CN108924091A - Method for authenticating user identity and Related product - Google Patents

Method for authenticating user identity and Related product Download PDF

Info

Publication number
CN108924091A
CN108924091A CN201810575415.XA CN201810575415A CN108924091A CN 108924091 A CN108924091 A CN 108924091A CN 201810575415 A CN201810575415 A CN 201810575415A CN 108924091 A CN108924091 A CN 108924091A
Authority
CN
China
Prior art keywords
blood
record
user
application server
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810575415.XA
Other languages
Chinese (zh)
Inventor
赵利俊
梁子卿
其他发明人请求不公开姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Blood Margin Medical Technology Co Ltd
Original Assignee
Shenzhen Blood Margin Medical Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Blood Margin Medical Technology Co Ltd filed Critical Shenzhen Blood Margin Medical Technology Co Ltd
Priority to CN201810575415.XA priority Critical patent/CN108924091A/en
Publication of CN108924091A publication Critical patent/CN108924091A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

This application provides a kind of user ID authentication method and Related products, and described method includes following steps:Application server receives the first checking request that participant sends, after verifying to the first checking request, request user authorization;Application server receives user and agrees to the power of attorney, and the record of donating blood of authorized user is sent to data server;Application server receives the encrypted user data that data server is sent, which is the corresponding record of donating blood of the authorized user;Application server decrypts the encrypted user data and obtains record of donating blood, and verifies this and donates blood to record and determines that this is donated blood and records corresponding blood donor's identity, which is fed back to the participant completes second and verify.Method provided by the present application with high security the advantages of.

Description

Method for authenticating user identity and Related product
Technical field
This application involves big data and medical fields, and in particular to a kind of method for authenticating user identity and Related product.
Background technique
It is required using all kinds of Internet services in phase from June 1st, 2017 according to the requirement of " network security method " After closing platform completion authentication, it can continue to service using network.User identity authentication, which works, has become the base of network service Plinth function.
Currently, the mode that authentication is able to carry out in network has very much, it mainly include authentication ids, hand-held identity card Photograph certification, cell-phone number certification (cell-phone number has carried out authentication) are authenticated using other network platform accounts.Each net Network platform authentication side has many differences.
Currently, existing authentication mode majority is to authenticate on line, user is carried out by uploading the operations such as personal identification card document There is the risk for certification of assuming another's name, so the safety of existing identity identifying method is low in real-name authentication.
Apply for content
The embodiment of the present application provides a kind of method for authenticating user identity and Related product, can carry out to the identity of user Certification, to improve the safety of user.
In a first aspect, the embodiment of the present application provides a kind of user ID authentication method, described method includes following steps:
Application server receives the first checking request that participant sends, after being verified to the first checking request, request User's authorization;
Application server receives user and agrees to the power of attorney, and the record of donating blood of authorized user is sent to data server;
Application server receives the encrypted user data that data server is sent, which is should The corresponding record of donating blood of authorized user;
Application server decrypts the encrypted user data and obtains record of donating blood, verify this donate blood record determine this donate blood Corresponding blood donor's identity is recorded, which is fed back into the participant and completes second of verifying.
Optionally, the application server is decrypted the encrypted user data record that obtains donating blood and is specifically included:
Application server decrypts the encrypted user data using MD5, RSA, DES algorithm and obtains record of donating blood.
Optionally, the verification this donate blood to record and determine that this is donated blood and record corresponding blood donor's identity and specifically include:
Application server to this donate blood record carry out semantics identity obtain this donate blood record corresponding blood donor's name and Corresponding identification card number verifies whether blood donor's name is corresponding with identification card number, and such as correspondence determines that blood donor's identity is to be somebody's turn to do Blood donor's name.
Second aspect, provides a kind of subscriber identity authentication system, and the authentication system includes:Application server sum number According to server, wherein
The data server is donated blood data for storing user;
The application server tests the first checking request for receiving the first checking request of participant's transmission After card, request user authorization;It receives user and agrees to the power of attorney, the record of donating blood of authorized user is sent to data server;
The data server is also used to inquire the corresponding record of donating blood of the authorized user, after the recording of encrypted of donating blood Encrypted record of donating blood is sent to the application server;
The application server decrypts the encrypted user data and obtains record of donating blood, and verifies this and donates blood and records determination This, which is donated blood, records corresponding blood donor's identity, which is fed back to the participant and completes second of verifying.
Optionally, the data server, specifically for being stored after the privacy information filtering for data of donating blood to user.
Optionally, the privacy information includes:Address name, ID card No., reserved cell-phone number of donating blood.
Optionally, the encryption or decryption specifically include:MD5, RSA, DES algorithm.
Optionally, the application server obtains the record of donating blood specifically for carrying out semantics identity to the record of donating blood Whether corresponding blood donor's name and corresponding identification card number, it is corresponding with identification card number to verify blood donor's name, such as corresponding, Determine that blood donor's identity is blood donor's name.
The third aspect, provides a kind of computer readable storage medium, and storage is used for the computer journey of electronic data interchange Sequence, wherein the computer program makes computer execute the method that first aspect provides.
Fourth aspect, provides a kind of computer program product, and the computer program product includes storing computer journey The non-transient computer readable storage medium of sequence, the computer program are operable to that computer is made to execute first aspect offer Method.
Implement the embodiment of the present application, has the advantages that:
Method provided by the present application can effectively donate blood under bonding wire site real name comparing, meet twin check user The demand of authentication.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is some embodiments of the present application, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is a kind of flow diagram of identity identifying method provided by the embodiments of the present application.
Fig. 2 is the hardware block diagram schematic diagram of the application server of the application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on this Shen Please in embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall in the protection scope of this application.
The description and claims of this application and term " first ", " second ", " third " and " in the attached drawing Four " etc. are not use to describe a particular order for distinguishing different objects.In addition, term " includes " and " having " and it Any deformation, it is intended that cover and non-exclusive include.Such as it contains the process, method of a series of steps or units, be System, product or equipment are not limited to listed step or unit, but optionally further comprising the step of not listing or list Member, or optionally further comprising other step or units intrinsic for these process, methods, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
Electronic device in the application may include smart phone (such as Android phone, iOS mobile phone, Windows Phone mobile phone etc.), tablet computer, palm PC, laptop, mobile internet device (MID, Mobile Internet Devices) or wearable device etc., above-mentioned electronic device are only citings, and non exhaustive, are filled including but not limited to above-mentioned electronics It sets, for convenience of description, above-mentioned electronic device is known as user equipment (User equipment, UE) in following example. Certainly in practical applications, above-mentioned user equipment is also not necessarily limited to above-mentioned realization form, such as can also include:Smart television, family Front yard robot, computer equipment etc..
Refering to fig. 1, Fig. 1 is a kind of identity identifying method provided by the present application, as shown in Figure 1, including the following steps:
Step 1:User passes through blood station under line and participates in voluntary blood donation behavior, and real name identity, information preservation of donating blood are in various regions Blood station;
Step 2:User donates blood data after privacy information filters, and is synchronized in data server;
Filter type in above-mentioned steps 2 can be handled by way of automatic fitration, above-mentioned privacy information include but It is not limited to:Address name, ID card No., reserved cell-phone number etc. information of donating blood.
Above-mentioned filter type is specifically as follows, and identifies to the information of user, such as recognize continuous setting digit (such as 18) character string, then by the character string hide display, such as recognize geographical location information, then hide geographical location information Display.
Step 3:Participant (internet platform user) submits real name verification request;
Step 4:Application server checking request after being verified, sends notice, request user authorization;
Step 5:After user agrees to authorization, application server receives user and agrees to the power of attorney;
Step 6:Application server sends the record of donating blood of authorized user to data server requests;
Step 7:After data server receives request and the user's power of attorney of application server, encrypted transmission user data;
The cipher mode of above-mentioned encrypted transmission user data includes but is not limited to:One of MD5, RSA, DES scheduling algorithm.
Step 8:Application server decrypted user, which is donated blood, records data, verifies behavior of donating blood, and confirms blood donor's identity;
Application server to this donate blood record carry out semantics identity obtain this donate blood record corresponding blood donor's name and Corresponding identification card number verifies whether blood donor's name is corresponding with identification card number, and such as correspondence determines that blood donor's identity is to be somebody's turn to do Blood donor's name.The algorithm of above-mentioned semantics identity is specifically as follows, and Baidu's voice, natural language are by algorithm, siri etc..
Step 9:Application server returns to blood donor's identity result to participant, completes verification process.
Method provided by the present application can effectively donate blood under bonding wire site real name comparing, meet twin check user The demand of authentication.
Referring to Fig. 2, Fig. 2 is a kind of structural schematic diagram of application server 100 disclosed in the embodiment of the present application, using clothes Device 100 be engaged in including storing and processing circuit 110, and the telecommunication circuit 120 and audio group that connect with storage and processing circuit 110 Part 140, wherein in some specific application servers 100, display component 130 or touch control component can also be set.
Application server 100 may include control circuit, which may include storage and processing circuit 110.It should Storage and processing circuit 110 can store device, such as hard drive memory, nonvolatile memory (such as flash memory or be used for Form other electrically programmable read only memories etc. of solid state drive), volatile memory (such as either statically or dynamically deposit at random Access to memory etc.) etc., the embodiment of the present application is with no restriction.Processing circuit in storage and processing circuit 110 can be used for controlling The operating of electronic equipment 100.The processing circuit can microprocessor based on one or more, microcontroller, Digital Signal Processing Device, baseband processor, power management unit, audio codec chip, specific integrated circuit, display-driver Ics etc. To realize.
Storage and processing circuit 110 can be used for running the software in application server 100, such as voice over internet protocol (Voice over Internet Protocol, VOIP) call application program, simultaneous interpretation function, media play application Program, operation system function etc..These softwares can be used for executing some control operations, for example, the image based on camera is adopted Collection, the ambient light measurement based on ambient light sensor, the proximity sensor measurement based on proximity sensor, based on such as luminous two The information display function that the positioning indicators such as the status indicator lamp of pole pipe are realized, the touch event detection based on touch sensor, Operation associated with wireless communication function is executed, operation associated with collecting and generating audio signal, with collection and processing Other functions etc. in the associated control operation of button press event data and application server 100, the embodiment of the present application With no restriction.
Application server 100 can also include input-output circuit 150.Input-output circuit 150 can be used for making to apply Server 100 realizes outputting and inputting for data, i.e. permission application server 100 allows from outer equipment receiving data and also to answer Data are exported from application server 100 to external equipment with server 100.Input-output circuit 150 may further include Sensor 170.Sensor 170 may include ambient light sensor, the proximity sensor based on light and capacitor, touch sensor (for example, being based on light touch sensor and/or capacitive touch sensors, wherein touch sensor can be touching display screen A part can also be used as a touch sensor arrangement and independently use), acceleration transducer and other sensors etc..
Input-output circuit 150 can also include that touch sensor array (is shown that is, display 130 can be touch-control Screen).Touch sensor can be the electricity formed by transparent touch sensor electrode (such as tin indium oxide (ITO) electrode) array Appearance formula touch sensor, or can be the touch sensor formed using other touching techniques, such as sound wave touch-control, pressure-sensitive touching It touches, resistive touch, optical touch etc., the embodiment of the present application is with no restriction.
Application server 100 can also include audio component 140.Audio component 140 can be used for for application server 100 Audio input and output function are provided.Audio component 140 in application server 100 may include loudspeaker, microphone, buzzing Device, tone generator and other components for being used to generate and detect sound.
Telecommunication circuit 120 can be used for providing the ability with external device communication for electronic equipment 100.Telecommunication circuit 120 It may include analog- and digital- input-output interface circuit, and the radio communication circuit based on radiofrequency signal and/or optical signal. Radio communication circuit in telecommunication circuit 120 may include radio-frequency transceiver circuitry, power amplifier circuit, low noise amplification Device, switch, filter and antenna.For example, the radio communication circuit in telecommunication circuit 120 may include for passing through transmitting The circuit of near-field communication (Near Field Communication, NFC) is supported with near-field coupling electromagnetic signal is received.Example Such as, telecommunication circuit 120 may include near-field communication aerial and near-field communication transceiver.Telecommunication circuit 120 can also include honeycomb Telephone transceiver and antenna, wireless lan transceiver circuit and antenna etc..
Application server 100 can further include battery, power management circuitry and other input-output units 160. Input-output unit 160 may include button, control stick, click wheel, scroll wheel, touch tablet, keypad, keyboard, camera, Light emitting diode or other positioning indicators etc..
User can input a command for the operation of control application server 100 by input-output circuit 150, and can It realizes to use the output data of input-output circuit 150 and receives status information from application server 100 and other defeated Out.
The embodiment of the present application also provides a kind of computer storage medium, wherein computer storage medium storage is for electricity The computer program of subdata exchange, it is as any in recorded in above method embodiment which execute computer A kind of some or all of identity identifying method step.
The embodiment of the present application also provides a kind of computer program product, and computer program product includes storing computer journey The non-transient computer readable storage medium of sequence, computer program are operable to that computer is made to execute such as above method embodiment Some or all of any identity identifying method of middle record step.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence because According to the application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, embodiment described in this description belongs to alternative embodiment, related actions and modules not necessarily the application It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of unit, only a kind of logic Function division, there may be another division manner in actual implementation, such as multiple units or components can combine or can collect At another system is arrived, or some features can be ignored or not executed.Another point, shown or discussed mutual coupling It closes or direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit can be with It is electrical or other forms.
Unit may or may not be physically separated as illustrated by the separation member, shown as a unit Component may or may not be physical unit, it can and it is in one place, or may be distributed over multiple networks On unit.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also be realized in the form of software program module.
If integrated unit is realized and when sold or used as an independent product in the form of software program module, can To be stored in a computer-readable access to memory.Based on this understanding, the technical solution of the application is substantially in other words The all or part of the part that contributes to existing technology or the technical solution can embody in the form of software products Come, which is stored in a memory, including some instructions are used so that a computer equipment (can be Personal computer, server or network equipment etc.) execute each embodiment method of the application all or part of the steps.And it is preceding The memory stated includes:USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, the various media that can store program code such as magnetic or disk.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can store in a computer-readable memory, memory May include:Flash disk, read-only memory (English:Read-Only Memory, referred to as:ROM), random access device (English: Random Access Memory, referred to as:RAM), disk or CD etc..
The embodiment of the present application is described in detail above, specific case used herein to the principle of the application and Embodiment is expounded, the description of the example is only used to help understand the method for the present application and its core ideas; At the same time, for those skilled in the art can in specific embodiments and applications according to the thought of the application There is change place, in conclusion the contents of this specification should not be construed as limiting the present application.

Claims (10)

1. a kind of user ID authentication method, which is characterized in that described method includes following steps:
Application server receives the first checking request that participant sends, and after verifying to the first checking request, requests user Authorization;
Application server receives user and agrees to the power of attorney, and the record of donating blood of authorized user is sent to data server;
Application server receives the encrypted user data that data server is sent, which is the authorization The corresponding record of donating blood of user;
Application server decrypts the encrypted user data and obtains record of donating blood, verify this donate blood record determine the record of donating blood Blood donor's identity is fed back to the participant and completes second of verifying by corresponding blood donor's identity.
2. the method according to claim 1, wherein the application server decrypts the encrypted user data The record that obtains donating blood specifically includes:
Application server decrypts the encrypted user data using MD5, RSA, DES algorithm and obtains record of donating blood.
3. the method according to claim 1, wherein the verification this donate blood to record and determine that this is donated blood and records correspondence Blood donor's identity specifically includes:
Application server carries out semantics identity to the record of donating blood and obtains this and donate blood to record corresponding blood donor's name and correspondence Identification card number, whether with identification card number corresponding, such as corresponding if verifying blood donor's name, determines that blood donor's identity is donated blood for this Person's name.
4. a kind of subscriber identity authentication system, which is characterized in that the authentication system includes:Application server and data clothes Business device, wherein
The data server is donated blood data for storing user;
The application server, for receiving the first checking request of participant's transmission, after being verified to the first checking request, Request user authorization;It receives user and agrees to the power of attorney, the record of donating blood of authorized user is sent to data server;
The data server is also used to inquire the corresponding record of donating blood of the authorized user, will will add after the recording of encrypted of donating blood Record of donating blood after close is sent to the application server;
The application server decrypts the encrypted user data and obtains record of donating blood, verify this donate blood record determine this offer Blood records corresponding blood donor's identity, which is fed back to the participant and completes second of verifying.
5. system according to claim 4, which is characterized in that
The data server, specifically for being stored after the privacy information filtering for data of donating blood to user.
6. system according to claim 5, which is characterized in that
The privacy information includes:Address name, ID card No., reserved cell-phone number of donating blood.
7. system according to claim 5, which is characterized in that
The encryption or decryption specifically include:MD5, RSA, DES algorithm.
8. system according to claim 5, which is characterized in that
The application server obtains this and donates blood to record corresponding blood donor specifically for carrying out semantics identity to the record of donating blood Name and corresponding identification card number verify whether blood donor's name is corresponding with identification card number, and such as correspondence determines the blood donor Identity is blood donor's name.
9. a kind of computer readable storage medium, which is characterized in that it stores the computer program for being used for electronic data interchange, In, the computer program makes computer execute method according to any of claims 1-4.
10. a kind of computer program product, which is characterized in that the computer program product includes storing computer program Non-transient computer readable storage medium, the computer program are operable to that computer is made to execute such as claim 1-4 Method described in one.
CN201810575415.XA 2018-06-06 2018-06-06 Method for authenticating user identity and Related product Pending CN108924091A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810575415.XA CN108924091A (en) 2018-06-06 2018-06-06 Method for authenticating user identity and Related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810575415.XA CN108924091A (en) 2018-06-06 2018-06-06 Method for authenticating user identity and Related product

Publications (1)

Publication Number Publication Date
CN108924091A true CN108924091A (en) 2018-11-30

Family

ID=64420222

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810575415.XA Pending CN108924091A (en) 2018-06-06 2018-06-06 Method for authenticating user identity and Related product

Country Status (1)

Country Link
CN (1) CN108924091A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895605A (en) * 2010-06-11 2010-11-24 中兴通讯股份有限公司 Method and device for communication based on pseudo-contact information
CN103067918A (en) * 2012-12-25 2013-04-24 华为技术有限公司 Method, device and system of privacy data anonymization in communication network
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal
CN104599048A (en) * 2014-12-31 2015-05-06 贵州精英天成科技股份有限公司 Plasma donor identity recognition and online checking control method for plasma collection station
CN105681043A (en) * 2015-12-30 2016-06-15 深圳市鼎芯无限科技有限公司 User identity double verification method and device
CN107113315A (en) * 2016-04-15 2017-08-29 深圳前海达闼云端智能科技有限公司 Identity authentication method, terminal and server
WO2017147508A1 (en) * 2016-02-26 2017-08-31 Sri International Identification and isolation of antibodies from white blood cells
CN107145799A (en) * 2017-05-04 2017-09-08 山东浪潮云服务信息科技有限公司 A kind of data desensitization method and device
CN107180237A (en) * 2017-07-20 2017-09-19 成都市佳颖医用制品有限公司 One kind adopts slurry checking system and method
CN107610764A (en) * 2017-07-26 2018-01-19 佛山科学技术学院 A kind of internet medical identity authorization system and method online
CN107895263A (en) * 2017-12-15 2018-04-10 四川南格尔生物科技有限公司 A kind of intelligence offers slurry process management system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895605A (en) * 2010-06-11 2010-11-24 中兴通讯股份有限公司 Method and device for communication based on pseudo-contact information
CN103067918A (en) * 2012-12-25 2013-04-24 华为技术有限公司 Method, device and system of privacy data anonymization in communication network
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal
CN104599048A (en) * 2014-12-31 2015-05-06 贵州精英天成科技股份有限公司 Plasma donor identity recognition and online checking control method for plasma collection station
CN105681043A (en) * 2015-12-30 2016-06-15 深圳市鼎芯无限科技有限公司 User identity double verification method and device
WO2017147508A1 (en) * 2016-02-26 2017-08-31 Sri International Identification and isolation of antibodies from white blood cells
CN107113315A (en) * 2016-04-15 2017-08-29 深圳前海达闼云端智能科技有限公司 Identity authentication method, terminal and server
CN107145799A (en) * 2017-05-04 2017-09-08 山东浪潮云服务信息科技有限公司 A kind of data desensitization method and device
CN107180237A (en) * 2017-07-20 2017-09-19 成都市佳颖医用制品有限公司 One kind adopts slurry checking system and method
CN107610764A (en) * 2017-07-26 2018-01-19 佛山科学技术学院 A kind of internet medical identity authorization system and method online
CN107895263A (en) * 2017-12-15 2018-04-10 四川南格尔生物科技有限公司 A kind of intelligence offers slurry process management system

Similar Documents

Publication Publication Date Title
CN107395343B (en) Certificate management method and system
CN104468464B (en) verification method, device and system
CN109472166A (en) A kind of electronic signature method, device, equipment and medium
CN104468463B (en) Verification method, device and system
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN109076331A (en) The control method of electronic equipment and electronic equipment
CN106293751A (en) A kind of method showing information on the terminal device and terminal unit
CN104700010A (en) Personal information protection method and protection device
WO2021115113A1 (en) Data processing method and device, and storage medium
CN110245144A (en) Protocol data management method, device, storage medium and system
WO2021147442A1 (en) Access control method and apparatus, terminal device, and storage medium
CN104917796B (en) Credit accounts creating device, system and method
CN107437009A (en) Authority control method and related product
CN104376273A (en) Data access control method and device
WO2020024929A1 (en) Method for upgrading service application range of electronic identity card, and terminal device
WO2017113119A1 (en) Method and device for associating application with biological characteristic, and mobile terminal
CN109257336A (en) It is a kind of based on the encrypted message processing method of block chain, terminal device
CN105516258A (en) Information interaction system, method and device
CN104967593A (en) Identity verification method, apparatus and system
CN109102297A (en) A kind of voidable method of payment and device
CN107784089A (en) A kind of storage method of multi-medium data, processing method and mobile terminal
CN108369618A (en) A kind of fingerprint identification method and terminal device
CN108234124A (en) Auth method, device and system
CN107145794A (en) A kind of data processing method and device and mobile terminal
CN107786569A (en) A kind of identifying code sending method, method of reseptance and relevant device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181130