CN107330104A - A kind of utilization communication network verifies the method and system of user real identification - Google Patents
A kind of utilization communication network verifies the method and system of user real identification Download PDFInfo
- Publication number
- CN107330104A CN107330104A CN201710549189.3A CN201710549189A CN107330104A CN 107330104 A CN107330104 A CN 107330104A CN 201710549189 A CN201710549189 A CN 201710549189A CN 107330104 A CN107330104 A CN 107330104A
- Authority
- CN
- China
- Prior art keywords
- verification
- information
- verified
- subsystem
- checked person
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Abstract
A kind of method that utilization communication network verifies user real identification is disclosed, including:Verify subsystem the biological information of one or more of user of checked person is associated with the true identity information in identity information database;People is verified by communication network to the unique biological information of a certain item of subsystem submission checked person is verified, while submitting the detailed programs for wanting to verify;Verify subsystem to receive after the verification detailed programs that verification people submits, checking authorization is applied for checked person by communication network;Checked person responds this application, and authorization verification people allows the project verified;Verify subsystem and the data after empirical tests are called from identity information database according to the mandate project of checked person, then show verification people;Checking authorization therein is that checked person provides the authorization code that verification subsystem accreditation is verified to people is verified, and verification people is verified the identity information of checked person using the authorization code.User real identification can be verified using biological information.
Description
Technical field
It is more particularly to a kind of to utilize communication network core the present invention relates to a kind of method and system for verifying user real identification
Look into the method and system of user real identification.
Background technology
Present applicant is in the patent of invention file (Application No. that Authorization Notice No. is CN101136909B
CN200610113602.3 the method and system that a kind of utilization communication network verifies user real identification are disclosed in), it is therein
Method comprises the following steps:1) checking system is by one or more of the unique features information and identity database of checked person
True identity information is associated;2) a certain item unique features that people submits checked person by communication network to checking system are verified
Information, while submitting the detailed programs for wanting to verify;3) checking system, which is received, verifies after the verification detailed programs that people submits, and passes through
Communication network applies for checking authorization to checked person;4) checked person responds the application, and authorization verification people allows via verification
The project that system is verified;5) checking system is adjusted according to the mandate project of checked person from the identity information database in checking system
With the data after empirical tests, verification people is then showed.The above method is used in the case where ensureing privacy of user, quick, side
Just the true identity of user is verified.
Method disclosed in CN101136909B is in logical number of such as identity with reference to disclosed in it, phone number, fixed electricity
Talk about number, E-mail address, bank's card number, identification card number, educational background card number, QQ number code, MSN numbers, user's disparate networks account
During the unique features information of family number, the purpose for quickly and easily verifying the true identity of user can be realized.However, in reality
Also the above-mentioned unique features information artificially set is not known and only just knows that checked person's is some in the presence of verification people in the life of border
The situation of biological information (such as, face information, handwritten signature information).
Therefore, it is necessary to be extended to the method disclosed in CN101136909B, so as to achieve using biological special
Reference breath quickly and easily verifies the purpose of the true identity of user.
In addition, increasing object is connected by Internet of Things and Internet technology, internet is just welcoming a data letter
The huge explosion of breath.Therefore, it is also desirable to consider how to improve the body for checked person by making full use of these magnanimity informations
Part information verified obtained by result reliability.
The content of the invention
Least for technical problem mentioned above is partly solved, the present invention proposes following technical scheme.
According to the first aspect of the invention, it is proposed that a kind of method that utilization communication network verifies user real identification,
Comprise the following steps:Subsystem is verified by one or more of the unique features information and identity information database of checked person
True identity information is associated;Verify a certain item unique features that people submits checked person by communication network to verification subsystem
Information, while submitting the detailed programs for wanting to verify;Verify subsystem to receive after the verification detailed programs that verification people submits, pass through
Communication network applies for checking authorization to checked person;Checked person responds this application, and authorization verification people allows via verification subsystem
The project that system is verified;Verify subsystem and the number after empirical tests is called from identity information database according to the mandate project of checked person
According to, then show verification people;Checking authorization therein is that checked person provides verification subsystem accreditation verification to people is verified
Authorization code, makes verification people verify the identity information of checked person using the authorization code, and unique features information therein is to use
The biological information at family.
According to the first aspect of the invention, it is proposed that a kind of method that utilization communication network verifies user real identification,
Comprise the following steps:Subsystem is verified by one or more of the unique features information and identity information database of checked person
True identity information is associated;The identity information that checked person selects to verify by verification server by communication network
Mesh, then verifies key to the identity information item setup selected;When verification people needs to verify the identity information of checked person,
It is required that one or more of the unique features information of itself and verification key are informed verification people by checked person;Verify people and pass through communication
One or more of the unique features information and verification key that network informs checked person submit to verification subsystem;Verify subsystem
System is received after verification request and good authentication key, and the identity information of corresponding empirical tests is called from identity information database
Mesh number evidence, and verification people is showed, unique features information therein is the biological information of user.
The biological information of the method, wherein user of verification user real identification according to the first aspect of the invention
Including at least one of following message for being extracted:Face, fingerprint, iris, hand-type, sound, signature, gait.
The method of verification user real identification according to the first aspect of the invention, it is further comprising the steps of:Verify son
Query expansion that system is also carried out by third party's data verification subsystem to third party database is verified, and is being checked
After the identity reality of people is verified, by the corresponding body of the checked person obtained in authenticity verification from third party database
Part extension information storage is into identity information database, for later verification.
According to the second aspect of the invention, the side of verification user real identification according to the first aspect of the invention
Method, when the high dimensional information that third party database is captured using web crawlers for particular organisms characteristic information, is also wrapped
Include following steps:Pass through the dynamic covariance of the higher-dimension between captured high dimensional information to judge captured high dimensional information and quilt
Whether match, verified to aid in verifying subsystem between one or more of unique features information for verifying people.
The advantage of the invention is that:The method of verification user real identification according to the first aspect of the invention, can
The true identity of user is quickly and easily verified using biological information.Verification according to the second aspect of the invention is used
The method of family true identity, is verified for the high dimensional information that particular organisms characteristic information is captured with reference to web crawlers, is entered
The identity information that one step is improved for checked person verified obtained by result reliability.
Brief description of the drawings
By reading the detailed description of following detailed description, various other advantages and benefit is common for this area
Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of embodiment, and can not be considered as to this
The limitation of invention.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows according to the embodiment of the present invention to realize the system architecture collected data, form database.
Fig. 2 shows the one kind for the method that user real identification is verified according to the utilization communication network of embodiment of the present invention
The flow chart of example implementation.
Fig. 3 show according to the utilization communication network of embodiment of the present invention verify user real identification method it is another
Plant the flow chart of example implementation.
Embodiment
The illustrative embodiments of the disclosure are more fully described below with reference to accompanying drawings.Although showing this public affairs in accompanying drawing
The illustrative embodiments opened, it being understood, however, that may be realized in various forms the disclosure without the reality that should be illustrated here
The mode of applying is limited.Conversely it is able to be best understood from the disclosure there is provided these embodiments, and can be by this public affairs
The scope opened completely convey to those skilled in the art.
Fig. 1 shows according to the embodiment of the present invention to realize the system architecture collected data, form database.As schemed
Shown in 1, data, the system of formation database are collected in realization of the invention to be included:User's access subsystem, affiliate's subsystem
System, checking subsystem, charging and fee-deducting subsystem, management subsystem and third party's data verification subsystem.User's access subsystem
The input link of user identity is inputted using communication network, and utilizes the input link of internet input user identity;Institute
State communication network respectively via communication link connect affiliate's subsystem and checking subsystem, the internet also respectively via
Communication link connects affiliate's subsystem and checking subsystem respectively;Affiliate's subsystem is via communication link connectivity verification
Subsystem;Verify subsystem via private line access third party's data verification subsystem, and respectively connection charging and fee-deducting subsystem and
Manage subsystem.
As shown in figure 1, third party's data verification subsystem includes Ministry of Public Security's server, Ministry of Education's server, other three
Square server, and the third party database being connected respectively with above-mentioned various servers, third party database include demographic data
Storehouse, academic database, other third party databases.Although being not specifically illustrated in Fig. 1, those skilled in the art can be with
It is contemplated that for example, third party database also include from telecom operators, public security, education, social security, industry and commerce and other
The other information of commercial undertaking.Moreover, those skilled in the art are also contemplated that third party database using network
The high dimensional information that reptile is captured for particular organisms characteristic information (for example, facial image, signature image etc.) is (for example, source
The information such as several facial images, several signature images in the different times of disparate databases).
Fig. 2 shows the one kind for the method that user real identification is verified according to the utilization communication network of embodiment of the present invention
The flow chart of example implementation.As shown in Fig. 2 the method that the exemplary utilization communication network verifies user real identification, including
Following steps:
S202:Subsystem is verified by one or more of the unique features information and identity information database of checked person
True identity information is associated, and unique features information therein is the biological information of user;
S204:People is verified by communication network to a certain item unique features information for verifying subsystem submission checked person,
The detailed programs for wanting to verify are submitted simultaneously;
S206:Verify subsystem and receive and verify after the verification detailed programs that people submits, by communication network to checked person
Apply for checking authorization, checking authorization therein is that checked person provides the mandate generation that verification subsystem accreditation is verified to people is verified
Code, makes verification people verify the identity information of checked person using the authorization code;
S208:Checked person responds this application, and authorization verification people allows via the project for verifying subsystem verification;
S210:Subsystem is verified to be called after empirical tests from the identity information database according to the mandate project of checked person
Data, then show verification people.
Selectively, in the method for verification user real identification as shown in Figure 2, the biological information bag of the user
Include at least one of extracted following message:Face, fingerprint, iris, hand-type, sound, signature, gait.
Selectively, the method for verification user real identification as shown in Figure 2 is further comprising the steps of:
S212:Verify the query expansion that subsystem is also carried out by third party's data verification subsystem to third party database
To be verified, after the identity reality of checked person is verified, it will be obtained in authenticity verification from third party database
To checked person respective identity extension information store into above-mentioned identity information database, for later verification.
The height captured when the third party database shown in Fig. 1 using web crawlers for particular organisms characteristic information
When tieing up information, selectively, the method for verification user real identification as shown in Figure 2 is further comprising the steps of:
S214:Pass through the dynamic covariance of higher-dimension between captured high dimensional information judge captured high dimensional information with
Whether match, verified to aid in verifying subsystem between one or more of the unique features information of checked person.
Fig. 3 show according to the utilization communication network of embodiment of the present invention verify user real identification method it is another
Plant the flow chart of example implementation.As shown in figure 3, the method that the exemplary utilization communication network verifies user real identification, bag
Include following steps:
S302:Subsystem is verified by one or more of the unique features information and identity information database of checked person
True identity information is associated, and unique features information therein is the biological information of user;
S304:The identity information project that checked person selects to verify by verification server by communication network, so
Key is verified to the identity information item setup selected afterwards;
S306:When verify people need verify checked person identity information when, it is desirable to checked person by itself one or
Multinomial unique features information and verification key inform verification people;
S308:One or more of unique features information and verify close that verification people is informed checked person by communication network
Key submits to verification subsystem;
S310:Verify subsystem to receive after verification request and good authentication key, called from identity information database pair
The identity information project data for the empirical tests answered, and show verification people.
Selectively, in the method for verification user real identification as shown in Figure 3, the biological information of user includes
At least one of following message extracted:Face, fingerprint, iris, hand-type, sound, signature, gait.
Selectively, the method for verification user real identification as shown in Figure 3 is further comprising the steps of:
S312:Verify the query expansion that subsystem is also carried out by third party's data verification subsystem to third party database
To be verified, after the identity reality of checked person is verified, it will be obtained in authenticity verification from third party database
To checked person respective identity extension information store into above-mentioned identity information database, for later verification.
The height captured when the third party database shown in Fig. 1 using web crawlers for particular organisms characteristic information
When tieing up information, selectively, the method for verification user real identification as shown in Figure 3 is further comprising the steps of:
S314:Pass through the dynamic covariance of higher-dimension between captured high dimensional information judge captured high dimensional information with
Whether match, verified to aid in verifying subsystem between one or more of the unique features information of checked person.
The illustrative methods of verification user real identification proposed by the invention have advantages below:
Come from firstly, since third party's data verification subsystem shown in Fig. 1 includes demographic database, academic database
Multiple third party databases of different system and the different information of storage, using verification user real identification as shown in Figures 2 and 3
Illustrative methods antifraud can be realized by the retrieval to multiple data sources.Come from because fake producer changes simultaneously
The difficulty of multiple third party databases of different system and the different information of storage is greatly increased, so for the retrieval of multiple data sources
The probability being forged simultaneously to multiple results corresponding to same checked person is reduced.Realize and utilize biological information
Quickly and easily verify the purpose of the true identity of user.
Secondly as what third party database can be captured using web crawlers for particular organisms characteristic information
High dimensional information, just can now pass through the dynamic covariance of the higher-dimension between captured high dimensional information to judge captured higher-dimension
Whether match, verified to aid in verifying subsystem between information and one or more of the unique features information of checked person.
So as to further increase the reliability for verifying result.
Finally, user browses information to prior art for convenience, it will usually pass through client software or web application
The network informations such as news headlines, blog, blog are aggregated to identical position and information fusion is realized.Simultaneously as
The magnanimity of information increases under Web2.0 environment, and especially user being on the increase from content is produced, user daily various microbloggings,
SNS creates the content of vast number, not only many but also miscellaneous.In addition, NGO and individual just put increasing data message
Onto network.Moreover, increasing object is connected by Internet of Things and Internet technology, internet will welcome a data
The huge explosion of information.How to filter and recombinate these data messages and be allowed to ultimately become personalized information, will be these magnanimity
Where the value that information is present.The method of verification user real identification proposed by the invention can exactly make full use of these seas
Measure the reliability of the result obtained by information is verified come the identity information improved for checked person.
Therefore, the method for verification user real identification proposed by the invention can be applied to sincere platform, reference platform,
Personal information protection platform, investment and financing platform, big data platform, be finance, common carrier, marriage and making friend, hire a car, logistics,
The industries such as housekeeping, recruitment provide the service of multi-data source antifraud.This antifraud service or system can provide web wall scrolls, web
In batches, a variety of access forms such as web page, web services, API, SDK.This multi-data source antifraud aggregated service can also be with
Mobile phone identification policy is combined, furthermore, it is possible to use security algorithm (class MD5 algorithms) to identity data therein.
It is described above, it is only the exemplary embodiment of the present invention, but protection scope of the present invention is not limited to
This, any one skilled in the art the invention discloses technical scope in, the change that can readily occur in or replace
Change, should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with the protection of the claim
Scope is defined.
Claims (8)
1. a kind of method that utilization communication network verifies user real identification, comprises the following steps:
Subsystem is verified by one or more of the unique features information of checked person and the true identity in identity information database
Information is associated;
People is verified by communication network to a certain item unique features information for verifying subsystem submission checked person, is thought while submitting
The detailed programs to be verified;
Verify subsystem to receive after the verification detailed programs that verification people submits, apply for that verification is awarded to checked person by communication network
Power;
Checked person responds the application, and authorization verification people allows via the project for verifying subsystem verification;
Verify subsystem and the data after empirical tests are called from the identity information database according to the mandate project of checked person, so
After show verification people;
Wherein described checking authorization is that checked person provides the authorization code that verification subsystem accreditation is verified to people is verified, and makes verification
People verifies the identity information of checked person using the authorization code, it is characterised in that
The unique features information is the biological information of user.
2. according to the method described in claim 1, wherein, the biological information of the user includes extracted following message
At least one of:Face, fingerprint, iris, hand-type, sound, signature, gait.
3. method according to claim 1 or 2, further comprising the steps of:
The subsystem query expansion that also carries out third party database by third party's data verification subsystem is verified to carry out core
Look into, after the identity reality of checked person is verified, by authenticity verification from third party database obtain by core
The respective identity extension information for looking into people is stored into the identity information database, for later verification.
4. method according to claim 3, when third party database using web crawlers for particular organisms feature
It is further comprising the steps of during the high dimensional information that information is captured:
Pass through the dynamic covariance of higher-dimension between captured high dimensional information to judge captured high dimensional information and checked person
One or more of unique features information between whether match, come aid in verify subsystem verified.
5. a kind of method that utilization communication network verifies user real identification, comprises the following steps:
Subsystem is verified by one or more of the unique features information of checked person and the true identity in identity information database
Information is associated;
Checked person selects the identity information project that can be verified by verification server by communication network, then to having selected
Identity information item setup verifies key;
When verification people needs to verify the identity information of checked person, it is desirable to which checked person is unique special by itself one or more
Reference ceases and verified key and informs verification people;
One or more of the unique features information and verification key that verification people is informed the checked person by communication network are carried
Give verification subsystem;
Verify subsystem to receive after verification request and good authentication key, corresponding empirical tests are called from identity information database
Identity information project data, and show verification people, it is characterised in that
The unique features information is the biological information of user.
6. method according to claim 5, wherein, the biological information of the user includes extracted following message
At least one of:Face, fingerprint, iris, hand-type, sound, signature, gait.
7. the method according to claim 5 or 6, further comprising the steps of:
The subsystem query expansion that also carries out third party database by third party's data verification subsystem is verified to carry out core
Look into, after the identity reality of checked person is verified, by authenticity verification from third party database obtain by core
The respective identity extension information for looking into people is stored into the identity information database, for later verification.
8. method according to claim 7, when third party database using web crawlers for particular organisms feature
It is further comprising the steps of during the high dimensional information that information is captured:
Pass through the dynamic covariance of higher-dimension between captured high dimensional information to judge captured high dimensional information and checked person
One or more of unique features information between whether match, come aid in verify subsystem verified.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710549189.3A CN107330104A (en) | 2017-07-07 | 2017-07-07 | A kind of utilization communication network verifies the method and system of user real identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710549189.3A CN107330104A (en) | 2017-07-07 | 2017-07-07 | A kind of utilization communication network verifies the method and system of user real identification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107330104A true CN107330104A (en) | 2017-11-07 |
Family
ID=60197173
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710549189.3A Pending CN107330104A (en) | 2017-07-07 | 2017-07-07 | A kind of utilization communication network verifies the method and system of user real identification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107330104A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109857766A (en) * | 2018-12-22 | 2019-06-07 | 深圳市珍爱捷云信息技术有限公司 | User information verification method, device, computer equipment and computer storage medium |
CN113177850A (en) * | 2021-04-15 | 2021-07-27 | 国任财产保险股份有限公司 | Method and device for multi-party identity authentication of insurance |
CN113961901A (en) * | 2021-11-15 | 2022-01-21 | 济南丽阳神州智能科技有限公司 | Voiceprint-based housekeeping service personnel credit authentication method, device and medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101034984A (en) * | 2006-09-22 | 2007-09-12 | 北京国政通网络科技有限公司 | Establishing the true identify database of the user with the personal information submitted by the user |
CN101136909A (en) * | 2006-10-09 | 2008-03-05 | 北京国政通网络科技有限公司 | Method and system for checking user real identification using communication network |
CN103150406A (en) * | 2013-03-29 | 2013-06-12 | 北京国政通科技有限公司 | Information query and notification method and device |
CN103971043A (en) * | 2014-05-28 | 2014-08-06 | 李雪 | Identity authentication method and authentication information acquisition method |
CN106156341A (en) * | 2016-07-14 | 2016-11-23 | 微额速达(上海)金融信息服务有限公司 | The identification method of the Internet labeled data |
-
2017
- 2017-07-07 CN CN201710549189.3A patent/CN107330104A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101034984A (en) * | 2006-09-22 | 2007-09-12 | 北京国政通网络科技有限公司 | Establishing the true identify database of the user with the personal information submitted by the user |
CN101136909A (en) * | 2006-10-09 | 2008-03-05 | 北京国政通网络科技有限公司 | Method and system for checking user real identification using communication network |
CN103150406A (en) * | 2013-03-29 | 2013-06-12 | 北京国政通科技有限公司 | Information query and notification method and device |
CN103971043A (en) * | 2014-05-28 | 2014-08-06 | 李雪 | Identity authentication method and authentication information acquisition method |
CN106156341A (en) * | 2016-07-14 | 2016-11-23 | 微额速达(上海)金融信息服务有限公司 | The identification method of the Internet labeled data |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109857766A (en) * | 2018-12-22 | 2019-06-07 | 深圳市珍爱捷云信息技术有限公司 | User information verification method, device, computer equipment and computer storage medium |
CN109857766B (en) * | 2018-12-22 | 2022-09-06 | 深圳市珍爱捷云信息技术有限公司 | User information verification method and device, computer equipment and computer storage medium |
CN113177850A (en) * | 2021-04-15 | 2021-07-27 | 国任财产保险股份有限公司 | Method and device for multi-party identity authentication of insurance |
CN113961901A (en) * | 2021-11-15 | 2022-01-21 | 济南丽阳神州智能科技有限公司 | Voiceprint-based housekeeping service personnel credit authentication method, device and medium |
CN113961901B (en) * | 2021-11-15 | 2022-10-25 | 济南丽阳神州智能科技有限公司 | Voiceprint-based housekeeping service personnel credit authentication method, device and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10652018B2 (en) | Methods and apparatus for providing attestation of information using a centralized or distributed ledger | |
US11301555B2 (en) | Authentication system | |
US10789346B2 (en) | Online identity scoring | |
CN108292331B (en) | Method and system for creating, verifying and managing identities | |
US9946865B2 (en) | Document authentication based on expected wear | |
US20190205889A1 (en) | System and method for biometric credit based on blockchain | |
US7725732B1 (en) | Object authentication system | |
US11811754B2 (en) | Authenticating devices via tokens and verification computing devices | |
CN108964925B (en) | File authentication equipment method, device, equipment and readable medium | |
CN110322317B (en) | Transaction data processing method and device, electronic equipment and medium | |
CN104935438A (en) | Method and apparatus for identity verification | |
CN107330104A (en) | A kind of utilization communication network verifies the method and system of user real identification | |
CN113111330B (en) | Enterprise legal identity authentication management method and system based on enterprise chain code | |
US11663306B2 (en) | System and method for confirming a person's identity | |
CN113239335A (en) | Block chain personnel information management system and method based on Baas | |
CN109409110A (en) | A kind of electronic document signature method, device, equipment and readable medium | |
CN110223075B (en) | Identity authentication method and device, computer equipment and storage medium | |
CN106657164B (en) | A kind of identification composite algorism and system for real-name authentication | |
KR101763275B1 (en) | The method for customer certification using credit bereau information, the system thereof, and computer-readable recording medium for recording program executing the same method | |
CN111476081A (en) | Identity authentication model based on block chain and face recognition | |
Elaswad et al. | Identity management for e-government Libya as a case study | |
CN110581820A (en) | Financial science and technology application system and method based on IPV6 and biological recognition technology | |
Tyagi et al. | Online Identity Verification. | |
CN114553684B (en) | Method, device, computer equipment and storage medium for network point operation and maintenance | |
CN114268438B (en) | Multiparty collaborative signature method, multiparty collaborative signature device, multiparty collaborative signature computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171107 |