CN108183798A - Real name identification method, server, mobile terminal and the readable storage medium storing program for executing of application - Google Patents

Real name identification method, server, mobile terminal and the readable storage medium storing program for executing of application Download PDF

Info

Publication number
CN108183798A
CN108183798A CN201810205594.8A CN201810205594A CN108183798A CN 108183798 A CN108183798 A CN 108183798A CN 201810205594 A CN201810205594 A CN 201810205594A CN 108183798 A CN108183798 A CN 108183798A
Authority
CN
China
Prior art keywords
user
identity
mobile terminal
information
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810205594.8A
Other languages
Chinese (zh)
Inventor
杨帆
朱旗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Happy Online Technology Development Co Ltd
Original Assignee
Shenzhen Happy Online Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Happy Online Technology Development Co Ltd filed Critical Shenzhen Happy Online Technology Development Co Ltd
Priority to CN201810205594.8A priority Critical patent/CN108183798A/en
Publication of CN108183798A publication Critical patent/CN108183798A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

The present invention relates to a kind of real name identification method of application, server, mobile terminal and readable storage medium storing program for executing, the real name identification method of the application includes:The real-name authentication request that the mobile terminal of user is sent is received, and judges whether user is certification for the first time, if certification for the first time, then performs next step;A pair of of public key and private key are distributed, and store private key, and public key is sent to mobile terminal for user;The first identity cipher-text information that the mobile terminal of user is sent is received, and the first identity cipher-text information is decrypted using private key, and the identity information of user is obtained in successful decryption;The identity information of acquired identity information and public security or banking system is subjected to real name matching, and in successful match, stores the identity information of user, and to the successful message of mobile terminal return authentication.Implement technical scheme of the present invention, can ensure that third-party application prevents the identity information of user to be intercepted in real-name authentication, so as to eliminate safe hidden trouble.

Description

Real name identification method, server, mobile terminal and the readable storage medium storing program for executing of application
Technical field
The present invention relates to information security field more particularly to a kind of real name identification method of application, server, mobile terminals And readable storage medium storing program for executing.
Background technology
Internet technology develops to today, and network security is more and more important, and national Internet information office has opened at present Beginning pushes forward the management of network true identity information comprehensively, and user's real name is just becoming the important way of supervision layer specification industry development. But in practical operation, there is networking identity card decoding server to judge the method for ID card information, but have to be by net at present Network transmit identity information, identity information be for a user it is sensitive, there are identity information by secrets disclosed by net etc. safety it is hidden Suffer from.For example, more and more packet catchers can use now, such as:Wireshark, Fiddler etc. can capture client hair The information sent and returned;For another example client decompiling instrument also it is old go out it is not poor, ANDROID's has ApkTool GUI, IOS Can subscriber identity information be directly calculated by code with decompiling.Therefore, identity information by criminal if being utilized Massive losses can be brought to user,
Invention content
The technical problem to be solved in the present invention is, above-mentioned there are the safety that identity information is divulged a secret for of the prior art The defects of hidden danger, provides a kind of real name identification method of application, server, mobile terminal and readable storage medium storing program for executing, can eliminate body The security risk of part information-leakage.
The technical solution adopted by the present invention to solve the technical problems is:A kind of real name identification method of application is constructed, it should With in the server, include the following steps:
S11. the real-name authentication request that the mobile terminal of user is sent, and the institute in real-name authentication request are received State whether user described in the identification information judgment of mobile terminal is certification for the first time, if certification for the first time, then perform next step;
S12. a pair of of public key and private key are distributed for the user, and stores the private key, and the public key is sent to institute State mobile terminal;
S13. the first identity cipher-text information that the mobile terminal of user is sent is received, and using the private key to described first Identity cipher-text information is decrypted, and the identity information of user is obtained in successful decryption, wherein, the first identity ciphertext letter Breath is that the mobile terminal of user is encrypted identity information input by user using the public key and generates;
S14. by the progress real name matching of the identity information of the acquired identity information and public security or banking system, and During successful match, the identity information of the user is stored, and to the successful message of mobile terminal return authentication.
Preferably, in the step S11, if not certification for the first time, then perform following steps:
S15. the identification information of the mobile terminal in being asked according to the real-name authentication searches the private key of the user And identity information;
S16. the identity information is encrypted using the private key, to obtain the second identity cipher-text information, and by institute It states the second identity cipher-text information and is sent to the mobile terminal;
If S17. receiving the confirmation instruction of mobile terminal transmission, complete certification, wherein, mobile terminal use it is described The second identity cipher-text information is decrypted in public key, and in successful decryption, output decryption after identity information, and with Family, which confirms, receives confirmation instruction input by user, and send it to server when identity information is correct.
Preferably, it after the step S16, further includes:
If S18. receiving the deletion instruction of mobile terminal transmission, step S12 is performed, wherein, mobile terminal is using The second identity cipher-text information is decrypted in the public key, and in successful decryption, the identity information after output decryption, and Input by user delete is received when user confirms identity information mistake to instruct, and send it to server.
The present invention also constructs a kind of real name identification method of application, using in the terminal, includes the following steps:
S21. certification application instruction input by user is received, and is asked to server side real-name authentication, the real-name authentication Request includes the identification information of the mobile terminal, wherein, server is according to the identification information judgment of the mobile terminal Whether user is certification for the first time, if certification for the first time, then performs next step;
S22. the public key that server is sent is received, wherein, server is distributed when being judged as certification for the first time for the user A pair of of public key and private key, and the private key is stored, and the public key is sent to the mobile terminal;
S23. identity information input by user is received, and the identity information is encrypted using the public key, with life Server is sent into the first identity cipher-text information, and by the first identity cipher-text information;
S24. after the successful message of certification for receiving server return, certification is completed, wherein, described in server use The first identity cipher-text information is decrypted in private key, and the identity information of user is obtained in successful decryption, and will be obtained The identity information taken carries out real name matching with the identity information of public security or banking system, if successful match, to the shifting The successful message of dynamic terminal return authentication.
Preferably, it further includes:
S25. when user is non-certification for the first time, the second identity cipher-text information that server is sent is received, wherein, described the Two identity cipher-text informations are encrypted the identity information stored using the private key of the user by server and are generated;
S26. the second identity cipher-text information is decrypted, and in successful decryption using the public key, output solution Identity information after close;
S27. when user confirms that identity information is correct, confirmation instruction input by user is received, and send it to service Device, to complete certification.
Preferably, it after step S26, further includes:
S28. it when user confirms identity information mistake, receives input by user delete and instructs, and send it to service Then device performs step S22.
The present invention also constructs a kind of server, which is characterized in that including first processor, the first processor is used to hold The step of method as described above is realized during the computer program stored in row first memory.
The present invention also constructs a kind of readable storage medium storing program for executing, is stored thereon with computer program, which is characterized in that the calculating The step of method as described above is realized when machine program is performed by first processor.
The present invention also constructs a kind of mobile terminal, which is characterized in that including second processor, the second processor is used for The step of method as described above being realized when performing the computer program stored in second memory.
The present invention also constructs a kind of readable storage medium storing program for executing, is stored thereon with computer program, which is characterized in that the calculating The step of method as described above is realized when machine program is performed by second processor.
Implement technical scheme of the present invention, APP to user when carrying out real-name authentication, due to the identity by network transmission Information be by encrypted, so, can ensure that third-party application prevents the identity information of user to be intercepted in real-name authentication, from And it eliminates safe hidden trouble.
Description of the drawings
In order to illustrate the embodiments of the present invention more clearly, attached drawing makees letter needed in being described below to embodiment Singly introduce, it should be apparent that, the accompanying drawings in the following description is only some embodiments of the present invention, for the common skill in this field For art personnel, without creative efforts, other attached drawings are can also be obtained according to these attached drawings.Attached drawing In:
Fig. 1 is a kind of flow chart of the real name identification method embodiment one of application of the present invention;
Fig. 2 is a kind of flow chart of the real name identification method embodiment two of application of the present invention;
Fig. 3 is a kind of flow chart of the real name identification method embodiment three of application of the present invention;
Fig. 4 is a kind of flow chart of the real name identification method example IV of application of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other without making creative work Embodiment shall fall within the protection scope of the present invention.
Illustrate first, the present invention provides one for issuing the platform (such as application market) of APP, when developer will After APP is uploaded to platform, the server corresponding to the platform can add a mould for managing user identities information in APP Block.User can be from the platform each APP downloaded and installed, the operation for certain some APP, needs to carry out real-name authentication, because This, the real name identification method of the present invention can be used to carry out real-name authentication.
Fig. 1 is a kind of flow chart of the real name identification method embodiment one of application of the present invention, the real-name authentication of the embodiment Method application in the server, and includes the following steps:
S11. the real-name authentication request that the mobile terminal of user is sent, and the institute in real-name authentication request are received State whether user described in the identification information judgment of mobile terminal is certification for the first time, if certification for the first time, then perform next step;
In this step, it should be noted that, when the mobile terminal of user is downloaded and is mounted with a certain APP for needing real-name authentication Afterwards, when running the APP for the first time, APP can pop up the control of " certification application ", after user triggers the control, just to service Device sends the real-name authentication request of user, and the identification information that real-name authentication request includes mobile terminal (such as is uniquely set Standby number).
In addition it should be noted that, a contingency table is set in server, the mobile terminal of user is stored in the contingency table Identification information and cipher key pair information.So after server receives real-name authentication request, server can be according to the contingency table Judge whether the user is certification for the first time, that is, if being stored with the identification information and key of the mobile terminal of the user in contingency table Information, then it is non-certification for the first time to illustrate the user;Conversely, then illustrate that the user is certification for the first time.
S12. a pair of of public key and private key are distributed for the user, and stores the private key, and the public key is sent to institute State mobile terminal;
In this step, if server judges user for certification for the first time, a pair of of public key and private key are distributed for the user, and Private key is stored in contingency table, and public key is sent to the mobile terminal of user.
S13. the first identity cipher-text information that the mobile terminal of user is sent is received, and using the private key to described first Identity cipher-text information is decrypted, and the identity information of user is obtained in successful decryption, wherein, the first identity ciphertext letter Breath is that the mobile terminal of user is encrypted identity information input by user using the public key and generates;
In this step, illustrate first, after the mobile terminal of user receives the public key of server-assignment, can pop up One inputs the control of identity information for user, and user can input the identity information of oneself by triggering the control, for example, identity card Number, the information such as bank's card number, cell-phone number, driver license number.After the completion of identity information input, " submission " control can be clicked, then, Mobile terminal is just encrypted these identity informations using public key and generates the first identity cipher-text information, be then sent to Server.
After server receives the first identity cipher-text information of mobile terminal transmission, according to the identification information of mobile terminal The private key of the user is recalled from contingency table, and the first identity cipher-text information is decrypted using the private key, if successful decryption, Then illustrate that the identity information of user is not distorted maliciously;Conversely, then illustrate that the identity information of user is maliciously distorted.
S14. by the progress real name matching of the identity information of the acquired identity information and public security or banking system, and During successful match, the identity information of the user is stored, and to the successful message of mobile terminal return authentication.
In this step, after server is to the first identity cipher-text information successful decryption, the identity letter of user can be got Then the identity information of the identity information and public security or banking system is carried out real name matching, if successful match, then it is assumed that recognize by breath It demonstrate,proves successfully, at this point, the identity information of user can be stored in contingency table, meanwhile, the mobile terminal return authentication success to user Message;It is on the contrary, then it is assumed that authentification failure, and the mobile terminal return authentication failure news of user.
Implement the technical solution of the embodiment, APP to user when carrying out real-name authentication, due to the body by network transmission Part information be by encrypted, so, can ensure that third-party application prevents the identity information of user to be intercepted in real-name authentication, So as to eliminate safe hidden trouble.
Fig. 2 is a kind of flow chart of the real name identification method embodiment two of application of the present invention, with reference to Fig. 1, in step S11 In, if judging, not for certification for the first time, to perform following steps:
S15. the identification information of the mobile terminal in being asked according to the real-name authentication searches the private key of the user And identity information;
In this step, if not certification for the first time, can the use be searched from contingency table according to the identification information of mobile terminal Private key and identity information corresponding to family.
S16. the identity information is encrypted using the private key, to obtain the second identity cipher-text information, and by institute It states the second identity cipher-text information and is sent to the mobile terminal;
If S17. receiving the confirmation instruction of mobile terminal transmission, complete certification, wherein, mobile terminal use it is described The second identity cipher-text information is decrypted in public key, and in successful decryption, output decryption after identity information, and with Family, which confirms, receives confirmation instruction input by user, and send it to server when identity information is correct.
In this step, illustrate first, for mobile terminal, when it, to receive the second identity of server transmission close After literary information, can be used public key the second identity cipher-text information is decrypted, if successful decryption, illustrate identity information not by Malice is distorted, then the identity information after output decryption;Anyway, then illustrate that identity information is maliciously distorted, and export prompting Information.When successful decryption, the identity information after decryption can be exported on a user interface, so that user confirms, if user confirms Identity information is errorless, then can click " confirmation " control, in this way, mobile terminal just has received confirmation instruction input by user, so Confirmation instruction is sent to server afterwards.Server completes certification in the confirmation instruction for receiving mobile terminal transmission.
Implement the technical solution of the embodiment, downloaded in user and be mounted with the situation of multiple APP for needing real-name authentication Under, due to operation first APP when, have been carried out real-name authentication, server end has just been stored with the identity information of the user, institute With when the user runs APP below and in real-name authentication, the identity that need not just input individual on mobile terminals again is believed Breath, therefore, reduce user's operation, substantially increase user experience, moreover, because transmission over networks identity information be through Cross it is encrypted, so, can ensure that third-party application prevents the identity information of user to be intercepted in real-name authentication, so as to eliminate peace Full hidden danger.
Further, after step S16, the real name identification method of application of the invention further includes:
If S18. receiving the deletion instruction of mobile terminal transmission, step S12 is performed, wherein, mobile terminal is using The second identity cipher-text information is decrypted in the public key, and in successful decryption, the identity information after output decryption, and Input by user delete is received when user confirms identity information mistake to instruct, and send it to server.
It in this embodiment, can be defeated on a user interface when mobile terminal is to the second identity cipher-text information successful decryption Go out the identity information after decryption, so that user confirms, if at this point, the user of mobile terminal is changed, such as is become by user A For user B, then user B will think the identity information mistake of exported user A, and then click " deletion " control, in this way, moving Dynamic terminal just has received input by user delete and instructs, and deletion instruction then is sent to server.Server is receiving When the deletion sent to mobile terminal instructs, step S12 is re-executed, to complete certification.
Fig. 3 is a kind of flow chart of the real name identification method embodiment three of application of the present invention, the real-name authentication of the embodiment Method application in the terminal, and may include following steps:
S21. certification application instruction input by user is received, and is asked to server side real-name authentication, the real-name authentication Request includes the identification information of the mobile terminal, wherein, server is according to the identification information judgment of the mobile terminal Whether user is certification for the first time, if certification for the first time, then performs next step;
In this step, it should be noted that, when the mobile terminal of user is downloaded and is mounted with a certain APP for needing real-name authentication Afterwards, when running the APP for the first time, APP can pop up the control of " certification application ", after user triggers the control, just to service Device sends the real-name authentication request of user, and the identification information that real-name authentication request includes mobile terminal (such as is uniquely set Standby number).
In addition it should be noted that, a contingency table is set in server, the mobile terminal of user is stored in the contingency table Identification information and cipher key pair information.So after server receives real-name authentication request, server can be according to the contingency table Judge whether the user is certification for the first time, that is, if being stored with the identification information and key of the mobile terminal of the user in contingency table Information, then it is non-certification for the first time to illustrate the user;Conversely, then illustrate that the user is certification for the first time.
S22. the public key that server is sent is received, wherein, server is distributed when being judged as certification for the first time for the user A pair of of public key and private key, and the private key is stored, and the public key is sent to the mobile terminal;
In this step, if server judges user for certification for the first time, a pair of of public key and private key are distributed for the user, and Private key is stored in contingency table, and public key is sent to the mobile terminal of user.
S23. identity information input by user is received, and the identity information is encrypted using the public key, with life Server is sent into the first identity cipher-text information, and by the first identity cipher-text information;
In this step, illustrate first, after the mobile terminal of user receives the public key of server-assignment, can pop up One inputs the control of identity information for user, and user can input the identity information of oneself by triggering the control, for example, identity card Number, the information such as bank's card number, cell-phone number, driver license number.After the completion of identity information input, " submission " control can be clicked, then, Mobile terminal is just encrypted these identity informations using public key and generates the first identity cipher-text information, be then sent to Server.
S24. after the successful message of certification for receiving server return, certification is completed, wherein, described in server use The first identity cipher-text information is decrypted in private key, and the identity information of user is obtained in successful decryption, and will be obtained The identity information taken carries out real name matching with the identity information of public security or banking system, if successful match, to the shifting Move the successful message of terminal return authentication and real name information (initial data), it is desirable that client once compares initial data It is right.
In this step, after server receives the first identity cipher-text information of mobile terminal transmission, according to mobile whole The identification information at end recalls the private key of the user from contingency table, and the first identity cipher-text information is solved using the private key It is close, if successful decryption, illustrate that the identity information of user is not distorted maliciously;Conversely, then illustrate that the identity information of user is disliked Meaning is distorted.
After server is to the first identity cipher-text information successful decryption, the identity information of user can be got, then should Identity information carries out real name matching with the identity information of public security or banking system, if successful match, then it is assumed that certification success, this When, the identity information of user can be stored in contingency table, meanwhile, to the successful message of mobile terminal return authentication of user;Instead It, then it is assumed that authentification failure, and the mobile terminal return authentication failure news of user.
Implement the technical solution of the embodiment, APP to user when carrying out real-name authentication, due to the body by network transmission Part information be by encrypted, so, can ensure that third-party application prevents the identity information of user to be intercepted in real-name authentication, So as to eliminate safe hidden trouble.
Fig. 4 is a kind of flow chart of the real name identification method example IV of application of the present invention, with reference to Fig. 3, in step S21 In, if judging, not for certification for the first time, to perform following steps:
S25. the second identity cipher-text information that server is sent is received, wherein, the second identity cipher-text information is service Device is encrypted the identity information stored using the private key of the user and generates;
In this step, if not certification for the first time, can the use be searched from contingency table according to the identification information of mobile terminal Private key and identity information corresponding to family.Then, the identity information found is encrypted using the private key found, to obtain The second identity cipher-text information is taken, and the second identity cipher-text information is sent to the mobile terminal of user.
S26. the second identity cipher-text information is decrypted, and in successful decryption using the public key, output solution Identity information after close;
In this step, for mobile terminal, after it receives the second identity cipher-text information of server transmission, can make The second identity cipher-text information is decrypted with public key, if successful decryption, illustrates that identity information is not distorted maliciously, then Identity information after output decryption;Anyway, then illustrate that identity information is maliciously distorted, and exports prompt message.When being decrypted into During work(, the identity information after decryption can be exported on a user interface, so that user confirms.
S27. when user confirms that identity information is correct, confirmation instruction input by user is received, and send it to service Device, to complete certification.
In this step, if user confirms that exported identity information is errorless, " confirmation " control can be clicked, in this way, moving Dynamic terminal just has received confirmation instruction input by user, and confirmation instruction then is sent to server.Server is receiving When the confirmation sent to mobile terminal instructs, certification is completed.
Implement the technical solution of the embodiment, downloaded in user and be mounted with the situation of multiple APP for needing real-name authentication Under, due to operation first APP when, have been carried out real-name authentication, server end has just been stored with the identity information of the user, institute With when the user runs APP below and in real-name authentication, the identity that need not just input individual on mobile terminals again is believed Breath, therefore, reduce user's operation, substantially increase user experience, moreover, because transmission over networks identity information be through Cross it is encrypted, so, can ensure that third-party application prevents the identity information of user to be intercepted in real-name authentication, so as to eliminate peace Full hidden danger.
Further, after step S26, the real name identification method of application of the invention further includes:
S28. it when user confirms identity information mistake, receives input by user delete and instructs, and send it to service Then device performs step S22.
It in this embodiment, can be defeated on a user interface when mobile terminal is to the second identity cipher-text information successful decryption Go out the identity information after decryption, so that user confirms, if at this point, the user of mobile terminal is changed, such as is become by user A For user B, then user B will think the identity information mistake of exported user A, and then click " deletion " control, in this way, moving Dynamic terminal just has received input by user delete and instructs, and deletion instruction then is sent to server.Server is receiving When the deletion sent to mobile terminal instructs, step S22 is re-executed, to complete certification.
The present invention also constructs a kind of server, and including first processor, the first processor stores for performing first It is realized during the computer program stored in device such as the step of above application method in the server.
The present invention also constructs a kind of readable storage medium storing program for executing, is stored thereon with computer program, which is characterized in that the calculating It is realized when machine program is performed by first processor such as the step of above application method in the server.
The present invention also constructs a kind of mobile terminal, which is characterized in that including second processor, the second processor is used for It is realized when performing the computer program stored in second memory such as the step of above application method in the terminal.
The present invention also constructs a kind of readable storage medium storing program for executing, is stored thereon with computer program, which is characterized in that the calculating It is realized when machine program is performed by second processor such as the step of above application method in the terminal.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any bun made Change, equivalent replacement, improvement etc., should be included within scope of the presently claimed invention.

Claims (10)

1. a kind of real name identification method of application, using in the server, which is characterized in that include the following steps:
S11. the real-name authentication request that the mobile terminal of user is sent, and the shifting in real-name authentication request are received Whether user described in the identification information judgment of dynamic terminal is certification for the first time, if certification for the first time, then performs next step;
S12. a pair of of public key and private key are distributed for the user, and stores the private key, and the public key is sent to the shifting Dynamic terminal;
S13. the first identity cipher-text information that the mobile terminal of user is sent is received, and using the private key to first identity Cipher-text information is decrypted, and the identity information of user is obtained in successful decryption, wherein, the first identity cipher-text information is The mobile terminal of user is encrypted identity information input by user using the public key and generates;
S14. the identity information of the acquired identity information and public security or banking system is subjected to real name matching, and matched During success, the identity information of the user is stored, and to the successful message of mobile terminal return authentication.
2. the real name identification method of application according to claim 1, which is characterized in that in the step S11, if not Certification for the first time then performs following steps:
S15. the identification information of the mobile terminal in being asked according to the real-name authentication searches the private key and body of the user Part information;
S16. the identity information is encrypted using the private key, to obtain the second identity cipher-text information, and by described Two identity cipher-text informations are sent to the mobile terminal;
If S17. receiving the confirmation instruction of mobile terminal transmission, certification is completed, wherein, mobile terminal is using the public key The second identity cipher-text information is decrypted, and in successful decryption, the identity information after output decryption, and true in user Recognize identity information it is correct when receive it is input by user confirm instruction, and send it to server.
3. the real name identification method of application according to claim 2, which is characterized in that after the step S16, also wrap It includes:
If S18. receiving the deletion instruction of mobile terminal transmission, perform step S12, wherein, mobile terminal use it is described The second identity cipher-text information is decrypted in public key, and in successful decryption, output decryption after identity information, and with Family receives input by user delete and instructs, and send it to server when confirming identity information mistake.
4. a kind of real name identification method of application, using in the terminal, which is characterized in that include the following steps:
S21. certification application instruction input by user is received, and is asked to server side real-name authentication, the real-name authentication request Include the identification information of the mobile terminal, wherein, server user according to the identification information judgment of the mobile terminal Whether it is certification for the first time, if certification for the first time, then performs next step;
S22. the public key that server is sent is received, wherein, server distributes a pair of when being judged as certification for the first time for the user Public key and private key, and the private key is stored, and the public key is sent to the mobile terminal;
S23. identity information input by user is received, and the identity information is encrypted using the public key, to generate One identity cipher-text information, and the first identity cipher-text information is sent to server;
S24. after the successful message of certification for receiving server return, certification is completed, wherein, server uses the private key The first identity cipher-text information is decrypted, and the identity information of user is obtained in successful decryption, and will be acquired The identity information carries out real name matching with the identity information of public security or banking system, if successful match, to the movement eventually Hold the successful message of return authentication.
5. the real name identification method of application according to claim 4, which is characterized in that further include:
S25. when user is non-certification for the first time, the second identity cipher-text information that server is sent is received, wherein, second body Part cipher-text information is encrypted the identity information stored using the private key of the user by server and is generated;
S26. the second identity cipher-text information is decrypted, and in successful decryption using the public key, after output decryption Identity information;
S27. when user confirms that identity information is correct, confirmation instruction input by user is received, and send it to server, with Complete certification.
6. the real name identification method of application according to claim 5, which is characterized in that after step S26, further include:
S28. it when user confirms identity information mistake, receives input by user delete and instructs, and send it to server, so Step S22 is performed afterwards.
7. a kind of server, which is characterized in that including first processor, the first processor is used to perform in first memory The step of any one the method in such as claim 1-3 is realized during the computer program of storage.
8. a kind of readable storage medium storing program for executing, is stored thereon with computer program, which is characterized in that the computer program is by first Manage the step of any one the method in such as claim 1-3 is realized when device performs.
9. a kind of mobile terminal, which is characterized in that including second processor, the second processor is used to perform second memory The step of any one the method in such as claim 4-6 is realized during the computer program of middle storage.
10. a kind of readable storage medium storing program for executing, is stored thereon with computer program, which is characterized in that the computer program is by second The step of any one the method in such as claim 4-6 is realized when processor performs.
CN201810205594.8A 2018-03-13 2018-03-13 Real name identification method, server, mobile terminal and the readable storage medium storing program for executing of application Pending CN108183798A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810205594.8A CN108183798A (en) 2018-03-13 2018-03-13 Real name identification method, server, mobile terminal and the readable storage medium storing program for executing of application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810205594.8A CN108183798A (en) 2018-03-13 2018-03-13 Real name identification method, server, mobile terminal and the readable storage medium storing program for executing of application

Publications (1)

Publication Number Publication Date
CN108183798A true CN108183798A (en) 2018-06-19

Family

ID=62553592

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810205594.8A Pending CN108183798A (en) 2018-03-13 2018-03-13 Real name identification method, server, mobile terminal and the readable storage medium storing program for executing of application

Country Status (1)

Country Link
CN (1) CN108183798A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108876388A (en) * 2018-06-20 2018-11-23 深圳市买买提信息科技有限公司 A kind of identity identifying method, device and terminal device
CN108900528A (en) * 2018-07-24 2018-11-27 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN109005153A (en) * 2018-06-27 2018-12-14 努比亚技术有限公司 Request, control method, terminal and computer readable storage medium is added in meeting
CN109756339A (en) * 2018-11-30 2019-05-14 航天信息股份有限公司 A kind of method and system carrying out unified certification to the multiple applications of terminal based on real name certificate
CN110138835A (en) * 2019-04-15 2019-08-16 阿里巴巴集团控股有限公司 Special credentials distribution method and device
CN110969775A (en) * 2018-09-29 2020-04-07 京东数字科技控股有限公司 Article access method, electronic device, self-service cabinet and computer-readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010067433A1 (en) * 2008-12-11 2010-06-17 三菱電機株式会社 Self-authentication communication device, self-authentication verification communication device, device authentication system, device authentication method for device authentication system, self-authentication communication program, and self-authentication verification communication program
CN103152366A (en) * 2013-04-10 2013-06-12 珠海市魅族科技有限公司 Method, terminal and server for obtaining terminal authorization
CN105591744A (en) * 2014-10-24 2016-05-18 金联汇通信息技术有限公司 Network real-name authentication method and system
CN106603461A (en) * 2015-10-14 2017-04-26 阿里巴巴集团控股有限公司 Business authentication method, apparatus and system
CN107317796A (en) * 2017-05-08 2017-11-03 深圳市金立通信设备有限公司 The method and terminal of a kind of safety certification
CN107453870A (en) * 2017-09-12 2017-12-08 京信通信系统(中国)有限公司 Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain
CN107733852A (en) * 2017-08-24 2018-02-23 北京三快在线科技有限公司 A kind of auth method and device, electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010067433A1 (en) * 2008-12-11 2010-06-17 三菱電機株式会社 Self-authentication communication device, self-authentication verification communication device, device authentication system, device authentication method for device authentication system, self-authentication communication program, and self-authentication verification communication program
CN103152366A (en) * 2013-04-10 2013-06-12 珠海市魅族科技有限公司 Method, terminal and server for obtaining terminal authorization
CN105591744A (en) * 2014-10-24 2016-05-18 金联汇通信息技术有限公司 Network real-name authentication method and system
CN106603461A (en) * 2015-10-14 2017-04-26 阿里巴巴集团控股有限公司 Business authentication method, apparatus and system
CN107317796A (en) * 2017-05-08 2017-11-03 深圳市金立通信设备有限公司 The method and terminal of a kind of safety certification
CN107733852A (en) * 2017-08-24 2018-02-23 北京三快在线科技有限公司 A kind of auth method and device, electronic equipment
CN107453870A (en) * 2017-09-12 2017-12-08 京信通信系统(中国)有限公司 Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108876388A (en) * 2018-06-20 2018-11-23 深圳市买买提信息科技有限公司 A kind of identity identifying method, device and terminal device
CN109005153A (en) * 2018-06-27 2018-12-14 努比亚技术有限公司 Request, control method, terminal and computer readable storage medium is added in meeting
CN109005153B (en) * 2018-06-27 2021-08-31 努比亚技术有限公司 Conference joining request, control method, terminal and computer readable storage medium
CN108900528A (en) * 2018-07-24 2018-11-27 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN108900528B (en) * 2018-07-24 2021-08-31 中国联合网络通信集团有限公司 Block chain real-name authentication method, device, equipment and storage medium
CN110969775A (en) * 2018-09-29 2020-04-07 京东数字科技控股有限公司 Article access method, electronic device, self-service cabinet and computer-readable storage medium
CN109756339A (en) * 2018-11-30 2019-05-14 航天信息股份有限公司 A kind of method and system carrying out unified certification to the multiple applications of terminal based on real name certificate
CN110138835A (en) * 2019-04-15 2019-08-16 阿里巴巴集团控股有限公司 Special credentials distribution method and device

Similar Documents

Publication Publication Date Title
CN108183798A (en) Real name identification method, server, mobile terminal and the readable storage medium storing program for executing of application
CN108496382B (en) Secure information transmission system and method for personal identity authentication
CN101641976B (en) An authentication method
CN111787530B (en) Block chain digital identity management method based on SIM card
CN107347058A (en) Data ciphering method, data decryption method, apparatus and system
CN110138744A (en) Replace method, apparatus, system, computer equipment and the storage medium of communicating number
CN109543443A (en) User data management, device, equipment and storage medium based on block chain
CN108989848A (en) A kind of acquisition methods and management system of video resource file
CN109474420A (en) A kind of private key backup method and relevant device
CN106936898B (en) Cross-region file transmission method and system
CN112686668A (en) Alliance chain cross-chain system and method
CN101170554A (en) Message safety transfer system
CN111884811B (en) Block chain-based data evidence storing method and data evidence storing platform
CN104917807A (en) Resource transfer method, apparatus and system
CN109729000B (en) Instant messaging method and device
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN101325483B (en) Method and apparatus for updating symmetrical cryptographic key, symmetrical ciphering method and symmetrical deciphering method
CN112653556B (en) TOKEN-based micro-service security authentication method, device and storage medium
CN108632042A (en) A kind of class AKA identity authorization systems and method based on pool of symmetric keys
CN108769029A (en) It is a kind of to application system authentication device, method and system
CN101841814A (en) Terminal authentication method and system
CN105119716A (en) Secret key negotiation method based on SD cards
CN106027530A (en) Instant message encryption system based on smartphone and implementation method thereof
CN107819766A (en) Safety certifying method, system and computer-readable recording medium
CN104883682A (en) WIFI hotspot connecting and selecting method, communication terminal and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180619