CN103139172B - A kind of service implementation method and device - Google Patents

A kind of service implementation method and device Download PDF

Info

Publication number
CN103139172B
CN103139172B CN201110391520.6A CN201110391520A CN103139172B CN 103139172 B CN103139172 B CN 103139172B CN 201110391520 A CN201110391520 A CN 201110391520A CN 103139172 B CN103139172 B CN 103139172B
Authority
CN
China
Prior art keywords
information
real
name authentication
service request
username
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110391520.6A
Other languages
Chinese (zh)
Other versions
CN103139172A (en
Inventor
姚志群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510703848.5A priority Critical patent/CN105376220B/en
Priority to CN201110391520.6A priority patent/CN103139172B/en
Publication of CN103139172A publication Critical patent/CN103139172A/en
Priority to HK13108820.4A priority patent/HK1181582A1/en
Application granted granted Critical
Publication of CN103139172B publication Critical patent/CN103139172B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses a kind of service implementation method and device, main technical schemes comprises: the service request that server receives user terminal sends, and portably uses the username information of user at server registration of user terminal in service request; From the username information set up in advance with find the real-name authentication information corresponding with the username information that carries in service request in the correspondence set of real-name authentication information after, service request is processed.According to this technical scheme, server processes this service request after finding real-name authentication information, after namely confirming that user identity that this username information is corresponding is true, processes business.This business realizing mode can be applicable to the business had higher requirements to user identity authenticity, and without the need to carrying out person authentication, compared with prior art, decreasing the treatment cycle of business, thus improve Business Processing efficiency.

Description

A kind of service implementation method and device
Technical field
The application relates to network communication technology field, particularly relates to a kind of service implementation method and device.
Background technology
Along with the development of Internet technology, the class of business realized based on Internet technology gets more and more, and at present, the realization of most of business all needs user to register at corresponding Website server, the realization of this registration process as shown in Figure 1, mainly comprises the steps:
Step 101, user send registration request by its user terminal to Website server.
The registration request that step 102, Website server send according to user terminal, provides enrollment page to this user terminal.
In this step 102, Website server is to the field that the enrollment page that user terminal provides generally includes user name, the name, sex, age etc. of password and user need user to input.
The materials for registration that user is submitted to by enrollment page is sent to Website server by step 103, user terminal.
Step 104, Website server preserve the materials for registration of user.
So far, the flow process that user registers at Website server terminates.Based on this flow process, user can set up Member Information at Website server by registration, thus can based on registration username information and password login to Website server after, use the corresponding service that this Website server provides.
Above-mentioned user is by the mode of Website login server registration Website login server, the information inputted when registering due to user may as deceptive information, therefore, this mode is generally applicable to require lower business to user identity authenticity, higher business is required for user identity authenticity, it is general after user logs in and asks this business, need user carry can the certificate of unique identification user identity (as identity card, officer's identity card, passport etc.) carry out person authentication to specified services point, and after person authentication passes through, the service request of this user is processed, obviously, the treatment cycle of this mode to business is long, thus reduce Business Processing efficiency.
Summary of the invention
In view of this, the embodiment of the present application provides a kind of service implementation method and device, adopts this technical scheme, can improve Business Processing efficiency.
The embodiment of the present application is achieved through the following technical solutions:
According to an aspect of the embodiment of the present application, provide a kind of service implementation method, comprising:
The service request that server receives user terminal sends, portably uses the username information of user at described server registration of described user terminal in described service request;
From the username information set up in advance with find the real-name authentication information corresponding with the described username information that carries in described service request in the correspondence set of real-name authentication information after, described service request is processed.
According to another aspect of the embodiment of the present application, additionally provide a kind of business realizing device, comprising:
Receiving element, for receiving the service request that user terminal sends, portably uses the username information of user at described server registration of described user terminal in described service request;
Corresponding relation sets up unit, for setting up the corresponding relation of username information and real-name authentication information;
Authentication ' unit, for set up from described corresponding relation unit set up correspondence set in search the real-name authentication information corresponding with the described username information carried in described service request;
Service Processing Unit, after finding the real-name authentication information corresponding with the described username information carried in described service request in described authentication ' unit, processes described service request.
According to another aspect of the embodiment of the present application, additionally provide a kind of business realizing system, comprise above-mentioned business realizing device.
By at least one technical scheme above-mentioned that the embodiment of the present application provides, the service request that server receives user terminal sends, the username information of user at server registration of this user terminal is portably used in this service request, from the username information set up in advance with search the real-name authentication information corresponding with the username information that carries in this service request the correspondence set of real-name authentication information, and after finding, this service request is processed.According to this technical scheme, server is after receiving the service request of user, the real-name authentication information corresponding with this username information set up in advance can be searched according to the username information of user's registration, and after finding real-name authentication information, this service request is processed, namely, after confirming that user identity that this username information is corresponding is true, business is processed.This business realizing mode can be applicable to the business had higher requirements to user identity authenticity, and without the need to carrying out person authentication, compared with prior art, decreasing the treatment cycle of business, thus improve Business Processing efficiency.
The further feature of the application and advantage will be set forth in the following description, and, partly become apparent from specification, or understand by implementing the application.The object of the application and other advantages realize by structure specifically noted in write specification, claims and accompanying drawing and obtain.
Accompanying drawing explanation
Accompanying drawing is used to provide further understanding of the present application, and forms a part for specification, is used from explanation the application with the embodiment of the present application one, does not form the restriction to the application.In the accompanying drawings:
The schematic flow sheet that the user that Fig. 1 provides for background technology registers at Website server;
The schematic flow sheet setting up the corresponding relation of username information and real-name authentication information that Fig. 2 provides for the embodiment of the present application one;
A kind of real-name authentication that Fig. 3 provides for the embodiment of the present application one and the schematic flow sheet setting up corresponding relation;
Another real-name authentication that Fig. 4 provides for the embodiment of the present application one and the schematic flow sheet setting up corresponding relation;
Fig. 5 provide for the embodiment of the present application one another set up the schematic flow sheet of the corresponding relation of username information and real-name authentication information;
The schematic flow sheet of a kind of business realizing that Fig. 6 provides for the embodiment of the present application one;
Another schematic flow sheet of the business realizing that Fig. 7 provides for the embodiment of the present application one;
Fig. 8 uses the user of this user terminal whether to meet the schematic flow sheet of the security level required of setting for the determination that the embodiment of the present application one provides;
Another schematic flow sheet of the business realizing that Fig. 9 provides for the embodiment of the present application one;
The structural representation of the business realizing device that Figure 10 provides for the embodiment of the present application two;
The structural representation of another business realizing device that Figure 11 provides for the embodiment of the present application two;
The structural representation of another business realizing device that Figure 12 provides for the embodiment of the present application two.
Embodiment
In order to provide the implementation improving Business Processing efficiency, the embodiment of the present application provides a kind of service implementation method and device, and this technical scheme can be applied to the process of Business Processing, both can be implemented as a kind of method, also can be implemented as a kind of product.Be described below in conjunction with the preferred embodiment of Figure of description to the application, should be appreciated that preferred embodiment described herein is only for instruction and explanation of the application, and be not used in restriction the application.And when not conflicting, the embodiment in the application and the feature in embodiment can combine mutually.
Embodiment one
The embodiment of the present application one provides a kind of service implementation method, this service implementation method can be applicable to miscellaneous service, especially, when being applicable to have in the business of high requirement user identity authenticity, have the shorter Business Processing cycle, Business Processing efficiency is high.
The service implementation method that the embodiment of the present application one provides mainly is applicable to user terminal and the server business scenario based on internet communication, in order to reach the object improving Business Processing efficiency, in advance real-name authentication is carried out to each member registered in network, thus process based on the service request of real-name authentication result to user, avoid the process of person authentication.In the embodiment of the present application, namely the process of carrying out real-name authentication to member sets up the process of the corresponding relation of username information and real-name authentication information, Fig. 2 shows the schematic flow sheet of the corresponding relation setting up username information and real-name authentication information, as shown in Figure 2, this process setting up the corresponding relation of username information and real-name authentication information mainly comprises the steps:
Step 201, server obtain the user's registration information corresponding with username information.
This step 201 can perform after user completes registration, or perform after user completes registration and signs in server first, or send service request but determine to perform after this user is without real-name authentication user by its user terminal, or perform after the time of Operation system setting arrives or event meets, will not enumerate herein.Wherein, username information exists after server has carried out registering user usually, therefore, before this step of execution, user needs to register at server, what also namely server obtained in this step is complete user's registration information corresponding to the username information of the user of registration at this server, and this user's registration information generally comprises the information such as user name, password, address name, sex, age.
Step 202, the information that extraction is mated with the information attribute of setting from the user's registration information obtained.
In this step 202, pre-set the information attribute needing to extract from user's registration information, this information attribute can be used for carrying out real-name authentication to user, and therefore, the information attribute of this setting generally can be set to address name, sex, age etc. can the information attribute of identifying user identity.Be to be understood that, herein for the object lesson that the concrete condition described by the information attribute set only provides for ease of understanding the embodiment of the present application, in practical application, according to the difference of used type of service, business scenario, the information attribute of this setting can be arranged flexibly, such as, according to class of service, the information attribute of this setting can be name and ID card No., can also be name and passport number etc., the combination of multiple information attribute also can be set, will not enumerate herein.
Step 203, carry out real-name authentication according to the information extracted, and by the information of real-name authentication as real-name authentication information, and the corresponding relation with this username information will be set up.
So far, the flow process setting up the corresponding relation of username information and real-name authentication information terminates.
The step 203 that the embodiment of the present application one comprises for the corresponding flow process of Fig. 2 gives the following two kinds preferred implementation:
Preferred implementation one
Fig. 3 shows real-name authentication in above-mentioned steps 203 and sets up the schematic flow sheet of corresponding relation, as shown in Figure 3, comprises the steps:
Step 301, the information of extraction to be mated with the information being used for unique identification natural person identity.
In this step 301, first the information determining unique identification natural person identity is needed, this information being used for unique identification natural person identity is corresponding with the information attribute in above-mentioned steps 202 during information extraction, such as, extract information attribute be name and ID card No. time, this information being used for unique identification natural person identity is the ID card information of citizen, and the ID card information of this citizen derives from public security system; Extract information attribute be name and passport number time, this information being used for unique identification natural person identity is the passport information of citizen, and the passport information of this citizen derives from passport and handles mechanism.In practical application, because the information attribute extracted can be arranged flexibly, this is used for the classification of the information of unique identification natural person identity and originates also different, but this source all should be the authoritative institution that can ensure user identity authenticity.By this information for unique identification natural person identity can authentication of users registration time input the authenticity of information, reach the object of identifying user identity authenticity.
Step 302, using be used for the information of information matches of unique identification natural person identity as real-name authentication information, and set up the corresponding relation of this username information and this real-name authentication information.
In this step 302, set up the corresponding relation of this username information and this real-name authentication information, namely corresponding this username information of preservation and this real-name authentication information, in this username information of preservation and this real-name authentication information, can set up index file, so that search.
So far, real-name authentication and the flow process of setting up corresponding relation terminate.
Preferred implementation two
Fig. 4 shows real-name authentication in above-mentioned steps 203 and sets up the schematic flow sheet of corresponding relation, as shown in Figure 4, comprises the steps:
Step 401, the information of extraction to be mated with the information being used for unique identification natural person identity.
The specific implementation principle of this step 401 is substantially identical with the specific implementation principle of above-mentioned steps 301, is not described in detail herein.
Step 402, determine with the information of the information matches for unique identification natural person identity after, will the information of unique identification natural person identity be used for as real-name authentication information, and set up and the corresponding relation of this username information.
So far, real-name authentication and the flow process of setting up corresponding relation terminate.
Be to be understood that, the real-name authentication that above-mentioned preferred implementation one and preferred implementation two provide and the mode setting up corresponding relation, be only the preferred implementation realizing the embodiment of the present application, in practical application, can also adopt other can other modes, such as, determine with the information of the information matches for unique identification natural person identity after, set information is extracted from the information for unique identification natural person identity, and set up the corresponding relation with username information, will not enumerate herein.
In the step 202 that the corresponding flow process of Fig. 2 comprises, if do not extract the information of mating with the information attribute set from the user's registration information obtained, the corresponding relation of username information and real-name authentication information can also be set up further by other modes, Fig. 5 shows the schematic flow sheet that another sets up the corresponding relation of username information and real-name authentication information, as shown in Figure 5, mainly comprise the steps:
Step 501, server send the instruction of real-name authentication acquisition of information to user terminal, and this real-name authentication acquisition of information indicates the information field comprised for unique identification natural person identity.
In this step 501, server can provide the information field for unique identification natural person identity of multiple type to select for user to user, wherein, information type for unique identification natural person identity can be identity card, officer's identity card, passport etc., correspondingly, for the information field of unique identification natural person identity can be respective field (as name and ID card No.) that identity card is corresponding, officer's identity card is corresponding respective field (as name and officer's identity card number), respective field (as name and passport No.) etc. that passport is corresponding.
What step 502, reception user terminal were submitted to indicates by the user of this user terminal of use the information for unique identification natural person identity comprising information field and input according to real-name authentication acquisition of information.
In this step 502, if server provides the information field for unique identification natural person identity of multiple type to select for user to user, then user terminal needs the information field selecting one or more types to fill in, and submits to server.
Step 503, server set up the corresponding relation of the information for unique identification natural person identity of this username information and reception.
In this step 503, server sets up the corresponding relation of the information for unique identification natural person identity of this username information and reception, i.e. corresponding this username information of preservation and this real-name authentication information, in this username information of preservation and this real-name authentication information, index file can be set up, so that search.
So far, the flow process setting up the corresponding relation of username information and real-name authentication information terminates.
The above embodiments of the present application have been described in detail for the process of the corresponding relation setting up username information and real-name authentication information, set up the corresponding relation of username information and real-name authentication information at server after, this server can process follow-up service request based on this corresponding relation.Fig. 6 shows the schematic flow sheet of the business realizing that the embodiment of the present application one provides, and as shown in Figure 6, the implementation procedure of this business mainly comprises the steps:
The service request that step 601, server receives user terminal send, portably uses the username information of user at server registration of this user terminal in this service request.
In this step 601, the user terminal sending service request is generally the user terminal having carried out registration and Successful login at this server, can also carry service identification, be used to indicate asked type of service in this service request.
Step 602, from the correspondence set of the username information set up in advance and real-name authentication information, search the real-name authentication information corresponding with the username information carried in this service request.
In this step 602, mainly according to the username information carried in service request, from the correspondence set set up in advance, search the real-name authentication information corresponding with this username information.
Step 603, after the real-name authentication information that the username information found with carry in this service request is corresponding, this service request to be processed.
In this step 603, find the real-name authentication information corresponding with the username information carried in this service request, namely show using user's real-name authentication of this user terminal to pass through, the service request initiated based on this user terminal can be processed, particularly, process the handling process corresponding different according to the difference of class of service to service request, the application does not relate to the improvement to this business procession, is not described in detail herein.
So far, this business realizing flow process terminates.By this flow process, server is after receiving the service request of user, the real-name authentication information corresponding with this username information set up in advance can be searched according to the username information of user's registration, and after finding real-name authentication information, this service request is processed, namely, after confirming that user identity that this username information is corresponding is true, business is processed.This business realizing mode can be applicable to the business had higher requirements to user identity authenticity, and without the need to carrying out person authentication, compared with prior art, decreasing the treatment cycle of business, thus improve Business Processing efficiency.
The business realizing process that the flow process that Fig. 6 is corresponding provides, can be applicable to miscellaneous service, is particularly useful for requiring higher business to user identity authenticity.In practical application, higher service implementation said method can be required for user identity authenticity, require that lower business can adopt existing method for user identity authenticity, as long as namely user is successfully logged onto server, based on this, the business needing to carry out real-name authentication can be preset, in above-mentioned steps 601, after server receives the service request of user, if determine that business that this service request is asked is set to the business needing to carry out real-name authentication, then continue to perform step 602, otherwise directly this service request is processed.
In the above-mentioned service implementation method that the embodiment of the present application one provides, the username information for user's registration has carried out real-name authentication, thus improves the reliability of business realizing.On this basis, the embodiment of the present application one provides a preferred implementation of business realizing, and in this preferred implementation, server for the different security mechanism of dissimilar business setting, thus provides different proof procedures for different business.Fig. 7 shows another schematic flow sheet of the business realizing that this embodiment one provides, and as shown in Figure 7, the implementation procedure of this business mainly comprises the steps:
The service request that step 701, server receives user terminal send, portably uses the username information of user at server registration of this user terminal in this service request.
Step 702, from the correspondence set of the username information set up in advance and real-name authentication information, search the real-name authentication information corresponding with the username information carried in this service request.
The specific implementation process of this step 701 ~ step 702 is substantially identical with the specific implementation process of above-mentioned steps 601 ~ step 602, repeats no more herein.
Step 703, after the real-name authentication information that the username information found with carry in this service request is corresponding, determine the security level required that the type of service of asking with this service request is corresponding.
In this step 703, the level of security that service needed corresponding to this type of service of the security level required general provision corresponding with type of service meets, also the verification mode that the service needed that namely this type of service is corresponding is carried out, such as, real-name authentication, video authentication, person authentication or other authentication modes etc.
Step 704, determine to use the user of this user terminal whether to meet corresponding security level required, if so, perform step 705, if not, perform step 706.
Step 705, this service request to be processed.
Step 706, refuse this service request.
So far, this business realizing flow process terminates.By this flow process, server for different business, can be verified according to the transmit leg of different level of securitys to the service request sent.
In the step 704 that the corresponding flow process of Fig. 7 comprises, determine to use the user of this user terminal whether to meet the security level required of setting, the security level required that main basis is corresponding with the type of service that this service request is asked, Fig. 8 shows the schematic flow sheet determining to use the user of this user terminal whether to meet the security level required of setting, as shown in Figure 8, this process mainly comprises the steps:
Step 801, according to security level required, determining whether to need, to using the user of this user terminal to carry out additional identities certification, if so, then to perform step 802, if not, then performing step 805.
In this step 801, determine whether to need using the user of this user terminal to carry out additional identities certification, namely to determine in security level required except real-name authentication, whether also have other authentication modes required, as whether also needed to carry out video authentication, person authentication etc., if needed, then determine to need using the user of this user terminal to carry out additional identities certification.
Step 802, carry out additional identities certification according to security level required to using the user of this user terminal.
In this step 802, additional identities certification is carried out to using the user of this user terminal according to security level required, namely according to the authentication mode specified in security level required, corresponding certification is carried out to this user, such as, if security level required regulation needs to carry out video authentication to user, then further video authentication is carried out to this user, if security level required regulation needs to carry out person authentication to user, then further person authentication is carried out to this user.
Step 803, determining whether the additional identities certification to using the user of this user terminal to carry out is passed through, if not, performing step 804, if so, performing step 805.
Step 804, determine that the user using this user terminal does not meet security level required.
Step 805, determine that the user using this user terminal meets security level required.
So far, determine that the flow process using the user of this user terminal whether to meet the security level required of setting terminates.
On the basis of service implementation method corresponding to Fig. 6, the embodiment of the present application one provides another preferred implementation of business realizing, and in this preferred implementation, the situation that have registered multiple user name for same user controls business.Fig. 9 shows another schematic flow sheet of the business realizing that this embodiment one provides, and as shown in Figure 9, the implementation procedure of this business mainly comprises the steps:
The service request that step 901, server receives user terminal send, portably uses the username information of user at server registration of this user terminal in this service request.
Step 902, from the correspondence set of the username information set up in advance and real-name authentication information, search the real-name authentication information corresponding with the username information carried in this service request.
The specific implementation process of this step 901 ~ step 902 is substantially identical with the specific implementation process of above-mentioned steps 601 ~ step 602, repeats no more herein.
Step 903, determine that this real-name authentication information found and the username information carried in this service request be whether unique corresponding, if not, perform step 904, if so, execution step 906.
In this step 903, can by searching the corresponding relation of username information and the real-name authentication information set up in advance, determine this real-name authentication information whether also other username informations corresponding found, if not, then determine that this real-name authentication information is uniquely corresponding with the username information carried in this service request, if so, the real-name authentication information also corresponding username information except the username information carried in this service request found then is determined.
Step 904, determine whether to process for the service request of same business to the username information carried except the username information carried in this service request, if so, then perform step 905, if not, perform step 906.
Step 905, refuse this service request.
Step 906, this service request to be processed.
So far, this business realizing flow process terminates.By this flow process, server the real-name authentication information determining to find and the described username information carried in service request uniquely to the time in of corresponding or, at the real-name authentication information determining to find also corresponding username information except the username information carried in service request, and after determining not process for the service request of same business to the username information carried except the username information carried in this service request, this service request is processed, thus the situation can registering multiple user name for a user carries out Service control, the different user name for same user is avoided repeatedly to authorize same business.
In the preferred implementation that the embodiment of the present application one provides, for above-mentioned Fig. 6, Fig. 7, business realizing flow process in Fig. 9 is supplemented, particularly, in the step 602 that the corresponding flow process of Fig. 6 comprises, in the step 702 that the corresponding flow process of Fig. 7 comprises or in the step 902 that comprises of the corresponding flow process of Fig. 9, if server from the username information set up in advance with do not find the real-name authentication information corresponding with the username information that carries in the service request received the correspondence set of real-name authentication information, the corresponding relation of username information and the real-name authentication information of carrying in this service request can also be set up further, particularly, set up the corresponding relation of username information and the real-name authentication information of carrying in this service request, arbitrary implementation procedure of the Fig. 2 to Fig. 5 that above-described embodiment can be adopted to provide realizes, repeat no more herein.
The server related in above embodiment can be Website server, also can be the server of independent part administration.
The service request related in above embodiment can be the service request initiated for general service, also can be the service request initiated for business user identity authenticity to high requirement, can also be the service request initiated for specific transactions.
The user terminal of the initiating business request related in above embodiment, general needs registers at server.
In above embodiment, the process relating to data access can by the API (ApplicationProgrammingInterface of definition, application programming interface) realize, such as, according to the corresponding relation of the username information set up in advance and real-name authentication information, when obtaining whole username information corresponding to certain real-name authentication information, this API can be:
* parampersonId Customs Assigned Number
* return member's list
*/
publicList<Member>listMemberByPersonId(StringpersonId);
/**
Such as, when being added the mode certification natural person of name by identity card, when namely the real-name authentication information of user is ID card information, this API can be:
* paramname address name
* paramicNumber ID card No.
*/
publicVoidverifyPersonByIcNumberAndName(Stringname,StringicNumber);
/**
Such as: when obtaining the real-name authentication information of user, this API can be:
* parampersonId Customs Assigned Number
* return real-name authentication information
*/
publicAuthenticationgetAuthenticationByPersonId(StringpersonId);
/**
Embodiment two
Corresponding with above-described embodiment, the embodiment of the present application two provides a kind of business realizing device, and this business realizing device can realize the function that above-mentioned server realizes.
Figure 10 shows the schematic flow sheet of the business realizing device that the embodiment of the present application two provides, and as shown in Figure 10, comprising:
Receiving element 1001, corresponding relation set up unit 1002, authentication ' unit 1003 and Service Processing Unit 1004;
Wherein:
Receiving element 1001, for receiving the service request that user terminal sends, portably uses the username information of user at server registration of user terminal in service request;
Corresponding relation sets up unit 1002, for setting up the corresponding relation of username information and real-name authentication information;
Authentication ' unit 1003, for set up from corresponding relation unit 1002 set up correspondence set in search the real-name authentication information corresponding with the username information carried in service request;
Service Processing Unit 1004, after finding the real-name authentication information corresponding with the username information carried in service request in authentication ' unit 1003, processes service request.
As shown in figure 11, in the preferred implementation that the embodiment of the present application two provides, Figure 10 shown device can further include:
Level of security authentication unit 1005, before processing in Service Processing Unit 1004 pairs of service request, determine the security level required corresponding with the type of service that the service request that receiving element 1001 receives is asked, and determine to use the user of user terminal to meet security level required.
In the preferred implementation that the embodiment of the present application two provides, the level of security authentication unit 1005 that Figure 11 shown device comprises, specifically for according to security level required, determines whether to need using the user of user terminal to carry out additional identities certification; If so, then carry out additional identities certification according to security level required to using the user of user terminal, and after certification is passed through, determine to use the user of user terminal to meet security level required; If not, determine to use the user of user terminal to meet security level required.
As shown in figure 12, in the preferred implementation that the embodiment of the present application two provides, Figure 10 shown device can further include:
Business Processing authentication unit 1006, before processing in Service Processing Unit 1004 pairs of service request, determines that the real-name authentication information that authentication ' unit 1003 finds is uniquely corresponding with the username information carried in service request; Or determine the real-name authentication information that finds also corresponding username information except the username information carried in service request, and determine not process for the service request of same business to the username information carried except the username information carried in service request.
In the preferred implementation that the embodiment of the present application two provides, the corresponding relation that Figure 10 shown device comprises sets up unit 1002, time also for not finding the real-name authentication information corresponding with the username information carried in service request in authentication ' unit 1003, set up the corresponding relation of username information and the real-name authentication information of carrying in service request.
In the preferred implementation that the embodiment of the present application two provides, the corresponding relation that Figure 10 shown device comprises sets up unit 1002, specifically for obtaining the user's registration information corresponding with username information, the information of mating with the information attribute of setting is extracted from the user's registration information obtained, information according to extracting carries out real-name authentication, using the information by real-name authentication as real-name authentication information, and set up the corresponding relation with username information.
In the preferred implementation that the embodiment of the present application two provides, the corresponding relation that Figure 10 shown device comprises sets up unit 1002, specifically for the information of extraction is mated with the information being used for unique identification natural person identity, using be used for the information of information matches of unique identification natural person identity as real-name authentication information, and set up the corresponding relation with username information; Or, determine with the information of the information matches for unique identification natural person identity after, will the information of unique identification natural person identity be used for as real-name authentication information, and set up and the corresponding relation of username information.
In the preferred implementation that the embodiment of the present application two provides, the corresponding relation that Figure 10 shown device comprises sets up unit 1002, also for after do not extract the information of mating with the information attribute set from the user's registration information obtained, the instruction of real-name authentication acquisition of information is sent to user terminal, real-name authentication acquisition of information indicates the information field comprised for unique identification natural person identity, receive the information for unique identification natural person identity inputted according to field by the user of use user terminal that user terminal is submitted to, and set up the corresponding relation of the information for unique identification natural person identity of username information and reception.
The business realizing device that the embodiment of the application provides realizes by computer program.Those skilled in the art should be understood that; above-mentioned dividing elements mode is only the one in plurality of cells dividing mode; if be divided into other unit or without inner cells, as long as business realizing device has above-mentioned functions, all should within the protection range of the application.
The business realizing device that the embodiment of the present application two provides also has the functional module of each step in the service implementation method provided corresponding to above-described embodiment one.
The business realizing device that the embodiment of the present application two provides can be arranged in transaction processing system; this device can be arranged in Website server; also can independently dispose; further, when this business processing device is positioned at transaction processing system, this business processing device is not limited to said units dividing mode; can also be other dividing elements modes; no matter which kind of dividing elements mode, as long as this business realizing device has above-mentioned functions, all should within the protection range of the application.
It will be understood by those skilled in the art that the embodiment of the application can be provided as method, device (equipment) or computer program.Therefore, the application can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the application can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) of computer usable program code.
The application describes with reference to according to the flow chart of the method for the embodiment of the present application, device (equipment) and computer program and/or block diagram.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block diagram and/or square frame and flow chart and/or block diagram and/or square frame.These computer program instructions can being provided to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computer or other programmable data processing device produce device for realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, make on computer or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computer or other programmable devices is provided for the step realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
Although described the preferred embodiment of the application, those skilled in the art once obtain the basic creative concept of cicada, then can make other change and amendment to these embodiments.So claims are intended to be interpreted as comprising preferred embodiment and falling into all changes and the amendment of the application's scope.Obviously, those skilled in the art can carry out various change and modification to the application and not depart from the spirit and scope of the application.Like this, if these amendments of the application and modification belong within the scope of the application's claim and equivalent technologies thereof, then the application is also intended to comprise these change and modification.

Claims (7)

1. a service implementation method, is characterized in that, comprising:
The service request that server receives user terminal sends, portably uses the username information of user at described server registration of described user terminal in described service request;
From the username information set up in advance with find the real-name authentication information corresponding with the described username information that carries in described service request in the correspondence set of real-name authentication information after, described service request is processed;
Set up the corresponding relation of username information and real-name authentication information, comprising:
Obtain the user's registration information corresponding with described username information;
The information of mating with the information attribute of setting is extracted from the described user's registration information obtained;
Described information according to extracting carries out real-name authentication, using the information by real-name authentication as real-name authentication information, and sets up the corresponding relation with described username information;
Before described service request is processed, also comprise:
Determine that the described real-name authentication information found is uniquely corresponding with the described username information carried in described service request; Or
Determine the described real-name authentication information that finds also corresponding username information except the described username information carried in described service request, and determine that username information outside described username information is not for same service initiation request.
2. the method for claim 1, is characterized in that, before processing described service request, also comprises:
Determining the security level required corresponding with the type of service that described service request is asked, according to described security level required, determining whether to need using the user of described user terminal to carry out additional identities certification;
Need using the user of described user terminal to carry out additional identities certification if determine, then carry out additional identities certification according to described security level required to using the user of described user terminal, and after certification is passed through, determine to use the user of described user terminal to meet described security level required;
Do not need if determine to using the user of described user terminal to carry out additional identities certification, then to determine to use the user of described user terminal to meet described security level required.
3. the method for claim 1, it is characterized in that, if from the username information set up in advance with do not find the real-name authentication information corresponding with the described username information that carries in described service request the correspondence set of real-name authentication information, also comprise:
Set up the corresponding relation of described username information and the real-name authentication information of carrying in described service request.
4. the method for claim 1, is characterized in that, the described information according to extracting carries out real-name authentication, and using the information by real-name authentication as real-name authentication information, and set up the corresponding relation with described username information, comprising:
The described information extracted is mated with the information being used for unique identification natural person identity;
Using be used for the information of information matches of unique identification natural person identity as real-name authentication information, and set up the corresponding relation with described username information; Or, determine with the information of the information matches for unique identification natural person identity after, using the described information being used for unique identification natural person identity as real-name authentication information, and set up the corresponding relation with described username information.
5. the method for claim 1, is characterized in that, if do not extract the information of mating with the information attribute set from the described user's registration information obtained, also comprises:
Send the instruction of real-name authentication acquisition of information to described user terminal, described real-name authentication acquisition of information indicates the information field comprised for unique identification natural person identity;
Receive the information for unique identification natural person identity inputted according to described field by the user of the described user terminal of use that described user terminal is submitted to;
Set up the corresponding relation of the described information for unique identification natural person identity of described username information and reception.
6. a business realizing device, is characterized in that, comprising:
Receiving element, for receiving the service request that user terminal sends, portably uses the username information of user at server registration of described user terminal in described service request;
Corresponding relation sets up unit, for setting up the corresponding relation of username information and real-name authentication information;
Authentication ' unit, for set up from described corresponding relation unit set up correspondence set in search the real-name authentication information corresponding with the described username information carried in described service request;
Service Processing Unit, after finding the real-name authentication information corresponding with the described username information carried in described service request in described authentication ' unit, processes described service request;
Described corresponding relation sets up unit, specifically for obtaining the user's registration information corresponding with described username information, the information of mating with the information attribute of setting is extracted from the described user's registration information obtained, described information according to extracting carries out real-name authentication, using the information by real-name authentication as real-name authentication information, and set up the corresponding relation with described username information;
Business Processing authentication unit, before processing service request at Service Processing Unit, determines that the real-name authentication information that authentication ' unit finds is uniquely corresponding with the username information carried in service request; Or determine the real-name authentication information that finds also corresponding username information except the username information carried in service request, and determine not process for the service request of same business to the username information carried except the username information carried in service request.
7. device as claimed in claim 6, it is characterized in that, described corresponding relation sets up unit, also for after do not extract the information of mating with the information attribute set from the described user's registration information obtained, the instruction of real-name authentication acquisition of information is sent to described user terminal, described real-name authentication acquisition of information indicates the information field comprised for unique identification natural person identity, receive the information for unique identification natural person identity inputted according to described field by the user of the described user terminal of use that described user terminal is submitted to, and set up the corresponding relation of the described information for unique identification natural person identity of described username information and reception.
CN201110391520.6A 2011-11-30 2011-11-30 A kind of service implementation method and device Active CN103139172B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201510703848.5A CN105376220B (en) 2011-11-30 2011-11-30 A kind of service implementation method, system and server
CN201110391520.6A CN103139172B (en) 2011-11-30 2011-11-30 A kind of service implementation method and device
HK13108820.4A HK1181582A1 (en) 2011-11-30 2013-07-29 Method and device for implementing service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110391520.6A CN103139172B (en) 2011-11-30 2011-11-30 A kind of service implementation method and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201510703848.5A Division CN105376220B (en) 2011-11-30 2011-11-30 A kind of service implementation method, system and server

Publications (2)

Publication Number Publication Date
CN103139172A CN103139172A (en) 2013-06-05
CN103139172B true CN103139172B (en) 2016-01-13

Family

ID=48498482

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201110391520.6A Active CN103139172B (en) 2011-11-30 2011-11-30 A kind of service implementation method and device
CN201510703848.5A Active CN105376220B (en) 2011-11-30 2011-11-30 A kind of service implementation method, system and server

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201510703848.5A Active CN105376220B (en) 2011-11-30 2011-11-30 A kind of service implementation method, system and server

Country Status (2)

Country Link
CN (2) CN103139172B (en)
HK (1) HK1181582A1 (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103561029A (en) * 2013-11-10 2014-02-05 章玺 Intelligent express item box system for real-name system
CN105100029B (en) * 2014-05-22 2018-10-30 阿里巴巴集团控股有限公司 The method and apparatus that authentication is carried out to user
CN105991592B (en) * 2015-02-15 2019-05-31 阿里巴巴集团控股有限公司 With person part maintaining method, device and server
CN104735067B (en) * 2015-03-24 2018-07-24 高艳芳 O2O real names register access system and method
CN109617860B (en) * 2016-01-13 2021-10-22 创新先进技术有限公司 Real-name authentication method and device for account
CN109328348B (en) * 2016-09-30 2023-03-03 华为技术有限公司 Service authentication method, system and related equipment
CN107231357A (en) * 2017-06-02 2017-10-03 山东浪潮云服务信息科技有限公司 A kind of Hierarchical Identity authentication model for internet+government affairs service
CN107870979A (en) * 2017-09-30 2018-04-03 平安科技(深圳)有限公司 Electronic installation, extract tables of data data method and storage medium
CN110035002B (en) * 2019-04-01 2021-09-10 达闼机器人有限公司 Method for implementing instant messaging, terminal equipment and storage medium
CN112004228B (en) * 2019-05-27 2023-06-02 中国电信股份有限公司 Real person authentication method and system
CN110505198A (en) * 2019-07-05 2019-11-26 中国平安财产保险股份有限公司 A kind of checking request method, apparatus, computer equipment and storage medium
CN112312383B (en) * 2019-07-30 2022-07-01 中国移动通信集团江西有限公司 Service processing method and device for home user, storage medium and server
CN111259349A (en) * 2020-01-09 2020-06-09 中移(杭州)信息技术有限公司 Identity authentication method, server and computer readable storage medium
CN111340503A (en) * 2020-02-28 2020-06-26 深圳市元征科技股份有限公司 Transaction method, device, equipment and storage medium
CN112132122B (en) * 2020-11-26 2021-03-16 飞天诚信科技股份有限公司 Fingerprint card and implementation method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101122985A (en) * 2006-08-09 2008-02-13 阿里巴巴公司 Method and system for identity authentication
CN101131760A (en) * 2006-08-25 2008-02-27 阿里巴巴公司 Method and system for checking account security
CN101242276A (en) * 2008-03-10 2008-08-13 陈勇 A method for solving Internet honesty issue
CN101426009A (en) * 2007-10-31 2009-05-06 中国移动通信集团公司 Identity management platform, service server, uniform login system and method

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100438681C (en) * 2004-06-04 2008-11-26 上海环达计算机科技有限公司 Identification method and system for mobile equipment
CN1750462A (en) * 2004-09-14 2006-03-22 华为技术有限公司 Method for realizing identity identification by mobile terminal
CN1893355B (en) * 2005-07-05 2012-10-10 淘宝控股有限公司 Method and system for identifying identity of network user end
CN1967584A (en) * 2005-11-18 2007-05-23 吴超竑 Auditing method for personal consumption credit
CN1988552B (en) * 2005-12-20 2010-11-10 中国电信股份有限公司 Method for automatic identifying and configuring terminal
CN100589383C (en) * 2005-12-23 2010-02-10 华为技术有限公司 Method, apparatus and system for verifying internet user identity
CN1794284B (en) * 2005-12-26 2010-09-15 上海洲信信息技术有限公司 Method and system of realizing single account multiuser of electron mail box
CN1929376A (en) * 2006-08-03 2007-03-14 张勇军 Method for establishing universal identity authentication system and user's information storage
CN101222348B (en) * 2007-01-10 2011-05-11 阿里巴巴集团控股有限公司 Method and system for calculating number of website real user
CN101291217A (en) * 2007-04-20 2008-10-22 章灵军 Network identity authentication method
CN101383706A (en) * 2007-09-06 2009-03-11 上海智客网络科技有限公司 Method and device for arbitrarily publishing and auditing on network
CN101136750A (en) * 2007-10-15 2008-03-05 胡祥义 Network real-name system implementing method
CN101420416B (en) * 2007-10-22 2013-03-13 中国移动通信集团公司 Identity management platform, service server, login system and method, and federation method
CN101256700A (en) * 2008-03-31 2008-09-03 浙江大学城市学院 ATM of mixed type user identification authentication
CN101599832B (en) * 2008-06-05 2011-06-15 北京思创银联科技股份有限公司 Method and system of authenticating personal identity for logging in a network system
CN101425903A (en) * 2008-07-16 2009-05-06 冯振周 Trusted network architecture based on identity
US8307412B2 (en) * 2008-10-20 2012-11-06 Microsoft Corporation User authentication management
CA2781872A1 (en) * 2009-11-25 2011-06-09 Security First Corp. Systems and methods for securing data in motion
US9247008B2 (en) * 2010-03-18 2016-01-26 Microsoft Corporation Unified web service discovery
TW201227556A (en) * 2010-12-24 2012-07-01 Chunghwa Telecom Co Ltd Electronic transaction system and payment method using telecommunication phone number as account number
CN102045367B (en) * 2011-01-10 2014-04-23 软库创投(北京)科技有限公司 Registration method and authentication server of real-name authentication
CN102186173B (en) * 2011-04-26 2013-08-07 广州市动景计算机科技有限公司 Identity authentication method and system
WO2011157112A2 (en) * 2011-05-30 2011-12-22 华为技术有限公司 Method for real name subscription based on self-service terminal, and self-service terminal thereof
CN102215227A (en) * 2011-05-30 2011-10-12 中国联合网络通信集团有限公司 Method and system for authenticating electronic commerce identity of mobile communication network
CN102254272A (en) * 2011-06-12 2011-11-23 辜进荣 Network interaction platform capable of performing classification according to user characteristics

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101122985A (en) * 2006-08-09 2008-02-13 阿里巴巴公司 Method and system for identity authentication
CN101131760A (en) * 2006-08-25 2008-02-27 阿里巴巴公司 Method and system for checking account security
CN101426009A (en) * 2007-10-31 2009-05-06 中国移动通信集团公司 Identity management platform, service server, uniform login system and method
CN101242276A (en) * 2008-03-10 2008-08-13 陈勇 A method for solving Internet honesty issue

Also Published As

Publication number Publication date
HK1181582A1 (en) 2013-11-08
CN103139172A (en) 2013-06-05
CN105376220A (en) 2016-03-02
CN105376220B (en) 2019-09-17

Similar Documents

Publication Publication Date Title
CN103139172B (en) A kind of service implementation method and device
US20220058655A1 (en) Authentication system
KR102624700B1 (en) Biometric identification and verification between IoT devices and applications
US20170316497A1 (en) Method for creating, registering, revoking authentication information and server using the same
CN108011863B (en) Method and device for identifying brute force cracking
CN109471865B (en) Offline data management method, system, server and storage medium
CN103428179B (en) A kind of log in the method for many domain names website, system and device
US20160321745A1 (en) Account binding processing method, apparatus and system
US20210234857A1 (en) Authentication system, authentication method, and application providing method
TWI778296B (en) Information processing method, device, electronic device, and computer-readable storage medium
CN108701309A (en) A kind of distributed user profile authentication system for security of e-commerce transactions
US10755237B2 (en) Method for creating, registering, revoking authentication information and server using the same
WO2015101341A1 (en) Method and device for processing service request
JP2016521932A (en) Terminal identification method, and method, system, and apparatus for registering machine identification code
CN104580104A (en) Method, device and system for identity verification
WO2022193594A1 (en) Card binding method, terminal device, authentication server and storage medium
US20220166810A1 (en) Method, apparatus, and computer-readable storage medium for cross-domain internet of things device registration
CN105992204A (en) Access authentication method of applications of mobile intelligent terminal and device
CN105993156B (en) Server access verification method and device
US20200349566A1 (en) Device control method and related device
CN106470200A (en) A kind of auth method and relevant apparatus
CN105592083B (en) Method and device for terminal to access server by using token
CN110245912A (en) A kind of electronic contract signature method, apparatus, storage medium and terminal device
CN107566329A (en) A kind of access control method and device
WO2022206431A1 (en) Method and apparatus for querying ledger data of fabric blockchain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1181582

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1181582

Country of ref document: HK

TR01 Transfer of patent right

Effective date of registration: 20191211

Address after: P.O. Box 31119, grand exhibition hall, hibiscus street, 802 West Bay Road, Grand Cayman, Cayman Islands

Patentee after: Innovative advanced technology Co., Ltd

Address before: Cayman Islands Grand Cayman capital building, a four storey No. 847 mailbox

Patentee before: Alibaba Group Holding Co., Ltd.

TR01 Transfer of patent right