Summary of the invention
Based on this, present description provides account agency of trademark registration method and apparatus.
According to this specification embodiment in a first aspect, providing a kind of Account Registration method, which comprises
Obtain the first identity information of proxy user and the second identity information of proxied user;
First identity information and the second identity information are sent to identity verification system, to believe first identity
Agent relation between breath, the second identity information and proxy user and proxied user carries out legitimacy verifies;The identity
Check system includes the first identity verification system and the second identity verification system, and first identity verification system is used for described
First identity information and the second identity information carry out legitimacy verifies, and second identity verification system is used to close the agency
System carries out legitimacy verifies;
It receives identity verification system and success is being verified to first identity information, the second identity information and agent relation
The verification successful information returned afterwards, and the verification successful information is responded, to create proxied user for the proxied user
Account.
Optionally, obtain proxy user the first identity information and proxied user the second identity information the step of packet
It includes:
After detecting proxy user by the pre-registered proxy user Account Logon Account Registration page, read with
First identity information of the proxy user account binding;And/or
Obtain the second identity information that proxy user inputs in the acquisition of information entrance of the Account Registration page.
Optionally, second identity verification system is also used to the society according to second identity information to proxied user
It can role's progress legitimacy verifies;
The verification successful information is identity verification system to first identity information, the second identity information, agency
The information that relationship and social role return after verifying successfully.
Optionally, first identity verification system is public security database check system;
Second identity verification system be student status system database check system, social security sector database check system,
Or there are contractual relation and there is the organization for inquiring the second identity information permission with proxied user.
Optionally, first identity information and the second identity information are sent to identity verification system, to described
Agent relation between two identity informations and proxy user and proxied user carries out the step of legitimacy verifies and includes:
First identity information and the second identity information are sent to the first identity verification system, to first body
Part information and the second identity information carry out legitimacy verifies;
If verifying successfully, first identity information and the second identity information are sent to the second identity verification system, with
Legitimacy verifies are carried out to the agent relation between proxy user and proxied user.
Optionally, the verification successful information is responded, to create the step of proxied user account for the proxied user
Suddenly include:
The verification successful information is responded, to obtain the biological information of proxied user;
If getting, proxied user account is created for the proxied user.
Optionally, the method also includes:
The biological information and the second identity information are bound with the proxied user account respectively.
Optionally, the method also includes:
Receive the information change directive that the authentication system is sent;
The information change directive is responded, to carry out more to the second identity information of the proxied user account binding
Change.
Optionally, first identity information includes the name, identification card number and biological information of proxy user;With/
Or
Second identity information includes name, identification card number, place school information and the student status information of proxied user,
Or second identity information includes the name, identification card number and social security information of proxied user.
Optionally, the method also includes:
It receives identity verification system and failure is being verified to first identity information, the second identity information or agent relation
The error field returned afterwards.
Optionally, the method also includes:
The correspondent account of the proxied user account and proxy user is bound.
According to the second aspect of this specification embodiment, a kind of Account Registration device is provided, described device includes:
Module is obtained, for obtaining the first identity information of proxy user and the second identity information of proxied user;
Sending module, for first identity information and the second identity information to be sent to identity verification system, with right
Agent relation between first identity information, the second identity information and proxy user and proxied user carries out legitimacy
Verification;The identity verification system includes the first identity verification system and the second identity verification system, first proof of identity
System is used to carry out legitimacy verifies to first identity information and the second identity information, and second identity verification system is used
In to agent relation progress legitimacy verifies;
Registration module, for receiving identity verification system to first identity information, the second identity information and agency
The verification successful information that relationship returns after verifying successfully, and the verification successful information is responded, for the proxied user
Create proxied user account.
According to the third aspect of this specification embodiment, a kind of computer readable storage medium is provided, is stored thereon with meter
Calculation machine program realizes method described in any embodiment when the program is executed by processor.
According to the fourth aspect of this specification embodiment, a kind of computer equipment is provided, including memory, processor and deposit
The computer program that can be run on a memory and on a processor is stored up, the processor realizes any reality when executing described program
Apply method described in example.
Using this specification example scheme, to the second identity of the first identity information of proxy user, proxied user
Agent relation between information and proxy user and proxied user carries out legitimacy verifies, so as to proxy user and
The identity legitimacy and proxy user of proxied user is that the legitimacy of the permission of proxied user's registration account carries out school
It tests, only after three verifies successfully, just creates proxied user account for proxied user, improve Account Registration
Safety.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
This specification can be limited.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with this specification.On the contrary, they are only and such as institute
The example of the consistent device and method of some aspects be described in detail in attached claims, this specification.
It is only to be not intended to be limiting this explanation merely for for the purpose of describing particular embodiments in the term that this specification uses
Book.The "an" of used singular, " described " and "the" are also intended to packet in this specification and in the appended claims
Most forms are included, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein is
Refer to and includes that one or more associated any or all of project listed may combine.
It will be appreciated that though various information may be described using term first, second, third, etc. in this specification, but
These information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not taking off
In the case where this specification range, the first information can also be referred to as the second information, and similarly, the second information can also be claimed
For the first information.Depending on context, word as used in this " if " can be construed to " ... when " or
" when ... " or " in response to determination ".
As shown in Figure 1, being the account agency of trademark registration method flow diagram of this specification one embodiment, the method can be wrapped
It includes:
Step 102: obtaining the first identity information of proxy user and the second identity information of proxied user;
Step 104: first identity information and the second identity information being sent to identity verification system, to described
Agent relation between one identity information, the second identity information and proxy user and proxied user carries out legitimacy verifies;
The identity verification system includes the first identity verification system and the second identity verification system, and first identity verification system is used
In carrying out legitimacy verifies to first identity information and the second identity information, second identity verification system is used for institute
It states agent relation and carries out legitimacy verifies;
Step 106: receiving identity verification system equal to first identity information, the second identity information and agent relation
The verification successful information returned after verifying successfully, and the verification successful information is responded, to create quilt for the proxied user
Proxy user account.
This specification embodiment can be used for agency of trademark registration scene, and agency of trademark registration, that is, proxy user is proxied user's registration account
Family.Wherein, proxy user is to execute the user of Account Registration operation, and proxied user is the owner of account after succeeding in registration.
In general, between proxy user and proxied user have certain agent relation, this agent relation can be contract or
Contractual relation is also possible to monitoring relationship etc..Correspondingly, agent and the principal can be sign a contract or contract it is double
Side, for example, trustee and mandatory;It is also possible to guardian and ward (for example, parent and child).It is mentioned here
Account Registration can be bank account registration, be also possible to the Account Registration of the application programs such as Alipay or wechat, can be with
It is other kinds of Account Registration.
In a step 102, the first identity information of proxy user is the information for uniquely confirming proxy user identity, one
As for, the name and identification card number that proxy user can be used are as the first identity information.Further, in the first identity information
It can also include the biological information of proxy user, for example, face information, finger print information and/or iris information etc., in this way,
It may insure that currently executing the user of agency of trademark registration operation is proxy user.
The second identity information of proxied user is the information for uniquely confirming proxied user identity, for having not
With the proxied user of social role, the second identity information used can be different.For example, when proxied user is student
When, the second identity information may include name, identification card number, place school information and the student status information of proxied user.Example again
Such as, when proxied user is the workplace personnel for having worked and having paid social security, the second identity information may include by
Name, identification card number and the social security information of proxy user.
In addition, proxy user and proxied user are not limited to natural person, it can also be legal person or other organizations.Example
Such as, proxy user can be enterprise, and proxied user can be the employee that enterprise is employed.In another example proxy user and by generation
Reason user, which can be, signs the consignable company for having entrustment agreement and entrusted enterprise.In these cases, identity information should also be as
It is information relevant to enterprise, for example, the business licence number of enterprise, enterprise name etc..
In one embodiment, above-mentioned first identity information and/or the second identity information can be obtained by enrollment page.Note
It may include several acquisition of information entrances on album of paintings or calligraphy face, proxy user can input corresponding in each acquisition of information entrance
First identity information or the second identity information.In another embodiment, proxy user can also first pass through proxy user account
The family Login Register page.Proxy user account is the pre-registered account of proxy user, if the binding of proxy user account has agency
The first identity information of user, then enrollment page is detecting that proxy user passes through pre-registered proxy user Account Logon account
After the enrollment page of family, the first identity information with proxy user account binding can be read directly, without inputting again
First identity information, has saved user's operation.
Further, when need to register is the account of some application program, proxy user can apply journey by this
Sequence accesses enrollment page, and proxy user applies journey by pre-registered proxy user Account Logon application program, and by this
When sequence accesses enrollment page, it is considered as and has logged in enrollment page, enrollment page can be read directly to be tied up with the proxy user account
The first fixed identity information.
At step 104, the first identity information and the second identity information can be sent to identity verification system, identity school
Check system can close the agency between first identity information, the second identity information and proxy user and proxied user
System carries out legitimacy verifies.Wherein, the identity information and different user of each user can be stored in advance in identity verification system
Between agent relation's information.When being verified, identity verification system can verify the first identity information, the second identity respectively
Whether the every terms of information in information and agent relation is consistent with the information prestored, if every terms of information is consistent, determines to verify
Success;Otherwise, it is determined that verification failure.In addition, if not inquiring relevant information in identity verification system, this also can be determined that
Item information checking failure.
When specific verification, identity verification system can be pre- according to the first identity information and system that get from enrollment page
Whether the identity information deposited unanimously verifies the legitimacy of agent's identity, is believed according to the second identity got from enrollment page
Whether identity information that breath is prestored with system unanimously verifies the legitimacy of principal's identity, and obtains according to from enrollment page
To the first identity information and the second identity information whether there is agent relation in the present system and verify the legal of agent relation
Property.In practical applications, agent relation voluntarily can also be inputted in enrollment page by user, and is verified and is used by identity verification system
Whether the agent relation of family input and the agent relation according to the first identity information and the confirmation of the second identity information are consistent, if one
It causes, then determines to verify successfully;Otherwise, it is determined that verification failure.
Further, identity verification system is also used to the social role according to second identity information to proxied user
Carry out legitimacy verifies.Social role can be student, in-service employee, retired old man etc..Identity verification system may determine that from
Whether the corresponding social role of the second identity information that enrollment page is got and the social role recorded in this system are consistent, such as
Fruit is consistent, then determines to verify successfully;Otherwise, it is determined that verification failure.For example, the proxied user recorded in identity verification system is
Pupil, and the corresponding social role of the second identity information got from enrollment page is on-the-job personnel, then determines that verification is lost
It loses.
The proof of identity process of one embodiment is as shown in Figure 2.Identity verification system may include the first identity verification system
With the second identity verification system, the identity information of user is stored in first identity verification system, for described first
Identity information and the second identity information carry out legitimacy verifies;The agency being stored in second identity verification system between user
Relation information and social role's information, for carrying out legitimacy verifies to the agent relation, and for proxied user's
Social role carries out legitimate verification.In practical applications, legal by being carried out to the first identity information and the second identity information
Property verification, can verify proxy user and whether proxied user is legal citizen;By carrying out legitimacy school to social role
It tests, whether the social role that can verify proxied user meets the requirement of login account.For example, registration student account should expire
The social role of the proxied proxied user of user of foot is student.
When carrying out proof of identity, the first identity information and the second identity information can be sent to the first proof of identity first
System.If the first identity verification system verification failure, directly by the first identity verification system back-checking failure information;Such as
The first identity verification system of fruit verifies successfully, then the first identity information and the second identity information are sent to the second proof of identity system
System, and by the second identity verification system according to check results back-checking successful information or verification failure information.
In practical applications, first identity verification system can be public security database check system, second body
Part check system can be student status system database check system, social security sector database check system or with proxied user
There are contractual relation and there is the organization for inquiring the second identity information permission.Public security database check system is based on the Ministry of Public Security
The Database of door, wherein can store the identity information of each citizen, by public security database check system to the first body
Part information and the second identity information are verified, to verify out whether proxy user and proxied user are legal citizen.It learns
Database of the nationality system database check system based on education department, wherein can store the student status information of each student,
It may include the monitoring relation information between student and its guardian in student status information.Social security sector database check system is based on society
The Database of guarantor department also can wrap wherein may include the labor relation information that social security pays people and its unit one belongs to
It includes social security and pays family relationship information between people and other kinsfolks.With proxied user there are contractual relation and have look into
The organization for asking the second identity information permission can be insurance institution or the fund etc. signed with proxied user and have contract.
Above-mentioned organization can with the second identity information that proxied user is stored after proxied user's sign a contract or contract,
And when needed according to the second identity information verification agent relation of the second identity information and storage got from enrollment page
And the social role of proxied user.
Therefore, the agent relation between proxy user and proxied user can be carried out by the second identity verification system
Legitimacy verifies, while legitimacy verifies can also be carried out to the social role of proxied user.If believed according to the first identity
It ceases between corresponding proxy user proxied user corresponding with the second identity information there are corresponding agent relation, then determines school
Success is tested, otherwise, it is determined that verification failure.
In step 106, if receiving the verification successful information of identity verification system return, the school can be responded
Successful information is tested, to create proxied user account for the proxied user;Otherwise, registration failure prompt information is exported.
Further, after receiving verification successful information, the verification successful information can also be responded, to obtain quilt
The biological information of proxy user;If getting, proxied user account is created for the proxied user.Wherein, by generation
The biological information for managing user may include in the information such as the facial image, finger print information, iris information of proxied user
At least one.The present embodiment is just proxied user creation only after the biological information for getting proxied user
Proxied user account ensures to a certain extent so as to be its login account in the case where proxied user participates in
The behavior of login account is the voluntary of proxied user.Meanwhile this mode is based not only on the identity letter of proxied user
Breath, also based on the biological information of proxied user come for proxied user's registration account, based on previous proxy user
Account Registration mode it is different, this way provides in a manner of a kind of Account Registration based on proxied user.
In one embodiment, identity verification system can also be received to first identity information, the second identity letter
Breath or agent relation verify the error field returned after failure.In the present embodiment, if identity verification system is to the first identity
Any one in information, the second identity information or agent relation or more persons verification failure, then it can return to error field,
Error field is the item of information for verifying failure, and error field can be the first identity information, the second identity information and/or agency and close
System itself, the particular content being also possible in the first identity information, the second identity information and/or agent relation, for example, agent
When identification card number verification failure, " agent identity card number " this error field is returned.If further including in information to be verified
Social role, then can receive identity verification system to first identity information, the second identity information, agent relation or
The error field returned after social role's verification failure.In this way, facilitate the letter that proxy user clearly verifies failure
Breath, to take corresponding remedial measure.Further, in order to improve data interaction efficiency, volume of transmitted data is reduced, it can be with
Error code is preset for each error field, and error code is stored, in this case, identity verification system
The corresponding error code of error field need to only be returned.
In one embodiment, can also respectively by the biological information and the second identity information with it is described proxied
User account is bound.The biological information of binding and the second identity information can make under various practical application scenes
With, for example, under the scene for needing to carry out authentication, can with Login Register account, and show with register account number binding the
Two identity informations are for authentication.
In one embodiment, the information change directive that the authentication system is sent can also be received;Described in response
Information change directive, to be modified to the second identity information of the proxied user account binding.In information change directive
It may include the field name of information to be changed, and the field value after change.For example, when the student status information for needing to change student
When, the specific student status letter after can receive the field name " student status information " that student status system database check system is sent, and change
Breath.
In one embodiment, the correspondent account of the proxied user account and proxy user can also be tied up
It is fixed, so as to the operation relevant to proxied account of correspondent account quick execution, for example, for proxied account payment etc..
As shown in figure 3, being the interaction schematic diagram of this specification one embodiment account agency of trademark registration platform Yu each system.
Agency of trademark registration platform in the present embodiment can be Alipay platform, and the proxied user account for principal's registration can be
Alipay account, enrollment page can be the enrollment page in Alipay application program, and agent can be parents of student, by generation
Managing people is that there are the students of monitoring relationship with the parents of student.As shown, parent can pass through branch during agency of trademark registration
It pays precious application program and initiates registration operation, fill in student information on enrollment page after starting enrollment page, such as: student name,
Pupilage card number and school information.If parent can also read house by parent's Account Logon enrollment page, enrollment page
Family's long message of long account binding, such as: parent's name and identification card number or cell-phone number.Further, parent can also be
The relationship of itself and student is inputted in enrollment page, such as: set membership, mother and daughter relationship etc..Enrollment page can beat above- mentioned information
Packet is sent to identity verification system.
Identity verification system can verify one by one above- mentioned information, and back-checking result.If verification failure, is returned
Student information (such as: student status information) can be returned, the information of passback can be in Account Registration if verified successfully by returning error field
After success, for being bound with account.
Enrollment page can jump to face acquisition interface after identity verification system verifies successfully, to acquire student
Face information, if acquire successfully, create student account UID (User Identification, user identity prove).Into
One step can also first inquire whether the student is registered to be transferred items before the newly-built student account UID in Alipay database
Family, if so, account UID and association status information can be obtained.If creating an account failure, Alipay database can also be to
Enrollment page return creates an account failure cause.
Enrollment page can execute corresponding response operation according to registering result, for example, exporting when succeeding in registration for mentioning
Show the prompt information to succeed in registration, and returns to service page;If registration failure, failure cause is prompted, and jumps back to agency's note
Album of paintings or calligraphy face.Further, it is also possible to which user is prompted to contact customer service.
The application scenarios that Fig. 4 (a) to Fig. 4 (c) shows the account agency of trademark registration method of this specification one embodiment show
It is intended to.Wherein, the proxied user account for principal's registration can be Alipay account, and enrollment page can be Alipay
Enrollment page in application program, agent can be parents of student, and the principal is that there are monitoring relationships with the parents of student
Student.
As shown in Fig. 4 (a), parent, can be in Alipay after logging in Alipay using the Alipay account of itself
Start enrollment page, then inputs student information (that is, second identity information) in the acquisition of information entrance of enrollment page, student
Information may include student name, identification card number and place school.If parent has logged in Alipay account, and the logon account of parent
In in advance binding have a long message (that is, first identity information), then long message of getting home can be read directly in enrollment page, such as scheme
Shown, family's long message may include the name and identification card number of parent.After getting above- mentioned information, enrollment page can automatically will be upper
It states information and is committed to identity verification system and verified.
As shown in Fig. 4 (b) and 4 (c), after identity verification system back-checking successful information, enrollment page can be jumped
To face acquisition interface, student can upload itself face information by the interface.It, can be by student or parent couple after acquiring successfully
Collected face information is confirmed, can also be again if the defects of collected face information is insufficient there are clarity
Acquire face information.It after confirming to face information, succeeds in registration, Alipay account can be created for student.
Certainly, above-mentioned application scenarios are one kind for example, practical application is without being limited thereto.It, can under another scene
To be old parent's agency of trademark registration account by children.By using the scheme of this specification embodiment, old man, child can be overcome
Equal specific crowds register barrier problem because not having mobile phone, or caused by will not operating, and enable the proxy user with permission
It is enough above-mentioned specific crowd login account, meanwhile, when registration, not only verifies the identity of proxy user, also to proxied
The identity of user and bipartite agent relation are verified, and logon security is improved.
After creating Alipay account, the Alipay account of student can also be bound with student information, to generate
Electronics student card.As shown in Fig. 5 (a), it may include the information such as student name, school, class in electronics student card, can also include
The information (not shown) such as face information, student status number of student, student can log in Alipay account and get electronics student
Card.As shown in Fig. 5 (b), each electronics student card can correspond to a campus code, and campus code can be used for the daily studying and living of student
Middle progress barcode scanning payment borrows books, authentication etc..The Alipay account of student can also bind parent's account, Huo Zheyong
In all kinds of small routines etc. for logging in education department's release.As shown in Fig. 5 (c), electricity can be checked in the Alipay account of student
Sub- student's card information, including name, school, class and student status number etc..In addition, can also carry out the face letter for resurveying student
Breath, or the operation such as student card is deleted from the Alipay account of student.
Various technical characteristics in above embodiments can be arbitrarily combined, as long as there is no punchings for the combination between feature
Prominent or contradiction, but as space is limited, is not described one by one, thus the various technical characteristics in above embodiment it is any into
Row combination also belongs to the range of this disclosure.
As shown in fig. 6, this specification embodiment also provides one kind, described device can include:
Module 602 is obtained, for obtaining the first identity information of proxy user and the second identity information of proxied user;
Sending module 604, for first identity information and the second identity information to be sent to identity verification system, with
It is legal to carry out to the agent relation between first identity information, the second identity information and proxy user and proxied user
Property verification;The identity verification system includes the first identity verification system and the second identity verification system, first identity school
Check system is used to carry out legitimacy verifies, second identity verification system to first identity information and the second identity information
For carrying out legitimacy verifies to the agent relation;
Registration module 606, for receiving identity verification system to first identity information, the second identity information and generation
The verification successful information that reason relationship returns after verifying successfully, and the verification successful information is responded, for the proxied use
Family creates proxied user account.
The specific details of the realization process of the function of modules and effect, which are shown in, in above-mentioned apparatus corresponds to step in the above method
Realization process, details are not described herein.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality
Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit
The module of explanation may or may not be physically separated, and the component shown as module can be or can also be with
It is not physical module, it can it is in one place, or may be distributed on multiple network modules.It can be according to actual
The purpose for needing to select some or all of the modules therein to realize this specification scheme.Those of ordinary skill in the art are not
In the case where making the creative labor, it can understand and implement.
The embodiment of this specification device can be applied on a computing device, such as server or intelligent terminal.Device
Embodiment can succeed software realization, and the mode of can also succeed hardware or software and hardware combining is realized.Taking software implementation as an example,
As the device on a logical meaning, processor of file process will be corresponding in nonvolatile memory where being successfully it
Computer program instructions are read into memory what operation was formed.For hardware view, as shown in fig. 7, being this specification device
A kind of hardware structure diagram of place computer equipment, in addition to processor 702 shown in Fig. 7, memory 704, network interface 706, with
And except nonvolatile memory 708, server or electronic equipment in embodiment where device are set generally according to the computer
Standby actual functional capability can also include other hardware, repeat no more to this.
Correspondingly, this specification embodiment also provides a kind of computer storage medium, is stored with journey in the storage medium
Sequence realizes the method in any of the above-described embodiment when described program is executed by processor.
Correspondingly, this specification embodiment also provides a kind of computer equipment, including memory, processor and is stored in
On reservoir and the computer program that can run on a processor, the processor realize any of the above-described implementation when executing described program
Method in example.
It wherein includes storage medium (the including but not limited to disk of program code that the application, which can be used in one or more,
Memory, CD-ROM, optical memory etc.) on the form of computer program product implemented.Computer-usable storage medium packet
Permanent and non-permanent, removable and non-removable media is included, can be accomplished by any method or technique information storage.Letter
Breath can be computer readable instructions, data structure, the module of program or other data.The example packet of the storage medium of computer
Include but be not limited to: phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM),
Other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory
(EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), digital versatile disc
(DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices or any other non-biography
Defeated medium, can be used for storage can be accessed by a computing device information.
Those skilled in the art will readily occur to the disclosure after considering specification and practicing specification disclosed herein
Other embodiments.The disclosure is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes
Or adaptive change follow the general principles of this disclosure and including the disclosure it is undocumented in the art known in often
Knowledge or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following
Claim point out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.
The foregoing is merely the preferred embodiments of the disclosure, not to limit the disclosure, all essences in the disclosure
Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of disclosure protection.