CN109960989A - Anti-tamper identity card acquisition authentication method, system, equipment and storage medium - Google Patents

Anti-tamper identity card acquisition authentication method, system, equipment and storage medium Download PDF

Info

Publication number
CN109960989A
CN109960989A CN201711429044.6A CN201711429044A CN109960989A CN 109960989 A CN109960989 A CN 109960989A CN 201711429044 A CN201711429044 A CN 201711429044A CN 109960989 A CN109960989 A CN 109960989A
Authority
CN
China
Prior art keywords
identity card
information
work order
user
service terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711429044.6A
Other languages
Chinese (zh)
Inventor
沈哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Sichuan Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Sichuan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Sichuan Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201711429044.6A priority Critical patent/CN109960989A/en
Publication of CN109960989A publication Critical patent/CN109960989A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/40Spoof detection, e.g. liveness detection
    • G06V40/45Detection of the body part being alive

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Bioethics (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to a kind of anti-tamper identity card acquisition authentication method, system, equipment and storage mediums, this method comprises: obtaining the user identity that service terminal is sent demonstrate,proves encryption data, the real identity card information of decryption also original subscriber, and real identity card information is sent to service terminal, real identity card information includes real identity card text information and real identity card photographic intelligence;Receive the work order for the ID card information including user that service terminal uploads;The identity card text information of user is extracted from work order, and identity card text information compare for the first time with real identity card text information;The identity card picture information of user is extracted from work order, and identity card picture information and real identity card photographic intelligence are compared for the second time;If it is consistent to compare the result compared with second for the first time, determine that the ID card information of work order is true.The present invention is it is possible to prevente effectively from the ID card information of user is forged, distorts and the problem of user identity is falsely used.

Description

Anti-tamper identity card acquisition authentication method, system, equipment and storage medium
Technical field
The present invention relates to information security and big data technical fields, recognize more particularly to a kind of anti-tamper identity card acquisition Card method, system, equipment and storage medium.
Background technique
Special supervision of the real-name authentication as government and industry, it is desirable that user-network access must applicant scene handle, and Personal identification papers are provided.Currently used integrated identity card letter identification equipment, the name of equipment reading identity card storage, The encryption information such as birthdate, address, head portrait, and decrypted using built-in safety chip, the data after decryption are passed through into USB The application software such as Windows, Android, iOS are sent to Bluetooth protocol.
But in actual use, since there are technical leaks for real name verification system, illegal agent is allow to pass through wood User identity card information is forged and distorted to horse program in the link of subscriber authentication, breaks through the regulatory requirements of real-name authentication, band Come huge information security and economic risk.
Summary of the invention
The object of the present invention is to provide a kind of anti-tamper identity cards to acquire authentication method and system, can effectively prevent The ID card information of user is tampered and forges in Internet service application.
On the one hand, the embodiment of the invention provides a kind of anti-tamper identity cards to acquire authentication method comprising following step It is rapid: to obtain the user identity that service terminal is sent and demonstrate,prove encryption data, the real identity card information of original subscriber is gone back in decryption, and will be true ID card information is sent to service terminal, and real identity card information includes real identity card text information and real identity card photo Information;Receive the work order for the ID card information including user that service terminal uploads;The identity card text of user is extracted from work order Word information, and identity card text information compare for the first time with real identity card text information;User is extracted from work order Identity card picture information, and identity card picture information and real identity card photographic intelligence are compared for the second time;If the The primary result compared with second that compares is consistent, then determines that the ID card information of work order is true.
One side according to an embodiment of the present invention, if the result of any one of comparison for the first time, second of comparison is not Unanimously, then determine that the ID card information in work order exists to distort and forge, and issue warning information.
One side according to an embodiment of the present invention further comprises: obtaining the user for the transacting business that service terminal uploads It is the information of true man;The scene photograph of the user of service terminal interception is obtained, and scene photograph and real identity card photo are believed Breath carries out third time comparison;If the result of comparison is consistent for the third time, the true ID card information of user is kept.
One side according to an embodiment of the present invention issues warning information if the result that third time compares is inconsistent.
One side according to an embodiment of the present invention further comprises: the business handling request of service terminal based on the received Work order number is generated, and the work order number is sent to service terminal, the work order that service terminal uploads further comprises work order number letter Breath.
Anti-tamper identity card provided in an embodiment of the present invention acquires authentication method, including identity card decryption, identity card text Word information comparison, identity card picture information comparison, vivo identification, reciprocity five links of testimony of a witness ratio, it is possible to prevente effectively from user ID card information is forged, distorts and the problem of user identity is falsely used.
On the other hand, the embodiment of the invention also provides anti-tamper identity cards to acquire Verification System comprising: Ke Huguan System's management (Customer Relationship Management, CRM) module includes using for receive service terminal upload The work order of the ID card information at family extracts the identity card text information and identity card picture information of user from work order;Identity card Deciphering module, the real identity card for the user identity obtained from service terminal card encryption data decryption to be reduced to user are believed Breath, and real identity card information is sent to service terminal, service terminal generates work order, true body according to real identity card information Part card information includes real identity card text information and real identity card photographic intelligence;Verification management module, being used for will be from work order The identity card text information of middle extraction compare for the first time with real identity card text information;Face recognition module, being used for will The identity card picture information extracted from work order is compared for the second time with real identity card photographic intelligence;If compared for the first time The result compared with second is consistent, then verification management module determines that the ID card information of work order is true, CRM module Determine that work order audit passes through according to the instruction of verification management module.
One side according to an embodiment of the present invention, if the result of any one of comparison for the first time, second of comparison is not Unanimously, then verification management module determines the ID card information in work order in the presence of distorting and forging, and CRM module manages mould according to verification The instruction of block determines that work order audit does not pass through, and issues warning information.
One side according to an embodiment of the present invention, CRM module are further used for obtaining the transacting business that service terminal uploads User be the information of true man, and obtain service terminal interception user scene photograph;Face recognition module is further used for The scene photograph of the user of interception is carried out third time with real identity card photographic intelligence to compare, if the result that third time compares To be consistent, then CRM module keeps the true ID card information of user.
One side according to an embodiment of the present invention, if the result that third time compares is inconsistent, CRM module, which issues, is accused Alert information.
One side according to an embodiment of the present invention, the business that CRM module is further used for service terminal based on the received are done Reason request generates work order number, and work order number is sent to service terminal, and the work order that service terminal uploads includes work order number information.
On the other hand, the embodiment of the invention also provides a kind of anti-tamper identity cards to acquire authenticating device, comprising: storage Device is stored with computer program instructions;Processor is realized foregoing anti-when computer program instructions are executed by processor The identity card acquisition authentication method distorted.
On the other hand, the embodiment of the invention also provides a kind of computer storage medium, computer readable storage medium packets Instruction is included, when instruction is run on computers, so that computer executes foregoing anti-tamper identity card and acquires certification Method.
Anti-tamper identity card provided in an embodiment of the present invention acquires Verification System, increases identity card decryption mould in rear end Block, verification management module and face recognition module carry out the identity card text information of user and identity card picture information one by one It compares, and the interaction and comparison of data are carried out in rear end, front-end business terminal is unable to control and distorts, can be effectively avoided The ID card information of user is forged, distorts and the problem of user identity is falsely used.
Detailed description of the invention
The feature, advantage and technical effect of exemplary embodiment of the present described below with reference to the accompanying drawings.
Fig. 1 is the flow diagram of the anti-tamper identity card acquisition authentication method of one kind provided in an embodiment of the present invention;
Fig. 2 is the diagrammatic view in principle frame of the anti-tamper identity card acquisition Verification System of one kind provided in an embodiment of the present invention Figure.
Specific embodiment
Embodiments of the present invention are described in further detail with reference to the accompanying drawings and examples.Following embodiment it is detailed Thin description and attached drawing cannot be used to limit the scope of the invention for illustratively illustrating the principle of the present invention, i.e., of the invention It is not limited to described embodiment.
In the description of the present invention, it should be noted that unless otherwise indicated, term " first ", " second ", " third " etc. It is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
For a better understanding of the present invention, it is adopted below with reference to anti-tamper identity card of the Fig. 1 to Fig. 2 to the embodiment of the present invention Collection authentication method and system is described in detail.
Refering to fig. 1, the embodiment of the invention provides a kind of anti-tamper identity cards to acquire authentication method, and this method is by rear end Application server and service terminal two parts of front end realize jointly.Anti-tamper identity card acquires authentication method
Step S1 obtains the user identity that service terminal is sent and demonstrate,proves encryption data, the real identity card of decryption also original subscriber Information, and real identity card information is sent to service terminal, real identity card information include real identity card text information and Real identity card photographic intelligence.
Service terminal is the client hardware of transacting business, can be computer and is also possible to intelligent hand-held terminal, Huo Zheqi The equipment that can log in internet transacting business of his form.Need to install specific service terminal software on service terminal, and It is interacted with identity card read module to complete mutual business handling work.
Step S2 receives the work order for the ID card information including user that service terminal uploads.
Service terminal generates work order according to the real identity card information of the user after decryption reduction, and after work order is uploaded to The application server at end.It should be noted that the ID card information uploaded may be installed in the hacker in service terminal herein Software is distorted and is forged, therefore subsequent needs verify the ID card information uploaded herein.
Step S3 extracts the identity card text information of user from work order, and by identity card text information and true identity It demonstrate,proves text information and carries out first time comparison.
Identity card text information includes the word contents such as name, ID card No., the home address of user.
Step S4 extracts the identity card picture information of user from work order, and by identity card picture information and true identity It demonstrate,proves photographic intelligence and carries out second of comparison.
Step S5 determines the ID card information of work order if the result that comparison is compared with second for the first time is consistent It is true.At this point, work order audit passes through, subsequent business handling can be carried out.
Further, if the result of any one of comparison for the first time, second of comparison is inconsistent, determine in work order ID card information exist and distort and forge, and issue warning information.At this point, work order audit does not pass through, real-name authentication, which exists, is asked Topic can not carry out subsequent opening an account, changing the business handlings such as card.
Work order after the approval, further wrap by anti-tamper identity card acquisition authentication method provided in an embodiment of the present invention It includes:
Step S6, the user for obtaining the transacting business that service terminal uploads is the information of true man.
Service terminal carries out vivo identification to user by movement alignment programs, judges whether user is that true man are carrying out industry Business is handled.
Step S7 obtains the scene photograph of the user of service terminal interception, and by scene photograph and real identity card photo Information carries out third time comparison.
Step S8, if third time compare result be it is consistent, keep the true ID card information of user.
Further, if the result of third time comparison is inconsistent, warning information is issued.At this time, it is possible to not be to use Family is with oneself identity card transacting business, and warning information can handle personnel with reminding business and further check, such as core The power of attorney information etc. that related service is handled by onsite user to the authorization of identity card signature, prevents identity card from being emitted by other people The problems such as using.
In addition, anti-tamper identity card acquisition authentication method provided in an embodiment of the present invention further comprises: according to reception The business handling request of service terminal generate work order number, and work order number is sent to service terminal, the work that service terminal uploads It singly further comprise work order number information.Work order number is as the unique identification in entire identity card acquisition verification process, the industry of front end The application server of business terminal and rear end is both needed to carry this work order number when interacting, convenient for inquiry.
Anti-tamper identity card provided in an embodiment of the present invention acquires authentication method, including identity card decryption, identity card text Word information comparison, identity card picture information comparison, vivo identification, reciprocity five links of testimony of a witness ratio, it is possible to prevente effectively from user ID card information is forged, distorts the problem of falsely using with user identity.
Referring to Fig.2, the embodiment of the invention also provides a kind of anti-tamper identity cards to acquire Verification System, i.e., after above-mentioned The application system at end completes identity card acquisition verification process with the service terminal of front end jointly.It is installed on service terminal specific Service terminal software, and interact with identity card read module to complete mutual business handling work.
Identity card read module can be the near-field communication being built in service terminal such as intelligent hand-held terminal equipment (Near Field Communication, NFC) module, one end of service terminal software are interacted with NFC module, the other end with Communication module interaction, and Verification System is acquired by wire/radio network and anti-tamper identity card and carries out data interaction.
Identity card read module is also possible to the external RFID identity card read module on service terminal such as computer, It is connected to service terminal software by USB/ blue tooth interface, computer has wire/radio network interface, and service terminal software passes through Wire/radio network and anti-tamper identity card acquisition Verification System carry out data interaction.
The identity card that identity card read module stores in the identity card according to the instruction reading user of service terminal encrypts number According to, and send service terminal to.Using from the prior art has the card reader of security module different, and identity card read module only has Standby radio-frequency module and control module, the identity card encryption data after reading are transmitted directly to the application server of rear end, make card reading The cost of device reduces about 70%.If being not necessarily to cost using the mobile phone with NFC module.
Anti-tamper identity card acquisition Verification System includes: CRM module 10, identity card deciphering module 20, verification management mould Block 30 and face recognition module 40.
CRM module 10 is used to receive the work order of the ID card information including user of service terminal upload, mentions from work order Take the identity card text information and identity card picture information at family.
The user identity card encryption data decryption that identity card deciphering module 20 is used to obtain from service terminal is reduced to use The real identity card information at family, and real identity card information is sent to service terminal, service terminal is believed according to real identity card Breath generates work order, and real identity card information includes real identity card text information and real identity card photographic intelligence.
The identity card text information and real identity card text information that verification management module 30 is used to extract from work order Carry out first time comparison.
The identity card picture information and real identity card photographic intelligence that face recognition module 40 is used to extract from work order Second is carried out to compare.
If compared for the first time, the result compared with second is consistent, and verification management module 30 determines the identity of work order Card information be it is true, CRM module 10 according to the instruction of verification management module 30 judgement work order audit passes through.
If compared for the first time, the result of any one of comparison is inconsistent for the second time, the judgement of verification management module 30 ID card information in work order, which exists, to be distorted and forges, and CRM module 10 determines that work order is examined according to the instruction of verification management module 30 Core does not pass through, and issues warning information.
The user that CRM module 10 is further used for obtaining the transacting business that service terminal uploads is the information of true man, and obtains The scene photograph for the user for taking service terminal to intercept.
Face recognition module 40 be further used for the user that will be intercepted scene photograph and real identity card photographic intelligence into Row compares for the third time, if the result that third time compares is consistent, the true identity card letter of the holding user of CRM module 10 Breath.
In addition, the business handling request that CRM module 10 is further used for service terminal based on the received generates work order number, and Work order number is sent to service terminal, the work order that service terminal uploads includes work order number information.Work order number is as entire identity card The unique identification in verification process is acquired, the service terminal of front end and the application server of rear end are both needed to carry this when interacting Work order number, convenient for inquiry.
It is understood that anti-tamper identity card acquisition Verification System provided in an embodiment of the present invention is aforementioned anti-tamper Identity card acquisition authentication method executing subject, may refer to aforementioned anti-tamper body about the specific executive mode of each module The content of part card acquisition authentication method, details are not described herein.
Anti-tamper identity card provided in an embodiment of the present invention acquires Verification System, increases identity card decryption mould in rear end Block 20, verification management module 30 and face recognition module 40, by the identity card text information of user and identity card picture information into Row compares one by one, and the interaction and comparison of data are carried out in rear end, and front-end business terminal is unable to control and distorts, can be effective Ground avoids the problem that the ID card information of user is forged, distorts and user identity is falsely used.
In addition, the embodiment of the invention also provides a kind of anti-tamper identity cards to acquire authenticating device, comprising: memory, It is stored with computer program instructions;Processor realizes anti-as previously described usurp when computer program instructions are executed by processor The identity card acquisition authentication method changed.
In addition, computer readable storage medium includes referring to the embodiment of the invention also provides a kind of computer storage medium It enables, when instruction is run on computers, so that computer executes foregoing anti-tamper identity card and acquires authentication method.
Although by reference to preferred embodiment, invention has been described, the case where not departing from the scope of the present invention Under, various improvement can be carried out to it and can replace component therein with equivalent.Especially, as long as there is no structures to rush Prominent, items technical characteristic mentioned in the various embodiments can be combined in any way.The invention is not limited to texts Disclosed in predetermined embodiment, but include all technical solutions falling within the scope of the claims.

Claims (12)

1. a kind of anti-tamper identity card acquires authentication method, which comprises the steps of:
It obtains the user identity that service terminal is sent and demonstrate,proves encryption data, the real identity card information of decryption also original subscriber, and by institute State real identity card information and be sent to the service terminal, the real identity card information include real identity card text information and Real identity card photographic intelligence;
Receive the work order for the ID card information including user that service terminal uploads;
The identity card text information of user is extracted from the work order, and by the identity card text information and the true identity It demonstrate,proves text information and carries out first time comparison;
The identity card picture information of user is extracted from the work order, and by the identity card picture information and the true identity It demonstrate,proves photographic intelligence and carries out second of comparison;
If the first time comparison and second of result compared are consistent, the identity card of the work order is determined Information is true.
2. anti-tamper identity card according to claim 1 acquires authentication method, which is characterized in that if the first time The result of any one of comparison, second of comparison is inconsistent, then determines that the ID card information in the work order exists and usurp Change and forge, and issues warning information.
3. anti-tamper identity card according to claim 1 acquires authentication method, which is characterized in that further comprise:
The user for obtaining the transacting business that service terminal uploads is the information of true man;
The scene photograph of the user of service terminal interception is obtained, and by the scene photograph and the real identity card photographic intelligence Carry out third time comparison;
If the result that the third time compares be it is consistent, keep the true ID card information of user.
4. anti-tamper identity card according to claim 3 acquires authentication method, which is characterized in that if the third time The result of comparison is inconsistent, then issues warning information.
5. anti-tamper identity card according to claim 1 acquires authentication method, which is characterized in that further comprise: root Work order number is generated according to the business handling request of received service terminal, and the work order number is sent to service terminal, business is whole The work order that end uploads further comprises the work order number information.
6. a kind of anti-tamper identity card acquires Verification System characterized by comprising
Manageming contacts CRM module (10), the work order of the ID card information including user for receiving service terminal upload, The identity card text information and identity card picture information of user are extracted from the work order;
Identity card deciphering module (20), for the user identity obtained from service terminal card encryption data decryption to be reduced to user Real identity card information, and the real identity card information is sent to service terminal, service terminal is according to the true body Part card information generates the work order, and the real identity card information includes real identity card text information and real identity card photo Information;
Verification management module (30), for by the identity card text information extracted from the work order and the true identity It demonstrate,proves text information and carries out first time comparison;
Face recognition module (40), for by the identity card picture information extracted from the work order and the true identity It demonstrate,proves photographic intelligence and carries out second of comparison;
If the first time comparison and second of result compared are consistent, described in verification management module (30) judgement The ID card information of work order be it is true, the CRM module (10) according to the instruction of the verification management module (30) determine institute Work order audit is stated to pass through.
7. anti-tamper identity card according to claim 6 acquires Verification System, which is characterized in that if the first time The result of any one of comparison, second of comparison is inconsistent, then the verification management module (30) determines the work order On ID card information exist distort and forge, the CRM module (10) is sentenced according to the instruction of the verification management module (30) The fixed work order audit does not pass through, and issues warning information.
8. anti-tamper identity card according to claim 6 acquires Verification System, which is characterized in that
The CRM module (10) be further used for obtain service terminal upload transacting business user be true man information, and Obtain the scene photograph of the user of service terminal interception;
The face recognition module (40) is further used for the scene photograph and the real identity card for the user that will be intercepted Photographic intelligence carries out third time comparison, if the result that the third time compares is consistent, CRM module (10) holding The true ID card information of user.
9. anti-tamper identity card according to claim 8 acquires Verification System, which is characterized in that if the third time The result of comparison is inconsistent, then the CRM module (10) issues warning information.
10. anti-tamper identity card according to claim 6 acquires Verification System, which is characterized in that the CRM module (10) the business handling request for being further used for service terminal based on the received generates work order number, and the work order number is sent to Service terminal, the work order that service terminal uploads includes the work order number information.
11. a kind of anti-tamper identity card acquires authenticating device characterized by comprising
Memory is stored with computer program instructions;
Processor is realized as described in claim any one of 1-5 when the computer program instructions are executed by the processor Anti-tamper identity card acquire authentication method.
12. a kind of computer readable storage medium, which is characterized in that
The computer readable storage medium includes instruction, when described instruction is run on computers, so that computer executes Anti-tamper identity card as described in any one in claim 1-5 acquires authentication method.
CN201711429044.6A 2017-12-26 2017-12-26 Anti-tamper identity card acquisition authentication method, system, equipment and storage medium Pending CN109960989A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711429044.6A CN109960989A (en) 2017-12-26 2017-12-26 Anti-tamper identity card acquisition authentication method, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711429044.6A CN109960989A (en) 2017-12-26 2017-12-26 Anti-tamper identity card acquisition authentication method, system, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109960989A true CN109960989A (en) 2019-07-02

Family

ID=67021771

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711429044.6A Pending CN109960989A (en) 2017-12-26 2017-12-26 Anti-tamper identity card acquisition authentication method, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109960989A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111697694A (en) * 2020-06-02 2020-09-22 广西电网有限责任公司电力科学研究院 Power distribution terminal near-end maintenance identity authentication method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100169223A1 (en) * 2007-06-13 2010-07-01 Alibaba Group Holding Limited Payment System and Method Using an IC Identification Card
CN104966035A (en) * 2015-05-20 2015-10-07 李明 Identity card information acquiring method, device, and system
CN105187219A (en) * 2015-09-30 2015-12-23 山东信通电子股份有限公司 Method for preventing tampering of identity information in real name authentication
CN105245340A (en) * 2015-09-07 2016-01-13 天地融科技股份有限公司 Identity authentication method based on remote account opening and system
CN106911719A (en) * 2017-04-20 2017-06-30 努比亚技术有限公司 A kind of mobile terminal and the real-name management system based on the mobile terminal
CN106980807A (en) * 2017-03-30 2017-07-25 李燎原 A kind of identity card safety applications system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100169223A1 (en) * 2007-06-13 2010-07-01 Alibaba Group Holding Limited Payment System and Method Using an IC Identification Card
CN104966035A (en) * 2015-05-20 2015-10-07 李明 Identity card information acquiring method, device, and system
CN105245340A (en) * 2015-09-07 2016-01-13 天地融科技股份有限公司 Identity authentication method based on remote account opening and system
CN105187219A (en) * 2015-09-30 2015-12-23 山东信通电子股份有限公司 Method for preventing tampering of identity information in real name authentication
CN106980807A (en) * 2017-03-30 2017-07-25 李燎原 A kind of identity card safety applications system
CN106911719A (en) * 2017-04-20 2017-06-30 努比亚技术有限公司 A kind of mobile terminal and the real-name management system based on the mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111697694A (en) * 2020-06-02 2020-09-22 广西电网有限责任公司电力科学研究院 Power distribution terminal near-end maintenance identity authentication method and system

Similar Documents

Publication Publication Date Title
US10929849B2 (en) Method and a system for performing 3D-based identity verification of individuals with mobile devices
US20220122051A1 (en) Method and system for securing transactions in a point of sale
US20160071101A1 (en) Selfie financial security transaction system
US11847651B2 (en) Systems and methods for facilitating biometric tokenless authentication for services
CN105227307A (en) Auth method and system and server data processing method and server
CN106788972A (en) A kind of train ticket self-help ticket-buying fetching system based on block chain authentication
CN104935441B (en) A kind of authentication method and relevant apparatus, system
CN103606084A (en) Mobile on-line payment method and system based on biometric features recognition
CN105550928A (en) System and method of network remote account opening for commercial bank
CN108073820A (en) Security processing, device and the mobile terminal of data
KR101240231B1 (en) A mobile phone id card security system
US20240311595A1 (en) Systems and methods for point of sale age verification
TWI619042B (en) System and method for online transaction security, SIM card, mobile phone and online transaction system realized by the method
KR20150053663A (en) Multi-channel authentication using the mobile terminal and the financial transfer method and system
CN108122108A (en) Mobile device authentication system and mobile equipment authentication method
US20190019189A1 (en) Payment authentication
CN104935550A (en) Intelligent electronic commerce user management system technique and operating method thereof
CN109960989A (en) Anti-tamper identity card acquisition authentication method, system, equipment and storage medium
CN102938116A (en) Full-link protection and management method for ensuring safety of transaction
CN103475623B (en) Dynamic bar codes Verification System and its authentication method
CN109426461A (en) A kind of printer security control chip
CN114666786A (en) Identity authentication method and system based on telecommunication smart card
US20190325427A1 (en) Contactless device and method for generating a unique temporary code
CN107590653B (en) Payment method, terminal and system
US11178544B2 (en) Image capture for identity verification and recordation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190702