obtained, and by institute It states interim facial information and match with first user's facial information associated in the two dimensional code and verify whether unanimously, if one It causes, then sends authorized order to the second terminal;
After the second terminal obtains the authorized order, obtains and show the personal information.
Preferably, the facial information that the first terminal obtains the first user needs the individual of external authorization query Information, and two dimensional code is generated according to the first user facial information and the personal information, comprising:
The first terminal acquisition obtains and records the face information of first user;
The first terminal acquisition obtains and records the personal information for needing first user of external authorization query;
After the first terminal obtains the generation instruction issued by first user, according to the face of first user Information and the personal information of first user generate two dimensional code, the two dimensional code be associated with first user face information and The personal information of first user;
The first terminal sends the two dimensional code to the second terminal.
Preferably, after the second terminal scans the two dimensional code progress data interaction, the second terminal is obtained The personal information of second user and the facial information of the second user are taken, and the second user individual is believed by internet Breath and the second user facial information carry out matching verify whether it is consistent, if matching unanimously, to the first terminal transmission Confirmation message, comprising:
After the second terminal scans the two dimensional code progress data interaction, the address information and jump of the two dimensional code are obtained Turn request, jumps into personal information user interface;
The second terminal obtains the personal information that the second user is inputted in the personal information user interface, with And acquisition obtains and records the facial information of the second user;
The second terminal is by internet checking connectivity application face recognition technology to the second user personal information Matching is carried out with the second user facial information and verifies whether consistent, if matching is consistent, is sent really to the first terminal Recognize information.
Preferably, the content that the content of the confirmation message includes the name of the second user, needs to inquire Abstract and sending time.
Preferably, after the first terminal obtains the confirmation message, the interim face letter of active user is obtained Breath, and the interim facial information match verifying whether with first user's facial information associated in the two dimensional code Unanimously, if unanimously, sending authorized order to the second terminal, comprising:
After the first terminal obtains the confirmation message, display judges interface to receive the same of the first user sending Mean to enable or refuse instruction;
After the first terminal gets the agreement instruction that first user issues, acquisition obtains and records current use The interim facial information at family;
The first terminal application face recognition technology is to associated in the interim facial information and the two dimensional code First user's facial information carries out matching and verifies whether unanimously, if unanimously, sending authorized order to the second terminal.
Preferably, the face recognition technology includes AI algorithm, face recognition algorithms and neural network algorithm.
Preferably, the personal information of the second user includes the name and identification card number of the second user Code.
Preferably, the first terminal and the second terminal are smart phone, plate electricity with camera Brain and computer.
Preferably, one instruction action of the first terminal and the every execution of the second terminal generates corresponding Operation log recording, and be stored in and be locally stored in module accordingly, or stored the operation log recording by internet In Cloud Server.
Preferably, the first terminal carry out matching verification result it is inconsistent when, signal an alert;Described Two terminals carry out matching verification result it is inconsistent when, signal an alert simultaneously to the first terminal send warning information.
Compared with the prior art, the embodiment of the present invention has the following beneficial effects:
1, personal information is associated in two dimensional code by the method for the present invention, and dual by user's facial information and personal information Verifying, the technology that oneself personal information licenses to designated person's inquiry cannot be asked in internet by terminal by solving the prior art Topic, to guarantee user information safety while realization licenses to designated person's querying individual information.
2, matching verifying is carried out to user's facial information by using face recognition technology, the standard of face recognition can be improved Exactness.
3, by log recording and save to each execute instruction, when operation when the error occurs, inquiry can be passed through Log recording finds the source of problem, so that operating process traceableization.
4, when terminal authentication matching is inconsistent, corresponding warning information is issued, can be reinforced to userspersonal information's Protection, guarantees the safety of information.
Detailed description of the invention
Fig. 1: for the method step flow diagram in the embodiment of the present invention;
Fig. 2: for the flow diagram of the step S1 in the embodiment of the present invention;
Fig. 3: for the flow diagram of the step S2 in the embodiment of the present invention;
Fig. 4: for the flow diagram of the step S3 in the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Inquire field in information, scan the two-dimensional code obtain information using very extensive, but lack authorization query mechanism, no Specific people can be licensed to during inquiry and checks information, lead to disclose two dimensional code being equivalent to disclose to owner Information.In payment technical field, although the authority to pay based on biological characteristic and two dimensional code is using very extensive, beneficiary input receipts The money amount of money and after scanning the payment two dimensional code that payer is shown, can directly transfer the money of payer the account of beneficiary Number, authority to pay mechanism is lacked in payment process.
To sum up, the invention proposes a kind of personal information data query interaction authorization methods.
Embodiment one
Fig. 1 is please referred to, the preferred embodiment of the present invention provides a kind of personal information data query interaction authorization method, packet It includes:
S1, first terminal obtain the facial information of the first user and need the personal information of external authorization query, and root Two dimensional code is generated according to the first user facial information and the personal information;
S2, after second terminal scans the two dimensional code progress data interaction, the second terminal obtains of second user The facial information of people's information and the second user, and the second user personal information and described second are used by internet Family facial information carries out matching and verifies whether unanimously, if matching is consistent, sends confirmation message to the first terminal;
S3 after the first terminal obtains the confirmation message, obtains the interim facial information record of active user, and will The interim facial information, which match with first user's facial information associated in the two dimensional code, to be verified whether unanimously, if Unanimously, then authorized order is sent to the second terminal;
S4 is obtained after the second terminal obtains the authorized order and is shown the personal information.
The present embodiment by the way that personal information is associated in two dimensional code, and by user's facial information and personal information it is dual Verifying, the technology that oneself personal information licenses to designated person's inquiry cannot be asked in internet by terminal by solving the prior art Topic, to guarantee user information safety while realization licenses to designated person's querying individual information.
Embodiment two
Referring to figure 2., in the present embodiment, the step S1 includes:
S11, the first terminal acquisition obtain and record the face information of first user;
S12, the first terminal acquisition obtain and record the personal letter for first user for needing external authorization query Breath;
S13, after the first terminal obtains the generation instruction issued by first user, according to first user's Face information and the personal information of first user generate two dimensional code, and the two dimensional code is associated with the face letter of first user The personal information of breath and first user;
S14, the first terminal send the two dimensional code to the second terminal.
Embodiment three
Referring to figure 3., in the present embodiment, the step S2 includes:
S21 obtains the address information of the two dimensional code after the second terminal scans the two dimensional code progress data interaction And jump request, it jumps into personal information user interface;
S22, the second terminal obtain the personal information that the second user is inputted in the personal information user interface, And acquisition obtains and records the facial information of the second user;
S23, the second terminal are personal to the second user by internet checking connectivity application face recognition technology Information and the second user facial information carry out matching verify whether it is consistent, if matching is consistent, to first terminal hair Send confirmation message.
In the present embodiment, the content that the content of the confirmation message includes the name of the second user, needs to inquire Abstract and sending time.
In the present embodiment, the face recognition technology includes AI algorithm, face recognition algorithms and neural network algorithm.It is logical It crosses and matching verifying is carried out to user's facial information using face recognition technology, the accuracy of face recognition can be improved.
Example IV
Referring to figure 4., in the present embodiment, the step S3 includes:
S31, after the first terminal obtains the confirmation message, display judges interface to receive first user and issue Agreement instruction or refusal instruction;
S32, after the first terminal gets the agreement instruction that first user issues, acquisition, which is obtained and recorded, works as The interim facial information of preceding user;
S33, the first terminal application face recognition technology in the interim facial information and the two dimensional code to being closed First user's facial information of connection carries out matching and verifies whether unanimously, if unanimously, sending authorized order to the second terminal.
In the present embodiment, the face recognition technology includes AI algorithm, face recognition algorithms and neural network algorithm.It is logical It crosses and matching verifying is carried out to user's facial information using face recognition technology, the accuracy of face recognition can be improved.
Embodiment five
In the present embodiment, one instruction action of the first terminal and the every execution of the second terminal generates corresponding Operation log recording, and be stored in and be locally stored in module accordingly, or stored the operation log recording by internet In Cloud Server.
The present embodiment by log recording and save to each execute instruction, when operation when the error occurs, Ke Yitong The source that inquiry log record finds problem is crossed, so that operating process traceableization.
Embodiment six
In the present embodiment, the first terminal carry out matching verification result it is inconsistent when, signal an alert;Described Two terminals carry out matching verification result it is inconsistent when, signal an alert simultaneously to the first terminal send warning information.
The present embodiment issues corresponding warning information, can reinforce to individual subscriber when terminal authentication matching is inconsistent The protection of information guarantees the safety of information.
It should be understood that in the above embodiment, the personal information of the second user includes the second user Name and ID card No..
It should be understood that in the above embodiment, the first terminal and the second terminal are with camera Smart phone, tablet computer and computer.
Below with reference to one of embodiment, the present invention is described in detail.
Firstly, after face information of the information providing (calling provider in the following text) using the equipment such as mobile phone acquisition provider, search It needs the information of external authorization query and generates an authorization query two dimensional code, this inquiry two dimensional code is associated with the people of provider The information of face information and authorization query;Second, information issuer (calling issuer in the following text) scans the two dimensional code using equipment such as mobile phones Afterwards, oneself name, ID card No. and the face information that issuer is obtained using equipment, equipment application recognition of face skill are inputted Art checks whether the face information of current typing matches with the personal information of input;Third, the face information of current typing and defeated After the personal information confirmation matching entered, equipment sends messages to provider and is confirmed whether that licensing to issuer consults the information;Most Afterwards, if provider agrees to, the inquiry associated face of two dimensional code is checked after the face information of provider is obtained using equipment such as mobile phones Whether information is consistent, and issuer can check information disclosed in above-mentioned authorization if consistent.
Step 1: information providing (calling " provider " in the following text) obtains by equipment such as mobile phones and records face information;
Step 2: provider searches for the information for needing external authorization query;(information searched for here does not refer to government system singly In information, can be the information of any group or individual demand authorization query)
Step 3: provider, which clicks, generates inquiry two dimensional code, which is associated with the face information of provider and awards Weigh the information that can be inquired;
Step 4: provider shares the inquiry two dimensional code;
Step 5: information issuer (calling " issuer " in the following text) scans the inquiry two dimensional code of provider by equipment such as mobile phones;
Step 6: issuer inputs the personal information such as name, ID card No. by equipment such as mobile phones;
Step 7: issuer is obtained and is recorded my face information by equipment such as mobile phones;
Step 8: equipment is verified whether and is inputted by the face information using face recognition technology inspection issuer's typing Personal information matching;(issuer does not need the resident information system for being directly connected to public security bureau, and Internet company pair can be used " the face core body " interface of outer offer is realized, such as this interface http://ai.baidu.com/docs#/Face- PersonVerify-V3/top? qq-pf-to=pcqq.c2c, the equipment of issuer can scrutineers as long as it can connect internet Whether face information has matched with personal information)
Step 9: after the face information of issuer's typing and the personal information inspection result of input are matching, equipment will be sent Information (message content includes the name of issuer, needs synopsis, the query time inquired etc.) is to the equipment of provider;If It matches inconsistent, then terminates process.
Step 10: after provider receives information, if agreeing to that the inquiry of authorization query side continues to operate in next step, otherwise terminating Process;
Step 11: provider obtains using equipment such as mobile phones and records my face information;
Step 12: equipment is associated by the face information and inquiry two dimensional code for checking provider using face recognition technology Whether face information is consistent, if unanimously, issuer can check that provider authorizes disclosed information to terminate if inconsistent Process.
Step 13: issuer checks that provider authorizes disclosed information.
Particular embodiments described above has carried out further the purpose of the present invention, technical scheme and beneficial effects It is described in detail, it should be understood that the above is only a specific embodiment of the present invention, the protection being not intended to limit the present invention Range.It particularly points out, to those skilled in the art, all within the spirits and principles of the present invention, that is done any repairs Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of personal information data query interaction authorization method characterized by comprising
First terminal obtains the facial information of the first user and needs the personal information of external authorization query, and according to described the One user's facial information and the personal information generate two dimensional code;
Second terminal scans after the two dimensional code carries out data interaction, the second terminal obtain second user personal information and The facial information of the second user, and the second user personal information and the second user face are believed by internet Breath carries out matching and verifies whether unanimously, if matching is consistent, sends confirmation message to the first terminal;
After the first terminal obtains the confirmation message, the interim facial information record of active user is obtained, and is faced described When facial information match with first user's facial information associated in the two dimensional code and verify whether unanimously, if unanimously, Then authorized order is sent to the second terminal;
After the second terminal obtains the authorized order, obtains and show the personal information.
2. the method as described in claim 1, which is characterized in that the facial information that the first terminal obtains the first user needs The personal information of external authorization query, and two dimensional code, packet are generated according to the first user facial information and the personal information It includes:
The first terminal acquisition obtains and records the face information of first user;
The first terminal acquisition obtains and records the personal information for needing first user of external authorization query;
After the first terminal obtains the generation instruction issued by first user, according to the face information of first user Two dimensional code is generated with the personal information of first user, and the two dimensional code is associated with the face information of first user and described The personal information of first user;
The first terminal sends the two dimensional code to the second terminal.
3. the method as described in claim 1, which is characterized in that the second terminal scans the two dimensional code and carries out data interaction Afterwards, the second terminal obtains the personal information of second user and the facial information of the second user, and passes through internet pair The second user personal information and the second user facial information carry out matching verify whether it is consistent, if matching is unanimously, Confirmation message is sent to the first terminal, comprising:
After the second terminal scans the two dimensional code progress data interaction, obtains the address information of the two dimensional code and jump and ask It asks, jumps into personal information user interface;
The second terminal obtains the personal information that the second user is inputted in the personal information user interface, and, it adopts Collection obtains and records the facial information of the second user;
The second terminal is by internet checking connectivity application face recognition technology to the second user personal information and institute It states second user facial information and carries out matching and verify whether consistent, if matching is consistent, send confirmation letter to the first terminal Breath.
4. method as claimed in claim 3, which is characterized in that the content of the confirmation message includes the surname of the second user Name, the synopsis for needing to inquire and sending time.
5. the method as described in claim 1, which is characterized in that after the first terminal obtains the confirmation message, acquisition is worked as The interim facial information of preceding user, and the first user face associated in the interim facial information and the two dimensional code is believed Breath carries out matching and verifies whether unanimously, if unanimously, sending authorized order to the second terminal, comprising:
After the first terminal obtains the confirmation message, display judges interface to receive same the meaning of the first user sending It enables or refusal instructs;
After the first terminal gets the agreement instruction that first user issues, acquisition obtains and records active user's Interim facial information;
The first terminal application face recognition technology is in the interim facial information and the two dimensional code associated first User's facial information carries out matching and verifies whether unanimously, if unanimously, sending authorized order to the second terminal.
6. such as claim 3 or the described in any item methods of claim 5, which is characterized in that the face recognition technology includes AI algorithm, face recognition algorithms and neural network algorithm.
7. the method as described in claim 1, which is characterized in that the personal information of the second user includes the second user Name and ID card No..
8. the method as described in claim 1, which is characterized in that the first terminal and the second terminal is with cameras Smart phone, tablet computer and computer.
9. the method as described in claim 1, which is characterized in that the first terminal and the second terminal one finger of every execution Order movement generates corresponding operation log recording, and is stored in and is locally stored in module accordingly, or passes through internet for institute Operation log recording is stated to be stored in Cloud Server.
10. the method as described in claim 1, which is characterized in that the first terminal carry out matching verification result it is inconsistent when, Signal an alert;The second terminal carry out matching verification result it is inconsistent when, signal an alert simultaneously to it is described first eventually End sends warning information.
CN201910142816.0A 2019-02-26 2019-02-26 Personal information data query interactive authorization method Active CN109934009B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910142816.0A CN109934009B (en) 2019-02-26 2019-02-26 Personal information data query interactive authorization method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910142816.0A CN109934009B (en) 2019-02-26 2019-02-26 Personal information data query interactive authorization method

Publications (2)

Publication Number Publication Date
CN109934009A true CN109934009A (en) 2019-06-25
CN109934009B CN109934009B (en) 2023-02-21

Family

ID=66985978

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910142816.0A Active CN109934009B (en) 2019-02-26 2019-02-26 Personal information data query interactive authorization method

Country Status (1)

Country Link
CN (1) CN109934009B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111131263A (en) * 2019-12-26 2020-05-08 支付宝(杭州)信息技术有限公司 Data viewing method and device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070147274A1 (en) * 2005-12-22 2007-06-28 Vasa Yojak H Personal information management using content with embedded personal information manager data
CN101631138A (en) * 2008-07-18 2010-01-20 深圳富泰宏精密工业有限公司 Personal information agent system and personal information agent method
CN104253784A (en) * 2013-06-25 2014-12-31 腾讯科技(深圳)有限公司 Logging and authorization method and system
US9338164B1 (en) * 2014-04-14 2016-05-10 Symantec Corporation Two-way authentication using two-dimensional codes
US20170083931A1 (en) * 2015-09-22 2017-03-23 Yahoo! Inc. Method and system for sharing personal information with web sites
CN107067227A (en) * 2017-03-29 2017-08-18 重庆厚盾安全技术有限公司 HRMS based on Quick Response Code
CN107944291A (en) * 2017-11-15 2018-04-20 深圳忠信信息技术有限公司 Information acquisition method, system and computer-readable recording medium
CN108021820A (en) * 2017-11-15 2018-05-11 深圳忠信信息技术有限公司 Information protecting method, system and computer-readable recording medium
CN108090181A (en) * 2017-12-15 2018-05-29 深圳忠信信息技术有限公司 Personal information method for pushing and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070147274A1 (en) * 2005-12-22 2007-06-28 Vasa Yojak H Personal information management using content with embedded personal information manager data
CN101631138A (en) * 2008-07-18 2010-01-20 深圳富泰宏精密工业有限公司 Personal information agent system and personal information agent method
CN104253784A (en) * 2013-06-25 2014-12-31 腾讯科技(深圳)有限公司 Logging and authorization method and system
US9338164B1 (en) * 2014-04-14 2016-05-10 Symantec Corporation Two-way authentication using two-dimensional codes
US20170083931A1 (en) * 2015-09-22 2017-03-23 Yahoo! Inc. Method and system for sharing personal information with web sites
CN107067227A (en) * 2017-03-29 2017-08-18 重庆厚盾安全技术有限公司 HRMS based on Quick Response Code
CN107944291A (en) * 2017-11-15 2018-04-20 深圳忠信信息技术有限公司 Information acquisition method, system and computer-readable recording medium
CN108021820A (en) * 2017-11-15 2018-05-11 深圳忠信信息技术有限公司 Information protecting method, system and computer-readable recording medium
CN108090181A (en) * 2017-12-15 2018-05-29 深圳忠信信息技术有限公司 Personal information method for pushing and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111131263A (en) * 2019-12-26 2020-05-08 支付宝(杭州)信息技术有限公司 Data viewing method and device

Also Published As

Publication number Publication date
CN109934009B (en) 2023-02-21

Similar Documents

Publication Publication Date Title
US9864987B2 (en) Account provisioning authentication
CN106357644B (en) Identity identifying method, system and server based on block chain network
CN1292353C (en) Secret and safe financial trade system and method
WO2020073491A1 (en) Blockchain-based supply chain payment method, payment collection method, device, apparatus, and medium
JP6046765B2 (en) System and method enabling multi-party and multi-level authorization to access confidential information
WO2020108046A1 (en) Cross-block chain interaction method and system, computer device, and storage medium
US10235672B2 (en) Securely receiving from a remote user sensitive information and authorization to perform a transaction using the sensitive information
US10579996B2 (en) Presenting a document to a remote user to obtain authorization from the user
US20090106138A1 (en) Transaction authentication over independent network
KR102119449B1 (en) Aggregation open api platform system, method for prividing financial services using the same and computer program for the same
CN108989346A (en) The effective identity trustship agility of third party based on account concealment authenticates access module
US11159321B2 (en) Digital notarization using a biometric identification service
US10489565B2 (en) Compromise alert and reissuance
CN110770774A (en) Authentication and encryption scheme in data storage
JP2003337802A (en) Storage device for distributed information, and authentication and authorization system
CN113128950B (en) Enterprise chain code service platform
CN115277122A (en) Cross-border data flow and supervision system based on block chain
KR20180029227A (en) Security and user authentication for electronic transactions
US9177126B2 (en) System and method for human identity validation via a mobile device
CN104935550A (en) Intelligent electronic commerce user management system technique and operating method thereof
CA3183183A1 (en) System and method for facilitating transfer of electronic payment information
CN117151736A (en) Anti-electricity fraud management early warning method and system
CN109934009A (en) A kind of personal information data query interaction authorization method
JP6707607B2 (en) System and method for enhancing online user authentication using a personal cloud platform
Bilal et al. Trust & Security issues in Mobile banking and its effect on Customers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230620

Address after: 510030 West, 19th floor, No. 300, Dongfeng Middle Road, Hongqiao street, Yuexiu District, Guangzhou, Guangdong

Patentee after: Guangzhou Urban Planning Technology Development Service Co.,Ltd.

Patentee after: Guangzhou planning and natural resources Automation Center (Guangzhou Basic Geographic Information Center)

Address before: Room 805, No. 19-2, Guangwei Road, Yuexiu District, Guangzhou, Guangdong 510030

Patentee before: GUANGZHOU URBAN PLANNING TECHNOLOGY DEVELOPMENT AND SERVICES STATE-OWNED ENTERPRISE

Patentee before: GUANGZHOU URBAN PLANNING AUTOMATION CENTER

TR01 Transfer of patent right