CN103139172A - Service implementation method and device - Google Patents

Service implementation method and device Download PDF

Info

Publication number
CN103139172A
CN103139172A CN2011103915206A CN201110391520A CN103139172A CN 103139172 A CN103139172 A CN 103139172A CN 2011103915206 A CN2011103915206 A CN 2011103915206A CN 201110391520 A CN201110391520 A CN 201110391520A CN 103139172 A CN103139172 A CN 103139172A
Authority
CN
China
Prior art keywords
information
real
name authentication
user
service request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011103915206A
Other languages
Chinese (zh)
Other versions
CN103139172B (en
Inventor
姚志群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201110391520.6A priority Critical patent/CN103139172B/en
Priority to CN201510703848.5A priority patent/CN105376220B/en
Publication of CN103139172A publication Critical patent/CN103139172A/en
Priority to HK13108820.4A priority patent/HK1181582A1/en
Application granted granted Critical
Publication of CN103139172B publication Critical patent/CN103139172B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The invention discloses a service implementation method and a device. The main technical scheme comprises that a server receives a service request which is sent by a user terminal, the service request carries user name information which is registered on the server by a user who uses the user terminal, and after real name authentication information corresponding to the user name information which is carried in the service request is searched from a corresponding relation set of the pre-established user name information and the real name authentication information, the service request is processed. According to the technical scheme, after the server searches the real name authentication information, the service request is processed, namely when a user identity corresponding to the user information is confirmed to be real, the service is processed. The service implementation mode can be suitable for the service which has a high requirement to user identity authenticity, and moreover, face-to-face authentication is of no need. Compared with the prior art, service processing period is shortened, and thereby service processing efficiency is improved.

Description

A kind of service implementation method and device
Technical field
The application relates to network communications technology field, relates in particular to a kind of service implementation method and device.
Background technology
Development along with Internet technology, the class of business that the Internet-based technology realizes is more and more, and at present, the realization of most of business all needs the user to register at corresponding Website server, the realization of this registration process mainly comprises the steps: as shown in Figure 1
Step 101, user send registration request by its user terminal to Website server.
Step 102, Website server provide enrollment page according to the registration request that user terminal sends to this user terminal.
In this step 102, the enrollment page that Website server provides to user terminal generally includes the field that name, sex, age of user name, password and user etc. needs the user to input.
Step 103, user terminal are sent to Website server with the materials for registration that the user submits to by enrollment page.
Step 104, Website server are preserved user's materials for registration.
So far, the user finishes in the flow process of Website server registration.Based on this flow process, the user can set up Member Information by registration at Website server, thus can based on the registration username information and password login after Website server, the corresponding service that uses this Website server to provide.
above-mentioned user is by in the mode of Website login server registration Website login server, the information of inputting when registering due to the user may be deceptive information, therefore, this mode generally is applicable to the user identity authenticity is required lower business, for to the higher business of user identity authenticity requirement, generally after the user logins and asks this business, need the user carry can the unique identification user identity certificate (as identity card, officer's identity card, passport etc.) authenticate face to face to the specified services point, and after authentication is passed through face to face, service request to this user is processed, obviously, this mode is long to the treatment cycle of business, thereby reduced Business Processing efficient.
Summary of the invention
In view of this, the embodiment of the present application provides a kind of service implementation method and device, adopts this technical scheme, can improve Business Processing efficient.
The embodiment of the present application is achieved through the following technical solutions:
An aspect according to the embodiment of the present application provides a kind of service implementation method, comprising:
Server receives the service request that user terminal sends, and portably uses the user of described user terminal in described service request at the username information of described server registration;
Find from the corresponding relation set of the username information set up in advance and real-name authentication information with described service request in after real-name authentication information corresponding to the described username information that carries, described service request is processed.
According to another aspect of the embodiment of the present application, a kind of business realizing device also is provided, comprising:
Receiving element is used for receiving the service request that user terminal sends, and portably uses the user of described user terminal in described service request at the username information of described server registration;
Corresponding relation is set up the unit, is used for setting up the corresponding relation of username information and real-name authentication information;
Authentication ' unit is used for setting up the corresponding relation set of setting up the unit from described corresponding relation and searches the real-name authentication information corresponding with the described username information that carries described service request;
Service Processing Unit is used for after described authentication ' unit finds real-name authentication information corresponding to the described username information that carries with described service request, described service request being processed.
According to another aspect of the embodiment of the present application, a kind of business realizing system also is provided, comprise above-mentioned business realizing device.
Above-mentioned at least one technical scheme that provides by the embodiment of the present application, server receives the service request that user terminal sends, portably use the user of this user terminal in this service request at the username information of server registration, search from the corresponding relation set of the username information set up in advance and real-name authentication information with this service request in real-name authentication information corresponding to the username information that carries, and after finding, this service request is processed.According to this technical scheme, server is after receiving user's service request, can search the real-name authentication information corresponding with this username information of setting up in advance according to the username information of user's registration, and after finding real-name authentication information, this service request is processed, after confirming that namely user identity corresponding to this username information is true, business is processed.This business realizing mode can be applicable to business that the user identity authenticity is had higher requirements, and need not to authenticate face to face, compared with prior art, has reduced the treatment cycle of business, thereby has improved Business Processing efficient.
The application's further feature and advantage will be set forth in the following description, and, partly become apparent from specification, perhaps understand by implementing the application.The application's purpose and other advantages can realize and obtain by specifically noted structure in the specification of writing, claims and accompanying drawing.
Description of drawings
Accompanying drawing is used to provide the further understanding to the application, and consists of the part of specification, is used from explanation the application with the embodiment of the present application one, does not consist of the restriction to the application.In the accompanying drawings:
The schematic flow sheet that the user that Fig. 1 provides for background technology registers at Website server;
The schematic flow sheet of the corresponding relation of setting up username information and real-name authentication information that Fig. 2 provides for the embodiment of the present application one;
A kind of real-name authentication that Fig. 3 provides for the embodiment of the present application one and the schematic flow sheet of setting up corresponding relation;
Another real-name authentication that Fig. 4 provides for the embodiment of the present application one and the schematic flow sheet of setting up corresponding relation;
Fig. 5 provide for the embodiment of the present application one another set up the schematic flow sheet of the corresponding relation of username information and real-name authentication information;
The schematic flow sheet of a kind of business realizing that Fig. 6 provides for the embodiment of the present application one;
Another schematic flow sheet of the business realizing that Fig. 7 provides for the embodiment of the present application one;
Whether the user of definite this user terminal of use that Fig. 8 provides for the embodiment of the present application one meets the schematic flow sheet of the security level required of setting;
Another schematic flow sheet of the business realizing that Fig. 9 provides for the embodiment of the present application one;
The structural representation of the business realizing device that Figure 10 provides for the embodiment of the present application two;
The structural representation of another business realizing device that Figure 11 provides for the embodiment of the present application two;
The structural representation of another business realizing device that Figure 12 provides for the embodiment of the present application two.
Embodiment
In order to provide the implementation that improves Business Processing efficient, the embodiment of the present application provides a kind of service implementation method and device, and this technical scheme can be applied to the process of Business Processing, both can be implemented as a kind of method, also can be implemented as a kind of product.Describe below in conjunction with the preferred embodiment of Figure of description to the application, should be appreciated that preferred embodiment described herein only is used for description and interpretation the application, and be not used in restriction the application.And in the situation that do not conflict, embodiment and the feature in embodiment in the application can make up mutually.
Embodiment one
The embodiment of the present application one provides a kind of service implementation method, this service implementation method can be applicable to miscellaneous service, especially in the time of in being applicable to the user identity authenticity is had the business of high requirement, have the shorter Business Processing cycle, Business Processing efficient is high.
The service implementation method that the embodiment of the present application one provides mainly is applicable to the business scenario that user terminal is communicated by letter with the server Internet-based, in order to reach the purpose that improves Business Processing efficient, in advance each member who registers in network is carried out real-name authentication, thereby based on the real-name authentication result, user's service request is processed, avoided the process of authentication face to face.In the embodiment of the present application, the process that the member is carried out real-name authentication is namely set up the process of the corresponding relation of username information and real-name authentication information, Fig. 2 shows the schematic flow sheet of the corresponding relation of setting up username information and real-name authentication information, as shown in Figure 2, this process of setting up the corresponding relation of username information and real-name authentication information mainly comprises the steps:
Step 201, server obtain the user's registration information corresponding with username information.
This step 201 can be carried out after the user completes registration, or after completing registration and sign in to server first, the user carries out, or send service request the user by its user terminal but determine that this user is not through carrying out after real-name authentication, or arrive or satisfied rear execution of event in the time that system arranges, will not enumerate herein.Wherein, username information exists after server has carried out registration the user usually, therefore, before carrying out this step, the user need to register at server, what also namely server obtained in this step is to complete the user's of registration user's registration information corresponding to username information at this server, and this user's registration information generally comprises the information such as user name, password, address name, sex, age.
The information that step 202, the information attribute that extracts from the user's registration information that obtains and set mate.
In this step 202, set in advance the information attribute that need to extract from user's registration information, this information attribute can be used for the user is carried out real-name authentication, and therefore, the information attribute of this setting generally can be set to the information attribute that address name, sex, age etc. can the identifying user identity.Be to be understood that, the object lesson that herein only provides for ease of understanding the embodiment of the present application for the described concrete condition of information attribute of setting, in practical application, according to the difference of the type of service of using, business scenario, the information attribute of this setting can arrange flexibly, for example, according to class of service, the information attribute of this setting can be name and ID card No., can also be name and passport number etc., also the combination of a plurality of information attributes can be set, will not enumerate herein.
Step 203, carry out real-name authentication according to the information of extracting, and with the information by real-name authentication as real-name authentication information, and the corresponding relation of foundation and this username information.
So far, the flow process of setting up the corresponding relation of username information and real-name authentication information finishes.
The embodiment of the present application one has provided following two kinds of preferred implementations for the step 203 that the corresponding flow process of Fig. 2 comprises:
Preferred implementation one
The schematic flow sheet that Fig. 3 shows real-name authentication in above-mentioned steps 203 and sets up corresponding relation as shown in Figure 3, comprises the steps:
Step 301, the information of extracting and the information that is used for unique identification natural person identity are mated.
In this step 301, at first need to be identified for the information of unique identification natural person identity, the information attribute of the information that should be used for unique identification natural person identity during with above-mentioned steps 202 information extraction is corresponding, for example, when the information attribute that extracts is name and ID card No., the information that should be used for unique identification natural person identity is citizen's ID card information, and this citizen's ID card information derives from public security system; When the information attribute that extracts was name and passport number, the information that should be used for unique identification natural person identity was citizen's passport information, and this citizen's passport information derives from passport and handles mechanism.In practical application, because the information attribute that extracts can arrange flexibly, classification and the source of being somebody's turn to do the information that is used for unique identification natural person identity are also different, but this source all should be the authoritative institution that can guarantee the user identity authenticity.By the authenticity of this information that is used for unique identification natural person identity information of input can the authentication of users registration time, reach the purpose of identifying user identity authenticity.
Step 302, will be with the information of the information matches that is used for unique identification natural person identity as real-name authentication information, and set up the corresponding relation of this username information and this real-name authentication information.
In this step 302, set up the corresponding relation of this username information and this real-name authentication information, namely corresponding this username information and this real-name authentication information of preserving, preserving this username information and this real-name authentication information, can set up index file, so that search.
So far, real-name authentication and the flow process of setting up corresponding relation finish.
Preferred implementation two
The schematic flow sheet that Fig. 4 shows real-name authentication in above-mentioned steps 203 and sets up corresponding relation as shown in Figure 4, comprises the steps:
Step 401, the information of extracting and the information that is used for unique identification natural person identity are mated.
The specific implementation principle of this step 401 and the specific implementation principle of above-mentioned steps 301 are basic identical, are not described in detail herein.
Step 402, after the information of determining with the information matches that is used for unique identification natural person identity, the information that will be used for unique identification natural person identity is as real-name authentication information, and the corresponding relation of foundation and this username information.
So far, real-name authentication and the flow process of setting up corresponding relation finish.
Be to be understood that, the real-name authentication that above-mentioned preferred implementation one and preferred implementation two provide and the mode of setting up corresponding relation, only for realizing the preferred implementation of the embodiment of the present application, in practical application, can also adopt other can other modes, for example, after the information of determining with the information matches that is used for unique identification natural person identity, extract set information from the information that is used for unique identification natural person identity, and the corresponding relation of foundation and username information, will not enumerate herein.
In the step 202 that the corresponding flow process of Fig. 2 comprises, if the information of the information attribute that does not extract from the user's registration information that obtains and set coupling, can also further set up by other means the corresponding relation of username information and real-name authentication information, Fig. 5 shows another schematic flow sheet of setting up the corresponding relation of username information and real-name authentication information, as shown in Figure 5, mainly comprise the steps:
Step 501, server send the indication of real-name authentication acquisition of information to user terminal, and this real-name authentication acquisition of information indication comprises the information field for unique identification natural person identity.
In this step 501, server can provide the information field that is used for unique identification natural person identity of a plurality of types to select for the user to the user, wherein, the information type that is used for unique identification natural person identity can be identity card, officer's identity card, passport etc., correspondingly, the information field for unique identification natural person identity can be respective field corresponding to identity card (as name and ID card No.), the respective field (as name and officer's identity card number) that officer's identity card is corresponding, the respective field (as name and passport No.) that passport is corresponding etc.
The user by this user terminal of use that step 502, reception user terminal are submitted to indicates the information for unique identification natural person identity that comprises the information field input according to the real-name authentication acquisition of information.
In this step 502, if server provides the information field that is used for unique identification natural person identity of a plurality of types to select for the user to the user, user terminal need to select the information field of one or more types to fill in, and submits to server.
Step 503, server are set up the corresponding relation of the information that is used for unique identification natural person identity of this username information and reception.
In this step 503, server is set up the corresponding relation of the information that is used for unique identification natural person identity of this username information and reception, namely correspondence is preserved this username information and this real-name authentication information, preserving this username information and this real-name authentication information, can set up index file, so that search.
So far, the flow process of setting up the corresponding relation of username information and real-name authentication information finishes.
The above embodiments of the present application have been described in detail for the process of the corresponding relation of setting up username information and real-name authentication information, set up the corresponding relation of username information and real-name authentication information at server after, this server can be processed follow-up service request based on this corresponding relation.Fig. 6 shows the schematic flow sheet of the business realizing that the embodiment of the present application one provides, and as shown in Figure 6, the implementation procedure of this business mainly comprises the steps:
Step 601, server receive the service request that user terminal sends, and portably use the user of this user terminal in this service request at the username information of server registration.
In this step 601, the user terminal that sends service request is generally the user terminal that has carried out registration and success login at this server, can also carry service identification in this service request, is used to indicate the type of service of asking.
Step 602, from the corresponding relation set of the username information set up in advance and real-name authentication information, search the real-name authentication information corresponding with the username information that carries in this service request.
In this step 602, main according to the username information that carries in service request, search the real-name authentication information corresponding with this username information from the corresponding relation set of setting up in advance.
Step 603, after finding the real-name authentication information corresponding with the username information that carries in this service request, this service request is processed.
In this step 603, find the real-name authentication information corresponding with the username information that carries in this service request, show that namely the user's real-name authentication to using this user terminal passes through, can process the service request of initiating based on this user terminal, particularly, service request is processed the handling process corresponding different according to the difference of class of service, and the application does not relate to the improvement to this business procession, is not described in detail herein.
So far, this business realizing flow process finishes.By this flow process, server is after receiving user's service request, can search the real-name authentication information corresponding with this username information of setting up in advance according to the username information of user's registration, and after finding real-name authentication information, this service request is processed, after confirming that namely user identity corresponding to this username information is true, business is processed.This business realizing mode can be applicable to business that the user identity authenticity is had higher requirements, and need not to authenticate face to face, compared with prior art, has reduced the treatment cycle of business, thereby has improved Business Processing efficient.
The business realizing process that the flow process that Fig. 6 is corresponding provides can be applicable to miscellaneous service, is particularly useful for the business that the user identity authenticity is had relatively high expectations.in practical application, can be for the service implementation said method that the user identity authenticity is had relatively high expectations, for requiring lower business can adopt existing method to the user identity authenticity, namely as long as the user successfully signs in to server, based on this, can preset the business that to carry out real-name authentication, in above-mentioned steps 601, after server receives user's service request, if the business that definite this service request is asked is set to carry out the business of real-name authentication, continue execution in step 602, otherwise directly this service request is processed.
In the above-mentioned service implementation method that the embodiment of the present application one provides, the username information of registering for the user has carried out real-name authentication, thereby has improved the reliability of business realizing.On this basis, the embodiment of the present application one provides a preferred implementation of business realizing, and in this preferred implementation, server is for the different security mechanism of dissimilar business setting, thereby provides different proof procedures for different business.Fig. 7 shows another schematic flow sheet of the business realizing that this embodiment one provides, and as shown in Figure 7, the implementation procedure of this business mainly comprises the steps:
Step 701, server receive the service request that user terminal sends, and portably use the user of this user terminal in this service request at the username information of server registration.
Step 702, from the corresponding relation set of the username information set up in advance and real-name authentication information, search the real-name authentication information corresponding with the username information that carries in this service request.
The specific implementation process of this step 701~step 702 and the specific implementation process of above-mentioned steps 601~step 602 are basic identical, repeat no more herein.
Step 703, after finding the real-name authentication information corresponding with the username information that carries in this service request, determine the security level required corresponding to type of service of asking with this service request.
In this step 703, the security level required general provision corresponding with type of service the level of security that satisfies of service needed corresponding to this type of service, also i.e. service needed corresponding to this type of service verification mode of carrying out, for example, real-name authentication, video authentication, authentication or other authentication modes etc. face to face.
Whether the user of step 704, definite this user terminal of use meets corresponding security level required, if, execution in step 705, if not, execution in step 706.
Step 705, this service request is processed.
Step 706, refuse this service request.
So far, this business realizing flow process finishes.By this flow process, server can for different business, be verified the transmit leg of the service request of transmission according to different level of securitys.
In the step 704 that the corresponding flow process of Fig. 7 comprises, determine whether the user of this user terminal of use meets the security level required of setting, the security level required that main basis is corresponding with the type of service that this service request is asked, Fig. 8 shows the schematic flow sheet whether user who determines this user terminal of use meets the security level required of setting, as shown in Figure 8, this process mainly comprises the steps:
Step 801, according to security level required, determine whether to carry out the user who uses this user terminal additional identities authentication, if execution in step 802, if not, execution in step 805.
In this step 801, determine whether to carry out the user who uses this user terminal the additional identities authentication, namely determine in security level required except real-name authentication, the authentication mode that whether also has other requirements, as whether also needing to carry out video authentication, authentication face to face etc., if necessary, determine to carry out the additional identities authentication to the user who uses this user terminal.
Step 802, according to security level required, the user who uses this user terminal is carried out additional identities authentication.
In this step 802, according to security level required, the user who uses this user terminal is carried out the additional identities authentication, namely according to the authentication mode of stipulating in security level required, this user is carried out corresponding authentication, for example, if the security level required regulation need to be carried out video authentication to the user, further this user is carried out video authentication, if the security level required regulation need to authenticate face to face to the user, further this user is authenticated face to face.
Whether step 803, definite additional identities authentication that the user who uses this user terminal is carried out are passed through, if not, and execution in step 804, if, execution in step 805.
The user of step 804, definite this user terminal of use does not meet security level required.
The user of step 805, definite this user terminal of use meets security level required.
So far, determine whether the user of this user terminal of use meets the flow process end of the security level required of setting.
On the basis of service implementation method corresponding to Fig. 6, the embodiment of the present application one provides another preferred implementation of business realizing, in this preferred implementation, has registered the situation of a plurality of user names for same user business is controlled.Fig. 9 shows another schematic flow sheet of the business realizing that this embodiment one provides, and as shown in Figure 9, the implementation procedure of this business mainly comprises the steps:
Step 901, server receive the service request that user terminal sends, and portably use the user of this user terminal in this service request at the username information of server registration.
Step 902, from the corresponding relation set of the username information set up in advance and real-name authentication information, search the real-name authentication information corresponding with the username information that carries in this service request.
The specific implementation process of this step 901~step 902 and the specific implementation process of above-mentioned steps 601~step 602 are basic identical, repeat no more herein.
Step 903, determine whether the username information that carries in this real-name authentication information of finding and this service request is unique corresponding, if not, execution in step 904, if, execution in step 906.
In this step 903, can be by searching in advance the username information set up and the corresponding relation of real-name authentication information, determine whether this real-name authentication information that finds goes back corresponding other username informations, if not, determine that the username information that carries in this real-name authentication information and this service request is unique corresponding, if determine the also username information the corresponding username information that carries of the real-name authentication information that finds in this service request.
Step 904, determine whether for same business, the service request of carrying the username information except the username information that carries in this service request to be processed, if execution in step 905, if not, execution in step 906.
Step 905, refuse this service request.
Step 906, this service request is processed.
So far, this business realizing flow process finishes.by this flow process, the described username information that server carries in the real-name authentication information of determining to find and service request is unique at once, perhaps, at the real-name authentication information of determining the to find username information the corresponding username information that carries in service request also, and after determining for same business, the service request of carrying the username information except the username information that carries in this service request not to be processed, this service request is processed, thereby can carry out Service control for the situation that a user registers a plurality of user names, avoid repeatedly authorizing same business for same user's different user name.
in the preferred implementation that the embodiment of the present application one provides, for above-mentioned Fig. 6, Fig. 7, business realizing flow process in Fig. 9 is replenished, particularly, in the step 602 that the corresponding flow process of Fig. 6 comprises, in the step 702 that the corresponding flow process of Fig. 7 comprises or in the step 902 that comprises of the corresponding flow process of Fig. 9, if server do not find from the corresponding relation set of the username information set up in advance and real-name authentication information with the service request that receives in real-name authentication information corresponding to the username information that carries, can also further set up the username information that carries in this service request and the corresponding relation of real-name authentication information, particularly, set up the username information that carries in this service request and the corresponding relation of real-name authentication information, can adopt arbitrary implementation procedure of Fig. 2 to Fig. 5 that above-described embodiment provides to realize, repeat no more herein.
The server that relates in above embodiment can be Website server, also can be the server of independent part administration.
The service request that relates in above embodiment can be the service request of initiating for general service, can be also the service request of initiating for the business that the user identity authenticity is had high requirement, can also be the service request of initiating for specific transactions.
The user terminal of the initiating business request that relates in above embodiment generally need to be registered at server.
In above embodiment, the process that relates to data access can be by API (the Application Programming Interface of definition, application programming interface) realize, for example, according to the username information of setting up in advance and the corresponding relation of real-name authentication information, when obtaining whole username information corresponding to certain real-name authentication information, this API can for:
*@param personId Customs Assigned Number
*@return member list
*/
public?List<Member>listMemberByPersonId(String?personId);
/**
For example, when the mode that adds name by identity card authenticates the natural person, when namely user's real-name authentication information is ID card information, this API can for:
*@param name address name
*@param icNumber ID card No.
*/
public?Void?verifyPersonByIcNumberAndName(String?name,String?icNumber);
/**
For example: when obtaining user's real-name authentication information, this API can for:
*@param personId Customs Assigned Number
*@return real-name authentication information
*/
public?Authentication?getAuthenticationByPersonId(String?personId);
/**
Embodiment two
Corresponding with above-described embodiment, the embodiment of the present application two provides a kind of business realizing device, and this business realizing device can be realized the function that above-mentioned server is realized.
Figure 10 shows the schematic flow sheet of the business realizing device that the embodiment of the present application two provides, and as shown in figure 10, comprising:
Receiving element 1001, corresponding relation are set up unit 1002, authentication ' unit 1003 and Service Processing Unit 1004;
Wherein:
Receiving element 1001 is used for receiving the service request that user terminal sends, and portably uses the user of user terminal in service request at the username information of server registration;
Corresponding relation is set up unit 1002, is used for setting up the corresponding relation of username information and real-name authentication information;
Authentication ' unit 1003 is used for setting up the corresponding relation set of setting up unit 1002 from corresponding relation and searches the real-name authentication information corresponding with the username information that carries service request;
Service Processing Unit 1004 is used for after authentication ' unit 1003 finds real-name authentication information corresponding to the username information that carries with service request, service request being processed.
As shown in figure 11, in the preferred implementation that the embodiment of the present application two provides, device shown in Figure 10 can further include:
Level of security authentication unit 1005, be used for before 1004 pairs of service request of Service Processing Unit are processed, security level required corresponding to type of service that definite service request that receives with receiving element 1001 is asked, and the user of definite user's terminal meets security level required.
In the preferred implementation that the embodiment of the present application two provides, the level of security authentication unit 1005 that device shown in Figure 11 comprises, determines whether to carry out the user of user's terminal the additional identities authentication at concrete being used for according to security level required; If according to security level required, the user of user's terminal is carried out the additional identities authentication, and after authentication is passed through, determines that the user of user's terminal meets security level required; If not, the user who determines user's terminal meets security level required.
As shown in figure 12, in the preferred implementation that the embodiment of the present application two provides, device shown in Figure 10 can further include:
Business Processing authentication unit 1006 was used for before 1004 pairs of service request of Service Processing Unit are processed, and determined that the username information that carries in real-name authentication information that authentication ' unit 1003 finds and service request is unique corresponding; Or determine the also username information the corresponding username information that carries of the real-name authentication information that finds except service request in, and definitely for same business, the service request of carrying the username information the username information that carries in service request is not processed.
In the preferred implementation that the embodiment of the present application two provides, the corresponding relation that device shown in Figure 10 comprises is set up unit 1002, also be used for when authentication ' unit 1003 does not find real-name authentication information corresponding to the username information that carries with service request, set up the username information that carries in service request and the corresponding relation of real-name authentication information.
In the preferred implementation that the embodiment of the present application two provides, the corresponding relation that device shown in Figure 10 comprises is set up unit 1002, concrete for obtaining the user's registration information corresponding with username information, the information of the information attribute coupling of extracting from the user's registration information that obtains and setting, carry out real-name authentication according to the information of extracting, with the information by real-name authentication as real-name authentication information, and the corresponding relation of foundation and username information.
In the preferred implementation that the embodiment of the present application two provides, the corresponding relation that device shown in Figure 10 comprises is set up unit 1002, the concrete information that will extract and the information that is used for unique identification natural person identity of being used for is mated, will be with the information of the information matches that is used for unique identification natural person identity as real-name authentication information, and the corresponding relation of foundation and username information; Or, after the information of determining with the information matches that is used for unique identification natural person identity, will be for the information of unique identification natural person identity as real-name authentication information, and the corresponding relation of foundation and username information.
in the preferred implementation that the embodiment of the present application two provides, the corresponding relation that device shown in Figure 10 comprises is set up unit 1002, also be used for after the information of the information attribute coupling of not extracting from the user's registration information that obtains and setting, send the indication of real-name authentication acquisition of information to user terminal, the indication of real-name authentication acquisition of information comprises the information field for unique identification natural person identity, the information that is used for unique identification natural person identity that the user by user's terminal that the reception user terminal is submitted to inputs according to field, and set up the corresponding relation of the information that is used for unique identification natural person identity of username information and reception.
The business realizing device that the application's embodiment provides can be realized by computer program.Those skilled in the art should be understood that; above-mentioned dividing elements mode is only a kind of in the plurality of cells dividing mode; if be divided into other unit or without inner cells, as long as the business realizing device has above-mentioned functions, all should be within the application's protection range.
The functional module of each step in the service implementation method that provides corresponding to above-described embodiment one also is provided the business realizing device that the embodiment of the present application two provides.
The business realizing device that the embodiment of the present application two provides can be arranged in transaction processing system; this device can be arranged in Website server; also can independently dispose; and when this business processing device was positioned at transaction processing system, this business processing device was not limited to the said units dividing mode; can also be other dividing elements modes; though which kind of dividing elements mode, as long as this business realizing device has above-mentioned functions, all should be within the application's protection range.
The embodiment that it will be understood by those skilled in the art that the application can be provided as method, device (equipment) or computer program.Therefore, the application can adopt complete hardware implementation example, implement software example or in conjunction with the form of the embodiment of software and hardware aspect fully.And the application can adopt the form that wherein includes the upper computer program of implementing of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) of computer usable program code one or more.
The application is that reference is described according to flow chart and/or the block diagram of method, device (equipment) and the computer program of the embodiment of the present application.Should understand can be by the flow process in each flow process in computer program instructions realization flow figure and/or block diagram and/or square frame and flow chart and/or block diagram and/or the combination of square frame.Can provide these computer program instructions to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce a machine, make the instruction of carrying out by the processor of computer or other programmable data processing device produce to be used for the device of realizing in the function of flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame appointments.
These computer program instructions also can be stored in energy vectoring computer or the computer-readable memory of other programmable data processing device with ad hoc fashion work, make the instruction that is stored in this computer-readable memory produce the manufacture that comprises command device, this command device is realized the function of appointment in flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame.
These computer program instructions also can be loaded on computer or other programmable data processing device, make on computer or other programmable devices and to carry out the sequence of operations step producing computer implemented processing, thereby be provided for realizing the step of the function of appointment in flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame in the instruction of carrying out on computer or other programmable devices.
Although described the application's preferred embodiment, in a single day those skilled in the art get the basic creative concept of cicada, can make other change and modification to these embodiment.So claims are intended to all changes and the modification that are interpreted as comprising preferred embodiment and fall into the application's scope.Obviously, those skilled in the art can carry out various changes and modification and the spirit and scope that do not break away from the application to the application.Like this, if within these of the application are revised and modification belongs to the scope of the application's claim and equivalent technologies thereof, the application also is intended to comprise these changes and modification interior.

Claims (10)

1. a service implementation method, is characterized in that, comprising:
Server receives the service request that user terminal sends, and portably uses the user of described user terminal in described service request at the username information of described server registration;
Find from the corresponding relation set of the username information set up in advance and real-name authentication information with described service request in after real-name authentication information corresponding to the described username information that carries, described service request is processed.
2. the method for claim 1, is characterized in that, before described service request is processed, also comprises:
Determine according to described security level required, to determine whether the security level required corresponding to type of service of asking with described service request to carry out the user who uses described user terminal additional identities and to authenticate;
If according to described security level required, the user who uses described user terminal is carried out the additional identities authentication, and after authentication is passed through, determines to use the user of described user terminal to meet described security level required;
If not, determine to use the user of described user terminal to meet described security level required.
3. the method for claim 1, is characterized in that, before described service request is processed, also comprises:
Determine that the described username information that carries in the described real-name authentication information that finds and described service request is unique corresponding; Or
Determine the also username information the corresponding described username information that carries of the described real-name authentication information that finds except described service request in, and the username information outside definite described username information is not for same service initiation request.
4. the method for claim 1, it is characterized in that, if do not find from the corresponding relation set of the username information set up in advance and real-name authentication information with described service request in real-name authentication information corresponding to the described username information that carries, also comprise:
Set up the described username information that carries in described service request and the corresponding relation of real-name authentication information.
5. method as described in claim 1 or 4, is characterized in that, sets up the corresponding relation of username information and real-name authentication information, comprising:
Obtain the user's registration information corresponding with described username information;
The information of the information attribute coupling of extracting from the described user's registration information that obtains and setting;
Carry out real-name authentication according to the described information of extracting, with the information by real-name authentication as real-name authentication information, and the corresponding relation of foundation and described username information.
6. method as claimed in claim 5, is characterized in that, carries out real-name authentication according to the described information of extracting, and with the information by real-name authentication as real-name authentication information, and the corresponding relation of foundation and described username information comprises:
The described information of extracting and the information that is used for unique identification natural person identity are mated;
Will be with the information of the information matches that is used for unique identification natural person identity as real-name authentication information, and the corresponding relation of foundation and described username information; Or, after the information of determining with the information matches that is used for unique identification natural person identity, with described information for unique identification natural person identity as real-name authentication information, and the corresponding relation of foundation and described username information.
7. method as claimed in claim 5, is characterized in that, if do not extract the information of mating with the information attribute of setting from the described user's registration information that obtains, also comprises:
Send the indication of real-name authentication acquisition of information to described user terminal, described real-name authentication acquisition of information indication comprises the information field for unique identification natural person identity;
Receive that described user terminal submits to by the information that is used for unique identification natural person identity of the user who uses described user terminal according to described field input;
The corresponding relation of the described information for unique identification natural person identity of setting up described username information and reception.
8. a business realizing device, is characterized in that, comprising:
Receiving element is used for receiving the service request that user terminal sends, and portably uses the user of described user terminal in described service request at the username information of described server registration;
Corresponding relation is set up the unit, is used for setting up the corresponding relation of username information and real-name authentication information;
Authentication ' unit is used for setting up the corresponding relation set of setting up the unit from described corresponding relation and searches the real-name authentication information corresponding with the described username information that carries described service request;
Service Processing Unit is used for after described authentication ' unit finds real-name authentication information corresponding to the described username information that carries with described service request, described service request being processed.
9. device as claimed in claim 8, it is characterized in that, described corresponding relation is set up the unit, concrete for obtaining the user's registration information corresponding with described username information, the information of the information attribute coupling of extracting from the described user's registration information that obtains and setting, carry out real-name authentication according to the described information of extracting, with the information by real-name authentication as real-name authentication information, and the corresponding relation of foundation and described username information.
10. device as claimed in claim 9, it is characterized in that, described corresponding relation is set up the unit, also be used for after the information of the information attribute coupling of not extracting from the described user's registration information that obtains and setting, send the indication of real-name authentication acquisition of information to described user terminal, described real-name authentication acquisition of information indication comprises the information field for unique identification natural person identity, receive that described user terminal submits to by the information that is used for unique identification natural person identity of the user who uses described user terminal according to described field input, and the corresponding relation of the described information for unique identification natural person identity of setting up described username information and reception.
CN201110391520.6A 2011-11-30 2011-11-30 A kind of service implementation method and device Active CN103139172B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201110391520.6A CN103139172B (en) 2011-11-30 2011-11-30 A kind of service implementation method and device
CN201510703848.5A CN105376220B (en) 2011-11-30 2011-11-30 A kind of service implementation method, system and server
HK13108820.4A HK1181582A1 (en) 2011-11-30 2013-07-29 Method and device for implementing service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110391520.6A CN103139172B (en) 2011-11-30 2011-11-30 A kind of service implementation method and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201510703848.5A Division CN105376220B (en) 2011-11-30 2011-11-30 A kind of service implementation method, system and server

Publications (2)

Publication Number Publication Date
CN103139172A true CN103139172A (en) 2013-06-05
CN103139172B CN103139172B (en) 2016-01-13

Family

ID=48498482

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201510703848.5A Active CN105376220B (en) 2011-11-30 2011-11-30 A kind of service implementation method, system and server
CN201110391520.6A Active CN103139172B (en) 2011-11-30 2011-11-30 A kind of service implementation method and device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201510703848.5A Active CN105376220B (en) 2011-11-30 2011-11-30 A kind of service implementation method, system and server

Country Status (2)

Country Link
CN (2) CN105376220B (en)
HK (1) HK1181582A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103561029A (en) * 2013-11-10 2014-02-05 章玺 Intelligent express item box system for real-name system
CN104735067A (en) * 2015-03-24 2015-06-24 高艳芳 O2O real name registration admittance system and method
CN105100029A (en) * 2014-05-22 2015-11-25 阿里巴巴集团控股有限公司 Method and device for user identity verification
CN105991592A (en) * 2015-02-15 2016-10-05 阿里巴巴集团控股有限公司 Same-natural-person identity maintenance method and apparatus, and server
CN107231357A (en) * 2017-06-02 2017-10-03 山东浪潮云服务信息科技有限公司 A kind of Hierarchical Identity authentication model for internet+government affairs service
CN107870979A (en) * 2017-09-30 2018-04-03 平安科技(深圳)有限公司 Electronic installation, extract tables of data data method and storage medium
CN109347860A (en) * 2016-01-13 2019-02-15 阿里巴巴集团控股有限公司 The real name identification method and device of account
CN110035002A (en) * 2019-04-01 2019-07-19 深圳前海达闼云端智能科技有限公司 Method for implementing instant messaging, terminal equipment and storage medium
CN110505198A (en) * 2019-07-05 2019-11-26 中国平安财产保险股份有限公司 A kind of checking request method, apparatus, computer equipment and storage medium
CN111340503A (en) * 2020-02-28 2020-06-26 深圳市元征科技股份有限公司 Transaction method, device, equipment and storage medium
CN112004228A (en) * 2019-05-27 2020-11-27 中国电信股份有限公司 Real person authentication method and system
CN112312383A (en) * 2019-07-30 2021-02-02 中国移动通信集团江西有限公司 Service processing method and device for home user, storage medium and server

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109328348B (en) * 2016-09-30 2023-03-03 华为技术有限公司 Service authentication method, system and related equipment
CN111259349A (en) * 2020-01-09 2020-06-09 中移(杭州)信息技术有限公司 Identity authentication method, server and computer readable storage medium
CN112132122B (en) * 2020-11-26 2021-03-16 飞天诚信科技股份有限公司 Fingerprint card and implementation method thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101122985A (en) * 2006-08-09 2008-02-13 阿里巴巴公司 Method and system for identity authentication
CN101131760A (en) * 2006-08-25 2008-02-27 阿里巴巴公司 Method and system for checking account security
CN101242276A (en) * 2008-03-10 2008-08-13 陈勇 A method for solving Internet honesty issue
CN101426009A (en) * 2007-10-31 2009-05-06 中国移动通信集团公司 Identity management platform, service server, uniform login system and method
WO2011068738A2 (en) * 2009-11-25 2011-06-09 Orsini Rick L Systems and methods for securing data in motion

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100438681C (en) * 2004-06-04 2008-11-26 上海环达计算机科技有限公司 Identification method and system for mobile equipment
CN1750462A (en) * 2004-09-14 2006-03-22 华为技术有限公司 Method for realizing identity identification by mobile terminal
CN1893355B (en) * 2005-07-05 2012-10-10 淘宝控股有限公司 Method and system for identifying identity of network user end
CN1967584A (en) * 2005-11-18 2007-05-23 吴超竑 Auditing method for personal consumption credit
CN1988552B (en) * 2005-12-20 2010-11-10 中国电信股份有限公司 Method for automatic identifying and configuring terminal
CN100589383C (en) * 2005-12-23 2010-02-10 华为技术有限公司 Method, apparatus and system for verifying internet user identity
CN1794284B (en) * 2005-12-26 2010-09-15 上海洲信信息技术有限公司 Method and system of realizing single account multiuser of electron mail box
CN1929376A (en) * 2006-08-03 2007-03-14 张勇军 Method for establishing universal identity authentication system and user's information storage
CN101222348B (en) * 2007-01-10 2011-05-11 阿里巴巴集团控股有限公司 Method and system for calculating number of website real user
CN101291217A (en) * 2007-04-20 2008-10-22 章灵军 Network identity authentication method
CN101383706A (en) * 2007-09-06 2009-03-11 上海智客网络科技有限公司 Method and device for arbitrarily publishing and auditing on network
CN101136750A (en) * 2007-10-15 2008-03-05 胡祥义 Network real-name system implementing method
CN101420416B (en) * 2007-10-22 2013-03-13 中国移动通信集团公司 Identity management platform, service server, login system and method, and federation method
CN101256700A (en) * 2008-03-31 2008-09-03 浙江大学城市学院 ATM of mixed type user identification authentication
CN101599832B (en) * 2008-06-05 2011-06-15 北京思创银联科技股份有限公司 Method and system of authenticating personal identity for logging in a network system
CN101425903A (en) * 2008-07-16 2009-05-06 冯振周 Trusted network architecture based on identity
US8307412B2 (en) * 2008-10-20 2012-11-06 Microsoft Corporation User authentication management
US9247008B2 (en) * 2010-03-18 2016-01-26 Microsoft Corporation Unified web service discovery
TW201227556A (en) * 2010-12-24 2012-07-01 Chunghwa Telecom Co Ltd Electronic transaction system and payment method using telecommunication phone number as account number
CN102045367B (en) * 2011-01-10 2014-04-23 软库创投(北京)科技有限公司 Registration method and authentication server of real-name authentication
CN102186173B (en) * 2011-04-26 2013-08-07 广州市动景计算机科技有限公司 Identity authentication method and system
CN102215227A (en) * 2011-05-30 2011-10-12 中国联合网络通信集团有限公司 Method and system for authenticating electronic commerce identity of mobile communication network
CN102204211A (en) * 2011-05-30 2011-09-28 华为技术有限公司 Real-name account-opening method based on self-help terminal and terminal thereof
CN102254272A (en) * 2011-06-12 2011-11-23 辜进荣 Network interaction platform capable of performing classification according to user characteristics

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101122985A (en) * 2006-08-09 2008-02-13 阿里巴巴公司 Method and system for identity authentication
CN101131760A (en) * 2006-08-25 2008-02-27 阿里巴巴公司 Method and system for checking account security
CN101426009A (en) * 2007-10-31 2009-05-06 中国移动通信集团公司 Identity management platform, service server, uniform login system and method
CN101242276A (en) * 2008-03-10 2008-08-13 陈勇 A method for solving Internet honesty issue
WO2011068738A2 (en) * 2009-11-25 2011-06-09 Orsini Rick L Systems and methods for securing data in motion

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103561029A (en) * 2013-11-10 2014-02-05 章玺 Intelligent express item box system for real-name system
CN105100029A (en) * 2014-05-22 2015-11-25 阿里巴巴集团控股有限公司 Method and device for user identity verification
CN105100029B (en) * 2014-05-22 2018-10-30 阿里巴巴集团控股有限公司 The method and apparatus that authentication is carried out to user
CN109257366A (en) * 2014-05-22 2019-01-22 阿里巴巴集团控股有限公司 The method and apparatus that authentication is carried out to user
CN105991592B (en) * 2015-02-15 2019-05-31 阿里巴巴集团控股有限公司 With person part maintaining method, device and server
CN105991592A (en) * 2015-02-15 2016-10-05 阿里巴巴集团控股有限公司 Same-natural-person identity maintenance method and apparatus, and server
CN104735067A (en) * 2015-03-24 2015-06-24 高艳芳 O2O real name registration admittance system and method
CN104735067B (en) * 2015-03-24 2018-07-24 高艳芳 O2O real names register access system and method
CN109347860B (en) * 2016-01-13 2021-08-24 创新先进技术有限公司 Real-name authentication method and device for account
CN109347860A (en) * 2016-01-13 2019-02-15 阿里巴巴集团控股有限公司 The real name identification method and device of account
CN107231357A (en) * 2017-06-02 2017-10-03 山东浪潮云服务信息科技有限公司 A kind of Hierarchical Identity authentication model for internet+government affairs service
CN107870979A (en) * 2017-09-30 2018-04-03 平安科技(深圳)有限公司 Electronic installation, extract tables of data data method and storage medium
CN110035002A (en) * 2019-04-01 2019-07-19 深圳前海达闼云端智能科技有限公司 Method for implementing instant messaging, terminal equipment and storage medium
CN112004228A (en) * 2019-05-27 2020-11-27 中国电信股份有限公司 Real person authentication method and system
CN112004228B (en) * 2019-05-27 2023-06-02 中国电信股份有限公司 Real person authentication method and system
CN110505198A (en) * 2019-07-05 2019-11-26 中国平安财产保险股份有限公司 A kind of checking request method, apparatus, computer equipment and storage medium
CN112312383A (en) * 2019-07-30 2021-02-02 中国移动通信集团江西有限公司 Service processing method and device for home user, storage medium and server
CN112312383B (en) * 2019-07-30 2022-07-01 中国移动通信集团江西有限公司 Service processing method and device for home user, storage medium and server
CN111340503A (en) * 2020-02-28 2020-06-26 深圳市元征科技股份有限公司 Transaction method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN105376220A (en) 2016-03-02
CN105376220B (en) 2019-09-17
HK1181582A1 (en) 2013-11-08
CN103139172B (en) 2016-01-13

Similar Documents

Publication Publication Date Title
CN103139172A (en) Service implementation method and device
US20220058655A1 (en) Authentication system
KR102220087B1 (en) Method, apparatus, and system for processing two-dimensional barcodes
US10776786B2 (en) Method for creating, registering, revoking authentication information and server using the same
AU2020200705A1 (en) Methods and systems for identity creation, verification and management
CN110768967B (en) Service authorization method, device, equipment, system and storage medium
US20160065552A1 (en) Method and system for interoperable identity and interoperable credentials
CN108701309A (en) A kind of distributed user profile authentication system for security of e-commerce transactions
CN109314635A (en) Resource management based on block chain
CN116599677A (en) Compact recording protocol
TWI778296B (en) Information processing method, device, electronic device, and computer-readable storage medium
JP2012533127A (en) How to read attributes from ID token
US10069831B2 (en) Using third party information to improve predictive strength for authentications
US20110145146A1 (en) Off-Line Account Recharging
US20170302460A1 (en) Method for creating, registering, revoking authentication information and server using the same
CN108650289B (en) Method and device for managing data based on block chain
US20230222484A1 (en) Method for binding card, terminal device, authentication server and storage medium
US20190081794A1 (en) Systems and methods for user identity
CN109413203A (en) A kind of transaction data acquisition methods and device
US20200349566A1 (en) Device control method and related device
JP2017102842A (en) Personal identification system, personal identification information output system, authentication server, personal identification method, personal identification information output method, and program
KR101748615B1 (en) Mobile simple payment support device based on the connection information and operating method thereof
JP2012208855A (en) Identity confirmation system and identity confirmation method
CN104735067A (en) O2O real name registration admittance system and method
US20220358503A1 (en) Systems and methods for providing in-person status to a user device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1181582

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1181582

Country of ref document: HK

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20191211

Address after: P.O. Box 31119, grand exhibition hall, hibiscus street, 802 West Bay Road, Grand Cayman, Cayman Islands

Patentee after: Innovative advanced technology Co., Ltd

Address before: Cayman Islands Grand Cayman capital building, a four storey No. 847 mailbox

Patentee before: Alibaba Group Holding Co., Ltd.