A kind of service implementation method and device
Technical field
The application relates to network communication technology field, particularly relates to a kind of service implementation method and device.
Background technology
Along with the development of Internet technology, the class of business realized based on Internet technology gets more and more, and at present, the realization of most of business all needs user to register at corresponding Website server, the realization of this registration process as shown in Figure 1, mainly comprises the steps:
Step 101, user send registration request by its user terminal to Website server.
The registration request that step 102, Website server send according to user terminal, provides enrollment page to this user terminal.
In this step 102, Website server is to the field that the enrollment page that user terminal provides generally includes user name, the name, sex, age etc. of password and user need user to input.
The materials for registration that user is submitted to by enrollment page is sent to Website server by step 103, user terminal.
Step 104, Website server preserve the materials for registration of user.
So far, the flow process that user registers at Website server terminates.Based on this flow process, user can set up Member Information at Website server by registration, thus can based on registration username information and password login to Website server after, use the corresponding service that this Website server provides.
Above-mentioned user is by the mode of Website login server registration Website login server, the information inputted when registering due to user may as deceptive information, therefore, this mode is generally applicable to require lower business to user identity authenticity, higher business is required for user identity authenticity, it is general after user logs in and asks this business, need user carry can the certificate of unique identification user identity (as identity card, officer's identity card, passport etc.) carry out person authentication to specified services point, and after person authentication passes through, the service request of this user is processed, obviously, the treatment cycle of this mode to business is long, thus reduce Business Processing efficiency.
Summary of the invention
In view of this, the embodiment of the present application provides a kind of service implementation method and device, adopts this technical scheme, can improve Business Processing efficiency.
The embodiment of the present application is achieved through the following technical solutions:
According to an aspect of the embodiment of the present application, provide a kind of service implementation method, comprising:
The service request that server receives user terminal sends, portably uses the username information of user at described server registration of described user terminal in described service request;
From the username information set up in advance with find the real-name authentication information corresponding with the described username information that carries in described service request in the correspondence set of real-name authentication information after, described service request is processed.
According to another aspect of the embodiment of the present application, additionally provide a kind of business realizing device, comprising:
Receiving element, for receiving the service request that user terminal sends, portably uses the username information of user at described server registration of described user terminal in described service request;
Corresponding relation sets up unit, for setting up the corresponding relation of username information and real-name authentication information;
Authentication ' unit, for set up from described corresponding relation unit set up correspondence set in search the real-name authentication information corresponding with the described username information carried in described service request;
Service Processing Unit, after finding the real-name authentication information corresponding with the described username information carried in described service request in described authentication ' unit, processes described service request.
According to another aspect of the embodiment of the present application, additionally provide a kind of business realizing system, comprise above-mentioned business realizing device.
By at least one technical scheme above-mentioned that the embodiment of the present application provides, the service request that server receives user terminal sends, the username information of user at server registration of this user terminal is portably used in this service request, from the username information set up in advance with search the real-name authentication information corresponding with the username information that carries in this service request the correspondence set of real-name authentication information, and after finding, this service request is processed.According to this technical scheme, server is after receiving the service request of user, the real-name authentication information corresponding with this username information set up in advance can be searched according to the username information of user's registration, and after finding real-name authentication information, this service request is processed, namely, after confirming that user identity that this username information is corresponding is true, business is processed.This business realizing mode can be applicable to the business had higher requirements to user identity authenticity, and without the need to carrying out person authentication, compared with prior art, decreasing the treatment cycle of business, thus improve Business Processing efficiency.
The further feature of the application and advantage will be set forth in the following description, and, partly become apparent from specification, or understand by implementing the application.The object of the application and other advantages realize by structure specifically noted in write specification, claims and accompanying drawing and obtain.
Accompanying drawing explanation
Accompanying drawing is used to provide further understanding of the present application, and forms a part for specification, is used from explanation the application with the embodiment of the present application one, does not form the restriction to the application.In the accompanying drawings:
The schematic flow sheet that the user that Fig. 1 provides for background technology registers at Website server;
The schematic flow sheet setting up the corresponding relation of username information and real-name authentication information that Fig. 2 provides for the embodiment of the present application one;
A kind of real-name authentication that Fig. 3 provides for the embodiment of the present application one and the schematic flow sheet setting up corresponding relation;
Another real-name authentication that Fig. 4 provides for the embodiment of the present application one and the schematic flow sheet setting up corresponding relation;
Fig. 5 provide for the embodiment of the present application one another set up the schematic flow sheet of the corresponding relation of username information and real-name authentication information;
The schematic flow sheet of a kind of business realizing that Fig. 6 provides for the embodiment of the present application one;
Another schematic flow sheet of the business realizing that Fig. 7 provides for the embodiment of the present application one;
Fig. 8 uses the user of this user terminal whether to meet the schematic flow sheet of the security level required of setting for the determination that the embodiment of the present application one provides;
Another schematic flow sheet of the business realizing that Fig. 9 provides for the embodiment of the present application one;
The structural representation of the business realizing device that Figure 10 provides for the embodiment of the present application two;
The structural representation of another business realizing device that Figure 11 provides for the embodiment of the present application two;
The structural representation of another business realizing device that Figure 12 provides for the embodiment of the present application two.
Embodiment
In order to provide the implementation improving Business Processing efficiency, the embodiment of the present application provides a kind of service implementation method and device, and this technical scheme can be applied to the process of Business Processing, both can be implemented as a kind of method, also can be implemented as a kind of product.Be described below in conjunction with the preferred embodiment of Figure of description to the application, should be appreciated that preferred embodiment described herein is only for instruction and explanation of the application, and be not used in restriction the application.And when not conflicting, the embodiment in the application and the feature in embodiment can combine mutually.
Embodiment one
The embodiment of the present application one provides a kind of service implementation method, this service implementation method can be applicable to miscellaneous service, especially, when being applicable to have in the business of high requirement user identity authenticity, have the shorter Business Processing cycle, Business Processing efficiency is high.
The service implementation method that the embodiment of the present application one provides mainly is applicable to user terminal and the server business scenario based on internet communication, in order to reach the object improving Business Processing efficiency, in advance real-name authentication is carried out to each member registered in network, thus process based on the service request of real-name authentication result to user, avoid the process of person authentication.In the embodiment of the present application, namely the process of carrying out real-name authentication to member sets up the process of the corresponding relation of username information and real-name authentication information, Fig. 2 shows the schematic flow sheet of the corresponding relation setting up username information and real-name authentication information, as shown in Figure 2, this process setting up the corresponding relation of username information and real-name authentication information mainly comprises the steps:
Step 201, server obtain the user's registration information corresponding with username information.
This step 201 can perform after user completes registration, or perform after user completes registration and signs in server first, or send service request but determine to perform after this user is without real-name authentication user by its user terminal, or perform after the time of Operation system setting arrives or event meets, will not enumerate herein.Wherein, username information exists after server has carried out registering user usually, therefore, before this step of execution, user needs to register at server, what also namely server obtained in this step is complete user's registration information corresponding to the username information of the user of registration at this server, and this user's registration information generally comprises the information such as user name, password, address name, sex, age.
Step 202, the information that extraction is mated with the information attribute of setting from the user's registration information obtained.
In this step 202, pre-set the information attribute needing to extract from user's registration information, this information attribute can be used for carrying out real-name authentication to user, and therefore, the information attribute of this setting generally can be set to address name, sex, age etc. can the information attribute of identifying user identity.Be to be understood that, herein for the object lesson that the concrete condition described by the information attribute set only provides for ease of understanding the embodiment of the present application, in practical application, according to the difference of used type of service, business scenario, the information attribute of this setting can be arranged flexibly, such as, according to class of service, the information attribute of this setting can be name and ID card No., can also be name and passport number etc., the combination of multiple information attribute also can be set, will not enumerate herein.
Step 203, carry out real-name authentication according to the information extracted, and by the information of real-name authentication as real-name authentication information, and the corresponding relation with this username information will be set up.
So far, the flow process setting up the corresponding relation of username information and real-name authentication information terminates.
The step 203 that the embodiment of the present application one comprises for the corresponding flow process of Fig. 2 gives the following two kinds preferred implementation:
Preferred implementation one
Fig. 3 shows real-name authentication in above-mentioned steps 203 and sets up the schematic flow sheet of corresponding relation, as shown in Figure 3, comprises the steps:
Step 301, the information of extraction to be mated with the information being used for unique identification natural person identity.
In this step 301, first the information determining unique identification natural person identity is needed, this information being used for unique identification natural person identity is corresponding with the information attribute in above-mentioned steps 202 during information extraction, such as, extract information attribute be name and ID card No. time, this information being used for unique identification natural person identity is the ID card information of citizen, and the ID card information of this citizen derives from public security system; Extract information attribute be name and passport number time, this information being used for unique identification natural person identity is the passport information of citizen, and the passport information of this citizen derives from passport and handles mechanism.In practical application, because the information attribute extracted can be arranged flexibly, this is used for the classification of the information of unique identification natural person identity and originates also different, but this source all should be the authoritative institution that can ensure user identity authenticity.By this information for unique identification natural person identity can authentication of users registration time input the authenticity of information, reach the object of identifying user identity authenticity.
Step 302, using be used for the information of information matches of unique identification natural person identity as real-name authentication information, and set up the corresponding relation of this username information and this real-name authentication information.
In this step 302, set up the corresponding relation of this username information and this real-name authentication information, namely corresponding this username information of preservation and this real-name authentication information, in this username information of preservation and this real-name authentication information, can set up index file, so that search.
So far, real-name authentication and the flow process of setting up corresponding relation terminate.
Preferred implementation two
Fig. 4 shows real-name authentication in above-mentioned steps 203 and sets up the schematic flow sheet of corresponding relation, as shown in Figure 4, comprises the steps:
Step 401, the information of extraction to be mated with the information being used for unique identification natural person identity.
The specific implementation principle of this step 401 is substantially identical with the specific implementation principle of above-mentioned steps 301, is not described in detail herein.
Step 402, determine with the information of the information matches for unique identification natural person identity after, will the information of unique identification natural person identity be used for as real-name authentication information, and set up and the corresponding relation of this username information.
So far, real-name authentication and the flow process of setting up corresponding relation terminate.
Be to be understood that, the real-name authentication that above-mentioned preferred implementation one and preferred implementation two provide and the mode setting up corresponding relation, be only the preferred implementation realizing the embodiment of the present application, in practical application, can also adopt other can other modes, such as, determine with the information of the information matches for unique identification natural person identity after, set information is extracted from the information for unique identification natural person identity, and set up the corresponding relation with username information, will not enumerate herein.
In the step 202 that the corresponding flow process of Fig. 2 comprises, if do not extract the information of mating with the information attribute set from the user's registration information obtained, the corresponding relation of username information and real-name authentication information can also be set up further by other modes, Fig. 5 shows the schematic flow sheet that another sets up the corresponding relation of username information and real-name authentication information, as shown in Figure 5, mainly comprise the steps:
Step 501, server send the instruction of real-name authentication acquisition of information to user terminal, and this real-name authentication acquisition of information indicates the information field comprised for unique identification natural person identity.
In this step 501, server can provide the information field for unique identification natural person identity of multiple type to select for user to user, wherein, information type for unique identification natural person identity can be identity card, officer's identity card, passport etc., correspondingly, for the information field of unique identification natural person identity can be respective field (as name and ID card No.) that identity card is corresponding, officer's identity card is corresponding respective field (as name and officer's identity card number), respective field (as name and passport No.) etc. that passport is corresponding.
What step 502, reception user terminal were submitted to indicates by the user of this user terminal of use the information for unique identification natural person identity comprising information field and input according to real-name authentication acquisition of information.
In this step 502, if server provides the information field for unique identification natural person identity of multiple type to select for user to user, then user terminal needs the information field selecting one or more types to fill in, and submits to server.
Step 503, server set up the corresponding relation of the information for unique identification natural person identity of this username information and reception.
In this step 503, server sets up the corresponding relation of the information for unique identification natural person identity of this username information and reception, i.e. corresponding this username information of preservation and this real-name authentication information, in this username information of preservation and this real-name authentication information, index file can be set up, so that search.
So far, the flow process setting up the corresponding relation of username information and real-name authentication information terminates.
The above embodiments of the present application have been described in detail for the process of the corresponding relation setting up username information and real-name authentication information, set up the corresponding relation of username information and real-name authentication information at server after, this server can process follow-up service request based on this corresponding relation.Fig. 6 shows the schematic flow sheet of the business realizing that the embodiment of the present application one provides, and as shown in Figure 6, the implementation procedure of this business mainly comprises the steps:
The service request that step 601, server receives user terminal send, portably uses the username information of user at server registration of this user terminal in this service request.
In this step 601, the user terminal sending service request is generally the user terminal having carried out registration and Successful login at this server, can also carry service identification, be used to indicate asked type of service in this service request.
Step 602, from the correspondence set of the username information set up in advance and real-name authentication information, search the real-name authentication information corresponding with the username information carried in this service request.
In this step 602, mainly according to the username information carried in service request, from the correspondence set set up in advance, search the real-name authentication information corresponding with this username information.
Step 603, after the real-name authentication information that the username information found with carry in this service request is corresponding, this service request to be processed.
In this step 603, find the real-name authentication information corresponding with the username information carried in this service request, namely show using user's real-name authentication of this user terminal to pass through, the service request initiated based on this user terminal can be processed, particularly, process the handling process corresponding different according to the difference of class of service to service request, the application does not relate to the improvement to this business procession, is not described in detail herein.
So far, this business realizing flow process terminates.By this flow process, server is after receiving the service request of user, the real-name authentication information corresponding with this username information set up in advance can be searched according to the username information of user's registration, and after finding real-name authentication information, this service request is processed, namely, after confirming that user identity that this username information is corresponding is true, business is processed.This business realizing mode can be applicable to the business had higher requirements to user identity authenticity, and without the need to carrying out person authentication, compared with prior art, decreasing the treatment cycle of business, thus improve Business Processing efficiency.
The business realizing process that the flow process that Fig. 6 is corresponding provides, can be applicable to miscellaneous service, is particularly useful for requiring higher business to user identity authenticity.In practical application, higher service implementation said method can be required for user identity authenticity, require that lower business can adopt existing method for user identity authenticity, as long as namely user is successfully logged onto server, based on this, the business needing to carry out real-name authentication can be preset, in above-mentioned steps 601, after server receives the service request of user, if determine that business that this service request is asked is set to the business needing to carry out real-name authentication, then continue to perform step 602, otherwise directly this service request is processed.
In the above-mentioned service implementation method that the embodiment of the present application one provides, the username information for user's registration has carried out real-name authentication, thus improves the reliability of business realizing.On this basis, the embodiment of the present application one provides a preferred implementation of business realizing, and in this preferred implementation, server for the different security mechanism of dissimilar business setting, thus provides different proof procedures for different business.Fig. 7 shows another schematic flow sheet of the business realizing that this embodiment one provides, and as shown in Figure 7, the implementation procedure of this business mainly comprises the steps:
The service request that step 701, server receives user terminal send, portably uses the username information of user at server registration of this user terminal in this service request.
Step 702, from the correspondence set of the username information set up in advance and real-name authentication information, search the real-name authentication information corresponding with the username information carried in this service request.
The specific implementation process of this step 701 ~ step 702 is substantially identical with the specific implementation process of above-mentioned steps 601 ~ step 602, repeats no more herein.
Step 703, after the real-name authentication information that the username information found with carry in this service request is corresponding, determine the security level required that the type of service of asking with this service request is corresponding.
In this step 703, the level of security that service needed corresponding to this type of service of the security level required general provision corresponding with type of service meets, also the verification mode that the service needed that namely this type of service is corresponding is carried out, such as, real-name authentication, video authentication, person authentication or other authentication modes etc.
Step 704, determine to use the user of this user terminal whether to meet corresponding security level required, if so, perform step 705, if not, perform step 706.
Step 705, this service request to be processed.
Step 706, refuse this service request.
So far, this business realizing flow process terminates.By this flow process, server for different business, can be verified according to the transmit leg of different level of securitys to the service request sent.
In the step 704 that the corresponding flow process of Fig. 7 comprises, determine to use the user of this user terminal whether to meet the security level required of setting, the security level required that main basis is corresponding with the type of service that this service request is asked, Fig. 8 shows the schematic flow sheet determining to use the user of this user terminal whether to meet the security level required of setting, as shown in Figure 8, this process mainly comprises the steps:
Step 801, according to security level required, determining whether to need, to using the user of this user terminal to carry out additional identities certification, if so, then to perform step 802, if not, then performing step 805.
In this step 801, determine whether to need using the user of this user terminal to carry out additional identities certification, namely to determine in security level required except real-name authentication, whether also have other authentication modes required, as whether also needed to carry out video authentication, person authentication etc., if needed, then determine to need using the user of this user terminal to carry out additional identities certification.
Step 802, carry out additional identities certification according to security level required to using the user of this user terminal.
In this step 802, additional identities certification is carried out to using the user of this user terminal according to security level required, namely according to the authentication mode specified in security level required, corresponding certification is carried out to this user, such as, if security level required regulation needs to carry out video authentication to user, then further video authentication is carried out to this user, if security level required regulation needs to carry out person authentication to user, then further person authentication is carried out to this user.
Step 803, determining whether the additional identities certification to using the user of this user terminal to carry out is passed through, if not, performing step 804, if so, performing step 805.
Step 804, determine that the user using this user terminal does not meet security level required.
Step 805, determine that the user using this user terminal meets security level required.
So far, determine that the flow process using the user of this user terminal whether to meet the security level required of setting terminates.
On the basis of service implementation method corresponding to Fig. 6, the embodiment of the present application one provides another preferred implementation of business realizing, and in this preferred implementation, the situation that have registered multiple user name for same user controls business.Fig. 9 shows another schematic flow sheet of the business realizing that this embodiment one provides, and as shown in Figure 9, the implementation procedure of this business mainly comprises the steps:
The service request that step 901, server receives user terminal send, portably uses the username information of user at server registration of this user terminal in this service request.
Step 902, from the correspondence set of the username information set up in advance and real-name authentication information, search the real-name authentication information corresponding with the username information carried in this service request.
The specific implementation process of this step 901 ~ step 902 is substantially identical with the specific implementation process of above-mentioned steps 601 ~ step 602, repeats no more herein.
Step 903, determine that this real-name authentication information found and the username information carried in this service request be whether unique corresponding, if not, perform step 904, if so, execution step 906.
In this step 903, can by searching the corresponding relation of username information and the real-name authentication information set up in advance, determine this real-name authentication information whether also other username informations corresponding found, if not, then determine that this real-name authentication information is uniquely corresponding with the username information carried in this service request, if so, the real-name authentication information also corresponding username information except the username information carried in this service request found then is determined.
Step 904, determine whether to process for the service request of same business to the username information carried except the username information carried in this service request, if so, then perform step 905, if not, perform step 906.
Step 905, refuse this service request.
Step 906, this service request to be processed.
So far, this business realizing flow process terminates.By this flow process, server the real-name authentication information determining to find and the described username information carried in service request uniquely to the time in of corresponding or, at the real-name authentication information determining to find also corresponding username information except the username information carried in service request, and after determining not process for the service request of same business to the username information carried except the username information carried in this service request, this service request is processed, thus the situation can registering multiple user name for a user carries out Service control, the different user name for same user is avoided repeatedly to authorize same business.
In the preferred implementation that the embodiment of the present application one provides, for above-mentioned Fig. 6, Fig. 7, business realizing flow process in Fig. 9 is supplemented, particularly, in the step 602 that the corresponding flow process of Fig. 6 comprises, in the step 702 that the corresponding flow process of Fig. 7 comprises or in the step 902 that comprises of the corresponding flow process of Fig. 9, if server from the username information set up in advance with do not find the real-name authentication information corresponding with the username information that carries in the service request received the correspondence set of real-name authentication information, the corresponding relation of username information and the real-name authentication information of carrying in this service request can also be set up further, particularly, set up the corresponding relation of username information and the real-name authentication information of carrying in this service request, arbitrary implementation procedure of the Fig. 2 to Fig. 5 that above-described embodiment can be adopted to provide realizes, repeat no more herein.
The server related in above embodiment can be Website server, also can be the server of independent part administration.
The service request related in above embodiment can be the service request initiated for general service, also can be the service request initiated for business user identity authenticity to high requirement, can also be the service request initiated for specific transactions.
The user terminal of the initiating business request related in above embodiment, general needs registers at server.
In above embodiment, the process relating to data access can by the API (ApplicationProgrammingInterface of definition, application programming interface) realize, such as, according to the corresponding relation of the username information set up in advance and real-name authentication information, when obtaining whole username information corresponding to certain real-name authentication information, this API can be:
* parampersonId Customs Assigned Number
* return member's list
*/
publicList<Member>listMemberByPersonId(StringpersonId);
/**
Such as, when being added the mode certification natural person of name by identity card, when namely the real-name authentication information of user is ID card information, this API can be:
* paramname address name
* paramicNumber ID card No.
*/
publicVoidverifyPersonByIcNumberAndName(Stringname,StringicNumber);
/**
Such as: when obtaining the real-name authentication information of user, this API can be:
* parampersonId Customs Assigned Number
* return real-name authentication information
*/
publicAuthenticationgetAuthenticationByPersonId(StringpersonId);
/**
Embodiment two
Corresponding with above-described embodiment, the embodiment of the present application two provides a kind of business realizing device, and this business realizing device can realize the function that above-mentioned server realizes.
Figure 10 shows the schematic flow sheet of the business realizing device that the embodiment of the present application two provides, and as shown in Figure 10, comprising:
Receiving element 1001, corresponding relation set up unit 1002, authentication ' unit 1003 and Service Processing Unit 1004;
Wherein:
Receiving element 1001, for receiving the service request that user terminal sends, portably uses the username information of user at server registration of user terminal in service request;
Corresponding relation sets up unit 1002, for setting up the corresponding relation of username information and real-name authentication information;
Authentication ' unit 1003, for set up from corresponding relation unit 1002 set up correspondence set in search the real-name authentication information corresponding with the username information carried in service request;
Service Processing Unit 1004, after finding the real-name authentication information corresponding with the username information carried in service request in authentication ' unit 1003, processes service request.
As shown in figure 11, in the preferred implementation that the embodiment of the present application two provides, Figure 10 shown device can further include:
Level of security authentication unit 1005, before processing in Service Processing Unit 1004 pairs of service request, determine the security level required corresponding with the type of service that the service request that receiving element 1001 receives is asked, and determine to use the user of user terminal to meet security level required.
In the preferred implementation that the embodiment of the present application two provides, the level of security authentication unit 1005 that Figure 11 shown device comprises, specifically for according to security level required, determines whether to need using the user of user terminal to carry out additional identities certification; If so, then carry out additional identities certification according to security level required to using the user of user terminal, and after certification is passed through, determine to use the user of user terminal to meet security level required; If not, determine to use the user of user terminal to meet security level required.
As shown in figure 12, in the preferred implementation that the embodiment of the present application two provides, Figure 10 shown device can further include:
Business Processing authentication unit 1006, before processing in Service Processing Unit 1004 pairs of service request, determines that the real-name authentication information that authentication ' unit 1003 finds is uniquely corresponding with the username information carried in service request; Or determine the real-name authentication information that finds also corresponding username information except the username information carried in service request, and determine not process for the service request of same business to the username information carried except the username information carried in service request.
In the preferred implementation that the embodiment of the present application two provides, the corresponding relation that Figure 10 shown device comprises sets up unit 1002, time also for not finding the real-name authentication information corresponding with the username information carried in service request in authentication ' unit 1003, set up the corresponding relation of username information and the real-name authentication information of carrying in service request.
In the preferred implementation that the embodiment of the present application two provides, the corresponding relation that Figure 10 shown device comprises sets up unit 1002, specifically for obtaining the user's registration information corresponding with username information, the information of mating with the information attribute of setting is extracted from the user's registration information obtained, information according to extracting carries out real-name authentication, using the information by real-name authentication as real-name authentication information, and set up the corresponding relation with username information.
In the preferred implementation that the embodiment of the present application two provides, the corresponding relation that Figure 10 shown device comprises sets up unit 1002, specifically for the information of extraction is mated with the information being used for unique identification natural person identity, using be used for the information of information matches of unique identification natural person identity as real-name authentication information, and set up the corresponding relation with username information; Or, determine with the information of the information matches for unique identification natural person identity after, will the information of unique identification natural person identity be used for as real-name authentication information, and set up and the corresponding relation of username information.
In the preferred implementation that the embodiment of the present application two provides, the corresponding relation that Figure 10 shown device comprises sets up unit 1002, also for after do not extract the information of mating with the information attribute set from the user's registration information obtained, the instruction of real-name authentication acquisition of information is sent to user terminal, real-name authentication acquisition of information indicates the information field comprised for unique identification natural person identity, receive the information for unique identification natural person identity inputted according to field by the user of use user terminal that user terminal is submitted to, and set up the corresponding relation of the information for unique identification natural person identity of username information and reception.
The business realizing device that the embodiment of the application provides realizes by computer program.Those skilled in the art should be understood that; above-mentioned dividing elements mode is only the one in plurality of cells dividing mode; if be divided into other unit or without inner cells, as long as business realizing device has above-mentioned functions, all should within the protection range of the application.
The business realizing device that the embodiment of the present application two provides also has the functional module of each step in the service implementation method provided corresponding to above-described embodiment one.
The business realizing device that the embodiment of the present application two provides can be arranged in transaction processing system; this device can be arranged in Website server; also can independently dispose; further, when this business processing device is positioned at transaction processing system, this business processing device is not limited to said units dividing mode; can also be other dividing elements modes; no matter which kind of dividing elements mode, as long as this business realizing device has above-mentioned functions, all should within the protection range of the application.
It will be understood by those skilled in the art that the embodiment of the application can be provided as method, device (equipment) or computer program.Therefore, the application can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the application can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) of computer usable program code.
The application describes with reference to according to the flow chart of the method for the embodiment of the present application, device (equipment) and computer program and/or block diagram.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block diagram and/or square frame and flow chart and/or block diagram and/or square frame.These computer program instructions can being provided to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computer or other programmable data processing device produce device for realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, make on computer or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computer or other programmable devices is provided for the step realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
Although described the preferred embodiment of the application, those skilled in the art once obtain the basic creative concept of cicada, then can make other change and amendment to these embodiments.So claims are intended to be interpreted as comprising preferred embodiment and falling into all changes and the amendment of the application's scope.Obviously, those skilled in the art can carry out various change and modification to the application and not depart from the spirit and scope of the application.Like this, if these amendments of the application and modification belong within the scope of the application's claim and equivalent technologies thereof, then the application is also intended to comprise these change and modification.