CN109271766B - Identity verification method and system based on program interaction - Google Patents

Identity verification method and system based on program interaction Download PDF

Info

Publication number
CN109271766B
CN109271766B CN201811198919.0A CN201811198919A CN109271766B CN 109271766 B CN109271766 B CN 109271766B CN 201811198919 A CN201811198919 A CN 201811198919A CN 109271766 B CN109271766 B CN 109271766B
Authority
CN
China
Prior art keywords
information
program
identity information
user
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811198919.0A
Other languages
Chinese (zh)
Other versions
CN109271766A (en
Inventor
马俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yisheng Beijing Technology Co ltd
Original Assignee
Yisheng Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yisheng Beijing Technology Co ltd filed Critical Yisheng Beijing Technology Co ltd
Priority to CN201811198919.0A priority Critical patent/CN109271766B/en
Publication of CN109271766A publication Critical patent/CN109271766A/en
Application granted granted Critical
Publication of CN109271766B publication Critical patent/CN109271766B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The invention relates to an identity authentication method based on program interaction, which comprises the following steps: providing a program of an account, wherein a user can input identity information in the program of a login account, and the program has the function of an address book; acquiring resources, binding the resources with the program of the login account, and establishing a corresponding relation with the specified user identity information in the program address list; the method and the system can effectively improve the efficiency and experience of inputting the identity information in different resources by a user, can uniformly concentrate the identity information stored in the different resources by the user, and effectively reduce the leakage point of the identity information, thereby protecting the identity information of the user to a certain extent and reducing the risk of leakage of the identity information of the user.

Description

Identity verification method and system based on program interaction
Technical Field
The invention relates to the technical field of Internet of things and/or Internet of vehicles, in particular to an identity authentication method and system based on program interaction.
Background
With the rapid development of information technology and network technology, more and more devices and/or apparatuses and/or articles of the internet of things and/or the internet of vehicles correspond to the devices and/or apparatuses and/or articles by adopting software, and identity information is uploaded to the corresponding devices and/or apparatuses and/or articles in a networking mode, so that the entry of the identity information is not limited to the entry beside the devices and/or apparatuses and/or articles, and the entry of the identity information is not influenced by time and regions.
However, the prior art still has the following defects:
firstly, the method comprises the following steps: because the equipment and/or devices and/or articles of the internet of things and/or the internet of vehicles relate to different manufacturers, users need to download different software and transmit identity information in a software networking mode, one piece of equipment and/or device and/or article corresponds to one piece of software, and one piece of software corresponds to one-time uploading of user identity information, so that the efficiency of the entry mode of the identity information is low, and the user experience is poor;
secondly, the method comprises the following steps: because different manufacturers are designed for equipment and/or devices and/or articles of the internet of things and/or the internet of vehicles, users need to download different software and transmit identity information in a software networking mode, the transmitted identity information is specific identity information data, one equipment and/or device and/or article corresponds to one software, and one software corresponds to one-time uploading of user identity information;
thirdly, the method comprises the following steps: because the equipment and/or devices and/or articles of the internet of things and/or the internet of vehicles relate to different manufacturers, users need to download different software, identity information is transmitted in a software networking mode, other users are invited to enter the identity information, one equipment and/or device and/or article corresponds to one software, one software corresponds to one-time uploading of the identity information of the users, and therefore the efficiency of the identity information entering mode of the invited users is low, and the user experience is poor.
Disclosure of Invention
In order to solve the above problems, the present invention provides an identity authentication method and system based on program interaction.
An embodiment of the present specification provides an identity authentication method based on program interaction, the method including:
providing a program of an account, wherein a user can input identity information in the program of a login account, and the program has the function of an address book;
acquiring resources, binding the resources with the program of the login account, and establishing a corresponding relation with the specified user identity information in the program address list;
and receiving the identity information, wherein the resource can receive the identity information and match the received identity information with the corresponding identity information in the resource.
An embodiment of the present specification provides an identity verification system based on program interaction, the system including:
providing a program device of an account, wherein a user can input identity information in a program of a login account, and the program has an address book function;
acquiring a resource device, wherein the resource is bound with the program of the login account, and a corresponding relation with the specified user identity information in the program address book can be established;
and the resource can receive the identity information and match the received identity information with the corresponding identity information in the resource.
The invention also proposes a computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when executed by a processor, implements the method of any one of the above.
The invention also proposes a device for identity verification based on program interaction, comprising a memory and a processor, a computer program being stored on said memory, characterized in that the computer program implements any of the methods described above when executed by the processor.
Drawings
The features and advantages of the present invention will be more clearly understood by reference to the accompanying drawings, which are illustrative and not to be construed as limiting the invention in any way, and in which:
fig. 1 is a flowchart illustrating steps of an identity authentication method based on program interaction in an embodiment of the present invention.
Detailed Description
The embodiments of the present invention will be described in further detail with reference to the accompanying drawings, it is to be understood that the specific embodiments described herein are merely illustrative of the related inventions and not restrictive, and that all other embodiments obtained by those skilled in the art based on the embodiments of the present invention belong to the scope of the present invention.
It should be noted that, in the case of conflict, the embodiments and features of the embodiments of the present invention may be combined with each other, and the present invention will be described in detail with reference to the accompanying drawings and embodiments.
Fig. 1 is a flowchart illustrating steps of an identity authentication method based on program interaction in an embodiment of the present invention.
As shown in fig. 1, the identity authentication method based on program interaction includes the following steps:
s1, providing an account program, and enabling a user to enter identity information in the account login program, wherein the account login program has an address book function;
the program can provide an account number, wherein the account number comprises a mobile phone number and/or a user-defined user name and/or system allocation, a user can input identity information in the account number login program, the identity information comprises one or more of biological information, graphic information, digital information, certificate information, account information, communication information and equipment information, the biological information comprises inherent physiological characteristics of a human body, and comprises a face, a fingerprint, a pupil, an iris, a palm print, a vein, a gene and behavior characteristics, and comprises handwriting, voice and gait; the graphic information comprises a one-dimensional code, a two-dimensional code, a multi-dimensional code and a unique graphic, and the digital information comprises a verification code, a digital code and a password; the certificate information comprises an identity card, a passport, a military officer certificate, a campus card and a student card; the account information comprises a network account and a bank account; the communication information comprises a mobile phone number, a network link and sound; the device information comprises information of mobile devices, communication devices and personal devices;
s2, acquiring resources, binding the resources with the program of the login account, and establishing a corresponding relation with the specified user identity information in the program address list;
the resources comprise equipment and/or devices and/or articles in the Internet of vehicles and/or the Internet of things, the resources can be bound with the program of the login account, the program acquires information corresponding to the resources after the binding, the information corresponding to the user operable resources interacts with a specified user in the address book, the interaction operation comprises user adding and/or deleting operation, after the interaction, the resources can establish and/or remove a corresponding relation with the specified user identity information in the program address book, wherein the corresponding relation can be a direct corresponding relation, namely a specific data form for directly storing the identity information in the resources, or an indirect corresponding relation, namely a mark corresponding to the specified user identity information in the resources is stored, the mark is indirectly corresponding through the mark as an intermediary, the corresponding identity information is inquired, and the mark comprises a program account and/or an interface of the identity information and/or an identity information and/or has a pair with the identity information Marking of the corresponding relation; it should be noted that, the correspondence between the resource and the identity information is preferably used in an indirect correspondence, and the present invention will be exemplified by an indirect correspondence, but a direct correspondence also belongs to a general variation of the present invention and also falls within the protection scope of the present invention;
s3, receiving identity information, wherein the resource can receive the identity information and match the received identity information with corresponding identity information in the resource;
receiving identity information, wherein the resource can receive the identity information and match the received identity information with corresponding identity information in the resource, the resource feeds back corresponding operation according to a matching result, and the identity information comprises one or more of biological information, graphic information, digital information, certificate information, account information, communication information and equipment information, wherein the biological information comprises inherent physiological characteristics of a human body, comprises a human face, a fingerprint, a pupil, an iris, a palm print, a vein, genes and also comprises behavior characteristics, comprises handwriting, sound and gait; the graphic information comprises a one-dimensional code, a two-dimensional code, a multi-dimensional code and a unique graphic, and the digital information comprises a verification code, a digital code and a password; the certificate information comprises an identity card, a passport, a military officer certificate, a campus card and a student card; the account information comprises a network account and a bank account; the communication information comprises a mobile phone number, a network link and sound; the device information includes information of mobile devices, communication devices and personal devices.
In order to better understand and apply the method and system for identity authentication based on program interaction provided by the present invention, the following detailed examples are made, and the scope of the present invention is not limited to the following examples.
A user can distribute an application program account according to a mobile phone number and/or a user-defined user name and/or a system, wherein the account has uniqueness, the program has an address book, and identity information can be input into the program; the programs with the address book include instant messaging programs such as QQ, WeChat, Facebook, Me information which is being developed by the applicant, and the like, e.g., E-commerce programs such as Taobao, Jingdong, and the like, and tool programs such as Paobao, and the like; taking an account number as a mobile phone number and a program as a WeChat for example, a user can log in the WeChat which is exclusive to the user by using the mobile phone number and a password, and can record identity information of the user into the WeChat, wherein the identity information comprises one or more of biological information, graphic information, digital information, certificate information, account information, communication information and equipment information, the biological information comprises inherent physiological characteristics of a human body, including a face, a fingerprint, a pupil, an iris, a palm print, a vein, genes and also comprises behavior characteristics, including handwriting, voice and gait; the graphic information comprises a one-dimensional code, a two-dimensional code, a multi-dimensional code and a unique graphic, and the digital information comprises a verification code, a digital code and a password; the certificate information comprises an identity card, a passport, a military officer certificate, a campus card and a student card; the account information comprises a network account and a bank account; the communication information comprises a mobile phone number, a network link and sound; the device information comprises information of mobile devices, communication devices and personal devices; it should be particularly noted that the identity information is stored in a program corresponding to the account, that is, the account may be regarded as a set to store different kinds of identity information, or a set of identity information may be planned in a program for logging in the account, and the different kinds of identity information are specially stored, for example, after the program is authenticated by real name, the identity information is entered into the set of identity information as the set of identity information, the two ways are used as a mark in an account manner, or the identity number is used as a mark in an identity relationship with the user, and the identity information corresponding to the user may be found by means of the mark, that is, any expression form of the correspondence between the mark and the identity information belongs to the general variation of the present invention.
Acquiring resources, wherein a user can bind the resources with a program of a login account, and the binding form comprises a form of program code scanning and/or sensing the resources, but is not limited to the form; the resources include devices and/or equipment and/or items in the internet of vehicles and/or the internet of things.
Taking an automobile in an automobile networking as a resource for example, after a user purchases the automobile, the user catches fire on the automobile, two-dimensional code prompts in an automobile screen are obtained, the automobile is bound in a WeChat code scanning mode, the WeChat obtains details information of the automobile, the user can operate the automobile information through the automobile details in the WeChat, the automobile information synchronizes operation instructions to the automobile in a networking mode to control the automobile, wherein the operation comprises calling the user in a WeChat address book, the specified user can be placed in the automobile details, the automobile synchronously obtains marks corresponding to the specified user, the user can be deleted in the automobile details in the WeChat, and the marks corresponding to the user are synchronously removed by the automobile; it should be noted that once the resource is bound to the program, the resource in this example is a device and/or equipment and/or an article in the car networking, represented by a car, and unless the program unbinds the resource, the resource cannot be bound to the program of other account, so as to ensure that the resource is single in attribution.
When the vehicle is in a flameout state, the automobile still provides power for the identity verification device, when a user needs to use the vehicle, the vehicle can be pressed at a door knob, the vehicle receives fingerprint information of the user, a mark of the corresponding user is inquired through networking, the fingerprint information is further matched with the identity information corresponding to the mark, the door is opened after the matching is successful, and meanwhile, the camera device is started to further confirm the identity of the user; when a user sits in a driving seat and provides face images, the vehicle receives face information, binds marks of the user through networking query, further matches the face information with identity information corresponding to the marks, and starts the vehicle after matching is successful.
Taking an intelligent access control in the Internet of things as a resource for example, a user can bind the access control in a code scanning mode through WeChat, the WeChat acquires the detail information of the access control, the user can operate the access control information through the access control details in the WeChat, the access control information synchronizes an operation instruction to the access control in a networking mode to control the access control, wherein the operation comprises calling the user in a WeChat address book, the specified user can be placed in the access control details, the access control synchronously acquires a mark corresponding to the specified user, the user can be deleted in the access control details in the WeChat, and the access control synchronously removes the mark of the corresponding user; it should be noted that once the resource is bound to the program, the resource in this example is a device and/or equipment and/or an article in the internet of things, represented by an access control, and unless the program unbinds the resource, the resource cannot be bound to the program of another account, so as to ensure that the resource is single in ownership.
When a user needs to use the access control, a face graph can be provided at the access control, the access control receives face information, a mark of the user is bound through networking inquiry, the face information is further matched with identity information corresponding to the mark, and the access control is opened after the face information is successfully matched with the identity information; it should be noted that, any information in the identity information, no matter how the classification is, only one matching is successful, and the effect is equivalent; it should be noted that the present example does not limit the concept and scope of the present invention, and that the actual changes may be selected according to actual situations without conflict, and that various modifications and improvements made to the technical solutions of the present invention by those skilled in the art without departing from the design concept of the present invention shall fall within the protection scope of the present invention.
It should be particularly noted that, for example, in the above-mentioned devices and/or apparatuses and/or articles in the car internet and/or the internet of things, the user and the designated user in the address book may enter different identity information in the network account corresponding to the program.
The technical bias overcome by the invention is that the existing resources comprise equipment and/or devices and/or articles in the Internet of vehicles and/or the Internet of things, the specific identity information stored in the resources is matched with the identity information uploaded by the user in the identity verification mode, namely the resources are required to acquire the specific identity information of the user in the process of realizing the identity verification, and the identity verification mode is only limited to a local area network and does not really grasp the advantages of the Internet of everything; the invention adopts the resource to obtain the mark, the mark corresponds to the identity information, and the interconnection characteristic of the internet is fully utilized, so the qualitative change is that the user does not need to input specific identity information in a plurality of devices and/or articles, only needs to input the identity information in one program, and one cloud server stores the identity information of the user, and can transmit the identity information to any resource, thereby greatly improving the efficiency of inputting the identity information of the user and the user experience, preferably, the transmission process is transmitted in the mark mode, and the mark corresponds to the specific identity information, thereby avoiding the storage of the identity information data in a wide range, effectively reducing the leakage point of the identity information data, reducing the risk of the leakage of the identity information, and simultaneously, the identity information of the user only stores in one cloud server, therefore, even if the identity information of the user is stolen, the user can trace the source and find the leaked links and personnel, and the phenomenon that the existing identity information is stored all the time and cannot be traced after being leaked is avoided.
The core invention point of the invention is different design ideas of dispersion and unification, and the identity information is input by the user in different resources, which is a design idea of one-chip, the starting point is that the resource inputs the identity information in the resource, so that the user needs to input the identity information for many times aiming at different resources needing identity authentication, and the design idea of the invention is a global design idea, the starting point is that the identity information of the user corresponds to the resource, so that even if different resources are used, the user only needs to input the identity information once, and simultaneously, the preferred scheme does not need to store the specific data of the identity information, the mark is used for corresponding to the identity information, so that the resource does not share the ownership of the identity information, and the resource only shares the use right which has the corresponding relation with the user to use the resource.
The beneficial effects of the invention are that: the method can effectively improve the efficiency of identity input, immediately store the marks of the resource binding program and the identity data with the corresponding relation in the resource, and avoid the situation that a user purchases a plurality of devices and needs to correspondingly input a plurality of identity information in the plurality of devices; and: identity information is concentrated at one position, code scanning and/or resource sensing are carried out, identity information can be verified on a designated user after the designated user is simply added into resource information in a program, and the input experience of user identity verification can be effectively improved; thirdly, the method comprises the following steps: the identity information can be compatible in any environment, any scene and any resource, and because the identity information corresponding to the program comprises various forms such as biological information, graphic information, digital information, certificate information, account information, communication information, equipment information and the like, and the biological information, the graphic information, the digital information, the certificate information, the account information, the communication information and the equipment information can be in different specific forms, the identity information can be compatible with any resource and identity verification modes of different resources; fourthly, the method comprises the following steps: according to the preferred scheme, identity information scattered in different types of different equipment is concentrated at one position, the risk of identity data leakage can be effectively reduced, even if the identity information is leaked, the casual sheep can be tracked and mended at the source, the identity information cannot be stored in a plurality of resources, and the identity information cannot be tracked without a target after being leaked.

Claims (10)

1. An identity authentication method based on program interaction comprises the following steps:
providing a program of an account, wherein a user can input identity information in the program of a login account, and the program has the function of an address book;
acquiring resources, wherein the resources comprise equipment and/or devices and/or articles in the Internet of vehicles and/or the Internet of things, and can be bound with the program of the login account, the program acquires information corresponding to the resources after the binding, the information corresponding to the user operable resources interacts with a specified user in an address book, and the resources can establish and/or release a corresponding relation with the specified user identity information in the program address book after the interaction;
and receiving the identity information, wherein the resource can receive the identity information and match the received identity information with the corresponding identity information in the resource.
2. The method of claim 1, further comprising:
and providing a program of an account number, wherein a user can input identity information in the program of the login account number, the account number comprises a mobile phone number and/or a user-defined user name and/or system allocation, and the identity information comprises one or more of biological information, graphic information, digital information, certificate information, account information, communication information and equipment information.
3. The method of claim 1, further comprising:
and acquiring resources, binding the resources with the program of the login account, and establishing a corresponding relation with the specified user identity information in the program address list, wherein the resources comprise equipment and/or devices and/or articles in the Internet of vehicles and/or the Internet of things.
4. The method of claim 1, further comprising:
and receiving identity information, wherein the resource can receive the identity information and match the received identity information with corresponding identity information in the resource, and the resource feeds back corresponding operation according to a matching result, wherein the identity information comprises one or more of biological information, graphic information, digital information, certificate information, account information, communication information and equipment information.
5. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method as claimed in claim 1.
6. An apparatus for identity verification based on program interaction, comprising a memory and a processor, on which memory a computer program is stored, characterized in that the computer program realizes the method as claimed in claim 1 when executed by the processor.
7. An identity verification system based on program interaction, comprising:
providing a program device of an account, wherein a user can input identity information in a program of a login account, and the program has an address book function;
acquiring a resource device, wherein the resource comprises equipment and/or devices and/or articles in the Internet of vehicles and/or the Internet of things, and can be bound with the program of the login account, the program acquires information corresponding to the resource after the binding, the information corresponding to the user operable resource interacts with a specified user in an address book, and the resource can establish and/or release a corresponding relation with the specified user identity information in the program address book after the interaction;
and the resource can receive the identity information and match the received identity information with the corresponding identity information in the resource.
8. The system of claim 7, further comprising:
and providing a program device of an account number, wherein a user can input identity information in a program of a login account number, the account number comprises a mobile phone number and/or a user-defined user name and/or system allocation, and the identity information comprises one or more of biological information, graphic information, digital information, certificate information, account information, communication information and equipment information.
9. The system of claim 7, further comprising:
and acquiring a resource device, wherein the resource is bound with the program of the login account, and a corresponding relation with the specified user identity information in the program address list can be established, wherein the resource comprises equipment and/or devices and/or articles in the Internet of things and/or the Internet of things.
10. The system of claim 7, further comprising:
and the resource can receive the identity information and match the received identity information with the corresponding identity information in the resource, and the resource feeds back corresponding operation according to a matching result, wherein the identity information comprises one or more of biological information, graphic information, digital information, certificate information, account information, communication information and equipment information.
CN201811198919.0A 2018-10-15 2018-10-15 Identity verification method and system based on program interaction Active CN109271766B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811198919.0A CN109271766B (en) 2018-10-15 2018-10-15 Identity verification method and system based on program interaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811198919.0A CN109271766B (en) 2018-10-15 2018-10-15 Identity verification method and system based on program interaction

Publications (2)

Publication Number Publication Date
CN109271766A CN109271766A (en) 2019-01-25
CN109271766B true CN109271766B (en) 2021-06-25

Family

ID=65196237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811198919.0A Active CN109271766B (en) 2018-10-15 2018-10-15 Identity verification method and system based on program interaction

Country Status (1)

Country Link
CN (1) CN109271766B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110443331A (en) * 2019-08-05 2019-11-12 斑马网络技术有限公司 The binding method and device of vehicle

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771677A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Method for providing resource for access user, server and system thereof
CN102932414A (en) * 2012-09-26 2013-02-13 中国科学院计算技术研究所 Method and system for combining address book and social network
US8683550B2 (en) * 2006-02-01 2014-03-25 Blackberry Limited System and method for validating a user of an account using a wireless device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101761882B1 (en) * 2013-05-16 2017-07-26 한국전자통신연구원 System for providing personal information using cloud id card and method thereof
CN204926094U (en) * 2015-08-26 2015-12-30 广州市鑫澳康科技有限公司 System based on authentication is carried out to biological characteristics information
CN106600773A (en) * 2016-12-06 2017-04-26 哈尔滨理工大学 Multifunctional distributed intelligent access control system using IC card or dynamic password
CN108205834A (en) * 2017-12-15 2018-06-26 深圳市商汤科技有限公司 Access control management method and access control system
CN108583505A (en) * 2018-05-09 2018-09-28 西安艾润物联网技术服务有限责任公司 Shared unlocking automobiles method, system and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8683550B2 (en) * 2006-02-01 2014-03-25 Blackberry Limited System and method for validating a user of an account using a wireless device
CN101771677A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Method for providing resource for access user, server and system thereof
CN102932414A (en) * 2012-09-26 2013-02-13 中国科学院计算技术研究所 Method and system for combining address book and social network

Also Published As

Publication number Publication date
CN109271766A (en) 2019-01-25

Similar Documents

Publication Publication Date Title
US11704393B2 (en) Self-owned authentication and identity framework
CN110287682A (en) A kind of login method, apparatus and system
US20210166241A1 (en) Methods, apparatuses, storage mediums and terminal devices for authentication
EP3474211A1 (en) Offline payment method and device
JP6907679B2 (en) Cryptocurrency-based event participation verification
EP4354311A2 (en) Blockchain-based identity and transaction platform
US11611443B2 (en) Network node encryption method and apparatus
CN105100108B (en) A kind of login authentication method based on recognition of face, apparatus and system
CN109241726B (en) User authority control method and device
CN105141427B (en) A kind of login authentication method, apparatus and system based on Application on Voiceprint Recognition
US20200213302A1 (en) Providing verified claims of user identity
KR102067808B1 (en) System and method for communicating credentials
CN108804932A (en) Picture storage method, mobile terminal and storage medium
CN105337739B (en) Safe login method, device, server and terminal
EP3206329A1 (en) Security check method, device, terminal and server
CN114268462B (en) Asset information changing method, server, client, and storage medium
CN104052762A (en) Data sharing method, device and system
CN104901937A (en) Data processing method and system thereof, terminal, server
US20190303944A1 (en) Biometric index linking and processing
CN109271766B (en) Identity verification method and system based on program interaction
CN113779534B (en) Personal information providing method and service platform based on digital identity
CN106888448B (en) Application downloading method, secure element and terminal
CN114297685A (en) Product key burning method, system, device, terminal equipment and storage medium
CN105721515B (en) The method of cloud agent equipment, cloud disk and archives transfer
CN105577607A (en) User identity authentication method and user identity authentication device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant