CN108924091A - Method for authenticating user identity and Related product - Google Patents
Method for authenticating user identity and Related product Download PDFInfo
- Publication number
- CN108924091A CN108924091A CN201810575415.XA CN201810575415A CN108924091A CN 108924091 A CN108924091 A CN 108924091A CN 201810575415 A CN201810575415 A CN 201810575415A CN 108924091 A CN108924091 A CN 108924091A
- Authority
- CN
- China
- Prior art keywords
- blood
- record
- user
- application server
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Abstract
This application provides a kind of user ID authentication method and Related products, and described method includes following steps:Application server receives the first checking request that participant sends, after verifying to the first checking request, request user authorization;Application server receives user and agrees to the power of attorney, and the record of donating blood of authorized user is sent to data server;Application server receives the encrypted user data that data server is sent, which is the corresponding record of donating blood of the authorized user;Application server decrypts the encrypted user data and obtains record of donating blood, and verifies this and donates blood to record and determines that this is donated blood and records corresponding blood donor's identity, which is fed back to the participant completes second and verify.Method provided by the present application with high security the advantages of.
Description
Technical field
This application involves big data and medical fields, and in particular to a kind of method for authenticating user identity and Related product.
Background technique
It is required using all kinds of Internet services in phase from June 1st, 2017 according to the requirement of " network security method "
After closing platform completion authentication, it can continue to service using network.User identity authentication, which works, has become the base of network service
Plinth function.
Currently, the mode that authentication is able to carry out in network has very much, it mainly include authentication ids, hand-held identity card
Photograph certification, cell-phone number certification (cell-phone number has carried out authentication) are authenticated using other network platform accounts.Each net
Network platform authentication side has many differences.
Currently, existing authentication mode majority is to authenticate on line, user is carried out by uploading the operations such as personal identification card document
There is the risk for certification of assuming another's name, so the safety of existing identity identifying method is low in real-name authentication.
Apply for content
The embodiment of the present application provides a kind of method for authenticating user identity and Related product, can carry out to the identity of user
Certification, to improve the safety of user.
In a first aspect, the embodiment of the present application provides a kind of user ID authentication method, described method includes following steps:
Application server receives the first checking request that participant sends, after being verified to the first checking request, request
User's authorization;
Application server receives user and agrees to the power of attorney, and the record of donating blood of authorized user is sent to data server;
Application server receives the encrypted user data that data server is sent, which is should
The corresponding record of donating blood of authorized user;
Application server decrypts the encrypted user data and obtains record of donating blood, verify this donate blood record determine this donate blood
Corresponding blood donor's identity is recorded, which is fed back into the participant and completes second of verifying.
Optionally, the application server is decrypted the encrypted user data record that obtains donating blood and is specifically included:
Application server decrypts the encrypted user data using MD5, RSA, DES algorithm and obtains record of donating blood.
Optionally, the verification this donate blood to record and determine that this is donated blood and record corresponding blood donor's identity and specifically include:
Application server to this donate blood record carry out semantics identity obtain this donate blood record corresponding blood donor's name and
Corresponding identification card number verifies whether blood donor's name is corresponding with identification card number, and such as correspondence determines that blood donor's identity is to be somebody's turn to do
Blood donor's name.
Second aspect, provides a kind of subscriber identity authentication system, and the authentication system includes:Application server sum number
According to server, wherein
The data server is donated blood data for storing user;
The application server tests the first checking request for receiving the first checking request of participant's transmission
After card, request user authorization;It receives user and agrees to the power of attorney, the record of donating blood of authorized user is sent to data server;
The data server is also used to inquire the corresponding record of donating blood of the authorized user, after the recording of encrypted of donating blood
Encrypted record of donating blood is sent to the application server;
The application server decrypts the encrypted user data and obtains record of donating blood, and verifies this and donates blood and records determination
This, which is donated blood, records corresponding blood donor's identity, which is fed back to the participant and completes second of verifying.
Optionally, the data server, specifically for being stored after the privacy information filtering for data of donating blood to user.
Optionally, the privacy information includes:Address name, ID card No., reserved cell-phone number of donating blood.
Optionally, the encryption or decryption specifically include:MD5, RSA, DES algorithm.
Optionally, the application server obtains the record of donating blood specifically for carrying out semantics identity to the record of donating blood
Whether corresponding blood donor's name and corresponding identification card number, it is corresponding with identification card number to verify blood donor's name, such as corresponding,
Determine that blood donor's identity is blood donor's name.
The third aspect, provides a kind of computer readable storage medium, and storage is used for the computer journey of electronic data interchange
Sequence, wherein the computer program makes computer execute the method that first aspect provides.
Fourth aspect, provides a kind of computer program product, and the computer program product includes storing computer journey
The non-transient computer readable storage medium of sequence, the computer program are operable to that computer is made to execute first aspect offer
Method.
Implement the embodiment of the present application, has the advantages that:
Method provided by the present application can effectively donate blood under bonding wire site real name comparing, meet twin check user
The demand of authentication.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is some embodiments of the present application, for ability
For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is a kind of flow diagram of identity identifying method provided by the embodiments of the present application.
Fig. 2 is the hardware block diagram schematic diagram of the application server of the application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on this Shen
Please in embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall in the protection scope of this application.
The description and claims of this application and term " first ", " second ", " third " and " in the attached drawing
Four " etc. are not use to describe a particular order for distinguishing different objects.In addition, term " includes " and " having " and it
Any deformation, it is intended that cover and non-exclusive include.Such as it contains the process, method of a series of steps or units, be
System, product or equipment are not limited to listed step or unit, but optionally further comprising the step of not listing or list
Member, or optionally further comprising other step or units intrinsic for these process, methods, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments
It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical
Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and
Implicitly understand, embodiment described herein can be combined with other embodiments.
Electronic device in the application may include smart phone (such as Android phone, iOS mobile phone, Windows
Phone mobile phone etc.), tablet computer, palm PC, laptop, mobile internet device (MID, Mobile Internet
Devices) or wearable device etc., above-mentioned electronic device are only citings, and non exhaustive, are filled including but not limited to above-mentioned electronics
It sets, for convenience of description, above-mentioned electronic device is known as user equipment (User equipment, UE) in following example.
Certainly in practical applications, above-mentioned user equipment is also not necessarily limited to above-mentioned realization form, such as can also include:Smart television, family
Front yard robot, computer equipment etc..
Refering to fig. 1, Fig. 1 is a kind of identity identifying method provided by the present application, as shown in Figure 1, including the following steps:
Step 1:User passes through blood station under line and participates in voluntary blood donation behavior, and real name identity, information preservation of donating blood are in various regions
Blood station;
Step 2:User donates blood data after privacy information filters, and is synchronized in data server;
Filter type in above-mentioned steps 2 can be handled by way of automatic fitration, above-mentioned privacy information include but
It is not limited to:Address name, ID card No., reserved cell-phone number etc. information of donating blood.
Above-mentioned filter type is specifically as follows, and identifies to the information of user, such as recognize continuous setting digit (such as
18) character string, then by the character string hide display, such as recognize geographical location information, then hide geographical location information
Display.
Step 3:Participant (internet platform user) submits real name verification request;
Step 4:Application server checking request after being verified, sends notice, request user authorization;
Step 5:After user agrees to authorization, application server receives user and agrees to the power of attorney;
Step 6:Application server sends the record of donating blood of authorized user to data server requests;
Step 7:After data server receives request and the user's power of attorney of application server, encrypted transmission user data;
The cipher mode of above-mentioned encrypted transmission user data includes but is not limited to:One of MD5, RSA, DES scheduling algorithm.
Step 8:Application server decrypted user, which is donated blood, records data, verifies behavior of donating blood, and confirms blood donor's identity;
Application server to this donate blood record carry out semantics identity obtain this donate blood record corresponding blood donor's name and
Corresponding identification card number verifies whether blood donor's name is corresponding with identification card number, and such as correspondence determines that blood donor's identity is to be somebody's turn to do
Blood donor's name.The algorithm of above-mentioned semantics identity is specifically as follows, and Baidu's voice, natural language are by algorithm, siri etc..
Step 9:Application server returns to blood donor's identity result to participant, completes verification process.
Method provided by the present application can effectively donate blood under bonding wire site real name comparing, meet twin check user
The demand of authentication.
Referring to Fig. 2, Fig. 2 is a kind of structural schematic diagram of application server 100 disclosed in the embodiment of the present application, using clothes
Device 100 be engaged in including storing and processing circuit 110, and the telecommunication circuit 120 and audio group that connect with storage and processing circuit 110
Part 140, wherein in some specific application servers 100, display component 130 or touch control component can also be set.
Application server 100 may include control circuit, which may include storage and processing circuit 110.It should
Storage and processing circuit 110 can store device, such as hard drive memory, nonvolatile memory (such as flash memory or be used for
Form other electrically programmable read only memories etc. of solid state drive), volatile memory (such as either statically or dynamically deposit at random
Access to memory etc.) etc., the embodiment of the present application is with no restriction.Processing circuit in storage and processing circuit 110 can be used for controlling
The operating of electronic equipment 100.The processing circuit can microprocessor based on one or more, microcontroller, Digital Signal Processing
Device, baseband processor, power management unit, audio codec chip, specific integrated circuit, display-driver Ics etc.
To realize.
Storage and processing circuit 110 can be used for running the software in application server 100, such as voice over internet protocol
(Voice over Internet Protocol, VOIP) call application program, simultaneous interpretation function, media play application
Program, operation system function etc..These softwares can be used for executing some control operations, for example, the image based on camera is adopted
Collection, the ambient light measurement based on ambient light sensor, the proximity sensor measurement based on proximity sensor, based on such as luminous two
The information display function that the positioning indicators such as the status indicator lamp of pole pipe are realized, the touch event detection based on touch sensor,
Operation associated with wireless communication function is executed, operation associated with collecting and generating audio signal, with collection and processing
Other functions etc. in the associated control operation of button press event data and application server 100, the embodiment of the present application
With no restriction.
Application server 100 can also include input-output circuit 150.Input-output circuit 150 can be used for making to apply
Server 100 realizes outputting and inputting for data, i.e. permission application server 100 allows from outer equipment receiving data and also to answer
Data are exported from application server 100 to external equipment with server 100.Input-output circuit 150 may further include
Sensor 170.Sensor 170 may include ambient light sensor, the proximity sensor based on light and capacitor, touch sensor
(for example, being based on light touch sensor and/or capacitive touch sensors, wherein touch sensor can be touching display screen
A part can also be used as a touch sensor arrangement and independently use), acceleration transducer and other sensors etc..
Input-output circuit 150 can also include that touch sensor array (is shown that is, display 130 can be touch-control
Screen).Touch sensor can be the electricity formed by transparent touch sensor electrode (such as tin indium oxide (ITO) electrode) array
Appearance formula touch sensor, or can be the touch sensor formed using other touching techniques, such as sound wave touch-control, pressure-sensitive touching
It touches, resistive touch, optical touch etc., the embodiment of the present application is with no restriction.
Application server 100 can also include audio component 140.Audio component 140 can be used for for application server 100
Audio input and output function are provided.Audio component 140 in application server 100 may include loudspeaker, microphone, buzzing
Device, tone generator and other components for being used to generate and detect sound.
Telecommunication circuit 120 can be used for providing the ability with external device communication for electronic equipment 100.Telecommunication circuit 120
It may include analog- and digital- input-output interface circuit, and the radio communication circuit based on radiofrequency signal and/or optical signal.
Radio communication circuit in telecommunication circuit 120 may include radio-frequency transceiver circuitry, power amplifier circuit, low noise amplification
Device, switch, filter and antenna.For example, the radio communication circuit in telecommunication circuit 120 may include for passing through transmitting
The circuit of near-field communication (Near Field Communication, NFC) is supported with near-field coupling electromagnetic signal is received.Example
Such as, telecommunication circuit 120 may include near-field communication aerial and near-field communication transceiver.Telecommunication circuit 120 can also include honeycomb
Telephone transceiver and antenna, wireless lan transceiver circuit and antenna etc..
Application server 100 can further include battery, power management circuitry and other input-output units 160.
Input-output unit 160 may include button, control stick, click wheel, scroll wheel, touch tablet, keypad, keyboard, camera,
Light emitting diode or other positioning indicators etc..
User can input a command for the operation of control application server 100 by input-output circuit 150, and can
It realizes to use the output data of input-output circuit 150 and receives status information from application server 100 and other defeated
Out.
The embodiment of the present application also provides a kind of computer storage medium, wherein computer storage medium storage is for electricity
The computer program of subdata exchange, it is as any in recorded in above method embodiment which execute computer
A kind of some or all of identity identifying method step.
The embodiment of the present application also provides a kind of computer program product, and computer program product includes storing computer journey
The non-transient computer readable storage medium of sequence, computer program are operable to that computer is made to execute such as above method embodiment
Some or all of any identity identifying method of middle record step.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of
Combination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence because
According to the application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know
It knows, embodiment described in this description belongs to alternative embodiment, related actions and modules not necessarily the application
It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of unit, only a kind of logic
Function division, there may be another division manner in actual implementation, such as multiple units or components can combine or can collect
At another system is arrived, or some features can be ignored or not executed.Another point, shown or discussed mutual coupling
It closes or direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit can be with
It is electrical or other forms.
Unit may or may not be physically separated as illustrated by the separation member, shown as a unit
Component may or may not be physical unit, it can and it is in one place, or may be distributed over multiple networks
On unit.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also be realized in the form of software program module.
If integrated unit is realized and when sold or used as an independent product in the form of software program module, can
To be stored in a computer-readable access to memory.Based on this understanding, the technical solution of the application is substantially in other words
The all or part of the part that contributes to existing technology or the technical solution can embody in the form of software products
Come, which is stored in a memory, including some instructions are used so that a computer equipment (can be
Personal computer, server or network equipment etc.) execute each embodiment method of the application all or part of the steps.And it is preceding
The memory stated includes:USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random
Access Memory), mobile hard disk, the various media that can store program code such as magnetic or disk.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can store in a computer-readable memory, memory
May include:Flash disk, read-only memory (English:Read-Only Memory, referred to as:ROM), random access device (English:
Random Access Memory, referred to as:RAM), disk or CD etc..
The embodiment of the present application is described in detail above, specific case used herein to the principle of the application and
Embodiment is expounded, the description of the example is only used to help understand the method for the present application and its core ideas;
At the same time, for those skilled in the art can in specific embodiments and applications according to the thought of the application
There is change place, in conclusion the contents of this specification should not be construed as limiting the present application.
Claims (10)
1. a kind of user ID authentication method, which is characterized in that described method includes following steps:
Application server receives the first checking request that participant sends, and after verifying to the first checking request, requests user
Authorization;
Application server receives user and agrees to the power of attorney, and the record of donating blood of authorized user is sent to data server;
Application server receives the encrypted user data that data server is sent, which is the authorization
The corresponding record of donating blood of user;
Application server decrypts the encrypted user data and obtains record of donating blood, verify this donate blood record determine the record of donating blood
Blood donor's identity is fed back to the participant and completes second of verifying by corresponding blood donor's identity.
2. the method according to claim 1, wherein the application server decrypts the encrypted user data
The record that obtains donating blood specifically includes:
Application server decrypts the encrypted user data using MD5, RSA, DES algorithm and obtains record of donating blood.
3. the method according to claim 1, wherein the verification this donate blood to record and determine that this is donated blood and records correspondence
Blood donor's identity specifically includes:
Application server carries out semantics identity to the record of donating blood and obtains this and donate blood to record corresponding blood donor's name and correspondence
Identification card number, whether with identification card number corresponding, such as corresponding if verifying blood donor's name, determines that blood donor's identity is donated blood for this
Person's name.
4. a kind of subscriber identity authentication system, which is characterized in that the authentication system includes:Application server and data clothes
Business device, wherein
The data server is donated blood data for storing user;
The application server, for receiving the first checking request of participant's transmission, after being verified to the first checking request,
Request user authorization;It receives user and agrees to the power of attorney, the record of donating blood of authorized user is sent to data server;
The data server is also used to inquire the corresponding record of donating blood of the authorized user, will will add after the recording of encrypted of donating blood
Record of donating blood after close is sent to the application server;
The application server decrypts the encrypted user data and obtains record of donating blood, verify this donate blood record determine this offer
Blood records corresponding blood donor's identity, which is fed back to the participant and completes second of verifying.
5. system according to claim 4, which is characterized in that
The data server, specifically for being stored after the privacy information filtering for data of donating blood to user.
6. system according to claim 5, which is characterized in that
The privacy information includes:Address name, ID card No., reserved cell-phone number of donating blood.
7. system according to claim 5, which is characterized in that
The encryption or decryption specifically include:MD5, RSA, DES algorithm.
8. system according to claim 5, which is characterized in that
The application server obtains this and donates blood to record corresponding blood donor specifically for carrying out semantics identity to the record of donating blood
Name and corresponding identification card number verify whether blood donor's name is corresponding with identification card number, and such as correspondence determines the blood donor
Identity is blood donor's name.
9. a kind of computer readable storage medium, which is characterized in that it stores the computer program for being used for electronic data interchange,
In, the computer program makes computer execute method according to any of claims 1-4.
10. a kind of computer program product, which is characterized in that the computer program product includes storing computer program
Non-transient computer readable storage medium, the computer program are operable to that computer is made to execute such as claim 1-4
Method described in one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810575415.XA CN108924091A (en) | 2018-06-06 | 2018-06-06 | Method for authenticating user identity and Related product |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810575415.XA CN108924091A (en) | 2018-06-06 | 2018-06-06 | Method for authenticating user identity and Related product |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108924091A true CN108924091A (en) | 2018-11-30 |
Family
ID=64420222
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810575415.XA Pending CN108924091A (en) | 2018-06-06 | 2018-06-06 | Method for authenticating user identity and Related product |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108924091A (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101895605A (en) * | 2010-06-11 | 2010-11-24 | 中兴通讯股份有限公司 | Method and device for communication based on pseudo-contact information |
CN103067918A (en) * | 2012-12-25 | 2013-04-24 | 华为技术有限公司 | Method, device and system of privacy data anonymization in communication network |
CN103095890A (en) * | 2012-12-31 | 2013-05-08 | 东莞宇龙通信科技有限公司 | Contact person information encryption method and communication terminal |
CN104599048A (en) * | 2014-12-31 | 2015-05-06 | 贵州精英天成科技股份有限公司 | Plasma donor identity recognition and online checking control method for plasma collection station |
CN105681043A (en) * | 2015-12-30 | 2016-06-15 | 深圳市鼎芯无限科技有限公司 | User identity double verification method and device |
CN107113315A (en) * | 2016-04-15 | 2017-08-29 | 深圳前海达闼云端智能科技有限公司 | Identity authentication method, terminal and server |
WO2017147508A1 (en) * | 2016-02-26 | 2017-08-31 | Sri International | Identification and isolation of antibodies from white blood cells |
CN107145799A (en) * | 2017-05-04 | 2017-09-08 | 山东浪潮云服务信息科技有限公司 | A kind of data desensitization method and device |
CN107180237A (en) * | 2017-07-20 | 2017-09-19 | 成都市佳颖医用制品有限公司 | One kind adopts slurry checking system and method |
CN107610764A (en) * | 2017-07-26 | 2018-01-19 | 佛山科学技术学院 | A kind of internet medical identity authorization system and method online |
CN107895263A (en) * | 2017-12-15 | 2018-04-10 | 四川南格尔生物科技有限公司 | A kind of intelligence offers slurry process management system |
-
2018
- 2018-06-06 CN CN201810575415.XA patent/CN108924091A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101895605A (en) * | 2010-06-11 | 2010-11-24 | 中兴通讯股份有限公司 | Method and device for communication based on pseudo-contact information |
CN103067918A (en) * | 2012-12-25 | 2013-04-24 | 华为技术有限公司 | Method, device and system of privacy data anonymization in communication network |
CN103095890A (en) * | 2012-12-31 | 2013-05-08 | 东莞宇龙通信科技有限公司 | Contact person information encryption method and communication terminal |
CN104599048A (en) * | 2014-12-31 | 2015-05-06 | 贵州精英天成科技股份有限公司 | Plasma donor identity recognition and online checking control method for plasma collection station |
CN105681043A (en) * | 2015-12-30 | 2016-06-15 | 深圳市鼎芯无限科技有限公司 | User identity double verification method and device |
WO2017147508A1 (en) * | 2016-02-26 | 2017-08-31 | Sri International | Identification and isolation of antibodies from white blood cells |
CN107113315A (en) * | 2016-04-15 | 2017-08-29 | 深圳前海达闼云端智能科技有限公司 | Identity authentication method, terminal and server |
CN107145799A (en) * | 2017-05-04 | 2017-09-08 | 山东浪潮云服务信息科技有限公司 | A kind of data desensitization method and device |
CN107180237A (en) * | 2017-07-20 | 2017-09-19 | 成都市佳颖医用制品有限公司 | One kind adopts slurry checking system and method |
CN107610764A (en) * | 2017-07-26 | 2018-01-19 | 佛山科学技术学院 | A kind of internet medical identity authorization system and method online |
CN107895263A (en) * | 2017-12-15 | 2018-04-10 | 四川南格尔生物科技有限公司 | A kind of intelligence offers slurry process management system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107395343B (en) | Certificate management method and system | |
CN104468464B (en) | verification method, device and system | |
CN109472166A (en) | A kind of electronic signature method, device, equipment and medium | |
CN104468463B (en) | Verification method, device and system | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN109076331A (en) | The control method of electronic equipment and electronic equipment | |
CN106293751A (en) | A kind of method showing information on the terminal device and terminal unit | |
CN104700010A (en) | Personal information protection method and protection device | |
WO2021115113A1 (en) | Data processing method and device, and storage medium | |
CN110245144A (en) | Protocol data management method, device, storage medium and system | |
WO2021147442A1 (en) | Access control method and apparatus, terminal device, and storage medium | |
CN104917796B (en) | Credit accounts creating device, system and method | |
CN107437009A (en) | Authority control method and related product | |
CN104376273A (en) | Data access control method and device | |
WO2020024929A1 (en) | Method for upgrading service application range of electronic identity card, and terminal device | |
WO2017113119A1 (en) | Method and device for associating application with biological characteristic, and mobile terminal | |
CN109257336A (en) | It is a kind of based on the encrypted message processing method of block chain, terminal device | |
CN105516258A (en) | Information interaction system, method and device | |
CN104967593A (en) | Identity verification method, apparatus and system | |
CN109102297A (en) | A kind of voidable method of payment and device | |
CN107784089A (en) | A kind of storage method of multi-medium data, processing method and mobile terminal | |
CN108369618A (en) | A kind of fingerprint identification method and terminal device | |
CN108234124A (en) | Auth method, device and system | |
CN107145794A (en) | A kind of data processing method and device and mobile terminal | |
CN107786569A (en) | A kind of identifying code sending method, method of reseptance and relevant device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181130 |