CN112202752A - Identity authentication system and method - Google Patents

Identity authentication system and method Download PDF

Info

Publication number
CN112202752A
CN112202752A CN202011025665.XA CN202011025665A CN112202752A CN 112202752 A CN112202752 A CN 112202752A CN 202011025665 A CN202011025665 A CN 202011025665A CN 112202752 A CN112202752 A CN 112202752A
Authority
CN
China
Prior art keywords
service module
identity authentication
module
identity
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011025665.XA
Other languages
Chinese (zh)
Inventor
董思
郭敏鸿
廖敏飞
刘丽娟
吴孟晴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN202011025665.XA priority Critical patent/CN112202752A/en
Publication of CN112202752A publication Critical patent/CN112202752A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the application discloses an identity authentication system and method. The system comprises: the interface service module is connected with the certificate service module, the signature verification service module and the biological identification service module and is used for receiving identity authentication information; the certificate service module is connected with the data source scheduling module and the safety control module and is used for carrying out certificate authentication on the identity authentication information; the signature verification service module is connected with the data source scheduling module and the safety control module and is used for performing signature verification on the identity authentication information; the biological identification service module is connected with the data source scheduling module and the safety control module and is used for carrying out biological identification authentication on the identity authentication information; and the data source scheduling module is used for calling the identity authentication external data source according to a calling instruction sent by the certificate service module, the signature verification service module or the biological identification service module. The technical scheme can provide multi-channel identity authentication and can meet the user identity authentication requirements in each time period.

Description

Identity authentication system and method
Technical Field
The embodiment of the application relates to the technical field of identity authentication, in particular to an identity authentication system and method.
Background
With the rapid development of the mobile internet and the rapid popularization of smart phones, various mobile internet services are also rapidly developed, the mobile internet services and bank mobile informatization applications face the same security problem, and how to rapidly and safely identify the identity of a user and ensure the confidentiality and integrity of service data in the applications becomes one of the core problems faced by enterprise managers.
When a user transacts banking business on a mobile device, the real identity of the client is often required to be authenticated, and the traditional offline identity authentication mode is manually checked by a bank teller and the like. The identity authentication comprises real-name authentication, real person authentication and real person real-certificate authentication.
The method is characterized in that the user identity information is manually checked by bank tellers and the like, the source of the customer identity card photo is mainly dependent on a single pedestrian channel, the service open time of the channel is limited to the daytime period, and the channel cannot adapt to the service commitment of 7 x 24 hours of the online banking business.
Disclosure of Invention
The embodiment of the application provides an identity authentication system and method, which can provide multi-channel identity authentication and can meet the identity authentication requirements of users in all time periods.
In a first aspect, an embodiment of the present application provides an identity authentication system, where the identity authentication system includes:
the system comprises an interface service module, a certificate service module, a signature verification service module, a biological identification service module and a data source scheduling module;
the interface service module is connected with the certificate service module, the signature verification service module and the biological identification service module and is used for receiving identity authentication information;
the certificate service module is connected with the data source scheduling module and the safety control module and is used for carrying out certificate authentication on the identity authentication information;
the signature verification service module is connected with the data source scheduling module and the safety control module and is used for performing signature verification on the identity authentication information;
the biological identification service module is connected with the data source scheduling module and the safety control module and is used for carrying out biological identification authentication on the identity authentication information;
the data source scheduling module is used for calling an identity authentication external data source according to a calling instruction sent by the certificate service module, the signature verification service module or the biological identification service module, so as to authenticate identity authentication information based on the external data source.
In a second aspect, an embodiment of the present application provides an identity authentication method, where the method is performed by an interface service module, and the method includes:
receiving identity identification information;
and transmitting the identity identification information to a certificate service module, a signature verification service module or a biological identification service module for identifying the identity identification information.
According to the technical scheme provided by the embodiment of the application, the interface service module is connected with the certificate service module, the signature verification service module and the biological identification service module and used for receiving identity authentication information; the certificate service module is connected with the data source scheduling module and the safety control module and is used for carrying out certificate authentication on the identity authentication information; the signature verification service module is connected with the data source scheduling module and the safety control module and is used for performing signature verification on the identity authentication information; the biological identification service module is connected with the data source scheduling module and the safety control module and is used for carrying out biological identification authentication on the identity authentication information; and the data source scheduling module is used for calling the identity authentication external data source according to a calling instruction sent by the certificate service module, the signature verification service module or the biological identification service module. By executing the technical scheme, multi-channel identity authentication can be provided, and the user identity authentication requirements in each time period can be met.
Drawings
Fig. 1 is a schematic structural diagram of an identity authentication system according to an embodiment of the present application;
fig. 2 is a functional architecture diagram of an identity authentication system according to an embodiment of the present application;
fig. 3 is a flowchart of an identity authentication method provided in the second embodiment of the present application;
fig. 4 is a general structure diagram of an identity authentication method provided in the second embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some of the structures related to the present application are shown in the drawings, not all of the structures.
Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the steps as a sequential process, many of the steps can be performed in parallel, concurrently or simultaneously. In addition, the order of the steps may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
Example one
Fig. 1 is a schematic structural diagram of an identity authentication system according to an embodiment of the present application, where the embodiment is applicable to identity authentication, and the system may be integrated in an intelligent terminal for identity authentication and other devices.
As shown in fig. 1, the identity authentication system includes:
an interface service module 110, a certificate service module 120, a signature verification service module 130, a biometric identification service module 140, and a data source scheduling module 150;
the interface service module 110, connected to the certificate service module 120, the signature verification service module 130 and the biometric identification service module 140, is configured to receive identity authentication information;
the certificate service module 120 is connected to the data source scheduling module 150 and the security control module, and is configured to perform certificate authentication on the identity authentication information;
the signature verification service module 130 is connected to the data source scheduling module 150 and the security control module, and is configured to perform signature verification on the identity authentication information;
the biometric identification service module 140 is connected to the data source scheduling module 150 and the security control module, and is configured to perform biometric identification authentication on the identity authentication information;
the data source scheduling module 150 is configured to invoke an identity authentication external data source according to a call instruction sent by the certificate service module 120, the signature verification service module 130, or the biometric identification service module 140, so as to perform authentication of identity authentication information based on the external data source.
In this embodiment, the identity authentication information may be information included in a request for authenticating the identity of the user, and is used to verify whether the identity information of the user is correct. There are many forms of identity authentication for users, including real-name authentication, real-person authentication, and real-person real-card authentication. The real-name authentication can be the verification of the identity card information; the real person authentication can be to verify the consistency of the acquired identity card information and the portrait; the real person authentication can be to verify the authenticity of the identity card and the consistency of the portrait and the identity card information.
In this embodiment, the interface service module 110 is configured to receive identity authentication information sent by an external device through a network. The external device may be a mobile terminal, a service application server, or the like.
In this embodiment, the Certificate authentication may be implemented by using a self-established CA (Certificate Authority) digital Certificate authentication system, where a principal role of the CA is to perform management services of the Certificate, and a trusted Authority uses the CA to receive a request from a public key owner, check the true identity of the user, sign and manage the digital Certificate of the user, so that a same trusted relationship is established between the public key owner and the user of the digital Certificate, thereby ensuring validity and validity of the public key, and realizing public issue of the Certificate, which is available for both parties of network transactions to obtain online; issuing and maintaining a revocation certificate list (CRL) for certificate status online inquiry to prevent transaction risk; and the whole log recording is carried out on the management process of the certificate, so that comprehensive audit service is provided. The digital certificate is called 'digital identity card' and 'network identity card', is issued by a certificate authentication center CA and digitally signed by the authentication center CA, and is an electronic document containing a public key owner and related information of the public key, and can be used for proving the real identity of the digital certificate owner.
In this embodiment, the signature authentication may be a data message or other electronic record that is signed by the user and that can verify that the electronic signer is associated with the electronic signature creation data.
In this embodiment, different authentications may be performed on the identity authentication information according to different services. For example, certificate authentication may be performed on the identity authentication information, and signature authentication may be performed on the identity authentication information; biometric authentication may also be performed on the identity authentication information.
In this embodiment, the security control module mainly performs control such as transaction authorization, transaction flow control, transaction element signature verification, and the like in the identity authentication transaction process.
In this embodiment, the data source scheduling module 150 calls an identity authentication external data source for performing authentication of identity authentication information based on the external data source, which can satisfy the requirement of providing multi-channel identity authentication. The external data source may also be data of a public security department, or data of an inbound and outbound identity check, etc.
In this embodiment, optionally, the interface service module 110 includes a certificate service class interface, a signature verification class interface, and a biometric identification class interface.
In this embodiment, the interface service module 110 includes three interfaces, namely a certificate service interface, a signature verification interface, and a biometric identification interface, and can be used to transmit the received identity authentication information through different interfaces and complete identity authentication.
By determining different interfaces and transmitting the identity authentication information to different authentication modules, different identity information authentications can be completed, and various authentication methods are provided.
In this technical solution, optionally, the interface service module 110 is specifically configured to:
transmitting the identity authentication information to the certificate service module 120 through the certificate service class interface;
transmitting the identity authentication information to the signature verification service module 130 through the signature verification class interface;
the identity authentication information is transmitted to the biometric services module 140 through the biometric-like interface.
In this embodiment, the interface service module may transmit the authentication information to the certificate service module 120, the signature verification service module 130, or the biometric service module 140 through different interfaces. To perform different identity authentications.
Identity authentication information is transmitted to different modules through different interfaces, identity authentication is carried out respectively, different kinds of identity authentication modes can be provided, and the user identity authentication requirements in each time period can be met.
In this technical solution, optionally, the biometric recognition includes face recognition and voiceprint recognition.
In this embodiment, a general method of identity authentication based on a face recognition technology is to compare a snapshot of a client on site with an identity card of the client, and determine whether two photos are the same person. The face recognition technology may be based on a "deep learning" face recognition technology, including but not limited to face verification, face search, face detection, key point detection, attribute detection, and the like.
In this embodiment, the voiceprint recognition service implements user identity authentication by obtaining a user voiceprint and comparing the user voiceprint with a voiceprint in a bank system.
Through the biological recognition service, the identity of the client can be authenticated from face recognition or voiceprint recognition, and powerful technical support is provided for different financial application scenes of a bank.
Fig. 2 is a functional architecture diagram of an identity authentication system according to an embodiment of the present application. As shown in fig. 2, the functional architecture diagram of the identity authentication system includes an identity authentication service middleware and an identity authentication external data source, and when identity authentication is performed using the identity authentication service, the data source scheduling module in the identity authentication service middleware calls the identity authentication external data source as an external data support for user identity authentication.
In this technical solution, optionally, the external data source for identity authentication includes people networking check data, public security identity check data, and entry and exit management office identity check data.
In this embodiment, the data for the people networking check is based on the existing intranet and internetwork interconnection platform of the people bank, and forwards the people bank user and the check request sent by the respective front-end systems of the account system, the credit investigation system and the anti-money laundering system to the information sharing system of the public security department; receiving and forwarding the bank user and the checking request sent by the comprehensive business system through the front-end system; and receiving and forwarding the checking result data of the information sharing system of the public security department.
In this embodiment, the public security identity verification data is result data obtained by identity verification performed by a public security department.
In this embodiment, the identity verification data of the entry and exit administration is result data obtained by the national immigration administration responsible for building an entry and exit certificate identity authentication platform, authorizing, guiding and supervising the entry and exit certificate identity authentication work developed by the entry and exit management information technology institute.
By calling the identity authentication external data source to authenticate the identity authentication information, multi-channel identity authentication can be provided, and the identity authentication requirements of users in each time period can be met.
According to the technical scheme provided by the embodiment of the application, the interface service module is connected with the certificate service module, the signature verification service module and the biological identification service module and used for receiving identity authentication information; the certificate service module is connected with the data source scheduling module and the safety control module and is used for carrying out certificate authentication on the identity authentication information; the signature verification service module is connected with the data source scheduling module and the safety control module and is used for performing signature verification on the identity authentication information; the biological identification service module is connected with the data source scheduling module and the safety control module and is used for carrying out biological identification authentication on the identity authentication information; and the data source scheduling module is used for calling the identity authentication external data source according to a calling instruction sent by the certificate service module, the signature verification service module or the biological identification service module. By executing the technical scheme, multi-channel identity authentication can be provided, and the user identity authentication requirements in each time period can be met.
Example two
Fig. 3 is a flowchart of an identity authentication method provided in the second embodiment of the present application, where the method is executed by an interface service module, and as shown in fig. 3, the identity authentication method includes:
s310, receiving identity identification information.
In this embodiment, the interface service module receives the identification information transmitted by the external device through the network.
S320, transmitting the identity identification information to a certificate service module, a signature verification service module or a biological identification service module for identifying the identity identification information.
In this embodiment, the interface service module transmits the received identity authentication information to different modules to respectively authenticate the identity authentication information.
In this technical solution, optionally, the interface service module includes a certificate service interface, a signature verification interface, and a biometric identification interface.
By determining different interfaces and transmitting the identity authentication information to different authentication modules, different identity information authentications can be completed, and various authentication methods are provided.
In this technical solution, optionally, the transmitting the identity authentication information to a certificate service module, a signature verification service module, or a biometric service module, so as to be used for the authentication of the identity authentication information includes:
transmitting the identity authentication information to the certificate service module through the certificate service class interface;
transmitting the identity authentication information to the signature verification service module through the signature verification type interface;
and transmitting the identity authentication information to the biological identification service module through the biological identification interface.
Identity authentication information is transmitted to different modules for identity authentication respectively, so that different kinds of identity authentication can be provided, and the user identity authentication requirements in each time period can be met.
As shown in fig. 4, the general structure diagram of the identity authentication method is composed of a mobile terminal and a service terminal, where the mobile terminal has different service applications and needs to perform identity information authentication when performing service processing. The service end is composed of a service application service end and an identity authentication platform. The identity authentication platform is used for authenticating identity information.
In this technical solution, optionally, the receiving identity recognizing information includes:
and receiving identity recognizing information sent by the security gateway based on the first service application of the mobile terminal.
In this embodiment, the identity recognizing information may be sent by the secure gateway based on the first service application of the mobile terminal. As shown in fig. 4, the service application B may directly send the identity authentication information to the identity authentication platform through the security gateway for authentication of the identity information.
By receiving the identity authentication information sent by the security gateway based on the first service application of the mobile terminal and authenticating the identity information, the service requirement can be met.
In this technical solution, optionally, receiving the identity recognizing information further includes:
and receiving identity identification information sent by the service application server based on the second service application of the mobile terminal.
In this embodiment, the identification information may also be sent by a second service application of the service application server side based on the mobile terminal. As shown in fig. 4, the service application a cannot directly send the identity authentication information to the identity authentication platform for authentication, and needs to send the identity authentication information to the service end of the service application a, and then the service end of the service application a sends the identity authentication information to the identity authentication platform.
The identity authentication method receives identity authentication information from different sources, authenticates the identity information and can meet the identity authentication requirements of users in various time periods.
According to the technical scheme provided by the embodiment of the application, identity identification information is received at first, and then the identity identification information is transmitted to the certificate service module, the signature verification service module or the biological identification service module so as to be used for identifying the identity identification information. By executing the technical scheme, multi-channel identity authentication can be provided, and the user identity authentication requirements in each time period can be met.
The method is executed by the system provided by the embodiment of the application, and has corresponding execution process and beneficial effect.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present application and the technical principles employed. It will be understood by those skilled in the art that the present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the appended claims.

Claims (10)

1. An identity authentication system, the system comprising: the system comprises an interface service module, a certificate service module, a signature verification service module, a biological identification service module and a data source scheduling module;
the interface service module is connected with the certificate service module, the signature verification service module and the biological identification service module and is used for receiving identity authentication information;
the certificate service module is connected with the data source scheduling module and the safety control module and is used for carrying out certificate authentication on the identity authentication information;
the signature verification service module is connected with the data source scheduling module and the safety control module and is used for performing signature verification on the identity authentication information;
the biological identification service module is connected with the data source scheduling module and the safety control module and is used for carrying out biological identification authentication on the identity authentication information;
the data source scheduling module is used for calling an identity authentication external data source according to a calling instruction sent by the certificate service module, the signature verification service module or the biological identification service module, so as to authenticate identity authentication information based on the external data source.
2. The system of claim 1, wherein the interface service module comprises a certificate service class interface, a signature verification class interface, and a biometric identification class interface.
3. The system of claim 2, wherein the interface service module is specifically configured to:
transmitting the identity authentication information to the certificate service module through the certificate service class interface;
transmitting the identity authentication information to the signature verification service module through the signature verification type interface;
and transmitting the identity authentication information to the biological identification service module through the biological identification interface.
4. The system of claim 1, wherein the biometric recognition comprises face recognition and voiceprint recognition.
5. The system of claim 1, wherein the authentication external data source comprises a human networking audit data, a public security audit data, and an entry and exit authority audit data.
6. An identity authentication method, wherein the method is performed by an interface service module, the method comprising:
receiving identity identification information;
and transmitting the identity identification information to a certificate service module, a signature verification service module or a biological identification service module for identifying the identity identification information.
7. The method of claim 6, wherein the interface service module comprises a certificate service class interface, a signature verification class interface, and a biometric identification class interface.
8. The method of claim 7, wherein transmitting the identity verification information to a certificate service module, a signature verification service module, or a biometric service module for verification of the identity verification information comprises:
transmitting the identity authentication information to the certificate service module through the certificate service class interface;
transmitting the identity authentication information to the signature verification service module through the signature verification type interface;
and transmitting the identity authentication information to the biological identification service module through the biological identification interface.
9. The method of claim 6, wherein receiving identity recognizing information comprises:
and receiving identity recognizing information sent by the security gateway based on the first service application of the mobile terminal.
10. The method of claim 9, wherein receiving identity recognizing information further comprises:
and receiving identity identification information sent by the service application server based on the second service application of the mobile terminal.
CN202011025665.XA 2020-09-25 2020-09-25 Identity authentication system and method Pending CN112202752A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011025665.XA CN112202752A (en) 2020-09-25 2020-09-25 Identity authentication system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011025665.XA CN112202752A (en) 2020-09-25 2020-09-25 Identity authentication system and method

Publications (1)

Publication Number Publication Date
CN112202752A true CN112202752A (en) 2021-01-08

Family

ID=74008327

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011025665.XA Pending CN112202752A (en) 2020-09-25 2020-09-25 Identity authentication system and method

Country Status (1)

Country Link
CN (1) CN112202752A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115664689A (en) * 2022-07-07 2023-01-31 湖南汉马科技有限公司 Internet identity verification service system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011031272A1 (en) * 2009-09-14 2011-03-17 Interdigital Patent Holdings, Inc. Method and apparatus for trusted authentication and logon
CN106934621A (en) * 2015-12-30 2017-07-07 远光软件股份有限公司 The examination & approval safety certifying method and system of payment funding
CN109145562A (en) * 2018-09-25 2019-01-04 浙江智贝信息科技有限公司 A kind of lasting authenticating identity method and its equipment by finger print mouse
CN111143784A (en) * 2019-12-12 2020-05-12 合肥大唐存储科技有限公司 Copyright protection realization method and copyright protection storage device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011031272A1 (en) * 2009-09-14 2011-03-17 Interdigital Patent Holdings, Inc. Method and apparatus for trusted authentication and logon
CN106934621A (en) * 2015-12-30 2017-07-07 远光软件股份有限公司 The examination & approval safety certifying method and system of payment funding
CN109145562A (en) * 2018-09-25 2019-01-04 浙江智贝信息科技有限公司 A kind of lasting authenticating identity method and its equipment by finger print mouse
CN111143784A (en) * 2019-12-12 2020-05-12 合肥大唐存储科技有限公司 Copyright protection realization method and copyright protection storage device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115664689A (en) * 2022-07-07 2023-01-31 湖南汉马科技有限公司 Internet identity verification service system
CN115664689B (en) * 2022-07-07 2024-03-08 湖南汉马科技有限公司 Internet identity verification service system

Similar Documents

Publication Publication Date Title
JP6648110B2 (en) System and method for authenticating a client to a device
US9397980B1 (en) Credential management
EP3073671B1 (en) System and method enabling multiparty and multi level authorizations for accessing confidential information
CN112041842A (en) Digital asset hosting system
US11301849B2 (en) Risk mitigation for a cryptoasset custodial system using a hardware security key
US20090234764A1 (en) Systems and methods for biometric authentication of monetary fund transfer
KR20170041729A (en) System and method for establishing trust using secure transmission protocols
US10489565B2 (en) Compromise alert and reissuance
KR20210142180A (en) System and method for efficient challenge-response authentication
US20210073813A1 (en) A system and method for processing a transaction
KR101282824B1 (en) Meeting attestation system and providing method thereof
EP3320666B1 (en) Method for establishing protected electronic communication, secure transfer and processing of information among three or more subjects
Krishnaprasad et al. A Study on Enhancing Mobile Banking Services using Location based Authentication
KR20170052126A (en) Method for Non-faced Multi-authenticating for Creating Financial Information
CN112202752A (en) Identity authentication system and method
KR101294805B1 (en) 2-channel authentication method and system based on authentication application
TW201907688A (en) Systems, devices, and methods for performing verification of communications received from one or more computing devices
CN111275506A (en) Bill issuing method and block link point equipment
KR20210086328A (en) PS-LTE OneID record management blockchain system by use of FIDO transaction certification
CN113902548B (en) Paperless bank-climbing cooperation system for real estate registration
CN110581820A (en) Financial science and technology application system and method based on IPV6 and biological recognition technology
TW200941410A (en) Method of using a telephone number and an identification code as fraud prevention in a financial service system
KR20240005724A (en) Multi-factor authentication via encryption-enabled smart cards
CN114925340A (en) System for realizing unified identity authentication
KR20150085166A (en) Method for Managing Certificate

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210108

RJ01 Rejection of invention patent application after publication