CN108053273B - Credit method realized based on intelligent equipment - Google Patents

Credit method realized based on intelligent equipment Download PDF

Info

Publication number
CN108053273B
CN108053273B CN201710835339.7A CN201710835339A CN108053273B CN 108053273 B CN108053273 B CN 108053273B CN 201710835339 A CN201710835339 A CN 201710835339A CN 108053273 B CN108053273 B CN 108053273B
Authority
CN
China
Prior art keywords
information
approval
data
cloud
credit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710835339.7A
Other languages
Chinese (zh)
Other versions
CN108053273A (en
Inventor
胡金钱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710835339.7A priority Critical patent/CN108053273B/en
Publication of CN108053273A publication Critical patent/CN108053273A/en
Application granted granted Critical
Publication of CN108053273B publication Critical patent/CN108053273B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Abstract

The invention provides a credit method realized based on intelligent equipment, which comprises a credit code obtained based on intelligent hardware; the credit code is used as follows: a. the user inputs user information on the intelligent equipment, the intelligent equipment analyzes through a built-in database, if the user data is in a user list, unlocking is carried out, and if the user data is not in the user list, unlocking is refused; the user information is a set of unique identification codes.

Description

Credit method realized based on intelligent equipment
Technical Field
The invention relates to a process approval method, in particular to a credit method realized based on intelligent equipment.
Background
The society is composed of a plurality of small individuals, each small individual is endowed with certain convenience through the construction of a credit system when living in society, if the individual with better credit can enjoy more social resources, and if the individual with poor credit can only enjoy less social resources.
The credit system is the most basic unit of society, and is also the provider and the receiver of credit, but when the personal credit system is compared with the enterprise credit system, the behavior that the personal credit system buys an order for the enterprise credit system frequently occurs, and when the personal credit system goes on business, the person generally needs to pay for the order and obtain an invoice, and then returns to the enterprise for reimbursement. The operation mode has a great financial loophole, and the economic loss of enterprises and the economic loss of tax authorities are easily caused.
Furthermore, when an enterprise operates, the examination and approval is the most common management operation in the enterprise operation process, and on the premise of the prior art, the visual representation of the examination and approval completion is realized by using a specific seal stamp, but the stamping mode of the seal stamp has great potential safety hazard and is easy to forge.
Based on the above, the conventional intelligent stamp can solve the counterfeiting problem, such as the anti-counterfeiting stamping function of the intelligent stamp can be completed through the positioning and limiting functions of time and place, the comparison function of hardware stamps and the like.
Disclosure of Invention
The invention aims to provide a simple credit method realized based on intelligent equipment.
In order to solve the technical problem, the invention provides a credit method realized based on intelligent equipment, which comprises a credit code obtained based on the intelligent equipment; the credit code is used as follows:
a. the user inputs user information on the intelligent equipment, the intelligent equipment analyzes through a built-in database, if the user data is in a user list, unlocking is carried out, and if the user data is not in the user list, unlocking is refused; the user information is a group of unique identification codes;
b. a user inputs a group of credit codes and password information on the intelligent equipment, the credit codes are uploaded to the cloud end through the intelligent equipment, relevant information is called through the credit codes through the cloud end database for association, and the use right of the credit codes is obtained through the password information;
if the password information does not accord with the information stored in the database, the association fails, and the credit code using authority of the time is not opened;
if the password information of this time is consistent with the information stored in the database, the association is successful, and the credit code using authority of this time is opened;
c. the method comprises the steps that a user inputs use information on the intelligent equipment, wherein the use information comprises payment item information during consumption, the payment information comprises credit code information of a third party and consumption amount and type, the payment information is related to the third party through the credit code information of the third party, and the consumption amount and the consumption type are used as recording certificates of invoices and taxes; the cloud end receives the use information, starts to verify the identity information of the user through the data stored in the database, and calls an approval authority value according to the identity information; if the authority value exceeds the approval authority value, initiating approval;
d. the user completes credit settlement, the result of the related settlement is fed back to the cloud, the cloud associates invoice, tax and consumption state information according to the credit code, for enterprises associated with the credit code of a third party, the invoice is directly issued through the credit code of the user, and the tax authority directly receives the specific information of the consumption and associates the specific information to a related account in the form of the credit code; finally, the user records the consumption in the form of data record.
Further, the process of the approval is as follows:
in the implementation process, firstly, a user needs to pass the front-end verification, and initiates a related approval process based on a verification result, and the specific steps are as follows:
step one, a person logs on a front end;
logging in a front end through operation of an account number, a secret key and the like, and recording related information of the person at the moment by the front end, wherein the related information comprises eID data, name data and biological identification information data;
step two, the front end carries out data processing on the request for initiating the application;
when the document to be approved is a paper edition document, image acquisition processing is carried out through the front end, such as scanning input and photo shooting;
step three, the front end sends data to the cloud end for data processing, and the sent data comprises the request data finished in the step one and the personal account data of the relevant front end user;
the data are obtained through the first step and the second step respectively;
adding time stamp data in a tamper-proof manner in the process of data processing; because the time stamp data is a group of data generated according to the current time, and the personal intelligent device is mastered on a private hand, the possibility that the time information is falsified is high, even if the time information of the device is forcibly recovered through a recovery technology to prevent falsification, the time information still has certain possibility of being falsified based on the time difference between the time generated by a national time service center and the time received by the device, therefore, the method adopts a central processing method, and the cloud end uniformly generates correct time stamp data and embeds the correct time stamp data into the data initiated by the front end;
fourthly, the cloud side carries out data packet processing;
the data packet processing comprises the following steps:
4.1, the cloud compares the request data with the personal account data to confirm the validity of the request data and the personal account data;
the comparison steps are as follows: analyzing the personal account data through a cloud database, confirming the personal information in the personal account data and the used front-end number information, and confirming whether the front-end number information is matched with the personal information at the moment of the information sending time T1 of the personal information; confirming that the individual is in an illegal use state once the data does not match; once the data is matched, the use is confirmed to be in a legal state, and the next step is carried out;
4.2, the cloud end writes the personal account data into the request data;
4.3, the cloud extracts the time data at the moment and generates time stamp data;
4.4, the cloud end writes the timestamp data into the request data according to a certain tamper-proof algorithm;
fifthly, matching the cloud end with the approval end of the data packet;
5.1, the cloud reads a data list in a cloud database through the request data and matches the data list to a related approval end; when the request data is financial payment data, according to the amount of payment and the contract information generated by matching the payment information with the information of a payee, reading the information of the signer of the local contract and endowing the information with approval authority 1, reading the information of the financial manager of the local and endowing the information with approval authority 2, reading the information of the financial approver of the invention and endowing the information with approval authority 3;
5.2, automatically matching all the approval ends associated with the approval authority 1, the approval authority 2 and the approval authority 3 by the cloud end;
step six, the cloud sends the request information to a relevant approval end, and the request information is approved in sequence according to the sequence of 1, 2 and 3;
during the approval process:
6.1, the operator of each approval end logs in the approval end through personal information;
6.2, recording personal identity information of the approval personnel by the approval end, wherein the identity information is eID data, two-dimensional codes or real names and other data capable of expressing unique identity information of the personnel;
6.3, the approval end makes a relevant approval result and feeds back the approval result to the front end;
in the approval process, any one of the options 1, 2 and 3 fails to pass, namely the approval failure is prompted;
6.4, any approval end does not make a response within a certain time limit, namely, if the approval end is in an offline state, the cloud end selects a replacement scheme for further approval;
6.4.1, subordinate permission distribution is carried out on the approval authorities 1, 2 and 3, in the authority 1, the authority distribution is redistributed, people are responsible for the A-type authority, related enforcement personnel are the B-type authority, under the condition that the A-type authority is lost, the cloud end actively distributes the B-type authority, the B-type authority is carried out in a mode that a plurality of people simultaneously approve, when 10B-type authority approval ends exist, the standard that 3B-type authorities simultaneously approve is required to be met, and the approval end is selected in a random distribution mode;
6.4.1.1, sending an approval request by a cloud, respectively generating random numbers for mutual exchange after each B-class authority approval end receives the approval request, obtaining the random numbers which are respectively arranged as the first three bits by each B-class approval end, and determining the B-class approval ends corresponding to the three random numbers as the three approval ends of the approval;
6.4.1.2, carrying out approval by three B-type authority approval ends, and rejecting the approval result as long as any one approval end fails to approve.
Detailed Description
The device is realized by a front end, a cloud end and a back end, wherein the front end is an application initiating end, the cloud end is a data storage and distribution end, and the back end is a checking end; the front end can be a handheld intelligent device such as an intelligent seal and a smart phone, and the rear end can be a related intelligent hard seal device such as a official seal, a financial seal and a legal seal.
Embodiment 1 provides a credit method implemented based on intelligent devices.
The method is realized based on an intelligent device, wherein the intelligent device is an intelligent seal, an intelligent mobile phone and the like; the unique code of the seal and the related information data of the enterprise unit corresponding to the intelligent seal are arranged in the database of the intelligent seal, the credit code of the intelligent seal is calculated through the unique code and the related enterprise data and an algorithm, and the number can be displayed in figures, letters, various characters, figures and the like, and can also be read by other intelligent equipment.
Relevant information (such as billing information of an enterprise, tax information of the enterprise, employee information of the enterprise and the like) corresponding to the credit code is built in a cloud database; when the user uses the method, the steps are as follows:
a. the user inputs user information on the intelligent equipment, the intelligent equipment analyzes through a built-in database, if the user data is in a user list, unlocking is carried out, and if the user data is not in the user list, unlocking is refused; the user information is a set of unique identification codes.
b. A user inputs a group of credit codes and password information on the intelligent equipment, the credit codes are uploaded to the cloud end through the intelligent equipment, relevant information is called through the credit codes through the cloud end database to be associated, and the use right of the credit codes is obtained through the password information.
If the password information does not accord with the information stored in the database, the association fails, and the credit code using authority of the time is not opened; if the password information of this time is consistent with the information stored in the database, the association is successful, and the credit code using authority of this time is opened.
c. The user inputs use information on the intelligent device, such as payment item information (for example, credit code information of a third party, the amount and the type of consumption, the credit code information of the third party is related to the third party, and the amount and the type of consumption are used as record evidence of invoice, tax and the like); the cloud end receives the use information, starts to verify the identity information of the user through the data stored in the database, and calls the authority value according to the identity information.
The cloud compares the use information through the user authority value, if the user authority value is larger than the use information, the comparison is passed, and the next step is carried out;
if the user authority value is smaller than the use information, entering an examination flow.
The examination process is as follows:
in the implementation process, firstly, a user needs to pass the front-end verification, and initiates a related approval process based on a verification result, and the specific steps are as follows:
step one, an individual logs on to the front end.
The front end is logged in through account number, secret key and the like, and relevant information of the person at the moment, such as eID data, name data, biological identification information data and the like, is recorded by the front end.
And step two, the front end carries out data processing on the request for initiating the application.
If the document to be approved is a paper edition document, image acquisition processing is carried out through the front end, such as scanning input, photo shooting and the like;
and step three, the front end sends the data to the cloud end for data processing, and the sent data comprises the request data finished in the step one and the personal account data of the relevant front end user.
The data are obtained through the first step and the second step respectively.
Adding time stamp data in a tamper-proof manner in the process of data processing; since the time stamp data is a set of data generated according to the current time, and the personal intelligent device has a high possibility of being tampered with the time information because the personal intelligent device is held in the private hand, even if the time information of the device is forcibly recovered through a recovery technology to prevent tampering, the personal intelligent device still has a certain possibility of being tampered based on the time difference between the time generated by the national weather center and the time received by the device, therefore, the method adopts a central processing method, and the correct time stamp data is uniformly generated by the cloud and embedded in the data initiated by the front end.
And step four, the cloud carries out data packet processing.
The data packet processing comprises the following steps:
4.1, the cloud compares the request data with the personal account data to confirm the legality of the request data and the personal account data.
The comparison steps are as follows: analyzing personal account data through a cloud database, confirming personal information in the personal account data and used front end number information, and confirming whether the front end number information is matched with the personal information at the time of the information sending time T1 of the personal information; confirming that the individual is in an illegal use state once the data does not match; once the data matches, the usage is confirmed to be in a legal state, and the next step is entered.
4.2, the cloud writes the personal account data into the request data;
4.3, the cloud extracts the time data at the moment and generates time stamp data;
and 4.4, writing the time stamp data into the request data by the cloud end according to a certain tamper-proof algorithm.
And step five, the cloud end is matched with the examination end of the data packet.
5.1, the cloud end reads a data list in a cloud end database through the request data and matches the data list to a related examination end; if the request data is financial payment data, the information of the signer of the local contract is read according to the contract information generated by matching the payment amount and the payee information with the payment information, and the information is endowed with an examination authority 1, the information of the financial manager of the local is endowed with an examination authority 2, and the financial examination information is endowed with an examination authority 3.
And 5.2, automatically matching all the examination ends associated with the examination authority 1, the examination authority 2 and the examination authority 3 by the cloud.
And step six, the cloud sends the request information to a related examination end, and the request information is examined sequentially according to the sequence of 1, 2 and 3.
In the course of the review:
6.1, an operator of each examining end logs in the examining end through personal information;
6.2, the censorship end records the personal identity information of the censorship personnel, wherein the identity information is eID data, two-dimensional codes or real names and other data which can express the unique identity information of the censorship personnel;
6.3, the examination end makes relevant examination results and feeds back the examination results to the front end.
In the examination process, any choice of 1, 2 and 3 which fails is presented, namely the examination is failed.
6.4, any checking end does not make a response within a certain time limit, namely the cloud end selects an alternative scheme for further checking according to the offline state of the checking end.
6.4.1, subordinate authority distribution is carried out on the examination authorities 1, 2 and 3, if the authority distribution is carried out in the authority 1, the authority distribution is redistributed to be responsible for the A-type authority, related enforcement personnel are B-type authorities, under the condition that the A-type authority is lost, the cloud end actively distributes the B-type authority, the B-type authority is carried out in a mode that a plurality of people simultaneously examine, for example, in 10B-type authority examination ends, the standards that 3B-type authorities simultaneously examine are required to be met, and the examination end is selected in a mode of random distribution;
6.4.1.1, the cloud sends an examination request, each class B permission examination end respectively generates random numbers for mutual exchange after receiving the examination request, each class B permission examination end obtains the random numbers which are respectively arranged into the first three bits, and the class B examination ends corresponding to the three random numbers are determined as the three examination ends of the examination;
6.4.1.2, three B-type authority examination ends carry out examination, and if any examination end does not pass the examination, the examination results are all refused.
d. The user completes credit settlement, the result of the related settlement is fed back to the cloud, the cloud associates the information such as invoice, tax, consumption state and the like according to the credit code, for example, an enterprise associated with the credit code of a third party directly issues the invoice through the credit code of the user, and a tax authority directly receives the specific information of the consumption and associates the specific information to a related account in the form of the credit code; finally, the user records the consumption in the form of data record.
In the association process, the cloud end issues invoices through the invoice template, registers the tax through the tax template, and finally notes related enterprise information such as the amount of the credit consumption, the consumption object and the like are made through the enterprise information. According to the invention, when in use, a user consumes through the group of credit codes, and carries out social activities through the credit value given to the group of credit codes by an enterprise, so that the defect that the enterprise carries out credit transaction by using private credit at the present stage is effectively overcome, and all consumption links are associated through the means, and all accounting processes are completed in the association process.
Finally, it is also noted that the above list is only one specific embodiment of the invention. It is obvious that the invention is not limited to the above embodiments, but that many variations are possible. All modifications which can be derived or suggested by a person skilled in the art from the disclosure of the present invention are to be considered within the scope of the invention.

Claims (2)

1. The credit method realized based on the intelligent equipment is characterized in that: including a credit code obtained based on the smart device;
the credit code is used as follows:
a. the user inputs user information on the intelligent equipment, the intelligent equipment analyzes through a built-in database, if the user data is in a user list, unlocking is carried out, and if the user data is not in the user list, unlocking is refused; the user information is a group of unique identification codes;
b. a user inputs a group of credit codes and password information on the intelligent equipment, the credit codes are uploaded to the cloud end through the intelligent equipment, relevant information is called through the credit codes through the cloud end database for association, and the use right of the credit codes is obtained through the password information;
if the password information does not accord with the information stored in the database, the association fails, and the credit code using authority of the time is not opened;
if the password information of this time is consistent with the information stored in the database, the association is successful, and the credit code using authority of this time is opened;
c. the method comprises the steps that a user inputs use information on intelligent equipment, wherein the use information comprises payment item information during consumption, the payment information comprises credit code information of a third party and consumption amount and type, the payment information is related to the third party through the credit code information of the third party, and the consumption amount and the consumption type are used as recording certificates of invoices and taxes; the cloud end receives the use information, starts to verify the identity information of the user through the data stored in the database, and calls an approval authority value according to the identity information; if the authority value exceeds the approval authority value, initiating approval;
d. the user completes credit settlement, the result of the related settlement is fed back to the cloud, the cloud associates invoice, tax and consumption state information according to the credit code, for the enterprise associated with the credit code of the other party, the invoice is directly issued through the credit code of the user, and the tax authority directly receives the specific information of the consumption and associates the specific information to a related account in the form of the credit code; finally, the user records the consumption in the form of data record.
2. The smart device implementation-based credit method of claim 1, characterized in that: the approval process is as follows:
in the implementation process, firstly, a user needs to pass the front-end verification, and initiates a related approval process based on a verification result, and the specific steps are as follows:
step one, a person logs on a front end;
logging in the front end through account number and key operation, and recording related information of the person at the moment by the front end, wherein the related information comprises eID data, name data and biological identification information data;
step two, the front end carries out data processing on the request for initiating the application;
when the document to be approved is a paper edition document, image acquisition processing is carried out through the front end, such as scanning input and photo shooting;
step three, the front end sends data to the cloud end for data processing, and the sent data comprises the request data finished in the step one and the personal account data of the relevant front end user;
the data are obtained through the first step and the second step respectively;
adding time stamp data in a tamper-proof manner in the process of data processing; adopting a central processing method, uniformly generating correct timestamp data by the cloud end, and embedding the timestamp data into the data initiated by the front end;
fourthly, the cloud side carries out data packet processing;
the data packet processing comprises the following steps:
4.1, the cloud compares the request data with the personal account data to confirm the legality of the request data;
the comparison steps are as follows: analyzing personal account data through a cloud database, confirming personal information in the personal account data and used front end number information, and confirming whether the front end number information is matched with the personal information at the time of the information sending time T1 of the personal information; confirming that the individual is in an illegal use state once the data does not match; once the data are matched, confirming that the use is in a legal state, and entering the next step;
4.2, the cloud writes the personal account data into the request data;
4.3, the cloud extracts the time data at the moment and generates time stamp data;
4.4, the cloud end writes the timestamp data into the request data according to a certain tamper-proof algorithm;
fifthly, matching the cloud end with the approval end of the data packet;
5.1, the cloud reads a data list in a cloud database through the request data and matches the data list with a related approval end; when the request data is financial payment data, according to the amount of payment and contract information generated by matching payment information with payee information, reading the information of the signer of the local contract and endowing the information with approval authority 1, reading the information of the financial manager of the local and endowing the information with approval authority 2, reading the information of the financial approver and endowing the information with approval authority 3;
5.2, automatically matching all the approval ends associated with the approval authority 1, the approval authority 2 and the approval authority 3 by the cloud end;
step six, the cloud sends the request information to a related examination and approval end, and the request information is examined and approved in sequence according to the sequence of 1, 2 and 3;
during the approval process:
6.1, an operator of each approval end logs in the approval end through personal information;
6.2, recording personal identity information of the approval personnel by the approval end, wherein the identity information is eID data, two-dimensional codes or all data capable of expressing unique identity information of the personnel with real names;
6.3, the approval end makes a relevant approval result and feeds the approval result back to the front end;
in the approval process, any one of the options 1, 2 and 3 fails to pass, namely the approval failure is prompted;
6.4, any approval end does not make a response within a certain time limit, and even if the approval end is not in an online state, the cloud end selects a replacement scheme for further approval;
6.4.1, subordinate permission distribution is carried out on the examination and approval authorities 1, 2 and 3, in the permission 1, the permission distribution is redistributed, the authority is responsible for artificial A-type permission, related enforcement personnel are B-type permissions, under the condition that the A-type permissions are lost, the cloud end actively distributes the B-type permissions, the B-type permissions are carried out in a mode that a plurality of persons examine and approve simultaneously, when 10B-type permission examination and approval ends exist, the criteria that 3B-type permissions examine and approve simultaneously must be met, and the examination and approval end is selected in a mode of random distribution;
6.4.1.1, sending an approval request by a cloud, respectively generating random numbers for mutual exchange after each class B permission approval end receives the approval request, solving the random numbers which are respectively arranged in the first three positions by each class B approval end, and determining the class B approval ends corresponding to the three random numbers as the three approval ends of the approval;
6.4.1.2, carrying out approval by three B-type authority approval ends, and rejecting the approval result as long as any one approval end fails to approve.
CN201710835339.7A 2017-09-15 2017-09-15 Credit method realized based on intelligent equipment Active CN108053273B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710835339.7A CN108053273B (en) 2017-09-15 2017-09-15 Credit method realized based on intelligent equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710835339.7A CN108053273B (en) 2017-09-15 2017-09-15 Credit method realized based on intelligent equipment

Publications (2)

Publication Number Publication Date
CN108053273A CN108053273A (en) 2018-05-18
CN108053273B true CN108053273B (en) 2023-01-31

Family

ID=62119362

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710835339.7A Active CN108053273B (en) 2017-09-15 2017-09-15 Credit method realized based on intelligent equipment

Country Status (1)

Country Link
CN (1) CN108053273B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1926587A (en) * 2005-04-25 2007-03-07 崔福 Information consumption individual account
CN1952969A (en) * 2005-10-17 2007-04-25 钱勇平 Credit inquiry method and system of electron contract on Internet
CN206193905U (en) * 2014-05-29 2017-05-24 苹果公司 Electronic equipment
CN106934618A (en) * 2017-01-24 2017-07-07 广州天宁信息技术有限公司 A kind of electronics authority generation, open verification method, apparatus and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090159682A1 (en) * 2007-12-24 2009-06-25 Dynamics Inc. Cards and devices with multi-function magnetic emulators and methods for using same
US20160307195A1 (en) * 2015-04-20 2016-10-20 Mastercard International Incorporated Systems and methods for message conversion and validation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1926587A (en) * 2005-04-25 2007-03-07 崔福 Information consumption individual account
CN1952969A (en) * 2005-10-17 2007-04-25 钱勇平 Credit inquiry method and system of electron contract on Internet
CN206193905U (en) * 2014-05-29 2017-05-24 苹果公司 Electronic equipment
CN106934618A (en) * 2017-01-24 2017-07-07 广州天宁信息技术有限公司 A kind of electronics authority generation, open verification method, apparatus and system

Also Published As

Publication number Publication date
CN108053273A (en) 2018-05-18

Similar Documents

Publication Publication Date Title
US10102363B2 (en) System and method for user enrollment in a secure biometric verification system
US10733606B2 (en) Biometric authentication for paper-based transactions
US8190904B2 (en) System for executing remote electronic notarization and signatory verification and authentication
CN108540449B (en) Intelligent seal control method and system and computer storage medium
CN101894435A (en) Network online invoice making method
CN108763898A (en) A kind of information processing method and system
CN110689415B (en) Public resource transaction platform management system
CN110457957A (en) Information processing method, device, electronic equipment and the medium of electronic bill
CN103886449A (en) Visible-code-based payment method and system with multiple security combination mechanisms
CN106934621A (en) The examination & approval safety certifying method and system of payment funding
US20120226609A1 (en) Remote Deposit Capture Method and Apparatus
CN106779698A (en) A kind of distribution for paying mark and its safe payment method, system and device
CN109242663A (en) A kind of bookkeeping methods and system based on block chain technology
CN108428135A (en) Auth method
CN110689348B (en) Revenue verification method, device, terminal and medium based on alliance chain
US9596088B1 (en) Systems and methods for biometric e-signature
US8924729B1 (en) Systems and methods for biometric E-signature
CN111491024A (en) Block chain-based bank letter method, system, terminal and storage medium
US8622289B2 (en) Method and apparatus for credit card tracking at pay stations
CN102622823A (en) Safe invoice system and realization method thereof
US20150039504A1 (en) Check verification and remote deposit capture
CN108053273B (en) Credit method realized based on intelligent equipment
CN116720839A (en) Financial information management method based on blockchain technology and supervision system thereof
CN111914231A (en) Block chain-based identity authentication method, system, equipment and storage medium
US11756147B1 (en) Systems and methods for verifying the authenticity of documents

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant