CN103532968A - Network access identity authentication method and system - Google Patents

Network access identity authentication method and system Download PDF

Info

Publication number
CN103532968A
CN103532968A CN201310503928.7A CN201310503928A CN103532968A CN 103532968 A CN103532968 A CN 103532968A CN 201310503928 A CN201310503928 A CN 201310503928A CN 103532968 A CN103532968 A CN 103532968A
Authority
CN
China
Prior art keywords
user
network access
exist
information
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310503928.7A
Other languages
Chinese (zh)
Other versions
CN103532968B (en
Inventor
姬绍东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201310503928.7A priority Critical patent/CN103532968B/en
Priority claimed from CN201310503928.7A external-priority patent/CN103532968B/en
Publication of CN103532968A publication Critical patent/CN103532968A/en
Application granted granted Critical
Publication of CN103532968B publication Critical patent/CN103532968B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a network access identity authentication method and a system. The method comprises the steps of acquiring fingerprint information of a user during network access of the user, matching the acquired fingerprint information with fingerprint information stored in a fingerprint cache system of a service operator, acquiring first user information corresponding to the fingerprint information from a third party fingerprinted database if matching fails, transmitting to the fingerprint cache system of the service operator for storage, checking whether illegal records exist in the first user information, acquiring second user information corresponding to the fingerprint information from the fingerprint cache system of the service operator if the matching succeeds, and checking whether the illegal records exist in the second user information. The method and the system solve the problem that authenticity of a second-generation ID (identity) card or other valid certificates are distinguished difficultly by a reader or in a manual verification mode; the imposture network access is effectively avoided; various fraud users and malice arrearage users are effectively intercepted from the network access and service handling again; and communication security is effectively ensured.

Description

Networking identity identifying method and system
Technical field
The present invention relates to field of information security technology, relate in particular to a kind of networking identity identifying method and system.
Background technology
Along with refuse messages, swindle note spread unchecked and mobile phone website is exposed repeatly because relating to yellow problem, the enforcement of mobile phone identification policy is imperative.When requiring Ge great operator to implement mobile phone networking, Qi, Ministry of Industry and Information carries out authentication in September, 2010.Implement mobile phone identification policy and be not only conducive to suppress the generation of the criminal offences such as short message fraud, and be convenient to be encroached on user and by legal means, safeguard the legitimate rights and interests of self.Thereby guarantee communication security, can carry out finance, mobile payment more smoothly.
At present, the mode that telecom operators carry out authentication when user newly networks or handles important service generally adopts second-generation ID card reader or manual examination and verification mode, when certificate is emitted the also impalpable true and false of used time reader by other people, and manual examination and verification mode also can there are differences when distinguishing, and adopt aforesaid way can not all kinds of swindles of timely and effective interception when carrying out authentication, user's networking and the problem of business handling such as malicious owing fee.
Summary of the invention
The invention provides a kind of networking identity identifying method and system, while being used for solving existing networking, generally adopt second-generation ID card reader or manual examination and verification mode, when certificate is emitted the used time reader impalpable true and false by other people, and manual examination and verification mode also can there are differences when distinguishing, and adopt aforesaid way can not all kinds of swindles of timely and effective interception when carrying out authentication, user's networking and the problem of business handling such as malicious owing fee.
The invention provides a kind of networking identity identifying method, comprising:
When user-network access, gather user's finger print information;
The finger print information of collection is mated with the finger print information of storing in service provider fingerprint caching system;
If do not mate, from third party's fingerprint database, obtain the first user information corresponding with described finger print information, and first user information is sent to the storage of service provider fingerprint caching system;
Check in described first user information whether have illegal record, if exist, refuse described user-network access, if do not exist, allow described user-network access;
If coupling is obtained second user profile corresponding with described finger print information from described service provider fingerprint caching system;
Check in described the second user profile whether have illegal record, if exist, refuse described user-network access, if do not exist, allow described user-network access.
The present invention also provides a kind of networking identity authorization system, comprising:
Acquisition module, for when the user-network access, gathers user's finger print information;
Matching module, mates for the finger print information that the finger print information of collection is stored with service provider fingerprint caching system;
Authentication module if for not mating, obtains the first user information corresponding with described finger print information from third party's fingerprint database, and first user information is sent to the storage of service provider fingerprint caching system; Check in described first user information whether have illegal record, if exist, refuse described user-network access, if do not exist, allow described user-network access; If coupling is obtained second user profile corresponding with described finger print information from described service provider fingerprint caching system; Check in described the second user profile whether have illegal record, if exist, refuse described user-network access, if do not exist, allow described user-network access.
The present invention is by when user-network access, according to the finger print information gathering, from service provider fingerprint caching system, obtain corresponding user profile, and store the user profile of obtaining in service provider fingerprint caching system from third party database, solved like this problem that China second-generation identity card or other perfect instruments adopt the impalpable true and false of reader or manual examination and verification mode, and effectively prevented that other people from assuming another's name to network and effectively tackling all kinds of swindles, malicious owing fee user's networking again and the situation generation of transacting business, effectively guaranteed communication security.
Accompanying drawing explanation
Fig. 1 is the flow chart of networking identity identifying method embodiment mono-provided by the invention;
Fig. 2 is the flow chart of networking identity identifying method embodiment bis-provided by the invention;
Fig. 3 is the structure chart of networking identity authorization system embodiment provided by the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only a part of embodiment of the present invention, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
As shown in Figure 1, the flow chart for networking identity identifying method embodiment mono-provided by the invention, comprises the following steps:
S101, when user-network access, gather user's finger print information;
User is handling while networking, and system is handled in networking that can decorrelation operating agency, and the fingerprint acquisition device by system configuration carries out fingerprint collecting.
S102, the finger print information of collection is mated with the finger print information of storing in service provider fingerprint caching system;
The finger print information of collection is mated with the finger print information of storing in service provider fingerprint caching system, determining the finger print information that whether has gathered finger print information in service provider fingerprint caching system, is that new user handles into network service to judge.If do not mate, the finger print information of not storing this user in service provider fingerprint caching system is described, this user performs step S103 for new networking user; If coupling, illustrates the finger print information that stores this user in service provider fingerprint caching system, this user is old user, execution step S105.
In addition, it should be noted that, service provider fingerprint caching system can regularly obtain the user profile corresponding with the user fingerprints of storing in fingerprint caching system from third party database, with the user profile of being stored in the service provider fingerprint caching system that upgrades in time, so that make judgement more accurately.
S103, from third party's fingerprint database, obtain the first user information corresponding with finger print information, and first user information is sent to the storage of service provider fingerprint caching system;
If have, in the finger print information of coupling, do not think that user is new networking user in service provider fingerprint caching system, from third party's fingerprint database, obtain the first user information corresponding with finger print information.Wherein third party's fingerprint database can be public security system fingerprint database, credit investigation system fingerprint database and competitor's fingerprint database; The second user profile is to come in person to handle the essential information of network service except comprising that the user's facial image binding together with finger print information, the telephone number that handle networking and identification card number etc. are convenient to further be confirmed whether, also comprises the relevant user's that the third party databases such as illegal record, loan documentation, arrearage record record information.
In S104, check first user information, whether there is illegal record;
Determine the illegal record of user that whether has third party's system maintenance in first user information, for example, when third party's fingerprint database is public security system fingerprint database, determine the illegal record of user that whether exists public security organ to safeguard in first user information, wherein, illegally record such as thinking criminal offence records such as being accused of note swindle, swindle; If determine the illegal record of user that does not exist public security organ to safeguard in first user information, perform step S107; If determine the illegal record of user that exists public security organ to safeguard in first user information, perform step S108.When third party's fingerprint database is credit investigation system fingerprint database, determine whether first user information deposits the illegal record of user of maintenance in the bank, wherein, illegal record is such as thinking that loan is expired not also, have the information such as illegal payment for goods record; If determine the illegal record of user that does not exist credit investigation system to safeguard in first user information, perform step S107, if determine the illegal record of user that exists credit investigation system to safeguard in first user information, execution step S108.When third party's fingerprint database is other competitor's system fingerprint databases, determine the illegal record of user whether first user information exists other competitor to safeguard, wherein, illegal record is such as thinking the information such as malicious owing fee, swindle note record; If determine the illegal record of user that does not have other competitor's system maintenance in first user information, perform step S107, if determine the illegal record of user that has other competitor's system maintenance in first user information, execution step S108.
It will be appreciated by persons skilled in the art that operator can come to determine which record belongs to illegal record according to demand, for example, the expired number of times of not going back of providing a loan surpasses the concrete numerical value that a preset value ,Er operator can determine this preset value voluntarily.
S105, from service provider fingerprint caching system, obtain second user profile corresponding with finger print information;
If the user fingerprints information gathering is mated with the finger print information of storing in service provider fingerprint caching system, determine it is that old user handles and again enters network service, for example, open new digit, New Account etc., further from service provider fingerprint caching system, obtain second user profile corresponding with finger print information.Wherein, the second user profile is to come in person to handle the essential information of network service except comprising that the user's facial image binding together with finger print information, the telephone number that handle networking and identification card number etc. are convenient to further be confirmed whether, also comprises that information that the relevant user's that service provider fingerprint caching system itself records information comprises the relevant user that business service condition information and telephone expenses use information etc. and third party database record is as information such as illegal record, loan documentation, arrearage records.
S106, check in the second user profile, whether there is illegal record;
For instance, if the validation of information such as user's facial image, the telephone number that handle networking and identification card number in the second user profile binding together with finger print information are not to come in person to handle into network service, determine that the second user profile is illegal record, performs step S108; If determine it is to come in person to handle into network service; further check the illegal record of user that whether exists service provider to safeguard in the second user profile, wherein the illegal record of user comprises that defaulting subscriber is gained international information platform telephone expenses by cheating by user, the malice of pin number or malice is gained malicious owing fee information and the pre-stored illegal records of the user who obtains from third party's fingerprint database such as roaming in other places telephone expenses by cheating.If do not exist, perform step S107; If exist, perform step S108.
In order to improve fail safe, in addition, because service provider fingerprint caching system is regularly to obtain the user profile corresponding with the user fingerprints of storing in fingerprint caching system from third party database, when user-network access, the user profile that service provider fingerprint caching system is stored may not be very complete, when the user who does not exist service provider to safeguard in determining the second user profile illegally records, can further from third party's fingerprint database, obtain three user profile corresponding with described finger print information, and the 3rd user profile is sent to the storage of service provider fingerprint caching system, further in check the 3rd user profile, whether there is illegal record, if do not exist, perform step S107, if exist, perform step S108.The user profile of storing in the information services operator fingerprint caching system corresponding with finger print information in like this can Real-time Obtaining third party fingerprint database, so that make judgement more accurately.Wherein third party's fingerprint database can be public security system fingerprint database, credit investigation system fingerprint database and competitor's fingerprint database; The 3rd user profile comprises the relevant user's that the third party databases such as illegal record, loan documentation record information.
S107, permission user-network access;
S108, refusal user-network access.
It should be noted that, after refusal customer service is handled, system can push refusal information to user, inform that user refuses the reason of business handling, for example, user too much can not allow its transacting business because of arrearage, can be to for pushing an information, with prompting user, expense just being filled can transacting business, or find user has jumbo loans also exceed the time limit also can not allow its transacting business before certain bank, to user, push an information, to point out user that loan is got final product to transacting business on also.
In addition, in refusal user-network access, system can also eject the prompting frame of related personnel's contact method, calls to seek advice from the processing of a rear step for user to related personnel.
The present embodiment is by when user-network access, according to the finger print information gathering, from service provider fingerprint caching system, obtain and the corresponding user profile of gathered finger print information, and service provider fingerprint caching system can regularly obtain and the corresponding third party's user profile of gathered finger print information from third party database, and be kept in the fingerprint caching system of service provider self, and in can real-time query third party database with the user profile of gathered finger print information, therefore efficiently solve certificate identification difficulty and prevented other people problem networking of assuming another's name, in addition, owing to carrying out real-time, interactive inquiry with third party's system, stopped the users' such as all kinds of swindles, malicious owing fee networking and business handling, made communication more safe and effective.
As shown in Figure 2, flow chart for networking identity identifying method embodiment bis-provided by the invention, the present embodiment and embodiment mono-difference is, the present embodiment is the embodiment of the method for carrying out authentication when the transacting business for the storage user who has networked, and comprises the steps:
S201, storage user, when transacting business, gather storage user's finger print information, and receive the number that needs transacting business of storage user input;
Wherein, the storage user here refers to the user who has networked by the networking system described in embodiment mono-, therefore, in service provider fingerprint caching system, store this user's information, and this user has passed through the authentication of third party's system when networking.
Storage user is when transacting business, business handling system that can decorrelation operating agency, fingerprint acquisition device by business handling system carries out fingerprint collecting, and the number of the input transacting business of wanting, and can be also other card numbers that will handle for telephone number herein.
S202, from service provider fingerprint caching system, obtain four user profile corresponding with storage user's finger print information;
The 4th user profile be such as comprising the essential informations such as the user's facial image binding together with finger print information, the telephone number of transacting business or other card numbers and identification card number, can also comprise that information that the relevant user's that service provider fingerprint caching system itself records information comprises the relevant user that business service condition information and telephone expenses use information etc. and third party database record is as information such as illegal record, loan documentation, arrearage records.
S203, extract the number in the 4th user profile, and determine whether the number in the 4th user profile of extracting mates with the number that needs transacting business that user inputs;
The finger print information of collection is mated with the finger print information of storing in service provider fingerprint caching system, and determine whether the number in the 4th user profile of extracting mates with the number that needs transacting business of user's input, if all mating, both determine it is user's transacting business that comes in person, perform step S204, otherwise execution step S206.
S204, check in the 4th user profile whether have illegal record;
If determine it is to come in person to handle into network service; further determine the illegal record of user that whether exists service provider to preserve in the 4th user profile; wherein the illegal record of user is gained international information platform telephone expenses by cheating by user, the malice of pin number or malice is gained the illegal records such as the malicious owing fee information such as roaming in other places telephone expenses by cheating except the defaulting subscriber that comprises service provider fingerprint caching system itself and record, the illegal record that also comprises the relevant user that third party database records as illegal record, provide a loan expired not also, the illegal record such as malicious owing fee.If do not exist, perform step S205; If exist, perform step S206.
It will be appreciated by persons skilled in the art that operator can come to determine which record belongs to illegal record according to demand, for example, the expired number of times of not going back of providing a loan surpasses the concrete numerical value that a preset value ,Er operator can determine this preset value voluntarily.
S205, accept business handling;
If determine the illegal record of user that does not exist service provider to safeguard in the 4th user profile, allow customer service to handle.
S206, refusal business handling.It should be noted that, after refusal customer service is handled, system can eject the message of a refusal business handling and refuse the reason of business handling to inform user, for example, user is because arrearage too much can not allow its transacting business, and can inform that user fills expense just can transacting business.
The present embodiment by adopting fingerprint to carry out authentication at operating agency when storage user carries out business handling, because passed through the authentication of third party's system before storage user's transacting business, so not only effectively prevented other people the assume another's name mode of transacting business, the operating efficiency that can also improve.
As shown in Figure 3, be the structure chart of networking identity authorization system embodiment provided by the invention, comprise with lower module:
Acquisition module 31, for when the user-network access, gathers user's finger print information;
Matching module 32, mates for the finger print information that the finger print information of collection is stored with service provider fingerprint caching system;
Authentication module 33 if for not mating, obtains the first user information corresponding with finger print information from third party's fingerprint database, and first user information is sent to the storage of service provider fingerprint caching system; In check first user information, whether there is illegal record, if exist, refuse user-network access, if do not exist, allow user-network access; If coupling is obtained second user profile corresponding with finger print information from service provider fingerprint caching system; Check in the second user profile whether have illegal record, if exist, refuse user-network access; If do not exist, allow described user-network access.
Wherein, third party's fingerprint database, comprises at least one in following database: public security system fingerprint database, credit investigation system fingerprint database and competitor's fingerprint database.
Wherein, said system, also comprises:
Communication module 34, for after the described user-network access of refusal, pushes refusal information to user, the reason of refusal information for pointing out refusal to network to user.
Further, acquisition module 31, also for storage user when the transacting business, gather storage user's finger print information, and receive the number that needs transacting business of described storage user's input;
Further, wherein, said system, also comprises:
Acquisition module 35, also for obtaining four user profile corresponding with described storage user's finger print information from described service provider fingerprint caching system;
Further, matching module 32, also for extracting the number of described the 4th user profile, and determines whether the number in the 4th user profile of extracting mates with the number that needs transacting business of described user's input; ;
Further, authentication module 33, if also for coupling, check in described the 4th user profile whether have illegal record, if exist, refuses business handling; If do not exist, accept business handling; If do not mate, refuse business handling.
The system of the present embodiment is for carrying out the scheme of embodiment of the method shown in above-mentioned Fig. 1 and Fig. 2, and it realizes principle and technique effect is similar, repeats no more herein.
One of ordinary skill in the art will appreciate that: all or part of step that realizes above-mentioned each embodiment of the method can complete by the relevant hardware of program command.Aforesaid program can be stored in a computer read/write memory medium.This program, when carrying out, is carried out the step that comprises above-mentioned each embodiment of the method; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CDs.
Finally it should be noted that: each embodiment, only in order to technical scheme of the present invention to be described, is not intended to limit above; Although the present invention is had been described in detail with reference to aforementioned each embodiment, those of ordinary skill in the art is to be understood that: its technical scheme that still can record aforementioned each embodiment is modified, or some or all of technical characterictic is wherein equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution depart from the scope of various embodiments of the present invention technical scheme.

Claims (10)

1. a networking identity identifying method, is characterized in that, comprising:
When user-network access, gather user's finger print information;
The finger print information of collection is mated with the finger print information of storing in service provider fingerprint caching system;
If do not mate, from third party's fingerprint database, obtain the first user information corresponding with described finger print information, and first user information is sent to the storage of service provider fingerprint caching system; Check in described first user information whether have illegal record, if exist, refuse described user-network access, if do not exist, allow described user-network access;
If coupling is obtained second user profile corresponding with described finger print information from described service provider fingerprint caching system; Check in described the second user profile whether have illegal record, if exist, refuse described user-network access, if do not exist, allow described user-network access.
2. method according to claim 1, is characterized in that, in described the second user profile of described check, whether has illegal record, if exist, refuses described user-network access, if do not exist, allows described user-network access, comprising:
Check in described the second user profile and whether have illegal record;
If exist, refuse described user-network access;
If do not exist, from third party's fingerprint database, obtain three user profile corresponding with described finger print information, and the 3rd user profile is sent to the storage of service provider fingerprint caching system; Check in described the 3rd user profile whether have illegal record, if exist, refuse described user-network access, if do not exist, allow described user-network access.
3. method according to claim 1 and 2, is characterized in that, described third party's fingerprint database, comprises at least one in following database:
Public security system fingerprint database, credit investigation system fingerprint database and competitor's fingerprint database.
4. method according to claim 3, is characterized in that, after the described user-network access of refusal, also comprises:
To described user, push refusal information, the reason of described refusal information for pointing out refusal to network to described user.
5. method according to claim 3, is characterized in that, also comprises: storage user, when transacting business, gathers described storage user's finger print information, and receives the number that needs transacting business of described storage user's input; From described service provider fingerprint caching system, obtain four user profile corresponding with described storage user's finger print information;
Extract the number in described the 4th user profile, and determine whether the number in the 4th user profile of extracting mates with the number that needs transacting business of described user's input;
If coupling, checks in described the 4th user profile whether have illegal record, if exist, refuse business handling; If do not exist, accept business handling;
If do not mate, refuse business handling.
6. a networking identity authorization system, is characterized in that, comprising:
Acquisition module, for when the user-network access, gathers user's finger print information;
Matching module, mates for the finger print information that the finger print information of collection is stored with service provider fingerprint caching system;
Authentication module if for not mating, obtains the first user information corresponding with described finger print information, and first user information is sent in service provider fingerprint caching system and is stored from third party's fingerprint database; Check in described first user information whether have illegal record, if exist, refuse described user-network access, if do not exist, allow described user-network access; If coupling is obtained second user profile corresponding with described finger print information from described service provider fingerprint caching system; Check in described the second user profile whether have illegal record, if exist, refuse described user-network access, if do not exist, allow described user-network access.
7. system according to claim 6, is characterized in that,
Described authentication module, specifically for:
Check in described the second user profile and whether have illegal record;
If exist, refuse described user-network access;
If do not exist, from third party's fingerprint database, obtain three user profile corresponding with described finger print information, and the 3rd user profile is sent to the storage of service provider fingerprint caching system; Check in described the 3rd user profile whether have illegal record, if exist, refuse described user-network access, if do not exist, allow described user-network access.
8. according to the system described in claim 6 or 7, it is characterized in that, described third party's fingerprint database, comprises at least one in following database:
Public security system fingerprint database, credit investigation system fingerprint database and competitor's fingerprint database.
9. system according to claim 8, is characterized in that, also comprises:
Communication module, for after the described user-network access of refusal, pushes refusal information to described user, the reason of described refusal information for pointing out refusal to network to described user.
10. system according to claim 8, is characterized in that:
Described acquisition module, also for storage user when the transacting business, gather described storage user's finger print information, and receive the number that needs transacting business of described storage user's input;
Acquisition module, also for obtaining four user profile corresponding with described storage user's finger print information from described service provider fingerprint caching system;
Described matching module, also for extracting the number of described the 4th user profile, and determines whether the number in the 4th user profile of extracting mates with the number that needs transacting business of described user's input;
Described authentication module, if also for coupling, check in described the 4th user profile whether have illegal record, if exist, refuses business handling; If do not exist, accept business handling; If do not mate, refuse business handling.
CN201310503928.7A 2013-10-23 Network identity authentication method and system Active CN103532968B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310503928.7A CN103532968B (en) 2013-10-23 Network identity authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310503928.7A CN103532968B (en) 2013-10-23 Network identity authentication method and system

Publications (2)

Publication Number Publication Date
CN103532968A true CN103532968A (en) 2014-01-22
CN103532968B CN103532968B (en) 2016-11-30

Family

ID=

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104599074A (en) * 2015-01-30 2015-05-06 杭州云灵科技有限公司 Intelligent service acquiring management method and system of real-name card
CN105912539A (en) * 2015-12-11 2016-08-31 乐视网信息技术(北京)股份有限公司 System and method for data storage for protecting privacy of local user
CN106228442A (en) * 2016-09-22 2016-12-14 山东浪潮商用系统有限公司 A kind of system of real name does tax device, system and method
CN106817347A (en) * 2015-11-27 2017-06-09 中兴通讯股份有限公司 Third-party application authentication method, certificate server, terminal and management server
CN113411240A (en) * 2021-05-28 2021-09-17 青岛海尔科技有限公司 Network access method and device for household electrical appliance, storage medium and electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101090401A (en) * 2007-05-25 2007-12-19 金蝶软件(中国)有限公司 Data buffer store method and system at duster environment
CN101414912A (en) * 2008-11-28 2009-04-22 中国民生银行股份有限公司 Identification verification method, apparatus and system
CN101661585A (en) * 2009-09-22 2010-03-03 王舰 Paperless boarding system based on two-dimension code technology and biometric identification technology
CN101909277A (en) * 2010-06-07 2010-12-08 中兴通讯股份有限公司 System and method for realizing real-name management and terminals

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101090401A (en) * 2007-05-25 2007-12-19 金蝶软件(中国)有限公司 Data buffer store method and system at duster environment
CN101414912A (en) * 2008-11-28 2009-04-22 中国民生银行股份有限公司 Identification verification method, apparatus and system
CN101661585A (en) * 2009-09-22 2010-03-03 王舰 Paperless boarding system based on two-dimension code technology and biometric identification technology
CN101909277A (en) * 2010-06-07 2010-12-08 中兴通讯股份有限公司 System and method for realizing real-name management and terminals

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104599074A (en) * 2015-01-30 2015-05-06 杭州云灵科技有限公司 Intelligent service acquiring management method and system of real-name card
CN106817347A (en) * 2015-11-27 2017-06-09 中兴通讯股份有限公司 Third-party application authentication method, certificate server, terminal and management server
CN105912539A (en) * 2015-12-11 2016-08-31 乐视网信息技术(北京)股份有限公司 System and method for data storage for protecting privacy of local user
CN106228442A (en) * 2016-09-22 2016-12-14 山东浪潮商用系统有限公司 A kind of system of real name does tax device, system and method
CN113411240A (en) * 2021-05-28 2021-09-17 青岛海尔科技有限公司 Network access method and device for household electrical appliance, storage medium and electronic device

Similar Documents

Publication Publication Date Title
CN109191281A (en) A kind of group's fraud identifying system of knowledge based map
CN102037706B (en) Method for the temporary personalization of a communication device
CN104573547B (en) The safety and protection system and its operation realizing method of a kind of information exchange
CN103942844A (en) Ticketing system based on biological feature identification
RU2452020C2 (en) Method of making payments (versions) and system for realising said method
CN104992324A (en) Service processing method of self-service device and service processing system of self-service device
CN101510333B (en) IC card consumption system integrated with human face discrimination technology
CN102509238A (en) Bank non-cash business processing method, apparatus and system
CN101483526A (en) Method and system for card distribution through mobile terminal
CN103366274A (en) Hybrid e-commerce instant payment method
CN204557509U (en) A kind of identification demo plant
CN105516203A (en) Safety methodology based on fingerprint scatter storage and system
CN106960409A (en) A kind of easily social security self-help serving system
CN109523443A (en) A kind of decentralization subsidy/grubstake distribution method and system
CN109741800A (en) The method for security protection of medical data intranet and extranet interaction based on block chain technology
CN103020822B (en) Financial acquirer's method based on double escape ways
CN110992053A (en) Safe payment system and method based on finger vein recognition and block chain technology
CN103186735A (en) Operation and maintenance safety management method based on fingerprint identification
CN109741070B (en) Account management method and device based on network certificate
CN107230083A (en) The identification of internet intelligent individual information fingerprint, fingerprint are paid
CN104704521B (en) Multifactor profile and security fingerprint analysis
JP2005122266A (en) System and method for card-usage transaction processing, and program for card-usage transaction processing
CN117252429A (en) Risk user identification method and device, storage medium and electronic equipment
CN117151736A (en) Anti-electricity fraud management early warning method and system
CN112511484A (en) U shield safety control management system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant