CN109271766A - A kind of auth method and system based on program interaction - Google Patents

A kind of auth method and system based on program interaction Download PDF

Info

Publication number
CN109271766A
CN109271766A CN201811198919.0A CN201811198919A CN109271766A CN 109271766 A CN109271766 A CN 109271766A CN 201811198919 A CN201811198919 A CN 201811198919A CN 109271766 A CN109271766 A CN 109271766A
Authority
CN
China
Prior art keywords
information
identity information
resource
program
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811198919.0A
Other languages
Chinese (zh)
Other versions
CN109271766B (en
Inventor
马俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yisheng (beijing) Technology Co Ltd
Original Assignee
Yisheng (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yisheng (beijing) Technology Co Ltd filed Critical Yisheng (beijing) Technology Co Ltd
Priority to CN201811198919.0A priority Critical patent/CN109271766B/en
Publication of CN109271766A publication Critical patent/CN109271766A/en
Application granted granted Critical
Publication of CN109271766B publication Critical patent/CN109271766B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to a kind of auth methods based on program interaction, comprising: the program of account is provided, user can in the program of login account typing identity information, wherein described program has address book function;The described program of acquisition resource, the resource and login account is bound, and the corresponding relationship with subscriber identity information specified in described program address list can be established;Receive identity information; the resource can receive identity information and match received identity information with identity information corresponding in resource; the present invention can effectively improve the efficiency and experience of user's typing identity information in different resource; user can be stored in the identity information Unified Set in different resource simultaneously; effectively reduce the leak point of identity information; to be protected to a certain extent to the identity information of user; the risk of subscriber identity information leakage is reduced, the present invention also proposes a kind of authentication system based on program interaction.

Description

A kind of auth method and system based on program interaction
Technical field
The present invention relates to Internet of Things and/or vehicle networking technical fields more particularly to a kind of identity based on program interaction to test Demonstrate,prove method and system.
Background technique
With the fast development of information technology and network technology, the equipment of more and more Internet of Things and/or car networking and/ Or device and/or article, carried out using software with equipment and/or device and/or article it is corresponding, in a manner of networking in software Uploading identity information to corresponding equipment and/or device and/or article, this mode can make the typing of identity information that need not limit System carries out typing by equipment and/or device and/or article, and the typing of identity information is not influenced by time and region.
But there are still following deficiencies for the prior art:
First: due to the equipment and/or device and/or article of Internet of Things and/or car networking, being related to different manufacturers, therefore use Family needs to download different software, transmits identity information, an equipment and/or device and/or article in a manner of software networking A kind of corresponding software, a kind of upload of the corresponding subscriber identity information of software, it can be seen that the typing side of this identity information Formula inefficiency, user experience be not good enough;
Second: due to the equipment and/or device and/or article of Internet of Things and/or car networking, designing different manufacturers, therefore use Family needs to download different software, and the identity information for being transmitted identity information in a manner of software networking, and being transmitted, is specific body Part information data, an equipment and/or device and/or article correspond to a kind of software, a kind of corresponding user identity letter of software The upload of breath, it can be seen that the mode of this transmission identity information increases the exposed point of identity information data, greatly increases A possibility that having added identity information leakage;
Third: due to the equipment and/or device and/or article of Internet of Things and/or car networking, it is related to different manufacturers, therefore uses Family needs to download different software, transmits identity information in a manner of software networking, other users is invited to carry out identity information Typing, an equipment and/or device and/or article correspond to a kind of software, a kind of corresponding subscriber identity information of software it is upper It passes, it can be seen that the identity information typing mode inefficiency of invited user, user experience is not good enough.
Summary of the invention
To solve the above problems, the present invention proposes a kind of auth method and system based on program interaction.
The embodiment of this specification provides a kind of auth method based on program interaction, which comprises
There is provided account program, user can in the program of login account typing identity information, wherein described program has communication Recording function;
The described program of acquisition resource, the resource and login account is bound, and can be established and described program address list middle finger Determine the corresponding relationship of subscriber identity information;
Identity information is received, the resource can receive identity information and believe received identity information with identity corresponding in resource Breath is matched.
The embodiment of this specification provides a kind of authentication system based on program interaction, the system comprises:
There is provided account timer, user can in the program of login account typing identity information, wherein described program has Address book function;
The described program of acquisition resource devices, the resource and login account is bound, and can be established and described program address list In specify subscriber identity information corresponding relationship;
Identity information device is received, the resource can receive identity information and by received identity information and body corresponding in resource Part information is matched.
The invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, which is characterized in that The computer program realizes method described in any of the above embodiments when being executed by processor.
The invention also provides a kind of device of authentication based on program interaction, including memory and processor, Computer program is stored on the memory, which is characterized in that the computer program realizes above-mentioned when being executed by processor Method described in one.
Detailed description of the invention
The features and advantages of the present invention will be more clearly understood by referring to the accompanying drawings, and attached drawing is schematically without that should manage Solution is carries out any restrictions to the present invention, in the accompanying drawings:
Fig. 1 shows the step flow chart of auth method of one of the embodiment of the present invention based on program interaction.
Specific embodiment
The embodiment of the present invention is explained in further detail below in conjunction with attached drawing, it is to be understood that this place The specific embodiment of description is only used for explaining related invention, rather than the restriction to the invention, based on the embodiments of the present invention, this Field those of ordinary skill every other embodiment obtained, shall fall within the protection scope of the present invention, further need exist for illustrating , part relevant to invention is illustrated only for ease of description, in attached drawing.
It should be noted that in the absence of conflict, the feature in embodiment and embodiment in the present invention can phase Mutually combination, the present invention will be described in detail below with reference to the accompanying drawings and embodiments.
Fig. 1 shows the step flow chart of auth method of one of the embodiment of the present invention based on program interaction.
As shown in Figure 1, a kind of auth method based on program interaction includes the following steps:
S1, provides the program of account, user can in the program of login account typing identity information, wherein described program has logical Interrogate recording function;
Described program, it is possible to provide account, wherein the account includes that cell-phone number and/or customized user name and/or system are distributed, User can typing identity information, the identity information include biological information, graphical information, number letter in the program of login account One of breath, certificate information, account information, communication information, facility information are a variety of, wherein the biological information, includes people The intrinsic physiological characteristic of body includes face, fingerprint, pupil, iris, palmmprint, vein, and it includes pen that gene, which also includes behavioural characteristic, Mark, sound, gait;The graphical information, comprising one-dimension code, two dimensional code, multidimensional code and the figure for having uniqueness, the number Information includes identifying code, digital code, password;The certificate information includes identity card, passport, officer's identity card, campus card, student Card;The account information includes network account, bank account;The communication information includes cell-phone number, network linking, sound; The facility information, the information comprising mobile device, communication equipment, personal device;
S2 obtains resource, and the described program of the resource and login account is bound, can establish in described program address list The corresponding relationship of designated user's identity information;
The resource can be with the institute of login account comprising the equipment and/or device and/or article in car networking and/or Internet of Things It states program to be bound, described program obtains the corresponding information of resource after binding, and user can the corresponding information of operating resource It is interacted with the designated user in address list, interactive operation includes the operation for adding and/or deleting user, the money after interaction The corresponding relationship with subscriber identity information specified in described program address list can be established and/or be released in source, wherein the corresponding pass System can be direct corresponding relationship, i.e., directly stores the specific data mode of identity information in resource, be also possible to indirect correspondence Relationship stores the corresponding mark of designated user's identity information, is corresponded to indirectly by mark as intermediary, inquired that is, in resource Corresponding identity information, the mark includes the interface of program account and/or identity information and/or there are corresponding with identity information The label of relationship;It should be strongly noted that the existing corresponding relationship of resource and identity information, preferably with indirect corresponding pass System carries out using the present invention will carry out example, but direct corresponding relationship with indirect corresponding relationship, also belong to general change of the invention Shape, also within protection scope of the present invention;
S3, receives identity information, and the resource can receive identity information and by received identity information and body corresponding in resource Part information is matched;
Identity information is received, the resource can receive identity information and believe received identity information with identity corresponding in resource Breath is matched, and the resource feeds back corresponding operating according to matching result, and the identity information includes biological information, figure letter One of breath, digital information, certificate information, account information, communication information, facility information are a variety of, wherein the biology letter Breath includes face, fingerprint, pupil, iris, palmmprint, vein comprising the intrinsic physiological characteristic of human body, and gene is also special comprising behavior Sign includes person's handwriting, sound, gait;The graphical information includes one-dimension code, two dimensional code, multidimensional code and the figure for having uniqueness Shape, the digital information include identifying code, digital code, password;The certificate information includes identity card, passport, officer's identity card, school Garden card, student's identity card;The account information includes network account, bank account;The communication information includes cell-phone number, lattice chain It connects, sound;The facility information, the information comprising mobile device, communication equipment, personal device.
In order to better understand and apply a kind of auth method and system based on program interaction proposed by the present invention, Example, the scope of the present invention are not limited to following example in detailed below for progress.
User can distribute requisition procedure account according to cell-phone number and/or customized user name and/or system, wherein the account Number have uniqueness, described program has address list, can in described program typing identity information;The program bag for having address list Program containing instant messaging, such as the Me letter that QQ, wechat, Facebook and applicant are researching and developing, also include electric business journey Sequence, such as Taobao, Jingdone district, while also including tool class method, such as Alipay;Now using account as cell-phone number, program is Wechat is illustrated, and cell-phone number and password can be used in user, logs in oneself exclusive wechat, and can record the identity information of oneself Enter in wechat, the identity information includes biological information, graphical information, digital information, certificate information, account information, communication letter One of breath, facility information are a variety of, wherein the biological information comprising face, refers to comprising the intrinsic physiological characteristic of human body Line, pupil, iris, palmmprint, vein, gene also include behavioural characteristic, include person's handwriting, sound, gait;The graphical information, packet Containing one-dimension code, two dimensional code, multidimensional code and the figure for having uniqueness, the digital information includes identifying code, digital code, password; The certificate information includes identity card, passport, officer's identity card, campus card, student's identity card;The account information includes network account, Bank account;The communication information includes cell-phone number, network linking, sound;The facility information includes mobile device, communication Equipment, the information of personal device;It should be strongly noted that the identity information is deposited in program corresponding with account, i.e., Account can regard a set as, store different types of identity information, and one can also be cooked up in the program of login account The set of identity information specially stores above-mentioned different types of identity information, after program real-name authentication, using identification card number as The collection of identity information is together in wherein typing identity information, above two mode, or as mark in a manner of account, or with identity Card number is used as mark, and essence is mark, and in user, there are corresponding relationships, and the corresponding identity letter of user can be found by mark Breath, i.e., there are any forms of expression of corresponding relationship with identity information for mark, belong to general deformation of the invention.
Resource is obtained, user can bind the program of the resource and login account, and the form of binding includes program Barcode scanning and/or the form for incuding resource, but it is not limited to above-mentioned form;The resource includes in car networking and/or Internet of Things Equipment and/or device and/or article.
It is illustrated using the automobile in car networking as resource, after user buys vehicle, after vehicle fire, obtains automobile Automobile, is bound in wechat by the two dimensional code prompt in screen by way of wechat barcode scanning, and wechat obtains the details letter of automobile Breath, user can operate information of vehicles by automobile details described in wechat, and operational order is passed through networking by information of vehicles Mode be synchronized to the automobile, to control the automobile, wherein operation comprising call wechat address list in user, can will Designated user is placed in automobile details, and vehicle synchronous obtains the corresponding mark of designated user, can also be in wechat described in User is deleted in automobile details, vehicle synchronous releases the mark of corresponding user;Once it should be strongly noted that resource It is bound with program, the resource in this example is that device in car networking and/or equipment and/or article are removed using automobile as representative Non- program unbinds resource, and otherwise resource can not be bound in the program with other accounts, it is ensured that the ownership of resource is single.
When vehicle stall state, automobile still can provide electric power to the device of authentication, when user needs using vehicle, It can be pressed at door knob, the vehicle receives the finger print information of user, by the mark of networking inquiry user bound, and Further finger print information identity information corresponding with mark is matched, car door is opened after successful match, is started at the same time Photographic device further confirms that the identity of user;After user is sitting in operator seat and provides face figure, the vehicle Face information will be received, by the mark of networking inquiry user bound, and further by face information body corresponding with mark Part information is matched, and starts vehicle after successful match.
It is illustrated using the intelligent entrance guard in Internet of Things as resource, user can bind door by way of wechat barcode scanning Prohibit, wechat obtains the detail information of gate inhibition, and user can operate access information by gate inhibition's details described in wechat, gate inhibition Operational order is synchronized to the gate inhibition by information by way of networking, to access control, wherein operation is comprising calling wechat Designated user can be placed in gate inhibition's details by the user in address list, and gate inhibition is synchronous to obtain the corresponding mark of designated user, User can be deleted in gate inhibition's details in wechat, the synchronous mark for releasing corresponding user of gate inhibition;Need spy Do not mentionlet alone it is bright, once resource is bound with program, the resource in this example be device in Internet of Things and/or equipment and/or Article, using gate inhibition as representative, unless program unbinds resource, otherwise resource can not be bound in the program with other accounts, really The ownership for protecting resource is single.
When user needs using gate inhibition, face figure can be provided at gate inhibition, the gate inhibition will receive face information, By the mark of networking inquiry user bound, and further face information identity information corresponding with mark is matched, With gate inhibition is opened after success, certain above-mentioned face is only a part of biological information in identity information verifying, can also be passed through The other information of identity information is verified, such as input password, graphical information or can allow gate inhibition's sensing apparatus information, Certificate information is one or more, and by taking facility information as an example, gate inhibition incudes the facility information, and identity information is passed through networking inquiry It is matched to the mark of gate inhibition's user bound, and by facility information identity information corresponding with mark, after successful match Open gate inhibition;It should be noted that any information in identity information successful match one, is imitated regardless of classifying Fruit is all of equal value;The spirit and scope of the present invention are defined it should be strongly noted that this example is non-, what is do not conflicted Under the premise of can be according to practical situation actual selection actual change, and under the premise of not departing from design philosophy of the present invention, this field The various changes and improvements that middle ordinary engineering and technical personnel makes technical solution of the present invention should belong to protection of the invention Range.
It should be strongly noted that the act of equipment and/or device and/or article in above-mentioned car networking and/or Internet of Things Example, designated user in the user and address list, all can in the corresponding network account of program the different identity information of typing.
The technology prejudice that the present invention overcomes is, existing resource, comprising in car networking and/or Internet of Things equipment and/or Device and/or article, the mode for verifying identity are all that the identity of specific identity information and user's upload is saved in the resource Information is matched, in order to realize that the process of authentication, resource must obtain the specific identity information of user, this identity The mode of verifying is only limitted to " local area network ", where the advantage for not understanding Internet of Things really;And it is of the invention, the resource of use obtains What is taken is mark, and it is identity information that mark is corresponding, the interconnection characteristic to make full use of internet, therefore its variation for generating matter It is, user is not necessarily in multiple equipment and/or device and/or the specific identity information of article typing, it is only necessary in a program Middle typing identity information stores the identity information of user in one Cloud Server, can carry out identity information to any cost Transmitting, therefore can greatly improve the efficiency and user experience of subscriber identity information typing resource, it is preferred that it is this to transmit Journey is transmitted in a manner of mark, and mark corresponds to specific identity information, therefore is avoided that identity information data everywhere Change storage, the leak point of identity information data can be effectively reduced, reduce the risk of identity information leakage, while the identity of user Information exists only in a Cloud Server, so even the identity information of user is stolen, can also trace to source, investigate thoroughly leakage Link and personnel, the phenomenon that will not storing everywhere as existing identity information, have no way of tracing after leakage.
Core of the invention inventive point is dispersion and unified different designs thought, user's typing body in different resource Part information, is a kind of design philosophy of one-sidedness, starting point is resource, the typing identity information in resource, therefore is directed to The different resources for needing authentication, the multiple typing identity information of user's needs, and design philosophy of the invention, it is a kind of complete The design philosophy of office's property, starting point are the identity information of user, and resource is corresponded in identity information, so even being not Same resource, user only need identity information of typing, while preferred scheme, and resource is not necessarily to save the tool of identity information Volume data, but carried out with mark with identity information corresponding, therefore resource does not enjoy the ownership of identity information, and resource is only It enjoys and has plenty of that there are the rights to use of corresponding relationship using resource with user.
The beneficial effects of the present invention are one: the efficiency of identity input can be effectively improved, by resource binding procedure, body There are the marks of corresponding relationship to be stored in resource immediately for part data, avoids user and buys multiple equipment, needs to set multiple The standby middle corresponding multiple identity informations of typing;And: identity information is concentrated at one, barcode scanning and/or induction resource, in program The verifying that can carry out identity information after simply adding designated user in resource information to designated user, can effectively improve use The typing of family authentication is experienced;Three: can be compatible in any environment, any scene, any cost, since program is corresponding Identity information include biological information, graphical information, digital information, certificate information, account information, communication information, facility information Etc. diversified forms, and biological information, graphical information, digital information, certificate information, account information, communication information, facility information Can there are corresponding different concrete form, therefore the compatible any cost of this identity information, the authentication of different resource again Mode;Four: the identity information for being scattered in variety classes distinct device is concentrated at one, can be effectively reduced by preferred scheme The risk of identity data leakage, even if identity information is leaked, also having source that can be tracked can mend the fold after the sheep is lost, will not be because of body Part information stores in multiple resources, aimless after leakage and have no way of pursuing.

Claims (10)

1. a kind of auth method based on program interaction, comprising:
There is provided account program, user can in the program of login account typing identity information, wherein described program has communication Recording function;
The described program of acquisition resource, the resource and login account is bound, and can be established and described program address list middle finger Determine the corresponding relationship of subscriber identity information;
Identity information is received, the resource can receive identity information and believe received identity information with identity corresponding in resource Breath is matched.
2. according to the method described in claim 1, further include:
There is provided account program, user can in the program of login account typing identity information, wherein the account include mobile phone Number and/or customized user name and/or system distribution, the identity information include biological information, graphical information, digital information, One of certificate information, account information, communication information, facility information are a variety of.
3. according to the method described in claim 1, further include:
The described program of acquisition resource, the resource and login account is bound, and can be established and described program address list middle finger The corresponding relationship of subscriber identity information is determined, wherein the resource includes car networking and/or equipment and/or device in Internet of Things And/or article.
4. according to the method described in claim 1, further include:
Identity information is received, the resource can receive identity information and believe received identity information with identity corresponding in resource Breath is matched, and the resource feeds back corresponding operating according to matching result, wherein the identity information includes biological information, figure One of information, digital information, certificate information, account information, communication information, facility information are a variety of.
5. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program is located It manages when device executes and realizes method described in claim 1.
6. a kind of device of the authentication based on program interaction, including memory and processor, store on the memory There is computer program, which is characterized in that method described in claim 1 is realized when the computer program is executed by processor.
7. a kind of authentication system based on program interaction, comprising:
There is provided account timer, user can in the program of login account typing identity information, wherein described program has Address book function;
The described program of acquisition resource devices, the resource and login account is bound, and can be established and described program address list In specify subscriber identity information corresponding relationship;
Identity information device is received, the resource can receive identity information and by received identity information and body corresponding in resource Part information is matched.
8. system according to claim 7, further includes:
There is provided account timer, user can in the program of login account typing identity information, wherein the account includes Cell-phone number and/or the distribution of customized user name and/or system, the identity information include biological information, graphical information, number letter One of breath, certificate information, account information, communication information, facility information are a variety of.
9. system according to claim 7, further includes:
The described program of acquisition resource devices, the resource and login account is bound, and can be established and described program address list In specify subscriber identity information corresponding relationship, wherein the resource include car networking and/or equipment and/or dress in Internet of Things It sets and/or article.
10. system according to claim 7, further includes:
Identity information device is received, the resource can receive identity information and by received identity information and body corresponding in resource Part information is matched, and the resource feeds back corresponding operating according to matching result, wherein the identity information include biological information, One of graphical information, digital information, certificate information, account information, communication information, facility information are a variety of.
CN201811198919.0A 2018-10-15 2018-10-15 Identity verification method and system based on program interaction Active CN109271766B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811198919.0A CN109271766B (en) 2018-10-15 2018-10-15 Identity verification method and system based on program interaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811198919.0A CN109271766B (en) 2018-10-15 2018-10-15 Identity verification method and system based on program interaction

Publications (2)

Publication Number Publication Date
CN109271766A true CN109271766A (en) 2019-01-25
CN109271766B CN109271766B (en) 2021-06-25

Family

ID=65196237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811198919.0A Active CN109271766B (en) 2018-10-15 2018-10-15 Identity verification method and system based on program interaction

Country Status (1)

Country Link
CN (1) CN109271766B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110443331A (en) * 2019-08-05 2019-11-12 斑马网络技术有限公司 The binding method and device of vehicle

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771677A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Method for providing resource for access user, server and system thereof
CN102932414A (en) * 2012-09-26 2013-02-13 中国科学院计算技术研究所 Method and system for combining address book and social network
US8683550B2 (en) * 2006-02-01 2014-03-25 Blackberry Limited System and method for validating a user of an account using a wireless device
US20140344339A1 (en) * 2013-05-16 2014-11-20 Electronics And Telecommunications Research Institute System for providing personal information using cloud id card and method thereof
CN204926094U (en) * 2015-08-26 2015-12-30 广州市鑫澳康科技有限公司 System based on authentication is carried out to biological characteristics information
CN106600773A (en) * 2016-12-06 2017-04-26 哈尔滨理工大学 Multifunctional distributed intelligent access control system using IC card or dynamic password
CN108205834A (en) * 2017-12-15 2018-06-26 深圳市商汤科技有限公司 Access control management method and access control system
CN108583505A (en) * 2018-05-09 2018-09-28 西安艾润物联网技术服务有限责任公司 Shared unlocking automobiles method, system and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8683550B2 (en) * 2006-02-01 2014-03-25 Blackberry Limited System and method for validating a user of an account using a wireless device
CN101771677A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Method for providing resource for access user, server and system thereof
CN102932414A (en) * 2012-09-26 2013-02-13 中国科学院计算技术研究所 Method and system for combining address book and social network
US20140344339A1 (en) * 2013-05-16 2014-11-20 Electronics And Telecommunications Research Institute System for providing personal information using cloud id card and method thereof
CN204926094U (en) * 2015-08-26 2015-12-30 广州市鑫澳康科技有限公司 System based on authentication is carried out to biological characteristics information
CN106600773A (en) * 2016-12-06 2017-04-26 哈尔滨理工大学 Multifunctional distributed intelligent access control system using IC card or dynamic password
CN108205834A (en) * 2017-12-15 2018-06-26 深圳市商汤科技有限公司 Access control management method and access control system
CN108583505A (en) * 2018-05-09 2018-09-28 西安艾润物联网技术服务有限责任公司 Shared unlocking automobiles method, system and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110443331A (en) * 2019-08-05 2019-11-12 斑马网络技术有限公司 The binding method and device of vehicle

Also Published As

Publication number Publication date
CN109271766B (en) 2021-06-25

Similar Documents

Publication Publication Date Title
US11068575B2 (en) Authentication system
CN106296199A (en) Payment based on living things feature recognition and identity authorization system
CN103118031B (en) Method for logging in application account and electronic equipment
CN109688186A (en) Data interactive method, device, equipment and readable storage medium storing program for executing
CN103812649B (en) Method and system for safety access control of machine-card interface, and handset terminal
CN109151820A (en) One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 "
KR101876674B1 (en) Method of managing common account using block chain and system performing the same
CN105009123A (en) Method and apparatus for requesting and providing access to information associated with an image
CN107864144A (en) Obtain method and device, computer installation and the storage medium of dynamic password
CN108804932A (en) Picture storage method, mobile terminal and storage medium
CN110297923A (en) Information processing method, device, electronic equipment and computer readable storage medium
CN104184709A (en) Verification method, device, server, service data center and system
CN109741800A (en) The method for security protection of medical data intranet and extranet interaction based on block chain technology
CN106850693A (en) The method and real-name authentication system of a kind of real-name authentication
CN105337739B (en) Safe login method, device, server and terminal
CN107438054A (en) The method and system of menu information control are realized based on public platform
Lee et al. Data transfusion: Pairing wearable devices and its implication on security for Internet of Things
CN104935548A (en) Identity verification method, device and system based on intelligent tattooing equipment
CN106559403A (en) Data communications method, device and system in a kind of communication process
CN106815328A (en) A kind of document processing method, DPS and Notes servers
CN109271766A (en) A kind of auth method and system based on program interaction
CN110223128A (en) A kind of method and relevant apparatus of data processing
Cameron et al. Appendix d. proposal for a common identity framework: A user-centric identity metasystem
Fumy et al. Handbook of EID Security: Concepts, Practical Experiences, Technologies
CN107786566A (en) Method for protecting privacy, system, server and receiving terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant