CN106603562A - RIM cloud data identity verification system and method - Google Patents
RIM cloud data identity verification system and method Download PDFInfo
- Publication number
- CN106603562A CN106603562A CN201611260592.6A CN201611260592A CN106603562A CN 106603562 A CN106603562 A CN 106603562A CN 201611260592 A CN201611260592 A CN 201611260592A CN 106603562 A CN106603562 A CN 106603562A
- Authority
- CN
- China
- Prior art keywords
- rim
- information
- module
- characteristic
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Abstract
The invention belongs to the communication technology field and especially relates to a RIM cloud data identity verification system and method. The RIM cloud data identity verification system, based on a RIM identity management system, comprises a RIM cloud server, an information acquisition module, an information loading module, and an information processing module. Through a cloud database, a cloud server and other cloud computing technologies, a comparison verification mode effectively avoids problems that reference characteristic data is unreal and it is difficult to supervise when cross-enterprises, cross-regions and cross platforms are authorized by a person himself/herself. In this way, the security of biological identification and verification of actual identities is greatly improved, and properties and all rights of the person can be better guaranteed. Moreover, with the system and method, the person can prove that he/she is who he/she is and that he/she is still alive.
Description
Technical field
The invention belongs to communication technical field, more particularly to a kind of RIM clouds data verification identification system and method.
Background technology
With the improvement of people's living standards, people's transacting business of going out is also more and more, handles different business every time
It is required for a variety of certificates and handles to prove to come in person, in existing technology, it is common to use " I is identity card proving
I " this problem, if many times forget to may result in by identity document made a fruitless trip, it is impossible to transacting business, not only waste
Time effects work efficiency, can also affect the emotion of oneself.And present existing identity recognizing technology such as fingerprint, face, rainbow
Film etc., is all that the fixed thing in fixed place can just be used, can not be public service well.
The content of the invention
The present invention is directed to above-mentioned problem, and the present invention devises a kind of RIM clouds data verification identification system and method.
In order to achieve the above object, the technical solution used in the present invention is that the present invention provides a kind of RIM clouds data verification body
Part method, is applied to cloud data verification identification system, it is characterised in that the RIM clouds data verification identification system is based on RIM
The data compilation carried out on identity management system, methods described specifically include following steps:
1) gather information, finds the characteristic of personal institute's typing in RIM identity management system types of applications first;
2) information is uploaded, all characteristics collected is uploaded to into RIM cloud servers;
3) information processing, RIM cloud servers will carry out big data analysis to the characteristic for uploading, and filter out this
Reference characteristic of the biometric feature that RIM user personnel use always as the biometric feature of the RIM user;
4) download information, in life, we need the office unit for contacting download the reference characteristic of RIM user to respectively
In the corresponding equipment in place;
5) information compare, when RIM user handle correlation business when, department of relevant unit can according to reference characteristic come
Whether the biological characteristic of contrast RIM user matches;
6) business handling, when RIM user biological characteristic and reference characteristic to match when, can normal transacting business, biology
When feature is mismatched with reference characteristic, it is impossible to handle related service.
Preferably, in the RIM identity management systems types of applications characteristic of institute's typing include going home opening the door, on
Bancor is diligent, handle permit business, handle bank settlement business, access in the biometric feature data that client or friend use one
Plant or various.
Preferably, the biometric feature includes one or more in iris, face, fingerprint.
Preferably, we need the office unit for contacting to include housekeeping department, bank counter, Che Guan in the life
Institute, the RIM user handles related service includes house property business, banking and CAR SERVICE.
A kind of RIM clouds data verification identification system, it is characterised in that including RIM cloud servers, information acquisition module,
Signal load unit, message processing module;
Information acquisition module:For collecting the characteristic of personal institute's typing in RIM identity management system types of applications
And it is uploaded to RIM cloud servers;
RIM cloud servers:For all information collected by receive information acquisition module and it is acted upon, to uploading
Characteristic carry out big data analysis, filter out the biometric feature that the RIM user personnel use always and use as the RIM
The reference characteristic of the biometric feature at family, and preserved realize cloud share;
Signal load unit:For downloading the reference characteristic in RIM cloud servers;
Message processing module:Whether reference characteristic and the RIM user biologicals feature downloaded for identification information load-on module
Matching.
Preferably, described information RIM cloud server, acquisition module, signal load unit and message processing module it
Between pass through signal transmission.
Preferably, described information acquisition module includes fingerprint input device, recognition of face device and iris identification device.
Compared with prior art, advantages of the present invention and good effect be,
1st, the present invention is using the cloud computing technology such as cloud data base, Cloud Server, can across enterprise, trans-regional, cross-platform
Jing after I authorizes, the verification mode compared can effectively evade some row such as untrue, the difficult supervision of reference characteristic data
Problem, greatly improves the safety that bio-identification verifies true identity, preferably ensures the property and every rights and interests of client;More
Energy is easy, effectively solving proves phenomenons such as " I is myself " " I also live ".
Description of the drawings
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below will be to using needed for embodiment description
Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, for ability
For the those of ordinary skill of domain, without having to pay creative labor, can be with other according to these accompanying drawings acquisitions
Accompanying drawing.
Fig. 1 is the schematic diagram of a kind of RIM clouds data verification identification system that embodiment 1 is provided and method;
Fig. 2 is the workflow diagram of a kind of RIM clouds data verification identification system that embodiment 1 is provided and method;
Specific embodiment
In order to be more clearly understood that the above objects, features and advantages of the present invention, with reference to the accompanying drawings and examples
The present invention will be further described.It should be noted that in the case where not conflicting, in embodiments herein and embodiment
Feature can be mutually combined.
Many details are elaborated in the following description in order to fully understand the present invention, but, the present invention may be used also
Implemented with adopting different from other modes described here, therefore, the present invention is not limited to the concrete of description described below
The restriction of embodiment.
Embodiment 1, can be seen that the system that inventor devises a set of RIM clouds data verification identity according to Fig. 1 and Fig. 2,
This system is on the basis of RIM identity management systems, using the biological characteristic of RIM user input RIM systems so as to formation
The system of systems of complete set, it is main just to include RIM cloud servers, information acquisition module, signal load unit, information processing
This four part of module, wherein information acquisition module are for collecting personal institute's typing in RIM identity management system types of applications
Characteristic and be uploaded to RIM cloud servers, the input of fingerprint that such as RIM user is adopted when being on duty is carrying out work attendance core
It is real, come home from work using iris identification opening gate, by recognition of face proving " I when also visiting or calling on a customer
It is me " this problem, the institute of personal institute's typing in RIM identity management system types of applications is collected by information acquisition module
There is characteristic, and all characteristics collected are uploaded to into RIM cloud servers;RIM cloud servers will connect afterwards
All information collected by the information acquisition module for receiving simultaneously are acted upon, and the characteristic to uploading carries out big data point
Analysis, filters out biometric feature that the RIM user personnel use always as the benchmark of the biometric feature of the RIM user
Feature, including fingerprint, face, iris, and preserved realize cloud share;When the RIM cloud data verification bodies designed with inventor
When part system place company sets up the unit of partnership relation and needs using this system, can be by under signal load unit
Reference characteristic in load RIM cloud servers, such as housekeeping department, Banking sector and vehicle administration office, these are at ordinary times in transacting business
When need accurately to examine transacting business person identity information unit department, may be by this system and save the plenty of time,
Illustrated how to using this system and the benefit using the system with Banking sector below, the method is mainly attached to
Complete on RIM identity management systems, what is RIM identity management systems, specifically, the RIM identity management systems include again
It is using the RIM identity management methods of the system, specific as follows:
A kind of RIM identity management methods, are applied to identity management system, and methods described specifically includes following steps:
1) identity typing
A, the identification typing module for first, setting up a storage module and correlation;
B, in the identity card identification typing module typing treat Identity Management personnel (user) identification card number, its identity card identification
Typing module is identified to the identification card number, if identification is correct, can be by the identity card relevant information in the identification card number
Calling in carries out short time storage in the identity card identification typing module, after storage is finished, can jump out the identification record of 3D living body finger prints
Enter module;
C, 3D living body finger print identification typing module is identified to all fingerprints for treating Identity Management personnel, is recognized errorless
Afterwards, then all fingerprints are entered in 3D living body finger prints identification typing module carries out short time storage, after storage is finished, jumps out rainbow
Film recognizes typing module;
D, iris identification typing module are then identified at least one iris for treating Identity Management personnel, are recognized errorless
Afterwards, then the iris is entered in iris identification typing module carries out short time storage;
After E, storage are finished, storage module will be collected and be recognized by above-mentioned identity card identification typing module, 3D living body finger prints
Information stored by typing module and iris identification typing module is preserved;
After F, storage module are finished to above- mentioned information storage, will automatically form and the corresponding work of Identity Management personnel be treated with this
Signal, which treats that Identity Management personnel can arrange password to work signal;
After G, work signal code are provided with, relevant this stored by storage module treats all letters of Identity Management personnel
Breath is uploaded to cloud server, and its cloud server then can carry out independent numbering, i.e. identity typing according to work signal to the information
Complete;
2) identity information modification.
The related identification typing module also includes that bank card recognizes typing module and auxiliary typing module, and which is concrete
Input method is:I.e. after the storage of iris identification typing module is finished, bank card identification typing module treats Identity Management personnel
Bank card be identified, recognize it is errorless after, i.e., bank card identification typing module in carry out short time storage;Storage is finished
Afterwards, auxiliary typing module is jumped out, and the phone number of Identity Management personnel, exchange number is treated successive typing in typing module is aided in
Code, license plate number and existing residence, and short time storage is carried out in auxiliary typing module;After storage is finished, storage module will
The information stored in recognizing typing module and auxiliary typing module by above-mentioned bank card can be collected to be preserved, preservation is finished and is followed by
The step of getting off then continues to complete F, G step in claim 1.
The identity information modification comprises the steps:
H, set up an identity modified module and with cloud server keep information exchange;
I, Identity Management personnel log in identity modified module, identity modified module first by work signal and work signal code
Work signal and work signal code are identified;
After J, identification are errorless, identity modified module extracts all letters corresponding with the work signal from cloud server
Breath;
After K, Identity Management personnel determine that all information are errorless, modified as needed to, identity modified module can then jump out 3D live bodies
Fingerprint recognition typing module, its 3D living body finger prints identification typing module are identified to the fingerprint of Identity Management personnel's typing;
After L, identification are errorless, Identity Management personnel can remove identity card relevant information, refer in modification in identity modified module
Stored all information in cloud server beyond stricture of vagina information and iris information;
After M, modification are finished, identity modified module can be by amended identity information, and being sent in cloud server is carried out
Storage.
The identity card relevant information be identity card on record name, sex, nationality, the date of birth, address, photo,
Citizenship number, issuing authority and expiry date.
The short time is not more than 3 hours.
The exchange number includes QQ accounts, microblog account and Facebook accounts.
A kind of RIM identity management systems, including cloud server, storage module, identity card identification typing module, 3D live bodies
Fingerprint recognition typing module, iris identification typing module, bank card identification typing module, auxiliary typing module and identity modification
Module;
Identity card identification typing module:For the typing of the identification card number to Identity Management personnel, identification and of short duration storage
Deposit, relevant information on the identity card of Identity Management personnel can also be called in;
3D living body finger prints recognize typing module:For the typing to Identity Management personnel's fingerprint, identification and of short duration storage;
Iris identification typing module:For the typing to Identity Management personnel's iris, identification and of short duration storage;
Bank card recognizes typing module:For to Identity Management personnel's bank card typing, identification and of short duration storage;
Auxiliary typing module:For to Identity Management personnel's phone number, exchange number, license plate number and existing residence record
Enter and of short duration storage;
Storage module:For being preserved to above- mentioned information for a long time;
Cloud server:For receiving information that storage module sends and storing, can also realize that cloud is shared;
Identity modified module:For modification of the Identity Management personnel to its own partial information, and protect with cloud server
Hold interaction.
The identity card identification typing module, 3D living body finger prints identification typing module, iris identification typing module, bank card
Working range between identification typing module and auxiliary typing module is separate.
The identity card identification typing module, 3D living body finger prints identification typing module, iris identification typing module, bank card
Pass through signal transmission between identification typing module and auxiliary typing module and storage module.
The storage module passes through signal transmission with cloud server.
By described above, it can be appreciated that after a huge network of personal connections is set up, RIM cloud servers are
The benchmark of user biological identification feature is generated according to the biometric feature that user commonly uses, Banking sector can be tested by identity
Card adds RIM plans, downloads reference characteristic to oneself department, by fingerprint characteristic, face characteristic, rainbow from RIM cloud servers
Film feature is all loaded, and is arranged fingerprint input device, recognition of face device and iris identification device and tested as transacting business personnel selection
The approach of card identity, as user because cause specific can not select one as having multiple choices during checking, by letter
Breath processing module comes whether the reference characteristic of identification information load-on module download is matched with RIM user biologicals feature, as RIM user
Biological characteristic and reference characteristic to match when, can normal transacting business, when biological characteristic is mismatched with reference characteristic, you can demonstrate,prove
It is bright come transacting business personnel be not me, not transacting business.The list when present invention solves people's transacting business at this stage
" I is me " this problem is passed judgment on by an identity card, will not be smudgy because of identity card or be gone out the problems such as by chance expiring
Now cannot transacting business phenomenon, effectively can evade reference characteristic data it is untrue, it is difficult supervision etc. some row problems, significantly
The safety that bio-identification verifies true identity is improved, the property and every rights and interests of client is preferably ensured;More can it is easy, have
Effect solves to prove phenomenons such as " I is myself " " I also live ".
The above, is only presently preferred embodiments of the present invention, is not the restriction for making other forms to the present invention, is appointed
What those skilled in the art possibly also with the disclosure above technology contents changed or be modified as equivalent variations etc.
Effect embodiment is applied to other fields, but every without departing from technical solution of the present invention content, according to the technical spirit of the present invention
Any simple modification, equivalent variations and the remodeling made to above example, still falls within the protection domain of technical solution of the present invention.
Claims (7)
1. a kind of RIM clouds data verification identity process, is applied to cloud data verification identification system, it is characterised in that the RIM clouds
Data verification identification system is that, based on the data compilation carried out on RIM identity management systems, methods described specifically includes following step
Suddenly:
1) gather information, finds the characteristic of personal institute's typing in RIM identity management system types of applications first;
2) information is uploaded, all characteristics collected is uploaded to into RIM cloud servers;
3) information processing, RIM cloud servers will carry out big data analysis to the characteristic for uploading, and filter out the RIM and use
Reference characteristic of the biometric feature that family personnel use always as the biometric feature of the RIM user;
4) download information, in life, we need the office unit for contacting download the reference characteristic of RIM user to each place
In corresponding equipment;
5) information is compared, and when RIM user is when the business of correlation is handled, department of relevant unit can be contrasted according to reference characteristic
Whether the biological characteristic of RIM user matches;
6) business handling, when RIM user biological characteristic and reference characteristic to match when, can normal transacting business, biological characteristic
When mismatching with reference characteristic, it is impossible to handle related service.
2. a kind of RIM clouds data verification identity process according to claim 1, it is characterised in that:The RIM Identity Managements
In system types of applications, the characteristic of institute's typing includes going home opening the door, work attendance of going to work, handles permit business, handles bank settlement industry
Business, one or more accessed in the biometric feature data that client or friend use.
3. a kind of RIM clouds data verification identity process according to claim 1 and 2, it is characterised in that:The bio-identification
Feature includes one or more in iris, face, fingerprint.
4. a kind of RIM clouds data verification identity process according to claim 1 and 2, it is characterised in that:In the life I
Need contact office unit include housekeeping department, bank counter, vehicle administration office, the RIM user handles related service to be included
House property business, banking and CAR SERVICE.
5. a kind of RIM clouds data verification identification system, it is characterised in that including RIM cloud servers, information acquisition module, letter
Breath load-on module, message processing module;
Information acquisition module:For collect personal institute's typing in RIM identity management system types of applications characteristic and
Reach RIM cloud servers;
RIM cloud servers:For all information collected by receive information acquisition module and it is acted upon, to the spy for uploading
Levying data carries out big data analysis, filters out biometric feature that the RIM user personnel use always as the RIM user's
The reference characteristic of biometric feature, and preserved realize cloud share;
Signal load unit:For downloading the reference characteristic in RIM cloud servers;
Message processing module:Whether the reference characteristic downloaded for identification information load-on module is matched with RIM user biologicals feature.
6. a kind of RIM clouds data verification identification system according to claim 5, it is characterised in that:Described information RIM high in the clouds
Pass through signal transmission between server, acquisition module, signal load unit and message processing module.
7. a kind of RIM clouds data verification identification system according to claim 5, it is characterised in that:Described information gathers mould
Block includes fingerprint input device, recognition of face device and iris identification device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611260592.6A CN106603562A (en) | 2016-12-30 | 2016-12-30 | RIM cloud data identity verification system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611260592.6A CN106603562A (en) | 2016-12-30 | 2016-12-30 | RIM cloud data identity verification system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106603562A true CN106603562A (en) | 2017-04-26 |
Family
ID=58581726
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611260592.6A Pending CN106603562A (en) | 2016-12-30 | 2016-12-30 | RIM cloud data identity verification system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106603562A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108932773A (en) * | 2018-06-15 | 2018-12-04 | 王若清 | A kind of intelligent unlocking system and method |
CN109617984A (en) * | 2018-12-26 | 2019-04-12 | 安徽大尺度网络传媒有限公司 | A kind of data storage cloud online management system |
CN109978316A (en) * | 2018-08-21 | 2019-07-05 | 国网天津市电力公司 | A kind of enterprise IT data resource configuration management system |
CN110415805A (en) * | 2019-08-15 | 2019-11-05 | 成都市佳颖医用制品有限公司 | One kind adopting slurry total management system and management method |
CN112733110A (en) * | 2020-11-23 | 2021-04-30 | 融钰四海(武汉)信息科技有限公司 | Enterprise client resource intelligent screening processing service platform |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201904809U (en) * | 2010-12-20 | 2011-07-20 | 惠州紫旭科技有限公司 | Data service system based on cloud computing |
CN102568125A (en) * | 2010-12-31 | 2012-07-11 | 鸿富锦精密工业(深圳)有限公司 | System and method for performing credit card consumption through fingerprint identification |
CN103107886A (en) * | 2013-01-17 | 2013-05-15 | 深圳市元征科技股份有限公司 | Identification recognition system and method |
CN104112116A (en) * | 2011-06-30 | 2014-10-22 | 深圳市君盛惠创科技有限公司 | Cloud server |
US20150047005A1 (en) * | 2011-06-30 | 2015-02-12 | Shenzhen Junshenghuichuang Technologies Co.,Ltd | Method for Authenticating Identity of Handset User |
CN104392221A (en) * | 2014-11-28 | 2015-03-04 | 曾嵘 | Multi-element identity recognition system and multidimensional multi-element identity recognition method |
-
2016
- 2016-12-30 CN CN201611260592.6A patent/CN106603562A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201904809U (en) * | 2010-12-20 | 2011-07-20 | 惠州紫旭科技有限公司 | Data service system based on cloud computing |
CN102568125A (en) * | 2010-12-31 | 2012-07-11 | 鸿富锦精密工业(深圳)有限公司 | System and method for performing credit card consumption through fingerprint identification |
CN104112116A (en) * | 2011-06-30 | 2014-10-22 | 深圳市君盛惠创科技有限公司 | Cloud server |
US20150047005A1 (en) * | 2011-06-30 | 2015-02-12 | Shenzhen Junshenghuichuang Technologies Co.,Ltd | Method for Authenticating Identity of Handset User |
CN103107886A (en) * | 2013-01-17 | 2013-05-15 | 深圳市元征科技股份有限公司 | Identification recognition system and method |
CN104392221A (en) * | 2014-11-28 | 2015-03-04 | 曾嵘 | Multi-element identity recognition system and multidimensional multi-element identity recognition method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108932773A (en) * | 2018-06-15 | 2018-12-04 | 王若清 | A kind of intelligent unlocking system and method |
CN109978316A (en) * | 2018-08-21 | 2019-07-05 | 国网天津市电力公司 | A kind of enterprise IT data resource configuration management system |
CN109617984A (en) * | 2018-12-26 | 2019-04-12 | 安徽大尺度网络传媒有限公司 | A kind of data storage cloud online management system |
CN110415805A (en) * | 2019-08-15 | 2019-11-05 | 成都市佳颖医用制品有限公司 | One kind adopting slurry total management system and management method |
CN112733110A (en) * | 2020-11-23 | 2021-04-30 | 融钰四海(武汉)信息科技有限公司 | Enterprise client resource intelligent screening processing service platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11416602B2 (en) | Methods and systems for identity creation, verification and management | |
CN106603562A (en) | RIM cloud data identity verification system and method | |
EP3596613B1 (en) | Methods and devices for acquiring and recording tracking information on blockchain | |
EP3257222B1 (en) | Authentication of web content | |
CN104240342B (en) | Access control method and device based on identity authentication | |
US7805415B1 (en) | Systems and methods for sharing data between entities | |
CN110223068A (en) | A kind of electronic evidence based on block chain intelligence contract deposits card method | |
CN108140152A (en) | Computer implemented tracking mechanism and data management | |
CN103957217A (en) | Internet-electronic-business-transaction-oriented method and system | |
CA3073714A1 (en) | Method and system for identifying potential fraud activity in a tax return preparation system to trigger an identity verification challenge through the tax return preparation system | |
CN104704521B (en) | Multifactor profile and security fingerprint analysis | |
CN108768968A (en) | A kind of method and system that service request is handled based on data safety management engine | |
De et al. | A refinement approach for the reuse of privacy risk analysis results | |
CN101702168A (en) | Method for inquiring information based on key information of the second generation identity card | |
CN106845178A (en) | A kind of RIM identity management systems and method | |
Perlman et al. | Focus note: the use of eKYC for customer identity and verification and AML | |
CN108183906B (en) | Time bank management method, server, terminal, storage medium and electronic device | |
CN111079111A (en) | Computer network identity verification system | |
Makulilo et al. | Data protection in Kenya | |
Ismailov | Organizational And Legal Aspects Of Digital Technologies In Counteracting Corruption | |
Stines | Blockchain 101: A Laweyr's (Brief) Guide | |
Gazizov et al. | Methods and Means of Information Countermeasures to Threats of Information Security Breaches in an Open Computer Network of an Online Store | |
JP2023554555A (en) | Network identity | |
Newell et al. | Regulating the US Consumer Data Market: Comparing the Material Scope of US Consumer Data Privacy Laws and the GDPR | |
CN116074101A (en) | Method for realizing service account authentication based on FIDO |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Fang Yanchun Inventor after: Fang Zheng Inventor before: Fang Yanchun |
|
CB03 | Change of inventor or designer information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170426 |
|
RJ01 | Rejection of invention patent application after publication |