CN110932869A - Method, device and equipment for certificate real-name authentication - Google Patents

Method, device and equipment for certificate real-name authentication Download PDF

Info

Publication number
CN110932869A
CN110932869A CN201911214747.6A CN201911214747A CN110932869A CN 110932869 A CN110932869 A CN 110932869A CN 201911214747 A CN201911214747 A CN 201911214747A CN 110932869 A CN110932869 A CN 110932869A
Authority
CN
China
Prior art keywords
certificate
user
bound
information
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911214747.6A
Other languages
Chinese (zh)
Inventor
刘泽明
谭晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Heyou Spacetime Technology Co Ltd
Original Assignee
Beijing Heyou Spacetime Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Heyou Spacetime Technology Co Ltd filed Critical Beijing Heyou Spacetime Technology Co Ltd
Priority to CN201911214747.6A priority Critical patent/CN110932869A/en
Publication of CN110932869A publication Critical patent/CN110932869A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a method, a device and equipment for real-name certificate authentication, which are applied to the technical field of information management, wherein the method for real-name certificate authentication comprises the steps of obtaining authentication information of a certificate, obtaining identity information of a user to be bound, and establishing an affiliated relationship between the authentication information and the identity information so as to bind the authentication information and the identity information.

Description

Method, device and equipment for certificate real-name authentication
Technical Field
The invention relates to the technical field of information management, in particular to a method, a device and equipment for real-name certificate authentication.
Background
The certificate is the proof about academic, skill and physical value obtained by people in learning, working and life, and comprises a academic certificate, a professional certificate, a jewelry appraisal certificate and the like. Taking a jewelry identification certificate as an example, the jewelry identification certificate has the function of displaying identification information such as jewelry materials and the like to a consumer, usually, the consumer obtains relevant information of the certificate in an online inquiry mode, but the display mode of the online inquiry certificate is presented in a webpage mode, and the consumer can only obtain the relevant information of jewelry and cannot contact with a jewelry owner.
Disclosure of Invention
In view of the above, the present invention provides a method, an apparatus, and a device for real-name authentication of a certificate, in order to overcome at least some of the problems in the related art.
In order to solve the technical problems, the invention adopts the following technical scheme:
in a first aspect, a method for real-name certificate authentication includes:
acquiring authentication information of a certificate;
acquiring identity information of a user to be bound;
and establishing the affiliated relationship between the authentication information and the identity information so as to bind the authentication information and the identity information.
Optionally, before the binding the authentication information and the identity information, the method further includes:
determining whether the certificate has been bound;
and if so, unbinding the certificate and the bound user.
Optionally, the unbinding the certificate from the bound user includes:
acquiring a change request sent by the user to be bound;
determining the user with the bound certificate according to the change request;
sending unbinding information to the bound user to unbind the certificate by the bound user.
Optionally, the unbinding the certificate from the bound user includes:
obtaining a complaint request sent by a user, wherein the complaint request comprises a purchase voucher and a change request;
and sending the complaint request to an auditor so as to unbind the certificate when the auditor determines that the purchase voucher belongs to real time.
Optionally, the obtaining authentication information of the certificate includes:
acquiring query information sent by a user to be bound;
and determining the authentication information of the certificate according to the query information.
Optionally, the query information is the number of the certificate or a two-dimensional code including the number of the certificate and a website of the certificate.
Optionally, before obtaining the identity information of the user to be bound, the method further includes:
acquiring a mobile phone number of a user to be bound;
registering according to the mobile phone number to obtain account information of the user to be bound;
and acquiring the identity information of the user to be bound, and adding the identity information into the account information.
Optionally, the identity information includes a name and an identification number of the user to be bound.
In a second aspect, an apparatus for real-name certificate authentication includes:
the first acquisition module is used for acquiring the authentication information of the certificate;
the second acquisition module is used for acquiring the identity information of the user to be bound;
and the binding module is used for establishing the affiliated relationship between the authentication information and the identity information so as to bind the authentication information and the identity information.
In a third aspect, an apparatus for real-name certificate authentication includes:
a processor, and a memory coupled to the processor;
the memory is used for storing a computer program;
the processor is configured to invoke and execute the computer program in the memory to perform the method of certificate real-name authentication according to the first aspect.
In a fourth aspect, a storage medium stores a computer program which, when executed by a processor, implements a method of real-name authentication of a certificate according to any one of the first aspect of the present invention.
By adopting the technical scheme, the invention can realize the following technical effects: according to the method and the device, the authentication information of the certificate and the identity information of the user to be bound are acquired, the affiliation of the authentication information and the identity information is established, and the authentication information and the identity information are bound, so that the user can acquire the information of the person owning the certificate while inquiring the certificate, and if the owner needs to be contacted, the owner can be directly contacted through the owner information acquired after inquiring the certificate, the user can inquire conveniently, and the user can share the certificate conveniently.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating a method for real-name certificate authentication according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a method for real-name certificate authentication according to another embodiment of the present invention;
fig. 3 is a schematic structural diagram of an apparatus for real-name certificate authentication according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a device for real-name certificate authentication according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without any inventive step, are within the scope of the present invention.
Examples
Fig. 1 is a flowchart illustrating a method for real-name certificate authentication according to an embodiment of the present invention. As shown in fig. 1, the present embodiment provides a method for authenticating a certificate with a real name, including:
step 101, obtaining authentication information of a certificate;
in some embodiments, the authentication information of the certificate includes a scanned part of the original certificate, a certificate number, a certificate source, and the like. The source of the certificate may be the web address from which the certificate was obtained.
102, acquiring identity information of a user to be bound;
in some embodiments, the user to be bound is a person having the above certificate, and the identity information includes name, gender, contact information, identification number, and the like.
It can be understood that, the acquiring portions of step 101 and step 102 are in order, and may acquire the authentication information first, or may acquire the identity information first.
And 103, establishing the affiliated relationship between the authentication information and the identity information so as to bind the authentication information and the identity information.
According to the method and the device, the authentication information of the certificate and the identity information of the user to be bound are acquired, the affiliation of the authentication information and the identity information is established, and the authentication information and the identity information are bound, so that the user can acquire the information of the person owning the certificate while inquiring the certificate, and if the owner needs to be contacted, the owner can be directly contacted through the owner information acquired after inquiring the certificate, the user can inquire conveniently, and the user can share the certificate conveniently.
Fig. 2 is a flowchart illustrating a method for real-name certificate authentication according to another embodiment of the present invention. As shown in fig. 2, this embodiment takes a certificate as an example of a jewelry authentication certificate, and provides a method for real-name authentication of a certificate, which includes:
step 201, obtaining authentication information of a certificate;
in some embodiments, the authentication information of the certificate includes a scanned part of the original certificate, a certificate number, a certificate source, and the like. The source of the certificate may be the web address from which the certificate was obtained.
In some embodiments, the obtaining the authentication information of the certificate specifically includes:
acquiring query information sent by a user to be bound; and determining the authentication information of the certificate according to the query information.
The inquiry information is the serial number of the certificate or a two-dimensional code comprising the serial number of the certificate and the website of the certificate. Usually, the jewelry identification certificate is stored in a management system, and in the process of identifying jewelry or other precious metals and gemstones by an identification mechanism, the identification result detected by an identification instrument is input into the management system, and the identification information is published on line while printing a paper certificate. A certificate is issued for a jewelry appraisal, and the information of the appraisal is kept on line. By utilizing the technology that one certificate corresponds to one two-dimensional code, a user can check the identification result of the jewelry on line by scanning the two-dimensional code on the certificate. In particular, the certificate is stored in a database, and the user can directly input the certificate code in a search box of the management system. The management system can also generate a two-dimensional code for the webpage of each certificate, and when a user wants to inquire, the user directly scans the two-dimensional code to obtain related information.
It can be understood that if a certificate of the user wants to be bound with information of the user, the user needs to register an account and add the information into the account, and in some embodiments, the step of registering the account is provided, which is specifically as follows:
step 202, acquiring a mobile phone number of a user to be bound;
step 203, registering according to the mobile phone number to obtain account information of the user to be bound;
the method includes that account information is registered according to a mobile phone number by some common means, a user firstly inputs the mobile phone number, then obtains a corresponding check code, and inputs an account password after the check is successful, so that account registration is successful.
And 204, acquiring the identity information of the user to be bound, and adding the identity information into the account information.
After the account registration is successful, the user can add the own identity information into the affiliated account information so as to perfect the account information.
When binding is carried out by a user, the identity information of the user can be acquired through a login account.
In some embodiments, the user to be bound is a person having the above certificate, and the identity information includes name, gender, contact information, identification number, and the like. The identity information is obtained after logging in an account.
Step 205, judging whether the certificate is bound;
and step 206, if so, unbinding the certificate and the bound user.
In some embodiments, there is a jewelry transfer situation, a belonger before a jewelry is bound first, and a user to be bound cannot be bound successfully when the user to be bound performs a binding operation, and at this time, the belonger before contact needs to be unbound first, and then the user to be bound binds.
Specifically, the previous operation of unbinding by the belonger may be: the management system confirms the short message sent by the previous mobile phone number of the attribution person, the previous attribution person clicks the short message link to enter the unbinding page, and after logging in by using the mobile phone number, the unbinding is confirmed.
The method specifically comprises the following steps:
acquiring a change request sent by the user to be bound;
determining the user with the bound certificate according to the change request;
sending unbinding information to the bound user to unbind the certificate by the bound user.
In some embodiments, there may be a case where the previous owner information is incomplete, the previous owner cannot be contacted, or the jewelry identification certificate is not bound to the user, at this time, the user to be bound needs to submit a complaint in the management system, the system administrator offline contacts the previous owner, if the contact is successful, the previous owner performs the unbinding operation, and if the user to be bound is not contacted, the administrator needs to upload information such as jewelry materials, certificate photos, invoices, and the like, and then the information is processed by the administrator.
The method specifically comprises the following steps:
obtaining a complaint request sent by a user, wherein the complaint request comprises a purchase voucher and a change request;
and sending the complaint request to an auditor so as to unbind the certificate when the auditor determines that the purchase voucher belongs to real time.
In some embodiments, each bound user is also stored so that subsequent queries can view each transfer record to provide transfer vouchers.
Step 207, establishing the affiliation of the authentication information and the identity information to bind the authentication information and the identity information.
According to the method and the device, the authentication information of the certificate and the identity information of the user to be bound are acquired, the affiliation of the authentication information and the identity information is established, and the authentication information and the identity information are bound, so that the user can acquire the information of the person owning the certificate while inquiring the certificate, and if the owner needs to be contacted, the owner can be directly contacted through the owner information acquired after inquiring the certificate, a transfer certificate is provided for the user, the user can inquire conveniently, and the user sharing is facilitated.
Fig. 3 is a schematic structural diagram of an apparatus for real-name certificate authentication according to an embodiment of the present invention. As shown in fig. 3, the present embodiment provides an apparatus for real-name certificate authentication, including:
a first obtaining module 301, configured to obtain authentication information of a certificate;
a second obtaining module 302, configured to obtain identity information of a user to be bound;
a binding module 303, configured to establish an affiliation between the authentication information and the identity information, so as to bind the authentication information and the identity information.
According to the method and the device, the authentication information of the certificate and the identity information of the user to be bound are acquired, the affiliation of the authentication information and the identity information is established, and the authentication information and the identity information are bound, so that the user can acquire the information of the person owning the certificate while inquiring the certificate, and if the owner needs to be contacted, the owner can be directly contacted through the owner information acquired after inquiring the certificate, a transfer certificate is provided for the user, the user can inquire conveniently, and the user sharing is facilitated.
For a specific implementation of this embodiment, reference may be made to the method for certificate real-name authentication and the related description in the method embodiment described in the foregoing embodiment, and details are not described here again.
Fig. 4 is a schematic structural diagram of an apparatus for real-name certificate authentication according to an embodiment of the present application. Referring to fig. 4, an embodiment of the present application provides an apparatus for certificate real-name authentication, including:
a processor 401, and a memory 402 connected to the processor;
the memory 402 is used to store computer programs;
the processor 401 is adapted to invoke and execute computer programs in the memory 402 to perform the method of certificate real-name authentication as in the above-described embodiments.
For a specific implementation of this embodiment, reference may be made to the method for certificate real-name authentication and the related description in the method embodiment described in the foregoing embodiment, and details are not described here again.
An embodiment of the present invention provides a storage medium, where a computer program is stored, and when the computer program is executed by a processor, the steps in the method, such as certificate real-name authentication, are implemented.
For a specific implementation of this embodiment, reference may be made to the related description in the above method embodiment for certificate real-name authentication, which is not described herein again.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that the terms "first," "second," and the like in the description of the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present invention, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by suitable instruction execution devices. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (10)

1. A method of certificate real-name authentication, comprising:
acquiring authentication information of a certificate;
acquiring identity information of a user to be bound;
and establishing the affiliated relationship between the authentication information and the identity information so as to bind the authentication information and the identity information.
2. The method according to claim 1, wherein before the establishing the affiliation between the authentication information and the identity information, further comprising:
determining whether the certificate has been bound;
and if so, unbinding the certificate and the bound user.
3. The method of claim 2, wherein unbinding the certificate from the bound user comprises:
acquiring a change request sent by the user to be bound;
determining the user with the bound certificate according to the change request;
sending unbinding information to the bound user to unbind the certificate by the bound user.
4. The method of claim 2, wherein unbinding the certificate from the bound user comprises:
obtaining a complaint request sent by a user, wherein the complaint request comprises a purchase voucher and a change request;
and sending the complaint request to an auditor so as to unbind the certificate when the auditor determines that the purchase voucher belongs to real time.
5. The method of claim 1, wherein obtaining the authentication information of the certificate comprises:
acquiring query information sent by a user to be bound;
and determining the authentication information of the certificate according to the query information.
6. The method according to claim 5, wherein the query information is the number of the certificate or a two-dimensional code comprising the number of the certificate and a web address of the certificate.
7. The method according to claim 1, wherein before obtaining the identity information of the user to be bound, the method further comprises:
acquiring a mobile phone number of a user to be bound;
registering according to the mobile phone number to obtain account information of the user to be bound;
and acquiring the identity information of the user to be bound, and adding the identity information into the account information.
8. The method of claim 1, wherein the identity information comprises a name and an identification number of the user to be bound.
9. An apparatus for real name authentication of a certificate, comprising:
the first acquisition module is used for acquiring the authentication information of the certificate;
the second acquisition module is used for acquiring the identity information of the user to be bound;
and the binding module is used for establishing the affiliated relationship between the authentication information and the identity information so as to bind the authentication information and the identity information.
10. An apparatus for certificate real-name authentication, comprising:
a processor, and a memory coupled to the processor;
the memory is used for storing a computer program;
the processor is configured to invoke and execute the computer program in the memory to perform the method of any one of claims 1-8.
CN201911214747.6A 2019-12-02 2019-12-02 Method, device and equipment for certificate real-name authentication Pending CN110932869A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911214747.6A CN110932869A (en) 2019-12-02 2019-12-02 Method, device and equipment for certificate real-name authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911214747.6A CN110932869A (en) 2019-12-02 2019-12-02 Method, device and equipment for certificate real-name authentication

Publications (1)

Publication Number Publication Date
CN110932869A true CN110932869A (en) 2020-03-27

Family

ID=69847322

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911214747.6A Pending CN110932869A (en) 2019-12-02 2019-12-02 Method, device and equipment for certificate real-name authentication

Country Status (1)

Country Link
CN (1) CN110932869A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113129035A (en) * 2021-04-26 2021-07-16 北京金玖银玖数字科技有限公司 Gold product management method, device and system
CN114781414A (en) * 2022-03-17 2022-07-22 国家珠宝检测中心(广东)有限责任公司 Jewelry terminal machine and jewelry certificate self-service query method and storage medium thereof

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101034984A (en) * 2006-09-22 2007-09-12 北京国政通网络科技有限公司 Establishing the true identify database of the user with the personal information submitted by the user
CN101527634A (en) * 2008-12-31 2009-09-09 北京飞天诚信科技有限公司 System and method for binding account information with certificates
CN101741848A (en) * 2009-12-22 2010-06-16 北京九恒星科技股份有限公司 Method and system for binding digital certificate of system users and digital certificate authentication center
US20100319061A1 (en) * 2007-02-06 2010-12-16 Makoto Hatakeyama Personal information managing device, service providing device, program, personal information managing method, checking method and personal information checking system for falsification prevention of personal information and non repudiation of personal information circulation
CN103778502A (en) * 2012-12-03 2014-05-07 冯建中 Information certificate system and related operation method thereof
CN104680333A (en) * 2015-03-20 2015-06-03 北京汇萃通科技有限公司 Jewelry information gathering, managing and sharing platform
CN106204069A (en) * 2016-07-07 2016-12-07 立德高科(昆山)数码科技有限责任公司 Jewelry product source tracing method based on Quick Response Code
CN109033789A (en) * 2018-06-15 2018-12-18 北京文创园投资管理有限公司 A kind of generation method, the device and system of true warrant book
CN110427744A (en) * 2019-06-20 2019-11-08 中国科学院信息工程研究所 A kind of identity management method and system for supporting service security label

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101034984A (en) * 2006-09-22 2007-09-12 北京国政通网络科技有限公司 Establishing the true identify database of the user with the personal information submitted by the user
US20100319061A1 (en) * 2007-02-06 2010-12-16 Makoto Hatakeyama Personal information managing device, service providing device, program, personal information managing method, checking method and personal information checking system for falsification prevention of personal information and non repudiation of personal information circulation
CN101527634A (en) * 2008-12-31 2009-09-09 北京飞天诚信科技有限公司 System and method for binding account information with certificates
CN101741848A (en) * 2009-12-22 2010-06-16 北京九恒星科技股份有限公司 Method and system for binding digital certificate of system users and digital certificate authentication center
CN103778502A (en) * 2012-12-03 2014-05-07 冯建中 Information certificate system and related operation method thereof
CN104680333A (en) * 2015-03-20 2015-06-03 北京汇萃通科技有限公司 Jewelry information gathering, managing and sharing platform
CN106204069A (en) * 2016-07-07 2016-12-07 立德高科(昆山)数码科技有限责任公司 Jewelry product source tracing method based on Quick Response Code
CN109033789A (en) * 2018-06-15 2018-12-18 北京文创园投资管理有限公司 A kind of generation method, the device and system of true warrant book
CN110427744A (en) * 2019-06-20 2019-11-08 中国科学院信息工程研究所 A kind of identity management method and system for supporting service security label

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113129035A (en) * 2021-04-26 2021-07-16 北京金玖银玖数字科技有限公司 Gold product management method, device and system
CN114781414A (en) * 2022-03-17 2022-07-22 国家珠宝检测中心(广东)有限责任公司 Jewelry terminal machine and jewelry certificate self-service query method and storage medium thereof

Similar Documents

Publication Publication Date Title
RU2740702C2 (en) Automation of image verification
CN109472678B (en) Accounting book management method based on block chain, electronic device and readable storage medium
CN105530175A (en) Message processing method, device and system
CN109327312B (en) Authentication method and device and electronic equipment
CN105025081A (en) Methods, and apparatus to monitor mobile internet activity
JP2017531863A (en) Methods and devices for information interaction and association between human biological feature data and accounts
WO2016074574A1 (en) Method and device for interaction by scanning two-dimensional code
JP6980120B2 (en) Resource transfer methods, equipment, computer equipment and storage media
CN110932869A (en) Method, device and equipment for certificate real-name authentication
CN110933608A (en) Equipment registration terminal and method and electronic equipment
JP2015072702A (en) Data communication method
KR20180048011A (en) System and method for providing customer matching service
US20190362442A1 (en) System and method for prediction of email addresses of certain individuals and verification thereof
CN106384255A (en) Method and device for creating information code promotion information
CN109493198A (en) Service evaluation management method, device, system and evaluation server
CN108764861B (en) Information acquisition method and device and electronic equipment
CN109274681B (en) Information synchronization method and device, storage medium and server
CA2874708A1 (en) Systems, methods, and computer program products for providing offers to mobile wallets
US11238054B2 (en) Searching multiple data sources
JP2004318379A (en) Merger and acquisition support system
WO2016026309A1 (en) Comment message processing method and apparatus
CN106204261A (en) A kind of information processing method, terminal and server
KR20000050178A (en) The method and system to serve information classified by regions, through the internet
CN104394210A (en) Direction connection communication method and device
US9600782B2 (en) Mobile information processing terminal, social networking service system, server, and processing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200327