Overview of Digital Identity

avatar

1. What identity authentication challenges do organizations face in their digital construction? In digital systems, account ID leakage, impersonation, and proxy signing often occur. If the true identity of the operator cannot be proven, it is difficult to determine who is operating, and risks such as denial and mutual shirking of responsibility often arise! If there is a dispute in the contract or a problem with the system operation, it is impossible to determine who is operating it, and how should the responsibility be defined? What if the account is leaked or stolen, the file information in the system is leaked, and there is confusion in the operation permissions?

2. Contract Lock Digital Identity Product Introduction:

Contract Lock is based on authoritative digital certificates and provides identity authentication and verification services for various management software. It upgrades virtual ID accounts in the system to real and trusted digital identities, ensuring that users' "login, approval, signing, viewing, downloading, editing" operations are supported by real identities, realizing user identity anti-counterfeiting, key operation anti denial, important data anti tampering, and sensitive information anti theft, effectively solving the problem of difficult operator real identity confirmation in the process of organizational digital transformation.

3. Introduction to Real Identity Authentication Scheme for Contract Lock: The Contract Lock Digital Identity Authentication Verification System is integrated with the Citizen Network Identity (eID) of the Ministry of Public Security, using multiple authentication methods to bind network IDs with real identities, ensuring the authenticity of user identities in the system and preventing denial of operations.

avatar

avatar

Three element authentication: "name, ID number and verification code" can complete identity verification only when they are completely matched. Facial recognition authentication: Connect with professional facial recognition platforms, ensure personal participation through live comparison, and verify the authenticity of the authentication results.

Bank card authentication: consistency verification is conducted through four elements of mobile phone number, name, ID number and bank card number information verification.

Manual verification: Users who fail authentication or do not have an ID card can be verified through manual channels.

Enterprise identity authentication

Basic information authentication: The organization uploads its business license and basic information, and the system automatically verifies and compares the information to complete the authentication.

avatar

Authorization authentication: The enterprise legal representative signs the authentication authorization letter online, and the system automatically reviews it with fast speed.

Corporate payment authentication: Using the company's bank account to verify the company's identity, providing two methods of "forward payment" and "reverse payment".

4. Introduction to Contract Lock Identity Authentication Capability:

1) Trusted data source support, rigorous and reliable authentication

avatar

Contract Lock Identity Authentication Platform connects with national authoritative and trustworthy identity data sources such as "data recorded in communication operators, facial information database of the Ministry of Public Security, UnionPay information database, etc." to ensure authentic identity authentication. 2) Multiple authentication methods are available to meet different user authentication scenarios. The contract lock identity authentication platform supports multiple authentication methods such as facial recognition, three elements, bank card four elements, manual review, etc., allowing users to flexibly carry out authentication according to their actual situation. At the same time, the contract lock supports mobile device facial recognition applications, which can easily enable facial recognition in critical business processes and verify the true identity of the operator.

3) Multi terminal support, flexible selection of verification tools

Supports multiple terminals such as mobile apps, mini programs, PC web and client, users can flexibly choose tools to make authentication more convenient. Com/cms/image/view/56ec9dd0-5f02-4d1d-b260-eb1af2c24e36 "alt=" avatar ">

Integrated OA management software

Requirements:

System login, important process approval, contract data viewing, downloading, stamping and other processes require authentication technology to determine user identity, ensure compliance with operations, and ensure data security.

Solution:

Implement contract lock trusted digital identity authentication for the organizational personnel system in the OA system to ensure the security of the organization's office system login, while also initiating and approving OA processes;

; Information viewing and downloading of important files can be verified one-on-one to ensure the security of collaborative work.

Integrated Supplier Management System

Requirements:

Supplier identity authentication is required during the supplier admission process, and supplier identity verification is required during order/contract document signing.

.

Solution:

In the process of supplier management, which involves supplier admission, contract signing and other links, facial recognition verification can be carried out through the contract lock identity authentication interface to determine the true identity of the supplier and reduce business risks.

.

Integrated Personnel Management System

Requirements:

To view salary data, sign labor contracts, and issue personnel certificates and other business processes, it is necessary to authenticate the identity information of HR and employees or new hires.

.

Solution:

Through integration and integration, identity authentication will be automatically prompted in the process of viewing salary data, signing labor contracts, and issuing personnel certificates. The contract lock identity authentication page will be called through the interface to determine the true identity of HR and employees, ensuring data security and signing security.

.

Integrated Financial Management System

Requirements:

User identity information needs to be determined in the login of the financial system, viewing of financial documents/budget plans, and approval of important fund applications.

.

Solution:

Important links such as financial reimbursement, budget amount approval, and payment will be enabled with identity authentication. During the operation, the identity authentication will be automatically prompted to ensure the authenticity and credibility of the reimbursement person, cashier, and approval leader, ensuring the security of enterprise funds.

.

Integrated Customer Management System

Requirements:

Checking business opportunities, customers, and contract information requires verifying the identity of internal employees;

; The signing process of the sales contract requires verification of the customer's true identity.

Solution:

Encrypt data such as business opportunities, customers, and contracts. Internal employees need facial recognition to verify their true identity when viewing, to determine whether it is within the authorized scope and whether it is their own operation, ensuring data security.

. In the contract signing process, login to the signing page, view the contract, and perform intelligent identity verification to ensure the authenticity of the individual's intentions; At the same time, facial recognition verifies the identity of the stamping personnel to ensure compliance with stamping regulations.

Integrated Logistics Management System

Requirements:

Identity verification of "customer, driver, consignee", etc. is required during the stages of customer reporting of transportation requirements, signing of freight bills, and driver entry in logistics transportation.

.

Solution:

Through integration, the contract lock identity authentication function is integrated into the logistics system, and identity authentication prompts are added in the stages of freight demand reporting, freight bill signing, and driver entry to provide authoritative authentication of the identities of the principal, driver, and recipient, ensuring reliable demand information and safe freight transportation.

.

Integrated HIS Hospital Information System

Requirements:

In diagnosis and treatment, it is necessary to ensure the authenticity of the identities of medical staff, patients, or family members in order to timely identify medical responsibilities, ensure the credibility of patients' electronic medical records, and reduce medical disputes.

.

Solution:

Integrate with the HIS information system to enable identity authentication during stages such as doctor prescription, patient information registration, and surgical opinion signing, ensuring that both parties operate in person, have genuine intentions, and cannot deny them.

.

Integrated e-commerce service platform

Requirements:

Effective authentication methods are required for brand entry, authorization contract signing, and other processes to determine the true identity information of merchants and improve the quality of platform cooperation screening.

.

Solution:

Through integrated docking, brand merchants can quickly complete identity authentication and record their real identity information when applying for registration.

; When signing the entry agreement and authorization contract, verify identity through facial recognition to ensure that the signing is based on one's true intention, legal, and valid.

Integrated Counter Service System

Requirements:

In counter services provided by banks, insurance, water, gas, electricity and other companies, customer identity information needs to be verified and guaranteed to be processed by the individual.

.

Solution:

By integrating and combining with counter tablet devices, timely enable customer face scanning authentication operations to quickly verify the customer's true identity and legally and effectively sign business documents.

.

Integrated online travel platform

Requirements:

When online travel platforms sign travel contracts remotely with customers, they need to use identity authentication methods to determine the true identities of both parties and ensure transaction security.

.

Solution:

Through integrated applications, real name authentication of both parties' identities is carried out during the process of customers placing orders and signing travel contracts, ensuring their true intention to sign contracts, promoting the standardized and efficient operation of online tourism business, and protecting consumer rights and interests.

.

Integrated housing rental platform

Requirements:

The housing rental platform provides customers with rental services and the process of signing housing rental contracts. It requires authentication technology to verify the real names of tenants and lessees, promoting standardized and efficient online rental transactions.

.

Solution:

Through integration, the housing rental platform is equipped with identity authentication and verification capabilities. During the process of signing contracts, the identity information of the lessor and lessee is verified in a timely manner to protect the rights and interests of both parties.

.

5、 Application scenarios of Contract Lock Trusted Digital Identity Authentication System:

When logging in to the business system

Various management software can call the Contract Lock identity authentication interface when logging in to mobile and PC terminals. Facial recognition can authenticate the real identity of the login user, ensuring that the ID owner logs in personally and preventing account theft.

During contract approval

For various types of contract business approval authorization processes, identity recognition is enabled to determine the true identity of the approver, making the approval operation non repudiation and accountability to individuals.

.

When signing and stamping

During the signing process of sales contracts, labor contracts, procurement contracts, etc., identity authentication and verification are initiated. Facial recognition is used to confirm the true identity information of customers, employees, and suppliers, ensuring that the individual operates and has genuine intentions.

.

During expense reimbursement

Identity verification is initiated during the reimbursement process initiation and approval stage. When employees submit reimbursement forms and receive approval from leaders and finance, their identity information is determined through facial recognition to ensure fund security.

.

During the loan approval process

In order to strengthen the security of internal budget funds in the enterprise, identity verification can be initiated in key financial process approval stages such as loans, and the approver's identity can be determined through facial recognition before authorization can be approved.

.

When viewing financial statements

Encrypt the financial statements and grant some personnel viewing permissions. When viewing the reports, facial recognition and identity verification are used to determine whether they have the authority to view and whether they are viewing by themselves.

.

When viewing salary and benefits

Confidential data such as salary and benefits, salary and benefits, and payslips can be pre configured with viewing permissions and designated viewing personnel. When users view them, an identity authentication prompt will automatically pop up, and the contract lock identity authentication page will be called through the interface to verify their identity and determine whether they have the authority to view them.

.

When searching for electronic archives

Encrypt the company's important archive materials such as product technology and contracts, automatically verify identity information during the search and query process, ensure retrieval and use within authorized scope, and ensure archive security.

.

When checking in for attendance

Users will be automatically prompted to verify their identity when checking in for attendance. Only by using facial recognition to confirm their own operation can they check in, avoiding behaviors such as proxy checking in.

.

When viewing chat records

For some positions with high confidentiality requirements, identity authentication operations should be added when viewing chat records to ensure personal access and prevent the leakage of important information.

.

Private and group chat encryption

For single or group chats involving important projects, business opportunities, technologies, and customers, encryption settings are required. Users need to complete facial recognition and identity verification before chatting to ensure their participation and prevent important information leakage.