CN110020514A - Account agency of trademark registration method and apparatus - Google Patents

Account agency of trademark registration method and apparatus Download PDF

Info

Publication number
CN110020514A
CN110020514A CN201811518436.4A CN201811518436A CN110020514A CN 110020514 A CN110020514 A CN 110020514A CN 201811518436 A CN201811518436 A CN 201811518436A CN 110020514 A CN110020514 A CN 110020514A
Authority
CN
China
Prior art keywords
information
identity
identity information
user
proxied
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811518436.4A
Other languages
Chinese (zh)
Other versions
CN110020514B (en
Inventor
钱剑波
曾四怡
王志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811518436.4A priority Critical patent/CN110020514B/en
Publication of CN110020514A publication Critical patent/CN110020514A/en
Application granted granted Critical
Publication of CN110020514B publication Critical patent/CN110020514B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This specification embodiment provides a kind of account agency of trademark registration method and apparatus, legitimacy verifies are carried out to the agent relation between the first identity information of proxy user, the second identity information of proxied user and proxy user and proxied user, and after three verifies successfully, login account just is created for proxied user, improves the safety of Account Registration.

Description

Account agency of trademark registration method and apparatus
Technical field
This specification is related to computer software technical field more particularly to account agency of trademark registration method and apparatus.
Background technique
In daily life, it is often necessary to which login account, one of Account Registration scene are the artificial principals of agency Login account, i.e. agency of trademark registration.Agent and the principal refer to the both sides with certain agent relation, for example, having monitoring The parent and child of relationship, or sign the both sides or multi-party etc. of agency agreement.
Summary of the invention
Based on this, present description provides account agency of trademark registration method and apparatus.
According to this specification embodiment in a first aspect, providing a kind of Account Registration method, which comprises
Obtain the first identity information of proxy user and the second identity information of proxied user;
First identity information and the second identity information are sent to identity verification system, to believe first identity Agent relation between breath, the second identity information and proxy user and proxied user carries out legitimacy verifies;The identity Check system includes the first identity verification system and the second identity verification system, and first identity verification system is used for described First identity information and the second identity information carry out legitimacy verifies, and second identity verification system is used to close the agency System carries out legitimacy verifies;
It receives identity verification system and success is being verified to first identity information, the second identity information and agent relation The verification successful information returned afterwards, and the verification successful information is responded, to create proxied user for the proxied user Account.
Optionally, obtain proxy user the first identity information and proxied user the second identity information the step of packet It includes:
After detecting proxy user by the pre-registered proxy user Account Logon Account Registration page, read with First identity information of the proxy user account binding;And/or
Obtain the second identity information that proxy user inputs in the acquisition of information entrance of the Account Registration page.
Optionally, second identity verification system is also used to the society according to second identity information to proxied user It can role's progress legitimacy verifies;
The verification successful information is identity verification system to first identity information, the second identity information, agency The information that relationship and social role return after verifying successfully.
Optionally, first identity verification system is public security database check system;
Second identity verification system be student status system database check system, social security sector database check system, Or there are contractual relation and there is the organization for inquiring the second identity information permission with proxied user.
Optionally, first identity information and the second identity information are sent to identity verification system, to described Agent relation between two identity informations and proxy user and proxied user carries out the step of legitimacy verifies and includes:
First identity information and the second identity information are sent to the first identity verification system, to first body Part information and the second identity information carry out legitimacy verifies;
If verifying successfully, first identity information and the second identity information are sent to the second identity verification system, with Legitimacy verifies are carried out to the agent relation between proxy user and proxied user.
Optionally, the verification successful information is responded, to create the step of proxied user account for the proxied user Suddenly include:
The verification successful information is responded, to obtain the biological information of proxied user;
If getting, proxied user account is created for the proxied user.
Optionally, the method also includes:
The biological information and the second identity information are bound with the proxied user account respectively.
Optionally, the method also includes:
Receive the information change directive that the authentication system is sent;
The information change directive is responded, to carry out more to the second identity information of the proxied user account binding Change.
Optionally, first identity information includes the name, identification card number and biological information of proxy user;With/ Or
Second identity information includes name, identification card number, place school information and the student status information of proxied user, Or second identity information includes the name, identification card number and social security information of proxied user.
Optionally, the method also includes:
It receives identity verification system and failure is being verified to first identity information, the second identity information or agent relation The error field returned afterwards.
Optionally, the method also includes:
The correspondent account of the proxied user account and proxy user is bound.
According to the second aspect of this specification embodiment, a kind of Account Registration device is provided, described device includes:
Module is obtained, for obtaining the first identity information of proxy user and the second identity information of proxied user;
Sending module, for first identity information and the second identity information to be sent to identity verification system, with right Agent relation between first identity information, the second identity information and proxy user and proxied user carries out legitimacy Verification;The identity verification system includes the first identity verification system and the second identity verification system, first proof of identity System is used to carry out legitimacy verifies to first identity information and the second identity information, and second identity verification system is used In to agent relation progress legitimacy verifies;
Registration module, for receiving identity verification system to first identity information, the second identity information and agency The verification successful information that relationship returns after verifying successfully, and the verification successful information is responded, for the proxied user Create proxied user account.
According to the third aspect of this specification embodiment, a kind of computer readable storage medium is provided, is stored thereon with meter Calculation machine program realizes method described in any embodiment when the program is executed by processor.
According to the fourth aspect of this specification embodiment, a kind of computer equipment is provided, including memory, processor and deposit The computer program that can be run on a memory and on a processor is stored up, the processor realizes any reality when executing described program Apply method described in example.
Using this specification example scheme, to the second identity of the first identity information of proxy user, proxied user Agent relation between information and proxy user and proxied user carries out legitimacy verifies, so as to proxy user and The identity legitimacy and proxy user of proxied user is that the legitimacy of the permission of proxied user's registration account carries out school It tests, only after three verifies successfully, just creates proxied user account for proxied user, improve Account Registration Safety.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not This specification can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the reality for meeting this specification Example is applied, and is used to explain the principle of this specification together with specification.
Fig. 1 is the account agency of trademark registration method flow diagram of this specification one embodiment.
Fig. 2 is the schematic diagram of the proof of identity process of this specification one embodiment.
Fig. 3 is the interaction schematic diagram of this specification one embodiment account agency of trademark registration platform Yu each system.
Fig. 4 (a) to Fig. 4 (c) is the application scenarios schematic diagram of the account agency of trademark registration method of this specification one embodiment.
Fig. 5 (a) to Fig. 5 (c) is the application schematic diagram of the proxied user account of this specification one embodiment.
Fig. 6 is the block diagram of the account agency of trademark registration device of this specification one embodiment.
Fig. 7 is the structural representation of the computer equipment for implementing this specification method of this specification one embodiment Figure.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with this specification.On the contrary, they are only and such as institute The example of the consistent device and method of some aspects be described in detail in attached claims, this specification.
It is only to be not intended to be limiting this explanation merely for for the purpose of describing particular embodiments in the term that this specification uses Book.The "an" of used singular, " described " and "the" are also intended to packet in this specification and in the appended claims Most forms are included, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein is Refer to and includes that one or more associated any or all of project listed may combine.
It will be appreciated that though various information may be described using term first, second, third, etc. in this specification, but These information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not taking off In the case where this specification range, the first information can also be referred to as the second information, and similarly, the second information can also be claimed For the first information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... " or " in response to determination ".
As shown in Figure 1, being the account agency of trademark registration method flow diagram of this specification one embodiment, the method can be wrapped It includes:
Step 102: obtaining the first identity information of proxy user and the second identity information of proxied user;
Step 104: first identity information and the second identity information being sent to identity verification system, to described Agent relation between one identity information, the second identity information and proxy user and proxied user carries out legitimacy verifies; The identity verification system includes the first identity verification system and the second identity verification system, and first identity verification system is used In carrying out legitimacy verifies to first identity information and the second identity information, second identity verification system is used for institute It states agent relation and carries out legitimacy verifies;
Step 106: receiving identity verification system equal to first identity information, the second identity information and agent relation The verification successful information returned after verifying successfully, and the verification successful information is responded, to create quilt for the proxied user Proxy user account.
This specification embodiment can be used for agency of trademark registration scene, and agency of trademark registration, that is, proxy user is proxied user's registration account Family.Wherein, proxy user is to execute the user of Account Registration operation, and proxied user is the owner of account after succeeding in registration. In general, between proxy user and proxied user have certain agent relation, this agent relation can be contract or Contractual relation is also possible to monitoring relationship etc..Correspondingly, agent and the principal can be sign a contract or contract it is double Side, for example, trustee and mandatory;It is also possible to guardian and ward (for example, parent and child).It is mentioned here Account Registration can be bank account registration, be also possible to the Account Registration of the application programs such as Alipay or wechat, can be with It is other kinds of Account Registration.
In a step 102, the first identity information of proxy user is the information for uniquely confirming proxy user identity, one As for, the name and identification card number that proxy user can be used are as the first identity information.Further, in the first identity information It can also include the biological information of proxy user, for example, face information, finger print information and/or iris information etc., in this way, It may insure that currently executing the user of agency of trademark registration operation is proxy user.
The second identity information of proxied user is the information for uniquely confirming proxied user identity, for having not With the proxied user of social role, the second identity information used can be different.For example, when proxied user is student When, the second identity information may include name, identification card number, place school information and the student status information of proxied user.Example again Such as, when proxied user is the workplace personnel for having worked and having paid social security, the second identity information may include by Name, identification card number and the social security information of proxy user.
In addition, proxy user and proxied user are not limited to natural person, it can also be legal person or other organizations.Example Such as, proxy user can be enterprise, and proxied user can be the employee that enterprise is employed.In another example proxy user and by generation Reason user, which can be, signs the consignable company for having entrustment agreement and entrusted enterprise.In these cases, identity information should also be as It is information relevant to enterprise, for example, the business licence number of enterprise, enterprise name etc..
In one embodiment, above-mentioned first identity information and/or the second identity information can be obtained by enrollment page.Note It may include several acquisition of information entrances on album of paintings or calligraphy face, proxy user can input corresponding in each acquisition of information entrance First identity information or the second identity information.In another embodiment, proxy user can also first pass through proxy user account The family Login Register page.Proxy user account is the pre-registered account of proxy user, if the binding of proxy user account has agency The first identity information of user, then enrollment page is detecting that proxy user passes through pre-registered proxy user Account Logon account After the enrollment page of family, the first identity information with proxy user account binding can be read directly, without inputting again First identity information, has saved user's operation.
Further, when need to register is the account of some application program, proxy user can apply journey by this Sequence accesses enrollment page, and proxy user applies journey by pre-registered proxy user Account Logon application program, and by this When sequence accesses enrollment page, it is considered as and has logged in enrollment page, enrollment page can be read directly to be tied up with the proxy user account The first fixed identity information.
At step 104, the first identity information and the second identity information can be sent to identity verification system, identity school Check system can close the agency between first identity information, the second identity information and proxy user and proxied user System carries out legitimacy verifies.Wherein, the identity information and different user of each user can be stored in advance in identity verification system Between agent relation's information.When being verified, identity verification system can verify the first identity information, the second identity respectively Whether the every terms of information in information and agent relation is consistent with the information prestored, if every terms of information is consistent, determines to verify Success;Otherwise, it is determined that verification failure.In addition, if not inquiring relevant information in identity verification system, this also can be determined that Item information checking failure.
When specific verification, identity verification system can be pre- according to the first identity information and system that get from enrollment page Whether the identity information deposited unanimously verifies the legitimacy of agent's identity, is believed according to the second identity got from enrollment page Whether identity information that breath is prestored with system unanimously verifies the legitimacy of principal's identity, and obtains according to from enrollment page To the first identity information and the second identity information whether there is agent relation in the present system and verify the legal of agent relation Property.In practical applications, agent relation voluntarily can also be inputted in enrollment page by user, and is verified and is used by identity verification system Whether the agent relation of family input and the agent relation according to the first identity information and the confirmation of the second identity information are consistent, if one It causes, then determines to verify successfully;Otherwise, it is determined that verification failure.
Further, identity verification system is also used to the social role according to second identity information to proxied user Carry out legitimacy verifies.Social role can be student, in-service employee, retired old man etc..Identity verification system may determine that from Whether the corresponding social role of the second identity information that enrollment page is got and the social role recorded in this system are consistent, such as Fruit is consistent, then determines to verify successfully;Otherwise, it is determined that verification failure.For example, the proxied user recorded in identity verification system is Pupil, and the corresponding social role of the second identity information got from enrollment page is on-the-job personnel, then determines that verification is lost It loses.
The proof of identity process of one embodiment is as shown in Figure 2.Identity verification system may include the first identity verification system With the second identity verification system, the identity information of user is stored in first identity verification system, for described first Identity information and the second identity information carry out legitimacy verifies;The agency being stored in second identity verification system between user Relation information and social role's information, for carrying out legitimacy verifies to the agent relation, and for proxied user's Social role carries out legitimate verification.In practical applications, legal by being carried out to the first identity information and the second identity information Property verification, can verify proxy user and whether proxied user is legal citizen;By carrying out legitimacy school to social role It tests, whether the social role that can verify proxied user meets the requirement of login account.For example, registration student account should expire The social role of the proxied proxied user of user of foot is student.
When carrying out proof of identity, the first identity information and the second identity information can be sent to the first proof of identity first System.If the first identity verification system verification failure, directly by the first identity verification system back-checking failure information;Such as The first identity verification system of fruit verifies successfully, then the first identity information and the second identity information are sent to the second proof of identity system System, and by the second identity verification system according to check results back-checking successful information or verification failure information.
In practical applications, first identity verification system can be public security database check system, second body Part check system can be student status system database check system, social security sector database check system or with proxied user There are contractual relation and there is the organization for inquiring the second identity information permission.Public security database check system is based on the Ministry of Public Security The Database of door, wherein can store the identity information of each citizen, by public security database check system to the first body Part information and the second identity information are verified, to verify out whether proxy user and proxied user are legal citizen.It learns Database of the nationality system database check system based on education department, wherein can store the student status information of each student, It may include the monitoring relation information between student and its guardian in student status information.Social security sector database check system is based on society The Database of guarantor department also can wrap wherein may include the labor relation information that social security pays people and its unit one belongs to It includes social security and pays family relationship information between people and other kinsfolks.With proxied user there are contractual relation and have look into The organization for asking the second identity information permission can be insurance institution or the fund etc. signed with proxied user and have contract. Above-mentioned organization can with the second identity information that proxied user is stored after proxied user's sign a contract or contract, And when needed according to the second identity information verification agent relation of the second identity information and storage got from enrollment page And the social role of proxied user.
Therefore, the agent relation between proxy user and proxied user can be carried out by the second identity verification system Legitimacy verifies, while legitimacy verifies can also be carried out to the social role of proxied user.If believed according to the first identity It ceases between corresponding proxy user proxied user corresponding with the second identity information there are corresponding agent relation, then determines school Success is tested, otherwise, it is determined that verification failure.
In step 106, if receiving the verification successful information of identity verification system return, the school can be responded Successful information is tested, to create proxied user account for the proxied user;Otherwise, registration failure prompt information is exported.
Further, after receiving verification successful information, the verification successful information can also be responded, to obtain quilt The biological information of proxy user;If getting, proxied user account is created for the proxied user.Wherein, by generation The biological information for managing user may include in the information such as the facial image, finger print information, iris information of proxied user At least one.The present embodiment is just proxied user creation only after the biological information for getting proxied user Proxied user account ensures to a certain extent so as to be its login account in the case where proxied user participates in The behavior of login account is the voluntary of proxied user.Meanwhile this mode is based not only on the identity letter of proxied user Breath, also based on the biological information of proxied user come for proxied user's registration account, based on previous proxy user Account Registration mode it is different, this way provides in a manner of a kind of Account Registration based on proxied user.
In one embodiment, identity verification system can also be received to first identity information, the second identity letter Breath or agent relation verify the error field returned after failure.In the present embodiment, if identity verification system is to the first identity Any one in information, the second identity information or agent relation or more persons verification failure, then it can return to error field, Error field is the item of information for verifying failure, and error field can be the first identity information, the second identity information and/or agency and close System itself, the particular content being also possible in the first identity information, the second identity information and/or agent relation, for example, agent When identification card number verification failure, " agent identity card number " this error field is returned.If further including in information to be verified Social role, then can receive identity verification system to first identity information, the second identity information, agent relation or The error field returned after social role's verification failure.In this way, facilitate the letter that proxy user clearly verifies failure Breath, to take corresponding remedial measure.Further, in order to improve data interaction efficiency, volume of transmitted data is reduced, it can be with Error code is preset for each error field, and error code is stored, in this case, identity verification system The corresponding error code of error field need to only be returned.
In one embodiment, can also respectively by the biological information and the second identity information with it is described proxied User account is bound.The biological information of binding and the second identity information can make under various practical application scenes With, for example, under the scene for needing to carry out authentication, can with Login Register account, and show with register account number binding the Two identity informations are for authentication.
In one embodiment, the information change directive that the authentication system is sent can also be received;Described in response Information change directive, to be modified to the second identity information of the proxied user account binding.In information change directive It may include the field name of information to be changed, and the field value after change.For example, when the student status information for needing to change student When, the specific student status letter after can receive the field name " student status information " that student status system database check system is sent, and change Breath.
In one embodiment, the correspondent account of the proxied user account and proxy user can also be tied up It is fixed, so as to the operation relevant to proxied account of correspondent account quick execution, for example, for proxied account payment etc..
As shown in figure 3, being the interaction schematic diagram of this specification one embodiment account agency of trademark registration platform Yu each system. Agency of trademark registration platform in the present embodiment can be Alipay platform, and the proxied user account for principal's registration can be Alipay account, enrollment page can be the enrollment page in Alipay application program, and agent can be parents of student, by generation Managing people is that there are the students of monitoring relationship with the parents of student.As shown, parent can pass through branch during agency of trademark registration It pays precious application program and initiates registration operation, fill in student information on enrollment page after starting enrollment page, such as: student name, Pupilage card number and school information.If parent can also read house by parent's Account Logon enrollment page, enrollment page Family's long message of long account binding, such as: parent's name and identification card number or cell-phone number.Further, parent can also be The relationship of itself and student is inputted in enrollment page, such as: set membership, mother and daughter relationship etc..Enrollment page can beat above- mentioned information Packet is sent to identity verification system.
Identity verification system can verify one by one above- mentioned information, and back-checking result.If verification failure, is returned Student information (such as: student status information) can be returned, the information of passback can be in Account Registration if verified successfully by returning error field After success, for being bound with account.
Enrollment page can jump to face acquisition interface after identity verification system verifies successfully, to acquire student Face information, if acquire successfully, create student account UID (User Identification, user identity prove).Into One step can also first inquire whether the student is registered to be transferred items before the newly-built student account UID in Alipay database Family, if so, account UID and association status information can be obtained.If creating an account failure, Alipay database can also be to Enrollment page return creates an account failure cause.
Enrollment page can execute corresponding response operation according to registering result, for example, exporting when succeeding in registration for mentioning Show the prompt information to succeed in registration, and returns to service page;If registration failure, failure cause is prompted, and jumps back to agency's note Album of paintings or calligraphy face.Further, it is also possible to which user is prompted to contact customer service.
The application scenarios that Fig. 4 (a) to Fig. 4 (c) shows the account agency of trademark registration method of this specification one embodiment show It is intended to.Wherein, the proxied user account for principal's registration can be Alipay account, and enrollment page can be Alipay Enrollment page in application program, agent can be parents of student, and the principal is that there are monitoring relationships with the parents of student Student.
As shown in Fig. 4 (a), parent, can be in Alipay after logging in Alipay using the Alipay account of itself Start enrollment page, then inputs student information (that is, second identity information) in the acquisition of information entrance of enrollment page, student Information may include student name, identification card number and place school.If parent has logged in Alipay account, and the logon account of parent In in advance binding have a long message (that is, first identity information), then long message of getting home can be read directly in enrollment page, such as scheme Shown, family's long message may include the name and identification card number of parent.After getting above- mentioned information, enrollment page can automatically will be upper It states information and is committed to identity verification system and verified.
As shown in Fig. 4 (b) and 4 (c), after identity verification system back-checking successful information, enrollment page can be jumped To face acquisition interface, student can upload itself face information by the interface.It, can be by student or parent couple after acquiring successfully Collected face information is confirmed, can also be again if the defects of collected face information is insufficient there are clarity Acquire face information.It after confirming to face information, succeeds in registration, Alipay account can be created for student.
Certainly, above-mentioned application scenarios are one kind for example, practical application is without being limited thereto.It, can under another scene To be old parent's agency of trademark registration account by children.By using the scheme of this specification embodiment, old man, child can be overcome Equal specific crowds register barrier problem because not having mobile phone, or caused by will not operating, and enable the proxy user with permission It is enough above-mentioned specific crowd login account, meanwhile, when registration, not only verifies the identity of proxy user, also to proxied The identity of user and bipartite agent relation are verified, and logon security is improved.
After creating Alipay account, the Alipay account of student can also be bound with student information, to generate Electronics student card.As shown in Fig. 5 (a), it may include the information such as student name, school, class in electronics student card, can also include The information (not shown) such as face information, student status number of student, student can log in Alipay account and get electronics student Card.As shown in Fig. 5 (b), each electronics student card can correspond to a campus code, and campus code can be used for the daily studying and living of student Middle progress barcode scanning payment borrows books, authentication etc..The Alipay account of student can also bind parent's account, Huo Zheyong In all kinds of small routines etc. for logging in education department's release.As shown in Fig. 5 (c), electricity can be checked in the Alipay account of student Sub- student's card information, including name, school, class and student status number etc..In addition, can also carry out the face letter for resurveying student Breath, or the operation such as student card is deleted from the Alipay account of student.
Various technical characteristics in above embodiments can be arbitrarily combined, as long as there is no punchings for the combination between feature Prominent or contradiction, but as space is limited, is not described one by one, thus the various technical characteristics in above embodiment it is any into Row combination also belongs to the range of this disclosure.
As shown in fig. 6, this specification embodiment also provides one kind, described device can include:
Module 602 is obtained, for obtaining the first identity information of proxy user and the second identity information of proxied user;
Sending module 604, for first identity information and the second identity information to be sent to identity verification system, with It is legal to carry out to the agent relation between first identity information, the second identity information and proxy user and proxied user Property verification;The identity verification system includes the first identity verification system and the second identity verification system, first identity school Check system is used to carry out legitimacy verifies, second identity verification system to first identity information and the second identity information For carrying out legitimacy verifies to the agent relation;
Registration module 606, for receiving identity verification system to first identity information, the second identity information and generation The verification successful information that reason relationship returns after verifying successfully, and the verification successful information is responded, for the proxied use Family creates proxied user account.
The specific details of the realization process of the function of modules and effect, which are shown in, in above-mentioned apparatus corresponds to step in the above method Realization process, details are not described herein.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The module of explanation may or may not be physically separated, and the component shown as module can be or can also be with It is not physical module, it can it is in one place, or may be distributed on multiple network modules.It can be according to actual The purpose for needing to select some or all of the modules therein to realize this specification scheme.Those of ordinary skill in the art are not In the case where making the creative labor, it can understand and implement.
The embodiment of this specification device can be applied on a computing device, such as server or intelligent terminal.Device Embodiment can succeed software realization, and the mode of can also succeed hardware or software and hardware combining is realized.Taking software implementation as an example, As the device on a logical meaning, processor of file process will be corresponding in nonvolatile memory where being successfully it Computer program instructions are read into memory what operation was formed.For hardware view, as shown in fig. 7, being this specification device A kind of hardware structure diagram of place computer equipment, in addition to processor 702 shown in Fig. 7, memory 704, network interface 706, with And except nonvolatile memory 708, server or electronic equipment in embodiment where device are set generally according to the computer Standby actual functional capability can also include other hardware, repeat no more to this.
Correspondingly, this specification embodiment also provides a kind of computer storage medium, is stored with journey in the storage medium Sequence realizes the method in any of the above-described embodiment when described program is executed by processor.
Correspondingly, this specification embodiment also provides a kind of computer equipment, including memory, processor and is stored in On reservoir and the computer program that can run on a processor, the processor realize any of the above-described implementation when executing described program Method in example.
It wherein includes storage medium (the including but not limited to disk of program code that the application, which can be used in one or more, Memory, CD-ROM, optical memory etc.) on the form of computer program product implemented.Computer-usable storage medium packet Permanent and non-permanent, removable and non-removable media is included, can be accomplished by any method or technique information storage.Letter Breath can be computer readable instructions, data structure, the module of program or other data.The example packet of the storage medium of computer Include but be not limited to: phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), Other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices or any other non-biography Defeated medium, can be used for storage can be accessed by a computing device information.
Those skilled in the art will readily occur to the disclosure after considering specification and practicing specification disclosed herein Other embodiments.The disclosure is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes Or adaptive change follow the general principles of this disclosure and including the disclosure it is undocumented in the art known in often Knowledge or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim point out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.
The foregoing is merely the preferred embodiments of the disclosure, not to limit the disclosure, all essences in the disclosure Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of disclosure protection.

Claims (14)

1. a kind of account agency of trademark registration method, which comprises
Obtain the first identity information of proxy user and the second identity information of proxied user;
First identity information and the second identity information are sent to identity verification system, with to first identity information, Agent relation between second identity information and proxy user and proxied user carries out legitimacy verifies;The proof of identity System includes the first identity verification system and the second identity verification system, and first identity verification system is used for described first Identity information and the second identity information carry out legitimacy verifies, second identity verification system be used for the agent relation into Row legitimacy verifies;
Identity verification system is received to return after verifying successfully first identity information, the second identity information and agent relation The verification successful information returned, and the verification successful information is responded, to create proxied user account for the proxied user.
2. according to the method described in claim 1, obtaining the first identity information of proxy user and the second body of proxied user The step of part information includes:
After detecting proxy user by the pre-registered proxy user Account Logon Account Registration page, read with it is described First identity information of proxy user account binding;And/or
Obtain the second identity information that proxy user inputs in the acquisition of information entrance of the Account Registration page.
3. according to the method described in claim 1, second identity verification system is also used to according to second identity information Legitimacy verifies are carried out to the social role of proxied user;
The verification successful information is identity verification system to first identity information, the second identity information, agent relation The information returned after being verified successfully with social role.
4. according to the method described in claim 1, first identity verification system is public security database check system;
Second identity verification system be student status system database check system, social security sector database check system, or There are contractual relation and there is the organization for inquiring the second identity information permission with proxied user.
5. according to the method described in claim 1, first identity information and the second identity information are sent to proof of identity System, to carry out legitimacy verifies to the agent relation between second identity information and proxy user and proxied user The step of include:
First identity information and the second identity information are sent to the first identity verification system, to believe first identity Breath and the second identity information carry out legitimacy verifies;
If verifying successfully, first identity information and the second identity information are sent to the second identity verification system, to generation The agent relation managed between user and proxied user carries out legitimacy verifies.
6. according to the method described in claim 1, the verification successful information is responded, to be proxied user's creation by generation Manage user account the step of include:
The verification successful information is responded, to obtain the biological information of proxied user;
If getting, proxied user account is created for the proxied user.
7. according to the method described in claim 6, the method also includes:
The biological information and the second identity information are bound with the proxied user account respectively.
8. according to the method described in claim 7, the method also includes:
Receive the information change directive that the authentication system is sent;
The information change directive is responded, to be modified to the second identity information of the proxied user account binding.
9. according to the method described in claim 1, first identity information includes the name, identification card number and life of proxy user Object characteristic information;And/or
Second identity information includes name, identification card number, place school information and the student status information of proxied user, or Second identity information includes the name, identification card number and social security information of proxied user.
10. according to the method described in claim 1, the method also includes:
Identity verification system is received to return after verifying failure to first identity information, the second identity information or agent relation The error field returned.
11. according to the method described in claim 1, the method also includes:
The correspondent account of the proxied user account and proxy user is bound.
12. a kind of account agency of trademark registration device, described device include:
Module is obtained, for obtaining the first identity information of proxy user and the second identity information of proxied user;
Sending module, for first identity information and the second identity information to be sent to identity verification system, to described Agent relation between first identity information, the second identity information and proxy user and proxied user carries out legitimacy school It tests;The identity verification system includes the first identity verification system and the second identity verification system, first proof of identity system For carrying out legitimacy verifies to first identity information and the second identity information, second identity verification system is used for system Legitimacy verifies are carried out to the agent relation;
Registration module, for receiving identity verification system to first identity information, the second identity information and agent relation The verification successful information returned after verifying successfully, and the verification successful information is responded, to be created for the proxied user Proxied user account.
13. a kind of computer readable storage medium, is stored thereon with computer program, power is realized when which is executed by processor Benefit requires method described in 1 to 11 any one.
14. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, the processor realize method described in claim 1 to 11 any one when executing described program.
CN201811518436.4A 2018-12-12 2018-12-12 Account proxy registration method and device Active CN110020514B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811518436.4A CN110020514B (en) 2018-12-12 2018-12-12 Account proxy registration method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811518436.4A CN110020514B (en) 2018-12-12 2018-12-12 Account proxy registration method and device

Publications (2)

Publication Number Publication Date
CN110020514A true CN110020514A (en) 2019-07-16
CN110020514B CN110020514B (en) 2023-05-30

Family

ID=67188615

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811518436.4A Active CN110020514B (en) 2018-12-12 2018-12-12 Account proxy registration method and device

Country Status (1)

Country Link
CN (1) CN110020514B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851875A (en) * 2019-08-19 2020-02-28 湖南正宇软件技术开发有限公司 Data acquisition method and system based on block chain
CN112837147A (en) * 2021-02-26 2021-05-25 中国银行股份有限公司 Business application handling implementation method and device and computer equipment
CN113204747A (en) * 2021-05-20 2021-08-03 远景智能国际私人投资有限公司 Account management method, account management device, server and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270338A (en) * 2014-09-01 2015-01-07 刘文印 A method and system of electronic identity registration and authentication login
CN107256365A (en) * 2017-07-04 2017-10-17 烟台大学 One kind protection citizen ID certificate copy technology for safely applying
CN108600242A (en) * 2018-05-02 2018-09-28 平安科技(深圳)有限公司 Account register method, device, equipment and the readable storage medium storing program for executing of application software

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270338A (en) * 2014-09-01 2015-01-07 刘文印 A method and system of electronic identity registration and authentication login
CN107256365A (en) * 2017-07-04 2017-10-17 烟台大学 One kind protection citizen ID certificate copy technology for safely applying
CN108600242A (en) * 2018-05-02 2018-09-28 平安科技(深圳)有限公司 Account register method, device, equipment and the readable storage medium storing program for executing of application software

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851875A (en) * 2019-08-19 2020-02-28 湖南正宇软件技术开发有限公司 Data acquisition method and system based on block chain
CN112837147A (en) * 2021-02-26 2021-05-25 中国银行股份有限公司 Business application handling implementation method and device and computer equipment
CN113204747A (en) * 2021-05-20 2021-08-03 远景智能国际私人投资有限公司 Account management method, account management device, server and storage medium

Also Published As

Publication number Publication date
CN110020514B (en) 2023-05-30

Similar Documents

Publication Publication Date Title
US20200119921A1 (en) Digital Identity System
CN109120597B (en) Identity verification and login method and device and computer equipment
US8499053B2 (en) Segmenting access to electronic message boards
CN104769914B (en) The processing method of the request of digital service
US20140215573A1 (en) System and method for application accounts
CN106575327A (en) Analyzing facial recognition data and social network data for user authentication
CN107025397B (en) Identity information acquisition method and device
CN109636318A (en) A kind of method of Immovable Property Registration system and Immovable Property Registration
WO2015120086A1 (en) Computer-guided corporate governance with document generation and execution
CN107464121A (en) Electronic account is reported the loss, solves extension, business management method, device and equipment
CN110020514A (en) Account agency of trademark registration method and apparatus
CN109377189A (en) A kind of real estate electronics warrant system
CN109327312A (en) Authentication method and device, electronic equipment
CN113127822A (en) Enterprise electronic seal management method and system based on enterprise chain code
CN112350991A (en) Login method and device of front-end system
Goode Digital identity: solving the problem of trust
Nikolić et al. Development of a blockchain-based application for digital certificates in education
US11580500B2 (en) Process and method for cost and time optimization of background investigation of employment applicants
Chuhan et al. Designing and evaluating a resident-centric digital wallet experience
KR102297924B1 (en) PS-LTE OneID record management blockchain system by use of FIDO transaction certification
Phiri Crime mapping model based on cloud and spatial data: A case study of Zambia police service
Solomon Enhancing the administration of national examinations using mobile cloud technologies: A case of Malawi National Examinations Board
Govinda et al. Implementation of Election System Using Blockchain Technology
Rahman MyAttend: Development of Mobile-based Attendance System with Anonymization Approach to Preserve Location Privacy
Gerber A Use Case Oriented Survey of Self-Sovereign Identity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200927

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

Effective date of registration: 20200927

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant