CN108667823A - A kind of authentication management method and device - Google Patents

A kind of authentication management method and device Download PDF

Info

Publication number
CN108667823A
CN108667823A CN201810377006.9A CN201810377006A CN108667823A CN 108667823 A CN108667823 A CN 108667823A CN 201810377006 A CN201810377006 A CN 201810377006A CN 108667823 A CN108667823 A CN 108667823A
Authority
CN
China
Prior art keywords
biological information
information
user
internet
elementary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810377006.9A
Other languages
Chinese (zh)
Inventor
潘彬
杜平
崔云峰
朱琳琳
刘正寅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SICHUAN JINGGONG WEIDA INTELLIGENT TECHNOLOGY Co Ltd
Original Assignee
SICHUAN JINGGONG WEIDA INTELLIGENT TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SICHUAN JINGGONG WEIDA INTELLIGENT TECHNOLOGY Co Ltd filed Critical SICHUAN JINGGONG WEIDA INTELLIGENT TECHNOLOGY Co Ltd
Priority to CN201810377006.9A priority Critical patent/CN108667823A/en
Publication of CN108667823A publication Critical patent/CN108667823A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A kind of authentication management method and device provided in an embodiment of the present invention, belongs to internet of things field.The elementary biological information that this method passes through acquisition user, using by the elementary biological information as standard information, Internet of Things end message is obtained again, and initiate bind request, based on the bind request acquire user target organism information, then judge the elementary biological information whether with the target organism information matches;By judging whether elementary biological information matches with the mark biological information, can effectively judge whether it is that same user is operating, and then avoid other users and using the user terminal of the user corresponding to the elementary biological information bind the ammeter, gas meter or water meter of oneself, it is adversely affected to the user.If so, the identification information of the user and the Internet of Things end message are bound.

Description

A kind of authentication management method and device
Technical field
The present invention relates to internet of things field, in particular to a kind of authentication management method and device.
Background technology
The common authentication management mode of Internet enterprises is that user inputs water/electricity/gas/hotlist table number on APP, then leads at present It crosses APP to verify the user information accessed, be bound after being verified.However which has higher safety hidden Suffer from.Therefore, how to solve the above problems is the technical barrier of current urgent need to resolve.
Invention content
The present invention provides a kind of authentication management method and device, it is intended to improve the above problem.
A kind of authentication management method provided by the invention, including:Acquire the elementary biological information of user;Obtain Internet of Things terminal Information, and initiate bind request;The target organism information of user is acquired based on the bind request;Judge the just eozoon letter Breath whether with the target organism information matches;If so, the identification information of the user and the Internet of Things end message are carried out Binding.
Preferably, the elementary biological information includes face information, finger print information or iris information.
Preferably, the target organism information that user is acquired based on the bind request, including:According to the binding The acquisition instructions of the biological information of acquisition user again are initiated in request;The biological information of user is used according to the acquisition instructions; Using the biological information as target organism information.
Preferably, the acquisition Internet of Things end message, and bind request is initiated, including:Based on close range communication techniques Internet of Things end message is obtained, and initiates bind request.
Preferably, the elementary biological information of the described acquisition user further includes later:The elementary biological information is stored In the database.
A kind of authentication management device provided by the invention, including:First data acquisition unit, for acquiring the initial of user Biological information;Data capture unit for obtaining Internet of Things end message, and initiates bind request;Second data acquisition unit is used In the target organism information for acquiring user based on the bind request;Data processing unit, for judging the just eozoon letter Breath whether with the target organism information matches;Execution unit, for if so, by the identification information of the user and the Internet of Things End message is bound.
Preferably, the elementary biological information includes face information, finger print information or iris information.
Preferably, second data acquisition unit is specifically used for:User is acquired again according to bind request initiation Biological information acquisition instructions;The biological information of user is used according to the acquisition instructions;Using the biological information as mesh Mark biological information.
Preferably, the data capture unit is specifically used for:Internet of Things end message is obtained based on close range communication techniques, and Initiate bind request.
Preferably, after first data acquisition unit, further include:Data storage cell is used for the initial life Object information storage is in the database.
A kind of authentication management method and device that aforementioned present invention provides, by acquiring the elementary biological information of user, with Using the elementary biological information as standard information, then Internet of Things end message is obtained, and initiate bind request, is based on the binding Request acquisition user target organism information, then judge the elementary biological information whether with the target organism information matches; By judging whether elementary biological information matches with the mark biological information, can effectively judge whether be same user into Row operation, and then avoid other users and carry out binding oneself using the user terminal of the user corresponding to the elementary biological information Ammeter, gas meter or water meter, adversely affected to the user.If so, the identification information of the user and the Internet of Things is whole Client information is bound.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the structure diagram of a kind of electronic equipment provided in an embodiment of the present invention;
Fig. 2 is a kind of flow chart for authentication management method that first embodiment of the invention provides;
Fig. 3 is a kind of flow chart for authentication management method that second embodiment of the invention provides;
Fig. 4 is a kind of high-level schematic functional block diagram for authentication management device that third embodiment of the invention provides;
Fig. 5 is a kind of high-level schematic functional block diagram for authentication management device that fourth embodiment of the invention provides.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art The every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.Therefore, The detailed description of the embodiment of the present invention to providing in the accompanying drawings is not intended to limit the model of claimed invention below It encloses, but is merely representative of the selected embodiment of the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not having There is the every other embodiment obtained under the premise of making creative work, shall fall within the protection scope of the present invention.
As shown in Figure 1, for the structure diagram of a kind of electronic equipment provided in an embodiment of the present invention.The electronic equipment 300 Including authentication management device, memory 302, storage control 303, processor 304 and Peripheral Interface 305.
The memory 302, storage control 303, processor 304 and 305 each element of Peripheral Interface are direct between each other Or be electrically connected indirectly, to realize the transmission or interaction of data.For example, these elements can pass through one or more between each other Communication bus or signal wire, which are realized, to be electrically connected.The authentication management device include it is at least one can be with software or firmware (firmware) form is stored in the memory 302 or is solidificated in the operating system of the electronic equipment 300 Software function module in (operating system, OS).The processor 304 is used to execute to store in memory 302 Module is can perform, such as the software function module or computer program that the authentication management device includes.
Wherein, memory 302 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read- Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..Wherein, memory 302 is for storing program, and the processor 304 is after receiving and executing instruction, described in execution Program, the method performed by server 100 that the stream process that aforementioned any embodiment of the embodiment of the present invention discloses defines can answer It is realized in processor 304, or by processor 304.
Processor 304 may be a kind of IC chip, the processing capacity with signal.Above-mentioned processor 304 can To be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network processing unit (Network Processor, abbreviation NP) etc.;Can also be digital signal processor (DSP), application-specific integrated circuit (ASIC), Ready-made programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hard Part component.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.General processor Can be microprocessor or the processor can also be any conventional processor etc..
The Peripheral Interface 305 couples various input/output devices to processor 304 and memory 302.At some In embodiment, Peripheral Interface 305, processor 304 and storage control 303 can be realized in one single chip.Other one In a little examples, they can be realized by independent chip respectively.
Referring to Fig. 2, being a kind of flow chart for authentication management method that first embodiment of the invention provides.It below will be to figure Detailed process shown in 2 is described in detail.
Step S101 acquires the elementary biological information of user.
Wherein, the elementary biological information includes face information, finger print information or iris information etc..For example, described initial Biological information can also be voiceprint.Here, being not especially limited.
Step S102 obtains Internet of Things end message, and initiates bind request.
Wherein, the Internet of Things terminal refers to ammeter, gas meter or water meter etc..The Internet of Things end message refers to ammeter, gas meter Or flag information and consumption recording information of water meter either user information etc., here, being not especially limited.
The Internet of Things terminal is connect with RFID or BLE labels.For example, by the setting of RFID or BLE labels at Internet of Things end On end, or the Quick Response Code setting of flag information will be carried in the Internet of Things terminal.Here, being not especially limited.Its In, RFID/BLE labels carry out physical bindings (modes such as riveting, built-in) in water/electricity/gas/hotlist manufacture with gauge table, Include the information such as gauge table table number in label.
The bind request refers to for carrying out the user terminal corresponding to the Internet of Things terminal and elementary biological information The request of binding.
As an implementation, close range communication techniques are based on and obtain Internet of Things end message, and initiate bind request.
Wherein, close range communication techniques refer to such as RFID/BLE technologies or planar bar code technology.User passes through RFID/BLE Technology binds user terminal and Internet of Things terminal.Wherein, user terminal can be mobile phone, can also be tablet etc., here, It is not especially limited.
Step S103 acquires the target organism information of user based on the bind request.
As an implementation, the acquisition that the biological information of acquisition user again is initiated according to the bind request refers to It enables;The biological information of user is used according to the acquisition instructions;Using the biological information as target organism information.
Step S104, judge the elementary biological information whether with the target organism information matches.
Wherein, matching refers to judging whether the elementary biological information and the target organism information are identical, if identical, Matching.Conversely, then no.By judging whether elementary biological information matches with the mark biological information, can effectively judge be No is that same user is operating, and then avoids user of the other users using the user corresponding to the elementary biological information Terminal bind the ammeter, gas meter or water meter of oneself, is adversely affected to the user.For example, user A takes the use of user B When family terminal carrys out the ammeter, gas meter or water meter of user bound A man, by acquiring the biological information of user A, by the biology of user A Information is matched with the biological information stored in the user terminal of user B, and user's B bands are given to efficiently avoid user A It is inconvenient to come.
Step S105, if so, the identification information of the user and the Internet of Things end message are bound.
Wherein, the identification information is the biological information that can be user, can also be the identity information of user, here, It is not especially limited.
In the present embodiment, after step S105, further include:If it is not, prompt message is then sent out, to prompt current of user With failure or matching error.
As an implementation, it carries out binding it when by the identification information of the user and the Internet of Things end message Afterwards, the identification information of the user and the Internet of Things end message water/electricity/gas/hotlist is sent to by carrier network to transport It seeks at quotient.
Referring to Fig. 3, being a kind of flow chart for authentication management method that second embodiment of the invention provides.It below will be to figure Detailed process shown in 3 is described in detail.
Step S201 acquires the elementary biological information of user.
The specific implementation mode of step S201 please refers to step corresponding in first embodiment, here, repeating no more.
Step S202, in the database by elementary biological information storage.
Wherein, the database can be local data base, can also be high in the clouds.Here, being not especially limited.
Step S203 obtains Internet of Things end message, and initiates bind request.
Step S204 acquires the target organism information of user based on the bind request.
Step S205, judge the elementary biological information whether with the target organism information matches.
Step S206, if so, the identification information of the user and the Internet of Things end message are bound.
The specific implementation mode of step S203 to step S206 please refer to step corresponding in first embodiment, here, It repeats no more.
Referring to Fig. 4, being a kind of high-level schematic functional block diagram for authentication management device that third embodiment of the invention provides.Institute State authentication management device 400 include the first data acquisition unit 410, data capture unit 420, the second data acquisition unit 430, Data processing unit 440 and execution unit 450.
First data acquisition unit 410, the elementary biological information for acquiring user.Wherein, the elementary biological information Including face information, finger print information or iris information.
Data capture unit 420 for obtaining Internet of Things end message, and initiates bind request.
Wherein, the data capture unit 420 is specifically used for:Internet of Things end message is obtained based on close range communication techniques, And initiate bind request.
Second data acquisition unit 430, the target organism information for acquiring user based on the bind request.
Wherein, second data acquisition unit 430 is specifically used for:User is acquired again according to bind request initiation Biological information acquisition instructions;The biological information of user is used according to the acquisition instructions;Using the biological information as mesh Mark biological information.
Data processing unit 440, for judge the elementary biological information whether with the target organism information matches.
Execution unit 450, for if so, the identification information of the user and the Internet of Things end message are bound.
Referring to Fig. 5, being a kind of high-level schematic functional block diagram for authentication management device that fourth embodiment of the invention provides.Institute It includes the first data acquisition unit 510, data storage cell 520, data capture unit 530, second to state authentication management device 500 Data acquisition unit 540, data processing unit 550 and execution unit 560.
First data acquisition unit 510, the elementary biological information for acquiring user.Wherein, the elementary biological information Including face information, finger print information or iris information.
Data storage cell 520, for storing in the database the elementary biological information.
Data capture unit 530 for obtaining Internet of Things end message, and initiates bind request.
Wherein, the data capture unit 530 is specifically used for:Internet of Things end message is obtained based on close range communication techniques, And initiate bind request.
Second data acquisition unit 540, the target organism information for acquiring user based on the bind request.
Wherein, second data acquisition unit 540 is specifically used for:User is acquired again according to bind request initiation Biological information acquisition instructions;The biological information of user is used according to the acquisition instructions;Using the biological information as mesh Mark biological information.
Data processing unit 550, for judge the elementary biological information whether with the target organism information matches.
Execution unit 560, for if so, the identification information of the user and the Internet of Things end message are bound.
In conclusion a kind of authentication management method and device provided by the invention, the first eozoon by acquiring user is believed Breath, using the elementary biological information as standard information, then obtains Internet of Things end message, and initiate bind request, is based on institute State bind request acquisition user target organism information, then judge the elementary biological information whether with the target organism information Matching;By judging whether elementary biological information matches with the mark biological information, can effectively judge whether it is same use Family is being operated, and then is avoided other users and tied up using the user terminal of the user corresponding to the elementary biological information Fixed ammeter, gas meter or the water meter of oneself, adversely affects to the user.If so, by the identification information of the user and described Internet of Things end message is bound.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, the flow chart in attached drawing and block diagram Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code Part, a part for the module, section or code, which includes that one or more is for implementing the specified logical function, to be held Row instruction.It should also be noted that at some as in the realization method replaced, the function of being marked in box can also be to be different from The sequence marked in attached drawing occurs.For example, two continuous boxes can essentially be basically executed in parallel, they are sometimes It can execute in the opposite order, this is depended on the functions involved.It is also noted that every in block diagram and or flow chart The combination of box in a box and block diagram and or flow chart can use function or the dedicated base of action as defined in executing It realizes, or can be realized using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each function module in each embodiment of the present invention can integrate to form an independent portion Point, can also be modules individualism, can also two or more modules be integrated to form an independent part.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access The various media that can store program code such as memory (RAM, Random Access Memory), magnetic disc or CD.It needs It is noted that herein, relational terms such as first and second and the like are used merely to an entity or operation It is distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation, there are any this Actual relationship or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to nonexcludability Including so that the process, method, article or equipment including a series of elements includes not only those elements, but also wrap Include other elements that are not explicitly listed, or further include for this process, method, article or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described There is also other identical elements in the process, method, article or equipment of element.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should be noted that:Similar label and letter exist Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and is explained.

Claims (10)

1. a kind of authentication management method, which is characterized in that including:
Acquire the elementary biological information of user;
Internet of Things end message is obtained, and initiates bind request;
The target organism information of user is acquired based on the bind request;
Judge the elementary biological information whether with the target organism information matches;
If so, the identification information of the user and the Internet of Things end message are bound.
2. according to the method described in claim 1, it is characterized in that, the elementary biological information includes face information, fingerprint letter Breath or iris information.
3. according to the method described in claim 1, it is characterized in that, the target for acquiring user based on the bind request Biological information, including:
The acquisition instructions of the biological information of acquisition user again are initiated according to the bind request;
The biological information of user is used according to the acquisition instructions;
Using the biological information as target organism information.
4. according to the method described in claim 1, it is characterized in that, the acquisition Internet of Things end message, and initiating binding and asking It asks, including:
Internet of Things end message is obtained based on close range communication techniques, and initiates bind request.
5. according to the method described in claim 1, it is characterized in that, the elementary biological information of the acquisition user, goes back later Including:
In the database by elementary biological information storage.
6. a kind of authentication management device, which is characterized in that including:
First data acquisition unit, the elementary biological information for acquiring user;
Data capture unit for obtaining Internet of Things end message, and initiates bind request;
Second data acquisition unit, the target organism information for acquiring user based on the bind request;
Data processing unit, for judge the elementary biological information whether with the target organism information matches;
Execution unit, for if so, the identification information of the user and the Internet of Things end message are bound.
7. device according to claim 6, which is characterized in that the elementary biological information includes face information, fingerprint letter Breath or iris information.
8. device according to claim 6, which is characterized in that second data acquisition unit is specifically used for:
The acquisition instructions of the biological information of acquisition user again are initiated according to the bind request;
The biological information of user is used according to the acquisition instructions;
Using the biological information as target organism information.
9. device according to claim 6, which is characterized in that the data capture unit is specifically used for:
Internet of Things end message is obtained based on close range communication techniques, and initiates bind request.
10. device according to claim 6, which is characterized in that after first data acquisition unit, further include:
Data storage cell, for storing in the database the elementary biological information.
CN201810377006.9A 2018-04-24 2018-04-24 A kind of authentication management method and device Pending CN108667823A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810377006.9A CN108667823A (en) 2018-04-24 2018-04-24 A kind of authentication management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810377006.9A CN108667823A (en) 2018-04-24 2018-04-24 A kind of authentication management method and device

Publications (1)

Publication Number Publication Date
CN108667823A true CN108667823A (en) 2018-10-16

Family

ID=63780842

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810377006.9A Pending CN108667823A (en) 2018-04-24 2018-04-24 A kind of authentication management method and device

Country Status (1)

Country Link
CN (1) CN108667823A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104954387A (en) * 2015-06-30 2015-09-30 广东美的制冷设备有限公司 Information processing method and device, terminal, household appliance and information processing system
CN105608354A (en) * 2015-07-01 2016-05-25 南京酷派软件技术有限公司 Authentication method and system, terminal and server
CN105898418A (en) * 2016-04-28 2016-08-24 乐视控股(北京)有限公司 Intelligent terminal, remote controller, and intelligent terminal payment method
CN106302511A (en) * 2016-08-31 2017-01-04 深圳前海弘稼科技有限公司 Method, server, cultivation box and the implant system that cultivation box is bound with user
CN106843987A (en) * 2017-02-18 2017-06-13 珠海格力电器股份有限公司 Start the method and device of associated application based on fingerprint recognition
WO2018014265A1 (en) * 2016-07-20 2018-01-25 张志慧 Control system for smart humidifier
WO2018035684A1 (en) * 2016-08-22 2018-03-01 张志慧 Smart home cloud control system
CN107808085A (en) * 2017-10-27 2018-03-16 华勤通讯技术有限公司 the fingerprint control method and system of intelligent terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104954387A (en) * 2015-06-30 2015-09-30 广东美的制冷设备有限公司 Information processing method and device, terminal, household appliance and information processing system
CN105608354A (en) * 2015-07-01 2016-05-25 南京酷派软件技术有限公司 Authentication method and system, terminal and server
CN105898418A (en) * 2016-04-28 2016-08-24 乐视控股(北京)有限公司 Intelligent terminal, remote controller, and intelligent terminal payment method
WO2018014265A1 (en) * 2016-07-20 2018-01-25 张志慧 Control system for smart humidifier
WO2018035684A1 (en) * 2016-08-22 2018-03-01 张志慧 Smart home cloud control system
CN106302511A (en) * 2016-08-31 2017-01-04 深圳前海弘稼科技有限公司 Method, server, cultivation box and the implant system that cultivation box is bound with user
CN106843987A (en) * 2017-02-18 2017-06-13 珠海格力电器股份有限公司 Start the method and device of associated application based on fingerprint recognition
CN107808085A (en) * 2017-10-27 2018-03-16 华勤通讯技术有限公司 the fingerprint control method and system of intelligent terminal

Similar Documents

Publication Publication Date Title
CN110245220B (en) Electronic document signing method, electronic document signing device, electronic document server and storage medium
EP3859644B1 (en) Block chain-based data check system and method, computing device, and storage medium
CN109271611B (en) Data verification method and device and electronic equipment
CN111562965B (en) Page data verification method and device based on decision tree
CN111563075B (en) Service verification system, method and equipment and storage medium
CN113326991A (en) Automatic authorization method, device, computer equipment and storage medium
CN110704426A (en) Data verification method, electronic device and computer readable storage medium
CN108764971A (en) Device identification method, device, electronic equipment and readable storage medium storing program for executing
CN108920601B (en) Data matching method and device
CN117094729A (en) Request processing method, device, computer equipment and storage medium
CN112508720A (en) Insurance client identity attribute screening method and screening device and electronic equipment
CN117251490A (en) Data query method, device, computer equipment and storage medium
CN111753203A (en) Card number recommendation method, device, equipment and medium
CN108667823A (en) A kind of authentication management method and device
CN111539777A (en) Method, server and terminal for realizing service function
CN110865932A (en) Program internal interface testing method, system, terminal and storage medium
CN113254106B (en) Task execution method and device based on Flink, computer equipment and storage medium
CN110119337B (en) Data analysis method and device and server
CN112100424B (en) Certificate image classification acquisition method, device, equipment and medium
US9882991B2 (en) URL issuing device, URL issuing method, and URL issuing program
CN113609833A (en) Dynamic generation method and device of file, computer equipment and storage medium
CN112579242B (en) Page jump relation analysis method, device, equipment and storage medium
CN113806372B (en) New data information construction method, device, computer equipment and storage medium
CN115576837A (en) Batch number making method and device, computer equipment and storage medium
CN115098686A (en) Grading information determination method and device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB02 Change of applicant information

Address after: 610000 Floor 23, No. 11, Tianfu Software Park, 219 Tianhua Second Road, China (Sichuan) Free Trade Experimental Zone, Chengdu, Sichuan Province

Applicant after: Sichuan science and technology Limited by Share Ltd

Address before: 610000 floor 23, 11 building C, Tianfu Software Park, 219 Tianhua two road, Chengdu High-tech Zone, Sichuan.

Applicant before: SICHUAN JINGGONG WEIDA INTELLIGENT TECHNOLOGY CO., LTD.

CB02 Change of applicant information
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181016

RJ01 Rejection of invention patent application after publication