CN114844661B - System, method, equipment and storage medium for realizing remote authority verification management - Google Patents
System, method, equipment and storage medium for realizing remote authority verification management Download PDFInfo
- Publication number
- CN114844661B CN114844661B CN202210153364.8A CN202210153364A CN114844661B CN 114844661 B CN114844661 B CN 114844661B CN 202210153364 A CN202210153364 A CN 202210153364A CN 114844661 B CN114844661 B CN 114844661B
- Authority
- CN
- China
- Prior art keywords
- verification
- information
- service
- management platform
- management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Abstract
The application provides a system and a method for realizing remote authority verification management, wherein the system comprises: user terminal, service terminal and management platform. The method comprises the following steps: sending a service request carrying personal information to a management platform; the management platform receives a service request transmitted by a user terminal; performing personal information verification according to the service request; if the information verification is successful, sending a service verification code to the user terminal; the service terminal inputs a service verification code and sends an identity authentication request to the management platform based on the input service verification code; and the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal. And the service terminal receives the identity authentication result transmitted by the management platform and performs related service according to the identity authentication result. The remote authority verification management method and the remote authority verification management system can realize remote authority verification management, save the working time of the parties and improve the working efficiency.
Description
Technical Field
The application belongs to the technical field of computers, and particularly relates to a system and a method for realizing remote authority verification management.
Background
In the existing window service, a principal is usually required to go to the site to transact, and the principal often takes a lot of time or needs to go to and from the site and the home for a plurality of times due to insufficient transacted materials. In the prior art, under the conditions that unlocking, no identity card accommodation, access to special management and control areas and the like need to be granted with permission or proof, the existing platform cannot provide service with similar functions, and the function is characterized in that a principal and a server are required to jointly confirm the relationship between the service and the served service, and certain timeliness is achieved.
Aiming at the problem that the prior art can not realize the remote authority verification management for a certain special service, no effective solution is available.
Disclosure of Invention
Based on the technical problems, the application provides a system and a method for realizing remote authority verification management.
In a first aspect, the present application proposes an implementation of a remote rights verification management system, including: the system comprises a user terminal, a service terminal and a management platform;
the user terminal and the service terminal respectively communicate with the management platform;
the user terminal is used for sending a service request carrying personal information to the management platform and receiving a service verification code transmitted from the management platform;
the service terminal is used for inputting the service verification code, sending an identity authentication request to the management platform based on the input service verification code, and receiving an identity authentication result transmitted by the management platform;
the management platform is used for receiving a service request transmitted by a user terminal, receiving an identity authentication request transmitted by the service terminal, performing personal information verification according to the service request, sending a service verification code to the user terminal if the information verification is successful, and sending information which is not passed by the information verification to the user terminal if the information verification is unsuccessful; and carrying out identity verification according to the identity authentication request, and sending an identity authentication result to the service terminal.
The personal information includes: name, identification card number, mobile phone number.
The service verification code includes one of the following forms: ID number, service code, two-dimensional code.
The management platform comprises: the personal information verification module, the identity verification module and the blockchain;
the personal information verification module and the identity verification module are respectively connected with the block chain;
the personal information verification module is used for comparing personal information with all information in an information base, if the personal information is consistent with a certain piece of information in the information base, the information verification is considered to be successful, a service verification code is generated, and the service verification code is transmitted to the user terminal; if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, information which is not passed by the information verification is sent to the user terminal, and the personal information and the information verification result are sent to the block chain module;
the identity verification module is used for carrying out time-efficient face identity verification on the service, and if the face identity verification is successful, the identity verification success information is sent to the service terminal; if the face authentication is unsuccessful, sending authentication failure information to the service terminal, and sending an authentication result to a block chain module;
the block chain module is used for storing personal information, an information verification result and an identity verification result in each service request according to a time sequence.
The information verification result comprises: service verification code and information verification fails the information;
the identity verification result comprises: identity authentication success information and identity authentication failure information.
The face identity verification includes: face recognition of a static picture, face smile recognition of a video stream and face nodding recognition of the video stream;
the timeliness means that the face identity verification is performed within a given time range, and the face identity verification cannot be performed outside the given time range, and the service request needs to be submitted again.
In a second aspect, the present application proposes a method for implementing remote rights verification management, including the following steps:
sending a service request carrying personal information to a management platform;
the management platform receives a service request transmitted by a user terminal;
the management platform performs personal information verification according to the service request;
if the information verification is successful, sending a service verification code to the user terminal;
if the information verification is unsuccessful, sending information that the information verification is failed to the user terminal;
the user terminal receives the service verification code transmitted from the management platform;
the service terminal inputs a service verification code and sends an identity authentication request to the management platform based on the input service verification code;
and the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal.
And the service terminal receives the identity authentication result transmitted by the management platform and performs related service according to the identity authentication result.
The management platform performs personal information verification according to the service request, and the process is as follows:
comparing the personal information with all information in the information base;
if the personal information is consistent with a certain piece of information in the information base, the information is considered to be successfully verified, a service verification code is generated, and the service verification code is transmitted to the user terminal;
if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, and the information which is not passed by the information verification is sent to the user terminal;
the personal information and the information verification result are sent to a blockchain module for storage;
the management platform performs identity verification according to the identity authentication request, and the process is as follows:
performing time-efficient face identity verification on the service;
if the face authentication is successful, sending authentication success information to the service terminal;
if the face authentication is unsuccessful, sending authentication failure information to the service terminal;
and sending the identity verification result to the block chain module for storage.
In a third aspect, the present application proposes an electronic device comprising:
one or more processors; a memory; one or more applications stored in the memory and configured to be loaded and executed by the one or more processors to perform the implementing remote rights verification management method.
In a fourth aspect, the present application proposes a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the remote rights verification management method according to the second aspect or any one of the possible implementations of the second aspect.
The beneficial technical effects are as follows:
the system and the method for realizing the remote authority verification management can realize the remote authority verification management, save the working time of a principal and improve the working efficiency.
Drawings
FIG. 1 is a schematic block diagram of a remote rights verification management system implemented in an embodiment of the present application;
FIG. 2 is a schematic block diagram of the internal components of a management platform according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating a method for implementing remote rights verification management according to an embodiment of the present application;
FIG. 4 is a flowchart of personal information verification according to an embodiment of the present application;
fig. 5 is an authentication flow chart according to an embodiment of the present application.
The specific embodiment is as follows:
the present application is further described below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical solutions of the present invention and are not intended to limit the scope of protection of the present application.
In a first aspect, the present application proposes a system for implementing remote rights verification management, as shown in fig. 1, including: the system comprises a user terminal, a service terminal and a management platform;
the user terminal and the service terminal respectively communicate with the management platform;
the user terminal is used for sending a service request carrying personal information to the management platform and receiving a service verification code transmitted from the management platform;
the service terminal is used for inputting the service verification code, sending an identity authentication request to the management platform based on the input service verification code, and receiving an identity authentication result transmitted by the management platform;
the management platform is used for receiving a service request transmitted by a user terminal, receiving an identity authentication request transmitted by the service terminal, performing personal information verification according to the service request, sending a service verification code to the user terminal if the information verification is successful, and sending verification failure information to the user terminal if the information verification is unsuccessful; and carrying out identity verification according to the identity authentication request, and sending an identity authentication result to the service terminal.
The personal information includes: name, identification card number, mobile phone number, service address.
The service verification code includes one of the following forms: ID number, service code, two-dimensional code.
The management platform, the interior of which is shown in fig. 2, comprises: the personal information verification module, the identity verification module and the blockchain;
the personal information verification module and the identity verification module are respectively connected with the block chain;
the personal information verification module is used for comparing personal information with all information in an information base, if the personal information is consistent with a certain piece of information in the information base, the information verification is considered to be successful, a service verification code is generated, and the service verification code is transmitted to the user terminal; if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, information which is not passed by the verification is sent to the user terminal, and the personal information and the information verification result are sent to the block chain module;
the identity verification module is used for carrying out time-efficient face identity verification on the service, and if the face identity verification is successful, the identity verification success information is sent to the service terminal; if the face authentication is unsuccessful, sending authentication failure information to the service terminal, and sending an authentication result to a block chain module;
the block chain module is used for storing personal information, an information verification result and an identity verification result in each service request according to a time sequence.
The information verification result comprises: service verification code and information verification fails the information;
the identity verification result comprises: identity authentication success information and identity authentication failure information.
The face identity verification includes: face recognition of a static picture, face smile recognition of a video stream and face nodding recognition of the video stream;
the timeliness means that the face identity verification is performed within a given time range, and the face identity verification cannot be performed outside the given time range, and the service request needs to be submitted again.
In a second aspect, the present application proposes a method for implementing remote rights verification management, as shown in fig. 3, including the following steps:
step S1: sending a service request carrying personal information to a management platform;
step S2: the management platform receives a service request transmitted by a user terminal;
step S3: the management platform performs personal information verification according to the service request;
step S4: if the information verification is successful, sending a service verification code to the user terminal;
step S5: if the information verification is unsuccessful, sending verification failure information to the user terminal;
step S6: the user terminal receives the service verification code transmitted from the management platform;
step S7: the service terminal inputs a service verification code and sends an identity authentication request to the management platform based on the input service verification code;
step S8: and the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal.
Step S9: and the service terminal receives the identity authentication result transmitted by the management platform and performs related service according to the identity authentication result.
The management platform performs personal information verification according to the service request, as shown in fig. 4, and the process is as follows:
step S3.1: comparing the personal information with all information in the information base;
step S3.2: if the personal information is consistent with a certain piece of information in the information base, the information is considered to be successfully verified, a service verification code is generated, and the service verification code is transmitted to the user terminal;
step S3.3: if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, and information which is not passed by the verification is sent to the user terminal;
step S3.4: and sending the personal information and the information verification result to a blockchain module for storage.
The management platform performs identity verification according to the identity authentication request, as shown in fig. 5, and the process is as follows:
step S8.1: performing time-efficient face identity verification on the service;
step S8.2: if the face authentication is successful, sending authentication success information to the service terminal;
step S8.3: if the face authentication is unsuccessful, sending authentication failure information to the service terminal;
step S8.4: and sending the identity verification result to the block chain module for storage.
Example 1:
the system and the method are adopted for authenticating the identity of the unlocking party in service, and are described in detail as follows:
if the authority verification management system of the application is used, a user terminal APP is downloaded by a mobile phone of a property or other neighbors, personal information is filled in the user terminal APP, namely, a name, an identity card number and a telephone number are filled in, a service request carrying personal information is sent to an authority verification management system management platform, and meanwhile, the address of the service is also sent to the management platform through GPS positioning in the mobile phone, and the management platform receives the service request transmitted by the user terminal; performing personal information verification according to the service request; comparing the personal information with all information in the information base; for example: thirdly, if the personal information is consistent with a certain piece of information in the information base, the information is considered to be successfully verified, a service verification code is generated, the service verification code can be a series of numbers or a two-dimensional code, and the service verification code is transmitted to the user terminal; if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, and information which is not passed by the verification is sent to the user terminal;
a user terminal used by a principal receives a service verification code transmitted from the management platform; if a string of numbers is transmitted, a service person helping a principal to unlock the lock inputs the string of words through a service terminal, and based on the string of words, an identity authentication request is sent to the management platform, at the moment, the management platform knows that the service request sent by the principal is matched with the identity authentication request at the time, so as to finish the same service; if the two-dimension code is transmitted by the management platform, a service person helping the principal to unlock the lock scans the two-dimension code by using the service terminal APP, and an identity authentication request is sent to the management platform based on the scanning result of the two-dimension code.
And the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal.
Performing time-efficient face identity verification on the service; in the prior art, face authentication includes: the method comprises the steps of still picture face recognition, video stream face smile recognition and video stream face nod recognition, namely a principal shoots a photo through a service terminal APP to perform still picture face recognition, and records video on the spot to perform face smile recognition and face nod recognition. If the two items pass, the face authentication is successful, and identity authentication success information is sent to the service terminal; if the face authentication is unsuccessful, sending authentication failure information to the service terminal; wherein the face authentication is effective, for example, within 10 minutes, and if it is outside 10 minutes, the principal needs to re-perform the service request to acquire the service authentication code, so that the authentication can be further performed. If the service terminal receives the identity authentication transmitted by the management platform and is successful, the service personnel can unlock the principal.
The method has a special case that personal information of a principal needs to be protected, cannot be stolen or tampered maliciously, so that the method needs to adopt a blockchain technology.
The blockchain technology has the characteristics of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like, intermediate links cannot be tampered and counterfeited, related data are uplink, so that information of a principal who acquires authority authentication is more secret and is not easy to steal, and tracking and tracing are supported, so that the application adopts the blockchain technology to realize the function of authority verification.
And sending the personal information and the information verification result to a blockchain module for storage. And sending the identity verification result to the block chain module for storage. The blockchain saves each service in time order.
Example 2:
similarly, when a person does not have an identity card but needs to check in a hotel, the person must generally go to a local dispatch to prove the legal identity of the person, but the person who goes to a strange environment needs to find the local dispatch and needs proper time, so the difficulty is known, and therefore, the person who can remotely realize the identity verification on line saves the time for the person who goes through the business and the service personnel, and the efficiency is improved.
In this embodiment, a party without an identity card can download a user terminal APP by using his own mobile phone, fill in personal information in the user terminal APP, i.e. fill in a name, an identity card number and a phone number, send a service request carrying personal information to a management platform of an authority verification management system, and simultaneously send an address of the present service to the management platform through GPS positioning in the mobile phone, and the management platform receives the present service request transmitted by the user terminal; performing personal information verification according to the service request; comparing the personal information with all information in the information base; if the personal information is consistent with a certain piece of information in the information base, the information is considered to be successfully verified, a service verification code is generated, the service verification code can be a series of numbers or a two-dimensional code, and the service verification code is transmitted to the user terminal; if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, and information which is not passed by the verification is sent to the user terminal;
a user terminal used by a principal receives a service verification code transmitted from the management platform; if the two-dimension code is transmitted by the management platform, the hotel service personnel scans the two-dimension code by using the service terminal APP, and sends an identity authentication request to the management platform based on the scanning result of the two-dimension code.
And the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal.
If the service terminal receives the identity authentication transmitted by the management platform and is successful, the service personnel can check in the hotel for the principal.
And sending the personal information and the information verification result to a blockchain module for storage. And sending the identity verification result to the block chain module for storage. The blockchain saves each service in time order.
Example 3:
when a person enters and exits a special control area, the same flow is adopted, the person can download a user terminal APP by using a mobile phone of the person, fill in personal information in the user terminal APP, send a service request carrying the personal information to a management platform of an authority verification management system, and simultaneously send the address of the service to the management platform through GPS positioning in the mobile phone, and the management platform receives the service request transmitted by the user terminal; performing personal information verification according to the service request; comparing the personal information with all information in the information base; if the personal information is consistent with a certain piece of information in the information base, the information is considered to be successfully verified, and a service verification code is generated, wherein the information base at the moment can be an information base formed by a list of appointed personnel, namely the appointed personnel has the authority to enter and exit a special management and control area. If the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, and information which is not passed by the verification is sent to the user terminal;
a user terminal used by a principal receives a service verification code transmitted from the management platform; if the two-dimension code is transmitted by the management platform, a security guard in a special management and control area scans the two-dimension code by using the service terminal APP, and sends an identity authentication request to the management platform based on the scanning result of the two-dimension code.
And the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal.
If the service terminal receives the identity authentication transmitted by the management platform and is successful, security personnel in the special management and control area can let the principal enter and exit the special management and control area.
And sending the personal information and the information verification result to a blockchain module for storage. And sending the identity verification result to the block chain module for storage. The blockchain saves each service in time order.
In a third aspect, the present application proposes an electronic device comprising:
one or more processors; a memory; one or more applications stored in the memory and configured to be loaded and executed by the one or more processors to perform the implementing remote rights verification management method.
In a fourth aspect, the present application proposes a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the remote rights verification management method according to the second aspect or any one of the possible implementations of the second aspect.
While the applicant has described and illustrated the embodiments of the present invention in detail with reference to the drawings, it should be understood by those skilled in the art that the above embodiments are only preferred embodiments of the present invention, and the detailed description is only for the purpose of helping the reader to better understand the spirit of the present invention, and not to limit the scope of the present invention, but any improvements or modifications based on the spirit of the present invention should fall within the scope of the present invention.
Claims (10)
1. A system for implementing remote rights verification management, comprising: the system comprises a user terminal, a service terminal and a management platform;
the user terminal and the service terminal respectively communicate with the management platform;
the user terminal is used for sending a service request carrying personal information to the management platform and receiving a service verification code transmitted from the management platform;
the service terminal is used for inputting the service verification code, sending an identity verification request to the management platform based on the input service verification code, and receiving an identity verification result transmitted by the management platform;
the management platform is used for receiving a service request transmitted by a user terminal, receiving an identity verification request transmitted by the service terminal, performing personal information verification according to the service request, sending a service verification code to the user terminal if the information verification is successful, and sending information which is not passed by the information verification to the user terminal if the information verification is unsuccessful; performing identity verification according to the identity verification request, and sending an identity verification result to the service terminal;
the management platform comprises a blockchain module, wherein the blockchain module is used for storing personal information, an information verification result and an identity verification result in each service request according to a time sequence.
2. The implementation remote rights verification management system of claim 1, wherein the personal information includes: name, identification card number and mobile phone number; the service verification code includes one of the following forms: an ID number, a service code, or a two-dimensional code.
3. The implementing remote rights verification management system of claim 1, wherein the management platform comprises: the personal information verification module and the identity verification module;
the personal information verification module and the identity verification module are respectively connected with the block chain module;
the personal information verification module is used for comparing personal information with all information in an information base, if the personal information is consistent with a certain piece of information in the information base, the information verification is considered to be successful, a service verification code is generated, and the service verification code is sent to the user terminal; if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, information which is not passed by the information verification is sent to the user terminal, and the personal information and the information verification result are sent to the block chain module;
the identity verification module is used for carrying out time-efficient face identity verification on the service, and if the face identity verification is successful, the identity verification success information is sent to the service terminal; if the face authentication is unsuccessful, the authentication failure information is sent to the service terminal, and the authentication result is sent to the block chain module.
4. A system for implementing remote rights verification management as claimed in claim 3, wherein said information verification result includes: service verification code or information verification fails the information; the identity verification result comprises: authentication success information or authentication failure information.
5. A system for implementing remote rights verification management as claimed in claim 3, wherein said face authentication comprises: face recognition of a static picture, face smile recognition of a video stream or face nodding recognition of a video stream;
the timeliness means that the face identity verification is performed within a given time range, and the face identity verification cannot be performed outside the given time range, and the service request needs to be submitted again.
6. The method for realizing remote authority verification management is characterized by comprising the following steps: sending a service request carrying personal information to a management platform;
the management platform receives a service request transmitted by a user terminal;
the management platform performs personal information verification according to the service request;
if the information verification is successful, sending a service verification code to the user terminal;
if the information verification is unsuccessful, sending information that the information verification is failed to the user terminal;
the user terminal receives the service verification code transmitted from the management platform;
the service terminal inputs a service verification code and sends an identity verification request to the management platform based on the input service verification code;
the management platform performs identity verification according to the identity verification request and sends an identity verification result to the service terminal, and comprises a blockchain module, wherein the blockchain module is used for storing personal information, an information verification result and an identity verification result in each service request according to time sequence;
and the service terminal receives the identity verification result transmitted by the management platform and performs related service according to the identity verification result.
7. The method for implementing remote authority verification management as claimed in claim 6, wherein the management platform performs personal information verification according to the service request, as follows:
comparing the personal information with all information in the information base;
if the personal information is consistent with a certain piece of information in the information base, the information is considered to be successfully verified, a service verification code is generated, and the service verification code is transmitted to the user terminal;
if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, and the information which is not passed by the information verification is sent to the user terminal;
and sending the personal information and the information verification result to a block chain module for storage.
8. The method for implementing remote authority verification management as claimed in claim 6, wherein the management platform performs the authentication according to the authentication request, as follows:
performing time-efficient face identity verification on the service;
if the face authentication is successful, sending authentication success information to the service terminal;
if the face authentication is unsuccessful, sending authentication failure information to the service terminal;
and sending the identity verification result to the block chain module for storage.
9. An electronic device, comprising:
one or more processors;
a memory;
one or more application programs stored in the memory and configured to be loaded and executed by the one or more processors to perform the implementing the remote rights verification management method of any one of claims 6 to 8.
10. A computer-readable storage medium, having stored thereon a computer program that is loadable and executable by a processor to perform the method of implementing remote rights verification management of any of claims 6 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210153364.8A CN114844661B (en) | 2022-02-18 | 2022-02-18 | System, method, equipment and storage medium for realizing remote authority verification management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210153364.8A CN114844661B (en) | 2022-02-18 | 2022-02-18 | System, method, equipment and storage medium for realizing remote authority verification management |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114844661A CN114844661A (en) | 2022-08-02 |
CN114844661B true CN114844661B (en) | 2023-07-14 |
Family
ID=82562330
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210153364.8A Active CN114844661B (en) | 2022-02-18 | 2022-02-18 | System, method, equipment and storage medium for realizing remote authority verification management |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114844661B (en) |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111177686B (en) * | 2019-12-31 | 2022-07-29 | 华为云计算技术有限公司 | Identity authentication method, device and related equipment |
CN112418960A (en) * | 2020-11-26 | 2021-02-26 | 深圳供电局有限公司 | Remote billing method and system for power industry |
CN112489274A (en) * | 2020-11-27 | 2021-03-12 | 江苏盖睿健康科技有限公司 | Access control method and system |
-
2022
- 2022-02-18 CN CN202210153364.8A patent/CN114844661B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN114844661A (en) | 2022-08-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109325342B (en) | Identity information management method, device, computer equipment and storage medium | |
US8751801B2 (en) | System and method for authenticating users using two or more factors | |
US10445487B2 (en) | Methods and apparatus for authentication of joint account login | |
US20150339474A1 (en) | User authentication system | |
US20110258443A1 (en) | User authentication in a tag-based service | |
JP5167835B2 (en) | User authentication system, method, program, and medium | |
BRPI0722174A2 (en) | METHOD AND SYSTEM FOR AUTHENTICING USERS IN A DATA PROCESSING SYSTEM. | |
KR102482104B1 (en) | Identification and/or authentication system and method | |
US11363014B2 (en) | Method and system for securely authenticating a user by an identity and access service using a pictorial code and a one-time code | |
CN111161056A (en) | Method, system and equipment for improving transaction security of digital assets | |
CN103581441A (en) | Mobile terminal tracking anti-theft system and method | |
EP3579595A1 (en) | Improved system and method for internet access age-verification | |
JP2017102842A (en) | Personal identification system, personal identification information output system, authentication server, personal identification method, personal identification information output method, and program | |
US7177425B2 (en) | Device and method for securing information associated with a subscriber in a communication apparatus | |
CN114844661B (en) | System, method, equipment and storage medium for realizing remote authority verification management | |
US20160342996A1 (en) | Two-factor authentication method | |
JP6714551B2 (en) | Authentication key sharing system and inter-terminal key copying method | |
CN116233847A (en) | Login method, login device, computer equipment and storage medium | |
KR101187414B1 (en) | System and method for authenticating card issued on portable terminal | |
Papaspirou et al. | Security Revisited: Honeytokens meet Google Authenticator | |
CN114553573A (en) | Identity authentication method and device | |
CN101159542A (en) | Method and system for saving and/or obtaining authentication parameter on terminal network appliance | |
KR100944246B1 (en) | Apparatus and Method for Managing Security Mobile Communication Terminal with Universal Subscriber Identity Module | |
JP2000067187A (en) | System and method for managing information using portable information storage medium | |
JPH11163853A (en) | Authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |