CN110932869A - Method, device and equipment for certificate real-name authentication - Google Patents
Method, device and equipment for certificate real-name authentication Download PDFInfo
- Publication number
- CN110932869A CN110932869A CN201911214747.6A CN201911214747A CN110932869A CN 110932869 A CN110932869 A CN 110932869A CN 201911214747 A CN201911214747 A CN 201911214747A CN 110932869 A CN110932869 A CN 110932869A
- Authority
- CN
- China
- Prior art keywords
- certificate
- user
- bound
- information
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000012508 change request Methods 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 9
- 238000010586 diagram Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 3
- 239000010929 jewellery material Substances 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000010437 gem Substances 0.000 description 1
- 229910001751 gemstone Inorganic materials 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000010970 precious metal Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to a method, a device and equipment for real-name certificate authentication, which are applied to the technical field of information management, wherein the method for real-name certificate authentication comprises the steps of obtaining authentication information of a certificate, obtaining identity information of a user to be bound, and establishing an affiliated relationship between the authentication information and the identity information so as to bind the authentication information and the identity information.
Description
Technical Field
The invention relates to the technical field of information management, in particular to a method, a device and equipment for real-name certificate authentication.
Background
The certificate is the proof about academic, skill and physical value obtained by people in learning, working and life, and comprises a academic certificate, a professional certificate, a jewelry appraisal certificate and the like. Taking a jewelry identification certificate as an example, the jewelry identification certificate has the function of displaying identification information such as jewelry materials and the like to a consumer, usually, the consumer obtains relevant information of the certificate in an online inquiry mode, but the display mode of the online inquiry certificate is presented in a webpage mode, and the consumer can only obtain the relevant information of jewelry and cannot contact with a jewelry owner.
Disclosure of Invention
In view of the above, the present invention provides a method, an apparatus, and a device for real-name authentication of a certificate, in order to overcome at least some of the problems in the related art.
In order to solve the technical problems, the invention adopts the following technical scheme:
in a first aspect, a method for real-name certificate authentication includes:
acquiring authentication information of a certificate;
acquiring identity information of a user to be bound;
and establishing the affiliated relationship between the authentication information and the identity information so as to bind the authentication information and the identity information.
Optionally, before the binding the authentication information and the identity information, the method further includes:
determining whether the certificate has been bound;
and if so, unbinding the certificate and the bound user.
Optionally, the unbinding the certificate from the bound user includes:
acquiring a change request sent by the user to be bound;
determining the user with the bound certificate according to the change request;
sending unbinding information to the bound user to unbind the certificate by the bound user.
Optionally, the unbinding the certificate from the bound user includes:
obtaining a complaint request sent by a user, wherein the complaint request comprises a purchase voucher and a change request;
and sending the complaint request to an auditor so as to unbind the certificate when the auditor determines that the purchase voucher belongs to real time.
Optionally, the obtaining authentication information of the certificate includes:
acquiring query information sent by a user to be bound;
and determining the authentication information of the certificate according to the query information.
Optionally, the query information is the number of the certificate or a two-dimensional code including the number of the certificate and a website of the certificate.
Optionally, before obtaining the identity information of the user to be bound, the method further includes:
acquiring a mobile phone number of a user to be bound;
registering according to the mobile phone number to obtain account information of the user to be bound;
and acquiring the identity information of the user to be bound, and adding the identity information into the account information.
Optionally, the identity information includes a name and an identification number of the user to be bound.
In a second aspect, an apparatus for real-name certificate authentication includes:
the first acquisition module is used for acquiring the authentication information of the certificate;
the second acquisition module is used for acquiring the identity information of the user to be bound;
and the binding module is used for establishing the affiliated relationship between the authentication information and the identity information so as to bind the authentication information and the identity information.
In a third aspect, an apparatus for real-name certificate authentication includes:
a processor, and a memory coupled to the processor;
the memory is used for storing a computer program;
the processor is configured to invoke and execute the computer program in the memory to perform the method of certificate real-name authentication according to the first aspect.
In a fourth aspect, a storage medium stores a computer program which, when executed by a processor, implements a method of real-name authentication of a certificate according to any one of the first aspect of the present invention.
By adopting the technical scheme, the invention can realize the following technical effects: according to the method and the device, the authentication information of the certificate and the identity information of the user to be bound are acquired, the affiliation of the authentication information and the identity information is established, and the authentication information and the identity information are bound, so that the user can acquire the information of the person owning the certificate while inquiring the certificate, and if the owner needs to be contacted, the owner can be directly contacted through the owner information acquired after inquiring the certificate, the user can inquire conveniently, and the user can share the certificate conveniently.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating a method for real-name certificate authentication according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a method for real-name certificate authentication according to another embodiment of the present invention;
fig. 3 is a schematic structural diagram of an apparatus for real-name certificate authentication according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a device for real-name certificate authentication according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without any inventive step, are within the scope of the present invention.
Examples
Fig. 1 is a flowchart illustrating a method for real-name certificate authentication according to an embodiment of the present invention. As shown in fig. 1, the present embodiment provides a method for authenticating a certificate with a real name, including:
in some embodiments, the authentication information of the certificate includes a scanned part of the original certificate, a certificate number, a certificate source, and the like. The source of the certificate may be the web address from which the certificate was obtained.
102, acquiring identity information of a user to be bound;
in some embodiments, the user to be bound is a person having the above certificate, and the identity information includes name, gender, contact information, identification number, and the like.
It can be understood that, the acquiring portions of step 101 and step 102 are in order, and may acquire the authentication information first, or may acquire the identity information first.
And 103, establishing the affiliated relationship between the authentication information and the identity information so as to bind the authentication information and the identity information.
According to the method and the device, the authentication information of the certificate and the identity information of the user to be bound are acquired, the affiliation of the authentication information and the identity information is established, and the authentication information and the identity information are bound, so that the user can acquire the information of the person owning the certificate while inquiring the certificate, and if the owner needs to be contacted, the owner can be directly contacted through the owner information acquired after inquiring the certificate, the user can inquire conveniently, and the user can share the certificate conveniently.
Fig. 2 is a flowchart illustrating a method for real-name certificate authentication according to another embodiment of the present invention. As shown in fig. 2, this embodiment takes a certificate as an example of a jewelry authentication certificate, and provides a method for real-name authentication of a certificate, which includes:
in some embodiments, the authentication information of the certificate includes a scanned part of the original certificate, a certificate number, a certificate source, and the like. The source of the certificate may be the web address from which the certificate was obtained.
In some embodiments, the obtaining the authentication information of the certificate specifically includes:
acquiring query information sent by a user to be bound; and determining the authentication information of the certificate according to the query information.
The inquiry information is the serial number of the certificate or a two-dimensional code comprising the serial number of the certificate and the website of the certificate. Usually, the jewelry identification certificate is stored in a management system, and in the process of identifying jewelry or other precious metals and gemstones by an identification mechanism, the identification result detected by an identification instrument is input into the management system, and the identification information is published on line while printing a paper certificate. A certificate is issued for a jewelry appraisal, and the information of the appraisal is kept on line. By utilizing the technology that one certificate corresponds to one two-dimensional code, a user can check the identification result of the jewelry on line by scanning the two-dimensional code on the certificate. In particular, the certificate is stored in a database, and the user can directly input the certificate code in a search box of the management system. The management system can also generate a two-dimensional code for the webpage of each certificate, and when a user wants to inquire, the user directly scans the two-dimensional code to obtain related information.
It can be understood that if a certificate of the user wants to be bound with information of the user, the user needs to register an account and add the information into the account, and in some embodiments, the step of registering the account is provided, which is specifically as follows:
the method includes that account information is registered according to a mobile phone number by some common means, a user firstly inputs the mobile phone number, then obtains a corresponding check code, and inputs an account password after the check is successful, so that account registration is successful.
And 204, acquiring the identity information of the user to be bound, and adding the identity information into the account information.
After the account registration is successful, the user can add the own identity information into the affiliated account information so as to perfect the account information.
When binding is carried out by a user, the identity information of the user can be acquired through a login account.
In some embodiments, the user to be bound is a person having the above certificate, and the identity information includes name, gender, contact information, identification number, and the like. The identity information is obtained after logging in an account.
and step 206, if so, unbinding the certificate and the bound user.
In some embodiments, there is a jewelry transfer situation, a belonger before a jewelry is bound first, and a user to be bound cannot be bound successfully when the user to be bound performs a binding operation, and at this time, the belonger before contact needs to be unbound first, and then the user to be bound binds.
Specifically, the previous operation of unbinding by the belonger may be: the management system confirms the short message sent by the previous mobile phone number of the attribution person, the previous attribution person clicks the short message link to enter the unbinding page, and after logging in by using the mobile phone number, the unbinding is confirmed.
The method specifically comprises the following steps:
acquiring a change request sent by the user to be bound;
determining the user with the bound certificate according to the change request;
sending unbinding information to the bound user to unbind the certificate by the bound user.
In some embodiments, there may be a case where the previous owner information is incomplete, the previous owner cannot be contacted, or the jewelry identification certificate is not bound to the user, at this time, the user to be bound needs to submit a complaint in the management system, the system administrator offline contacts the previous owner, if the contact is successful, the previous owner performs the unbinding operation, and if the user to be bound is not contacted, the administrator needs to upload information such as jewelry materials, certificate photos, invoices, and the like, and then the information is processed by the administrator.
The method specifically comprises the following steps:
obtaining a complaint request sent by a user, wherein the complaint request comprises a purchase voucher and a change request;
and sending the complaint request to an auditor so as to unbind the certificate when the auditor determines that the purchase voucher belongs to real time.
In some embodiments, each bound user is also stored so that subsequent queries can view each transfer record to provide transfer vouchers.
According to the method and the device, the authentication information of the certificate and the identity information of the user to be bound are acquired, the affiliation of the authentication information and the identity information is established, and the authentication information and the identity information are bound, so that the user can acquire the information of the person owning the certificate while inquiring the certificate, and if the owner needs to be contacted, the owner can be directly contacted through the owner information acquired after inquiring the certificate, a transfer certificate is provided for the user, the user can inquire conveniently, and the user sharing is facilitated.
Fig. 3 is a schematic structural diagram of an apparatus for real-name certificate authentication according to an embodiment of the present invention. As shown in fig. 3, the present embodiment provides an apparatus for real-name certificate authentication, including:
a first obtaining module 301, configured to obtain authentication information of a certificate;
a second obtaining module 302, configured to obtain identity information of a user to be bound;
a binding module 303, configured to establish an affiliation between the authentication information and the identity information, so as to bind the authentication information and the identity information.
According to the method and the device, the authentication information of the certificate and the identity information of the user to be bound are acquired, the affiliation of the authentication information and the identity information is established, and the authentication information and the identity information are bound, so that the user can acquire the information of the person owning the certificate while inquiring the certificate, and if the owner needs to be contacted, the owner can be directly contacted through the owner information acquired after inquiring the certificate, a transfer certificate is provided for the user, the user can inquire conveniently, and the user sharing is facilitated.
For a specific implementation of this embodiment, reference may be made to the method for certificate real-name authentication and the related description in the method embodiment described in the foregoing embodiment, and details are not described here again.
Fig. 4 is a schematic structural diagram of an apparatus for real-name certificate authentication according to an embodiment of the present application. Referring to fig. 4, an embodiment of the present application provides an apparatus for certificate real-name authentication, including:
a processor 401, and a memory 402 connected to the processor;
the memory 402 is used to store computer programs;
the processor 401 is adapted to invoke and execute computer programs in the memory 402 to perform the method of certificate real-name authentication as in the above-described embodiments.
For a specific implementation of this embodiment, reference may be made to the method for certificate real-name authentication and the related description in the method embodiment described in the foregoing embodiment, and details are not described here again.
An embodiment of the present invention provides a storage medium, where a computer program is stored, and when the computer program is executed by a processor, the steps in the method, such as certificate real-name authentication, are implemented.
For a specific implementation of this embodiment, reference may be made to the related description in the above method embodiment for certificate real-name authentication, which is not described herein again.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that the terms "first," "second," and the like in the description of the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present invention, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by suitable instruction execution devices. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Claims (10)
1. A method of certificate real-name authentication, comprising:
acquiring authentication information of a certificate;
acquiring identity information of a user to be bound;
and establishing the affiliated relationship between the authentication information and the identity information so as to bind the authentication information and the identity information.
2. The method according to claim 1, wherein before the establishing the affiliation between the authentication information and the identity information, further comprising:
determining whether the certificate has been bound;
and if so, unbinding the certificate and the bound user.
3. The method of claim 2, wherein unbinding the certificate from the bound user comprises:
acquiring a change request sent by the user to be bound;
determining the user with the bound certificate according to the change request;
sending unbinding information to the bound user to unbind the certificate by the bound user.
4. The method of claim 2, wherein unbinding the certificate from the bound user comprises:
obtaining a complaint request sent by a user, wherein the complaint request comprises a purchase voucher and a change request;
and sending the complaint request to an auditor so as to unbind the certificate when the auditor determines that the purchase voucher belongs to real time.
5. The method of claim 1, wherein obtaining the authentication information of the certificate comprises:
acquiring query information sent by a user to be bound;
and determining the authentication information of the certificate according to the query information.
6. The method according to claim 5, wherein the query information is the number of the certificate or a two-dimensional code comprising the number of the certificate and a web address of the certificate.
7. The method according to claim 1, wherein before obtaining the identity information of the user to be bound, the method further comprises:
acquiring a mobile phone number of a user to be bound;
registering according to the mobile phone number to obtain account information of the user to be bound;
and acquiring the identity information of the user to be bound, and adding the identity information into the account information.
8. The method of claim 1, wherein the identity information comprises a name and an identification number of the user to be bound.
9. An apparatus for real name authentication of a certificate, comprising:
the first acquisition module is used for acquiring the authentication information of the certificate;
the second acquisition module is used for acquiring the identity information of the user to be bound;
and the binding module is used for establishing the affiliated relationship between the authentication information and the identity information so as to bind the authentication information and the identity information.
10. An apparatus for certificate real-name authentication, comprising:
a processor, and a memory coupled to the processor;
the memory is used for storing a computer program;
the processor is configured to invoke and execute the computer program in the memory to perform the method of any one of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911214747.6A CN110932869A (en) | 2019-12-02 | 2019-12-02 | Method, device and equipment for certificate real-name authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911214747.6A CN110932869A (en) | 2019-12-02 | 2019-12-02 | Method, device and equipment for certificate real-name authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110932869A true CN110932869A (en) | 2020-03-27 |
Family
ID=69847322
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911214747.6A Pending CN110932869A (en) | 2019-12-02 | 2019-12-02 | Method, device and equipment for certificate real-name authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110932869A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113129035A (en) * | 2021-04-26 | 2021-07-16 | 北京金玖银玖数字科技有限公司 | Gold product management method, device and system |
CN114781414A (en) * | 2022-03-17 | 2022-07-22 | 国家珠宝检测中心(广东)有限责任公司 | Jewelry terminal machine and jewelry certificate self-service query method and storage medium thereof |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101034984A (en) * | 2006-09-22 | 2007-09-12 | 北京国政通网络科技有限公司 | Establishing the true identify database of the user with the personal information submitted by the user |
CN101527634A (en) * | 2008-12-31 | 2009-09-09 | 北京飞天诚信科技有限公司 | System and method for binding account information with certificates |
CN101741848A (en) * | 2009-12-22 | 2010-06-16 | 北京九恒星科技股份有限公司 | Method and system for binding digital certificate of system users and digital certificate authentication center |
US20100319061A1 (en) * | 2007-02-06 | 2010-12-16 | Makoto Hatakeyama | Personal information managing device, service providing device, program, personal information managing method, checking method and personal information checking system for falsification prevention of personal information and non repudiation of personal information circulation |
CN103778502A (en) * | 2012-12-03 | 2014-05-07 | 冯建中 | Information certificate system and related operation method thereof |
CN104680333A (en) * | 2015-03-20 | 2015-06-03 | 北京汇萃通科技有限公司 | Jewelry information gathering, managing and sharing platform |
CN106204069A (en) * | 2016-07-07 | 2016-12-07 | 立德高科(昆山)数码科技有限责任公司 | Jewelry product source tracing method based on Quick Response Code |
CN109033789A (en) * | 2018-06-15 | 2018-12-18 | 北京文创园投资管理有限公司 | A kind of generation method, the device and system of true warrant book |
CN110427744A (en) * | 2019-06-20 | 2019-11-08 | 中国科学院信息工程研究所 | A kind of identity management method and system for supporting service security label |
-
2019
- 2019-12-02 CN CN201911214747.6A patent/CN110932869A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101034984A (en) * | 2006-09-22 | 2007-09-12 | 北京国政通网络科技有限公司 | Establishing the true identify database of the user with the personal information submitted by the user |
US20100319061A1 (en) * | 2007-02-06 | 2010-12-16 | Makoto Hatakeyama | Personal information managing device, service providing device, program, personal information managing method, checking method and personal information checking system for falsification prevention of personal information and non repudiation of personal information circulation |
CN101527634A (en) * | 2008-12-31 | 2009-09-09 | 北京飞天诚信科技有限公司 | System and method for binding account information with certificates |
CN101741848A (en) * | 2009-12-22 | 2010-06-16 | 北京九恒星科技股份有限公司 | Method and system for binding digital certificate of system users and digital certificate authentication center |
CN103778502A (en) * | 2012-12-03 | 2014-05-07 | 冯建中 | Information certificate system and related operation method thereof |
CN104680333A (en) * | 2015-03-20 | 2015-06-03 | 北京汇萃通科技有限公司 | Jewelry information gathering, managing and sharing platform |
CN106204069A (en) * | 2016-07-07 | 2016-12-07 | 立德高科(昆山)数码科技有限责任公司 | Jewelry product source tracing method based on Quick Response Code |
CN109033789A (en) * | 2018-06-15 | 2018-12-18 | 北京文创园投资管理有限公司 | A kind of generation method, the device and system of true warrant book |
CN110427744A (en) * | 2019-06-20 | 2019-11-08 | 中国科学院信息工程研究所 | A kind of identity management method and system for supporting service security label |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113129035A (en) * | 2021-04-26 | 2021-07-16 | 北京金玖银玖数字科技有限公司 | Gold product management method, device and system |
CN114781414A (en) * | 2022-03-17 | 2022-07-22 | 国家珠宝检测中心(广东)有限责任公司 | Jewelry terminal machine and jewelry certificate self-service query method and storage medium thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105229485B (en) | Multifactor position verification method | |
RU2740702C2 (en) | Automation of image verification | |
CN109472678B (en) | Accounting book management method based on block chain, electronic device and readable storage medium | |
JP2016533590A (en) | Approving payments by reading QR codes generated by separate users or devices | |
CN103428309A (en) | Jump processing method for two-dimensional bar codes | |
JP2017531863A (en) | Methods and devices for information interaction and association between human biological feature data and accounts | |
WO2016074574A1 (en) | Method and device for interaction by scanning two-dimensional code | |
JP6980120B2 (en) | Resource transfer methods, equipment, computer equipment and storage media | |
CN110365711B (en) | Multi-platform user identity association method and device, computer equipment and computer readable storage medium | |
CN110932869A (en) | Method, device and equipment for certificate real-name authentication | |
US20210133875A1 (en) | Comprehensive buying, selling, trading, tracking, verification, validation, tokenization and financial services using blockchain | |
JP2015072702A (en) | Data communication method | |
CN106384255B (en) | Method and device for creating information code popularization information | |
CN102984218B (en) | Browser and login method thereof and system | |
JP6800045B2 (en) | Signature support server, relay server, signature support program, and relay program | |
JP2004252964A (en) | Location certification system | |
US20190362442A1 (en) | System and method for prediction of email addresses of certain individuals and verification thereof | |
CN109493198A (en) | Service evaluation management method, device, system and evaluation server | |
CA2970301C (en) | Improved network for onboarding and delivery of electronic payments to payees | |
CN108764861B (en) | Information acquisition method and device and electronic equipment | |
CA2874708A1 (en) | Systems, methods, and computer program products for providing offers to mobile wallets | |
WO2020055857A1 (en) | System and method for peer-to-peer payments | |
CN109040331A (en) | The processing method of electronic business card, calculates equipment and storage medium at device | |
US11238054B2 (en) | Searching multiple data sources | |
TW202143140A (en) | Registration of organization identification number |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200327 |