CN109508993A - Personally identifiable information matching process based on anti-tamper Encryption Algorithm - Google Patents

Personally identifiable information matching process based on anti-tamper Encryption Algorithm Download PDF

Info

Publication number
CN109508993A
CN109508993A CN201811202090.7A CN201811202090A CN109508993A CN 109508993 A CN109508993 A CN 109508993A CN 201811202090 A CN201811202090 A CN 201811202090A CN 109508993 A CN109508993 A CN 109508993A
Authority
CN
China
Prior art keywords
information
module
personally identifiable
matching
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811202090.7A
Other languages
Chinese (zh)
Inventor
苏永锋
沈文临
曾鸣
曾一鸣
杨敬锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Hengqin Xianlian Finance Technology Co Ltd
Zhuhai Hengqin Xianliansheng Technology Development Co Ltd
Original Assignee
Zhuhai Hengqin Xianlian Finance Technology Co Ltd
Zhuhai Hengqin Xianliansheng Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Hengqin Xianlian Finance Technology Co Ltd, Zhuhai Hengqin Xianliansheng Technology Development Co Ltd filed Critical Zhuhai Hengqin Xianlian Finance Technology Co Ltd
Priority to CN201811202090.7A priority Critical patent/CN109508993A/en
Publication of CN109508993A publication Critical patent/CN109508993A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Abstract

The invention discloses a kind of personally identifiable information matching process based on anti-tamper Encryption Algorithm, the following steps are included: S1, establish personally identifiable information mating end and server-side: personally identifiable information mating end is by identity information acquisition module, information matches number detection module, MD5 algorithm checks module, DES message protection module, personally identifiable information mating end is used to acquire the various characteristic informations of personal identification, and the verifying of matching times is carried out to the characteristic information of acquisition, verification and message protection processing, the server-side is synchronous during personally identifiable information is verified to carry out information matches early warning and long-range monitoring;S2, identity information acquisition: the identity information acquisition module includes identity information extraction unit, identity information receiving unit, information discriminance analysis unit, information pairing unit and information passing unit.The present invention greatly improves the security level of entire information matches system, also enhances the safety of transaction, reduces loss, is worthy to be popularized.

Description

Personally identifiable information matching process based on anti-tamper Encryption Algorithm
Technical field
The present invention relates to message protection technical field more particularly to a kind of personal identification letters based on anti-tamper Encryption Algorithm Cease matching process.
Background technique
With the continuous promotion of the universal and demand of electronic equipment, on line fingerprint mode of doing business have become instantly one Trend.And the today being particularly important in information security importance, as one of the common method to ensure information security, identity Certification is increasingly becoming an indispensable technology in life, while sending out in staff attendance, the practical applications such as public security monitoring Increasing effect is waved.
Currently, much more businessmans joined the ranks for supporting e-payment, the one by one supermarket of " cash-free ", market It is born.However simultaneously disunity generally requires the electronic channel of multiple trade companies after user has selected the different commodity of multiple trade companies Go one by one complete pay, such user's operation step is excessive, the desire to purchase of user may be hit, thus be unfavorable for into It does business the sale of product.In addition, most in the market can be carried out paying using primary simple fingerprint recognition, identity information verifying Program it is too simple, imperfect guard system protection is easy to be imitated by others, so that the Transaction Information of user and individual Identity information leakage, cause weight huge economic loss, but also online trading is very dangerous, thus it is proposed that one kind is based on The personally identifiable information matching process of anti-tamper Encryption Algorithm is for solving the above problems.
Summary of the invention
The program verified the purpose of the present invention is to solve identity information existing in the prior art is too simple, so that The Transaction Information of user and personal identity information leakage, cause the shortcomings that weighing huge economic loss, and the one kind proposed is based on The personally identifiable information matching process of anti-tamper Encryption Algorithm.
Personally identifiable information matching process based on anti-tamper Encryption Algorithm, comprising the following steps:
S1, establish personally identifiable information mating end and server-side: personally identifiable information mating end is by identity information acquisition mould Block, information matches number detection module, MD5 algorithm check module, DES message protection module, and personally identifiable information mating end is used In the various characteristic informations of acquisition personal identification, and verifying, verification and the letter of matching times are carried out to the characteristic information of acquisition Protective treatment is ceased, the server-side is synchronous during personally identifiable information is verified to carry out information matches early warning and long-range prison Control;
S2, identity information acquisition: the identity information acquisition module includes identity information extraction unit, identity information reception Unit, information discriminance analysis unit, information pairing unit and information passing unit, the output end of the identity information extraction unit Successively connect with the input terminal of identity information receiving unit, information discriminance analysis unit, information pairing unit and information passing unit It connects, for extracting personal characteristic information to be matched at personally identifiable information matching initial stage, is matched after identifying, analyzing;
S3, characteristic information matching verifying: the detection of matching times is carried out to the identity information that matching is completed, when the number of detection When according to being less than preset value, it directly will test data and being transmitted to MD5 algorithm verification module progress verification of data;When the data of detection are big When preset value, it will test data and be first transmitted to matching warning module, then by being transmitted to the verification of MD5 algorithm after the completion of early warning Module carries out verification of data;
S4, information matches early warning: in identity information matching verification process, the data for being greater than preset value to detection are sent to Server-side does timely early warning, realizes the purpose remotely monitored;
S5, anti-tamper encryption: preset value is less than for identity information verifying number or identity information verifying number is greater than in advance If value but the information handled through overmatching early warning, verification prevention is carried out by MD5 algorithm and is distorted, for verifying having for unpaired message Effect property, encrypts personally identifiable information, hashed value is calculated in hash function, input the byte serial of a random length, Generate one 128 integers;
S6, message protection processing: initial stage is matched in personally identifiable information, backup is sent to DES letter after identity information acquisition Protection module is ceased, the DES message protection module encrypts the information of transmission by the way of one-time pad;
S7, information storage: by personal identification various characteristic informations to be matched and the identity information of matching completion, to identity The information of information matches number verifying carries out classification storage, and timing carries out hash deletion.
Preferably, further include main control module, the output end of the main control module respectively with identity information acquisition module, information The input terminal connection of matching times detection module, MD5 algorithm verification module, DES message protection module, the DES message protection The input terminal of module is also connect with information passing unit.
Preferably, the output end of the main control module has also been bi-directionally connected match information storage unit, the match information Storage unit is used to store the identity information of personal identification various characteristic informations to be matched and matching completion, to identity information The information of matching times verifying, and classification storage.
Preferably, the DES message protection module is by information key generation unit, DES information encryption unit and DES information Decryption unit composition, wherein the output end of information key generation unit is connect with the input terminal of DES information encryption unit, described DES information encryption unit and DES information decrypting unit be bi-directionally connected, at least through twice during identity information is matched Encryption, decryption oprerations.
Preferably, the personal characteristic information includes fingerprint feature information, face feature information and sound characteristic information, Two at least to be taken the fingerprint in characteristic information, face feature information and sound characteristic information when identity information extracts.
Preferably, the identity information extraction further includes close guarantor's problem verifying, cell-phone number verifying and gesture verifying.
Preferably, in the S5, the mode of anti-tamper encryption further includes RC2 Encryption Algorithm or RC4 Encryption Algorithm.
Preferably, the server-side includes the second radio receiving transmitting module and information receives memory module, and described second is wireless The output end of transceiver module is connect with the input terminal that information receives memory module, for storing the matching early warning remotely sent letter Breath is automatically deleted after the completion of warning information processing, and processing information is fed back to matching warning module.
Preferably, the matching warning module and server-side are connected with the first radio receiving transmitting module, the described first wireless receipts It sends out module and is set to personally identifiable information mating end, handle information for transmitting matching warning information and the early warning fed back.
Compared with prior art, the beneficial effects of the present invention are:
1, identity information acquisition module and DES message protection module are set in the process by the way that personally identifiable information is matched, On the one hand can the various features information to personal identification be acquired, identify, verify, improve the accuracy of information matches, separately On the one hand the matched information of personal identification is encrypted by the way of one-time pad, while carries out the more of match information Protective treatment again can effectively be checked when logging in, improve the security level of entire information matches system, also enhance friendship Easy safety;
2, module is checked by the MD5 algorithm of proposition, effectively personally identifiable information and transaction can be believed using MD5 algorithm Breath is checked, and determines whether to avoid distorting for safety, has higher safety coefficient, prevent the Transaction Information of user The problem of with personal identity information leakage, securely and reliably;
3, number detection is carried out by information of the matching warning module to identities match, and abnormal data is carried out pre- Alert processing, facilitates the long-range management and monitoring of server-side, further increases the degree of safety of identities match information.
Design layout of the present invention is reasonable, greatly improves the security level of entire information matches system, also enhances friendship Easy safety reduces loss, is worthy to be popularized.
Detailed description of the invention
Fig. 1 is the functional block diagram of the personally identifiable information matching process proposed by the present invention based on anti-tamper Encryption Algorithm;
Fig. 2 is that the DES information of the personally identifiable information matching process proposed by the present invention based on anti-tamper Encryption Algorithm is anti- Protect the functional block diagram of module;
Fig. 3 is the matching early warning mould of the personally identifiable information matching process proposed by the present invention based on anti-tamper Encryption Algorithm The functional block diagram that block is connect with server.
Specific embodiment
Combined with specific embodiments below the present invention is made further to explain.
Embodiment
Referring to Fig.1-3, the personally identifiable information matching process proposed by the present invention based on anti-tamper Encryption Algorithm, including with Lower step:
S1, establish personally identifiable information mating end and server-side: personally identifiable information mating end is by identity information acquisition mould Block, information matches number detection module, MD5 algorithm check module, DES message protection module, and personally identifiable information mating end is used In the various characteristic informations of acquisition personal identification, and verifying, verification and the letter of matching times are carried out to the characteristic information of acquisition Protective treatment is ceased, the server-side is synchronous during personally identifiable information is verified to carry out information matches early warning and long-range prison Control;
S2, identity information acquisition: the identity information acquisition module includes identity information extraction unit, identity information reception Unit, information discriminance analysis unit, information pairing unit and information passing unit, the output end of the identity information extraction unit Successively connect with the input terminal of identity information receiving unit, information discriminance analysis unit, information pairing unit and information passing unit It connects, for extracting personal characteristic information to be matched at personally identifiable information matching initial stage, is matched after identifying, analyzing;
S3, characteristic information matching verifying: the detection of matching times is carried out to the identity information that matching is completed, when the number of detection When according to being less than preset value, it directly will test data and being transmitted to MD5 algorithm verification module progress verification of data;When the data of detection are big When preset value, it will test data and be first transmitted to matching warning module, then by being transmitted to the verification of MD5 algorithm after the completion of early warning Module carries out verification of data;
S4, information matches early warning: in identity information matching verification process, the data for being greater than preset value to detection are sent to Server-side does timely early warning, realizes the purpose remotely monitored;
S5, anti-tamper encryption: preset value is less than for identity information verifying number or identity information verifying number is greater than in advance If value but the information handled through overmatching early warning, verification prevention is carried out by MD5 algorithm and is distorted, for verifying having for unpaired message Effect property, encrypts personally identifiable information, hashed value is calculated in hash function, input the byte serial of a random length, Generate one 128 integers;
S6, message protection processing: initial stage is matched in personally identifiable information, backup is sent to DES letter after identity information acquisition Protection module is ceased, the DES message protection module encrypts the information of transmission by the way of one-time pad;
S7, information storage: by personal identification various characteristic informations to be matched and the identity information of matching completion, to identity The information of information matches number verifying carries out classification storage, and timing carries out hash deletion.
It is worth noting that, further include main control module in the present embodiment, the output end of the main control module respectively with identity Information acquisition module, information matches number detection module, MD5 algorithm check module, the input terminal of DES message protection module connects It connects, the input terminal of the DES message protection module is also connect with information passing unit, and the output end of the main control module is also two-way It is connected with match information storage unit, the match information storage unit is used to store personal identification various features letter to be matched Breath and the information for matching the identity information completed, identity information matching times being verified, and classification storage.
The DES message protection module is decrypted single by information key generation unit, DES information encryption unit and DES information Member composition, wherein the output end of information key generation unit is connect with the input terminal of DES information encryption unit, the DES information Encryption unit and DES information decrypting unit are bi-directionally connected, at least through encryption twice, solution during identity information is matched Close operation, on the one hand can the various features information to personal identification be acquired, identify, verify, improve the standard of information matches On the other hand exactness encrypts the matched information of personal identification by the way of one-time pad, while being matched The multiple-protection of information is handled, and can effectively be checked when logging in, improve the security level of entire information matches system, Enhance the safety of transaction.
It is worth noting that, the mode of anti-tamper encryption further includes that RC2 Encryption Algorithm or RC4 encryption are calculated in the present embodiment Method, with the citing of MD5 algorithm, MD5 algorithm obtained out by jsp in personal identification matching system external memory some is calculative Information, and after jsp submission, it is to jump in the logical layer of java to run with value by the action of strut2, in logic Dao method is called in the action of layer, and the method for calculating MD5 value is encapsulated in Dao, receives the letter that jsp is transmitted in Dao method Breath, and MD5 value is calculated, after MD5 value calculates completion, its value original route is returned into action, this is to calculate for the first time The MD5 value of information, saves it in Session, consequently facilitating it is compared with secondary MD5 value, it is suitable for the first time Benefit jumps in the success page after having executed, and the secondary MD5 for starting to carry out information is calculated, equally by above-mentioned Method is calculated the MD5 value and first time that calculate for the second time, and be stored in after MD5 value has been calculated Value in Session is compared, and if they are the same, does not then become, if different, then explanation is tampered.Can have using MD5 algorithm Effect checks personally identifiable information and Transaction Information, determines whether to avoid distorting for safety, has higher safety Coefficient, the problem of preventing the Transaction Information and personal identity information leakage of user, securely and reliably.
It is worth noting that, the personal characteristic information includes fingerprint feature information, facial characteristics letter in the present embodiment Breath and sound characteristic information, at least take the fingerprint characteristic information, face feature information and sound characteristic when identity information extracts Two in information, the identity information extraction further includes close guarantor's problem verifying, cell-phone number verifying and gesture verifying, in a person Before part Information Authentication in such a way that close guarantor's problem adds cell-phone number to verify, binding cell-phone number verifying is first carried out, information terminal is passed through The identifying code typing of transmission identifies, carries out preset close breath information-preserving after being proved to be successful again and replies pairing, after Dual Matching success again At least two in personal fingerprint feature information, face feature information and sound characteristic information are extracted, are demonstrate,proved after being all proved to be successful Bright personally identifiable information is errorless, can carry out next step trading processing.
The server-side includes that the second radio receiving transmitting module and information receive memory module, second radio receiving transmitting module Output end and information receive the input terminal of memory module and connect, for storing the matching warning information remotely sent, in early warning It is automatically deleted after the completion of information processing, and processing information is fed back into matching warning module, the matching warning module and service End is connected with the first radio receiving transmitting module, and first radio receiving transmitting module is set to personally identifiable information mating end, for transmitting Matching warning information and the early warning fed back processing information, facilitate the long-range management and monitoring of server-side, further increase identity The degree of safety of match information.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (9)

1. the personally identifiable information matching process based on anti-tamper Encryption Algorithm, which comprises the following steps:
S1, establish personally identifiable information mating end and server-side: personally identifiable information mating end is by identity information acquisition module, letter Matching times detection module, MD5 algorithm verification module, DES message protection module are ceased, personally identifiable information mating end is for acquiring The various characteristic informations of personal identification, and verifying, verification and the message protection of matching times are carried out to the characteristic information of acquisition Processing, the server-side is synchronous during personally identifiable information is verified to carry out information matches early warning and long-range monitoring;
S2, identity information acquisition: the identity information acquisition module includes identity information extraction unit, identity information reception list Member, information discriminance analysis unit, information pairing unit and information passing unit, the output end of the identity information extraction unit with Identity information receiving unit, information discriminance analysis unit, information pairing unit and information passing unit input terminal be sequentially connected, For extracting personal characteristic information to be matched at personally identifiable information matching initial stage, matched after identifying, analyzing;
S3, characteristic information matching verifying: the detection of matching times is carried out to the identity information that matching is completed, when the data of detection are small When preset value, it directly will test data and be transmitted to MD5 algorithm verification module progress verification of data;When the data of detection are greater than in advance If will test data when value and be first transmitted to matching warning module, then by being transmitted to MD5 algorithm verification module after the completion of early warning Carry out verification of data;
S4, information matches early warning: in identity information matching verification process, the data for being greater than preset value to detection are sent to service Timely early warning is done at end, realizes the purpose remotely monitored;
S5, anti-tamper encryption: preset value is less than for identity information verifying number or identity information verifying number is greater than preset value But the information handled through overmatching early warning carries out verification prevention by MD5 algorithm and distorts, for verifying the effective of unpaired message Property, personally identifiable information is encrypted, hashed value is calculated in hash function, inputs the byte serial of a random length, it is raw At one 128 integers;
S6, message protection processing: initial stage is matched in personally identifiable information, it is anti-to be sent to DES information for backup after identity information acquisition Module is protected, the DES message protection module encrypts the information of transmission by the way of one-time pad;
S7, information storage: by personal identification various characteristic informations to be matched and the identity information of matching completion, to identity information The information of matching times verifying carries out classification storage, and timing carries out hash deletion.
2. the personally identifiable information matching process according to claim 1 based on anti-tamper Encryption Algorithm, which is characterized in that It further include main control module, the output end of the main control module detects mould with identity information acquisition module, information matches number respectively The input terminal connection of block, MD5 algorithm verification module, DES message protection module, the input terminal of the DES message protection module is also It is connect with information passing unit.
3. the personally identifiable information matching process according to claim 2 based on anti-tamper Encryption Algorithm, which is characterized in that The output end of the main control module has also been bi-directionally connected match information storage unit, and the match information storage unit is for storing Personal identification various characteristic informations to be matched and the letter for matching the identity information completed, identity information matching times being verified Breath, and classification storage.
4. the personally identifiable information matching process according to claim 1 based on anti-tamper Encryption Algorithm, which is characterized in that The DES message protection module is made of information key generation unit, DES information encryption unit and DES information decrypting unit, The output end of middle information key generation unit is connect with the input terminal of DES information encryption unit, the DES information encryption unit and DES information decrypting unit is bi-directionally connected, at least through encryption, decryption oprerations twice during identity information is matched.
5. the personally identifiable information matching process according to claim 1 based on anti-tamper Encryption Algorithm, which is characterized in that The personal characteristic information includes fingerprint feature information, face feature information and sound characteristic information, is extracted in identity information When at least take the fingerprint in characteristic information, face feature information and sound characteristic information two.
6. the personally identifiable information matching process according to claim 5 based on anti-tamper Encryption Algorithm, which is characterized in that The identity information extraction further includes close guarantor's problem verifying, cell-phone number verifying and gesture verifying.
7. the personally identifiable information matching process according to claim 1 based on anti-tamper Encryption Algorithm, which is characterized in that In the S5, the mode of anti-tamper encryption further includes RC2 Encryption Algorithm or RC4 Encryption Algorithm.
8. the personally identifiable information matching process according to claim 1 based on anti-tamper Encryption Algorithm, which is characterized in that The server-side includes that the second radio receiving transmitting module and information receive memory module, the output end of second radio receiving transmitting module The input terminal for receiving memory module with information is connect, for storing the matching warning information remotely sent, in warning information processing It is automatically deleted after the completion, and processing information is fed back into matching warning module.
9. the personally identifiable information matching process according to claim 8 based on anti-tamper Encryption Algorithm, which is characterized in that The matching warning module and server-side are connected with the first radio receiving transmitting module, and first radio receiving transmitting module is set to a person Part information matches end handles information for transmitting matching warning information and the early warning fed back.
CN201811202090.7A 2018-10-16 2018-10-16 Personally identifiable information matching process based on anti-tamper Encryption Algorithm Pending CN109508993A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811202090.7A CN109508993A (en) 2018-10-16 2018-10-16 Personally identifiable information matching process based on anti-tamper Encryption Algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811202090.7A CN109508993A (en) 2018-10-16 2018-10-16 Personally identifiable information matching process based on anti-tamper Encryption Algorithm

Publications (1)

Publication Number Publication Date
CN109508993A true CN109508993A (en) 2019-03-22

Family

ID=65746641

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811202090.7A Pending CN109508993A (en) 2018-10-16 2018-10-16 Personally identifiable information matching process based on anti-tamper Encryption Algorithm

Country Status (1)

Country Link
CN (1) CN109508993A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112702310A (en) * 2020-11-30 2021-04-23 南方电网数字电网研究院有限公司 Information verification method, system, device and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1951326A (en) * 2006-11-03 2007-04-25 北京飞天诚信科技有限公司 Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal
CN101425901A (en) * 2008-04-16 2009-05-06 奉蓓 Control method and device for customer identity verification in processing terminals
CN104580143A (en) * 2014-11-09 2015-04-29 李若斌 Security authentication method based on gesture recognition, terminal, server and system
CN105245340A (en) * 2015-09-07 2016-01-13 天地融科技股份有限公司 Identity authentication method based on remote account opening and system
CN105450407A (en) * 2014-07-31 2016-03-30 阿里巴巴集团控股有限公司 Identity authentication method and device
CN105550867A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Information authentication method and equipment
CN105763563A (en) * 2016-04-19 2016-07-13 浙江神州量子网络科技有限公司 Identity authentication method during quantum secret key application process
CN106295368A (en) * 2016-08-17 2017-01-04 四川长虹通信科技有限公司 The data security protection method of a kind of mobile terminal and system
CN107332825A (en) * 2017-06-09 2017-11-07 国政通科技股份有限公司 A kind of client identity authentication method and system
CN107896226A (en) * 2017-12-13 2018-04-10 北京无线电计量测试研究所 A kind of network identification system based on iris recognition
CN108234112A (en) * 2016-12-14 2018-06-29 中国移动通信集团安徽有限公司 Data encryption and decryption method and system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1951326A (en) * 2006-11-03 2007-04-25 北京飞天诚信科技有限公司 Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal
CN101425901A (en) * 2008-04-16 2009-05-06 奉蓓 Control method and device for customer identity verification in processing terminals
CN105450407A (en) * 2014-07-31 2016-03-30 阿里巴巴集团控股有限公司 Identity authentication method and device
CN104580143A (en) * 2014-11-09 2015-04-29 李若斌 Security authentication method based on gesture recognition, terminal, server and system
CN105550867A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Information authentication method and equipment
CN105245340A (en) * 2015-09-07 2016-01-13 天地融科技股份有限公司 Identity authentication method based on remote account opening and system
CN105763563A (en) * 2016-04-19 2016-07-13 浙江神州量子网络科技有限公司 Identity authentication method during quantum secret key application process
CN106295368A (en) * 2016-08-17 2017-01-04 四川长虹通信科技有限公司 The data security protection method of a kind of mobile terminal and system
CN108234112A (en) * 2016-12-14 2018-06-29 中国移动通信集团安徽有限公司 Data encryption and decryption method and system
CN107332825A (en) * 2017-06-09 2017-11-07 国政通科技股份有限公司 A kind of client identity authentication method and system
CN107896226A (en) * 2017-12-13 2018-04-10 北京无线电计量测试研究所 A kind of network identification system based on iris recognition

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112702310A (en) * 2020-11-30 2021-04-23 南方电网数字电网研究院有限公司 Information verification method, system, device and storage medium

Similar Documents

Publication Publication Date Title
CN108521418B (en) Identity authentication method and system fusing block chain and biological feature recognition
US5826245A (en) Providing verification information for a transaction
US8086868B2 (en) Data communication method and system
CN104217327B (en) A kind of financial IC card internet terminal and its method of commerce
CN104008351B (en) Window application completeness check system, method and device
US8447991B2 (en) Card authentication system
CN101197667B (en) Dynamic password authentication method
CN105229965B (en) Equipment identification system and equipment authenticating method
US20020016913A1 (en) Modifying message data and generating random number digital signature within computer chip
US20120078798A1 (en) Systems and methods for transmitting financial account information
CN108683667B (en) Account protection method, device, system and storage medium
CN103929308B (en) Information Authentication method applied to rfid card
JPS6310839A (en) System and method for data communication
CN108323230B (en) Method for transmitting key, receiving terminal and distributing terminal
CN107592308A (en) A kind of two server multiple-factor authentication method towards mobile payment scene
US10839362B2 (en) Offline pin authentication method and system for IC card
US8316437B2 (en) Method for protecting the access to an electronic object connected to a computer
CN108256863A (en) The method of Quick Response Code generation, storage, identification and related encryption and decryption based on SE
CN109523256A (en) Electronic certificate bill generation method based on anti-tamper Encryption Algorithm
CN105608775B (en) A kind of method of authentication, terminal, access card and SAM card
CN103368736A (en) Business information encryption and decryption method and device
CN104751042B (en) Creditability detection method based on cryptographic hash and living things feature recognition
CN109508993A (en) Personally identifiable information matching process based on anti-tamper Encryption Algorithm
CN115471860A (en) Express real name checking method, system and computer readable storage medium
CN108848089B (en) Data encryption method and data transmission system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190322

RJ01 Rejection of invention patent application after publication