CN110516581A - The recognition methods of automobile leasing platform user information security, system and electronic equipment - Google Patents
The recognition methods of automobile leasing platform user information security, system and electronic equipment Download PDFInfo
- Publication number
- CN110516581A CN110516581A CN201910774142.6A CN201910774142A CN110516581A CN 110516581 A CN110516581 A CN 110516581A CN 201910774142 A CN201910774142 A CN 201910774142A CN 110516581 A CN110516581 A CN 110516581A
- Authority
- CN
- China
- Prior art keywords
- information
- user
- image
- identity certificate
- user information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/50—Information retrieval; Database structures therefor; File system structures therefor of still image data
- G06F16/58—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/583—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0645—Rental transactions; Leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/20—Image preprocessing
- G06V10/22—Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
Abstract
The present invention provides a kind of automobile leasing platform user information security recognition methods, include the following steps: to receive the registration information that user terminal is sent, which includes effective identity certificate image;Identify the effective identity certificate image information;Obtain the facial image of the user;The facial image and effective identity certificate image are identified;Verify the registration information.User information safety recognition methods provided by the invention can carry out truth identification to user information, it is ensured that the authenticity and safety for the user that hires a car, while improving reliability of service.
Description
Technical field
The present invention relates to identification technology fields, identify in particular to a kind of automobile leasing platform user information security
Method, system and electronic equipment.
Background technique
With the development of development of Mobile Internet technology, increasingly by the various delinquent and risks of internet generation
More, information security, the property safety of citizen cannot ensure.Traditional automobile leasing only provides simple user's information note
Volume and management system can not be directed to user's information authenticity, and validity is supervised, this provides service for platform and brings peace
Entirely, the hidden danger such as supervision, management.
Therefore, in the research and development long-term to automobile leasing management system, inventor to user information it is true and false distinguish into
One of it has gone a large amount of research, has proposed a kind of user information safety recognition methods, system, to solve the above technical problems.
Summary of the invention
The purpose of the present invention is to provide a kind of user information safety recognition methods, system and electronic equipments, are able to solve
At least one technical problem mentioned above.Concrete scheme is as follows:
Specific embodiment according to the present invention, in a first aspect, the present invention provides a kind of automobile leasing platform user information
Safety recognizing method includes the following steps: the registration information for receiving user terminal transmission, which includes effective identity card
Part image;Identify the effective identity certificate image information;Obtain the facial image of the user;By the facial image with have
Effect identity document image is identified;Verify the registration information.
Specific embodiment according to the present invention, second aspect, the present invention provide a kind of automobile leasing platform user information
Secure identification system, comprising: receiving module, for receiving the registration information of user terminal transmission, which includes effective
Identity document image;First identification module, for identification the effective identity certificate image information;Module is obtained, for obtaining
User's facial image;Second identification module, for identifying the facial image and effective identity certificate image;Core
Real module, for verifying the registration information.
Specific embodiment according to the present invention, the third aspect, the present invention provide a kind of electronic equipment, comprising: one or
Multiple processors;Storage device, for storing one or more programs, when one or more of programs are by one or more
When a processor executes, so that one or more of processors realize the as above any one automobile leasing platform user respectively
Information security recognition methods.
The above scheme of the embodiment of the present invention compared with prior art, at least has the advantages that by by user
Registration information is matched with facial image, and combines the verification of public security system, carries out truth identification to user information, it is ensured that rent
The authenticity and safety at automobile-used family, while improving reliability of service.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.It should be evident that the accompanying drawings in the following description is only the present invention
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.In the accompanying drawings:
Fig. 1 shows the flow chart of automobile leasing platform user information security recognition methods according to an embodiment of the present invention;
Fig. 2 shows the structural representations of automobile leasing platform user information security identifying system according to an embodiment of the present invention
Figure;
Fig. 3 shows the electronic equipment attachment structure schematic diagram of embodiment according to the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into
It is described in detail to one step, it is clear that described embodiments are only a part of the embodiments of the present invention, rather than whole implementation
Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts
All other embodiment, shall fall within the protection scope of the present invention.
The term used in embodiments of the present invention is only to be not intended to be limiting merely for for the purpose of describing particular embodiments
The present invention.In the embodiment of the present invention and the "an" of singular used in the attached claims, " described " and "the"
It is also intended to including most forms, unless the context clearly indicates other meaning, " a variety of " generally comprise at least two.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation for describing affiliated partner, indicate
There may be three kinds of relationships, for example, A and/or B, can indicate: individualism A, exist simultaneously A and B, individualism B these three
Situation.In addition, character "/" herein, typicallys represent the relationship that forward-backward correlation object is a kind of "or".
It will be appreciated that though may be described in embodiments of the present invention using term first, second, third, etc..,
But these ... it should not necessarily be limited by these terms.These terms be only used to by ... distinguish.For example, not departing from implementation of the present invention
In the case where example range, first ... can also be referred to as second ..., and similarly, second ... can also be referred to as the
One ....
Depending on context, word as used in this " if ", " if " can be construed to " ... when " or
" when ... " or " in response to determination " or " in response to detection ".Similarly, context is depended on, phrase " if it is determined that " or " such as
Fruit detection (condition or event of statement) " can be construed to " when determining " or " in response to determination " or " when detection (statement
Condition or event) when " or " in response to detection (condition or event of statement) ".
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
Include, so that commodity or device including a series of elements not only include those elements, but also including not clear
The other element listed, or further include for this commodity or the intrinsic element of device.In the feelings not limited more
Under condition, the element that is limited by sentence "including a ...", it is not excluded that in the commodity or device for including the element also
There are other identical elements.
The alternative embodiment that the invention will now be described in detail with reference to the accompanying drawings.
Embodiment 1
Referring to Fig. 1, the embodiment of the present invention provides a kind of automobile leasing platform user information security recognition methods, this method
Include the following steps:
S11 receives the registration information that user terminal is sent, which includes effective identity certificate image.
In this step, the user terminal can be mobile phone, tablet computer, personal digital assistant (Personal
Digital Assistant, PDA), the intelligent terminals such as wearable device (for example, smartwatch, intelligent glasses etc.) either its
Its any suitable electronic equipment.User terminal can pass through internet, wide area network, Metropolitan Area Network (MAN), local area network, Virtual Private Network
(Virtual Private Network, VPN) etc. realizes communication interaction with server, to receive the number of user terminal input
According to.
The effective identity certificate can be the additional clauses such as identity card, driver's license, residence permit or passport at least one.This
In embodiment, the effective identity certificate image includes identity card front and back sides photo and driver's license front and back sides photo.The registration
Information further comprises name, cell-phone number.
S12 identifies the effective identity certificate image information.
In this step, the identification effective identity certificate image information is right using image recognition technology (OCR)
The effective identity certificate image is scanned, and obtains the accurate information on certificate.Described image identification, which refers to, utilizes calculating
Machine is handled and is analyzed to image, to identify the technology of various different targets and object.Described image recognition methods is unlimited, can
Using image-recognizing method in the prior art.
Described image information includes that can represent the unique identification of the user, such as identification card number, driver license number, family
The information such as address, cell-phone number.In the present embodiment, described image information includes that ID card No. in ID Card Image and family live
Location, the drivers license number in driver's license image and validity period.
In the present embodiment, the method for identifying the effective identity certificate image information includes: to believe the perfect instrument image
Breath is sent to server, which carries out feature identification to described image information and obtain recognition result.
S13 obtains user's facial image.
In this step, the mode for obtaining user's facial image is unlimited, can be user and directly uploads face image,
It can also be and be acquired by face image of the image acquiring sensor to user.Described image acquisition sensor may be disposed at hand
The smart machines such as machine or computer.In the present embodiment, the facial image is submitted by user's registration platform of hiring a car.
S14 identifies the facial image and effective identity certificate image.
In this step, facial image is identified using face recognition technology, that is to say, that by the facial image
It is compared with the user picture in the effective identity certificate image, judges whether it is same people.
The face recognition technology is all made of face identification method in the prior art.Existing face recognition technology is general
It is that face inspection that is, by the collected facial image of camera, is carried out to the collected facial image based on facial image
Survey, Face detection and feature extraction;Then, it is compared, is realized by the feature and the feature in pre-stored characteristics library extracted
Recognition of face.
S15 verifies the registration information.
In this step, by being docked with public security system interface, the registration information of the user is verified again, really
Breath information-preserving is authentic and valid to have no illegal information.Specifically, the method for verifying registration information includes: and public security system phase intercommunication
Letter, the registration information and the archive information in public security system are compared.
User information safety recognition methods provided in an embodiment of the present invention by register customers as information and facial image into
Row matching and identification, and the verification of public security system is combined, truth identification is carried out to user information, it is ensured that the authenticity for the user that hires a car
And safety, while improving reliability of service.
Embodiment 2
Referring to Fig. 2, the embodiment of the present invention provides a kind of automobile leasing platform user information security identifying system 20, this is
System 20 includes receiving module 21, and for receiving the registration information of user terminal transmission, which includes effective identity certificate
Image;First identification module 22, for identification the effective identity certificate image information;Module 23 is obtained, it is described for obtaining
User's facial image;Second identification module 24, for identifying the facial image and effective identity certificate image;It verifies
Module 25, for verifying the registration information.
The user terminal can be mobile phone, tablet computer, personal digital assistant (Personal Digital
Assistant, PDA), the intelligent terminals such as wearable device (for example, smartwatch, intelligent glasses etc.) it is either other any suitable
Electronic equipment.User terminal can pass through internet, wide area network, Metropolitan Area Network (MAN), local area network, Virtual Private Network (Virtual
Private Network, VPN) etc. with server realize communication interaction, thus receive user terminal input data.
The effective identity certificate can be the additional clauses such as identity card, driver's license, residence permit or passport at least one.This
In embodiment, the effective identity certificate image includes identity card front and back sides photo and driver's license front and back sides photo.The registration
Information further comprises name, cell-phone number.
First identification module 22 sweeps the effective identity certificate image using image recognition technology (OCR)
It retouches, and obtains the accurate information on certificate.Described image identification, which refers to, to be handled and is analyzed to image using computer, to know
The technology of not various different targets and object.Described image recognition methods is unlimited, and image recognition side in the prior art can be used
Method.
Described image information includes that can represent the unique identification of the user, such as identification card number, driver license number, family
The information such as address, cell-phone number.In the present embodiment, described image information includes that ID card No. in ID Card Image and family live
Location, the drivers license number in driver's license image and validity period.
In the present embodiment, the method that first identification module 22 identifies the effective identity certificate image information includes:
The perfect instrument image information is sent to server, which carries out feature identification to described image information and identified
As a result.
The mode that the acquisition module 23 obtains user's facial image is unlimited, can be user and directly uploads face's figure
Picture can also be acquired by face image of the image acquiring sensor to user.Described image acquisition sensor may be disposed at
The smart machines such as mobile phone or computer.In the present embodiment, the facial image is submitted by user's registration platform of hiring a car.
Second identification module 24 identifies facial image using face recognition technology, that is to say, that will be described
Facial image is compared with the user picture in the effective identity certificate image, judges whether it is same people.
The face recognition technology is all made of face identification method in the prior art.Existing face recognition technology is general
It is that face inspection that is, by the collected facial image of camera, is carried out to the collected facial image based on facial image
Survey, Face detection and feature extraction;Then, it is compared, is realized by the feature and the feature in pre-stored characteristics library extracted
Recognition of face.
The validating module 25 carries out core again by docking with public security system interface, to the registration information of the user
It is real, it is ensured that information truth effectively has no illegal information.Specifically, the method for 25 registration information of validating module includes: and public affairs
Peace system is in communication with each other, and the registration information and the archive information in public security system are compared.
User information safety identifying system provided in an embodiment of the present invention 20 is by registering customers as information and facial image
It is matched and is identified, and combine the verification of public security system, truth identification is carried out to user information, it is ensured that the user's that hires a car is true
Property and safety, while improving reliability of service.
Embodiment 3
The embodiment of the present invention provides a kind of electronic equipment 300, including memory, processor, is stored on the memory
Computer program, the computer program realize above-mentioned automobile leasing platform user information security identification side when being executed by processor
Method.
Below with reference to Fig. 3, it illustrates the structural representations for the electronic equipment 300 for being suitable for being used to realize the embodiment of the present disclosure
Figure.Terminal device in the embodiment of the present disclosure can include but is not limited to such as mobile phone, laptop, digital broadcasting and connect
Receive device, PDA (personal digital assistant), PAD (tablet computer), PMP (portable media player), car-mounted terminal (such as vehicle
Carry navigation terminal) etc. mobile terminal and such as number TV, desktop computer etc. fixed terminal.Electricity shown in Fig. 3
Sub- equipment is only an example, should not function to the embodiment of the present disclosure and use scope bring any restrictions.
As shown in figure 3, electronic equipment may include processing unit (such as central processing unit, graphics processor etc.) 301,
Random access storage device can be loaded into according to the program being stored in read-only memory (ROM) 302 or from storage device 308
(RAM) program in 303 and execute various movements appropriate and processing.In RAM 303, it is also stored with the behaviour of electronic equipment 300
Various programs and data needed for making.Processing unit 301, ROM 302 and RAM 303 are connected with each other by bus 304.It is defeated
Enter/export (I/O) interface 305 and is also connected to bus 304.
In general, following device can connect to I/O interface 305: including such as touch screen, touch tablet, keyboard, mouse, taking the photograph
As the input unit 306 of head, microphone, accelerometer, gyroscope etc.;Including such as liquid crystal display (LCD), loudspeaker, vibration
The output device 305 of dynamic device etc.;Storage device 308 including such as tape, hard disk etc.;And communication device 309.Communication device
309, which can permit electronic equipment 300, is wirelessly or non-wirelessly communicated with other equipment to exchange data.Although Fig. 3 shows tool
There is the electronic equipment 300 of various devices, it should be understood that being not required for implementing or having all devices shown.It can be with
Alternatively implement or have more or fewer devices.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description
Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium
On computer program, which includes the program code for method shown in execution flow chart.In such reality
It applies in example, which can be downloaded and installed from network by communication device 309, or from storage device 308
It is mounted, or is mounted from ROM 302.When the computer program is executed by processing unit 301, the embodiment of the present disclosure is executed
Method in the above-mentioned function that limits.
It should be noted that the above-mentioned computer-readable medium of the disclosure can be computer-readable signal media or meter
Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not
Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter
The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires
Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage
Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device,
Or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can be it is any include or storage journey
The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this
In open, computer-readable signal media may include in a base band or as the data-signal that carrier wave a part is propagated,
In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to
Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable and deposit
Any computer-readable medium other than storage media, the computer-readable signal media can send, propagate or transmit and be used for
By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium
Program code can transmit with any suitable medium, including but not limited to: electric wire, optical cable, RF (radio frequency) etc. are above-mentioned
Any appropriate combination.
Above-mentioned computer-readable medium can be included in above-mentioned electronic equipment;It is also possible to individualism, and not
It is fitted into the electronic equipment.
Above-mentioned computer-readable medium carries one or more program, when said one or multiple programs are by the electricity
When sub- equipment executes, so that the electronic equipment: obtaining at least two internet protocol addresses;Send to Node evaluation equipment includes institute
State the Node evaluation request of at least two internet protocol addresses, wherein the Node evaluation equipment is internet from described at least two
In protocol address, chooses internet protocol address and return;Receive the internet protocol address that the Node evaluation equipment returns;Its
In, the fringe node in acquired internet protocol address instruction content distributing network.
Alternatively, above-mentioned computer-readable medium carries one or more program, when said one or multiple programs
When being executed by the electronic equipment, so that the electronic equipment: receiving the Node evaluation including at least two internet protocol addresses and request;
From at least two internet protocol address, internet protocol address is chosen;Return to the internet protocol address selected;Wherein,
The fringe node in internet protocol address instruction content distributing network received.
The calculating of the operation for executing the disclosure can be write with one or more programming languages or combinations thereof
Machine program code, above procedure design language include object oriented program language-such as Java, Smalltalk, C+
+, it further include conventional procedural programming language-such as " C " language or similar programming language.Program code can
Fully to execute, partly execute on the user computer on the user computer, be executed as an independent software package,
Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part.
In situations involving remote computers, remote computer can pass through the network of any kind --- including local area network (LAN)
Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service
Provider is connected by internet).
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use
The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually
It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse
Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding
The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction
Combination realize.
Being described in unit involved in the embodiment of the present disclosure can be realized by way of software, can also be by hard
The mode of part is realized.Wherein, the title of unit does not constitute the restriction to the unit itself under certain conditions, for example, the
One acquiring unit is also described as " obtaining the unit of at least two internet protocol addresses ".
Claims (10)
1. a kind of automobile leasing platform user information security recognition methods, which comprises the steps of:
The registration information that user terminal is sent is received, which includes effective identity certificate image;
Identify the effective identity certificate image information;
Obtain the facial image of the user;
The facial image and effective identity certificate image are identified;
Verify the registration information.
2. user information safety recognition methods according to claim 1, which is characterized in that the user terminal includes hand
Machine, computer and plate.
3. user information safety recognition methods according to claim 1, which is characterized in that the effective identity certificate image
Including identity card front and back sides photo and driver's license front and back sides photo.
4. user information safety recognition methods according to claim 1, which is characterized in that the effective identity certificate information
Including ID card No., home address, drivers license number and validity period.
5. user information safety recognition methods according to claim 1, which is characterized in that described to verify the registration information
Method specifically include: be in communication with each other with public security system, the archive information in the registration information and public security system carried out pair
Than.
6. a kind of automobile leasing platform user information security identifying system characterized by comprising
Receiving module, for receiving the registration information of user terminal transmission, which includes effective identity certificate image;
First identification module, for identification the effective identity certificate image information;
Module is obtained, for obtaining user's facial image;
Second identification module, for identifying the facial image and effective identity certificate image;
Validating module, for verifying the registration information.
7. user information safety identifying system according to claim 6, which is characterized in that the effective identity certificate image
Including identity card front and back sides photo and driver's license front and back sides photo.
8. user information safety identifying system according to claim 6, which is characterized in that the first identification module identification
Image information include ID card No., home address, drivers license number and validity period.
9. user information safety identifying system according to claim 6, which is characterized in that the validating module and public security system
System is in communication with each other, and the registration information and the archive information in public security system are compared.
10. a kind of electronic equipment, which is characterized in that including memory, processor, computer journey is stored on the memory
Sequence realizes the user information safety identification side as described in any one of claim 1 to 5 when the computer program is executed by processor
Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910774142.6A CN110516581A (en) | 2019-08-21 | 2019-08-21 | The recognition methods of automobile leasing platform user information security, system and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910774142.6A CN110516581A (en) | 2019-08-21 | 2019-08-21 | The recognition methods of automobile leasing platform user information security, system and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110516581A true CN110516581A (en) | 2019-11-29 |
Family
ID=68626012
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910774142.6A Pending CN110516581A (en) | 2019-08-21 | 2019-08-21 | The recognition methods of automobile leasing platform user information security, system and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110516581A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140351912A1 (en) * | 2013-05-27 | 2014-11-27 | Alibaba Group Holding Limited | Terminal identification method, and method, system and apparatus of registering machine identification code |
CN107464171A (en) * | 2017-08-16 | 2017-12-12 | 芜湖恒天易开软件科技股份有限公司 | User profile of hiring a car authenticity checking method |
CN108197557A (en) * | 2017-12-28 | 2018-06-22 | 深圳云天励飞技术有限公司 | Testimony of a witness consistency check method, terminal device and computer readable storage medium |
CN109862401A (en) * | 2018-12-21 | 2019-06-07 | 深圳创维-Rgb电子有限公司 | Real name register method, device, television set and the readable storage medium storing program for executing of account |
-
2019
- 2019-08-21 CN CN201910774142.6A patent/CN110516581A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140351912A1 (en) * | 2013-05-27 | 2014-11-27 | Alibaba Group Holding Limited | Terminal identification method, and method, system and apparatus of registering machine identification code |
CN107464171A (en) * | 2017-08-16 | 2017-12-12 | 芜湖恒天易开软件科技股份有限公司 | User profile of hiring a car authenticity checking method |
CN108197557A (en) * | 2017-12-28 | 2018-06-22 | 深圳云天励飞技术有限公司 | Testimony of a witness consistency check method, terminal device and computer readable storage medium |
CN109862401A (en) * | 2018-12-21 | 2019-06-07 | 深圳创维-Rgb电子有限公司 | Real name register method, device, television set and the readable storage medium storing program for executing of account |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109672683B (en) | Binding method and binding device of Internet of things equipment and terminal equipment | |
US11861621B2 (en) | Payment risk control method and system | |
TWI710971B (en) | Method and device for scene-based storage of facial information based on blockchain | |
CN102930199A (en) | Safe machine registration in a multi-tenant subscription enviroment | |
WO2022242365A1 (en) | Data encryption method and apparatus, computer device, and storage medium | |
CN107038784B (en) | Safe verification method and device | |
CN111090615A (en) | Method and device for analyzing and processing mixed assets, electronic equipment and storage medium | |
CN109977839A (en) | Information processing method and device | |
CN109495513A (en) | Unsupervised encryption malicious traffic stream detection method, device, equipment and medium | |
CN109493087A (en) | A kind of method, computer installation and computer readable storage medium based on two dimensional code examination Immovable Property Registration information | |
CN108600250A (en) | Authentication method | |
CN109510874A (en) | Electronic certificate method for pushing, device and electronic equipment based on LBS | |
CN109636424A (en) | A kind of management method and relevant device of information of vehicles | |
CN110008345A (en) | Platform service firm industry data aggregate analysis method, device, medium and equipment | |
CN108470179A (en) | Method and apparatus for detecting object | |
CN110188782A (en) | Image similarity determines method, apparatus, electronic equipment and readable storage medium storing program for executing | |
CN109814915A (en) | Method for parameter configuration, device, medium and electronic equipment based on lua | |
CN110503393A (en) | Electronic contract management method, system and electronic equipment for automobile leasing platform | |
CN112687042A (en) | Authentication method, authentication device and electronic equipment | |
CN110516581A (en) | The recognition methods of automobile leasing platform user information security, system and electronic equipment | |
CN109785558A (en) | Door and window alarm method based on artificial intelligence | |
WO2018110723A1 (en) | Payment method and system | |
CN109741474A (en) | Electronic certificate method for pushing, device and electronic equipment based on the behavior of registering | |
CN111178467A (en) | Identity verification method and device based on school bus, storage medium and terminal | |
CN110263721A (en) | Car light setting method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191129 |