CN109960989A - Anti-tamper identity card acquisition authentication method, system, equipment and storage medium - Google Patents
Anti-tamper identity card acquisition authentication method, system, equipment and storage medium Download PDFInfo
- Publication number
- CN109960989A CN109960989A CN201711429044.6A CN201711429044A CN109960989A CN 109960989 A CN109960989 A CN 109960989A CN 201711429044 A CN201711429044 A CN 201711429044A CN 109960989 A CN109960989 A CN 109960989A
- Authority
- CN
- China
- Prior art keywords
- identity card
- information
- work order
- user
- service terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/40—Spoof detection, e.g. liveness detection
- G06V40/45—Detection of the body part being alive
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Bioethics (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to a kind of anti-tamper identity card acquisition authentication method, system, equipment and storage mediums, this method comprises: obtaining the user identity that service terminal is sent demonstrate,proves encryption data, the real identity card information of decryption also original subscriber, and real identity card information is sent to service terminal, real identity card information includes real identity card text information and real identity card photographic intelligence;Receive the work order for the ID card information including user that service terminal uploads;The identity card text information of user is extracted from work order, and identity card text information compare for the first time with real identity card text information;The identity card picture information of user is extracted from work order, and identity card picture information and real identity card photographic intelligence are compared for the second time;If it is consistent to compare the result compared with second for the first time, determine that the ID card information of work order is true.The present invention is it is possible to prevente effectively from the ID card information of user is forged, distorts and the problem of user identity is falsely used.
Description
Technical field
The present invention relates to information security and big data technical fields, recognize more particularly to a kind of anti-tamper identity card acquisition
Card method, system, equipment and storage medium.
Background technique
Special supervision of the real-name authentication as government and industry, it is desirable that user-network access must applicant scene handle, and
Personal identification papers are provided.Currently used integrated identity card letter identification equipment, the name of equipment reading identity card storage,
The encryption information such as birthdate, address, head portrait, and decrypted using built-in safety chip, the data after decryption are passed through into USB
The application software such as Windows, Android, iOS are sent to Bluetooth protocol.
But in actual use, since there are technical leaks for real name verification system, illegal agent is allow to pass through wood
User identity card information is forged and distorted to horse program in the link of subscriber authentication, breaks through the regulatory requirements of real-name authentication, band
Come huge information security and economic risk.
Summary of the invention
The object of the present invention is to provide a kind of anti-tamper identity cards to acquire authentication method and system, can effectively prevent
The ID card information of user is tampered and forges in Internet service application.
On the one hand, the embodiment of the invention provides a kind of anti-tamper identity cards to acquire authentication method comprising following step
It is rapid: to obtain the user identity that service terminal is sent and demonstrate,prove encryption data, the real identity card information of original subscriber is gone back in decryption, and will be true
ID card information is sent to service terminal, and real identity card information includes real identity card text information and real identity card photo
Information;Receive the work order for the ID card information including user that service terminal uploads;The identity card text of user is extracted from work order
Word information, and identity card text information compare for the first time with real identity card text information;User is extracted from work order
Identity card picture information, and identity card picture information and real identity card photographic intelligence are compared for the second time;If the
The primary result compared with second that compares is consistent, then determines that the ID card information of work order is true.
One side according to an embodiment of the present invention, if the result of any one of comparison for the first time, second of comparison is not
Unanimously, then determine that the ID card information in work order exists to distort and forge, and issue warning information.
One side according to an embodiment of the present invention further comprises: obtaining the user for the transacting business that service terminal uploads
It is the information of true man;The scene photograph of the user of service terminal interception is obtained, and scene photograph and real identity card photo are believed
Breath carries out third time comparison;If the result of comparison is consistent for the third time, the true ID card information of user is kept.
One side according to an embodiment of the present invention issues warning information if the result that third time compares is inconsistent.
One side according to an embodiment of the present invention further comprises: the business handling request of service terminal based on the received
Work order number is generated, and the work order number is sent to service terminal, the work order that service terminal uploads further comprises work order number letter
Breath.
Anti-tamper identity card provided in an embodiment of the present invention acquires authentication method, including identity card decryption, identity card text
Word information comparison, identity card picture information comparison, vivo identification, reciprocity five links of testimony of a witness ratio, it is possible to prevente effectively from user
ID card information is forged, distorts and the problem of user identity is falsely used.
On the other hand, the embodiment of the invention also provides anti-tamper identity cards to acquire Verification System comprising: Ke Huguan
System's management (Customer Relationship Management, CRM) module includes using for receive service terminal upload
The work order of the ID card information at family extracts the identity card text information and identity card picture information of user from work order;Identity card
Deciphering module, the real identity card for the user identity obtained from service terminal card encryption data decryption to be reduced to user are believed
Breath, and real identity card information is sent to service terminal, service terminal generates work order, true body according to real identity card information
Part card information includes real identity card text information and real identity card photographic intelligence;Verification management module, being used for will be from work order
The identity card text information of middle extraction compare for the first time with real identity card text information;Face recognition module, being used for will
The identity card picture information extracted from work order is compared for the second time with real identity card photographic intelligence;If compared for the first time
The result compared with second is consistent, then verification management module determines that the ID card information of work order is true, CRM module
Determine that work order audit passes through according to the instruction of verification management module.
One side according to an embodiment of the present invention, if the result of any one of comparison for the first time, second of comparison is not
Unanimously, then verification management module determines the ID card information in work order in the presence of distorting and forging, and CRM module manages mould according to verification
The instruction of block determines that work order audit does not pass through, and issues warning information.
One side according to an embodiment of the present invention, CRM module are further used for obtaining the transacting business that service terminal uploads
User be the information of true man, and obtain service terminal interception user scene photograph;Face recognition module is further used for
The scene photograph of the user of interception is carried out third time with real identity card photographic intelligence to compare, if the result that third time compares
To be consistent, then CRM module keeps the true ID card information of user.
One side according to an embodiment of the present invention, if the result that third time compares is inconsistent, CRM module, which issues, is accused
Alert information.
One side according to an embodiment of the present invention, the business that CRM module is further used for service terminal based on the received are done
Reason request generates work order number, and work order number is sent to service terminal, and the work order that service terminal uploads includes work order number information.
On the other hand, the embodiment of the invention also provides a kind of anti-tamper identity cards to acquire authenticating device, comprising: storage
Device is stored with computer program instructions;Processor is realized foregoing anti-when computer program instructions are executed by processor
The identity card acquisition authentication method distorted.
On the other hand, the embodiment of the invention also provides a kind of computer storage medium, computer readable storage medium packets
Instruction is included, when instruction is run on computers, so that computer executes foregoing anti-tamper identity card and acquires certification
Method.
Anti-tamper identity card provided in an embodiment of the present invention acquires Verification System, increases identity card decryption mould in rear end
Block, verification management module and face recognition module carry out the identity card text information of user and identity card picture information one by one
It compares, and the interaction and comparison of data are carried out in rear end, front-end business terminal is unable to control and distorts, can be effectively avoided
The ID card information of user is forged, distorts and the problem of user identity is falsely used.
Detailed description of the invention
The feature, advantage and technical effect of exemplary embodiment of the present described below with reference to the accompanying drawings.
Fig. 1 is the flow diagram of the anti-tamper identity card acquisition authentication method of one kind provided in an embodiment of the present invention;
Fig. 2 is the diagrammatic view in principle frame of the anti-tamper identity card acquisition Verification System of one kind provided in an embodiment of the present invention
Figure.
Specific embodiment
Embodiments of the present invention are described in further detail with reference to the accompanying drawings and examples.Following embodiment it is detailed
Thin description and attached drawing cannot be used to limit the scope of the invention for illustratively illustrating the principle of the present invention, i.e., of the invention
It is not limited to described embodiment.
In the description of the present invention, it should be noted that unless otherwise indicated, term " first ", " second ", " third " etc.
It is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
For a better understanding of the present invention, it is adopted below with reference to anti-tamper identity card of the Fig. 1 to Fig. 2 to the embodiment of the present invention
Collection authentication method and system is described in detail.
Refering to fig. 1, the embodiment of the invention provides a kind of anti-tamper identity cards to acquire authentication method, and this method is by rear end
Application server and service terminal two parts of front end realize jointly.Anti-tamper identity card acquires authentication method
Step S1 obtains the user identity that service terminal is sent and demonstrate,proves encryption data, the real identity card of decryption also original subscriber
Information, and real identity card information is sent to service terminal, real identity card information include real identity card text information and
Real identity card photographic intelligence.
Service terminal is the client hardware of transacting business, can be computer and is also possible to intelligent hand-held terminal, Huo Zheqi
The equipment that can log in internet transacting business of his form.Need to install specific service terminal software on service terminal, and
It is interacted with identity card read module to complete mutual business handling work.
Step S2 receives the work order for the ID card information including user that service terminal uploads.
Service terminal generates work order according to the real identity card information of the user after decryption reduction, and after work order is uploaded to
The application server at end.It should be noted that the ID card information uploaded may be installed in the hacker in service terminal herein
Software is distorted and is forged, therefore subsequent needs verify the ID card information uploaded herein.
Step S3 extracts the identity card text information of user from work order, and by identity card text information and true identity
It demonstrate,proves text information and carries out first time comparison.
Identity card text information includes the word contents such as name, ID card No., the home address of user.
Step S4 extracts the identity card picture information of user from work order, and by identity card picture information and true identity
It demonstrate,proves photographic intelligence and carries out second of comparison.
Step S5 determines the ID card information of work order if the result that comparison is compared with second for the first time is consistent
It is true.At this point, work order audit passes through, subsequent business handling can be carried out.
Further, if the result of any one of comparison for the first time, second of comparison is inconsistent, determine in work order
ID card information exist and distort and forge, and issue warning information.At this point, work order audit does not pass through, real-name authentication, which exists, is asked
Topic can not carry out subsequent opening an account, changing the business handlings such as card.
Work order after the approval, further wrap by anti-tamper identity card acquisition authentication method provided in an embodiment of the present invention
It includes:
Step S6, the user for obtaining the transacting business that service terminal uploads is the information of true man.
Service terminal carries out vivo identification to user by movement alignment programs, judges whether user is that true man are carrying out industry
Business is handled.
Step S7 obtains the scene photograph of the user of service terminal interception, and by scene photograph and real identity card photo
Information carries out third time comparison.
Step S8, if third time compare result be it is consistent, keep the true ID card information of user.
Further, if the result of third time comparison is inconsistent, warning information is issued.At this time, it is possible to not be to use
Family is with oneself identity card transacting business, and warning information can handle personnel with reminding business and further check, such as core
The power of attorney information etc. that related service is handled by onsite user to the authorization of identity card signature, prevents identity card from being emitted by other people
The problems such as using.
In addition, anti-tamper identity card acquisition authentication method provided in an embodiment of the present invention further comprises: according to reception
The business handling request of service terminal generate work order number, and work order number is sent to service terminal, the work that service terminal uploads
It singly further comprise work order number information.Work order number is as the unique identification in entire identity card acquisition verification process, the industry of front end
The application server of business terminal and rear end is both needed to carry this work order number when interacting, convenient for inquiry.
Anti-tamper identity card provided in an embodiment of the present invention acquires authentication method, including identity card decryption, identity card text
Word information comparison, identity card picture information comparison, vivo identification, reciprocity five links of testimony of a witness ratio, it is possible to prevente effectively from user
ID card information is forged, distorts the problem of falsely using with user identity.
Referring to Fig.2, the embodiment of the invention also provides a kind of anti-tamper identity cards to acquire Verification System, i.e., after above-mentioned
The application system at end completes identity card acquisition verification process with the service terminal of front end jointly.It is installed on service terminal specific
Service terminal software, and interact with identity card read module to complete mutual business handling work.
Identity card read module can be the near-field communication being built in service terminal such as intelligent hand-held terminal equipment
(Near Field Communication, NFC) module, one end of service terminal software are interacted with NFC module, the other end with
Communication module interaction, and Verification System is acquired by wire/radio network and anti-tamper identity card and carries out data interaction.
Identity card read module is also possible to the external RFID identity card read module on service terminal such as computer,
It is connected to service terminal software by USB/ blue tooth interface, computer has wire/radio network interface, and service terminal software passes through
Wire/radio network and anti-tamper identity card acquisition Verification System carry out data interaction.
The identity card that identity card read module stores in the identity card according to the instruction reading user of service terminal encrypts number
According to, and send service terminal to.Using from the prior art has the card reader of security module different, and identity card read module only has
Standby radio-frequency module and control module, the identity card encryption data after reading are transmitted directly to the application server of rear end, make card reading
The cost of device reduces about 70%.If being not necessarily to cost using the mobile phone with NFC module.
Anti-tamper identity card acquisition Verification System includes: CRM module 10, identity card deciphering module 20, verification management mould
Block 30 and face recognition module 40.
CRM module 10 is used to receive the work order of the ID card information including user of service terminal upload, mentions from work order
Take the identity card text information and identity card picture information at family.
The user identity card encryption data decryption that identity card deciphering module 20 is used to obtain from service terminal is reduced to use
The real identity card information at family, and real identity card information is sent to service terminal, service terminal is believed according to real identity card
Breath generates work order, and real identity card information includes real identity card text information and real identity card photographic intelligence.
The identity card text information and real identity card text information that verification management module 30 is used to extract from work order
Carry out first time comparison.
The identity card picture information and real identity card photographic intelligence that face recognition module 40 is used to extract from work order
Second is carried out to compare.
If compared for the first time, the result compared with second is consistent, and verification management module 30 determines the identity of work order
Card information be it is true, CRM module 10 according to the instruction of verification management module 30 judgement work order audit passes through.
If compared for the first time, the result of any one of comparison is inconsistent for the second time, the judgement of verification management module 30
ID card information in work order, which exists, to be distorted and forges, and CRM module 10 determines that work order is examined according to the instruction of verification management module 30
Core does not pass through, and issues warning information.
The user that CRM module 10 is further used for obtaining the transacting business that service terminal uploads is the information of true man, and obtains
The scene photograph for the user for taking service terminal to intercept.
Face recognition module 40 be further used for the user that will be intercepted scene photograph and real identity card photographic intelligence into
Row compares for the third time, if the result that third time compares is consistent, the true identity card letter of the holding user of CRM module 10
Breath.
In addition, the business handling request that CRM module 10 is further used for service terminal based on the received generates work order number, and
Work order number is sent to service terminal, the work order that service terminal uploads includes work order number information.Work order number is as entire identity card
The unique identification in verification process is acquired, the service terminal of front end and the application server of rear end are both needed to carry this when interacting
Work order number, convenient for inquiry.
It is understood that anti-tamper identity card acquisition Verification System provided in an embodiment of the present invention is aforementioned anti-tamper
Identity card acquisition authentication method executing subject, may refer to aforementioned anti-tamper body about the specific executive mode of each module
The content of part card acquisition authentication method, details are not described herein.
Anti-tamper identity card provided in an embodiment of the present invention acquires Verification System, increases identity card decryption mould in rear end
Block 20, verification management module 30 and face recognition module 40, by the identity card text information of user and identity card picture information into
Row compares one by one, and the interaction and comparison of data are carried out in rear end, and front-end business terminal is unable to control and distorts, can be effective
Ground avoids the problem that the ID card information of user is forged, distorts and user identity is falsely used.
In addition, the embodiment of the invention also provides a kind of anti-tamper identity cards to acquire authenticating device, comprising: memory,
It is stored with computer program instructions;Processor realizes anti-as previously described usurp when computer program instructions are executed by processor
The identity card acquisition authentication method changed.
In addition, computer readable storage medium includes referring to the embodiment of the invention also provides a kind of computer storage medium
It enables, when instruction is run on computers, so that computer executes foregoing anti-tamper identity card and acquires authentication method.
Although by reference to preferred embodiment, invention has been described, the case where not departing from the scope of the present invention
Under, various improvement can be carried out to it and can replace component therein with equivalent.Especially, as long as there is no structures to rush
Prominent, items technical characteristic mentioned in the various embodiments can be combined in any way.The invention is not limited to texts
Disclosed in predetermined embodiment, but include all technical solutions falling within the scope of the claims.
Claims (12)
1. a kind of anti-tamper identity card acquires authentication method, which comprises the steps of:
It obtains the user identity that service terminal is sent and demonstrate,proves encryption data, the real identity card information of decryption also original subscriber, and by institute
State real identity card information and be sent to the service terminal, the real identity card information include real identity card text information and
Real identity card photographic intelligence;
Receive the work order for the ID card information including user that service terminal uploads;
The identity card text information of user is extracted from the work order, and by the identity card text information and the true identity
It demonstrate,proves text information and carries out first time comparison;
The identity card picture information of user is extracted from the work order, and by the identity card picture information and the true identity
It demonstrate,proves photographic intelligence and carries out second of comparison;
If the first time comparison and second of result compared are consistent, the identity card of the work order is determined
Information is true.
2. anti-tamper identity card according to claim 1 acquires authentication method, which is characterized in that if the first time
The result of any one of comparison, second of comparison is inconsistent, then determines that the ID card information in the work order exists and usurp
Change and forge, and issues warning information.
3. anti-tamper identity card according to claim 1 acquires authentication method, which is characterized in that further comprise:
The user for obtaining the transacting business that service terminal uploads is the information of true man;
The scene photograph of the user of service terminal interception is obtained, and by the scene photograph and the real identity card photographic intelligence
Carry out third time comparison;
If the result that the third time compares be it is consistent, keep the true ID card information of user.
4. anti-tamper identity card according to claim 3 acquires authentication method, which is characterized in that if the third time
The result of comparison is inconsistent, then issues warning information.
5. anti-tamper identity card according to claim 1 acquires authentication method, which is characterized in that further comprise: root
Work order number is generated according to the business handling request of received service terminal, and the work order number is sent to service terminal, business is whole
The work order that end uploads further comprises the work order number information.
6. a kind of anti-tamper identity card acquires Verification System characterized by comprising
Manageming contacts CRM module (10), the work order of the ID card information including user for receiving service terminal upload,
The identity card text information and identity card picture information of user are extracted from the work order;
Identity card deciphering module (20), for the user identity obtained from service terminal card encryption data decryption to be reduced to user
Real identity card information, and the real identity card information is sent to service terminal, service terminal is according to the true body
Part card information generates the work order, and the real identity card information includes real identity card text information and real identity card photo
Information;
Verification management module (30), for by the identity card text information extracted from the work order and the true identity
It demonstrate,proves text information and carries out first time comparison;
Face recognition module (40), for by the identity card picture information extracted from the work order and the true identity
It demonstrate,proves photographic intelligence and carries out second of comparison;
If the first time comparison and second of result compared are consistent, described in verification management module (30) judgement
The ID card information of work order be it is true, the CRM module (10) according to the instruction of the verification management module (30) determine institute
Work order audit is stated to pass through.
7. anti-tamper identity card according to claim 6 acquires Verification System, which is characterized in that if the first time
The result of any one of comparison, second of comparison is inconsistent, then the verification management module (30) determines the work order
On ID card information exist distort and forge, the CRM module (10) is sentenced according to the instruction of the verification management module (30)
The fixed work order audit does not pass through, and issues warning information.
8. anti-tamper identity card according to claim 6 acquires Verification System, which is characterized in that
The CRM module (10) be further used for obtain service terminal upload transacting business user be true man information, and
Obtain the scene photograph of the user of service terminal interception;
The face recognition module (40) is further used for the scene photograph and the real identity card for the user that will be intercepted
Photographic intelligence carries out third time comparison, if the result that the third time compares is consistent, CRM module (10) holding
The true ID card information of user.
9. anti-tamper identity card according to claim 8 acquires Verification System, which is characterized in that if the third time
The result of comparison is inconsistent, then the CRM module (10) issues warning information.
10. anti-tamper identity card according to claim 6 acquires Verification System, which is characterized in that the CRM module
(10) the business handling request for being further used for service terminal based on the received generates work order number, and the work order number is sent to
Service terminal, the work order that service terminal uploads includes the work order number information.
11. a kind of anti-tamper identity card acquires authenticating device characterized by comprising
Memory is stored with computer program instructions;
Processor is realized as described in claim any one of 1-5 when the computer program instructions are executed by the processor
Anti-tamper identity card acquire authentication method.
12. a kind of computer readable storage medium, which is characterized in that
The computer readable storage medium includes instruction, when described instruction is run on computers, so that computer executes
Anti-tamper identity card as described in any one in claim 1-5 acquires authentication method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711429044.6A CN109960989A (en) | 2017-12-26 | 2017-12-26 | Anti-tamper identity card acquisition authentication method, system, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711429044.6A CN109960989A (en) | 2017-12-26 | 2017-12-26 | Anti-tamper identity card acquisition authentication method, system, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109960989A true CN109960989A (en) | 2019-07-02 |
Family
ID=67021771
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711429044.6A Pending CN109960989A (en) | 2017-12-26 | 2017-12-26 | Anti-tamper identity card acquisition authentication method, system, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109960989A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111697694A (en) * | 2020-06-02 | 2020-09-22 | 广西电网有限责任公司电力科学研究院 | Power distribution terminal near-end maintenance identity authentication method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100169223A1 (en) * | 2007-06-13 | 2010-07-01 | Alibaba Group Holding Limited | Payment System and Method Using an IC Identification Card |
CN104966035A (en) * | 2015-05-20 | 2015-10-07 | 李明 | Identity card information acquiring method, device, and system |
CN105187219A (en) * | 2015-09-30 | 2015-12-23 | 山东信通电子股份有限公司 | Method for preventing tampering of identity information in real name authentication |
CN105245340A (en) * | 2015-09-07 | 2016-01-13 | 天地融科技股份有限公司 | Identity authentication method based on remote account opening and system |
CN106911719A (en) * | 2017-04-20 | 2017-06-30 | 努比亚技术有限公司 | A kind of mobile terminal and the real-name management system based on the mobile terminal |
CN106980807A (en) * | 2017-03-30 | 2017-07-25 | 李燎原 | A kind of identity card safety applications system |
-
2017
- 2017-12-26 CN CN201711429044.6A patent/CN109960989A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100169223A1 (en) * | 2007-06-13 | 2010-07-01 | Alibaba Group Holding Limited | Payment System and Method Using an IC Identification Card |
CN104966035A (en) * | 2015-05-20 | 2015-10-07 | 李明 | Identity card information acquiring method, device, and system |
CN105245340A (en) * | 2015-09-07 | 2016-01-13 | 天地融科技股份有限公司 | Identity authentication method based on remote account opening and system |
CN105187219A (en) * | 2015-09-30 | 2015-12-23 | 山东信通电子股份有限公司 | Method for preventing tampering of identity information in real name authentication |
CN106980807A (en) * | 2017-03-30 | 2017-07-25 | 李燎原 | A kind of identity card safety applications system |
CN106911719A (en) * | 2017-04-20 | 2017-06-30 | 努比亚技术有限公司 | A kind of mobile terminal and the real-name management system based on the mobile terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111697694A (en) * | 2020-06-02 | 2020-09-22 | 广西电网有限责任公司电力科学研究院 | Power distribution terminal near-end maintenance identity authentication method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10929849B2 (en) | Method and a system for performing 3D-based identity verification of individuals with mobile devices | |
US20220122051A1 (en) | Method and system for securing transactions in a point of sale | |
US20160071101A1 (en) | Selfie financial security transaction system | |
US11847651B2 (en) | Systems and methods for facilitating biometric tokenless authentication for services | |
CN105227307A (en) | Auth method and system and server data processing method and server | |
CN106788972A (en) | A kind of train ticket self-help ticket-buying fetching system based on block chain authentication | |
CN104935441B (en) | A kind of authentication method and relevant apparatus, system | |
CN103606084A (en) | Mobile on-line payment method and system based on biometric features recognition | |
CN105550928A (en) | System and method of network remote account opening for commercial bank | |
CN108073820A (en) | Security processing, device and the mobile terminal of data | |
KR101240231B1 (en) | A mobile phone id card security system | |
US20240311595A1 (en) | Systems and methods for point of sale age verification | |
TWI619042B (en) | System and method for online transaction security, SIM card, mobile phone and online transaction system realized by the method | |
KR20150053663A (en) | Multi-channel authentication using the mobile terminal and the financial transfer method and system | |
CN108122108A (en) | Mobile device authentication system and mobile equipment authentication method | |
US20190019189A1 (en) | Payment authentication | |
CN104935550A (en) | Intelligent electronic commerce user management system technique and operating method thereof | |
CN109960989A (en) | Anti-tamper identity card acquisition authentication method, system, equipment and storage medium | |
CN102938116A (en) | Full-link protection and management method for ensuring safety of transaction | |
CN103475623B (en) | Dynamic bar codes Verification System and its authentication method | |
CN109426461A (en) | A kind of printer security control chip | |
CN114666786A (en) | Identity authentication method and system based on telecommunication smart card | |
US20190325427A1 (en) | Contactless device and method for generating a unique temporary code | |
CN107590653B (en) | Payment method, terminal and system | |
US11178544B2 (en) | Image capture for identity verification and recordation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190702 |