CN108183798A - Real name identification method, server, mobile terminal and the readable storage medium storing program for executing of application - Google Patents
Real name identification method, server, mobile terminal and the readable storage medium storing program for executing of application Download PDFInfo
- Publication number
- CN108183798A CN108183798A CN201810205594.8A CN201810205594A CN108183798A CN 108183798 A CN108183798 A CN 108183798A CN 201810205594 A CN201810205594 A CN 201810205594A CN 108183798 A CN108183798 A CN 108183798A
- Authority
- CN
- China
- Prior art keywords
- user
- identity
- mobile terminal
- information
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Abstract
The present invention relates to a kind of real name identification method of application, server, mobile terminal and readable storage medium storing program for executing, the real name identification method of the application includes:The real-name authentication request that the mobile terminal of user is sent is received, and judges whether user is certification for the first time, if certification for the first time, then performs next step;A pair of of public key and private key are distributed, and store private key, and public key is sent to mobile terminal for user;The first identity cipher-text information that the mobile terminal of user is sent is received, and the first identity cipher-text information is decrypted using private key, and the identity information of user is obtained in successful decryption;The identity information of acquired identity information and public security or banking system is subjected to real name matching, and in successful match, stores the identity information of user, and to the successful message of mobile terminal return authentication.Implement technical scheme of the present invention, can ensure that third-party application prevents the identity information of user to be intercepted in real-name authentication, so as to eliminate safe hidden trouble.
Description
Technical field
The present invention relates to information security field more particularly to a kind of real name identification method of application, server, mobile terminals
And readable storage medium storing program for executing.
Background technology
Internet technology develops to today, and network security is more and more important, and national Internet information office has opened at present
Beginning pushes forward the management of network true identity information comprehensively, and user's real name is just becoming the important way of supervision layer specification industry development.
But in practical operation, there is networking identity card decoding server to judge the method for ID card information, but have to be by net at present
Network transmit identity information, identity information be for a user it is sensitive, there are identity information by secrets disclosed by net etc. safety it is hidden
Suffer from.For example, more and more packet catchers can use now, such as:Wireshark, Fiddler etc. can capture client hair
The information sent and returned;For another example client decompiling instrument also it is old go out it is not poor, ANDROID's has ApkTool GUI, IOS
Can subscriber identity information be directly calculated by code with decompiling.Therefore, identity information by criminal if being utilized
Massive losses can be brought to user,
Invention content
The technical problem to be solved in the present invention is, above-mentioned there are the safety that identity information is divulged a secret for of the prior art
The defects of hidden danger, provides a kind of real name identification method of application, server, mobile terminal and readable storage medium storing program for executing, can eliminate body
The security risk of part information-leakage.
The technical solution adopted by the present invention to solve the technical problems is:A kind of real name identification method of application is constructed, it should
With in the server, include the following steps:
S11. the real-name authentication request that the mobile terminal of user is sent, and the institute in real-name authentication request are received
State whether user described in the identification information judgment of mobile terminal is certification for the first time, if certification for the first time, then perform next step;
S12. a pair of of public key and private key are distributed for the user, and stores the private key, and the public key is sent to institute
State mobile terminal;
S13. the first identity cipher-text information that the mobile terminal of user is sent is received, and using the private key to described first
Identity cipher-text information is decrypted, and the identity information of user is obtained in successful decryption, wherein, the first identity ciphertext letter
Breath is that the mobile terminal of user is encrypted identity information input by user using the public key and generates;
S14. by the progress real name matching of the identity information of the acquired identity information and public security or banking system, and
During successful match, the identity information of the user is stored, and to the successful message of mobile terminal return authentication.
Preferably, in the step S11, if not certification for the first time, then perform following steps:
S15. the identification information of the mobile terminal in being asked according to the real-name authentication searches the private key of the user
And identity information;
S16. the identity information is encrypted using the private key, to obtain the second identity cipher-text information, and by institute
It states the second identity cipher-text information and is sent to the mobile terminal;
If S17. receiving the confirmation instruction of mobile terminal transmission, complete certification, wherein, mobile terminal use it is described
The second identity cipher-text information is decrypted in public key, and in successful decryption, output decryption after identity information, and with
Family, which confirms, receives confirmation instruction input by user, and send it to server when identity information is correct.
Preferably, it after the step S16, further includes:
If S18. receiving the deletion instruction of mobile terminal transmission, step S12 is performed, wherein, mobile terminal is using
The second identity cipher-text information is decrypted in the public key, and in successful decryption, the identity information after output decryption, and
Input by user delete is received when user confirms identity information mistake to instruct, and send it to server.
The present invention also constructs a kind of real name identification method of application, using in the terminal, includes the following steps:
S21. certification application instruction input by user is received, and is asked to server side real-name authentication, the real-name authentication
Request includes the identification information of the mobile terminal, wherein, server is according to the identification information judgment of the mobile terminal
Whether user is certification for the first time, if certification for the first time, then performs next step;
S22. the public key that server is sent is received, wherein, server is distributed when being judged as certification for the first time for the user
A pair of of public key and private key, and the private key is stored, and the public key is sent to the mobile terminal;
S23. identity information input by user is received, and the identity information is encrypted using the public key, with life
Server is sent into the first identity cipher-text information, and by the first identity cipher-text information;
S24. after the successful message of certification for receiving server return, certification is completed, wherein, described in server use
The first identity cipher-text information is decrypted in private key, and the identity information of user is obtained in successful decryption, and will be obtained
The identity information taken carries out real name matching with the identity information of public security or banking system, if successful match, to the shifting
The successful message of dynamic terminal return authentication.
Preferably, it further includes:
S25. when user is non-certification for the first time, the second identity cipher-text information that server is sent is received, wherein, described the
Two identity cipher-text informations are encrypted the identity information stored using the private key of the user by server and are generated;
S26. the second identity cipher-text information is decrypted, and in successful decryption using the public key, output solution
Identity information after close;
S27. when user confirms that identity information is correct, confirmation instruction input by user is received, and send it to service
Device, to complete certification.
Preferably, it after step S26, further includes:
S28. it when user confirms identity information mistake, receives input by user delete and instructs, and send it to service
Then device performs step S22.
The present invention also constructs a kind of server, which is characterized in that including first processor, the first processor is used to hold
The step of method as described above is realized during the computer program stored in row first memory.
The present invention also constructs a kind of readable storage medium storing program for executing, is stored thereon with computer program, which is characterized in that the calculating
The step of method as described above is realized when machine program is performed by first processor.
The present invention also constructs a kind of mobile terminal, which is characterized in that including second processor, the second processor is used for
The step of method as described above being realized when performing the computer program stored in second memory.
The present invention also constructs a kind of readable storage medium storing program for executing, is stored thereon with computer program, which is characterized in that the calculating
The step of method as described above is realized when machine program is performed by second processor.
Implement technical scheme of the present invention, APP to user when carrying out real-name authentication, due to the identity by network transmission
Information be by encrypted, so, can ensure that third-party application prevents the identity information of user to be intercepted in real-name authentication, from
And it eliminates safe hidden trouble.
Description of the drawings
In order to illustrate the embodiments of the present invention more clearly, attached drawing makees letter needed in being described below to embodiment
Singly introduce, it should be apparent that, the accompanying drawings in the following description is only some embodiments of the present invention, for the common skill in this field
For art personnel, without creative efforts, other attached drawings are can also be obtained according to these attached drawings.Attached drawing
In:
Fig. 1 is a kind of flow chart of the real name identification method embodiment one of application of the present invention;
Fig. 2 is a kind of flow chart of the real name identification method embodiment two of application of the present invention;
Fig. 3 is a kind of flow chart of the real name identification method embodiment three of application of the present invention;
Fig. 4 is a kind of flow chart of the real name identification method example IV of application of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other without making creative work
Embodiment shall fall within the protection scope of the present invention.
Illustrate first, the present invention provides one for issuing the platform (such as application market) of APP, when developer will
After APP is uploaded to platform, the server corresponding to the platform can add a mould for managing user identities information in APP
Block.User can be from the platform each APP downloaded and installed, the operation for certain some APP, needs to carry out real-name authentication, because
This, the real name identification method of the present invention can be used to carry out real-name authentication.
Fig. 1 is a kind of flow chart of the real name identification method embodiment one of application of the present invention, the real-name authentication of the embodiment
Method application in the server, and includes the following steps:
S11. the real-name authentication request that the mobile terminal of user is sent, and the institute in real-name authentication request are received
State whether user described in the identification information judgment of mobile terminal is certification for the first time, if certification for the first time, then perform next step;
In this step, it should be noted that, when the mobile terminal of user is downloaded and is mounted with a certain APP for needing real-name authentication
Afterwards, when running the APP for the first time, APP can pop up the control of " certification application ", after user triggers the control, just to service
Device sends the real-name authentication request of user, and the identification information that real-name authentication request includes mobile terminal (such as is uniquely set
Standby number).
In addition it should be noted that, a contingency table is set in server, the mobile terminal of user is stored in the contingency table
Identification information and cipher key pair information.So after server receives real-name authentication request, server can be according to the contingency table
Judge whether the user is certification for the first time, that is, if being stored with the identification information and key of the mobile terminal of the user in contingency table
Information, then it is non-certification for the first time to illustrate the user;Conversely, then illustrate that the user is certification for the first time.
S12. a pair of of public key and private key are distributed for the user, and stores the private key, and the public key is sent to institute
State mobile terminal;
In this step, if server judges user for certification for the first time, a pair of of public key and private key are distributed for the user, and
Private key is stored in contingency table, and public key is sent to the mobile terminal of user.
S13. the first identity cipher-text information that the mobile terminal of user is sent is received, and using the private key to described first
Identity cipher-text information is decrypted, and the identity information of user is obtained in successful decryption, wherein, the first identity ciphertext letter
Breath is that the mobile terminal of user is encrypted identity information input by user using the public key and generates;
In this step, illustrate first, after the mobile terminal of user receives the public key of server-assignment, can pop up
One inputs the control of identity information for user, and user can input the identity information of oneself by triggering the control, for example, identity card
Number, the information such as bank's card number, cell-phone number, driver license number.After the completion of identity information input, " submission " control can be clicked, then,
Mobile terminal is just encrypted these identity informations using public key and generates the first identity cipher-text information, be then sent to
Server.
After server receives the first identity cipher-text information of mobile terminal transmission, according to the identification information of mobile terminal
The private key of the user is recalled from contingency table, and the first identity cipher-text information is decrypted using the private key, if successful decryption,
Then illustrate that the identity information of user is not distorted maliciously;Conversely, then illustrate that the identity information of user is maliciously distorted.
S14. by the progress real name matching of the identity information of the acquired identity information and public security or banking system, and
During successful match, the identity information of the user is stored, and to the successful message of mobile terminal return authentication.
In this step, after server is to the first identity cipher-text information successful decryption, the identity letter of user can be got
Then the identity information of the identity information and public security or banking system is carried out real name matching, if successful match, then it is assumed that recognize by breath
It demonstrate,proves successfully, at this point, the identity information of user can be stored in contingency table, meanwhile, the mobile terminal return authentication success to user
Message;It is on the contrary, then it is assumed that authentification failure, and the mobile terminal return authentication failure news of user.
Implement the technical solution of the embodiment, APP to user when carrying out real-name authentication, due to the body by network transmission
Part information be by encrypted, so, can ensure that third-party application prevents the identity information of user to be intercepted in real-name authentication,
So as to eliminate safe hidden trouble.
Fig. 2 is a kind of flow chart of the real name identification method embodiment two of application of the present invention, with reference to Fig. 1, in step S11
In, if judging, not for certification for the first time, to perform following steps:
S15. the identification information of the mobile terminal in being asked according to the real-name authentication searches the private key of the user
And identity information;
In this step, if not certification for the first time, can the use be searched from contingency table according to the identification information of mobile terminal
Private key and identity information corresponding to family.
S16. the identity information is encrypted using the private key, to obtain the second identity cipher-text information, and by institute
It states the second identity cipher-text information and is sent to the mobile terminal;
If S17. receiving the confirmation instruction of mobile terminal transmission, complete certification, wherein, mobile terminal use it is described
The second identity cipher-text information is decrypted in public key, and in successful decryption, output decryption after identity information, and with
Family, which confirms, receives confirmation instruction input by user, and send it to server when identity information is correct.
In this step, illustrate first, for mobile terminal, when it, to receive the second identity of server transmission close
After literary information, can be used public key the second identity cipher-text information is decrypted, if successful decryption, illustrate identity information not by
Malice is distorted, then the identity information after output decryption;Anyway, then illustrate that identity information is maliciously distorted, and export prompting
Information.When successful decryption, the identity information after decryption can be exported on a user interface, so that user confirms, if user confirms
Identity information is errorless, then can click " confirmation " control, in this way, mobile terminal just has received confirmation instruction input by user, so
Confirmation instruction is sent to server afterwards.Server completes certification in the confirmation instruction for receiving mobile terminal transmission.
Implement the technical solution of the embodiment, downloaded in user and be mounted with the situation of multiple APP for needing real-name authentication
Under, due to operation first APP when, have been carried out real-name authentication, server end has just been stored with the identity information of the user, institute
With when the user runs APP below and in real-name authentication, the identity that need not just input individual on mobile terminals again is believed
Breath, therefore, reduce user's operation, substantially increase user experience, moreover, because transmission over networks identity information be through
Cross it is encrypted, so, can ensure that third-party application prevents the identity information of user to be intercepted in real-name authentication, so as to eliminate peace
Full hidden danger.
Further, after step S16, the real name identification method of application of the invention further includes:
If S18. receiving the deletion instruction of mobile terminal transmission, step S12 is performed, wherein, mobile terminal is using
The second identity cipher-text information is decrypted in the public key, and in successful decryption, the identity information after output decryption, and
Input by user delete is received when user confirms identity information mistake to instruct, and send it to server.
It in this embodiment, can be defeated on a user interface when mobile terminal is to the second identity cipher-text information successful decryption
Go out the identity information after decryption, so that user confirms, if at this point, the user of mobile terminal is changed, such as is become by user A
For user B, then user B will think the identity information mistake of exported user A, and then click " deletion " control, in this way, moving
Dynamic terminal just has received input by user delete and instructs, and deletion instruction then is sent to server.Server is receiving
When the deletion sent to mobile terminal instructs, step S12 is re-executed, to complete certification.
Fig. 3 is a kind of flow chart of the real name identification method embodiment three of application of the present invention, the real-name authentication of the embodiment
Method application in the terminal, and may include following steps:
S21. certification application instruction input by user is received, and is asked to server side real-name authentication, the real-name authentication
Request includes the identification information of the mobile terminal, wherein, server is according to the identification information judgment of the mobile terminal
Whether user is certification for the first time, if certification for the first time, then performs next step;
In this step, it should be noted that, when the mobile terminal of user is downloaded and is mounted with a certain APP for needing real-name authentication
Afterwards, when running the APP for the first time, APP can pop up the control of " certification application ", after user triggers the control, just to service
Device sends the real-name authentication request of user, and the identification information that real-name authentication request includes mobile terminal (such as is uniquely set
Standby number).
In addition it should be noted that, a contingency table is set in server, the mobile terminal of user is stored in the contingency table
Identification information and cipher key pair information.So after server receives real-name authentication request, server can be according to the contingency table
Judge whether the user is certification for the first time, that is, if being stored with the identification information and key of the mobile terminal of the user in contingency table
Information, then it is non-certification for the first time to illustrate the user;Conversely, then illustrate that the user is certification for the first time.
S22. the public key that server is sent is received, wherein, server is distributed when being judged as certification for the first time for the user
A pair of of public key and private key, and the private key is stored, and the public key is sent to the mobile terminal;
In this step, if server judges user for certification for the first time, a pair of of public key and private key are distributed for the user, and
Private key is stored in contingency table, and public key is sent to the mobile terminal of user.
S23. identity information input by user is received, and the identity information is encrypted using the public key, with life
Server is sent into the first identity cipher-text information, and by the first identity cipher-text information;
In this step, illustrate first, after the mobile terminal of user receives the public key of server-assignment, can pop up
One inputs the control of identity information for user, and user can input the identity information of oneself by triggering the control, for example, identity card
Number, the information such as bank's card number, cell-phone number, driver license number.After the completion of identity information input, " submission " control can be clicked, then,
Mobile terminal is just encrypted these identity informations using public key and generates the first identity cipher-text information, be then sent to
Server.
S24. after the successful message of certification for receiving server return, certification is completed, wherein, described in server use
The first identity cipher-text information is decrypted in private key, and the identity information of user is obtained in successful decryption, and will be obtained
The identity information taken carries out real name matching with the identity information of public security or banking system, if successful match, to the shifting
Move the successful message of terminal return authentication and real name information (initial data), it is desirable that client once compares initial data
It is right.
In this step, after server receives the first identity cipher-text information of mobile terminal transmission, according to mobile whole
The identification information at end recalls the private key of the user from contingency table, and the first identity cipher-text information is solved using the private key
It is close, if successful decryption, illustrate that the identity information of user is not distorted maliciously;Conversely, then illustrate that the identity information of user is disliked
Meaning is distorted.
After server is to the first identity cipher-text information successful decryption, the identity information of user can be got, then should
Identity information carries out real name matching with the identity information of public security or banking system, if successful match, then it is assumed that certification success, this
When, the identity information of user can be stored in contingency table, meanwhile, to the successful message of mobile terminal return authentication of user;Instead
It, then it is assumed that authentification failure, and the mobile terminal return authentication failure news of user.
Implement the technical solution of the embodiment, APP to user when carrying out real-name authentication, due to the body by network transmission
Part information be by encrypted, so, can ensure that third-party application prevents the identity information of user to be intercepted in real-name authentication,
So as to eliminate safe hidden trouble.
Fig. 4 is a kind of flow chart of the real name identification method example IV of application of the present invention, with reference to Fig. 3, in step S21
In, if judging, not for certification for the first time, to perform following steps:
S25. the second identity cipher-text information that server is sent is received, wherein, the second identity cipher-text information is service
Device is encrypted the identity information stored using the private key of the user and generates;
In this step, if not certification for the first time, can the use be searched from contingency table according to the identification information of mobile terminal
Private key and identity information corresponding to family.Then, the identity information found is encrypted using the private key found, to obtain
The second identity cipher-text information is taken, and the second identity cipher-text information is sent to the mobile terminal of user.
S26. the second identity cipher-text information is decrypted, and in successful decryption using the public key, output solution
Identity information after close;
In this step, for mobile terminal, after it receives the second identity cipher-text information of server transmission, can make
The second identity cipher-text information is decrypted with public key, if successful decryption, illustrates that identity information is not distorted maliciously, then
Identity information after output decryption;Anyway, then illustrate that identity information is maliciously distorted, and exports prompt message.When being decrypted into
During work(, the identity information after decryption can be exported on a user interface, so that user confirms.
S27. when user confirms that identity information is correct, confirmation instruction input by user is received, and send it to service
Device, to complete certification.
In this step, if user confirms that exported identity information is errorless, " confirmation " control can be clicked, in this way, moving
Dynamic terminal just has received confirmation instruction input by user, and confirmation instruction then is sent to server.Server is receiving
When the confirmation sent to mobile terminal instructs, certification is completed.
Implement the technical solution of the embodiment, downloaded in user and be mounted with the situation of multiple APP for needing real-name authentication
Under, due to operation first APP when, have been carried out real-name authentication, server end has just been stored with the identity information of the user, institute
With when the user runs APP below and in real-name authentication, the identity that need not just input individual on mobile terminals again is believed
Breath, therefore, reduce user's operation, substantially increase user experience, moreover, because transmission over networks identity information be through
Cross it is encrypted, so, can ensure that third-party application prevents the identity information of user to be intercepted in real-name authentication, so as to eliminate peace
Full hidden danger.
Further, after step S26, the real name identification method of application of the invention further includes:
S28. it when user confirms identity information mistake, receives input by user delete and instructs, and send it to service
Then device performs step S22.
It in this embodiment, can be defeated on a user interface when mobile terminal is to the second identity cipher-text information successful decryption
Go out the identity information after decryption, so that user confirms, if at this point, the user of mobile terminal is changed, such as is become by user A
For user B, then user B will think the identity information mistake of exported user A, and then click " deletion " control, in this way, moving
Dynamic terminal just has received input by user delete and instructs, and deletion instruction then is sent to server.Server is receiving
When the deletion sent to mobile terminal instructs, step S22 is re-executed, to complete certification.
The present invention also constructs a kind of server, and including first processor, the first processor stores for performing first
It is realized during the computer program stored in device such as the step of above application method in the server.
The present invention also constructs a kind of readable storage medium storing program for executing, is stored thereon with computer program, which is characterized in that the calculating
It is realized when machine program is performed by first processor such as the step of above application method in the server.
The present invention also constructs a kind of mobile terminal, which is characterized in that including second processor, the second processor is used for
It is realized when performing the computer program stored in second memory such as the step of above application method in the terminal.
The present invention also constructs a kind of readable storage medium storing program for executing, is stored thereon with computer program, which is characterized in that the calculating
It is realized when machine program is performed by second processor such as the step of above application method in the terminal.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any bun made
Change, equivalent replacement, improvement etc., should be included within scope of the presently claimed invention.
Claims (10)
1. a kind of real name identification method of application, using in the server, which is characterized in that include the following steps:
S11. the real-name authentication request that the mobile terminal of user is sent, and the shifting in real-name authentication request are received
Whether user described in the identification information judgment of dynamic terminal is certification for the first time, if certification for the first time, then performs next step;
S12. a pair of of public key and private key are distributed for the user, and stores the private key, and the public key is sent to the shifting
Dynamic terminal;
S13. the first identity cipher-text information that the mobile terminal of user is sent is received, and using the private key to first identity
Cipher-text information is decrypted, and the identity information of user is obtained in successful decryption, wherein, the first identity cipher-text information is
The mobile terminal of user is encrypted identity information input by user using the public key and generates;
S14. the identity information of the acquired identity information and public security or banking system is subjected to real name matching, and matched
During success, the identity information of the user is stored, and to the successful message of mobile terminal return authentication.
2. the real name identification method of application according to claim 1, which is characterized in that in the step S11, if not
Certification for the first time then performs following steps:
S15. the identification information of the mobile terminal in being asked according to the real-name authentication searches the private key and body of the user
Part information;
S16. the identity information is encrypted using the private key, to obtain the second identity cipher-text information, and by described
Two identity cipher-text informations are sent to the mobile terminal;
If S17. receiving the confirmation instruction of mobile terminal transmission, certification is completed, wherein, mobile terminal is using the public key
The second identity cipher-text information is decrypted, and in successful decryption, the identity information after output decryption, and true in user
Recognize identity information it is correct when receive it is input by user confirm instruction, and send it to server.
3. the real name identification method of application according to claim 2, which is characterized in that after the step S16, also wrap
It includes:
If S18. receiving the deletion instruction of mobile terminal transmission, perform step S12, wherein, mobile terminal use it is described
The second identity cipher-text information is decrypted in public key, and in successful decryption, output decryption after identity information, and with
Family receives input by user delete and instructs, and send it to server when confirming identity information mistake.
4. a kind of real name identification method of application, using in the terminal, which is characterized in that include the following steps:
S21. certification application instruction input by user is received, and is asked to server side real-name authentication, the real-name authentication request
Include the identification information of the mobile terminal, wherein, server user according to the identification information judgment of the mobile terminal
Whether it is certification for the first time, if certification for the first time, then performs next step;
S22. the public key that server is sent is received, wherein, server distributes a pair of when being judged as certification for the first time for the user
Public key and private key, and the private key is stored, and the public key is sent to the mobile terminal;
S23. identity information input by user is received, and the identity information is encrypted using the public key, to generate
One identity cipher-text information, and the first identity cipher-text information is sent to server;
S24. after the successful message of certification for receiving server return, certification is completed, wherein, server uses the private key
The first identity cipher-text information is decrypted, and the identity information of user is obtained in successful decryption, and will be acquired
The identity information carries out real name matching with the identity information of public security or banking system, if successful match, to the movement eventually
Hold the successful message of return authentication.
5. the real name identification method of application according to claim 4, which is characterized in that further include:
S25. when user is non-certification for the first time, the second identity cipher-text information that server is sent is received, wherein, second body
Part cipher-text information is encrypted the identity information stored using the private key of the user by server and is generated;
S26. the second identity cipher-text information is decrypted, and in successful decryption using the public key, after output decryption
Identity information;
S27. when user confirms that identity information is correct, confirmation instruction input by user is received, and send it to server, with
Complete certification.
6. the real name identification method of application according to claim 5, which is characterized in that after step S26, further include:
S28. it when user confirms identity information mistake, receives input by user delete and instructs, and send it to server, so
Step S22 is performed afterwards.
7. a kind of server, which is characterized in that including first processor, the first processor is used to perform in first memory
The step of any one the method in such as claim 1-3 is realized during the computer program of storage.
8. a kind of readable storage medium storing program for executing, is stored thereon with computer program, which is characterized in that the computer program is by first
Manage the step of any one the method in such as claim 1-3 is realized when device performs.
9. a kind of mobile terminal, which is characterized in that including second processor, the second processor is used to perform second memory
The step of any one the method in such as claim 4-6 is realized during the computer program of middle storage.
10. a kind of readable storage medium storing program for executing, is stored thereon with computer program, which is characterized in that the computer program is by second
The step of any one the method in such as claim 4-6 is realized when processor performs.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810205594.8A CN108183798A (en) | 2018-03-13 | 2018-03-13 | Real name identification method, server, mobile terminal and the readable storage medium storing program for executing of application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810205594.8A CN108183798A (en) | 2018-03-13 | 2018-03-13 | Real name identification method, server, mobile terminal and the readable storage medium storing program for executing of application |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108183798A true CN108183798A (en) | 2018-06-19 |
Family
ID=62553592
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810205594.8A Pending CN108183798A (en) | 2018-03-13 | 2018-03-13 | Real name identification method, server, mobile terminal and the readable storage medium storing program for executing of application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108183798A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108876388A (en) * | 2018-06-20 | 2018-11-23 | 深圳市买买提信息科技有限公司 | A kind of identity identifying method, device and terminal device |
CN108900528A (en) * | 2018-07-24 | 2018-11-27 | 中国联合网络通信集团有限公司 | Block chain real name identification method, device, equipment and storage medium |
CN109005153A (en) * | 2018-06-27 | 2018-12-14 | 努比亚技术有限公司 | Request, control method, terminal and computer readable storage medium is added in meeting |
CN109756339A (en) * | 2018-11-30 | 2019-05-14 | 航天信息股份有限公司 | A kind of method and system carrying out unified certification to the multiple applications of terminal based on real name certificate |
CN110138835A (en) * | 2019-04-15 | 2019-08-16 | 阿里巴巴集团控股有限公司 | Special credentials distribution method and device |
CN110969775A (en) * | 2018-09-29 | 2020-04-07 | 京东数字科技控股有限公司 | Article access method, electronic device, self-service cabinet and computer-readable storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010067433A1 (en) * | 2008-12-11 | 2010-06-17 | 三菱電機株式会社 | Self-authentication communication device, self-authentication verification communication device, device authentication system, device authentication method for device authentication system, self-authentication communication program, and self-authentication verification communication program |
CN103152366A (en) * | 2013-04-10 | 2013-06-12 | 珠海市魅族科技有限公司 | Method, terminal and server for obtaining terminal authorization |
CN105591744A (en) * | 2014-10-24 | 2016-05-18 | 金联汇通信息技术有限公司 | Network real-name authentication method and system |
CN106603461A (en) * | 2015-10-14 | 2017-04-26 | 阿里巴巴集团控股有限公司 | Business authentication method, apparatus and system |
CN107317796A (en) * | 2017-05-08 | 2017-11-03 | 深圳市金立通信设备有限公司 | The method and terminal of a kind of safety certification |
CN107453870A (en) * | 2017-09-12 | 2017-12-08 | 京信通信系统(中国)有限公司 | Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain |
CN107733852A (en) * | 2017-08-24 | 2018-02-23 | 北京三快在线科技有限公司 | A kind of auth method and device, electronic equipment |
-
2018
- 2018-03-13 CN CN201810205594.8A patent/CN108183798A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010067433A1 (en) * | 2008-12-11 | 2010-06-17 | 三菱電機株式会社 | Self-authentication communication device, self-authentication verification communication device, device authentication system, device authentication method for device authentication system, self-authentication communication program, and self-authentication verification communication program |
CN103152366A (en) * | 2013-04-10 | 2013-06-12 | 珠海市魅族科技有限公司 | Method, terminal and server for obtaining terminal authorization |
CN105591744A (en) * | 2014-10-24 | 2016-05-18 | 金联汇通信息技术有限公司 | Network real-name authentication method and system |
CN106603461A (en) * | 2015-10-14 | 2017-04-26 | 阿里巴巴集团控股有限公司 | Business authentication method, apparatus and system |
CN107317796A (en) * | 2017-05-08 | 2017-11-03 | 深圳市金立通信设备有限公司 | The method and terminal of a kind of safety certification |
CN107733852A (en) * | 2017-08-24 | 2018-02-23 | 北京三快在线科技有限公司 | A kind of auth method and device, electronic equipment |
CN107453870A (en) * | 2017-09-12 | 2017-12-08 | 京信通信系统(中国)有限公司 | Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108876388A (en) * | 2018-06-20 | 2018-11-23 | 深圳市买买提信息科技有限公司 | A kind of identity identifying method, device and terminal device |
CN109005153A (en) * | 2018-06-27 | 2018-12-14 | 努比亚技术有限公司 | Request, control method, terminal and computer readable storage medium is added in meeting |
CN109005153B (en) * | 2018-06-27 | 2021-08-31 | 努比亚技术有限公司 | Conference joining request, control method, terminal and computer readable storage medium |
CN108900528A (en) * | 2018-07-24 | 2018-11-27 | 中国联合网络通信集团有限公司 | Block chain real name identification method, device, equipment and storage medium |
CN108900528B (en) * | 2018-07-24 | 2021-08-31 | 中国联合网络通信集团有限公司 | Block chain real-name authentication method, device, equipment and storage medium |
CN110969775A (en) * | 2018-09-29 | 2020-04-07 | 京东数字科技控股有限公司 | Article access method, electronic device, self-service cabinet and computer-readable storage medium |
CN109756339A (en) * | 2018-11-30 | 2019-05-14 | 航天信息股份有限公司 | A kind of method and system carrying out unified certification to the multiple applications of terminal based on real name certificate |
CN110138835A (en) * | 2019-04-15 | 2019-08-16 | 阿里巴巴集团控股有限公司 | Special credentials distribution method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108183798A (en) | Real name identification method, server, mobile terminal and the readable storage medium storing program for executing of application | |
CN108496382B (en) | Secure information transmission system and method for personal identity authentication | |
CN101641976B (en) | An authentication method | |
CN111787530B (en) | Block chain digital identity management method based on SIM card | |
CN107347058A (en) | Data ciphering method, data decryption method, apparatus and system | |
CN110138744A (en) | Replace method, apparatus, system, computer equipment and the storage medium of communicating number | |
CN109543443A (en) | User data management, device, equipment and storage medium based on block chain | |
CN108989848A (en) | A kind of acquisition methods and management system of video resource file | |
CN109474420A (en) | A kind of private key backup method and relevant device | |
CN106936898B (en) | Cross-region file transmission method and system | |
CN112686668A (en) | Alliance chain cross-chain system and method | |
CN101170554A (en) | Message safety transfer system | |
CN111884811B (en) | Block chain-based data evidence storing method and data evidence storing platform | |
CN104917807A (en) | Resource transfer method, apparatus and system | |
CN109729000B (en) | Instant messaging method and device | |
CN111131416A (en) | Business service providing method and device, storage medium and electronic device | |
CN101325483B (en) | Method and apparatus for updating symmetrical cryptographic key, symmetrical ciphering method and symmetrical deciphering method | |
CN112653556B (en) | TOKEN-based micro-service security authentication method, device and storage medium | |
CN108632042A (en) | A kind of class AKA identity authorization systems and method based on pool of symmetric keys | |
CN108769029A (en) | It is a kind of to application system authentication device, method and system | |
CN101841814A (en) | Terminal authentication method and system | |
CN105119716A (en) | Secret key negotiation method based on SD cards | |
CN106027530A (en) | Instant message encryption system based on smartphone and implementation method thereof | |
CN107819766A (en) | Safety certifying method, system and computer-readable recording medium | |
CN104883682A (en) | WIFI hotspot connecting and selecting method, communication terminal and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180619 |