CN107330104A - A kind of utilization communication network verifies the method and system of user real identification - Google Patents

A kind of utilization communication network verifies the method and system of user real identification Download PDF

Info

Publication number
CN107330104A
CN107330104A CN201710549189.3A CN201710549189A CN107330104A CN 107330104 A CN107330104 A CN 107330104A CN 201710549189 A CN201710549189 A CN 201710549189A CN 107330104 A CN107330104 A CN 107330104A
Authority
CN
China
Prior art keywords
verification
information
verified
subsystem
checked person
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710549189.3A
Other languages
Chinese (zh)
Inventor
王亚博
李莉莉
付春
陈放
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guozhengtong Polytron Technologies Inc
Original Assignee
Guozhengtong Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guozhengtong Polytron Technologies Inc filed Critical Guozhengtong Polytron Technologies Inc
Priority to CN201710549189.3A priority Critical patent/CN107330104A/en
Publication of CN107330104A publication Critical patent/CN107330104A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Abstract

A kind of method that utilization communication network verifies user real identification is disclosed, including:Verify subsystem the biological information of one or more of user of checked person is associated with the true identity information in identity information database;People is verified by communication network to the unique biological information of a certain item of subsystem submission checked person is verified, while submitting the detailed programs for wanting to verify;Verify subsystem to receive after the verification detailed programs that verification people submits, checking authorization is applied for checked person by communication network;Checked person responds this application, and authorization verification people allows the project verified;Verify subsystem and the data after empirical tests are called from identity information database according to the mandate project of checked person, then show verification people;Checking authorization therein is that checked person provides the authorization code that verification subsystem accreditation is verified to people is verified, and verification people is verified the identity information of checked person using the authorization code.User real identification can be verified using biological information.

Description

A kind of utilization communication network verifies the method and system of user real identification
Technical field
It is more particularly to a kind of to utilize communication network core the present invention relates to a kind of method and system for verifying user real identification Look into the method and system of user real identification.
Background technology
Present applicant is in the patent of invention file (Application No. that Authorization Notice No. is CN101136909B CN200610113602.3 the method and system that a kind of utilization communication network verifies user real identification are disclosed in), it is therein Method comprises the following steps:1) checking system is by one or more of the unique features information and identity database of checked person True identity information is associated;2) a certain item unique features that people submits checked person by communication network to checking system are verified Information, while submitting the detailed programs for wanting to verify;3) checking system, which is received, verifies after the verification detailed programs that people submits, and passes through Communication network applies for checking authorization to checked person;4) checked person responds the application, and authorization verification people allows via verification The project that system is verified;5) checking system is adjusted according to the mandate project of checked person from the identity information database in checking system With the data after empirical tests, verification people is then showed.The above method is used in the case where ensureing privacy of user, quick, side Just the true identity of user is verified.
Method disclosed in CN101136909B is in logical number of such as identity with reference to disclosed in it, phone number, fixed electricity Talk about number, E-mail address, bank's card number, identification card number, educational background card number, QQ number code, MSN numbers, user's disparate networks account During the unique features information of family number, the purpose for quickly and easily verifying the true identity of user can be realized.However, in reality Also the above-mentioned unique features information artificially set is not known and only just knows that checked person's is some in the presence of verification people in the life of border The situation of biological information (such as, face information, handwritten signature information).
Therefore, it is necessary to be extended to the method disclosed in CN101136909B, so as to achieve using biological special Reference breath quickly and easily verifies the purpose of the true identity of user.
In addition, increasing object is connected by Internet of Things and Internet technology, internet is just welcoming a data letter The huge explosion of breath.Therefore, it is also desirable to consider how to improve the body for checked person by making full use of these magnanimity informations Part information verified obtained by result reliability.
The content of the invention
Least for technical problem mentioned above is partly solved, the present invention proposes following technical scheme.
According to the first aspect of the invention, it is proposed that a kind of method that utilization communication network verifies user real identification, Comprise the following steps:Subsystem is verified by one or more of the unique features information and identity information database of checked person True identity information is associated;Verify a certain item unique features that people submits checked person by communication network to verification subsystem Information, while submitting the detailed programs for wanting to verify;Verify subsystem to receive after the verification detailed programs that verification people submits, pass through Communication network applies for checking authorization to checked person;Checked person responds this application, and authorization verification people allows via verification subsystem The project that system is verified;Verify subsystem and the number after empirical tests is called from identity information database according to the mandate project of checked person According to, then show verification people;Checking authorization therein is that checked person provides verification subsystem accreditation verification to people is verified Authorization code, makes verification people verify the identity information of checked person using the authorization code, and unique features information therein is to use The biological information at family.
According to the first aspect of the invention, it is proposed that a kind of method that utilization communication network verifies user real identification, Comprise the following steps:Subsystem is verified by one or more of the unique features information and identity information database of checked person True identity information is associated;The identity information that checked person selects to verify by verification server by communication network Mesh, then verifies key to the identity information item setup selected;When verification people needs to verify the identity information of checked person, It is required that one or more of the unique features information of itself and verification key are informed verification people by checked person;Verify people and pass through communication One or more of the unique features information and verification key that network informs checked person submit to verification subsystem;Verify subsystem System is received after verification request and good authentication key, and the identity information of corresponding empirical tests is called from identity information database Mesh number evidence, and verification people is showed, unique features information therein is the biological information of user.
The biological information of the method, wherein user of verification user real identification according to the first aspect of the invention Including at least one of following message for being extracted:Face, fingerprint, iris, hand-type, sound, signature, gait.
The method of verification user real identification according to the first aspect of the invention, it is further comprising the steps of:Verify son Query expansion that system is also carried out by third party's data verification subsystem to third party database is verified, and is being checked After the identity reality of people is verified, by the corresponding body of the checked person obtained in authenticity verification from third party database Part extension information storage is into identity information database, for later verification.
According to the second aspect of the invention, the side of verification user real identification according to the first aspect of the invention Method, when the high dimensional information that third party database is captured using web crawlers for particular organisms characteristic information, is also wrapped Include following steps:Pass through the dynamic covariance of the higher-dimension between captured high dimensional information to judge captured high dimensional information and quilt Whether match, verified to aid in verifying subsystem between one or more of unique features information for verifying people.
The advantage of the invention is that:The method of verification user real identification according to the first aspect of the invention, can The true identity of user is quickly and easily verified using biological information.Verification according to the second aspect of the invention is used The method of family true identity, is verified for the high dimensional information that particular organisms characteristic information is captured with reference to web crawlers, is entered The identity information that one step is improved for checked person verified obtained by result reliability.
Brief description of the drawings
By reading the detailed description of following detailed description, various other advantages and benefit is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of embodiment, and can not be considered as to this The limitation of invention.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows according to the embodiment of the present invention to realize the system architecture collected data, form database.
Fig. 2 shows the one kind for the method that user real identification is verified according to the utilization communication network of embodiment of the present invention The flow chart of example implementation.
Fig. 3 show according to the utilization communication network of embodiment of the present invention verify user real identification method it is another Plant the flow chart of example implementation.
Embodiment
The illustrative embodiments of the disclosure are more fully described below with reference to accompanying drawings.Although showing this public affairs in accompanying drawing The illustrative embodiments opened, it being understood, however, that may be realized in various forms the disclosure without the reality that should be illustrated here The mode of applying is limited.Conversely it is able to be best understood from the disclosure there is provided these embodiments, and can be by this public affairs The scope opened completely convey to those skilled in the art.
Fig. 1 shows according to the embodiment of the present invention to realize the system architecture collected data, form database.As schemed Shown in 1, data, the system of formation database are collected in realization of the invention to be included:User's access subsystem, affiliate's subsystem System, checking subsystem, charging and fee-deducting subsystem, management subsystem and third party's data verification subsystem.User's access subsystem The input link of user identity is inputted using communication network, and utilizes the input link of internet input user identity;Institute State communication network respectively via communication link connect affiliate's subsystem and checking subsystem, the internet also respectively via Communication link connects affiliate's subsystem and checking subsystem respectively;Affiliate's subsystem is via communication link connectivity verification Subsystem;Verify subsystem via private line access third party's data verification subsystem, and respectively connection charging and fee-deducting subsystem and Manage subsystem.
As shown in figure 1, third party's data verification subsystem includes Ministry of Public Security's server, Ministry of Education's server, other three Square server, and the third party database being connected respectively with above-mentioned various servers, third party database include demographic data Storehouse, academic database, other third party databases.Although being not specifically illustrated in Fig. 1, those skilled in the art can be with It is contemplated that for example, third party database also include from telecom operators, public security, education, social security, industry and commerce and other The other information of commercial undertaking.Moreover, those skilled in the art are also contemplated that third party database using network The high dimensional information that reptile is captured for particular organisms characteristic information (for example, facial image, signature image etc.) is (for example, source The information such as several facial images, several signature images in the different times of disparate databases).
Fig. 2 shows the one kind for the method that user real identification is verified according to the utilization communication network of embodiment of the present invention The flow chart of example implementation.As shown in Fig. 2 the method that the exemplary utilization communication network verifies user real identification, including Following steps:
S202:Subsystem is verified by one or more of the unique features information and identity information database of checked person True identity information is associated, and unique features information therein is the biological information of user;
S204:People is verified by communication network to a certain item unique features information for verifying subsystem submission checked person, The detailed programs for wanting to verify are submitted simultaneously;
S206:Verify subsystem and receive and verify after the verification detailed programs that people submits, by communication network to checked person Apply for checking authorization, checking authorization therein is that checked person provides the mandate generation that verification subsystem accreditation is verified to people is verified Code, makes verification people verify the identity information of checked person using the authorization code;
S208:Checked person responds this application, and authorization verification people allows via the project for verifying subsystem verification;
S210:Subsystem is verified to be called after empirical tests from the identity information database according to the mandate project of checked person Data, then show verification people.
Selectively, in the method for verification user real identification as shown in Figure 2, the biological information bag of the user Include at least one of extracted following message:Face, fingerprint, iris, hand-type, sound, signature, gait.
Selectively, the method for verification user real identification as shown in Figure 2 is further comprising the steps of:
S212:Verify the query expansion that subsystem is also carried out by third party's data verification subsystem to third party database To be verified, after the identity reality of checked person is verified, it will be obtained in authenticity verification from third party database To checked person respective identity extension information store into above-mentioned identity information database, for later verification.
The height captured when the third party database shown in Fig. 1 using web crawlers for particular organisms characteristic information When tieing up information, selectively, the method for verification user real identification as shown in Figure 2 is further comprising the steps of:
S214:Pass through the dynamic covariance of higher-dimension between captured high dimensional information judge captured high dimensional information with Whether match, verified to aid in verifying subsystem between one or more of the unique features information of checked person.
Fig. 3 show according to the utilization communication network of embodiment of the present invention verify user real identification method it is another Plant the flow chart of example implementation.As shown in figure 3, the method that the exemplary utilization communication network verifies user real identification, bag Include following steps:
S302:Subsystem is verified by one or more of the unique features information and identity information database of checked person True identity information is associated, and unique features information therein is the biological information of user;
S304:The identity information project that checked person selects to verify by verification server by communication network, so Key is verified to the identity information item setup selected afterwards;
S306:When verify people need verify checked person identity information when, it is desirable to checked person by itself one or Multinomial unique features information and verification key inform verification people;
S308:One or more of unique features information and verify close that verification people is informed checked person by communication network Key submits to verification subsystem;
S310:Verify subsystem to receive after verification request and good authentication key, called from identity information database pair The identity information project data for the empirical tests answered, and show verification people.
Selectively, in the method for verification user real identification as shown in Figure 3, the biological information of user includes At least one of following message extracted:Face, fingerprint, iris, hand-type, sound, signature, gait.
Selectively, the method for verification user real identification as shown in Figure 3 is further comprising the steps of:
S312:Verify the query expansion that subsystem is also carried out by third party's data verification subsystem to third party database To be verified, after the identity reality of checked person is verified, it will be obtained in authenticity verification from third party database To checked person respective identity extension information store into above-mentioned identity information database, for later verification.
The height captured when the third party database shown in Fig. 1 using web crawlers for particular organisms characteristic information When tieing up information, selectively, the method for verification user real identification as shown in Figure 3 is further comprising the steps of:
S314:Pass through the dynamic covariance of higher-dimension between captured high dimensional information judge captured high dimensional information with Whether match, verified to aid in verifying subsystem between one or more of the unique features information of checked person.
The illustrative methods of verification user real identification proposed by the invention have advantages below:
Come from firstly, since third party's data verification subsystem shown in Fig. 1 includes demographic database, academic database Multiple third party databases of different system and the different information of storage, using verification user real identification as shown in Figures 2 and 3 Illustrative methods antifraud can be realized by the retrieval to multiple data sources.Come from because fake producer changes simultaneously The difficulty of multiple third party databases of different system and the different information of storage is greatly increased, so for the retrieval of multiple data sources The probability being forged simultaneously to multiple results corresponding to same checked person is reduced.Realize and utilize biological information Quickly and easily verify the purpose of the true identity of user.
Secondly as what third party database can be captured using web crawlers for particular organisms characteristic information High dimensional information, just can now pass through the dynamic covariance of the higher-dimension between captured high dimensional information to judge captured higher-dimension Whether match, verified to aid in verifying subsystem between information and one or more of the unique features information of checked person. So as to further increase the reliability for verifying result.
Finally, user browses information to prior art for convenience, it will usually pass through client software or web application The network informations such as news headlines, blog, blog are aggregated to identical position and information fusion is realized.Simultaneously as The magnanimity of information increases under Web2.0 environment, and especially user being on the increase from content is produced, user daily various microbloggings, SNS creates the content of vast number, not only many but also miscellaneous.In addition, NGO and individual just put increasing data message Onto network.Moreover, increasing object is connected by Internet of Things and Internet technology, internet will welcome a data The huge explosion of information.How to filter and recombinate these data messages and be allowed to ultimately become personalized information, will be these magnanimity Where the value that information is present.The method of verification user real identification proposed by the invention can exactly make full use of these seas Measure the reliability of the result obtained by information is verified come the identity information improved for checked person.
Therefore, the method for verification user real identification proposed by the invention can be applied to sincere platform, reference platform, Personal information protection platform, investment and financing platform, big data platform, be finance, common carrier, marriage and making friend, hire a car, logistics, The industries such as housekeeping, recruitment provide the service of multi-data source antifraud.This antifraud service or system can provide web wall scrolls, web In batches, a variety of access forms such as web page, web services, API, SDK.This multi-data source antifraud aggregated service can also be with Mobile phone identification policy is combined, furthermore, it is possible to use security algorithm (class MD5 algorithms) to identity data therein.
It is described above, it is only the exemplary embodiment of the present invention, but protection scope of the present invention is not limited to This, any one skilled in the art the invention discloses technical scope in, the change that can readily occur in or replace Change, should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with the protection of the claim Scope is defined.

Claims (8)

1. a kind of method that utilization communication network verifies user real identification, comprises the following steps:
Subsystem is verified by one or more of the unique features information of checked person and the true identity in identity information database Information is associated;
People is verified by communication network to a certain item unique features information for verifying subsystem submission checked person, is thought while submitting The detailed programs to be verified;
Verify subsystem to receive after the verification detailed programs that verification people submits, apply for that verification is awarded to checked person by communication network Power;
Checked person responds the application, and authorization verification people allows via the project for verifying subsystem verification;
Verify subsystem and the data after empirical tests are called from the identity information database according to the mandate project of checked person, so After show verification people;
Wherein described checking authorization is that checked person provides the authorization code that verification subsystem accreditation is verified to people is verified, and makes verification People verifies the identity information of checked person using the authorization code, it is characterised in that
The unique features information is the biological information of user.
2. according to the method described in claim 1, wherein, the biological information of the user includes extracted following message At least one of:Face, fingerprint, iris, hand-type, sound, signature, gait.
3. method according to claim 1 or 2, further comprising the steps of:
The subsystem query expansion that also carries out third party database by third party's data verification subsystem is verified to carry out core Look into, after the identity reality of checked person is verified, by authenticity verification from third party database obtain by core The respective identity extension information for looking into people is stored into the identity information database, for later verification.
4. method according to claim 3, when third party database using web crawlers for particular organisms feature It is further comprising the steps of during the high dimensional information that information is captured:
Pass through the dynamic covariance of higher-dimension between captured high dimensional information to judge captured high dimensional information and checked person One or more of unique features information between whether match, come aid in verify subsystem verified.
5. a kind of method that utilization communication network verifies user real identification, comprises the following steps:
Subsystem is verified by one or more of the unique features information of checked person and the true identity in identity information database Information is associated;
Checked person selects the identity information project that can be verified by verification server by communication network, then to having selected Identity information item setup verifies key;
When verification people needs to verify the identity information of checked person, it is desirable to which checked person is unique special by itself one or more Reference ceases and verified key and informs verification people;
One or more of the unique features information and verification key that verification people is informed the checked person by communication network are carried Give verification subsystem;
Verify subsystem to receive after verification request and good authentication key, corresponding empirical tests are called from identity information database Identity information project data, and show verification people, it is characterised in that
The unique features information is the biological information of user.
6. method according to claim 5, wherein, the biological information of the user includes extracted following message At least one of:Face, fingerprint, iris, hand-type, sound, signature, gait.
7. the method according to claim 5 or 6, further comprising the steps of:
The subsystem query expansion that also carries out third party database by third party's data verification subsystem is verified to carry out core Look into, after the identity reality of checked person is verified, by authenticity verification from third party database obtain by core The respective identity extension information for looking into people is stored into the identity information database, for later verification.
8. method according to claim 7, when third party database using web crawlers for particular organisms feature It is further comprising the steps of during the high dimensional information that information is captured:
Pass through the dynamic covariance of higher-dimension between captured high dimensional information to judge captured high dimensional information and checked person One or more of unique features information between whether match, come aid in verify subsystem verified.
CN201710549189.3A 2017-07-07 2017-07-07 A kind of utilization communication network verifies the method and system of user real identification Pending CN107330104A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710549189.3A CN107330104A (en) 2017-07-07 2017-07-07 A kind of utilization communication network verifies the method and system of user real identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710549189.3A CN107330104A (en) 2017-07-07 2017-07-07 A kind of utilization communication network verifies the method and system of user real identification

Publications (1)

Publication Number Publication Date
CN107330104A true CN107330104A (en) 2017-11-07

Family

ID=60197173

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710549189.3A Pending CN107330104A (en) 2017-07-07 2017-07-07 A kind of utilization communication network verifies the method and system of user real identification

Country Status (1)

Country Link
CN (1) CN107330104A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109857766A (en) * 2018-12-22 2019-06-07 深圳市珍爱捷云信息技术有限公司 User information verification method, device, computer equipment and computer storage medium
CN113177850A (en) * 2021-04-15 2021-07-27 国任财产保险股份有限公司 Method and device for multi-party identity authentication of insurance
CN113961901A (en) * 2021-11-15 2022-01-21 济南丽阳神州智能科技有限公司 Voiceprint-based housekeeping service personnel credit authentication method, device and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101034984A (en) * 2006-09-22 2007-09-12 北京国政通网络科技有限公司 Establishing the true identify database of the user with the personal information submitted by the user
CN101136909A (en) * 2006-10-09 2008-03-05 北京国政通网络科技有限公司 Method and system for checking user real identification using communication network
CN103150406A (en) * 2013-03-29 2013-06-12 北京国政通科技有限公司 Information query and notification method and device
CN103971043A (en) * 2014-05-28 2014-08-06 李雪 Identity authentication method and authentication information acquisition method
CN106156341A (en) * 2016-07-14 2016-11-23 微额速达(上海)金融信息服务有限公司 The identification method of the Internet labeled data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101034984A (en) * 2006-09-22 2007-09-12 北京国政通网络科技有限公司 Establishing the true identify database of the user with the personal information submitted by the user
CN101136909A (en) * 2006-10-09 2008-03-05 北京国政通网络科技有限公司 Method and system for checking user real identification using communication network
CN103150406A (en) * 2013-03-29 2013-06-12 北京国政通科技有限公司 Information query and notification method and device
CN103971043A (en) * 2014-05-28 2014-08-06 李雪 Identity authentication method and authentication information acquisition method
CN106156341A (en) * 2016-07-14 2016-11-23 微额速达(上海)金融信息服务有限公司 The identification method of the Internet labeled data

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109857766A (en) * 2018-12-22 2019-06-07 深圳市珍爱捷云信息技术有限公司 User information verification method, device, computer equipment and computer storage medium
CN109857766B (en) * 2018-12-22 2022-09-06 深圳市珍爱捷云信息技术有限公司 User information verification method and device, computer equipment and computer storage medium
CN113177850A (en) * 2021-04-15 2021-07-27 国任财产保险股份有限公司 Method and device for multi-party identity authentication of insurance
CN113961901A (en) * 2021-11-15 2022-01-21 济南丽阳神州智能科技有限公司 Voiceprint-based housekeeping service personnel credit authentication method, device and medium
CN113961901B (en) * 2021-11-15 2022-10-25 济南丽阳神州智能科技有限公司 Voiceprint-based housekeeping service personnel credit authentication method, device and medium

Similar Documents

Publication Publication Date Title
US10652018B2 (en) Methods and apparatus for providing attestation of information using a centralized or distributed ledger
US11301555B2 (en) Authentication system
US10789346B2 (en) Online identity scoring
CN108292331B (en) Method and system for creating, verifying and managing identities
US9946865B2 (en) Document authentication based on expected wear
US20190205889A1 (en) System and method for biometric credit based on blockchain
US7725732B1 (en) Object authentication system
US11811754B2 (en) Authenticating devices via tokens and verification computing devices
CN108964925B (en) File authentication equipment method, device, equipment and readable medium
CN110322317B (en) Transaction data processing method and device, electronic equipment and medium
CN104935438A (en) Method and apparatus for identity verification
CN107330104A (en) A kind of utilization communication network verifies the method and system of user real identification
CN113111330B (en) Enterprise legal identity authentication management method and system based on enterprise chain code
US11663306B2 (en) System and method for confirming a person's identity
CN113239335A (en) Block chain personnel information management system and method based on Baas
CN109409110A (en) A kind of electronic document signature method, device, equipment and readable medium
CN110223075B (en) Identity authentication method and device, computer equipment and storage medium
CN106657164B (en) A kind of identification composite algorism and system for real-name authentication
KR101763275B1 (en) The method for customer certification using credit bereau information, the system thereof, and computer-readable recording medium for recording program executing the same method
CN111476081A (en) Identity authentication model based on block chain and face recognition
Elaswad et al. Identity management for e-government Libya as a case study
CN110581820A (en) Financial science and technology application system and method based on IPV6 and biological recognition technology
Tyagi et al. Online Identity Verification.
CN114553684B (en) Method, device, computer equipment and storage medium for network point operation and maintenance
CN114268438B (en) Multiparty collaborative signature method, multiparty collaborative signature device, multiparty collaborative signature computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171107