CN112685704A - Verification method and terminal for combining multiple kinds of protection into one interface based on electronic equipment - Google Patents

Verification method and terminal for combining multiple kinds of protection into one interface based on electronic equipment Download PDF

Info

Publication number
CN112685704A
CN112685704A CN202011353494.3A CN202011353494A CN112685704A CN 112685704 A CN112685704 A CN 112685704A CN 202011353494 A CN202011353494 A CN 202011353494A CN 112685704 A CN112685704 A CN 112685704A
Authority
CN
China
Prior art keywords
identity
interface
verification
identification
intelligent terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011353494.3A
Other languages
Chinese (zh)
Inventor
吴伟运
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202011353494.3A priority Critical patent/CN112685704A/en
Publication of CN112685704A publication Critical patent/CN112685704A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to the technical field of internet security, in particular to a verification method and a terminal for combining multiple protections into a same interface based on electronic equipment. All operations are completed on one interface, all syndromes are integrated, the first one is safe, the first one passes, and the whole course is carefree. The stacking effect is generated, the safety, the convenience and the rapidness are realized, the time is saved for a user, and the user experience is improved.

Description

Verification method and terminal for combining multiple kinds of protection into one interface based on electronic equipment
Technical Field
The invention relates to the field of internet security, in particular to a verification method for combining multiple kinds of protection into the same interface based on electronic equipment.
Background
With the continuous development of the internet plus and the rapid rise of financial science and technology, high and new technologies such as fingerprint identification, face identification, voice identification and the like are gradually applied to the customer identity identification links of services such as account opening, payment, deposit and withdrawal in the financial industry. Meanwhile, financial supervision is becoming stricter, requirements on anti-money laundering management are continuously improved, customer information retained by commercial banks is required to be more complete and strict, and meanwhile, customer information protection is required to be strengthened to prevent data leakage. The user pays attention to the safety of information safety, payment safety and personal privacy. Mobile phones, electronic products, devices, etc. generally have a security protection measure, such as a password, face recognition, fingerprint, voiceprint, pupil, etc. biological recognition. Are each used individually, e.g., using a cryptographic approach, which is approximately ninety percent secure. Face recognition alone, the security recognition rate is ninety to ninety-five percent. Fingerprint, ninety percent. Voiceprint ninety percent. Pupil, ninety-five percent. The biometric identification methods reach identification rate of ninety-several percent, and always have some errors. The method is characterized in that multiple protection combination based on electronic equipment is used as the same interface verification method, the superposition effect is generated through the video verification of the same interface, and the safety identification rate of the identity authentication and the identity authentication on line can reach ninety-nine and nine-nine percent. If a technology is used independently, more than two interface videos need to be converted on electronic products and equipment, one is not feasible, two are inconvenient, and three take time.
The invention discloses a gas dispenser with fingerprint and face recognition payment functions and a matched payment method with the publication number of CN107305718A, and the invention is characterized in that payment is carried out through the existing manual service, the payment of a filling card, the payment of a union pay card, a two-dimensional code, personal fingerprint correlation payment and the face recognition mode, and a user can freely select a proper payment mode according to the requirement, so that the payment is convenient and fast.
Publication number is CN207068175U, the name is cloud financial payment terminal's based on internet utility model patent, which comprises a host computer, the host computer top is equipped with display panel, the last touch display screen that is equipped with of display panel, touch display screen top sets up high definition digtal camera, the display panel below sets up operating panel, last password input keyboard that is equipped with of operating panel, fingerprint identification ware, IC-card identifier, USB socket and emergency alarm button, the embedded LED lamp strip in operating panel top, host computer both sides face all is equipped with the heat dissipation strip, the inside front side of host computer is equipped with relies on a printer, the terminal surface is equipped with prints the mouth before the host computer, the inside controller that is equipped with of host computer.
The invention discloses an intelligent access control system with the publication number of CN110084924A and the name of the intelligent access control system based on fingerprint identification and face identification, and the intelligent access control system comprises a power supply module, a main control module, a WIFI module, a camera module, a fingerprint identification module, a touch screen module, a doorbell, a collision switch module for detecting the opening and closing state of a door, a door lock and a driving module. The system combines the technology of the Internet of things, the biotechnology, the mobile Internet technology, the embedded system technology and the like, and designs the intelligent access control system integrating the multi-network integration technology based on the concept of the Internet of things.
However, in the above prior art, each verification feature is used singly or several verification features are used in combination, but the combined use is not completed in the same interface or at the same time, but the combined use is divided into multiple steps and multiple interfaces to perform one-to-one verification successively.
Disclosure of Invention
The invention provides a method and a terminal for verifying multiple protection combination into the same interface based on electronic equipment, which solve the technical problem of complicated identity verification and low efficiency.
The invention provides a verification method for combining multiple kinds of protection into the same interface based on electronic equipment to solve the technical problems, which comprises the following steps:
the method comprises the steps that identity attribute comprehensive information is prestored at a server side, and the identity attribute comprehensive information comprises a plurality of identity recognition features corresponding to the identity;
when a user enters the same identification interface of the intelligent terminal for identity verification through the identity characteristics in the identity attribute comprehensive information, the intelligent terminal calls the corresponding identity attribute comprehensive information from the server side according to the identity characteristics;
and completing the one-to-one verification of all the identity recognition characteristics under the same recognition interface, and passing the verification when all the identity recognition characteristics are verified accurately.
Preferably, the comprehensive information of the identity attribute comprises at least two of face recognition, fingerprint, password, voiceprint and pupil.
Preferably, the user enters the same identification interface through the identity card or the identity card number, and the intelligent terminal calls the corresponding identity attribute comprehensive information from the server side according to the identity card or the identity card number.
Preferably, the intelligent terminal is an access lock, a safe, a smart phone, a tablet, a computer or a vending machine.
Preferably, the intelligent terminals pass verification on the same identification interface.
Preferably, the identity attribute comprehensive information includes a birth certificate.
Preferably, the certificate of birth enters an identification interface of the intelligent terminal for identity verification, and the electronic medical record is obtained.
The invention also provides a terminal for the verification method of combining multiple types of protection based on the electronic equipment into the same interface, the terminal comprises an identification interface, the identification interface comprises a plurality of modules for identifying identity information, and the intelligent terminal is in communication connection with the server.
Preferably, the recognition interface includes at least three of a human face recognition module, a fingerprint recognition module, a voiceprint recognition module and a pupil recognition module.
Has the advantages that: the invention provides a verification method and a terminal for combining multiple protections into the same interface based on electronic equipment, wherein the method comprises the steps of reserving and storing identity recognition characteristics such as a password, a fingerprint, face recognition, a voiceprint and the like of a user at a server end, using an interface video to perform recognition for the same interface by using more than three identity recognition modes when verification is required, firstly performing identity card verification on the user, then performing the same interface video, face recognition, pupil and finger pressing down the password to leave the fingerprint, and then speaking, leaving the voiceprint to perform corresponding verification, and if the verification is passed, the user is represented as the user. All operations are completed on one interface, all syndromes are integrated, the first one is safe, the first one passes, and the whole course is carefree. The method is safer, more convenient and faster, saves time for users, and improves user experience.
The foregoing description is only an overview of the technical solutions of the present invention, and in order to make the technical solutions of the present invention more clearly understood and to implement them in accordance with the contents of the description, the following detailed description is given with reference to the preferred embodiments of the present invention and the accompanying drawings. The detailed description of the present invention is given in detail by the following examples and the accompanying drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a schematic flow chart of a verification method and a terminal for combining multiple types of protection into a same interface based on electronic equipment according to the present invention;
FIG. 2 is a block diagram of a method and a terminal for verifying a same interface based on multiple types of protection combinations of electronic devices according to the present invention;
fig. 3 is a comparison diagram of a full screen interface and a half screen interface of the terminal and the verification method based on the combination of multiple types of protection of the electronic device into the same interface.
Detailed Description
The principles and features of this invention are described below in conjunction with the following drawings, which are set forth by way of illustration only and are not intended to limit the scope of the invention. The invention is described in more detail in the following paragraphs by way of example with reference to the accompanying drawings. Advantages and features of the present invention will become apparent from the following description and from the claims. It is to be noted that the drawings are in a very simplified form and are not to precise scale, which is merely for the purpose of facilitating and distinctly claiming the embodiments of the present invention.
It will be understood that when an element is referred to as being "secured to" another element, it can be directly on the other element or intervening elements may also be present. When a component is referred to as being "connected" to another component, it can be directly connected to the other component or intervening components may also be present. When a component is referred to as being "disposed on" another component, it can be directly on the other component or intervening components may also be present. The terms "vertical," "horizontal," "left," "right," and the like as used herein are for illustrative purposes only.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
As shown in fig. 1 to 3, the present invention provides a method for verifying multiple protection combinations into a same interface based on an electronic device, including:
the method comprises the steps that identity attribute comprehensive information is prestored at a server side, and the identity attribute comprehensive information comprises a plurality of identity recognition features corresponding to the identity;
when a user enters the same identification interface of the intelligent terminal for identity verification through the identity characteristics in the identity attribute comprehensive information, the intelligent terminal calls the corresponding identity attribute comprehensive information from the server side according to the identity characteristics;
and completing the one-to-one verification of all the identity recognition characteristics under the same recognition interface, and passing the verification when all the identity recognition characteristics are verified accurately.
The identity card verification, the face recognition, the fingerprint recognition, the password and the like are integrated on an interface in one step for simultaneous unified verification, and only when all the verifications are met, the verification is successful, and the system gives the authority to express that the operation of the user is undoubted. After the verification of the previous step is successful, the user is determined to be the user, and then the right is obtained to carry out the next operation, such as financial payment, entrance guard unlocking, pass gate and the like.
The method uses more than three security technologies to combine the video with the same interface. The method includes the steps that the mode of preserving a password, a fingerprint, face recognition, a voiceprint and the like of a user is reserved, an interface video is used, the user firstly carries out identity card verification, then the user faces an electronic device, a mobile phone and a computer and carries out the same interface video, the face recognition, a pupil and the fingerprint are left after the user presses the password, and then the voiceprint is left, so that the user can correspondingly solve the problem of passing through one step, time is short, the technical mode cannot be copied simultaneously by lawless persons within three seconds, and if a technical scheme is used, the risk of being cracked exists, so that the method is safer. For example, the password, the face recognition, the fingerprint and the voiceprint are used in the same interface, and the screen is viewed in the same interface, so that the recognition, the verification and the payment are passed. The superposition effect is generated, and the safety is higher. And the four characteristics are required to be operated by the user, and even if the other person takes the identification number, the bank card number and the password of the user, the payment cannot be finished or the money cannot be transferred away. As well as adding more nine after ninety-odd percent of the safety performance, the safety is further improved. The range of use, cell-phone mobile payment, ID card, personal certificate, computer, intelligent lock, safe deposit box, security unit, entrance guard's card, the safety door of cominging in and going out, identification such as electronic equipment, verification, pass. The user himself is most concerned about information certificate security, payment security and personal privacy security (a house door lock, a safe and the like can be opened for use only by identifying and verifying more than three technical schemes by an identity card (an electronic identity card), for example, even if lawless persons take a mobile phone of the user to know a bank card number, an account number and a password, the money can be transferred away by stealing personal information on the internet through a pinhole camera, but the user can avoid loss by using more than three technical schemes, so that the method is safer, more convenient and faster, and saves time for the user.
As shown in fig. 3, the display and the authentication identification are performed in the same section. The display of the verification identification can be a half screen or a full screen, and the screen display is particularly divided and arranged according to requirements so as to be fully utilized. When the intelligent terminal such as mobile phone equipment performs face recognition, password and fingerprint verification on the same interface in a full screen mode, then when the intelligent terminal enters the password interface, fingerprints need to be left, and when the intelligent terminal speaks, voiceprints are left. When the mobile phone electronic equipment is in a half-screen mode, face recognition, passwords and fingerprints of the same interface of the half-screen of the mobile phone electronic equipment are simultaneously verified, the password verification is performed on the lower half-screen, and the face recognition is performed on the upper half-screen.
In an optimal scheme, the identity attribute comprehensive information includes at least three of face recognition, fingerprint, voiceprint, password and pupil. According to specific needs, the comprehensive information of the identity attributes can be the above-mentioned multiple kinds of identity attribute comprehensive information, and other specific appointed attributes can be included, are not necessarily general, such as a private house or a safe case, and the comprehensive information of the identity attributes, such as height, hair, no glasses, and the like, can be continuously added.
According to the preferred scheme, a user enters the identification interface through the identity card or the identity card number, and the intelligent terminal calls corresponding identity attribute comprehensive information from the server side according to the identity card or the identity card number. Identity cards are of the greatest importance because they are the source of all documents, i.e. individual documents, which are handled as cards. If the user forgets to take the certificate, or does not take the certificate or loses the certificate, the user needs several departments to do things.
According to the preferred scheme, the intelligent terminal is an access lock, a safe, a smart phone, a tablet, a computer or a vending machine. The intelligent terminal can be installed and used in any place where network information is designed to be safe.
In a preferred scheme, the intelligent terminals comprise the same identification interface. The computer system of the issuing department is connected, and each certificate is made into an electronic certificate, for example: the existing 'electronic driving license' does not need to be provided with a driving license original, and the traffic police displaying the 'electronic driving license' on the mobile phone can also recognize the driving license and treat the driving license with the original in the same way. But also the electronic certificate which is mutually authenticated with each issuing authority system.
1. The identity card is firstly brushed on the same interface video, the face is brushed through the face recognition technology, the password is pressed, the fingerprint is left, and the identity is confirmed to be consistent with the identity card.
2. The confirmation of the transactor needs several 'electronic certificates' to identify and verify the identity of the transactor, and then transact the related certificates.
Therefore, a user can handle a lot of things needing to have the identity card by holding the identity card, time is saved, and the method is convenient, quick and simple.
3. The certificate handling cost can also be paid through a mobile phone. And (3) using a mobile payment technology, and swiping, confirming and binding the bank card number of the user through the identity card.
The following description will be made by taking a bank credit card as an example:
1. and (3) refreshing the face of the user in the same interface video by a face recognition technology, matching the face with the identity card, the password and the fingerprint of the user, and binding the bank card number of the user.
2. Bank card, credit card identification, verification payment consumption. The card-free payment is realized, and the cost can be saved. (for example, the Chinese Union of silver has issued 77 hundred million cards, available on the Internet.)
1) And inserting an identity card, brushing the face through a face recognition technology, and confirming that the fingerprint of the person is consistent with the identity.
2) The password of the bank card or the credit card is input.
3) The bank card number and the credit card number of the identity card of the user are displayed on the same interface screen, and the information of the card is uploaded to the 'cloud computing on the system for transaction processing confirmation' by pressing the column of the bank card or the credit card.
Only through the three verification methods, the bank card or the credit card can be used for consumption, so that the card using safety of the bank card or the credit card is ensured.
4) The method is characterized in that the method is cut in through an application point of the identity card (a module is similar to a two-dimensional code for each identity card), a merchant scans and swipes the identity card (the identity card is changed into a 'module or a' similar two-dimensional code through a technical means so as to ensure the information security of the identity card of a user and prevent the identity card from being revealed), and the small amount of the identity card is free of the password for fast payment and consumption without carrying a plurality of bank cards and credit cards. Even if the identity card and the password are stolen and known by lawbreakers. The face recognition technology is not available, and the face brushing and fingerprint identification are not available. Bank cards, credit cards and online transfer transaction payment are many users who are illegally swiped with passwords by lawbreakers (acquiring user accounts, card numbers and passwords through needle-eye cameras), and about 80-100 billion dollars are swiped globally every year.
5) By using the face recognition technology alone, the current recognition accuracy rate is about 95%, and the error of about 5% is solved. For example: the person with two or three births is well identified because the identification number of the person is unique.
Multifunctional intelligent terminal all-in-one machine life application scene
1. The person who takes the train or the airplane can safely get on or off the train or the airplane through the ticket checking port (a multifunctional intelligent terminal is installed) only by taking an identity card to swipe the face to confirm that the identity card is consistent with the person and displaying the getting-on or getting-off place on a liquid crystal screen.
2. Living hotel
The mobile payment hotel room fee (the hotel room door is provided with the intelligent terminal all-in-one machine) is paid by the mobile phone, the hotel room door can be swiped for check if the identity card is taken, and the identity card is swiped for confirmation, so that the hotel room door can be swiped for check-in, procedures of paying cash to a front desk and returning to the room are not needed when the hotel room is checked, and the time, convenience, rapidness and simplicity of a person in the hotel are saved.
While the multifunctional intelligent terminal all-in-one machine is installed in a hotel, an application scene is added, the small unmanned vending machine is provided, hot drinks comprise living goods such as coffee, black tea, milk and orange juice, the selling price of the hot drinks is 3-5 yuan, for example, (Nestle coffee instant type, brand is required).
People in the store have one free hot drink, the newly registered user also has one free hot drink, and the store and the newly registered user have two hot drinks, so that an application scene for interacting with the user is realized.
The platform system is suitable for Olympic games, civil accommodations, apartment hotels, quick hotels, company access cards, large-scale high-grade private clubs, members of security units and the like, and users can do all the work by using one identity card without transacting cards or using paper tickets.
Preferably, the identity attribute comprehensive information includes a birth certificate. And entering an identification interface of the intelligent terminal through the birth certificate to perform identity verification, and acquiring the electronic medical record.
A complete standard system of the birth certificate is not established in the world, people modify the birth year, month and day on the birth certificate and find a relationship to do the birth certificate again, which is a honesty problem, and the birth certificate can be dealt with only by strict procedures abroad, so that an electronic medical record, 'electronic birth certificate' is established.
1) At present, the urban floating population is large, and young couples grow children and often move home. Work is done in the city of today, tomorrow. If the birth certificate is lost and forgotten to be taken by the user during handling, the birth certificate can be electronically displayed on the mobile phone.
2) Can check blood type, allergic medicine (such as penicillin), other allergic substances, and other diseases of children, and can prevent diseases in advance.
The birth certificate of the child is very important (certainly in cooperation with medical institutions), which is also responsible for the health of the child.
Second, the benefits of establishing an electronic medical record
From birth certificate to each visit to see a doctor, the electronic medical record is made of the medical record of each time.
1. The doctor uses the mobile phone to download the intelligent terminal to the hospital for treatment, the doctor uses the mobile phone to pay, the mobile phone is used for paying the doctor fee, and the doctor does not need to queue to pay cash.
2. The doctor records the examination result, treatment and medication of the patient by using the electronic medical record.
3. At present, medical records written by many doctors are like astronomy, and no people can understand the medical records, so that the patients can faithfully know the conditions of the patients without losing the medical records.
4. With the electronic medical record, the doctor dares not to drive the medicine, and forgets to drive the medicine, because the electronic medical record is internet-property and unchangeable data, the medical accidents between the patient and the doctor can be reduced, the record can be realized, the doctor is safe, the doctor's responsibility can be ensured, and the money can be saved for the doctor who sees the medicine.
5. Electronic medical records can reduce the repeated treatment situations, such as: the outpatient service number of the expert can be reserved in advance, the registration is carried out, and the payment does not need to be queued. The patient may go to several hospitals to see a doctor, and with the electronic medical record, the patient can know which conditions the patient has checked, such as CT, X-ray, blood test, and the presence or absence of allergic drugs (such as penicillin and other allergens), and with several diseases of the patient, such as gastropathy, hypertension, hyperlipidemia and other diseases, and with the electronic medical record, the doctor can carry out comprehensive treatment, and the misjudgment is reduced.
The user can handle the matters of a plurality of certificates by using one identity card. Travel, consumption, sickness, trains, airplanes and hotel accommodations are all done, and users are helped to save time, and the travel is convenient, quick, simple and safe. When the identity card is swiped for consumption, the user does not need to worry about the fact that the card is copied or the password is stolen. The user can use the product under the platform in any extreme or dangerous situation, such as: the mobile phone, cash, identity cards are lost, robbery is stolen, identity cards of other people cannot be needed by a bad person, the mobile phone is afraid of alarming, the mobile phone and the cash are not available, and users can collect cash and pay for consumption at places where intelligent terminals (fingerprints, passwords and face recognition functions are adopted to collect cash when the identity cards are not available) or shops can brush the identity cards without the mobile phone as long as the users have the identity cards under the condition of immature places. Such as: sudden earthquake, mountain torrents, cell-phone are soaked, and the damage has not been electrified or has not had the signal, as long as the user has the ID card, can be according to the condition that the user used intelligent terminal in the past, give different interim emergent amount, the interim amount of one thousand yuan to two thousand yuan people's local currency. The intelligent terminal (adopting fingerprint, password and face recognition function to get cash when no identity card exists) or the place where the store can brush the identity card to get cash and consume. Can maintain the social stability of the local area at the time, because necessary living goods can be purchased.
The foregoing is merely a preferred embodiment of the invention and is not intended to limit the invention in any manner; the present invention may be readily implemented by those of ordinary skill in the art as illustrated in the accompanying drawings and described above; however, those skilled in the art should appreciate that they can readily use the disclosed conception and specific embodiments as a basis for designing or modifying other structures for carrying out the same purposes of the present invention without departing from the scope of the invention as defined by the appended claims; meanwhile, any changes, modifications, and evolutions of the equivalent changes of the above embodiments according to the actual techniques of the present invention are still within the protection scope of the technical solution of the present invention.

Claims (9)

1. A verification method for combining multiple kinds of protection based on electronic equipment into a same interface is characterized by comprising the following steps:
the method comprises the steps that identity attribute comprehensive information is prestored at a server side, and the identity attribute comprehensive information comprises a plurality of identity recognition features corresponding to the identity;
when a user enters the same identification interface of the intelligent terminal for identity verification through the identity characteristics in the identity attribute comprehensive information, the intelligent terminal calls the corresponding identity attribute comprehensive information from the server side according to the identity characteristics;
and completing the one-to-one verification of all the identity recognition characteristics under the same recognition interface, and passing the verification when all the identity recognition characteristics are verified accurately.
2. The method of claim 1, wherein the comprehensive information of identity attributes comprises at least two of face recognition, fingerprint, password, voiceprint and pupil.
3. The method for verifying multiple protection combinations to the same interface based on the electronic equipment as claimed in claim 1, wherein the user enters the same identification interface through an identity card or an identity card number, and the intelligent terminal calls corresponding identity attribute comprehensive information from the server side according to the identity card or the identity card number.
4. The electronic device-based multiple protection and identity interface verification method according to claim 1, wherein the intelligent terminal is an access lock, a safe, a smart phone, a tablet, a computer or a vending machine.
5. The electronic device-based multiple protection combination same interface verification method according to claim 1, wherein the intelligent terminal passes verification on the same identification interface.
6. The method of claim 1, wherein the integrated identity attribute information comprises a birth certificate.
7. The method for verifying multiple protection combinations into the same interface based on the electronic device as claimed in claim 6, wherein the electronic medical record is obtained by entering the birth certificate into the identification interface of the intelligent terminal for identity verification.
8. Terminal for multiple protection and integration into a same interface verification method based on electronic devices according to any of claims 1 to 7, characterized in that: the terminal comprises an identification interface, the identification interface comprises a plurality of modules used for identifying identity information, and the intelligent terminal is in communication connection with the server.
9. The electronic device-based multiple protection combination same interface verification terminal according to claim 8, wherein the identification interface comprises at least three of a human face identification module, a fingerprint identification module, a voiceprint identification module and a pupil identification module.
CN202011353494.3A 2021-02-26 2021-02-26 Verification method and terminal for combining multiple kinds of protection into one interface based on electronic equipment Pending CN112685704A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011353494.3A CN112685704A (en) 2021-02-26 2021-02-26 Verification method and terminal for combining multiple kinds of protection into one interface based on electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011353494.3A CN112685704A (en) 2021-02-26 2021-02-26 Verification method and terminal for combining multiple kinds of protection into one interface based on electronic equipment

Publications (1)

Publication Number Publication Date
CN112685704A true CN112685704A (en) 2021-04-20

Family

ID=75446972

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011353494.3A Pending CN112685704A (en) 2021-02-26 2021-02-26 Verification method and terminal for combining multiple kinds of protection into one interface based on electronic equipment

Country Status (1)

Country Link
CN (1) CN112685704A (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1975765A (en) * 2006-11-28 2007-06-06 天津大学 Electronic certificate based on human body double-biological characteristic and certificate holder identity recognition integrated machine
CN101540083A (en) * 2009-04-16 2009-09-23 成都方程式电子有限公司 Method utilizing ID card number as bank account number and adopting fingerprint for ID authentication
CN202548973U (en) * 2012-02-17 2012-11-21 厦门烟草工业有限责任公司 Bank card security certification system for replacing password authentication mode
CN106373290A (en) * 2016-11-04 2017-02-01 深圳市亚略特生物识别科技有限公司 Intelligent certificate handling device
CN107967417A (en) * 2016-10-19 2018-04-27 宏碁股份有限公司 Dynamic verification method and correlative computer system
CN107980131A (en) * 2017-08-21 2018-05-01 深圳市汇顶科技股份有限公司 Identity identifying method, device and electronic equipment based on multi-biological characteristic sensor
CN108197445A (en) * 2016-10-11 2018-06-22 新疆信息产业有限责任公司 Computer user's identity recognition device and application method
CN207624005U (en) * 2017-12-28 2018-07-17 北京海鑫科金高科技股份有限公司 It is acquired simultaneously with ten finger fingerprints, the device of Identification of Images and speech recognition
CN108880815A (en) * 2017-05-12 2018-11-23 阿里巴巴集团控股有限公司 Auth method, device and system
CN208156684U (en) * 2018-03-27 2018-11-27 深圳怡化电脑股份有限公司 Authentication means
CN109034830A (en) * 2018-10-15 2018-12-18 上海译会信息科技有限公司 A kind of management of personal money auxiliary system
CN109740330A (en) * 2018-12-26 2019-05-10 北京中和能科技有限公司 Terminal for public convenience based on a variety of authentications
CN111199032A (en) * 2019-12-31 2020-05-26 华为技术有限公司 Identity authentication method and device
CN112307451A (en) * 2019-07-31 2021-02-02 华为技术有限公司 Multi-mode identity recognition method and equipment

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1975765A (en) * 2006-11-28 2007-06-06 天津大学 Electronic certificate based on human body double-biological characteristic and certificate holder identity recognition integrated machine
CN101540083A (en) * 2009-04-16 2009-09-23 成都方程式电子有限公司 Method utilizing ID card number as bank account number and adopting fingerprint for ID authentication
CN202548973U (en) * 2012-02-17 2012-11-21 厦门烟草工业有限责任公司 Bank card security certification system for replacing password authentication mode
CN108197445A (en) * 2016-10-11 2018-06-22 新疆信息产业有限责任公司 Computer user's identity recognition device and application method
CN107967417A (en) * 2016-10-19 2018-04-27 宏碁股份有限公司 Dynamic verification method and correlative computer system
CN106373290A (en) * 2016-11-04 2017-02-01 深圳市亚略特生物识别科技有限公司 Intelligent certificate handling device
CN108880815A (en) * 2017-05-12 2018-11-23 阿里巴巴集团控股有限公司 Auth method, device and system
CN107980131A (en) * 2017-08-21 2018-05-01 深圳市汇顶科技股份有限公司 Identity identifying method, device and electronic equipment based on multi-biological characteristic sensor
CN207624005U (en) * 2017-12-28 2018-07-17 北京海鑫科金高科技股份有限公司 It is acquired simultaneously with ten finger fingerprints, the device of Identification of Images and speech recognition
CN208156684U (en) * 2018-03-27 2018-11-27 深圳怡化电脑股份有限公司 Authentication means
CN109034830A (en) * 2018-10-15 2018-12-18 上海译会信息科技有限公司 A kind of management of personal money auxiliary system
CN109740330A (en) * 2018-12-26 2019-05-10 北京中和能科技有限公司 Terminal for public convenience based on a variety of authentications
CN112307451A (en) * 2019-07-31 2021-02-02 华为技术有限公司 Multi-mode identity recognition method and equipment
CN111199032A (en) * 2019-12-31 2020-05-26 华为技术有限公司 Identity authentication method and device

Similar Documents

Publication Publication Date Title
US20220222329A1 (en) Systems and methods for securely processing a payment
JP5612332B2 (en) Fraud prevention security card storing biometric information and method of using the same
US8103881B2 (en) System, method and apparatus for electronic ticketing
US5457747A (en) Anti-fraud verification system using a data card
US20060282395A1 (en) Methods for using a mobile communications device in consumer, medical and law enforcement transactions
US20070073619A1 (en) Biometric anti-fraud plastic card
US20120109829A1 (en) Method and system for processing transactions using a token
WO2018094584A1 (en) Payment and identity authentication system based on biometric feature recognition
US20060064392A1 (en) Electronic identification system for form location, organization, and endorsment
JP6703724B2 (en) Financial transactions, security and management methods with biometric characteristic combination identification system
US6672808B1 (en) Pneumatic transfer terminal and method of operation
CN206991312U (en) Medical services terminal and system
CN109426963A (en) Authenticate the biometric system of biometrics request
US20100306106A1 (en) Apparatus system and method of Payment identification means using pulse and fingerprints
Shinzaki Use case of palm vein authentication
CN201955846U (en) Customer self-service processing equipment and self-service authorized certification system
CN112685704A (en) Verification method and terminal for combining multiple kinds of protection into one interface based on electronic equipment
RU143577U1 (en) DEVICE FOR PAYING GOODS AND SERVICES USING CUSTOMER'S BIOMETRIC PARAMETERS
CN206470859U (en) A kind of Citizen Card Item bank circle deposits equipment
WO2023129280A1 (en) System and method for authentication and payment while wearing a face covering
CN116745863A (en) Method for automatically providing electronic prescriptions and medicines to patients through electronic prescription information system
WO2002095645A1 (en) The kiosk system for combined perscriptional publishing, electronic transfer and cd(cash dispenser)
US20150074008A1 (en) Secure identification system and method
JP2005004333A (en) Personal identification method
US20130126604A1 (en) All-card-in-one system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination