Embodiment
In order to provide the implementation that improves Business Processing efficient, the embodiment of the present application provides a kind of service implementation method and device, and this technical scheme can be applied to the process of Business Processing, both can be implemented as a kind of method, also can be implemented as a kind of product.Describe below in conjunction with the preferred embodiment of Figure of description to the application, should be appreciated that preferred embodiment described herein only is used for description and interpretation the application, and be not used in restriction the application.And in the situation that do not conflict, embodiment and the feature in embodiment in the application can make up mutually.
Embodiment one
The embodiment of the present application one provides a kind of service implementation method, this service implementation method can be applicable to miscellaneous service, especially in the time of in being applicable to the user identity authenticity is had the business of high requirement, have the shorter Business Processing cycle, Business Processing efficient is high.
The service implementation method that the embodiment of the present application one provides mainly is applicable to the business scenario that user terminal is communicated by letter with the server Internet-based, in order to reach the purpose that improves Business Processing efficient, in advance each member who registers in network is carried out real-name authentication, thereby based on the real-name authentication result, user's service request is processed, avoided the process of authentication face to face.In the embodiment of the present application, the process that the member is carried out real-name authentication is namely set up the process of the corresponding relation of username information and real-name authentication information, Fig. 2 shows the schematic flow sheet of the corresponding relation of setting up username information and real-name authentication information, as shown in Figure 2, this process of setting up the corresponding relation of username information and real-name authentication information mainly comprises the steps:
Step 201, server obtain the user's registration information corresponding with username information.
This step 201 can be carried out after the user completes registration, or after completing registration and sign in to server first, the user carries out, or send service request the user by its user terminal but determine that this user is not through carrying out after real-name authentication, or arrive or satisfied rear execution of event in the time that system arranges, will not enumerate herein.Wherein, username information exists after server has carried out registration the user usually, therefore, before carrying out this step, the user need to register at server, what also namely server obtained in this step is to complete the user's of registration user's registration information corresponding to username information at this server, and this user's registration information generally comprises the information such as user name, password, address name, sex, age.
The information that step 202, the information attribute that extracts from the user's registration information that obtains and set mate.
In this step 202, set in advance the information attribute that need to extract from user's registration information, this information attribute can be used for the user is carried out real-name authentication, and therefore, the information attribute of this setting generally can be set to the information attribute that address name, sex, age etc. can the identifying user identity.Be to be understood that, the object lesson that herein only provides for ease of understanding the embodiment of the present application for the described concrete condition of information attribute of setting, in practical application, according to the difference of the type of service of using, business scenario, the information attribute of this setting can arrange flexibly, for example, according to class of service, the information attribute of this setting can be name and ID card No., can also be name and passport number etc., also the combination of a plurality of information attributes can be set, will not enumerate herein.
Step 203, carry out real-name authentication according to the information of extracting, and with the information by real-name authentication as real-name authentication information, and the corresponding relation of foundation and this username information.
So far, the flow process of setting up the corresponding relation of username information and real-name authentication information finishes.
The embodiment of the present application one has provided following two kinds of preferred implementations for the step 203 that the corresponding flow process of Fig. 2 comprises:
Preferred implementation one
The schematic flow sheet that Fig. 3 shows real-name authentication in above-mentioned steps 203 and sets up corresponding relation as shown in Figure 3, comprises the steps:
Step 301, the information of extracting and the information that is used for unique identification natural person identity are mated.
In this step 301, at first need to be identified for the information of unique identification natural person identity, the information attribute of the information that should be used for unique identification natural person identity during with above-mentioned steps 202 information extraction is corresponding, for example, when the information attribute that extracts is name and ID card No., the information that should be used for unique identification natural person identity is citizen's ID card information, and this citizen's ID card information derives from public security system; When the information attribute that extracts was name and passport number, the information that should be used for unique identification natural person identity was citizen's passport information, and this citizen's passport information derives from passport and handles mechanism.In practical application, because the information attribute that extracts can arrange flexibly, classification and the source of being somebody's turn to do the information that is used for unique identification natural person identity are also different, but this source all should be the authoritative institution that can guarantee the user identity authenticity.By the authenticity of this information that is used for unique identification natural person identity information of input can the authentication of users registration time, reach the purpose of identifying user identity authenticity.
Step 302, will be with the information of the information matches that is used for unique identification natural person identity as real-name authentication information, and set up the corresponding relation of this username information and this real-name authentication information.
In this step 302, set up the corresponding relation of this username information and this real-name authentication information, namely corresponding this username information and this real-name authentication information of preserving, preserving this username information and this real-name authentication information, can set up index file, so that search.
So far, real-name authentication and the flow process of setting up corresponding relation finish.
Preferred implementation two
The schematic flow sheet that Fig. 4 shows real-name authentication in above-mentioned steps 203 and sets up corresponding relation as shown in Figure 4, comprises the steps:
Step 401, the information of extracting and the information that is used for unique identification natural person identity are mated.
The specific implementation principle of this step 401 and the specific implementation principle of above-mentioned steps 301 are basic identical, are not described in detail herein.
Step 402, after the information of determining with the information matches that is used for unique identification natural person identity, the information that will be used for unique identification natural person identity is as real-name authentication information, and the corresponding relation of foundation and this username information.
So far, real-name authentication and the flow process of setting up corresponding relation finish.
Be to be understood that, the real-name authentication that above-mentioned preferred implementation one and preferred implementation two provide and the mode of setting up corresponding relation, only for realizing the preferred implementation of the embodiment of the present application, in practical application, can also adopt other can other modes, for example, after the information of determining with the information matches that is used for unique identification natural person identity, extract set information from the information that is used for unique identification natural person identity, and the corresponding relation of foundation and username information, will not enumerate herein.
In the step 202 that the corresponding flow process of Fig. 2 comprises, if the information of the information attribute that does not extract from the user's registration information that obtains and set coupling, can also further set up by other means the corresponding relation of username information and real-name authentication information, Fig. 5 shows another schematic flow sheet of setting up the corresponding relation of username information and real-name authentication information, as shown in Figure 5, mainly comprise the steps:
Step 501, server send the indication of real-name authentication acquisition of information to user terminal, and this real-name authentication acquisition of information indication comprises the information field for unique identification natural person identity.
In this step 501, server can provide the information field that is used for unique identification natural person identity of a plurality of types to select for the user to the user, wherein, the information type that is used for unique identification natural person identity can be identity card, officer's identity card, passport etc., correspondingly, the information field for unique identification natural person identity can be respective field corresponding to identity card (as name and ID card No.), the respective field (as name and officer's identity card number) that officer's identity card is corresponding, the respective field (as name and passport No.) that passport is corresponding etc.
The user by this user terminal of use that step 502, reception user terminal are submitted to indicates the information for unique identification natural person identity that comprises the information field input according to the real-name authentication acquisition of information.
In this step 502, if server provides the information field that is used for unique identification natural person identity of a plurality of types to select for the user to the user, user terminal need to select the information field of one or more types to fill in, and submits to server.
Step 503, server are set up the corresponding relation of the information that is used for unique identification natural person identity of this username information and reception.
In this step 503, server is set up the corresponding relation of the information that is used for unique identification natural person identity of this username information and reception, namely correspondence is preserved this username information and this real-name authentication information, preserving this username information and this real-name authentication information, can set up index file, so that search.
So far, the flow process of setting up the corresponding relation of username information and real-name authentication information finishes.
The above embodiments of the present application have been described in detail for the process of the corresponding relation of setting up username information and real-name authentication information, set up the corresponding relation of username information and real-name authentication information at server after, this server can be processed follow-up service request based on this corresponding relation.Fig. 6 shows the schematic flow sheet of the business realizing that the embodiment of the present application one provides, and as shown in Figure 6, the implementation procedure of this business mainly comprises the steps:
Step 601, server receive the service request that user terminal sends, and portably use the user of this user terminal in this service request at the username information of server registration.
In this step 601, the user terminal that sends service request is generally the user terminal that has carried out registration and success login at this server, can also carry service identification in this service request, is used to indicate the type of service of asking.
Step 602, from the corresponding relation set of the username information set up in advance and real-name authentication information, search the real-name authentication information corresponding with the username information that carries in this service request.
In this step 602, main according to the username information that carries in service request, search the real-name authentication information corresponding with this username information from the corresponding relation set of setting up in advance.
Step 603, after finding the real-name authentication information corresponding with the username information that carries in this service request, this service request is processed.
In this step 603, find the real-name authentication information corresponding with the username information that carries in this service request, show that namely the user's real-name authentication to using this user terminal passes through, can process the service request of initiating based on this user terminal, particularly, service request is processed the handling process corresponding different according to the difference of class of service, and the application does not relate to the improvement to this business procession, is not described in detail herein.
So far, this business realizing flow process finishes.By this flow process, server is after receiving user's service request, can search the real-name authentication information corresponding with this username information of setting up in advance according to the username information of user's registration, and after finding real-name authentication information, this service request is processed, after confirming that namely user identity corresponding to this username information is true, business is processed.This business realizing mode can be applicable to business that the user identity authenticity is had higher requirements, and need not to authenticate face to face, compared with prior art, has reduced the treatment cycle of business, thereby has improved Business Processing efficient.
The business realizing process that the flow process that Fig. 6 is corresponding provides can be applicable to miscellaneous service, is particularly useful for the business that the user identity authenticity is had relatively high expectations.in practical application, can be for the service implementation said method that the user identity authenticity is had relatively high expectations, for requiring lower business can adopt existing method to the user identity authenticity, namely as long as the user successfully signs in to server, based on this, can preset the business that to carry out real-name authentication, in above-mentioned steps 601, after server receives user's service request, if the business that definite this service request is asked is set to carry out the business of real-name authentication, continue execution in step 602, otherwise directly this service request is processed.
In the above-mentioned service implementation method that the embodiment of the present application one provides, the username information of registering for the user has carried out real-name authentication, thereby has improved the reliability of business realizing.On this basis, the embodiment of the present application one provides a preferred implementation of business realizing, and in this preferred implementation, server is for the different security mechanism of dissimilar business setting, thereby provides different proof procedures for different business.Fig. 7 shows another schematic flow sheet of the business realizing that this embodiment one provides, and as shown in Figure 7, the implementation procedure of this business mainly comprises the steps:
Step 701, server receive the service request that user terminal sends, and portably use the user of this user terminal in this service request at the username information of server registration.
Step 702, from the corresponding relation set of the username information set up in advance and real-name authentication information, search the real-name authentication information corresponding with the username information that carries in this service request.
The specific implementation process of this step 701~step 702 and the specific implementation process of above-mentioned steps 601~step 602 are basic identical, repeat no more herein.
Step 703, after finding the real-name authentication information corresponding with the username information that carries in this service request, determine the security level required corresponding to type of service of asking with this service request.
In this step 703, the security level required general provision corresponding with type of service the level of security that satisfies of service needed corresponding to this type of service, also i.e. service needed corresponding to this type of service verification mode of carrying out, for example, real-name authentication, video authentication, authentication or other authentication modes etc. face to face.
Whether the user of step 704, definite this user terminal of use meets corresponding security level required, if, execution in step 705, if not, execution in step 706.
Step 705, this service request is processed.
Step 706, refuse this service request.
So far, this business realizing flow process finishes.By this flow process, server can for different business, be verified the transmit leg of the service request of transmission according to different level of securitys.
In the step 704 that the corresponding flow process of Fig. 7 comprises, determine whether the user of this user terminal of use meets the security level required of setting, the security level required that main basis is corresponding with the type of service that this service request is asked, Fig. 8 shows the schematic flow sheet whether user who determines this user terminal of use meets the security level required of setting, as shown in Figure 8, this process mainly comprises the steps:
Step 801, according to security level required, determine whether to carry out the user who uses this user terminal additional identities authentication, if execution in step 802, if not, execution in step 805.
In this step 801, determine whether to carry out the user who uses this user terminal the additional identities authentication, namely determine in security level required except real-name authentication, the authentication mode that whether also has other requirements, as whether also needing to carry out video authentication, authentication face to face etc., if necessary, determine to carry out the additional identities authentication to the user who uses this user terminal.
Step 802, according to security level required, the user who uses this user terminal is carried out additional identities authentication.
In this step 802, according to security level required, the user who uses this user terminal is carried out the additional identities authentication, namely according to the authentication mode of stipulating in security level required, this user is carried out corresponding authentication, for example, if the security level required regulation need to be carried out video authentication to the user, further this user is carried out video authentication, if the security level required regulation need to authenticate face to face to the user, further this user is authenticated face to face.
Whether step 803, definite additional identities authentication that the user who uses this user terminal is carried out are passed through, if not, and execution in step 804, if, execution in step 805.
The user of step 804, definite this user terminal of use does not meet security level required.
The user of step 805, definite this user terminal of use meets security level required.
So far, determine whether the user of this user terminal of use meets the flow process end of the security level required of setting.
On the basis of service implementation method corresponding to Fig. 6, the embodiment of the present application one provides another preferred implementation of business realizing, in this preferred implementation, has registered the situation of a plurality of user names for same user business is controlled.Fig. 9 shows another schematic flow sheet of the business realizing that this embodiment one provides, and as shown in Figure 9, the implementation procedure of this business mainly comprises the steps:
Step 901, server receive the service request that user terminal sends, and portably use the user of this user terminal in this service request at the username information of server registration.
Step 902, from the corresponding relation set of the username information set up in advance and real-name authentication information, search the real-name authentication information corresponding with the username information that carries in this service request.
The specific implementation process of this step 901~step 902 and the specific implementation process of above-mentioned steps 601~step 602 are basic identical, repeat no more herein.
Step 903, determine whether the username information that carries in this real-name authentication information of finding and this service request is unique corresponding, if not, execution in step 904, if, execution in step 906.
In this step 903, can be by searching in advance the username information set up and the corresponding relation of real-name authentication information, determine whether this real-name authentication information that finds goes back corresponding other username informations, if not, determine that the username information that carries in this real-name authentication information and this service request is unique corresponding, if determine the also username information the corresponding username information that carries of the real-name authentication information that finds in this service request.
Step 904, determine whether for same business, the service request of carrying the username information except the username information that carries in this service request to be processed, if execution in step 905, if not, execution in step 906.
Step 905, refuse this service request.
Step 906, this service request is processed.
So far, this business realizing flow process finishes.by this flow process, the described username information that server carries in the real-name authentication information of determining to find and service request is unique at once, perhaps, at the real-name authentication information of determining the to find username information the corresponding username information that carries in service request also, and after determining for same business, the service request of carrying the username information except the username information that carries in this service request not to be processed, this service request is processed, thereby can carry out Service control for the situation that a user registers a plurality of user names, avoid repeatedly authorizing same business for same user's different user name.
in the preferred implementation that the embodiment of the present application one provides, for above-mentioned Fig. 6, Fig. 7, business realizing flow process in Fig. 9 is replenished, particularly, in the step 602 that the corresponding flow process of Fig. 6 comprises, in the step 702 that the corresponding flow process of Fig. 7 comprises or in the step 902 that comprises of the corresponding flow process of Fig. 9, if server do not find from the corresponding relation set of the username information set up in advance and real-name authentication information with the service request that receives in real-name authentication information corresponding to the username information that carries, can also further set up the username information that carries in this service request and the corresponding relation of real-name authentication information, particularly, set up the username information that carries in this service request and the corresponding relation of real-name authentication information, can adopt arbitrary implementation procedure of Fig. 2 to Fig. 5 that above-described embodiment provides to realize, repeat no more herein.
The server that relates in above embodiment can be Website server, also can be the server of independent part administration.
The service request that relates in above embodiment can be the service request of initiating for general service, can be also the service request of initiating for the business that the user identity authenticity is had high requirement, can also be the service request of initiating for specific transactions.
The user terminal of the initiating business request that relates in above embodiment generally need to be registered at server.
In above embodiment, the process that relates to data access can be by API (the Application Programming Interface of definition, application programming interface) realize, for example, according to the username information of setting up in advance and the corresponding relation of real-name authentication information, when obtaining whole username information corresponding to certain real-name authentication information, this API can for:
*@param personId Customs Assigned Number
*@return member list
*/
public?List<Member>listMemberByPersonId(String?personId);
/**
For example, when the mode that adds name by identity card authenticates the natural person, when namely user's real-name authentication information is ID card information, this API can for:
*@param name address name
*@param icNumber ID card No.
*/
public?Void?verifyPersonByIcNumberAndName(String?name,String?icNumber);
/**
For example: when obtaining user's real-name authentication information, this API can for:
*@param personId Customs Assigned Number
*@return real-name authentication information
*/
public?Authentication?getAuthenticationByPersonId(String?personId);
/**
Embodiment two
Corresponding with above-described embodiment, the embodiment of the present application two provides a kind of business realizing device, and this business realizing device can be realized the function that above-mentioned server is realized.
Figure 10 shows the schematic flow sheet of the business realizing device that the embodiment of the present application two provides, and as shown in figure 10, comprising:
Receiving element 1001, corresponding relation are set up unit 1002, authentication ' unit 1003 and Service Processing Unit 1004;
Wherein:
Receiving element 1001 is used for receiving the service request that user terminal sends, and portably uses the user of user terminal in service request at the username information of server registration;
Corresponding relation is set up unit 1002, is used for setting up the corresponding relation of username information and real-name authentication information;
Authentication ' unit 1003 is used for setting up the corresponding relation set of setting up unit 1002 from corresponding relation and searches the real-name authentication information corresponding with the username information that carries service request;
Service Processing Unit 1004 is used for after authentication ' unit 1003 finds real-name authentication information corresponding to the username information that carries with service request, service request being processed.
As shown in figure 11, in the preferred implementation that the embodiment of the present application two provides, device shown in Figure 10 can further include:
Level of security authentication unit 1005, be used for before 1004 pairs of service request of Service Processing Unit are processed, security level required corresponding to type of service that definite service request that receives with receiving element 1001 is asked, and the user of definite user's terminal meets security level required.
In the preferred implementation that the embodiment of the present application two provides, the level of security authentication unit 1005 that device shown in Figure 11 comprises, determines whether to carry out the user of user's terminal the additional identities authentication at concrete being used for according to security level required; If according to security level required, the user of user's terminal is carried out the additional identities authentication, and after authentication is passed through, determines that the user of user's terminal meets security level required; If not, the user who determines user's terminal meets security level required.
As shown in figure 12, in the preferred implementation that the embodiment of the present application two provides, device shown in Figure 10 can further include:
Business Processing authentication unit 1006 was used for before 1004 pairs of service request of Service Processing Unit are processed, and determined that the username information that carries in real-name authentication information that authentication ' unit 1003 finds and service request is unique corresponding; Or determine the also username information the corresponding username information that carries of the real-name authentication information that finds except service request in, and definitely for same business, the service request of carrying the username information the username information that carries in service request is not processed.
In the preferred implementation that the embodiment of the present application two provides, the corresponding relation that device shown in Figure 10 comprises is set up unit 1002, also be used for when authentication ' unit 1003 does not find real-name authentication information corresponding to the username information that carries with service request, set up the username information that carries in service request and the corresponding relation of real-name authentication information.
In the preferred implementation that the embodiment of the present application two provides, the corresponding relation that device shown in Figure 10 comprises is set up unit 1002, concrete for obtaining the user's registration information corresponding with username information, the information of the information attribute coupling of extracting from the user's registration information that obtains and setting, carry out real-name authentication according to the information of extracting, with the information by real-name authentication as real-name authentication information, and the corresponding relation of foundation and username information.
In the preferred implementation that the embodiment of the present application two provides, the corresponding relation that device shown in Figure 10 comprises is set up unit 1002, the concrete information that will extract and the information that is used for unique identification natural person identity of being used for is mated, will be with the information of the information matches that is used for unique identification natural person identity as real-name authentication information, and the corresponding relation of foundation and username information; Or, after the information of determining with the information matches that is used for unique identification natural person identity, will be for the information of unique identification natural person identity as real-name authentication information, and the corresponding relation of foundation and username information.
in the preferred implementation that the embodiment of the present application two provides, the corresponding relation that device shown in Figure 10 comprises is set up unit 1002, also be used for after the information of the information attribute coupling of not extracting from the user's registration information that obtains and setting, send the indication of real-name authentication acquisition of information to user terminal, the indication of real-name authentication acquisition of information comprises the information field for unique identification natural person identity, the information that is used for unique identification natural person identity that the user by user's terminal that the reception user terminal is submitted to inputs according to field, and set up the corresponding relation of the information that is used for unique identification natural person identity of username information and reception.
The business realizing device that the application's embodiment provides can be realized by computer program.Those skilled in the art should be understood that; above-mentioned dividing elements mode is only a kind of in the plurality of cells dividing mode; if be divided into other unit or without inner cells, as long as the business realizing device has above-mentioned functions, all should be within the application's protection range.
The functional module of each step in the service implementation method that provides corresponding to above-described embodiment one also is provided the business realizing device that the embodiment of the present application two provides.
The business realizing device that the embodiment of the present application two provides can be arranged in transaction processing system; this device can be arranged in Website server; also can independently dispose; and when this business processing device was positioned at transaction processing system, this business processing device was not limited to the said units dividing mode; can also be other dividing elements modes; though which kind of dividing elements mode, as long as this business realizing device has above-mentioned functions, all should be within the application's protection range.
The embodiment that it will be understood by those skilled in the art that the application can be provided as method, device (equipment) or computer program.Therefore, the application can adopt complete hardware implementation example, implement software example or in conjunction with the form of the embodiment of software and hardware aspect fully.And the application can adopt the form that wherein includes the upper computer program of implementing of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) of computer usable program code one or more.
The application is that reference is described according to flow chart and/or the block diagram of method, device (equipment) and the computer program of the embodiment of the present application.Should understand can be by the flow process in each flow process in computer program instructions realization flow figure and/or block diagram and/or square frame and flow chart and/or block diagram and/or the combination of square frame.Can provide these computer program instructions to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce a machine, make the instruction of carrying out by the processor of computer or other programmable data processing device produce to be used for the device of realizing in the function of flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame appointments.
These computer program instructions also can be stored in energy vectoring computer or the computer-readable memory of other programmable data processing device with ad hoc fashion work, make the instruction that is stored in this computer-readable memory produce the manufacture that comprises command device, this command device is realized the function of appointment in flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame.
These computer program instructions also can be loaded on computer or other programmable data processing device, make on computer or other programmable devices and to carry out the sequence of operations step producing computer implemented processing, thereby be provided for realizing the step of the function of appointment in flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame in the instruction of carrying out on computer or other programmable devices.
Although described the application's preferred embodiment, in a single day those skilled in the art get the basic creative concept of cicada, can make other change and modification to these embodiment.So claims are intended to all changes and the modification that are interpreted as comprising preferred embodiment and fall into the application's scope.Obviously, those skilled in the art can carry out various changes and modification and the spirit and scope that do not break away from the application to the application.Like this, if within these of the application are revised and modification belongs to the scope of the application's claim and equivalent technologies thereof, the application also is intended to comprise these changes and modification interior.