CN114844661A - System and method for realizing remote authority verification management - Google Patents

System and method for realizing remote authority verification management Download PDF

Info

Publication number
CN114844661A
CN114844661A CN202210153364.8A CN202210153364A CN114844661A CN 114844661 A CN114844661 A CN 114844661A CN 202210153364 A CN202210153364 A CN 202210153364A CN 114844661 A CN114844661 A CN 114844661A
Authority
CN
China
Prior art keywords
verification
information
service
management platform
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210153364.8A
Other languages
Chinese (zh)
Other versions
CN114844661B (en
Inventor
李首峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guozhengtong Technology Co ltd
Original Assignee
Guozhengtong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guozhengtong Technology Co ltd filed Critical Guozhengtong Technology Co ltd
Priority to CN202210153364.8A priority Critical patent/CN114844661B/en
Publication of CN114844661A publication Critical patent/CN114844661A/en
Application granted granted Critical
Publication of CN114844661B publication Critical patent/CN114844661B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a system and a method for realizing remote authority verification management, wherein the system comprises: user terminal, service terminal and management platform. The method comprises the following steps: sending a service request carrying personal information to a management platform; the management platform receives a service request transmitted by a user terminal; verifying personal information according to the service request; if the information verification is successful, sending a service verification code to the user terminal; the service terminal inputs a service verification code and sends an identity authentication request to the management platform based on the input service verification code; and the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal. And the service terminal receives the identity authentication result transmitted by the management platform and performs related services according to the identity authentication result. The method and the system can realize remote authority verification management, save the working time of the party and improve the working efficiency.

Description

System and method for realizing remote authority verification management
Technical Field
The application belongs to the technical field of computers, and particularly relates to a system and a method for realizing remote permission verification management.
Background
In the existing window service, a party is required to transact on site, the time spent by the party is often long, or the transaction data is incomplete, so that the party needs to go to and fro between the site and a family for many times. In the prior art, for conditions that unlocking, identity card-free stores, special control areas for entrance and exit and the like need to be granted with authority or for proving, the existing platform cannot provide services with similar functions, and the functions are characterized in that a party and a server need to jointly confirm the relationship between the services and the services, and have certain timeliness.
Aiming at the problem that the prior art can not remotely provide authority verification management for a certain special service, an effective solution is not provided.
Disclosure of Invention
Based on the technical problems, the application provides a system and a method for realizing remote authority verification management.
In a first aspect, the present application provides a system for implementing remote rights verification management, including: the system comprises a user terminal, a service terminal and a management platform;
the user terminal and the service terminal are respectively in data communication with the management platform;
the user terminal is used for sending a service request carrying personal information to the management platform and receiving a service verification code transmitted from the management platform;
the service terminal is used for inputting the service verification code, sending an identity authentication request to the management platform based on the input service verification code and receiving an identity authentication result transmitted by the management platform;
the management platform is used for receiving a service request transmitted by a user terminal, receiving an identity authentication request transmitted by a service terminal, and performing personal information verification according to the service request, if the information verification is successful, sending a service verification code to the user terminal, and if the information verification is unsuccessful, sending information that the information verification fails to pass to the user terminal; and performing identity verification according to the identity authentication request, and sending an identity authentication result to the service terminal.
The personal information includes: name, identification card number, mobile phone number.
The service authentication code comprises one of the following forms: ID number, service code, two-dimensional code.
The management platform comprises: the system comprises a personal information verification module, an identity verification module and a block chain;
the personal information verification module and the identity verification module are respectively connected with the block chain;
the personal information verification module is used for comparing personal information with all information in an information base, if the personal information is consistent with certain information in the information base, the information verification is considered to be successful, a service verification code is generated, and the service verification code is sent to the user terminal; if the personal information is inconsistent with all information in the information base, the information verification is not successful, information which is not verified is sent to the user terminal, and the personal information and the information verification result are sent to the block chain module;
the identity verification module is used for performing timeliness face identity verification on the service, and if the face identity verification is successful, identity authentication success information is sent to the service terminal; if the face identity verification is unsuccessful, sending identity authentication failure information to the service terminal, and sending an identity verification result to the block chain module;
the block chain module is used for storing the personal information, the information verification result and the identity verification result in each service request according to a time sequence.
The information verification result comprises: the service verification code and the information verification fail information;
the identity verification result comprises: identity authentication success information and identity authentication failure information.
The face identity verification comprises the following steps: static picture face recognition, video stream face smile recognition and video stream face nodding recognition;
the timeliness refers to that the face identity authentication is carried out within a given time range, the face identity authentication cannot be carried out outside the given time range, and a service request needs to be submitted again.
In a second aspect, the present application provides a method for implementing remote rights verification management, including the following steps:
sending a service request carrying personal information to a management platform;
the management platform receives a service request transmitted by a user terminal;
the management platform carries out personal information verification according to the service request;
if the information verification is successful, sending a service verification code to the user terminal;
if the information verification is unsuccessful, sending information that the information verification fails to pass to the user terminal;
the user terminal receives the service verification code transmitted from the management platform;
the service terminal inputs a service verification code and sends an identity authentication request to the management platform based on the input service verification code;
and the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal.
And the service terminal receives the identity authentication result transmitted by the management platform and performs related services according to the identity authentication result.
The management platform carries out personal information verification according to the service request, and the process is as follows:
comparing the personal information with all information in the information base;
if the personal information is consistent with certain information in the information base, the information is considered to be successfully verified, a service verification code is generated, and the service verification code is sent to the user terminal;
if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, and information which does not pass the information verification is sent to the user terminal;
sending the personal information and the information verification result to a block chain module for storage;
the management platform carries out identity verification according to the identity authentication request, and the process is as follows:
carrying out face identity verification with timeliness on the service;
if the face identity verification is successful, sending identity authentication success information to the service terminal;
if the face identity verification is unsuccessful, sending identity authentication failure information to the service terminal;
and sending the identity authentication result to the block chain module for storage.
In a third aspect, the present application provides an electronic device, comprising:
one or more processors; a memory; one or more application programs stored in the memory and configured to be loaded and executed by the one or more processors to perform the method of implementing remote rights verification management.
In a fourth aspect, the present application proposes a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the method for implementing remote rights verification management according to the second aspect or any possible implementation manner of the second aspect.
The beneficial technical effects are as follows:
the application provides a system and a method for realizing remote authority verification management, which can realize remote authority verification management, save the working time of parties and improve the working efficiency.
Drawings
FIG. 1 is a schematic block diagram of a remote right verification management system according to an embodiment of the present disclosure;
FIG. 2 is a schematic block diagram illustrating an internal implementation of a management platform according to an embodiment of the present disclosure;
FIG. 3 is a flowchart of a method for implementing remote permission verification management according to an embodiment of the present application;
FIG. 4 is a flow chart of personal information verification according to an embodiment of the present application;
fig. 5 is a flowchart of authentication according to an embodiment of the present application.
The specific implementation mode is as follows:
the present application is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present application is not limited thereby.
In a first aspect, the present application provides a system for implementing remote rights verification management, as shown in fig. 1, including: the system comprises a user terminal, a service terminal and a management platform;
the user terminal and the service terminal are respectively in data communication with the management platform;
the user terminal is used for sending a service request carrying personal information to the management platform and receiving a service verification code transmitted from the management platform;
the service terminal is used for inputting the service verification code, sending an identity authentication request to the management platform based on the input service verification code and receiving an identity authentication result transmitted by the management platform;
the management platform is used for receiving a service request transmitted by a user terminal, receiving an identity authentication request transmitted by a service terminal, and verifying personal information according to the service request, if the information verification is successful, sending a service verification code to the user terminal, and if the information verification is unsuccessful, sending verification failure information to the user terminal; and performing identity verification according to the identity authentication request, and sending an identity authentication result to the service terminal.
The personal information includes: name, ID card number, mobile phone number, service address.
The service authentication code comprises one of the following forms: ID number, service code, two-dimensional code.
The management platform, whose interior is shown in fig. 2, includes: the system comprises a personal information verification module, an identity verification module and a block chain;
the personal information verification module and the identity verification module are respectively connected with the block chain;
the personal information verification module is used for comparing personal information with all information in an information base, if the personal information is consistent with certain information in the information base, the information verification is considered to be successful, a service verification code is generated, and the service verification code is sent to the user terminal; if the personal information is inconsistent with all the information in the information base, the information verification is not successful, verification failure information is sent to the user terminal, and the personal information and the information verification result are sent to the block chain module;
the identity verification module is used for performing timeliness face identity verification on the service, and if the face identity verification is successful, identity authentication success information is sent to the service terminal; if the face identity verification is unsuccessful, sending identity authentication failure information to the service terminal, and sending an identity verification result to the block chain module;
and the block chain module is used for storing the personal information, the information verification result and the identity verification result in each service request according to the time sequence.
The information verification result comprises: the service verification code and the information verification fail information;
the identity verification result comprises: identity authentication success information and identity authentication failure information.
The face identity verification comprises the following steps: static picture face recognition, video stream face smile recognition and video stream face nodding recognition;
the timeliness refers to that the face identity authentication is carried out within a given time range, the face identity authentication cannot be carried out outside the given time range, and a service request needs to be submitted again.
In a second aspect, the present application provides a method for implementing remote rights verification management, as shown in fig. 3, including the following steps:
step S1: sending a service request carrying personal information to a management platform;
step S2: the management platform receives a service request transmitted by a user terminal;
step S3: the management platform carries out personal information verification according to the service request;
step S4: if the information verification is successful, sending a service verification code to the user terminal;
step S5: if the information verification is unsuccessful, sending verification failure information to the user terminal;
step S6: the user terminal receives the service verification code transmitted from the management platform;
step S7: the service terminal inputs a service verification code and sends an identity authentication request to the management platform based on the input service verification code;
step S8: and the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal.
Step S9: and the service terminal receives the identity authentication result transmitted by the management platform and performs related services according to the identity authentication result.
The management platform performs personal information verification according to the service request, as shown in fig. 4, the process is as follows:
step S3.1: comparing the personal information with all information in the information base;
step S3.2: if the personal information is consistent with certain information in the information base, the information is considered to be successfully verified, a service verification code is generated, and the service verification code is sent to the user terminal;
step S3.3: if the personal information is inconsistent with all the information in the information base, the information verification is regarded as unsuccessful, and information which does not pass the verification is sent to the user terminal;
step S3.4: and sending the personal information and the information verification result to a block chain module for storage.
The management platform performs identity verification according to the identity authentication request, as shown in fig. 5, the process is as follows:
step S8.1: carrying out face identity verification with timeliness on the service;
step S8.2: if the face identity verification is successful, sending identity authentication success information to the service terminal;
step S8.3: if the face identity verification is unsuccessful, sending identity authentication failure information to the service terminal;
step S8.4: and sending the identity authentication result to the block chain module for storage.
Example 1:
aiming at the authentication of the identity of the unlocked party in the service, the system and the method of the application are described in detail as follows:
if a user downloads a user terminal APP by using a mobile phone of property or other neighbors with the help of the authority verification management system of the application, personal information is filled in the user terminal APP, namely, a name, an identity card number and a telephone number are filled, a service request carrying the personal information is sent to a management platform of the authority verification management system, and meanwhile, an address of the service is also sent to the management platform through GPS positioning in the mobile phone, and the management platform receives the service request transmitted by the user terminal; and according to the service request, personal information verification is carried out; comparing the personal information with all information in the information base; for example: thirdly, the number of the identity card is 123456789102456577, if the personal information is consistent with certain information in the information base, the information verification is considered to be successful, a service verification code is generated, the service verification code can be a string of numbers or a two-dimensional code, and the service verification code is sent to the user terminal; if the personal information is inconsistent with all the information in the information base, the information verification is regarded as unsuccessful, and information which does not pass the verification is sent to the user terminal;
the user terminal used by the party receives the service verification code transmitted from the management platform; if the transmitted serial numbers are transmitted, the service personnel assisting the principal in unlocking inputs the serial characters through the service terminal, and sends an identity authentication request to the management platform based on the serial characters, and at the moment, the management platform knows that the service request sent by the principal is matched with the identity authentication request, so as to complete the same service; and if the two-dimension code is transmitted by the management platform, the service personnel assisting the party in unlocking scans the two-dimension code by using the service terminal APP, and sends an identity authentication request to the management platform based on the scanning result of the two-dimension code.
And the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal.
Carrying out face identity verification with timeliness on the service; in the prior art, the face authentication includes: static picture face identification, video stream face smile identification, video stream face nod identification, the party passes through service terminal APP promptly, shoots the photo and carries out static picture face identification, records the video on the spot and carries out face smile identification and face nod identification. If the plurality of items pass, the face identity verification is successful, and identity authentication success information is sent to the service terminal; if the face identity verification is unsuccessful, sending identity authentication failure information to the service terminal; the face authentication has validity, for example, within 10 minutes, and if the face authentication is out of 10 minutes, the principal needs to make a service request again to obtain the service authentication code, so that further authentication can be performed. If the service terminal receives the identity authentication transmitted by the management platform successfully, the service personnel can unlock the party.
The application has a special condition that the personal information of the party needs to be protected, cannot be stolen or maliciously tampered, so the application needs to adopt a block chain technology.
The block chain technology has the characteristics of distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, intermediate links cannot be tampered and counterfeited, information of parties obtaining authority authentication is kept secret by related data chaining, the parties are not easy to steal, tracking and tracing are supported, and therefore the function of authority verification is achieved by the block chain technology.
And sending the personal information and the information verification result to a block chain module for storage. And sending the identity authentication result to the block chain module for storage. The blockchain stores each service in chronological order.
Example 2:
similarly, when a person does not have an identity card but needs to stay in a hotel, the person generally needs to locally dispatch an identity certificate to prove the legal identity of the person, but the party needs to find the local dispatch site in a strange environment and needs proper time, so the difficulty is thought to be known, and the on-line remote identity verification can save the time for the party and the service staff to handle, and the efficiency is improved.
In this embodiment, a party without an identity card can download a user terminal APP with a mobile phone of the party, fill personal information in the user terminal APP, that is, fill in a name, an identity card number, and a phone number, send a service request carrying the personal information to a management platform of an authority verification management system, and send an address of the service to the management platform through GPS positioning in the mobile phone, where the management platform receives the service request sent by the user terminal; and according to the service request, personal information verification is carried out; comparing the personal information with all information in the information base; if the personal information is consistent with certain information in the information base, the information is considered to be successfully verified, a service verification code is generated, the service verification code can be a string of numbers or a two-dimensional code, and the service verification code is sent to the user terminal; if the personal information is inconsistent with all the information in the information base, the information verification is regarded as unsuccessful, and information which does not pass the verification is sent to the user terminal;
the user terminal used by the party receives the service verification code transmitted from the management platform; and if the two-dimension code is transmitted by the management platform, the hotel service personnel scans the two-dimension code by using the service terminal APP and sends an identity authentication request to the management platform based on the scanning result of the two-dimension code.
And the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal.
If the service terminal receives the identity authentication transmitted by the management platform successfully, the service personnel can check in the hotel for the party.
And sending the personal information and the information verification result to a block chain module for storage. And sending the identity authentication result to the block chain module for storage. The blockchain stores each service in chronological order.
Example 3:
when a person enters or exits a special control area, the same process is carried out, the party can download a user terminal APP by using a mobile phone of the party, personal information is filled in the user terminal APP, a service request carrying the personal information is sent to a management platform of the authority verification management system, meanwhile, an address of the service is also sent to the management platform through GPS positioning in the mobile phone, and the management platform receives the service request transmitted by the user terminal; and according to the service request, personal information verification is carried out; comparing the personal information with all information in the information base; and if the personal information is consistent with certain information in the information base, the information verification is considered to be successful, and a service verification code is generated, wherein the information base at the moment can be an information base formed by a list of appointed personnel, namely the appointed personnel has the authority of accessing a special control area. If the personal information is inconsistent with all the information in the information base, the information verification is regarded as unsuccessful, and information which does not pass the verification is sent to the user terminal;
the user terminal used by the party receives the service verification code transmitted from the management platform; and if the two-dimension code is transmitted by the management platform, scanning the two-dimension code by the security personnel service terminal APP in the special control area, and sending an identity authentication request to the management platform based on the scanning result of the two-dimension code.
And the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal.
If the service terminal receives the identity authentication transmitted by the management platform successfully, the security personnel in the special control area can let the party go in and out of the special control area.
And sending the personal information and the information verification result to a block chain module for storage. And sending the identity authentication result to the block chain module for storage. The blockchain stores each service in chronological order.
In a third aspect, the present application provides an electronic device, comprising:
one or more processors; a memory; one or more application programs stored in the memory and configured to be loaded and executed by the one or more processors to perform the method of implementing remote rights verification management.
In a fourth aspect, the present application proposes a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the method for implementing remote rights verification management according to the second aspect or any possible implementation manner of the second aspect.
The present applicant has described and illustrated embodiments of the present invention in detail with reference to the accompanying drawings, but it should be understood by those skilled in the art that the above embodiments are merely preferred embodiments of the present invention, and the detailed description is only for the purpose of helping the reader to better understand the spirit of the present invention, and not for limiting the scope of the present invention, and on the contrary, any improvement or modification made based on the spirit of the present invention should fall within the scope of the present invention.

Claims (10)

1. A system for implementing remote rights verification management, comprising: the system comprises a user terminal, a service terminal and a management platform;
the user terminal and the service terminal are respectively in data communication with the management platform;
the user terminal is used for sending a service request carrying personal information to the management platform and receiving a service verification code transmitted from the management platform;
the service terminal is used for inputting the service verification code, sending an identity authentication request to the management platform based on the input service verification code and receiving an identity authentication result transmitted by the management platform; the management platform is used for receiving a service request transmitted by a user terminal, receiving an identity authentication request transmitted by a service terminal, and performing personal information verification according to the service request, if the information verification is successful, sending a service verification code to the user terminal, and if the information verification is unsuccessful, sending information that the information verification fails to pass to the user terminal; and performing identity verification according to the identity authentication request, and sending an identity authentication result to the service terminal.
2. The system for implementing remote rights verification management of claim 1, wherein the personal information includes: name, identification card number, mobile phone number; the service authentication code comprises one of the following forms: ID number, service code, two-dimensional code.
3. The system for implementing remote rights verification management of claim 1, wherein the management platform comprises: the system comprises a personal information verification module, an identity verification module and a block chain;
the personal information verification module and the identity verification module are respectively connected with the block chain;
the personal information verification module is used for comparing personal information with all information in an information base, if the personal information is consistent with certain information in the information base, the information verification is considered to be successful, a service verification code is generated, and the service verification code is sent to the user terminal; if the personal information is inconsistent with all information in the information base, the information verification is not successful, information which is not verified is sent to the user terminal, and the personal information and the information verification result are sent to the block chain module;
the identity verification module is used for performing timeliness face identity verification on the service, and if the face identity verification is successful, identity authentication success information is sent to the service terminal; if the face identity verification is unsuccessful, sending identity authentication failure information to the service terminal, and sending an identity verification result to the block chain module;
and the block chain module is used for storing the personal information, the information verification result and the identity verification result in each service request according to the time sequence.
4. The system for implementing remote rights verification management of claim 3, wherein the information verification result includes: the service verification code and the information verification fail information; the identity verification result comprises: identity authentication success information and identity authentication failure information.
5. The system for implementing remote rights verification management of claim 3, wherein the face authentication comprises: static picture face recognition, video stream face smile recognition and video stream face nodding recognition;
the timeliness refers to that the face identity authentication is carried out within a given time range, the face identity authentication cannot be carried out outside the given time range, and a service request needs to be submitted again.
6. A method for realizing remote authority verification management is characterized by comprising the following steps: sending a service request carrying personal information to a management platform;
the management platform receives a service request transmitted by a user terminal;
the management platform carries out personal information verification according to the service request;
if the information verification is successful, sending a service verification code to the user terminal;
if the information verification is unsuccessful, sending information that the information verification fails to pass to the user terminal;
the user terminal receives the service verification code transmitted from the management platform;
the service terminal inputs a service verification code and sends an identity authentication request to the management platform based on the input service verification code;
the management platform carries out identity verification according to the identity authentication request and sends an identity authentication result to the service terminal;
and the service terminal receives the identity authentication result transmitted by the management platform and performs related services according to the identity authentication result.
7. The method for implementing remote rights verification management as claimed in claim 6, wherein said management platform performs personal information verification according to said service request by the following procedure:
comparing the personal information with all information in the information base;
if the personal information is consistent with certain information in the information base, the information is considered to be successfully verified, a service verification code is generated, and the service verification code is sent to the user terminal;
if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, and information which does not pass the information verification is sent to the user terminal;
and sending the personal information and the information verification result to a block chain module for storage.
8. The method for implementing remote rights verification management of claim 6, wherein the management platform performs the identity verification according to the identity authentication request, and the process is as follows:
carrying out face identity verification with timeliness on the service;
if the face identity verification is successful, sending identity authentication success information to the service terminal;
if the face identity verification is unsuccessful, sending identity authentication failure information to the service terminal;
and sending the identity authentication result to the block chain module for storage.
9. An electronic device, comprising:
one or more processors;
a memory;
one or more application programs stored in the memory and configured to be loaded and executed by the one or more processors to perform a method of implementing remote rights verification management as recited in any of claims 6-8.
10. A computer-readable storage medium, characterized in that,
stored thereon a computer program which can be loaded and run by a processor to carry out the method of carrying out remote rights verification management according to any one of claims 6 to 8.
CN202210153364.8A 2022-02-18 2022-02-18 System, method, equipment and storage medium for realizing remote authority verification management Active CN114844661B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210153364.8A CN114844661B (en) 2022-02-18 2022-02-18 System, method, equipment and storage medium for realizing remote authority verification management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210153364.8A CN114844661B (en) 2022-02-18 2022-02-18 System, method, equipment and storage medium for realizing remote authority verification management

Publications (2)

Publication Number Publication Date
CN114844661A true CN114844661A (en) 2022-08-02
CN114844661B CN114844661B (en) 2023-07-14

Family

ID=82562330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210153364.8A Active CN114844661B (en) 2022-02-18 2022-02-18 System, method, equipment and storage medium for realizing remote authority verification management

Country Status (1)

Country Link
CN (1) CN114844661B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112418960A (en) * 2020-11-26 2021-02-26 深圳供电局有限公司 Remote billing method and system for power industry
CN112489274A (en) * 2020-11-27 2021-03-12 江苏盖睿健康科技有限公司 Access control method and system
WO2021136290A1 (en) * 2019-12-31 2021-07-08 华为技术有限公司 Identity authentication method and apparatus, and related device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021136290A1 (en) * 2019-12-31 2021-07-08 华为技术有限公司 Identity authentication method and apparatus, and related device
CN112418960A (en) * 2020-11-26 2021-02-26 深圳供电局有限公司 Remote billing method and system for power industry
CN112489274A (en) * 2020-11-27 2021-03-12 江苏盖睿健康科技有限公司 Access control method and system

Also Published As

Publication number Publication date
CN114844661B (en) 2023-07-14

Similar Documents

Publication Publication Date Title
US10616198B2 (en) Apparatus, system and method employing a wireless user-device
CN109325342B (en) Identity information management method, device, computer equipment and storage medium
US8751801B2 (en) System and method for authenticating users using two or more factors
CN111092899B (en) Information acquisition method, device, equipment and medium
CN103443719A (en) Anti-identity theft and information security system process
BRPI0722174A2 (en) METHOD AND SYSTEM FOR AUTHENTICING USERS IN A DATA PROCESSING SYSTEM.
WO2009101549A2 (en) Method and mobile device for registering and authenticating a user at a service provider
WO2019226115A1 (en) Method and apparatus for user authentication
US11948417B2 (en) Touchless visitor management
US11196738B2 (en) Identification and authentication of a user using identity-linked device information for facilitation of near-field events
CA3154974A1 (en) Systems and methods for data access control of secure memory using a short-range transceiver
CN116962021A (en) Method, device, equipment and medium for user real name authentication in financial cooperative institution
US20160342996A1 (en) Two-factor authentication method
KR101187414B1 (en) System and method for authenticating card issued on portable terminal
CN114844661B (en) System, method, equipment and storage medium for realizing remote authority verification management
US20210342477A1 (en) Systems and methods for data access control of personal user data using a short-range transceiver
CN114553573A (en) Identity authentication method and device
US20220353084A1 (en) Multifactor authentication through cryptography-enabled smart cards
CN115527294B (en) NFC signal vehicle unlocking method of security chip and security chip device
EP4364012A1 (en) An encoded animated image and a method of generating, displaying and reading such encoded animated image, in particular for authorizing operations on online services
Hakami et al. Secure Transaction Framework based on Encrypted One-time Password and Multi-factor
CN117792697A (en) Access authentication method and device
CN116305280A (en) Personal data management method and system based on digital identity
JP2023120620A (en) Communication processing device and communication processing program
CN114257410A (en) Identity authentication method and device based on digital certificate, and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant