CN109934009B - Personal information data query interactive authorization method - Google Patents

Personal information data query interactive authorization method Download PDF

Info

Publication number
CN109934009B
CN109934009B CN201910142816.0A CN201910142816A CN109934009B CN 109934009 B CN109934009 B CN 109934009B CN 201910142816 A CN201910142816 A CN 201910142816A CN 109934009 B CN109934009 B CN 109934009B
Authority
CN
China
Prior art keywords
user
information
terminal
face information
personal information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910142816.0A
Other languages
Chinese (zh)
Other versions
CN109934009A (en
Inventor
何晓明
吴卫
李永栋
茹文秀
李志晖
钟家晖
黄玲
伍国林
谢煜
刘树文
陈韵
邱浩锋
黎浩云
陈惠敏
郑晓彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Planning And Natural Resources Automation Center Guangzhou Basic Geographic Information Center
Guangzhou Urban Planning Technology Development Service Co ltd
Original Assignee
Guangzhou Urban Planning Automation Center
Guangzhou Urban Planning Technology Development And Services State-Owned Enterprise
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Urban Planning Automation Center, Guangzhou Urban Planning Technology Development And Services State-Owned Enterprise filed Critical Guangzhou Urban Planning Automation Center
Priority to CN201910142816.0A priority Critical patent/CN109934009B/en
Publication of CN109934009A publication Critical patent/CN109934009A/en
Application granted granted Critical
Publication of CN109934009B publication Critical patent/CN109934009B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a personal information data query interactive authorization method, which comprises the following steps: the method comprises the steps that a first terminal obtains face information of a first user and personal information needing external authorization query, and generates a two-dimensional code according to the face information and the personal information of the first user; after the second terminal scans the two-dimensional code for data interaction, the second terminal acquires the personal information of the second user and the face information of the second user, matches and verifies whether the personal information of the second user and the face information of the second user are consistent through the Internet, and if the personal information of the second user and the face information of the second user are consistent, confirmation information is sent to the first terminal; after the first terminal acquires the confirmation information, acquiring a temporary face information record of the current user, matching and verifying whether the temporary face information is consistent with the first user face information associated in the two-dimensional code, and if so, sending an authorization instruction to the second terminal; and after the second terminal acquires the authorization instruction, acquiring and displaying the personal information.

Description

Personal information data query interactive authorization method
Technical Field
The invention relates to the field of information query, in particular to a personal information data query interactive authorization method.
Background
The personal property information belongs to sensitive personal privacy information, is not disclosed outside under general conditions, but is required to be disclosed to specific persons in a major system on certain specific occasions, such as house buying and selling, and can be realized only by looking up a property certificate at present. At present, official approaches are available to allow the public to inquire the house property information under the name of the public on the internet, but no method or process is available to allow the public to authorize the personal house property information of the public to be inquired by designated personnel on the internet through a mobile phone. Based on actual requirements, the invention provides an information authorization query method based on face recognition.
Disclosure of Invention
The invention provides a personal information data query interactive authorization method, which aims to solve the technical problem that the prior art can not authorize personal information to be queried by appointed personnel through a terminal on the Internet, so that the personal information is associated in a two-dimensional code, and the security of the user information is ensured while the authorization to the appointed personnel for querying the personal information is realized through the double verification of the face information and the personal information of the user.
In order to solve the above technical problem, an embodiment of the present invention provides a method for querying, interacting and authorizing personal information data, including:
the method comprises the steps that a first terminal obtains face information of a first user and personal information needing external authorization query, and generates a two-dimensional code according to the face information of the first user and the personal information;
after the second terminal scans the two-dimensional code for data interaction, the second terminal acquires personal information of a second user and face information of the second user, matches and verifies whether the personal information of the second user and the face information of the second user are consistent through the Internet, and if the personal information of the second user and the face information of the second user are consistent, confirmation information is sent to the first terminal;
after the first terminal acquires the confirmation information, acquiring a temporary face information record of the current user, matching and verifying whether the temporary face information is consistent with the first user face information associated in the two-dimensional code, and if so, sending an authorization instruction to the second terminal;
and after the second terminal acquires the authorization instruction, acquiring and displaying the personal information.
As a preferred scheme, the method for generating a two-dimensional code by a first terminal includes the steps of:
the first terminal acquires and records face information of the first user;
the first terminal acquires and records personal information of the first user needing external authorization query;
after the first terminal obtains a generation instruction sent by the first user, generating a two-dimensional code according to the face information of the first user and the personal information of the first user, wherein the two-dimensional code is associated with the face information of the first user and the personal information of the first user;
and the first terminal sends the two-dimension code to the second terminal.
As a preferred scheme, after the second terminal scans the two-dimensional code for data interaction, the second terminal obtains personal information of a second user and face information of the second user, matches and verifies whether the personal information of the second user and the face information of the second user are consistent through the internet, and if the personal information of the second user and the face information of the second user are consistent, sends confirmation information to the first terminal, and the method includes:
after scanning the two-dimensional code for data interaction, the second terminal acquires address information and a skip request of the two-dimensional code, and skips to enter a personal information filling interface;
the second terminal acquires the personal information input by the second user on the personal information filling interface, and acquires and records the face information of the second user;
and the second terminal performs matching verification on the second user personal information and the second user face information through an internet inquiry link by applying a face recognition technology to determine whether the second user personal information and the second user face information are consistent, and if the second user personal information and the second user face information are consistent, sends confirmation information to the first terminal.
Preferably, the content of the confirmation information includes a name of the second user, a summary of the content to be queried, and a sending time.
As a preferred scheme, after acquiring the confirmation information, the first terminal acquires temporary face information of the current user, matches and verifies whether the temporary face information is consistent with first user face information associated in the two-dimensional code, and if so, sends an authorization instruction to the second terminal, including:
after the first terminal acquires the confirmation information, displaying a judgment interface to receive an agreement instruction or a rejection instruction sent by the first user;
when the first terminal acquires an agreement instruction sent by the first user, acquiring and recording temporary face information of the current user;
and the first terminal performs matching verification on the temporary face information and the first user face information associated in the two-dimensional code by applying a face recognition technology to determine whether the temporary face information and the first user face information are consistent, and if so, sends an authorization instruction to the second terminal.
As a preferred scheme, the face recognition technology includes an AI algorithm, a face recognition algorithm, and a neural network algorithm.
Preferably, the personal information of the second user includes a name and an identification number of the second user.
As a preferred scheme, the first terminal and the second terminal are a smart phone with a camera, a tablet computer and a computer.
As a preferred scheme, each time the first terminal and the second terminal execute one instruction action, a corresponding operation log record is generated and stored in a corresponding local storage module, or the operation log record is stored in a cloud server through the internet.
As a preferred scheme, when the matching verification results of the first terminal are inconsistent, an alarm signal is sent out; and when the matching verification results of the second terminal are inconsistent, sending an alarm signal and sending alarm information to the first terminal.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
1. the method of the invention relates the personal information in the two-dimensional code, and through the double verification of the face information and the personal information of the user, the technical problem that the prior art can not authorize the personal information to be inquired by the appointed personnel through the terminal on the Internet is solved, thereby realizing the authorization to the appointed personnel to inquire the personal information and simultaneously ensuring the safety of the user information.
2. By using the face recognition technology to carry out matching verification on the face information of the user, the face recognition accuracy can be improved.
3. By carrying out log recording and storing on each execution instruction, when an operation has an error, the source of the problem can be found by inquiring the log record, so that the operation process can be traced.
4. When the terminal verifies that the matching is inconsistent, corresponding alarm information is sent out, so that the protection of the personal information of the user can be enhanced, and the safety of the information is ensured.
Drawings
FIG. 1: is a flow chart of the method steps in the embodiment of the invention;
FIG. 2: is a schematic flow chart of step S1 in the embodiment of the present invention;
FIG. 3: is a schematic flow chart of step S2 in the embodiment of the present invention;
FIG. 4 is a schematic view of: is a schematic flow chart of step S3 in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the field of information inquiry, the application of scanning the two-dimensional code to acquire information is very wide, but an authorized inquiry mechanism is lacked, and information cannot be authorized to be checked for a specific person in the inquiry process, so that the two-dimensional code is disclosed equivalently to disclose information to all persons. In the payment field, although the authorized payment based on the biological characteristics and the two-dimensional codes is widely applied, the payee can directly transfer the money of the payer to an account of the payee after inputting the amount of the collected money and scanning the payment two-dimensional codes shown by the payer, and an authorized payment mechanism is lacked in the payment process.
In summary, the invention provides a personal information data query interactive authorization method.
Example one
Referring to fig. 1, a preferred embodiment of the present invention provides a method for querying and interactively authorizing personal information data, including:
s1, a first terminal acquires face information of a first user and personal information needing external authorization query, and generates a two-dimensional code according to the face information of the first user and the personal information;
s2, after the second terminal scans the two-dimensional code for data interaction, the second terminal obtains personal information of a second user and face information of the second user, matching verification is carried out on the personal information of the second user and the face information of the second user through the Internet to determine whether the personal information of the second user and the face information of the second user are consistent, and if the personal information of the second user and the face information of the second user are consistent, confirmation information is sent to the first terminal;
s3, after the first terminal acquires the confirmation information, acquiring a temporary face information record of the current user, matching and verifying whether the temporary face information is consistent with the first user face information associated in the two-dimensional code, and if so, sending an authorization instruction to the second terminal;
and S4, after the second terminal acquires the authorization instruction, acquiring and displaying the personal information.
According to the embodiment, the personal information is associated in the two-dimensional code, and the technical problem that the personal information cannot be authorized to be inquired by appointed personnel through the terminal on the Internet in the prior art is solved through the dual verification of the face information and the personal information of the user, so that the personal information is authorized to be inquired by the appointed personnel, and the safety of the user information is guaranteed.
Example two
Referring to fig. 2, in the present embodiment, the step S1 includes:
s11, the first terminal acquires and records face information of the first user;
s12, the first terminal acquires and records the personal information of the first user needing to be inquired by external authorization;
s13, after the first terminal acquires a generation instruction sent by the first user, generating a two-dimensional code according to the face information of the first user and the personal information of the first user, wherein the two-dimensional code is associated with the face information of the first user and the personal information of the first user;
and S14, the first terminal sends the two-dimensional code to the second terminal.
EXAMPLE III
Referring to fig. 3, in the present embodiment, the step S2 includes:
s21, after the second terminal scans the two-dimensional code for data interaction, address information and a skip request of the two-dimensional code are obtained, and the second terminal skips to enter a personal information filling interface;
s22, the second terminal acquires the personal information input by the second user on the personal information filling interface, and acquires and records the face information of the second user;
and S23, the second terminal carries out matching verification on the second user personal information and the second user face information through an internet inquiry link by applying a face recognition technology, and if the matching is consistent, confirmation information is sent to the first terminal.
In this embodiment, the content of the confirmation information includes the name of the second user, the summary of the content to be queried, and the sending time.
In this embodiment, the face recognition technology includes an AI algorithm, a face recognition algorithm, and a neural network algorithm. By using the face recognition technology to carry out matching verification on the face information of the user, the face recognition accuracy can be improved.
Example four
Referring to fig. 4, in the present embodiment, the step S3 includes:
s31, after the first terminal acquires the confirmation information, displaying a judgment interface to receive an agreement instruction or a rejection instruction sent by the first user;
s32, after the first terminal acquires an agreement instruction sent by the first user, acquiring and recording temporary face information of the current user;
and S33, the first terminal performs matching verification on the temporary face information and the first user face information associated in the two-dimensional code by applying a face recognition technology, and if the temporary face information and the first user face information are consistent, an authorization instruction is sent to the second terminal.
In this embodiment, the face recognition technology includes an AI algorithm, a face recognition algorithm, and a neural network algorithm. By using the face recognition technology to carry out matching verification on the face information of the user, the face recognition accuracy can be improved.
EXAMPLE five
In this embodiment, each time the first terminal and the second terminal execute one instruction action, a corresponding operation log record is generated and stored in a corresponding local storage module, or the operation log record is stored in a cloud server through the internet.
According to the method and the device, log recording and storage are carried out on each execution instruction, and when an operation is wrong, the source of the problem can be found by inquiring the log record, so that the operation process can be traced.
EXAMPLE six
In this embodiment, when the matching verification results of the first terminal are inconsistent, an alarm signal is sent; and when the matching verification results of the second terminal are inconsistent, sending an alarm signal and sending alarm information to the first terminal.
According to the embodiment, when the terminal verification is inconsistent, corresponding alarm information is sent out, so that the protection of the personal information of the user can be enhanced, and the safety of the information is ensured.
It should be understood that in the above embodiment, the personal information of the second user includes the name and identification number of the second user.
It should be understood that, in the above embodiments, the first terminal and the second terminal are a smartphone, a tablet computer, and a computer having a camera.
The invention will be described in detail with reference to one of the embodiments.
Firstly, after an information provider (hereinafter referred to as provider) acquires face information of the provider by using equipment such as a mobile phone and the like, searching information needing external authorization query and generating an authorization query two-dimensional code, wherein the query two-dimensional code is associated with the face information of the provider and the authorization query information; secondly, after an information inquiry party (hereinafter called inquiry party) scans the two-dimensional code by using equipment such as a mobile phone and the like, inputting the name and the identity card number of the information inquiry party and obtaining the face information of the inquiry party by using the equipment, wherein the equipment checks whether the face information currently input is matched with the input personal information by using a face recognition technology; thirdly, after the currently input face information and the input personal information are confirmed to be matched, the equipment sends a message to a provider to confirm whether the provider is authorized to refer to the information; and finally, if the provider agrees, the face information of the provider is acquired by using equipment such as a mobile phone and the like, and then whether the face information associated with the two-dimensional code is consistent or not is checked, and if so, the inquirer can check the authorized public information.
Step 1: an information provider (hereinafter referred to as a provider) acquires and records face information through a mobile phone and other equipment;
and 2, step: a provider searches information needing external authorization query; (the information searched here is not only information in government systems, but also information that any group or individual needs to authorize the inquiry)
And step 3: a provider clicks to generate a query two-dimensional code, and the query two-dimensional code is associated with face information and authorized queryable information of the provider;
and 4, step 4: the provider shares the query two-dimensional code;
and 5: an information inquiring party (hereinafter referred to as an inquiring party) scans an inquiring two-dimensional code of a provider through equipment such as a mobile phone;
step 6: the inquiring party inputs personal information such as names, identification card numbers and the like through equipment such as a mobile phone and the like;
and 7: the inquiring party acquires and records the face information of the inquiring party through equipment such as a mobile phone and the like;
and step 8: the equipment checks the face information input by the inquiring party by applying a face recognition technology, and verifies whether the face information is matched with the input personal information; (the inquiring party does not need to be directly connected with the resident information system of the public security bureau and can use a human Face core interface provided by an internet company to realize the interface, for example, the interface http:// ai, baidu, com/docs #/Face-PersonVerify-V3/topqq-pf-to = pcqq.c2c, and the equipment of the inquiring party can check whether the human Face information is matched with the personal information as long as the equipment can be connected with the internet)
And step 9: after the face information input by the inquirer is matched with the personal information input by the input personal information check result, the equipment sends information (the message content comprises the name of the inquirer, the abstract of the content to be inquired, the inquiry time and the like) to the equipment of the provider; if the matching is not consistent, the flow is ended.
Step 10: after the provider receives the information, if the provider agrees to authorize the inquiry of the inquirer to continue the next operation, otherwise, the process is ended;
step 11: a provider acquires and records face information of a user by using equipment such as a mobile phone;
step 12: the equipment checks whether the face information of the provider is consistent with the face information associated with the query two-dimensional code or not by applying a face recognition technology, if so, the query party can check the authorized and published information of the provider, and if not, the flow is ended.
Step 13: the inquirer views the information authorized to be disclosed by the provider.
The above-mentioned embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, and it should be understood that the above-mentioned embodiments are only examples of the present invention and are not intended to limit the scope of the present invention. It should be understood that any modifications, equivalents, improvements and the like, which come within the spirit and principle of the invention, may occur to those skilled in the art and are intended to be included within the scope of the invention.

Claims (10)

1. A personal information data query interactive authorization method is characterized by comprising the following steps:
the method comprises the steps that a first terminal obtains face information of a first user and personal information needing external authorization query, and generates a two-dimensional code according to the face information of the first user and the personal information;
after the second terminal scans the two-dimensional code for data interaction, the second terminal acquires personal information of a second user and face information of the second user, matches and verifies whether the personal information of the second user and the face information of the second user are consistent through the Internet, and if the personal information of the second user and the face information of the second user are consistent, confirmation information is sent to the first terminal;
after the first terminal acquires the confirmation information, acquiring a temporary face information record of the current user, matching and verifying whether the temporary face information is consistent with the first user face information associated in the two-dimensional code, and if so, sending an authorization instruction to the second terminal;
and after the second terminal acquires the authorization instruction, acquiring and displaying the personal information.
2. The method of claim 1, wherein the obtaining, by the first terminal, personal information of which the face information of the first user needs to be queried by external authorization, and generating a two-dimensional code according to the face information of the first user and the personal information comprises:
the first terminal acquires and records face information of the first user;
the first terminal acquires and records personal information of the first user needing external authorization query;
after the first terminal acquires a generation instruction sent by the first user, generating a two-dimensional code according to the face information of the first user and the personal information of the first user, wherein the two-dimensional code is associated with the face information of the first user and the personal information of the first user;
and the first terminal sends the two-dimension code to the second terminal.
3. The method of claim 1, wherein after the second terminal scans the two-dimensional code for data interaction, the second terminal obtains personal information of a second user and face information of the second user, matches and verifies whether the personal information of the second user and the face information of the second user are consistent through the internet, and if the personal information of the second user and the face information of the second user are consistent, then sends confirmation information to the first terminal, including:
after scanning the two-dimensional code and carrying out data interaction, the second terminal acquires address information and a skip request of the two-dimensional code, and skips to enter a personal information filling interface;
the second terminal acquires the personal information input by the second user on the personal information filling interface, and acquires and records the face information of the second user;
and the second terminal performs matching verification on the second user personal information and the second user face information through an internet inquiry link by applying a face recognition technology, and if the second user personal information and the second user face information are consistent, sends confirmation information to the first terminal.
4. The method of claim 3, wherein the content of the confirmation information includes a name of the second user, a summary of the content to be queried, and a transmission time.
5. The method of claim 1, wherein the first terminal acquires temporary face information of a current user after acquiring the confirmation information, performs matching verification on the temporary face information and first user face information associated in the two-dimensional code to determine whether the temporary face information and the first user face information are consistent, and if the temporary face information and the first user face information are consistent, sends an authorization instruction to the second terminal, including:
after the first terminal acquires the confirmation information, displaying a judgment interface to receive an agreement instruction or a rejection instruction sent by the first user;
when the first terminal acquires an agreement instruction sent by the first user, acquiring and recording temporary face information of the current user;
and the first terminal performs matching verification on the temporary face information and the first user face information associated in the two-dimensional code by applying a face recognition technology, and sends an authorization instruction to the second terminal if the temporary face information and the first user face information are consistent.
6. The method of any one of claims 3 or 5, wherein the face recognition technique comprises an AI algorithm, a face recognition algorithm, and a neural network algorithm.
7. The method of claim 1, wherein the personal information of the second user comprises a name and an identification number of the second user.
8. The method of claim 1, wherein the first terminal and the second terminal are smartphones, tablets, and computers with cameras.
9. The method of claim 1, wherein each execution of one instruction action by the first terminal and the second terminal generates a corresponding operation log record and stores the operation log record in a corresponding local storage module or stores the operation log record in a cloud server through the internet.
10. The method of claim 1, wherein when the matching verification result of the first terminal is inconsistent, an alarm signal is sent out; and when the matching verification results of the second terminal are inconsistent, sending an alarm signal and sending alarm information to the first terminal.
CN201910142816.0A 2019-02-26 2019-02-26 Personal information data query interactive authorization method Active CN109934009B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910142816.0A CN109934009B (en) 2019-02-26 2019-02-26 Personal information data query interactive authorization method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910142816.0A CN109934009B (en) 2019-02-26 2019-02-26 Personal information data query interactive authorization method

Publications (2)

Publication Number Publication Date
CN109934009A CN109934009A (en) 2019-06-25
CN109934009B true CN109934009B (en) 2023-02-21

Family

ID=66985978

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910142816.0A Active CN109934009B (en) 2019-02-26 2019-02-26 Personal information data query interactive authorization method

Country Status (1)

Country Link
CN (1) CN109934009B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114679317A (en) * 2019-12-26 2022-06-28 支付宝(杭州)信息技术有限公司 Data viewing method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101631138A (en) * 2008-07-18 2010-01-20 深圳富泰宏精密工业有限公司 Personal information agent system and personal information agent method
CN104253784A (en) * 2013-06-25 2014-12-31 腾讯科技(深圳)有限公司 Logging and authorization method and system
US9338164B1 (en) * 2014-04-14 2016-05-10 Symantec Corporation Two-way authentication using two-dimensional codes
CN107067227A (en) * 2017-03-29 2017-08-18 重庆厚盾安全技术有限公司 HRMS based on Quick Response Code
CN107944291A (en) * 2017-11-15 2018-04-20 深圳忠信信息技术有限公司 Information acquisition method, system and computer-readable recording medium
CN108021820A (en) * 2017-11-15 2018-05-11 深圳忠信信息技术有限公司 Information protecting method, system and computer-readable recording medium
CN108090181A (en) * 2017-12-15 2018-05-29 深圳忠信信息技术有限公司 Personal information method for pushing and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7817587B2 (en) * 2005-12-22 2010-10-19 Sony Ericsson Mobile Communications, Ab Personal information management using content with embedded personal information manager data
US11574331B2 (en) * 2015-09-22 2023-02-07 Yahoo Assets Llc Method and system for sharing personal information with web sites

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101631138A (en) * 2008-07-18 2010-01-20 深圳富泰宏精密工业有限公司 Personal information agent system and personal information agent method
CN104253784A (en) * 2013-06-25 2014-12-31 腾讯科技(深圳)有限公司 Logging and authorization method and system
US9338164B1 (en) * 2014-04-14 2016-05-10 Symantec Corporation Two-way authentication using two-dimensional codes
CN107067227A (en) * 2017-03-29 2017-08-18 重庆厚盾安全技术有限公司 HRMS based on Quick Response Code
CN107944291A (en) * 2017-11-15 2018-04-20 深圳忠信信息技术有限公司 Information acquisition method, system and computer-readable recording medium
CN108021820A (en) * 2017-11-15 2018-05-11 深圳忠信信息技术有限公司 Information protecting method, system and computer-readable recording medium
CN108090181A (en) * 2017-12-15 2018-05-29 深圳忠信信息技术有限公司 Personal information method for pushing and system

Also Published As

Publication number Publication date
CN109934009A (en) 2019-06-25

Similar Documents

Publication Publication Date Title
WO2020108046A1 (en) Cross-block chain interaction method and system, computer device, and storage medium
US8701983B2 (en) Systems and methods for gesture-based interaction with computer systems
KR101538745B1 (en) System for Issuing an Electronic Receipt
CN108920257B (en) Transaction processing method, device, equipment and storage medium
CN105117624A (en) Recognition system and method of user system based on face recognition
JP2019117653A (en) System and method for providing transaction data to mobile devices
CN113111330B (en) Enterprise legal identity authentication management method and system based on enterprise chain code
US20220237617A1 (en) Systems and methods of real-time processing
US20230222484A1 (en) Method for binding card, terminal device, authentication server and storage medium
JP2017102842A (en) Personal identification system, personal identification information output system, authentication server, personal identification method, personal identification information output method, and program
CN109934009B (en) Personal information data query interactive authorization method
WO2022201411A1 (en) Face authentication application using homomorphic encryption
CN105701705A (en) System and method for replacing magnetic card with IC card on the basis of mobile Internet
KR101771546B1 (en) Method for payment using mobile fintech
CN111310006B (en) Account binding method and device, terminal equipment and computer readable storage medium
CN111314343B (en) Account management method and device and readable storage medium
CN114169863A (en) Signing method, signing device, electronic equipment and computer readable medium
EP3400695A1 (en) System, method and apparatus for data transmission
CN110581820B (en) Financial technology application system and method based on IPV6 and biological recognition technology
KR20160127920A (en) Cyber bigdata trade system and method
TW201907688A (en) Systems, devices, and methods for performing verification of communications received from one or more computing devices
US11763278B2 (en) Deposit token service system, apparatus and method
RU2810681C1 (en) System for monitoring integrity of identity documents in process of in-depth comprehensive verification of authenticity of documentary data
US20230140712A1 (en) Systems and methods for generating and using virtual card numbers
CA3084732C (en) Information interaction processing method, and terminal and system therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230620

Address after: 510030 West, 19th floor, No. 300, Dongfeng Middle Road, Hongqiao street, Yuexiu District, Guangzhou, Guangdong

Patentee after: Guangzhou Urban Planning Technology Development Service Co.,Ltd.

Patentee after: Guangzhou planning and natural resources Automation Center (Guangzhou Basic Geographic Information Center)

Address before: Room 805, No. 19-2, Guangwei Road, Yuexiu District, Guangzhou, Guangdong 510030

Patentee before: GUANGZHOU URBAN PLANNING TECHNOLOGY DEVELOPMENT AND SERVICES STATE-OWNED ENTERPRISE

Patentee before: GUANGZHOU URBAN PLANNING AUTOMATION CENTER