CN112215615A - Method and system for performing security authorization on service based on public and private keys - Google Patents

Method and system for performing security authorization on service based on public and private keys Download PDF

Info

Publication number
CN112215615A
CN112215615A CN202011143263.XA CN202011143263A CN112215615A CN 112215615 A CN112215615 A CN 112215615A CN 202011143263 A CN202011143263 A CN 202011143263A CN 112215615 A CN112215615 A CN 112215615A
Authority
CN
China
Prior art keywords
client
service
information
identity
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011143263.XA
Other languages
Chinese (zh)
Inventor
王艺霖
王安平
靳方舟
杨玉奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
He'an Technology Innovation Co ltd
Original Assignee
He'an Technology Innovation Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by He'an Technology Innovation Co ltd filed Critical He'an Technology Innovation Co ltd
Priority to CN202011143263.XA priority Critical patent/CN112215615A/en
Publication of CN112215615A publication Critical patent/CN112215615A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a method and a system for carrying out security authorization on a service based on a public and private key, wherein the method for carrying out security authorization on the service based on the public and private key provides a unique credible and verifiable authorization method based on the identity authentication of both a client and on the basis of a bank system, so as to help the client to finish the proxy service appointed by the client, thereby helping the client to finish the service required to be handled efficiently and instantly to a great extent without causing unauthorized privacy disclosure, and realizing the effects of improving the customer satisfaction, improving the service handling efficiency and increasing the convenient service handling way without reducing the security.

Description

Method and system for performing security authorization on service based on public and private keys
Technical Field
The invention relates to the technical field of agency services, in particular to a method and a system for performing security authorization on services based on a public and private key.
Background
At present, the business involving the privacy, such as a bank, can only be handled by an account owner in person, and cannot be handled by others. However, in real life, it often happens that the account owner cannot go to a bank to transact a certain business (for example, the person is in another place) in person, and needs to entrust other people to transact the business instead. However, in the current banking system, some services involve personal privacy information of an account owner (client), so that the bank requires the client to handle the services personally, the services cannot be handled instead, and the client is very troubled.
At present, a reasonable solution is not available, a lot of banking businesses cannot be handled by others, and under the condition that a client cannot be handled on the spot, the client is greatly puzzled.
Disclosure of Invention
In view of this, the present invention aims to overcome the defects of the prior art, and provides a method and a system for performing security authorization on a service based on a public and private key.
In order to achieve the purpose, the invention adopts the following technical scheme: a method for performing security authorization on service based on public and private keys comprises the following steps:
acquiring identity information of an authorized person;
authenticating identity information of the trusted person;
after the authentication is passed, acquiring the service attribute information to be dealt with by the client;
acquiring identity information of a principal;
authenticating the identity information of the principal;
after the authentication is passed, encrypting the business attribute information to be dealt with by the client and the client information, and sending the encrypted data to the client so that the client verifies the encrypted data;
and receiving a verification result, and determining whether to transact the business to be transacted by the client according to the verification result.
Optionally, the acquiring identity information of the trusted person specifically includes:
receiving private key signature data corresponding to an identity of a principal;
wherein the private key signature data is generated by a key which is issued in advance and has the function of verifying the identity of the user and contains a public private key.
Optionally, the authenticating the identity information of the trusted person specifically includes:
and authenticating the private key signature data through a pre-stored public key.
Optionally, the service attribute information includes: a service name, and/or a service number;
the delegate information includes: the name of the offeree, a unique number that can characterize the identity of the offeree, and/or, gender.
Optionally, the acquiring identity information of the principal specifically includes:
sending a notice to the client so that the client generates private key signature data corresponding to the client identity;
acquiring private key signature data corresponding to the principal identity;
wherein the private key signature data is generated by a key which is issued in advance and has the function of verifying the identity of the user and contains a public private key.
Optionally, the verifying the encrypted data specifically includes:
processing the encrypted data through a PKI algorithm to obtain the service attribute information to be dealt with by the trusted person and the trusted person information;
verifying the service attribute information to be dealt with by the offeree and the offeree information;
after the verification is passed, the verification result is that the authorized person, the agency service name and the service number are authorized;
when the verification fails, the result of the verification is unauthorized.
Optionally, the determining whether to transact the business to be transacted by the client according to the verification result specifically includes:
when the verification result is the authorization, transacting the business to be transacted by the client;
otherwise, the transaction of the business to be processed by the client is refused.
Optionally, the method further includes: and sending the verification result to the client side.
The invention also provides a system for carrying out security authorization on services based on public and private keys, which comprises the following steps:
the first acquisition module is used for acquiring the identity information of the principal;
the first authentication module is used for authenticating the identity information of the principal;
the second acquisition module is used for acquiring the business attribute information to be dealt with by the client after the authentication is passed;
the third acquisition module is used for acquiring the identity information of the principal;
the second authentication module is used for authenticating the identity information of the principal;
the processing module is used for encrypting the service attribute information to be dealt with by the client and the client information after the authentication is passed, and sending the encrypted data to the client so as to enable the client to verify the encrypted data;
and the execution module is used for receiving the verification result and determining whether to execute the business to be processed by the client or not according to the verification result.
Optionally, the system includes: bank system and tax system.
By adopting the technical scheme, the method for safely authorizing the business based on the public and private keys provides a unique credible and verifiable authorization method based on the identity authentication of both the entrusting party and the entrusted party and the support of a bank system, helps the entrusted party finish the proxy business appointed by the entrustor for the entrustor, can help the entrustor finish the business needing to be handled efficiently and instantly to a great extent, does not cause unauthorized privacy disclosure, and achieves the effects of improving the customer satisfaction, improving the business handling efficiency and increasing the business handling convenience without reducing the safety.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic flow chart of an embodiment of a method for performing security authorization on a service based on a public and private key according to the present invention;
FIG. 2 is a schematic flow chart of a second embodiment of the method for performing security authorization on a service based on a public and private key according to the present invention;
fig. 3 is a schematic structural diagram provided by an embodiment of the system for performing security authorization on services based on a public and private key according to the present invention.
In the figure: 1. a first acquisition module; 2. a first authentication module; 3. a second acquisition module; 4. a third obtaining module; 5. a second authentication module; 6. a processing module; 7. and executing the module.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without any inventive step, are within the scope of the present invention.
Note that the terms mentioned in the present invention will be explained as follows.
The client: the bank account owner, the actual owner of the business. The trusted people takes the place of the client to go to the bank for transaction. Typically contains the following elements: principal, service name, service number, authorization.
The trusted person: the delegate goes to the person handling the service.
And (4) service name: name of the specific business of the bank. For example: the query accounts are pipelined.
Service number: the banking business is a corresponding unique code in the banking system.
Fig. 1 is a schematic flow chart of an embodiment of a method for performing security authorization on a service based on a public and private key according to the present invention.
As shown in fig. 1, a method for performing security authorization on a service based on a public and private key according to this embodiment includes:
s11: acquiring identity information of an authorized person;
further, the acquiring identity information of the trusted person specifically includes:
receiving private key signature data corresponding to an identity of a principal;
the private key signature data is generated by a key which is issued to the principal by a bank in advance and has the function of verifying the identity of the user and contains a public private key.
S12: authenticating identity information of the trusted person;
s13: after the authentication is passed, acquiring the service attribute information to be dealt with by the client;
further, the service attribute information includes: a service name, and/or a service number.
S14: acquiring identity information of a principal;
further, the acquiring identity information of the principal specifically includes:
sending a notice to the client so that the client generates private key signature data corresponding to the client identity;
acquiring private key signature data corresponding to the principal identity;
the private key signature data is generated by a key which is issued to the principal in advance by a bank, has a user identity verification function and contains a public private key.
S15: authenticating the identity information of the principal;
further, the authentication of the identity information of the trusted party in step S12 and the authentication of the identity information of the trusted party in step S15 are implemented by the following steps:
and authenticating the private key signature data of the principal or the trusted person through a prestored public key.
S16: after the authentication is passed, encrypting the business attribute information to be dealt with by the client and the client information, and sending the encrypted data to the client so that the client verifies the encrypted data;
further, the delegate information may include: the name of the offeree, a unique number that can characterize the identity of the offeree, and/or, gender.
Further, the verifying the encrypted data specifically includes:
processing the encrypted data through a PKI algorithm to obtain the service attribute information to be dealt with by the trusted person and the trusted person information;
verifying the service attribute information to be dealt with by the offeree and the offeree information;
after the verification is passed, the verification result is that the authorized person, the agency service name and the service number are authorized;
when the verification fails, the result of the verification is unauthorized.
S17: and receiving a verification result, and determining whether to transact the business to be transacted by the client according to the verification result.
It should be noted that the method for performing security authorization on a service based on a public and private key according to this embodiment may be applied to various scenarios requiring the service owner to perform the service in person, and may entrust another person to perform the service in another place when the service owner cannot go to the place in person.
The method for performing security authorization on the business based on the public and private keys provides a unique credible and verifiable authorization method based on identity authentication of both a client and relying on a bank system, helps the client to finish the appointed proxy business of the client in place of the client, can help the client to finish the business needing to be handled efficiently and instantly to a great extent, does not cause unauthorized privacy disclosure, and achieves the effects of improving customer satisfaction, improving business handling efficiency and increasing a convenient and fast business handling mode under the condition of not reducing security.
Fig. 2 is a schematic flow chart of a second embodiment of the method for performing security authorization on a service based on a public and private key according to the present invention.
The method of the embodiment involves three ends in actual execution: the system comprises an authorized person side, an authorized person side and an online bank system.
As shown in fig. 2, in the embodiment, during actual execution, first, a key issued by a bank of an authorized person end and having a function of verifying the identity of the authorized person and containing a public and private key generates private key signature data, the authorized person end sends the private key signature data to the online banking system, and after the online banking system obtains the private key signature data of the authorized person, the identity of the authorized person is authenticated, that is, the online banking system authenticates the private key signature data of the authorized person with a public key, and if the authentication fails, the process is ended; if the authentication is passed, the online banking system sends a prompt for requesting to input service attribute information (including a service name and a service number) to the client, the client inputs a service name and a service number to be processed, and sends the service name and the service number to be processed and a private key signature of the client to the online banking system; after receiving the data, the internet bank system verifies the data, and after the data passes the verification, the agent (namely the entrusted person), the agent business name and the business number are sent to the entrustor terminal to request authorization. After receiving the request, the entrusting party processes the received data through a PKI algorithm, resolves the business name, the business number and the information of the entrusted person to be entrusted by the entrusted person, and verifies the business name, the business number and the information of the entrusted person to be entrusted by the entrusted person; when the verification passes, the verification result is that the authorized person, the agency service name and the service number are authorized, otherwise, the verification fails, namely the authorization is not carried out; the entrustor end also can utilize keys which are issued by banks, have the function of verifying the identity of the entrustor and contain public and private keys to generate private key signature data, the entrustor end sends the private key signature data to the online banking system, the online banking system authenticates the identity of the entrustor after acquiring the private key signature data of the entrustor, and if the authentication does not pass, the process is ended; if the authentication is passed, the online bank system receives a verification result (authorized or unauthorized) sent by the trustee end, and transacts the business to be dealt with by the trustee after the verification result is authorized; otherwise, the transaction of the business to be processed by the client is refused.
Further, the method further comprises: and sending the verification result and/or the service agency result to the client.
The method provided by the embodiment is based on public and private keys, on the basis of identity authentication of both an entrusting party and an authorized party and on the basis of a bank system, provides a reliable authorization method, helps the authorized party finish the transaction of entrusting business in place of the entrusting party, and can improve the customer satisfaction and improve the business transaction efficiency without reducing the security.
Fig. 3 is a schematic structural diagram provided by an embodiment of the system for performing security authorization on services based on a public and private key according to the present invention.
As shown in fig. 3, the system for performing security authorization on a service based on a public and private key according to this embodiment includes:
a first obtaining module 1, configured to obtain identity information of an authorized person;
a first authentication module 2 configured to authenticate identity information of the principal;
the second obtaining module 3 is used for obtaining the business attribute information which is required to be dealt with by the client after the authentication is passed;
a third obtaining module 4, configured to obtain identity information of the principal;
a second authentication module 5 configured to authenticate the identity information of the principal;
the processing module 6 is used for encrypting the service attribute information to be dealt with by the client and the client information after the authentication is passed, and sending the encrypted data to the client so that the client verifies the encrypted data;
and the execution module 7 is used for receiving the verification result and determining whether to execute the transaction of the business to be dealt with by the client or not according to the verification result.
Further, the system comprises: bank system and tax system.
It should be noted that the system for performing security authorization on a service based on a public and private key according to this embodiment may be applied to various scenarios requiring the service owner to perform the service in person, and may entrust another person to perform the service in another place when the service owner cannot go to the field in person.
The working principle of the system for performing security authorization on services based on a public and private key according to this embodiment is the same as that of the method for performing security authorization on services based on a public and private key according to any of the above embodiments, and is not described herein again.
The system for performing security authorization on the service based on the public and private keys can be popularized and applied to other systems involving personal privacy information, such as a tax system for performing an audit operation.
The system for performing security authorization on the service based on the public and private key performs security authorization on the service based on the public and private key, and can facilitate the service owner to handle the required service quickly without personally arriving at the site. After the system is adopted, convenience of service handling of the clients can be improved remarkably, time consumed by service handling is shortened, privacy information of the clients can not be leaked, and improvement of user experience and improvement of handling efficiency of service industries such as banks are facilitated.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that the terms "first," "second," and the like in the description of the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present invention, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (10)

1. A method for performing security authorization on service based on public and private keys is characterized by comprising the following steps:
acquiring identity information of an authorized person;
authenticating identity information of the trusted person;
after the authentication is passed, acquiring the service attribute information to be dealt with by the client;
acquiring identity information of a principal;
authenticating the identity information of the principal;
after the authentication is passed, encrypting the business attribute information to be dealt with by the client and the client information, and sending the encrypted data to the client so that the client verifies the encrypted data;
and receiving a verification result, and determining whether to transact the business to be transacted by the client according to the verification result.
2. The method according to claim 1, wherein the acquiring identity information of the trusted party specifically includes:
receiving private key signature data corresponding to an identity of a principal;
wherein the private key signature data is generated by a key which is issued in advance and has the function of verifying the identity of the user and contains a public private key.
3. The method according to claim 2, wherein the authenticating the identity information of the trusted party specifically includes:
and authenticating the private key signature data through a pre-stored public key.
4. The method of claim 1, wherein the service attribute information comprises: a service name, and/or a service number;
the delegate information includes: the name of the offeree, a unique number that can characterize the identity of the offeree, and/or, gender.
5. The method according to claim 1, wherein the acquiring identity information of the principal specifically includes:
sending a notice to the client so that the client generates private key signature data corresponding to the client identity;
acquiring private key signature data corresponding to the principal identity;
wherein the private key signature data is generated by a key which is issued in advance and has the function of verifying the identity of the user and contains a public private key.
6. The method according to claim 1, wherein the verifying the encrypted data specifically comprises:
processing the encrypted data through a PKI algorithm to obtain the service attribute information to be dealt with by the trusted person and the trusted person information;
verifying the service attribute information to be dealt with by the offeree and the offeree information;
after the verification is passed, the verification result is that the authorized person, the agency service name and the service number are authorized;
when the verification fails, the result of the verification is unauthorized.
7. The method according to claim 6, wherein the determining whether to handle the service to be handled by the offeree according to the verification result includes:
when the verification result is the authorization, transacting the business to be transacted by the client;
otherwise, the transaction of the business to be processed by the client is refused.
8. The method of any one of claims 1 to 7, further comprising: and sending the verification result to the client side.
9. A system for performing security authorization on service based on public and private keys is characterized by comprising:
the first acquisition module is used for acquiring the identity information of the principal;
the first authentication module is used for authenticating the identity information of the principal;
the second acquisition module is used for acquiring the business attribute information to be dealt with by the client after the authentication is passed;
the third acquisition module is used for acquiring the identity information of the principal;
the second authentication module is used for authenticating the identity information of the principal;
the processing module is used for encrypting the service attribute information to be dealt with by the client and the client information after the authentication is passed, and sending the encrypted data to the client so as to enable the client to verify the encrypted data;
and the execution module is used for receiving the verification result and determining whether to execute the business to be processed by the client or not according to the verification result.
10. The system of claim 9, wherein the system comprises: bank system and tax system.
CN202011143263.XA 2020-10-23 2020-10-23 Method and system for performing security authorization on service based on public and private keys Pending CN112215615A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011143263.XA CN112215615A (en) 2020-10-23 2020-10-23 Method and system for performing security authorization on service based on public and private keys

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011143263.XA CN112215615A (en) 2020-10-23 2020-10-23 Method and system for performing security authorization on service based on public and private keys

Publications (1)

Publication Number Publication Date
CN112215615A true CN112215615A (en) 2021-01-12

Family

ID=74056482

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011143263.XA Pending CN112215615A (en) 2020-10-23 2020-10-23 Method and system for performing security authorization on service based on public and private keys

Country Status (1)

Country Link
CN (1) CN112215615A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111711523A (en) * 2020-05-22 2020-09-25 平安科技(深圳)有限公司 Item handling authority authorization method and device, computer equipment and storage medium
CN113947257A (en) * 2021-10-29 2022-01-18 西安热工研究院有限公司 Method and system for realizing task delegation based on message
CN117094012A (en) * 2023-08-21 2023-11-21 中胜信用管理有限公司 Intelligent verification method and system for electronic authorization order

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588245A (en) * 2009-06-24 2009-11-25 成都市华为赛门铁克科技有限公司 A kind of method of authentication, system and memory device
KR101522731B1 (en) * 2014-02-26 2015-06-22 고려대학교 산학협력단 System and method for proxy signature
CN111242775A (en) * 2020-02-28 2020-06-05 中国工商银行股份有限公司 Bank agent business processing method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588245A (en) * 2009-06-24 2009-11-25 成都市华为赛门铁克科技有限公司 A kind of method of authentication, system and memory device
KR101522731B1 (en) * 2014-02-26 2015-06-22 고려대학교 산학협력단 System and method for proxy signature
CN111242775A (en) * 2020-02-28 2020-06-05 中国工商银行股份有限公司 Bank agent business processing method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111711523A (en) * 2020-05-22 2020-09-25 平安科技(深圳)有限公司 Item handling authority authorization method and device, computer equipment and storage medium
CN111711523B (en) * 2020-05-22 2022-10-04 平安科技(深圳)有限公司 Item handling authority authorization method and device, computer equipment and storage medium
CN113947257A (en) * 2021-10-29 2022-01-18 西安热工研究院有限公司 Method and system for realizing task delegation based on message
CN117094012A (en) * 2023-08-21 2023-11-21 中胜信用管理有限公司 Intelligent verification method and system for electronic authorization order
CN117094012B (en) * 2023-08-21 2024-04-30 中胜信用管理有限公司 Intelligent verification method and system for electronic authorization order

Similar Documents

Publication Publication Date Title
US11818272B2 (en) Methods and systems for device authentication
US20200336315A1 (en) Validation cryptogram for transaction
US9978094B2 (en) Tokenization revocation list
CN112215615A (en) Method and system for performing security authorization on service based on public and private keys
US9264232B2 (en) Cryptographic device that binds an additional authentication factor to multiple identities
US8079082B2 (en) Verification of software application authenticity
US8683196B2 (en) Token renewal
US20070150942A1 (en) Centralized identity verification and/or password validation
US20080256617A1 (en) Centralized Identity Verification and/or Password Validation
CN109361697B (en) Method for realizing credible identity authentication based on SIM card loading PKI
CN109308416B (en) Business service data processing method, device, system, storage medium and equipment
US20060059111A1 (en) Authentication method for securely disclosing confidential information over the internet
US20230198751A1 (en) Authentication and validation procedure for improved security in communications systems
US11750391B2 (en) System and method for performing a secure online and offline login process
WO2019212829A1 (en) Techniques for performing secure operations
CN113271207A (en) Escrow key using method and system based on mobile electronic signature, computer equipment and storage medium
CN111970117B (en) Certificate downloading method, device and equipment
CN110675151A (en) Transaction authentication method and device
CN110675158A (en) Transaction payment method and device
US20240073029A1 (en) Multi-Computer System For User Authentication Based on Client-Side One-Time Passcode
US20150235214A1 (en) User Authentication and Authorization
WO2023217678A1 (en) Authentication device, method, and computer program
EP4341834A1 (en) Custody service for authorising transactions
CN113971267A (en) Identity authentication method and device, storage medium and electronic equipment
CN114861153A (en) Service processing method and device for intelligent counter

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination