CN114844661B - System, method, equipment and storage medium for realizing remote authority verification management - Google Patents

System, method, equipment and storage medium for realizing remote authority verification management Download PDF

Info

Publication number
CN114844661B
CN114844661B CN202210153364.8A CN202210153364A CN114844661B CN 114844661 B CN114844661 B CN 114844661B CN 202210153364 A CN202210153364 A CN 202210153364A CN 114844661 B CN114844661 B CN 114844661B
Authority
CN
China
Prior art keywords
verification
information
service
management platform
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210153364.8A
Other languages
Chinese (zh)
Other versions
CN114844661A (en
Inventor
李首峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guozhengtong Technology Co ltd
Original Assignee
Guozhengtong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guozhengtong Technology Co ltd filed Critical Guozhengtong Technology Co ltd
Priority to CN202210153364.8A priority Critical patent/CN114844661B/en
Publication of CN114844661A publication Critical patent/CN114844661A/en
Application granted granted Critical
Publication of CN114844661B publication Critical patent/CN114844661B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The application provides a system and a method for realizing remote authority verification management, wherein the system comprises: user terminal, service terminal and management platform. The method comprises the following steps: sending a service request carrying personal information to a management platform; the management platform receives a service request transmitted by a user terminal; performing personal information verification according to the service request; if the information verification is successful, sending a service verification code to the user terminal; the service terminal inputs a service verification code and sends an identity authentication request to the management platform based on the input service verification code; and the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal. And the service terminal receives the identity authentication result transmitted by the management platform and performs related service according to the identity authentication result. The remote authority verification management method and the remote authority verification management system can realize remote authority verification management, save the working time of the parties and improve the working efficiency.

Description

System, method, equipment and storage medium for realizing remote authority verification management
Technical Field
The application belongs to the technical field of computers, and particularly relates to a system and a method for realizing remote authority verification management.
Background
In the existing window service, a principal is usually required to go to the site to transact, and the principal often takes a lot of time or needs to go to and from the site and the home for a plurality of times due to insufficient transacted materials. In the prior art, under the conditions that unlocking, no identity card accommodation, access to special management and control areas and the like need to be granted with permission or proof, the existing platform cannot provide service with similar functions, and the function is characterized in that a principal and a server are required to jointly confirm the relationship between the service and the served service, and certain timeliness is achieved.
Aiming at the problem that the prior art can not realize the remote authority verification management for a certain special service, no effective solution is available.
Disclosure of Invention
Based on the technical problems, the application provides a system and a method for realizing remote authority verification management.
In a first aspect, the present application proposes an implementation of a remote rights verification management system, including: the system comprises a user terminal, a service terminal and a management platform;
the user terminal and the service terminal respectively communicate with the management platform;
the user terminal is used for sending a service request carrying personal information to the management platform and receiving a service verification code transmitted from the management platform;
the service terminal is used for inputting the service verification code, sending an identity authentication request to the management platform based on the input service verification code, and receiving an identity authentication result transmitted by the management platform;
the management platform is used for receiving a service request transmitted by a user terminal, receiving an identity authentication request transmitted by the service terminal, performing personal information verification according to the service request, sending a service verification code to the user terminal if the information verification is successful, and sending information which is not passed by the information verification to the user terminal if the information verification is unsuccessful; and carrying out identity verification according to the identity authentication request, and sending an identity authentication result to the service terminal.
The personal information includes: name, identification card number, mobile phone number.
The service verification code includes one of the following forms: ID number, service code, two-dimensional code.
The management platform comprises: the personal information verification module, the identity verification module and the blockchain;
the personal information verification module and the identity verification module are respectively connected with the block chain;
the personal information verification module is used for comparing personal information with all information in an information base, if the personal information is consistent with a certain piece of information in the information base, the information verification is considered to be successful, a service verification code is generated, and the service verification code is transmitted to the user terminal; if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, information which is not passed by the information verification is sent to the user terminal, and the personal information and the information verification result are sent to the block chain module;
the identity verification module is used for carrying out time-efficient face identity verification on the service, and if the face identity verification is successful, the identity verification success information is sent to the service terminal; if the face authentication is unsuccessful, sending authentication failure information to the service terminal, and sending an authentication result to a block chain module;
the block chain module is used for storing personal information, an information verification result and an identity verification result in each service request according to a time sequence.
The information verification result comprises: service verification code and information verification fails the information;
the identity verification result comprises: identity authentication success information and identity authentication failure information.
The face identity verification includes: face recognition of a static picture, face smile recognition of a video stream and face nodding recognition of the video stream;
the timeliness means that the face identity verification is performed within a given time range, and the face identity verification cannot be performed outside the given time range, and the service request needs to be submitted again.
In a second aspect, the present application proposes a method for implementing remote rights verification management, including the following steps:
sending a service request carrying personal information to a management platform;
the management platform receives a service request transmitted by a user terminal;
the management platform performs personal information verification according to the service request;
if the information verification is successful, sending a service verification code to the user terminal;
if the information verification is unsuccessful, sending information that the information verification is failed to the user terminal;
the user terminal receives the service verification code transmitted from the management platform;
the service terminal inputs a service verification code and sends an identity authentication request to the management platform based on the input service verification code;
and the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal.
And the service terminal receives the identity authentication result transmitted by the management platform and performs related service according to the identity authentication result.
The management platform performs personal information verification according to the service request, and the process is as follows:
comparing the personal information with all information in the information base;
if the personal information is consistent with a certain piece of information in the information base, the information is considered to be successfully verified, a service verification code is generated, and the service verification code is transmitted to the user terminal;
if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, and the information which is not passed by the information verification is sent to the user terminal;
the personal information and the information verification result are sent to a blockchain module for storage;
the management platform performs identity verification according to the identity authentication request, and the process is as follows:
performing time-efficient face identity verification on the service;
if the face authentication is successful, sending authentication success information to the service terminal;
if the face authentication is unsuccessful, sending authentication failure information to the service terminal;
and sending the identity verification result to the block chain module for storage.
In a third aspect, the present application proposes an electronic device comprising:
one or more processors; a memory; one or more applications stored in the memory and configured to be loaded and executed by the one or more processors to perform the implementing remote rights verification management method.
In a fourth aspect, the present application proposes a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the remote rights verification management method according to the second aspect or any one of the possible implementations of the second aspect.
The beneficial technical effects are as follows:
the system and the method for realizing the remote authority verification management can realize the remote authority verification management, save the working time of a principal and improve the working efficiency.
Drawings
FIG. 1 is a schematic block diagram of a remote rights verification management system implemented in an embodiment of the present application;
FIG. 2 is a schematic block diagram of the internal components of a management platform according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating a method for implementing remote rights verification management according to an embodiment of the present application;
FIG. 4 is a flowchart of personal information verification according to an embodiment of the present application;
fig. 5 is an authentication flow chart according to an embodiment of the present application.
The specific embodiment is as follows:
the present application is further described below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical solutions of the present invention and are not intended to limit the scope of protection of the present application.
In a first aspect, the present application proposes a system for implementing remote rights verification management, as shown in fig. 1, including: the system comprises a user terminal, a service terminal and a management platform;
the user terminal and the service terminal respectively communicate with the management platform;
the user terminal is used for sending a service request carrying personal information to the management platform and receiving a service verification code transmitted from the management platform;
the service terminal is used for inputting the service verification code, sending an identity authentication request to the management platform based on the input service verification code, and receiving an identity authentication result transmitted by the management platform;
the management platform is used for receiving a service request transmitted by a user terminal, receiving an identity authentication request transmitted by the service terminal, performing personal information verification according to the service request, sending a service verification code to the user terminal if the information verification is successful, and sending verification failure information to the user terminal if the information verification is unsuccessful; and carrying out identity verification according to the identity authentication request, and sending an identity authentication result to the service terminal.
The personal information includes: name, identification card number, mobile phone number, service address.
The service verification code includes one of the following forms: ID number, service code, two-dimensional code.
The management platform, the interior of which is shown in fig. 2, comprises: the personal information verification module, the identity verification module and the blockchain;
the personal information verification module and the identity verification module are respectively connected with the block chain;
the personal information verification module is used for comparing personal information with all information in an information base, if the personal information is consistent with a certain piece of information in the information base, the information verification is considered to be successful, a service verification code is generated, and the service verification code is transmitted to the user terminal; if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, information which is not passed by the verification is sent to the user terminal, and the personal information and the information verification result are sent to the block chain module;
the identity verification module is used for carrying out time-efficient face identity verification on the service, and if the face identity verification is successful, the identity verification success information is sent to the service terminal; if the face authentication is unsuccessful, sending authentication failure information to the service terminal, and sending an authentication result to a block chain module;
the block chain module is used for storing personal information, an information verification result and an identity verification result in each service request according to a time sequence.
The information verification result comprises: service verification code and information verification fails the information;
the identity verification result comprises: identity authentication success information and identity authentication failure information.
The face identity verification includes: face recognition of a static picture, face smile recognition of a video stream and face nodding recognition of the video stream;
the timeliness means that the face identity verification is performed within a given time range, and the face identity verification cannot be performed outside the given time range, and the service request needs to be submitted again.
In a second aspect, the present application proposes a method for implementing remote rights verification management, as shown in fig. 3, including the following steps:
step S1: sending a service request carrying personal information to a management platform;
step S2: the management platform receives a service request transmitted by a user terminal;
step S3: the management platform performs personal information verification according to the service request;
step S4: if the information verification is successful, sending a service verification code to the user terminal;
step S5: if the information verification is unsuccessful, sending verification failure information to the user terminal;
step S6: the user terminal receives the service verification code transmitted from the management platform;
step S7: the service terminal inputs a service verification code and sends an identity authentication request to the management platform based on the input service verification code;
step S8: and the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal.
Step S9: and the service terminal receives the identity authentication result transmitted by the management platform and performs related service according to the identity authentication result.
The management platform performs personal information verification according to the service request, as shown in fig. 4, and the process is as follows:
step S3.1: comparing the personal information with all information in the information base;
step S3.2: if the personal information is consistent with a certain piece of information in the information base, the information is considered to be successfully verified, a service verification code is generated, and the service verification code is transmitted to the user terminal;
step S3.3: if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, and information which is not passed by the verification is sent to the user terminal;
step S3.4: and sending the personal information and the information verification result to a blockchain module for storage.
The management platform performs identity verification according to the identity authentication request, as shown in fig. 5, and the process is as follows:
step S8.1: performing time-efficient face identity verification on the service;
step S8.2: if the face authentication is successful, sending authentication success information to the service terminal;
step S8.3: if the face authentication is unsuccessful, sending authentication failure information to the service terminal;
step S8.4: and sending the identity verification result to the block chain module for storage.
Example 1:
the system and the method are adopted for authenticating the identity of the unlocking party in service, and are described in detail as follows:
if the authority verification management system of the application is used, a user terminal APP is downloaded by a mobile phone of a property or other neighbors, personal information is filled in the user terminal APP, namely, a name, an identity card number and a telephone number are filled in, a service request carrying personal information is sent to an authority verification management system management platform, and meanwhile, the address of the service is also sent to the management platform through GPS positioning in the mobile phone, and the management platform receives the service request transmitted by the user terminal; performing personal information verification according to the service request; comparing the personal information with all information in the information base; for example: thirdly, if the personal information is consistent with a certain piece of information in the information base, the information is considered to be successfully verified, a service verification code is generated, the service verification code can be a series of numbers or a two-dimensional code, and the service verification code is transmitted to the user terminal; if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, and information which is not passed by the verification is sent to the user terminal;
a user terminal used by a principal receives a service verification code transmitted from the management platform; if a string of numbers is transmitted, a service person helping a principal to unlock the lock inputs the string of words through a service terminal, and based on the string of words, an identity authentication request is sent to the management platform, at the moment, the management platform knows that the service request sent by the principal is matched with the identity authentication request at the time, so as to finish the same service; if the two-dimension code is transmitted by the management platform, a service person helping the principal to unlock the lock scans the two-dimension code by using the service terminal APP, and an identity authentication request is sent to the management platform based on the scanning result of the two-dimension code.
And the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal.
Performing time-efficient face identity verification on the service; in the prior art, face authentication includes: the method comprises the steps of still picture face recognition, video stream face smile recognition and video stream face nod recognition, namely a principal shoots a photo through a service terminal APP to perform still picture face recognition, and records video on the spot to perform face smile recognition and face nod recognition. If the two items pass, the face authentication is successful, and identity authentication success information is sent to the service terminal; if the face authentication is unsuccessful, sending authentication failure information to the service terminal; wherein the face authentication is effective, for example, within 10 minutes, and if it is outside 10 minutes, the principal needs to re-perform the service request to acquire the service authentication code, so that the authentication can be further performed. If the service terminal receives the identity authentication transmitted by the management platform and is successful, the service personnel can unlock the principal.
The method has a special case that personal information of a principal needs to be protected, cannot be stolen or tampered maliciously, so that the method needs to adopt a blockchain technology.
The blockchain technology has the characteristics of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like, intermediate links cannot be tampered and counterfeited, related data are uplink, so that information of a principal who acquires authority authentication is more secret and is not easy to steal, and tracking and tracing are supported, so that the application adopts the blockchain technology to realize the function of authority verification.
And sending the personal information and the information verification result to a blockchain module for storage. And sending the identity verification result to the block chain module for storage. The blockchain saves each service in time order.
Example 2:
similarly, when a person does not have an identity card but needs to check in a hotel, the person must generally go to a local dispatch to prove the legal identity of the person, but the person who goes to a strange environment needs to find the local dispatch and needs proper time, so the difficulty is known, and therefore, the person who can remotely realize the identity verification on line saves the time for the person who goes through the business and the service personnel, and the efficiency is improved.
In this embodiment, a party without an identity card can download a user terminal APP by using his own mobile phone, fill in personal information in the user terminal APP, i.e. fill in a name, an identity card number and a phone number, send a service request carrying personal information to a management platform of an authority verification management system, and simultaneously send an address of the present service to the management platform through GPS positioning in the mobile phone, and the management platform receives the present service request transmitted by the user terminal; performing personal information verification according to the service request; comparing the personal information with all information in the information base; if the personal information is consistent with a certain piece of information in the information base, the information is considered to be successfully verified, a service verification code is generated, the service verification code can be a series of numbers or a two-dimensional code, and the service verification code is transmitted to the user terminal; if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, and information which is not passed by the verification is sent to the user terminal;
a user terminal used by a principal receives a service verification code transmitted from the management platform; if the two-dimension code is transmitted by the management platform, the hotel service personnel scans the two-dimension code by using the service terminal APP, and sends an identity authentication request to the management platform based on the scanning result of the two-dimension code.
And the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal.
If the service terminal receives the identity authentication transmitted by the management platform and is successful, the service personnel can check in the hotel for the principal.
And sending the personal information and the information verification result to a blockchain module for storage. And sending the identity verification result to the block chain module for storage. The blockchain saves each service in time order.
Example 3:
when a person enters and exits a special control area, the same flow is adopted, the person can download a user terminal APP by using a mobile phone of the person, fill in personal information in the user terminal APP, send a service request carrying the personal information to a management platform of an authority verification management system, and simultaneously send the address of the service to the management platform through GPS positioning in the mobile phone, and the management platform receives the service request transmitted by the user terminal; performing personal information verification according to the service request; comparing the personal information with all information in the information base; if the personal information is consistent with a certain piece of information in the information base, the information is considered to be successfully verified, and a service verification code is generated, wherein the information base at the moment can be an information base formed by a list of appointed personnel, namely the appointed personnel has the authority to enter and exit a special management and control area. If the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, and information which is not passed by the verification is sent to the user terminal;
a user terminal used by a principal receives a service verification code transmitted from the management platform; if the two-dimension code is transmitted by the management platform, a security guard in a special management and control area scans the two-dimension code by using the service terminal APP, and sends an identity authentication request to the management platform based on the scanning result of the two-dimension code.
And the management platform performs identity verification according to the identity authentication request and sends an identity authentication result to the service terminal.
If the service terminal receives the identity authentication transmitted by the management platform and is successful, security personnel in the special management and control area can let the principal enter and exit the special management and control area.
And sending the personal information and the information verification result to a blockchain module for storage. And sending the identity verification result to the block chain module for storage. The blockchain saves each service in time order.
In a third aspect, the present application proposes an electronic device comprising:
one or more processors; a memory; one or more applications stored in the memory and configured to be loaded and executed by the one or more processors to perform the implementing remote rights verification management method.
In a fourth aspect, the present application proposes a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the remote rights verification management method according to the second aspect or any one of the possible implementations of the second aspect.
While the applicant has described and illustrated the embodiments of the present invention in detail with reference to the drawings, it should be understood by those skilled in the art that the above embodiments are only preferred embodiments of the present invention, and the detailed description is only for the purpose of helping the reader to better understand the spirit of the present invention, and not to limit the scope of the present invention, but any improvements or modifications based on the spirit of the present invention should fall within the scope of the present invention.

Claims (10)

1. A system for implementing remote rights verification management, comprising: the system comprises a user terminal, a service terminal and a management platform;
the user terminal and the service terminal respectively communicate with the management platform;
the user terminal is used for sending a service request carrying personal information to the management platform and receiving a service verification code transmitted from the management platform;
the service terminal is used for inputting the service verification code, sending an identity verification request to the management platform based on the input service verification code, and receiving an identity verification result transmitted by the management platform;
the management platform is used for receiving a service request transmitted by a user terminal, receiving an identity verification request transmitted by the service terminal, performing personal information verification according to the service request, sending a service verification code to the user terminal if the information verification is successful, and sending information which is not passed by the information verification to the user terminal if the information verification is unsuccessful; performing identity verification according to the identity verification request, and sending an identity verification result to the service terminal;
the management platform comprises a blockchain module, wherein the blockchain module is used for storing personal information, an information verification result and an identity verification result in each service request according to a time sequence.
2. The implementation remote rights verification management system of claim 1, wherein the personal information includes: name, identification card number and mobile phone number; the service verification code includes one of the following forms: an ID number, a service code, or a two-dimensional code.
3. The implementing remote rights verification management system of claim 1, wherein the management platform comprises: the personal information verification module and the identity verification module;
the personal information verification module and the identity verification module are respectively connected with the block chain module;
the personal information verification module is used for comparing personal information with all information in an information base, if the personal information is consistent with a certain piece of information in the information base, the information verification is considered to be successful, a service verification code is generated, and the service verification code is sent to the user terminal; if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, information which is not passed by the information verification is sent to the user terminal, and the personal information and the information verification result are sent to the block chain module;
the identity verification module is used for carrying out time-efficient face identity verification on the service, and if the face identity verification is successful, the identity verification success information is sent to the service terminal; if the face authentication is unsuccessful, the authentication failure information is sent to the service terminal, and the authentication result is sent to the block chain module.
4. A system for implementing remote rights verification management as claimed in claim 3, wherein said information verification result includes: service verification code or information verification fails the information; the identity verification result comprises: authentication success information or authentication failure information.
5. A system for implementing remote rights verification management as claimed in claim 3, wherein said face authentication comprises: face recognition of a static picture, face smile recognition of a video stream or face nodding recognition of a video stream;
the timeliness means that the face identity verification is performed within a given time range, and the face identity verification cannot be performed outside the given time range, and the service request needs to be submitted again.
6. The method for realizing remote authority verification management is characterized by comprising the following steps: sending a service request carrying personal information to a management platform;
the management platform receives a service request transmitted by a user terminal;
the management platform performs personal information verification according to the service request;
if the information verification is successful, sending a service verification code to the user terminal;
if the information verification is unsuccessful, sending information that the information verification is failed to the user terminal;
the user terminal receives the service verification code transmitted from the management platform;
the service terminal inputs a service verification code and sends an identity verification request to the management platform based on the input service verification code;
the management platform performs identity verification according to the identity verification request and sends an identity verification result to the service terminal, and comprises a blockchain module, wherein the blockchain module is used for storing personal information, an information verification result and an identity verification result in each service request according to time sequence;
and the service terminal receives the identity verification result transmitted by the management platform and performs related service according to the identity verification result.
7. The method for implementing remote authority verification management as claimed in claim 6, wherein the management platform performs personal information verification according to the service request, as follows:
comparing the personal information with all information in the information base;
if the personal information is consistent with a certain piece of information in the information base, the information is considered to be successfully verified, a service verification code is generated, and the service verification code is transmitted to the user terminal;
if the personal information is inconsistent with all the information in the information base, the information verification is considered to be unsuccessful, and the information which is not passed by the information verification is sent to the user terminal;
and sending the personal information and the information verification result to a block chain module for storage.
8. The method for implementing remote authority verification management as claimed in claim 6, wherein the management platform performs the authentication according to the authentication request, as follows:
performing time-efficient face identity verification on the service;
if the face authentication is successful, sending authentication success information to the service terminal;
if the face authentication is unsuccessful, sending authentication failure information to the service terminal;
and sending the identity verification result to the block chain module for storage.
9. An electronic device, comprising:
one or more processors;
a memory;
one or more application programs stored in the memory and configured to be loaded and executed by the one or more processors to perform the implementing the remote rights verification management method of any one of claims 6 to 8.
10. A computer-readable storage medium, having stored thereon a computer program that is loadable and executable by a processor to perform the method of implementing remote rights verification management of any of claims 6 to 8.
CN202210153364.8A 2022-02-18 2022-02-18 System, method, equipment and storage medium for realizing remote authority verification management Active CN114844661B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210153364.8A CN114844661B (en) 2022-02-18 2022-02-18 System, method, equipment and storage medium for realizing remote authority verification management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210153364.8A CN114844661B (en) 2022-02-18 2022-02-18 System, method, equipment and storage medium for realizing remote authority verification management

Publications (2)

Publication Number Publication Date
CN114844661A CN114844661A (en) 2022-08-02
CN114844661B true CN114844661B (en) 2023-07-14

Family

ID=82562330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210153364.8A Active CN114844661B (en) 2022-02-18 2022-02-18 System, method, equipment and storage medium for realizing remote authority verification management

Country Status (1)

Country Link
CN (1) CN114844661B (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177686B (en) * 2019-12-31 2022-07-29 华为云计算技术有限公司 Identity authentication method, device and related equipment
CN112418960A (en) * 2020-11-26 2021-02-26 深圳供电局有限公司 Remote billing method and system for power industry
CN112489274A (en) * 2020-11-27 2021-03-12 江苏盖睿健康科技有限公司 Access control method and system

Also Published As

Publication number Publication date
CN114844661A (en) 2022-08-02

Similar Documents

Publication Publication Date Title
CN109325342B (en) Identity information management method, device, computer equipment and storage medium
US8751801B2 (en) System and method for authenticating users using two or more factors
US10445487B2 (en) Methods and apparatus for authentication of joint account login
US20150339474A1 (en) User authentication system
US20110258443A1 (en) User authentication in a tag-based service
JP5167835B2 (en) User authentication system, method, program, and medium
BRPI0722174A2 (en) METHOD AND SYSTEM FOR AUTHENTICING USERS IN A DATA PROCESSING SYSTEM.
KR102482104B1 (en) Identification and/or authentication system and method
US11363014B2 (en) Method and system for securely authenticating a user by an identity and access service using a pictorial code and a one-time code
CN111161056A (en) Method, system and equipment for improving transaction security of digital assets
CN103581441A (en) Mobile terminal tracking anti-theft system and method
EP3579595A1 (en) Improved system and method for internet access age-verification
JP2017102842A (en) Personal identification system, personal identification information output system, authentication server, personal identification method, personal identification information output method, and program
US7177425B2 (en) Device and method for securing information associated with a subscriber in a communication apparatus
CN114844661B (en) System, method, equipment and storage medium for realizing remote authority verification management
US20160342996A1 (en) Two-factor authentication method
JP6714551B2 (en) Authentication key sharing system and inter-terminal key copying method
CN116233847A (en) Login method, login device, computer equipment and storage medium
KR101187414B1 (en) System and method for authenticating card issued on portable terminal
Papaspirou et al. Security Revisited: Honeytokens meet Google Authenticator
CN114553573A (en) Identity authentication method and device
CN101159542A (en) Method and system for saving and/or obtaining authentication parameter on terminal network appliance
KR100944246B1 (en) Apparatus and Method for Managing Security Mobile Communication Terminal with Universal Subscriber Identity Module
JP2000067187A (en) System and method for managing information using portable information storage medium
JPH11163853A (en) Authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant