CN111343200A - Credit-based service agent method and device - Google Patents
Credit-based service agent method and device Download PDFInfo
- Publication number
- CN111343200A CN111343200A CN202010412436.7A CN202010412436A CN111343200A CN 111343200 A CN111343200 A CN 111343200A CN 202010412436 A CN202010412436 A CN 202010412436A CN 111343200 A CN111343200 A CN 111343200A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- agent
- identity
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present specification provides a credit-based service brokering method and apparatus, wherein the credit-based service brokering method includes: receiving an agent instruction submitted by a first user aiming at a target service; calling an image acquisition interface to acquire an identity image of a second user according to the proxy instruction, and uploading a service proxy request carrying the identity image to a server; receiving credit information and identity information corresponding to the identity image issued by the server, generating an identity verification prompt containing the credit information and displaying the identity verification prompt; performing identity verification according to the information to be verified and the identity information which are input aiming at the identity verification prompt; and under the condition that the identity verification is passed, uploading agent processing information aiming at the second user to the server, and receiving an agent processing result sent by the server.
Description
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a credit-based service agent method and apparatus.
Background
As electronic devices are more and more widely used, users have higher requirements on the endurance time of the electronic devices, and in order to avoid that the electric quantity of the electronic devices is exhausted to affect the normal use of the electronic devices, many offline stores have charging devices configured in the stores to meet the charging requirements of the users, such as a mobile power supply and a matching cabinet configured in the stores, or a charging station configured in the stores, so that the users can provide charging services before the electric quantity of the electronic devices is exhausted; however, in a situation that the electric quantity of the electronic device of the user cannot enable the electronic device normally, the mobile power supply cannot be rented in a store, so that the user will be in a situation that no electronic device is available within a certain time, and cannot participate in some target services that need to be participated in through the electronic device, and therefore an effective solution is needed to solve the above problems.
Disclosure of Invention
In view of this, the embodiments of the present specification provide two credit-based service brokering methods. The present specification relates to two credit-based service brokering apparatuses, two computing devices, and two computer-readable storage media, so as to solve the technical defects existing in the prior art.
According to a first aspect of the embodiments of the present specification, there is provided a credit-based service brokering method applied to a user terminal, including:
receiving an agent instruction submitted by a first user aiming at a target service;
calling an image acquisition interface to acquire an identity image of a second user according to the proxy instruction, and uploading a service proxy request carrying the identity image to a server;
receiving credit information and identity information corresponding to the identity image issued by the server, generating an identity verification prompt containing the credit information and displaying the identity verification prompt;
performing identity verification according to the information to be verified and the identity information which are input aiming at the identity verification prompt;
and under the condition that the identity verification is passed, uploading agent processing information aiming at the second user to the server, and receiving an agent processing result sent by the server.
Optionally, the uploading, to the server, the proxy processing information for the second user includes:
displaying the core passing information to the first user;
receiving an agent confirmation instruction submitted by the first user aiming at the core body through information;
generating the agent processing information for acting the second user to process the target service according to the agent confirmation instruction;
and uploading the agent processing information to the server.
Optionally, after the step of uploading the agent processing information for the second user to the server and receiving the agent processing result sent by the server is executed under the condition that the identity verification passes, the method further includes:
receiving a resource allocation reminder issued by the server under the condition that an agent event condition including the second user triggers an agent event ending condition;
wherein the proxy event is an event that the first user proxies the second user to process the target service; and the resource allocation prompt is generated by allocating resources obtained by calculation according to the processing time of the agent event and the resource rate.
Optionally, before the step of receiving the agent instruction submitted by the first user for the target service is executed, the method further includes:
receiving a scanning instruction submitted by the first user;
calling the image acquisition interface to scan an image identification code based on the scanning instruction;
displaying a target service page corresponding to the target service containing the proxy control according to the scanning result;
correspondingly, the receiving of the agent instruction submitted by the first user for the target service includes:
and receiving the agent instruction submitted by the first user aiming at the agent control in the target business page.
Optionally, after the step of calling an image acquisition interface to acquire an identity image of a second user according to the proxy instruction and uploading a service proxy request carrying the identity image to a server is executed, the method further includes:
and receiving the admittance refusing reminding that the second user sent by the server does not conform to the target service.
Optionally, the invoking an image acquisition interface according to the proxy instruction to acquire an identity image of a second user, and uploading a service proxy request carrying the identity image to a server, includes:
displaying an image acquisition strategy through an image acquisition page based on the proxy instruction, and calling the image acquisition interface;
acquiring the identity image acquired by the image acquisition interface under the condition that the second user is subjected to image acquisition through the image acquisition interface based on an image acquisition strategy;
and extracting image features of the identity image to generate the service agent request, and uploading the service agent request to the server.
Optionally, the generating and displaying an authentication prompt including the credit information includes:
generating an identity verification page based on the credit information and the identity information;
and displaying the identity verification page.
Optionally, performing identity verification according to the to-be-verified information entered for the identity verification reminder and the identity information includes:
receiving the information to be verified input through the identity verification page;
extracting a first verification feature in the information to be verified and a second verification feature in the identity information;
and performing identity verification on the second user in a mode of matching the first verification characteristic with the second verification characteristic.
Optionally, when the target service is a charging device lease service, the method includes:
the agent instruction is a charging equipment borrowing instruction, and the service agent request is a charging equipment borrowing request;
correspondingly, the proxy processing information is charging equipment borrowing information, and the proxy processing result is a charging equipment borrowing result.
According to a second aspect of the embodiments of the present specification, there is provided a credit-based service broker apparatus applied to a user terminal, including:
the receiving instruction module is configured to receive an agent instruction submitted by a first user aiming at the target service;
the uploading request module is configured to call an image acquisition interface to acquire an identity image of a second user according to the proxy instruction and upload a service proxy request carrying the identity image to a server;
the display reminding module is configured to receive credit information and identity information corresponding to the identity image issued by the server, generate an identity verification reminder containing the credit information and display the identity verification reminder;
the identity verification module is configured to perform identity verification according to the information to be verified and the identity information, which are input aiming at the identity verification prompt;
and the receiving result module is configured to upload the agent processing information aiming at the second user to the server side and receive the agent processing result sent by the server side under the condition that the identity verification is passed.
According to a third aspect of the embodiments of the present specification, there is provided a credit-based service brokering method, applied to a server, including:
receiving a service agent request uploaded by a user terminal aiming at a target service;
determining credit information and identity information corresponding to the identity image contained in the service agent request, and issuing the credit information and the identity information to the user terminal;
receiving agent processing information uploaded by the user terminal, and generating agent event information corresponding to the target service;
recording the proxy event information to a user account corresponding to the identity information, and issuing a proxy confirmation instruction to the service equipment to which the target service belongs;
and generating an agent processing result according to the recording result and the agent confirmation instruction and sending the agent processing result to the user terminal.
Optionally, after the step of generating an agent processing result according to the recording result and the agent confirmation instruction and sending the agent processing result to the user terminal is executed, the method further includes:
under the condition that an agent event corresponding to the agent event information triggers an agent event ending condition, determining the processing time and the resource rate of the agent event;
determining a value of allocated resources based on the processing time and the resource rate, and determining a user account of a first user to which the user terminal belongs;
and transferring the allocated resources corresponding to the allocated resource numerical value from the user account of the second user to the user account of the first user, issuing a resource allocation prompt to the user terminal, and sending an agent event end prompt to the second user terminal of the second user.
Optionally, the determining credit information and identity information corresponding to the identity image included in the service agent request and sending the credit information and identity information to the user terminal includes:
analyzing the service agent request to obtain image characteristics corresponding to the identity image;
querying an attribute database based on the image features to obtain the credit information and the identity information corresponding to the image features;
judging whether the credit information accords with the service processing condition of the target service;
and if so, issuing the credit information and the identity information to the user terminal.
Optionally, after the step of receiving the service agent request uploaded by the user terminal for the target service is executed, the method further includes:
querying an attribute database based on the identity image contained in the service agent request;
determining the credit information and the identity information according to the query result;
judging whether the credit information accords with the service processing condition of the target service;
if not, an admission refusing prompt is generated according to the judgment result and is issued to the user terminal.
Optionally, after the step of generating an agent processing result according to the recording result and the agent confirmation instruction and sending the agent processing result to the user terminal is executed, the method further includes:
calculating a target credit score corresponding to the proxy event according to the processing time;
adding the target credit point to a base credit point of the user account of the second user.
Optionally, the service device starts a target service based on the confirmation agent instruction, and performs service reminding according to a start result.
Optionally, when the target service is a charging device lease service, the method includes:
the service agent request is a charging equipment borrowing request;
correspondingly, the proxy processing information is charging equipment borrowing information, the confirmation proxy instruction is a confirmation borrowing instruction, and the proxy processing result is a charging equipment borrowing result.
According to a fourth aspect of the embodiments of the present specification, there is provided a credit-based service broker apparatus, applied to a server, including:
the receiving agent request module is configured to receive a service agent request uploaded by a user terminal aiming at a target service;
the issuing information module is configured to determine credit information and identity information corresponding to the identity image contained in the service agent request and issue the credit information and the identity information to the user terminal;
an event information generating module configured to receive the proxy processing information uploaded by the user terminal and generate proxy event information corresponding to the target service;
the event recording information module is configured to record the proxy event information to a user account corresponding to the identity information and send a proxy confirmation instruction to the service equipment to which the target service belongs;
and the issuing processing result module is configured to generate an agent processing result according to the recording result and the confirmation agent instruction and issue the agent processing result to the user terminal.
According to a fifth aspect of embodiments herein, there is provided a computing device comprising:
a memory and a processor;
the memory is to store computer-executable instructions, and the processor is to execute the computer-executable instructions to:
receiving an agent instruction submitted by a first user aiming at a target service;
calling an image acquisition interface to acquire an identity image of a second user according to the proxy instruction, and uploading a service proxy request carrying the identity image to a server;
receiving credit information and identity information corresponding to the identity image issued by the server, generating an identity verification prompt containing the credit information and displaying the identity verification prompt;
performing identity verification according to the information to be verified and the identity information which are input aiming at the identity verification prompt;
and under the condition that the identity verification is passed, uploading agent processing information aiming at the second user to the server, and receiving an agent processing result sent by the server.
According to a sixth aspect of embodiments herein, there is provided another computing device, comprising:
a memory and a processor;
the memory is to store computer-executable instructions, and the processor is to execute the computer-executable instructions to:
receiving a service agent request uploaded by a user terminal aiming at a target service;
determining credit information and identity information corresponding to the identity image contained in the service agent request, and issuing the credit information and the identity information to the user terminal;
receiving agent processing information uploaded by the user terminal, and generating agent event information corresponding to the target service;
recording the proxy event information to a user account corresponding to the identity information, and issuing a proxy confirmation instruction to the service equipment to which the target service belongs;
and generating an agent processing result according to the recording result and the agent confirmation instruction and sending the agent processing result to the user terminal.
According to a seventh aspect of embodiments herein, there is provided a computer-readable storage medium storing computer-executable instructions that, when executed by a processor, implement the steps of the credit-based service brokering method applied to a user terminal.
According to an eighth aspect of embodiments herein, there is provided another computer-readable storage medium storing computer-executable instructions which, when executed by a processor, implement the steps of the credit-based service brokering method applied to a server.
The credit-based service agent method provided by the specification comprises the steps of acquiring an identity image of a second user by calling an image acquisition interface after an agent instruction of a first user is received, uploading a service agent request to a server, determining identity information and credit information according to the request and transmitting the identity information and the credit information back to a user terminal by the server, carrying out identity verification of the second user according to information to be verified and the identity information which are input aiming at the identity verification prompt under the condition that the user terminal displays the identity verification prompt containing the credit information, transmitting agent processing information aiming at the second user to the server after the verification is passed, transmitting a confirmation agent instruction to service equipment by the server according to the agent processing information and transmitting an agent processing result back to the user terminal, and realizing that the participation of the target service can be helped by inviting the first user under the condition that the second user can not normally participate in the target service through the user terminal, and the agent event information of the second user is recorded in the user account of the second user, so that the user terminal of the second user can participate in the target service under the condition that the user terminal cannot be normally used, and the experience effect of the second user is further improved.
Drawings
FIG. 1 is a flow chart of a credit-based service brokering method according to an embodiment of the present specification;
FIG. 2 is a schematic diagram of a submit instruction page in a credit-based transaction brokering method according to an embodiment of the present specification;
fig. 3 is a schematic diagram of an image capture page in a credit-based service brokering method according to an embodiment of the present specification;
fig. 4 is a schematic diagram of an authentication page in a credit-based service brokering method according to an embodiment of the present specification;
fig. 5 is a schematic structural diagram of a credit-based service broker apparatus according to an embodiment of the present disclosure;
FIG. 6 is a flow diagram of another credit-based service brokering method provided by an embodiment of the present specification;
fig. 7 is a flowchart illustrating a credit-based service broker method applied in a charging device leasing service according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of another credit-based service broker apparatus provided in an embodiment of the present specification;
FIG. 9 is a block diagram of a computing device provided in an embodiment of the present description;
fig. 10 is a block diagram of another computing device provided in an embodiment of the present description.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present description. This description may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein, as those skilled in the art will be able to make and use the present disclosure without departing from the spirit and scope of the present disclosure.
The terminology used in the description of the one or more embodiments is for the purpose of describing the particular embodiments only and is not intended to be limiting of the description of the one or more embodiments. As used in one or more embodiments of the present specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present specification refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It will be understood that, although the terms first, second, etc. may be used herein in one or more embodiments to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first can also be referred to as a second and, similarly, a second can also be referred to as a first without departing from the scope of one or more embodiments of the present description. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
In the present specification, two credit-based service brokering methods are provided, and the present specification simultaneously relates to two credit-based service brokering apparatuses, two computing devices, and two computer-readable storage media, which are described in detail in the following embodiments one by one.
Fig. 1 is a flowchart illustrating a credit-based service brokering method according to an embodiment of the present disclosure, applied to a user terminal, and specifically including the following steps:
step S102, receiving an agent instruction submitted by a first user aiming at the target service.
In practical application, the user demands for the user terminal are getting larger, and many online services or offline services can be completed only by the cooperation of the user terminal, such as code scanning payment and instant messaging; however, in a scene that a user goes out, the user often meets the requirement that the user terminal needs to be charged due to insufficient electric quantity, and the user can rent the mobile power supply to charge through stores configured with the mobile power supply and a matched cabinet so as to solve the problem; however, when the user terminal is not powered on and cannot be started normally, the operation of renting the mobile power supply by the user can not be realized, so that the user cannot normally participate in some target services, and if the user cannot pay, the user cannot rent the mobile power supply; therefore, how to effectively solve the problem that the user can participate in the target service even in the state that the user terminal is not powered on is important.
In order to enable a second user to still participate in a target service in a state where no user terminal is available, the credit-based service agent method applied to a user terminal provided by this embodiment calls an image acquisition interface to acquire an identity image of the second user and uploads a service agent request to a server, displays an authentication prompt including credit information at the user terminal according to the credit information and the identity information returned by the server, performs identity verification of the second user according to the information to be authenticated and the identity information entered for the authentication prompt, sends agent processing information for the second user to the server after the verification is passed, and receives an agent processing result returned by the server, so that the second user can be helped to participate in the target service by inviting the first user in a state where no user terminal is available for the second user, the experience effect of the second user is further improved.
In specific implementation, the first user specifically refers to a service agent, the second user specifically refers to a service demand party, that is, the first user can help the second user participate in a target service, where the target service may be a charging device renting service, a shared vehicle renting service, or a book renting service; correspondingly, the agent instruction specifically refers to an agent instruction submitted by a first user for a second user; under the condition that the target service can be a charging lease service, the proxy instruction is a charging equipment borrowing instruction, and the service proxy request is a charging equipment borrowing request; the proxy processing information is charging equipment borrowing information, and the proxy processing result is a charging equipment borrowing result.
The target service can be understood as a service which can be participated in by a user with a registered account number on a payment platform, so that the payment platform can provide proxy service for other users for the user, for example, in a charging device leasing service, a first user is a mobile power supply lending user, a second user is a mobile power supply actual lending user, the first user and the second user are both registered users of the payment platform, at this time, the first user can lend the mobile power supply for the second user, so that related leasing information can be recorded in a registered account of the second user on the payment platform, the second user can still rent the mobile power supply in a state that a user terminal is unavailable, and the leasing information is recorded in the account of the second user, so that the situation that the mobile power supply is not lost can be ensured;
or in the shared vehicle renting service, the first user is a shared vehicle lending user, the second user is a shared vehicle actual renting user, the first user and the second user are both registered accounts of the shared vehicle renting platform, at this time, the first user can lend the shared vehicle for the second user, so that the related renting information is recorded in the registered account of the shared vehicle renting platform of the second user, the second user can still rent the shared vehicle in a state that the user terminal is unavailable, and the renting information is recorded in the account of the second user, thereby ensuring that the shared vehicle is not lost.
In addition, in other lease services, an operation that the first user leases as the second user can be implemented, in this embodiment, a service lease process based on credit is described by taking the target service as the charging device lease service as an example, and other scenarios can refer to the description contents related to this embodiment, which is not described herein in detail.
Specifically, when the user terminal is in a power-off state, the user cannot rent the mobile power supply to charge the user terminal, so that the experience effect of the user is affected to a great extent, at the moment, the second user can help to rent the mobile power supply by inviting the first user, the second user can also rent the mobile power supply to charge the user terminal under the condition that the user terminal cannot be used normally, and related rent information can also record a user account of the second user, so that the first user interest is guaranteed, meanwhile, help can be provided for the second user, and the experience effect of the second user is further improved.
It should be noted that the user terminal refers to a terminal device carried by a user, such as a mobile terminal device carried by the user, such as a smart phone and a personal computer, or a wearable device worn by the user, such as a smart watch, a smart bracelet, and smart glasses; correspondingly, the charging equipment is specifically a leasing equipment configured with a mobile power supply and a matched cabinet, and a user can perform a leasing operation by scanning an image identification code configured with the charging equipment.
Further, before receiving a proxy instruction submitted by a first user, a second user needs to invite the first user to perform an operation related to a proxy target service for the second user on the spot, and the first user will submit the proxy instruction, in this embodiment, a specific implementation manner of the process is as follows:
receiving a scanning instruction submitted by the first user;
calling the image acquisition interface to scan an image identification code based on the scanning instruction;
displaying a target service page corresponding to the target service containing the proxy control according to the scanning result;
correspondingly, the receiving of the agent instruction submitted by the first user for the target service includes:
and receiving the agent instruction submitted by the first user aiming at the agent control in the target business page.
Specifically, under the condition that a second user invites a first user to help the first user to lease the mobile power supply, it is indicated that the user terminal of the second user cannot normally perform lease operation at this time, so that the first user needs to be requested to help the first user to complete the lease operation, that is, under the condition that the first user agrees to help the second user to lease, a scanning instruction submitted by the first user is received, at this time, the user terminal calls an image acquisition interface to scan an image identification code configured on the charging equipment based on the scanning instruction, and displays a target service page corresponding to a target service including the proxy control according to the scanning result, and in the lease service of the charging equipment, the mobile power supply lease page including the proxy control is displayed through the user terminal of the first user according to the scanning result;
the agent control specifically means that the first user can trigger the control to perform subsequent agent processing, namely mobile power supply borrowing processing; based on this, when a first user triggers an agent control in the target service page, the first user agrees to borrow a mobile power supply for a second user, and then an agent instruction of the first user is received; in practical applications, the image identification code may be a two-dimensional code or a bar code, and other forms of images recording data symbol information, and this embodiment is not limited in any way herein.
For example, a user a is a mobile power supply lender, a user B is a mobile power supply actual lending party, the mobile phone is automatically turned off because the user B does not save the electric quantity of the mobile phone, and the user B rents the mobile power supply to a store configured with charging equipment at the moment;
at this time, the user a agrees to lend the mobile power supply to the user B, after the user a scans the two-dimensional code configured on the charging device, the mobile phone of the user a displays a page as shown in fig. 2 to the user, and the page has two controls of "borrowing the mobile power supply" and "borrowing by people" which can be touched, the "borrowing the mobile power supply" control means that the user a rents the mobile power supply for himself, and the "borrowing by people" control means that the user rents the mobile power supply for others; at this time, the user a needs to borrow the mobile power supply for the user B, and therefore the user a needs to click the "helper ta person borrowing" control to submit a borrowing instruction, so as to realize the subsequent operation of borrowing the mobile power supply.
By integrating the control for renting other people and the control for renting the user on the target service page, the first user can conveniently operate, meanwhile, the user can conveniently submit an agent instruction for other people, the subsequent borrowing operation is realized, and the experience effect of the second user is improved.
And step S104, calling an image acquisition interface to acquire an identity image of a second user according to the proxy instruction, and uploading a service proxy request carrying the identity image to a server.
Specifically, on the basis of receiving the agent instruction submitted by the first user, further, at this time, in order to implement an agent operation on the second user, it is necessary to acquire an identity image of the second user, and upload a service agent request to the server, so that the server can determine that the agent operation is an operation performed by the first user for the second user, so as to record related agent information on a user account of the second user, so that the first user plays a role in helping others in the agent process, so as to avoid reducing the willingness of the first user to help others to act.
In practical application, the image acquisition interface specifically refers to an acquisition module on the user terminal, and can acquire images and realize functions of shooting, recording and the like, because the proxy event information of this time needs to be recorded into the user account of the second user, the identity image of the second user needs to be acquired, and after the account of the second user is determined by the server, the subsequent proxy processing process can be carried out, and preliminary identity authentication can be realized, so that the situation that the user abuses proxy services is avoided.
Further, in the process of acquiring and uploading the identity image to the server, because the service processed by the server is more, in order to improve the processing efficiency, the feature extraction of the identity image features can be completed at the user terminal, and then the identity image features are uploaded to the server, so that the size of the data volume of the server can be reduced, and the processing effect of the server can be improved, thereby enabling the proxy processing to be completed quickly, further improving the experience effect of the user, and in the embodiment, the specific implementation manner is as follows:
displaying an image acquisition strategy through an image acquisition page based on the proxy instruction, and calling the image acquisition interface;
acquiring the identity image acquired by the image acquisition interface under the condition that the second user is subjected to image acquisition through the image acquisition interface based on an image acquisition strategy;
and extracting image features of the identity image to generate the service agent request, and uploading the service agent request to the server.
Specifically, the image acquisition policy specifically refers to guiding a user holding a user terminal to perform correct image acquisition, so that an agent processing process can be completed quickly, wherein an image acquisition page showing the image acquisition policy is shown in fig. 3, which facilitates acquisition of an identity image of a second user, where the identity image may be a face image or a whole-body image of the second user, and an image capable of determining identity information of the second user, and this embodiment is not limited herein;
based on the above, under the condition that the second user is subjected to image acquisition through the image acquisition interface based on an image acquisition strategy, the identity image acquired by the image acquisition module is acquired, then image features in the identity image are extracted to generate a service agent request, and finally the service agent request is sent to a server, and the server performs identity confirmation and subsequent agent processing processes.
Furthermore, when the server returns credit information and identity information for the identity image, which indicates that the second user meets the condition of participating in the target service, the following step S106 may be executed; and when the server returns an admission refusing prompt aiming at the identity image, which indicates that the second user does not meet the condition of participating in the target service, the first user cannot perform subsequent proxy operation on the second user, and the proxy operation is finished.
Along the above example, under the condition that the user a submits the borrowing instruction through the "person borrowing" control shown in fig. 2, the content shown in fig. 3 is displayed through the mobile phone of the user a, after the user a successfully collects the face image of the user B, a mobile power supply leasing request is generated based on the face image of the user B and sent to the server, whether the user B can lease the mobile power supply is detected by the server, and under the condition that the server issues the permission refusing reminder, the credit rating or credit score of the user B does not meet the condition of leasing the mobile power supply, the service that the user a uses the mobile power supply for the user B is finished.
In summary, by performing feature extraction on the identity image at the user terminal, the processing pressure of the server can be reduced, the efficiency of the proxy processing process can be further improved, and by sending the service proxy request to the server, the server can perform preliminary identity verification on the second user, so that the second user can be prevented from maliciously participating in the target service, and the security of the target service can be ensured.
And step S106, receiving the credit information and the identity information corresponding to the identity image issued by the server, generating an identity verification prompt containing the credit information, and displaying the identity verification prompt.
Specifically, after the service agent request carrying the identity image is uploaded to the server, if the server issues credit information and identity information at this time, and it is indicated that the second user is a credit user of the platform to which the server belongs, the identity verification reminder is generated based on the identity information and the credit information, and is displayed through the user terminal.
The credit information specifically refers to credit record information of the second user on a platform to which the server belongs, and may be credit points, credit levels or credit marks of the second user, where the higher the user credit is, the higher the corresponding credit point and credit level are, and conversely, the lower the user credit is, the lower the corresponding credit point and credit level are; the authentication prompt containing the credit information may be an authentication page as shown in fig. 4, or may also be an authentication audio or an authentication video, and a specific form of the authentication prompt may be set according to actual requirements, which is not described herein in detail.
It should be noted that the authentication prompt is to prompt the first user, the content of the second user, such as the credit information, and the like, and also to perform secondary authentication on the second user, when the authentication prompt is audio, the credit information of the second user is played through a playing interface of the user terminal, and secondary authentication is requested to be performed on the second user, or when the authentication prompt is a page, the credit information of the second user is displayed through the user terminal (as shown in fig. 4), and secondary authentication is requested to be performed on the second user; when the verification is passed, the second user can be subjected to proxy operation, so that acts such as fraud are avoided.
In practical application, the second user may be subjected to secondary identity authentication in a manner of inputting information to be authenticated, which is notified by the second user, for example, as shown in fig. 4, four digits after the mobile phone number of the second user needs to be input to determine whether the second user is a real user corresponding to the credit information and the identity information, or to input an identity code of the second user, or to input an account password of the second user, and the like, so that secondary identity authentication of the second user is achieved, and the security of a service scenario is further improved.
Further, in order to facilitate subsequent identity verification of the second user when receiving the credit information and the identity information returned by the server, an identity verification page is generated based on the credit information and the identity information, and then displayed through the user terminal, so that the first user can know the credit information of the second user and can also realize a verification process for the second user, in this embodiment, the specific implementation manner is as follows:
generating an identity verification page based on the credit information and the identity information;
and displaying the identity verification page.
Along the above example, when the server issues the credit score and the mobile phone number corresponding to the identity image, it is indicated that the information of the user B exists on the platform to which the server belongs, and at this time, an identity verification page for performing identity verification on the user B is generated based on the credit score and the mobile phone number, as shown in fig. 4, and then, identity verification can be performed according to the mobile phone number provided by the user B, so as to ensure that the user B acquiring the face image is a real user corresponding to the credit score and the mobile phone number.
The identity verification page is generated to verify the identity of the second user, so that the second user can be effectively prevented from cheating through the first user, the safety of the target service is further ensured, the identity information of the second user is displayed to the first user through the identity verification page, the first user can know the credit state of the second user, and whether the second user performs proxy processing or not can be determined.
And S108, performing identity verification according to the information to be verified and the identity information which are input aiming at the identity verification prompt.
Specifically, on the basis of the above-mentioned displaying of the authentication prompt, further, at this time, the second user is subjected to identity verification, and the second user is required to provide a manner of comparing information to be verified with identity information to realize the identity verification of the second user, in practical application, the information to be verified refers to information of the same type as the identity information, for example, the identity information issued by the server is an identity code, the entered information to be verified is the identity code provided by the second user at this time, or the identity information issued by the server is a mobile phone number, and the entered information to be verified is the mobile phone number provided by the second user at this time.
It should be noted that, in the process of entering the information to be verified, the first user may enter the information or the second user may enter the information, which is not limited herein.
Further, in the process of performing identity verification, in order to achieve rapid completion of identity verification and improve the proxy processing efficiency for the target service, the identity verification of the second user may be achieved by extracting the verification features of the identity information and the information to be verified respectively and then comparing the verification features, and in this embodiment, the specific implementation manner is as follows:
receiving the information to be verified input through the identity verification page;
extracting a first verification feature in the information to be verified and a second verification feature in the identity information;
and performing identity verification on the second user in a mode of matching the first verification characteristic with the second verification characteristic.
In practical application, the first verification feature specifically refers to a verification feature in the information to be verified, and the second verification feature specifically refers to a verification feature in the identity information, wherein the first verification feature and the second verification feature are of the same type, and through consistency of the first verification feature and the second verification feature, whether a second user is a real user corresponding to the identity information can be detected, so that security of a target service scene is improved.
According to the above example, after the user A determines that the credit integral of the user B is 667 points, the user A decides to borrow the mobile power supply for the user B, at this time, the user B is subjected to identity verification to obtain the last four digits of the mobile phone number of the user B, then the last four digits of the mobile phone number of the user B are input into an identity verification page, at this time, the user terminal compares the last four digits of the input mobile phone number with the mobile phone number issued by the server, and therefore whether the user B is a real user corresponding to the credit information is determined.
The second authentication is performed in a mode of performing the authentication on the second user, so that the security of a target service scene can be effectively improved, and the accuracy of the authentication on the second user can be effectively improved by performing the authentication in a mode of respectively extracting the first authentication features of the information to be authenticated and matching the second authentication features of the identity information.
Step S110, when the identity verification passes, uploading the proxy processing information for the second user to the server, and receiving a proxy processing result sent by the server.
Specifically, on the basis of performing identity verification on the second user based on the information to be verified and the identity information, if the identity verification fails, it is indicated that the second user is not the true user corresponding to the identity information, and no processing is performed; if the identity verification passes, proxy processing information for the second user can be uploaded to the server at the moment, wherein the proxy processing information specifically refers to relevant information that the first user agrees to perform proxy participation on the second user in the target service, and in a charging equipment leasing service, the proxy processing information is relevant information that the first user agrees to help the second user to lease the mobile power supply; and receiving an agent processing result returned by the server, wherein the agent processing result is a leasing result that the second user successfully participates in the target service, and in a charging equipment leasing service, the second user can lease the mobile power supply through the charging equipment, namely the server sends a leasing agreement instruction to the charging equipment.
Further, in the process of uploading the agent processing information to the server, the information that the identity verification passes is firstly displayed to the first user through the user terminal, and then the agent processing information is sent to the server based on the instruction of the first user, in this embodiment, the specific implementation manner is as follows:
displaying the core passing information to the first user;
receiving an agent confirmation instruction submitted by the first user aiming at the core body through information;
generating the agent processing information for acting the second user to process the target service according to the agent confirmation instruction;
and uploading the agent processing information to the server.
In practical application, when the second user passes identity verification, it is indicated that the second user is a real user corresponding to identity information, at this time, core-body passing information is displayed to the first user through a user terminal, and then, when a proxy confirmation instruction submitted by the first user for the core-body passing information is received, it is indicated that the first user agrees that the second user proxy participates in the target service, proxy processing information for proxying the second user to process the target service is generated based on the proxy confirmation instruction, and the proxy processing information is uploaded to the server.
Along the use example, when four digits after the mobile phone number provided by the user B is input are the same as the mobile phone number issued by the server, the user B is a real user corresponding to the mobile phone number, the core passing information of the user B is displayed through the mobile phone of the user A, the generation borrowing mobile power information generated based on the generation borrowing mobile power instruction is sent to the server under the condition that the user A submits the generation borrowing mobile power instruction of the user B aiming at the core passing information, and the server issues a confirmation providing mobile power instruction to the charging equipment, so that the user B can rent the mobile power in a mode of requesting help of other people under the condition that the mobile phone is not powered on.
In addition, in order to stimulate more first users to help the second user perform the proxy operation, after the second user completes the service operation corresponding to the target service, resource allocation may be provided for the first user, so that more first users may appear to improve the coverage of the target service scenario, in this embodiment, the specific implementation manner is as follows:
receiving a resource allocation reminder issued by the server under the condition that an agent event condition including the second user triggers an agent event ending condition;
wherein the proxy event is an event that the first user proxies the second user to process the target service; and the resource allocation prompt is generated by allocating resources obtained by calculation according to the processing time of the agent event and the resource rate.
Specifically, under the condition that the proxy event of the second user is triggered to end the proxy event is included, it is indicated that the second user completes the operation of the target service at this time, the server calculates the allocation resources according to the processing time and the resource rate of the second user for the target service, and transfers the allocation resources to the user account of the first user, and at this time, the resource allocation reminder issued by the server is received.
In practical application, the allocated resource may be credit or fund, the allocated resource may be calculated according to a preset resource rate, processing time of the second user and credit or fund spent by the second user, and correspondingly, the proxy event is specifically recorded in a user account of the second user, and an event generated by the proxy processing operation is specific to the event, for example, in a charging device leasing service, the user a has lent the mobile power supply for the user B, at this time, the service end generates a leasing event that the user B has lent the mobile power supply and records the leasing event into the user account of the user B, and the subsequent returning of the mobile power supply also requires the user B to return, and the generated cost is assumed by the user B.
It should be noted that, the calculation of the allocated resources is that the value of the fund to be paid to the user a may be calculated according to the usage cost and the usage time of the user B and a preset rate, for example, the cost of renting the mobile power supply is 2 yuan, the usage time is 60 minutes, and the rate is 0.5%, and it is determined through calculation that the cost to be paid to the user a by the user B is 2 × 60 × 0.5% =0.6 yuan, and at this time, the service end may transfer 0.6 yuan from the payment account of the user B to the payment account of the user a, and may send a reminder message to the mobile phone of the user a.
In summary, by issuing and allocating resources to the first user by the second user under the condition of triggering the end agent event of the agent event, more users can be stimulated to serve as the first user, more second users are helped, and the coverage of the target service can be effectively improved.
The credit-based service agent method provided by the specification comprises the steps of receiving an agent instruction of a first user, calling an image acquisition interface to acquire an identity image of a second user, uploading a service agent request to a server, displaying an authentication prompt containing credit information at a user terminal according to the credit information and the identity information returned by the server, verifying the identity of the second user according to information to be verified and the identity information input according to the authentication prompt, sending agent processing information for the second user to the server after the verification is passed, and receiving an agent processing result returned by the server.
Corresponding to the above method embodiment, the present specification further provides an embodiment of a credit-based service broker apparatus, and fig. 5 shows a schematic structural diagram of a credit-based service broker apparatus provided in an embodiment of the present specification, which is applied to a user terminal, and as shown in fig. 5, the apparatus includes:
a receive instruction module 502 configured to receive an agent instruction submitted by a first user for a target service;
the uploading request module 504 is configured to invoke an image acquisition interface to acquire an identity image of a second user according to the proxy instruction, and upload a service proxy request carrying the identity image to a server;
a display reminding module 506, configured to receive credit information and identity information corresponding to the identity image sent by the server, generate an authentication reminding containing the credit information, and display the authentication reminding;
an identity verification module 508 configured to perform identity verification according to the information to be verified and the identity information entered for the identity verification reminder;
a result receiving module 510, configured to upload, to the server, the proxy processing information for the second user and receive a proxy processing result sent by the server, when the identity verification passes.
In an optional embodiment, the receive result module 510 includes:
a core passage information display unit configured to display core passage information to the first user;
a receiving agent confirmation instruction unit configured to receive an agent confirmation instruction submitted by the first user for the core through information;
a generation agent processing information unit configured to generate the agent processing information for acting the second user to process the target service according to the agent confirmation instruction;
an upload agent processing information unit configured to upload the agent processing information to the server.
In an optional embodiment, the credit-based service broker apparatus further includes:
a resource allocation reminding module configured to receive a resource allocation reminder issued by the server under the condition that an agent event condition including the agent event trigger end of the second user is included;
wherein the proxy event is an event that the first user proxies the second user to process the target service; and the resource allocation prompt is generated by allocating resources obtained by calculation according to the processing time of the agent event and the resource rate.
In an optional embodiment, the credit-based service broker apparatus further includes:
a scan instruction receiving module configured to receive a scan instruction submitted by the first user;
a scanning image identification code module configured to invoke the image acquisition interface to scan an image identification code based on the scanning instruction;
the target service page display module is configured to display a target service page corresponding to the target service containing the proxy control according to the scanning result;
accordingly, the receive instruction module 502 is further configured to:
and receiving the agent instruction submitted by the first user aiming at the agent control in the target business page.
In an optional embodiment, the credit-based service broker apparatus further includes:
and the admission refusing reminding module is configured to receive the admission refusing reminding that the second user sent by the server does not conform to the target service.
In an optional embodiment, the upload request module 504 includes:
an image acquisition interface unit is called and configured to show an image acquisition strategy through an image acquisition page based on the proxy instruction and call the image acquisition interface;
an identity image acquiring unit configured to acquire the identity image acquired by the image acquisition interface in a case where the second user is image-acquired through the image acquisition interface based on an image acquisition policy;
and the service agent generation request unit is configured to extract the image characteristics of the identity image to generate the service agent request and upload the service agent request to the server.
In an alternative embodiment, the display alert module 506 includes:
an authentication page generation unit configured to generate an authentication page based on the credit information and the identity information;
and displaying an authentication page configured to display the authentication page.
In an optional embodiment, the identity verification module 508 includes:
a unit for receiving information to be verified, configured to receive the information to be verified entered through the authentication page;
an authentication feature extraction unit configured to extract a first authentication feature in the information to be authenticated and a second authentication feature in the identity information;
and the matching unit is configured to perform identity verification on the second user in a mode of matching the first verification characteristic with the second verification characteristic.
In an optional embodiment, in a case that the target service is a charging device lease service, the method includes: the agent instruction is a charging equipment borrowing instruction, and the service agent request is a charging equipment borrowing request; correspondingly, the proxy processing information is charging equipment borrowing information, and the proxy processing result is a charging equipment borrowing result.
The credit-based service agent device provided by this embodiment receives an agent instruction of a first user, calls an image acquisition interface to acquire an identity image of a second user, uploads a service agent request to a server, displays an authentication prompt including credit information at a user terminal according to the credit information and the identity information returned by the server, performs identity verification of the second user according to information to be verified and the identity information entered according to the authentication prompt, sends agent processing information for the second user to the server after the verification is passed, and receives an agent processing result returned by the server.
The above is an exemplary scheme of a credit-based service broker apparatus according to this embodiment. It should be noted that the technical solution of the credit-based service broker apparatus and the technical solution of the credit-based service broker method belong to the same concept, and details of the technical solution of the credit-based service broker apparatus, which are not described in detail, can be referred to the description of the technical solution of the credit-based service broker method.
Fig. 6 is a flowchart illustrating another credit-based service brokering method according to an embodiment of the present disclosure, which is applied to a server, and specifically includes the following steps:
step S602, receiving a service agent request uploaded by the user terminal for the target service.
In practical application, the user demands for the user terminal are getting larger, and many online services or offline services can be completed only by the cooperation of the user terminal, such as code scanning payment and instant messaging; however, in a scene that a user goes out, the user often meets the requirement that the user terminal needs to be charged due to insufficient electric quantity, and the user can rent the mobile power supply to charge through stores configured with the mobile power supply and a matched cabinet so as to solve the problem; however, when the user terminal is not powered on and cannot be started normally, the operation of renting the mobile power supply by the user can not be realized, so that the user cannot normally participate in some target services, and if the user cannot pay, the user cannot rent the mobile power supply; therefore, how to effectively solve the problem that the user can participate in the target service even in the state that the user terminal is not powered on is important.
In order to enable a second user to still participate in a target service in a state where no user terminal is available, after receiving a service agent request uploaded by a user terminal for the target service, a credit information and an identity information corresponding to an identity image included in the service agent request are determined and sent to the user terminal, and then it is determined that the first user agrees to the second user agent to process the target service based on the agent processing information uploaded by the user terminal, then agent event information is generated according to the agent processing information and recorded in a user account of the second user, and an agent processing result is sent to the user terminal after sending an agent confirmation instruction to the service device, so that the second user can participate in the target service in a manner of assisting the first user, and identity verification can be performed on the second user through the credit information and the identity information, therefore, the safety of the target service scene can be ensured, and the experience effect of the second user is further improved.
It should be noted that, the credit-based service agent method applied to the server and the credit-based service agent method applied to the user terminal are mutually matched, so that the first user can help the second user to participate in the target service.
In this embodiment, still taking a target service as a lease service of a charging device as an example, a description is performed on a credit-based service agent applied to a server, where the target service is a lease service of the charging device, the method includes: the service agent request is a charging equipment borrowing request; correspondingly, the proxy processing information is charging equipment borrowing information, the confirmation proxy instruction is a confirmation borrowing instruction, and the proxy processing result is a charging equipment borrowing result.
In addition, under the condition that a service agent request uploaded by a user terminal is received, at this time, it is stated that a first user helps a second user borrow a mobile power supply, so preliminary identity verification needs to be performed according to an identity image carried in the service agent request to determine whether the second user registers an account on a payment platform corresponding to a server, and in this embodiment, the specific implementation manner is as follows:
querying an attribute database based on the identity image contained in the service agent request;
determining the credit information and the identity information according to the query result;
judging whether the credit information accords with the service processing condition of the target service;
if not, generating an admission refusing prompt according to the judgment result, and issuing the admission refusing prompt to the user terminal;
if yes, the following step S604 is executed.
In practical application, the attribute database is specifically used for storing attribute data of all users in a platform corresponding to a server, the attribute data may include identity information, credit information, personal information and the like of each user, at this time, the attribute database is queried based on an identity image included in a service agent request submitted by a user terminal, and under the condition that the credit information and the identity information corresponding to the identity image are determined according to a query result, service processing conditions can be judged for the user corresponding to the identity information at this time;
and judging whether the user can participate in the target service, if so, indicating that the user accords with participating in the target service, executing the following step S604, otherwise, indicating that the user does not accord with participating in the target service, generating an admission refusing prompt according to a judgment result, and sending the admission refusing prompt to the user terminal.
For example, the user a submits a mobile power supply borrowing request for the user B, the server queries the attribute database according to the identity image contained in the request, determines that the credit score of the user B is 300 points according to the query result, and leases the mobile power supply under the condition that the credit score reaches 600 points, and can lease the mobile power supply, and determines that the user B does not meet the condition of leasing the mobile power supply through comparison, and then sends a reminder that the mobile power supply cannot be borrowed for the user B to the mobile phone of the user a, and the reminder carries the reason why the mobile power supply cannot be borrowed.
The credit information is read based on the identity image contained in the service agent request, and the primary credit verification is carried out on the credit information, so that the safety of a target service scene can be effectively improved, and the problem of target service loss caused by malicious operation of an abnormal user is avoided.
Step S604, determining the credit information and the identity information corresponding to the identity image included in the service agent request, and issuing the credit information and the identity information to the user terminal.
Specifically, under the condition that the service agent request is received, at this time, the credit information and the identity information corresponding to the identity image are determined according to the service agent request and are sent to the user terminal for the first user to watch, so that the credit information of the second user can be known while the identity of the second user is verified, and the first user can more conveniently perform subsequent agent processing operation.
Further, in the process of issuing the identity information and the credit information to the user terminal, in order to ensure the security of the target service scene, a second user corresponding to the identity image may be preliminarily detected, and in this embodiment, the specific implementation manner is as follows:
analyzing the service agent request to obtain image characteristics corresponding to the identity image;
querying an attribute database based on the image features to obtain the credit information and the identity information corresponding to the image features;
judging whether the credit information accords with the service processing condition of the target service;
and if so, issuing the credit information and the identity information to the user terminal.
In practical application, under the condition that the service agent request uploaded by the user terminal is received, the service agent request needs to be analyzed, and image characteristics corresponding to the identity image are obtained; then inquiring an attribute database based on the image characteristics to obtain the credit information and the identity information corresponding to the image characteristics, and judging whether the credit information meets the service processing conditions of the target service; if so, it is only required to send the credit information and the identity information to the user terminal, which indicates that a second user corresponding to the identity information can participate in the target service.
Along the use example, a user A submits a mobile power supply borrowing request for a user B, at the moment, a server side inquires an attribute database according to an identity image contained in the request, the credit score of the user B is 667 points according to the inquiry result, the condition for renting the mobile power supply is that the credit score reaches 600 points, and the credit information and the identity information of the user B are sent to a mobile phone of the user A after the user B is determined to be in accordance with the condition for renting the mobile power supply through comparison, so that the user A is reminded whether to rent the mobile power supply for the user B.
The credit information is read through the image characteristics contained in the service agent request, and the primary credit verification is carried out on the credit information, so that the safety of a target service scene can be effectively improved, and the problem of target service loss caused by malicious operation of an abnormal user is avoided.
Step S606, receiving the proxy processing information uploaded by the user terminal, and generating proxy event information corresponding to the target service.
Specifically, under the condition that the identity information and the credit information are issued to the user terminal, it is described that the second user meets the condition for renting the mobile power supply, at this time, if the proxy processing information uploaded by the user terminal is received, it is described that the first user agrees to the fact that the second user rents the mobile power supply, proxy event information is generated based on the proxy processing information, so as to be recorded in a user account of the second user, it is indicated that the second user rents the mobile power supply, and the first user plays a role in helping others in the renting process.
Step S608, recording the proxy event information to the user account corresponding to the identity information, and issuing a proxy confirmation instruction to the service device to which the target service belongs.
Specifically, on the basis of the generation of the proxy event information corresponding to the target service, the proxy event information is further recorded to a user account corresponding to the identity information, and since the identity information is information of a second user, the proxy event information is recorded to the user account of the second user at this time, and a confirmation proxy instruction is issued to the service device of the target service.
In this embodiment, the service device starts a target service based on the confirmation agent instruction, and performs service reminding according to a start result.
In practical application, in the renting service of the charging equipment, the service equipment is specifically charging equipment providing a mobile power supply, the confirmation proxy instruction is an instruction for popping up the mobile power supply to the charging equipment, and at this time, the charging equipment can select any available mobile power supply to pop up for a second user to use.
Step S610, generating an agent processing result according to the recording result and the confirmation agent command, and sending the agent processing result to the user terminal.
Specifically, on the basis of the recording of the agent event information and the issuing of the confirmation agent instruction, an agent processing result generated according to the recording result and the confirmation agent instruction is further issued to the user terminal to remind the first user and the second user that the charging device has provided the mobile power supply, and the mobile power supply can be taken away to charge the user terminal of the second user.
Further, after the second user returns the portable power source borrowed by the first user, in order to stimulate more users as the first user to help other users, the resource may be allocated to the first user in a paid manner, in this embodiment, the specific implementation manner is as follows:
under the condition that an agent event corresponding to the agent event information triggers an agent event ending condition, determining the processing time and the resource rate of the agent event;
determining a value of allocated resources based on the processing time and the resource rate, and determining a user account of a first user to which the user terminal belongs;
and transferring the allocated resources corresponding to the allocated resource numerical value from the user account of the second user to the user account of the first user, issuing a resource allocation prompt to the user terminal, and sending an agent event end prompt to the second user terminal of the second user.
In practical application, the condition that the agent event triggers the agent event ending is possible in two ways, the first way is that when a second user returns the mobile power supply, the second user scans an image identification code to return the mobile power supply, at the moment, the second user returns the mobile power supply by scanning the image identification code, the server can determine that the second user returns the mobile power supply according to a scanning instruction of the second user, at the moment, the agent event ending condition triggered by the agent event that the second user participates in can be determined, and subsequent resource allocation can be carried out;
the other is that when the second user returns the mobile power supply, the charging device may recognize that the mobile power supply returned by the second user is the rented mobile power supply, at this time, the charging device may send the returned information of the mobile power supply to the server, and the server may determine that the second user who rents the mobile power supply returns the mobile power supply according to the information, and then perform subsequent resource allocation.
Based on this, the processing time and the resource rate of the proxy event are determined at this time, the allocated resource value allocated to the first user is determined based on the processing time and the resource rate, the user account of the first user is determined at the same time, then the allocated resource corresponding to the allocated resource value is transferred from the user account of the second user to the user account of the first user, and in order to facilitate the user to know the reminding information triggered by the process, the resource allocation reminder is sent to the user terminal of the first user, and the proxy event end reminder is sent to the second user terminal of the second user.
Along the above example, after the user B uses the mobile power supply for 60 minutes for returning, the user B is identified to return the mobile power supply, the use time is 60 minutes, the preset rate is 0.5%, and the use cost is 2 yuan, and the fund allocated to the user a is determined to be 0.6 yuan through calculation, then the user B can transfer 0.6 yuan to the payment account of the user a from the payment account of the user B, meanwhile, the user a is sent with the borrowing cost information of 0.6 yuan paid by the user B for borrowing the mobile power supply to the user B, and the user B is sent with the mobile power supply returning success, and the user a is paid with the borrowing cost information of 0.6 yuan.
By paying the agent fee to the first user by the second user, more users can be effectively stimulated to serve as the first user to provide help for other users, and the problem that the user terminal of the user borrows the mobile power supply under the power-free state is solved in a wider range.
Furthermore, after the server issues the proxy processing result, the reward may be given according to the mobile power supply returned by the second user in time, in this embodiment, the specific implementation manner is as follows:
calculating a target credit score corresponding to the proxy event according to the processing time;
adding the target credit point to a base credit point of the user account of the second user.
Actually, in the above example, the basic credit score of the user B is 667 points, when the user B returns the mobile power supply for 60 minutes, it is determined through calculation that the user B returns the mobile power supply on time, and the credit is better, a target credit score of 2 points can be added to the user B, so the credit score after the user B returns the mobile power supply is 669 points.
Another credit-based service agent method provided in this specification, after receiving a service agent request uploaded by a user terminal for a target service, determines credit information and identity information corresponding to an identity image included in the service agent request, and issues the credit information and the identity information to the user terminal, and then determines that a first user agrees to a second user to process the target service on the basis of agent processing information uploaded by the user terminal, generates agent event information according to the agent processing information and records the agent event information to a user account of the second user, and issues an agent confirmation instruction to a service device, and then issues an agent processing result to the user terminal, so that the second user can participate in the target service in a manner of assisting the first user, and can perform identity verification on the second user through the credit information and the identity information, thereby ensuring the security of a target service scene, the experience effect of the second user is further improved.
The credit-based service brokering method provided in this specification will be further described below with reference to fig. 7, taking as an example the application of the credit-based service brokering method in a lease service of a charging device. Fig. 7 shows a processing flow chart of a credit-based service brokering method applied to a charging device lease service according to an embodiment of the present specification, which specifically includes the following steps:
in step S702, the user terminal receives a scan instruction submitted by the borrower.
Specifically, the mobile phone of the actual user cannot rent the mobile power supply for charging because the mobile phone is powered off in the absence of electricity, and at the moment, the user is invited to help borrow the mobile power supply.
Step S704, the user terminal calls the image capture interface to scan the image identification code based on the scan command.
Step S706, the user terminal displays a lease page containing a mobile power supply for borrowing to the borrowing user according to the scanning result.
Step S708, the borrowing user submits a borrowing instruction through the renting page displayed by the user terminal.
Step S710, the user terminal calls an image acquisition interface to acquire the identity image of the actual user according to the borrowing instruction.
Step S712, the user terminal sends a mobile power supply borrowing request carrying an identity image to the server.
In step S714, the server receives the mobile power supply borrowing request, and analyzes the mobile power supply borrowing request to obtain the identity image.
Step S716, the server queries the attribute database based on the identity image to obtain the credit information and the identity information.
In step S718, the server determines whether the credit information meets a lease condition for leasing the portable power source.
Step S720, the server side sends the identity information and the credit information to the user terminal under the condition that the server side judges that the lease condition is met.
In step S722, the user terminal receives the credit information and the identity information, and generates an identity verification page.
Step S724, the user terminal displays the authentication page to the borrowing user.
In step S726, the user terminal receives the information to be verified, which is submitted through the authentication page by the borrower.
In step S728, the user terminal performs identity verification on the actual user according to the information to be verified and the identity information.
And step S730, the user terminal displays the verification result to the borrowing user under the condition that the verification of the actual user identity is passed.
In step S732, the borrowing user submits a confirmation borrowing instruction to the user terminal based on the verification result.
In step S734, the user terminal will send the borrowing mobile power information to the user terminal based on the confirmed borrowing instruction.
In step S736, the server receives the borrowing event information, and records the borrowing event information generated based on the borrowing event information to the user account of the actual user.
In step S738, the server sends an instruction for confirming renting the mobile power supply to the charging device, and sends a processing result of the borrowing mobile power supply to the user terminal.
In step S740, the user terminal displays the borrowing mobile power source processing result to the borrowing user.
In addition, after the actual user returns the mobile power supply, a certain payment fee is transferred to the borrowing user according to the fee rate, the using time and the using fee of the borrowing user, so that more users are stimulated to serve as the borrowing user to provide help for more actual users.
The credit-based service agent method provided by the specification comprises the steps of acquiring an identity image of a second user by calling an image acquisition interface after an agent instruction of a first user is received, uploading a service agent request to a server, determining identity information and credit information according to the request and transmitting the identity information and the credit information back to a user terminal by the server, carrying out identity verification of the second user according to information to be verified and the identity information which are input aiming at the identity verification prompt under the condition that the user terminal displays the identity verification prompt containing the credit information, transmitting agent processing information aiming at the second user to the server after the verification is passed, transmitting a confirmation agent instruction to service equipment by the server according to the agent processing information and transmitting an agent processing result back to the user terminal, and realizing that the participation of the target service can be helped by inviting the first user under the condition that the second user can not normally participate in the target service through the user terminal, and the agent event information of the second user is recorded in the user account of the second user, so that the user terminal of the second user can participate in the target service under the condition that the user terminal cannot be normally used, and the experience effect of the second user is further improved.
Corresponding to the above method embodiment, the present specification further provides another credit-based service broker apparatus embodiment, and fig. 8 shows a schematic structural diagram of another credit-based service broker apparatus provided in an embodiment of the present specification, and is applied to a server; as shown in fig. 8, the apparatus includes:
a receiving agent request module 802 configured to receive a service agent request uploaded by a user terminal for a target service;
an information issuing module 804 configured to determine credit information and identity information corresponding to the identity image included in the service agent request, and issue the credit information and the identity information to the user terminal;
an event information generating module 806, configured to receive the proxy processing information uploaded by the user terminal, and generate proxy event information corresponding to the target service;
a record event information module 808, configured to record the proxy event information to a user account corresponding to the identity information, and issue a confirmation proxy instruction to a service device to which the target service belongs;
and the issuing processing result module 810 is configured to generate an agent processing result according to the recording result and the confirmation agent instruction and issue the agent processing result to the user terminal.
In an optional embodiment, the credit-based service broker apparatus further includes:
the determining module is configured to determine the processing time and the resource rate of the proxy event under the condition that the proxy event corresponding to the proxy event information triggers the proxy event ending condition;
a determine allocated resource value module configured to determine an allocated resource value based on the processing time and the resource rate, and to determine a user account of a first user to which the user terminal belongs;
and the sending reminding module is configured to transfer the allocated resources corresponding to the allocated resource numerical values from the user account of the second user to the user account of the first user, issue a resource allocation reminder to the user terminal, and send an agent event end reminder to the second user terminal of the second user.
In an optional embodiment, the information issuing module 804 includes:
the analysis unit is configured to analyze the service agent request to obtain image characteristics corresponding to the identity image;
the query unit is configured to query an attribute database based on the image features, and obtain the credit information and the identity information corresponding to the image features;
the judging unit is configured to judge whether the credit information meets the service processing condition of the target service;
and if so, operating an issuing unit, wherein the issuing unit is configured to issue the credit information and the identity information to the user terminal.
In an optional embodiment, the credit-based service broker apparatus further includes:
a query module configured to query an attribute database based on an identity image contained in the service agent request;
a determination module configured to determine the credit information and the identity information according to a query result;
the judging module is configured to judge whether the credit information meets the service processing condition of the target service;
and if not, operating an issuing reminding module, wherein the issuing reminding module is configured to generate an admission refusing reminding according to the judgment result and issues the admission refusing reminding to the user terminal.
In an optional embodiment, the credit-based service broker apparatus further includes:
a credit point calculation module configured to calculate a target credit point corresponding to the proxy event according to the processing time;
a credit point increase module configured to increase the target credit point over a base credit point of a user account of the second user.
In an optional embodiment, the service device starts a target service based on the confirmation proxy instruction, and performs service reminding according to a start result.
In an optional embodiment, in a case that the target service is a charging device lease service, the method includes: the service agent request is a charging equipment borrowing request; correspondingly, the proxy processing information is charging equipment borrowing information, the confirmation proxy instruction is a confirmation borrowing instruction, and the proxy processing result is a charging equipment borrowing result.
The credit-based service agent apparatus provided in this embodiment, after receiving a service agent request uploaded by a user terminal for a target service, determines credit information and identity information corresponding to an identity image included in the service agent request, and issues the credit information and the identity information to the user terminal, and then determines that a first user agrees to a second user to process the target service by proxy based on proxy processing information uploaded by the user terminal, generates proxy event information according to the proxy processing information and records the proxy event information to a user account of the second user, and issues a confirmation proxy instruction to a service device, and then issues a proxy processing result to the user terminal, so that the second user can participate in the target service in a manner of assisting the first user, and can perform identity verification on the second user through the credit information and the identity information, thereby ensuring security of a target service scenario, the experience effect of the second user is further improved.
The above is an exemplary scheme of another credit-based service broker apparatus according to this embodiment. It should be noted that the technical solution of the credit-based service broker apparatus and the technical solution of the another credit-based service broker method belong to the same concept, and details of the technical solution of the credit-based service broker apparatus, which are not described in detail, can be referred to the description of the technical solution of the another credit-based service broker method.
Fig. 9 illustrates a block diagram of a computing device 900 provided in accordance with an embodiment of the present description. Components of the computing device 900 include, but are not limited to, a memory 910 and a processor 920. The processor 920 is coupled to the memory 910 via a bus 930, and a database 950 is used to store data.
Computing device 900 also includes access device 940, access device 940 enabling computing device 900 to communicate via one or more networks 960. Examples of such networks include the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet. Access device 940 may include one or more of any type of network interface (e.g., a Network Interface Card (NIC)) whether wired or wireless, such as an IEEE802.11 Wireless Local Area Network (WLAN) wireless interface, a worldwide interoperability for microwave access (Wi-MAX) interface, an ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the above-described components of computing device 900, as well as other components not shown in FIG. 9, may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device architecture shown in FIG. 9 is for purposes of example only and is not limiting as to the scope of the description. Those skilled in the art may add or replace other components as desired.
Computing device 900 may be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), a mobile phone (e.g., smartphone), a wearable computing device (e.g., smartwatch, smartglasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 900 may also be a mobile or stationary server.
Wherein, the processor 920 is configured to execute the following computer-executable instructions:
receiving an agent instruction submitted by a first user aiming at a target service;
calling an image acquisition interface to acquire an identity image of a second user according to the proxy instruction, and uploading a service proxy request carrying the identity image to a server;
receiving credit information and identity information corresponding to the identity image issued by the server, generating an identity verification prompt containing the credit information and displaying the identity verification prompt;
performing identity verification according to the information to be verified and the identity information which are input aiming at the identity verification prompt;
and under the condition that the identity verification is passed, uploading agent processing information aiming at the second user to the server, and receiving an agent processing result sent by the server.
The above is an illustrative scheme of a computing device of the present embodiment. It should be noted that the technical solution of the computing device and the technical solution of the credit-based service brokering method belong to the same concept, and details that are not described in detail in the technical solution of the computing device can be referred to the description of the technical solution of the credit-based service brokering method.
FIG. 10 illustrates a block diagram of another computing device 1000 provided in accordance with an embodiment of the present description. The components of the computing device 1000 include, but are not limited to, memory 1010 and a processor 1020. The processor 1020 is coupled to the memory 1010 via a bus 1030 and the database 1050 is used to store data.
Computing device 1000 also includes access device 1040, access device 1040 enabling computing device 1000 to communicate via one or more networks 1060. Examples of such networks include the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet. Access device 1040 may include one or more of any type of network interface, e.g., a Network Interface Card (NIC), wired or wireless, such as an IEEE802.11 Wireless Local Area Network (WLAN) wireless interface, a worldwide interoperability for microwave access (Wi-MAX) interface, an ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the above-described components of computing device 1000 and other components not shown in FIG. 10 may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device architecture shown in FIG. 10 is for purposes of example only and is not limiting as to the scope of the present description. Those skilled in the art may add or replace other components as desired.
Computing device 1000 may be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), a mobile phone (e.g., smartphone), a wearable computing device (e.g., smartwatch, smartglasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 1000 may also be a mobile or stationary server.
Wherein, the processor 1020 is configured to execute the following computer-executable instructions:
receiving a service agent request uploaded by a user terminal aiming at a target service;
determining credit information and identity information corresponding to the identity image contained in the service agent request, and issuing the credit information and the identity information to the user terminal;
receiving agent processing information uploaded by the user terminal, and generating agent event information corresponding to the target service;
recording the proxy event information to a user account corresponding to the identity information, and issuing a proxy confirmation instruction to the service equipment to which the target service belongs;
and generating an agent processing result according to the recording result and the agent confirmation instruction and sending the agent processing result to the user terminal.
The above is an illustrative scheme of another computing device of the present embodiment. It should be noted that the technical solution of the computing device and the technical solution of the another credit-based service brokering method belong to the same concept, and details that are not described in detail in the technical solution of the computing device can be referred to the description of the technical solution of the another credit-based service brokering method.
An embodiment of the present specification also provides a computer readable storage medium storing computer instructions that, when executed by a processor, are operable to:
receiving an agent instruction submitted by a first user aiming at a target service;
calling an image acquisition interface to acquire an identity image of a second user according to the proxy instruction, and uploading a service proxy request carrying the identity image to a server;
receiving credit information and identity information corresponding to the identity image issued by the server, generating an identity verification prompt containing the credit information and displaying the identity verification prompt;
performing identity verification according to the information to be verified and the identity information which are input aiming at the identity verification prompt;
and under the condition that the identity verification is passed, uploading agent processing information aiming at the second user to the server, and receiving an agent processing result sent by the server.
The above is an illustrative scheme of a computer-readable storage medium of the present embodiment. It should be noted that the technical solution of the storage medium and the technical solution of the credit-based service brokering method belong to the same concept, and details that are not described in detail in the technical solution of the storage medium can be referred to the description of the technical solution of the credit-based service brokering method.
An embodiment of the present specification also provides another computer-readable storage medium storing computer instructions that, when executed by a processor, are operable to:
receiving a service agent request uploaded by a user terminal aiming at a target service;
determining credit information and identity information corresponding to the identity image contained in the service agent request, and issuing the credit information and the identity information to the user terminal;
receiving agent processing information uploaded by the user terminal, and generating agent event information corresponding to the target service;
recording the proxy event information to a user account corresponding to the identity information, and issuing a proxy confirmation instruction to the service equipment to which the target service belongs;
and generating an agent processing result according to the recording result and the agent confirmation instruction and sending the agent processing result to the user terminal.
The above is an illustrative scheme of another computer-readable storage medium of the present embodiment. It should be noted that the technical solution of the storage medium and the technical solution of the another credit-based service brokering method belong to the same concept, and details that are not described in detail in the technical solution of the storage medium can be referred to the description of the technical solution of the another credit-based service brokering method.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The computer instructions comprise computer program code which may be in the form of source code, object code, an executable file or some intermediate form, or the like. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
It should be noted that, for the sake of simplicity, the foregoing method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present disclosure is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present disclosure. Further, those skilled in the art should also appreciate that the embodiments described in this specification are preferred embodiments and that acts and modules referred to are not necessarily required for this description.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The preferred embodiments of the present specification disclosed above are intended only to aid in the description of the specification. Alternative embodiments are not exhaustive and do not limit the invention to the precise embodiments described. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the specification and its practical application, to thereby enable others skilled in the art to best understand the specification and its practical application. The specification is limited only by the claims and their full scope and equivalents.
Claims (22)
1. A credit-based service agent method is applied to a user terminal and comprises the following steps:
receiving an agent instruction submitted by a first user aiming at a target service;
calling an image acquisition interface to acquire an identity image of a second user according to the proxy instruction, and uploading a service proxy request carrying the identity image to a server;
receiving credit information and identity information corresponding to the identity image issued by the server, generating an identity verification prompt containing the credit information and displaying the identity verification prompt;
performing identity verification according to the information to be verified and the identity information which are input aiming at the identity verification prompt;
and under the condition that the identity verification is passed, uploading agent processing information aiming at the second user to the server, and receiving an agent processing result sent by the server.
2. The credit-based service brokering method of claim 1, wherein said uploading broker processing information for the second user to the server comprises:
displaying the core passing information to the first user;
receiving an agent confirmation instruction submitted by the first user aiming at the core body through information;
generating the agent processing information for acting the second user to process the target service according to the agent confirmation instruction;
and uploading the agent processing information to the server.
3. The credit-based service brokering method of claim 1, wherein after the step of uploading the broker processing information for the second user to the server and receiving the broker processing result sent by the server is executed if the identity verification passes, the method further comprises:
receiving a resource allocation reminder issued by the server under the condition that an agent event condition including the second user triggers an agent event ending condition;
wherein the proxy event is an event that the first user proxies the second user to process the target service; and the resource allocation prompt is generated by allocating resources obtained by calculation according to the processing time of the agent event and the resource rate.
4. The credit-based service brokering method of claim 1, wherein said receiving a brokering instruction for a target service submission from a first user further comprises:
receiving a scanning instruction submitted by the first user;
calling the image acquisition interface to scan an image identification code based on the scanning instruction;
displaying a target service page corresponding to the target service containing the proxy control according to the scanning result;
correspondingly, the receiving of the agent instruction submitted by the first user for the target service includes:
and receiving the agent instruction submitted by the first user aiming at the agent control in the target business page.
5. The credit-based service agent method according to claim 1, wherein after the step of invoking an image acquisition interface to acquire an identity image of a second user according to the agent instruction and uploading a service agent request carrying the identity image to a server is executed, the method further comprises:
and receiving the admittance refusing reminding that the second user sent by the server does not conform to the target service.
6. The credit-based service agent method according to claim 1, wherein the invoking an image acquisition interface according to the agent instruction to acquire an identity image of a second user and uploading a service agent request carrying the identity image to a server comprises:
displaying an image acquisition strategy through an image acquisition page based on the proxy instruction, and calling the image acquisition interface;
acquiring the identity image acquired by the image acquisition interface under the condition that the second user is subjected to image acquisition through the image acquisition interface based on an image acquisition strategy;
and extracting image features of the identity image to generate the service agent request, and uploading the service agent request to the server.
7. The credit-based business brokering method of claim 1, the generating and presenting an authentication prompt containing the credit information, comprising:
generating an identity verification page based on the credit information and the identity information;
and displaying the identity verification page.
8. The credit-based service brokering method of claim 7, wherein said performing identity verification according to the information to be verified entered for said authentication prompt and said identity information, comprises:
receiving the information to be verified input through the identity verification page;
extracting a first verification feature in the information to be verified and a second verification feature in the identity information;
and performing identity verification on the second user in a mode of matching the first verification characteristic with the second verification characteristic.
9. The credit-based service brokering method of claim 1, in case that the target service is a charging device lease service, comprising:
the agent instruction is a charging equipment borrowing instruction, and the service agent request is a charging equipment borrowing request;
correspondingly, the proxy processing information is charging equipment borrowing information, and the proxy processing result is a charging equipment borrowing result.
10. A credit-based service agent device applied to a user terminal comprises:
the receiving instruction module is configured to receive an agent instruction submitted by a first user aiming at the target service;
the uploading request module is configured to call an image acquisition interface to acquire an identity image of a second user according to the proxy instruction and upload a service proxy request carrying the identity image to a server;
the display reminding module is configured to receive credit information and identity information corresponding to the identity image issued by the server, generate an identity verification reminder containing the credit information and display the identity verification reminder;
the identity verification module is configured to perform identity verification according to the information to be verified and the identity information, which are input aiming at the identity verification prompt;
and the receiving result module is configured to upload the agent processing information aiming at the second user to the server side and receive the agent processing result sent by the server side under the condition that the identity verification is passed.
11. A credit-based service agent method is applied to a server and comprises the following steps:
receiving a service agent request uploaded by a user terminal aiming at a target service;
determining credit information and identity information corresponding to the identity image contained in the service agent request, and issuing the credit information and the identity information to the user terminal;
receiving agent processing information uploaded by the user terminal, and generating agent event information corresponding to the target service;
recording the proxy event information to a user account corresponding to the identity information, and issuing a proxy confirmation instruction to the service equipment to which the target service belongs;
and generating an agent processing result according to the recording result and the agent confirmation instruction and sending the agent processing result to the user terminal.
12. The credit-based service brokering method of claim 11, wherein after the step of generating a brokering result according to the recording result and the confirmation brokering instruction and sending the generated brokering result to the user terminal is executed, the method further comprises:
under the condition that an agent event corresponding to the agent event information triggers an agent event ending condition, determining the processing time and the resource rate of the agent event;
determining a value of allocated resources based on the processing time and the resource rate, and determining a user account of a first user to which the user terminal belongs;
and transferring the allocated resources corresponding to the allocated resource numerical value from the user account of the second user to the user account of the first user, issuing a resource allocation prompt to the user terminal, and sending an agent event end prompt to the second user terminal of the second user.
13. The credit-based service agent method of claim 11, wherein the determining the credit information and the identity information corresponding to the identity image included in the service agent request and sending them to the user terminal comprises:
analyzing the service agent request to obtain image characteristics corresponding to the identity image;
querying an attribute database based on the image features to obtain the credit information and the identity information corresponding to the image features;
judging whether the credit information accords with the service processing condition of the target service;
and if so, issuing the credit information and the identity information to the user terminal.
14. The credit-based service brokering method of claim 11, wherein after the step of receiving a service broker request for a target service upload by a user equipment is performed, further comprising:
querying an attribute database based on the identity image contained in the service agent request;
determining the credit information and the identity information according to the query result;
judging whether the credit information accords with the service processing condition of the target service;
if not, an admission refusing prompt is generated according to the judgment result and is issued to the user terminal.
15. The credit-based service brokering method of claim 12, wherein after the step of generating a brokering result according to the recording result and the confirmation brokering instruction and sending the generated brokering result to the user terminal is executed, the method further comprises:
calculating a target credit score corresponding to the proxy event according to the processing time;
adding the target credit point to a base credit point of the user account of the second user.
16. The credit-based service brokering method of claim 11, wherein said service device opens a target service based on said confirmation brokering instruction, and performs service alerting according to the opening result.
17. The credit-based service brokering method of claim 11, in case that the target service is a charging device lease service, comprising:
the service agent request is a charging equipment borrowing request;
correspondingly, the proxy processing information is charging equipment borrowing information, the confirmation proxy instruction is a confirmation borrowing instruction, and the proxy processing result is a charging equipment borrowing result.
18. A credit-based service agent device is applied to a server and comprises:
the receiving agent request module is configured to receive a service agent request uploaded by a user terminal aiming at a target service;
the issuing information module is configured to determine credit information and identity information corresponding to the identity image contained in the service agent request and issue the credit information and the identity information to the user terminal;
an event information generating module configured to receive the proxy processing information uploaded by the user terminal and generate proxy event information corresponding to the target service;
the event recording information module is configured to record the proxy event information to a user account corresponding to the identity information and send a proxy confirmation instruction to the service equipment to which the target service belongs;
and the issuing processing result module is configured to generate an agent processing result according to the recording result and the confirmation agent instruction and issue the agent processing result to the user terminal.
19. A computing device, comprising:
a memory and a processor;
the memory is to store computer-executable instructions, and the processor is to execute the computer-executable instructions to:
receiving an agent instruction submitted by a first user aiming at a target service;
calling an image acquisition interface to acquire an identity image of a second user according to the proxy instruction, and uploading a service proxy request carrying the identity image to a server;
receiving credit information and identity information corresponding to the identity image issued by the server, generating an identity verification prompt containing the credit information and displaying the identity verification prompt;
performing identity verification according to the information to be verified and the identity information which are input aiming at the identity verification prompt;
and under the condition that the identity verification is passed, uploading agent processing information aiming at the second user to the server, and receiving an agent processing result sent by the server.
20. A computing device, comprising:
a memory and a processor;
the memory is to store computer-executable instructions, and the processor is to execute the computer-executable instructions to:
receiving a service agent request uploaded by a user terminal aiming at a target service;
determining credit information and identity information corresponding to the identity image contained in the service agent request, and issuing the credit information and the identity information to the user terminal;
receiving agent processing information uploaded by the user terminal, and generating agent event information corresponding to the target service;
recording the proxy event information to a user account corresponding to the identity information, and issuing a proxy confirmation instruction to the service equipment to which the target service belongs;
and generating an agent processing result according to the recording result and the agent confirmation instruction and sending the agent processing result to the user terminal.
21. A computer readable storage medium storing computer instructions which, when executed by a processor, carry out the steps of the credit-based service brokering method of any one of claims 1 to 9.
22. A computer readable storage medium storing computer instructions which, when executed by a processor, carry out the steps of the credit-based service brokering method of any one of claims 11 to 17.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010412436.7A CN111343200B (en) | 2020-05-15 | 2020-05-15 | Credit-based service agent method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010412436.7A CN111343200B (en) | 2020-05-15 | 2020-05-15 | Credit-based service agent method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111343200A true CN111343200A (en) | 2020-06-26 |
CN111343200B CN111343200B (en) | 2020-10-23 |
Family
ID=71187710
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010412436.7A Active CN111343200B (en) | 2020-05-15 | 2020-05-15 | Credit-based service agent method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111343200B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112269978A (en) * | 2020-10-22 | 2021-01-26 | 支付宝(杭州)信息技术有限公司 | Image acquisition method and device |
CN113946260A (en) * | 2021-10-28 | 2022-01-18 | 支付宝(杭州)信息技术有限公司 | Data processing method, device and equipment |
CN114257578A (en) * | 2021-12-16 | 2022-03-29 | 上海幻电信息科技有限公司 | Information verification method and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20020042567A (en) * | 2002-04-26 | 2002-06-05 | 김상훈 | Private vault access control system using face recognition technology |
CN108806103A (en) * | 2018-08-21 | 2018-11-13 | 深圳来电科技有限公司 | Mobile power rent method and mobile power leased machine |
CN109754537A (en) * | 2018-12-25 | 2019-05-14 | 北京兆易创新科技股份有限公司 | A kind of article lending system and method |
CN210199896U (en) * | 2019-09-25 | 2020-03-27 | 张贤恒 | Shared charger baby device capable of brushing face and renting |
CN210244508U (en) * | 2019-05-30 | 2020-04-03 | 三明学院 | Sharing treasured device and system of renting that charges |
CN111080916A (en) * | 2019-12-03 | 2020-04-28 | 福建电桩一号信息科技有限公司 | Leasing control method and device for mobile power supply and readable storage medium |
-
2020
- 2020-05-15 CN CN202010412436.7A patent/CN111343200B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20020042567A (en) * | 2002-04-26 | 2002-06-05 | 김상훈 | Private vault access control system using face recognition technology |
CN108806103A (en) * | 2018-08-21 | 2018-11-13 | 深圳来电科技有限公司 | Mobile power rent method and mobile power leased machine |
CN109754537A (en) * | 2018-12-25 | 2019-05-14 | 北京兆易创新科技股份有限公司 | A kind of article lending system and method |
CN210244508U (en) * | 2019-05-30 | 2020-04-03 | 三明学院 | Sharing treasured device and system of renting that charges |
CN210199896U (en) * | 2019-09-25 | 2020-03-27 | 张贤恒 | Shared charger baby device capable of brushing face and renting |
CN111080916A (en) * | 2019-12-03 | 2020-04-28 | 福建电桩一号信息科技有限公司 | Leasing control method and device for mobile power supply and readable storage medium |
Non-Patent Citations (1)
Title |
---|
如风观影笔记: "支付宝怎么给家人代办健康码", 《HTTPS://JINGYAN.BAIDU.COM/ARTICLE/D5C4B52B2E67299B560DC5A5.HTML》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112269978A (en) * | 2020-10-22 | 2021-01-26 | 支付宝(杭州)信息技术有限公司 | Image acquisition method and device |
CN112269978B (en) * | 2020-10-22 | 2022-11-15 | 蚂蚁胜信(上海)信息技术有限公司 | Image acquisition method and device |
CN113946260A (en) * | 2021-10-28 | 2022-01-18 | 支付宝(杭州)信息技术有限公司 | Data processing method, device and equipment |
CN113946260B (en) * | 2021-10-28 | 2024-06-04 | 支付宝(杭州)信息技术有限公司 | Data processing method, device and equipment |
CN114257578A (en) * | 2021-12-16 | 2022-03-29 | 上海幻电信息科技有限公司 | Information verification method and device |
CN114257578B (en) * | 2021-12-16 | 2024-04-02 | 上海幻电信息科技有限公司 | Information verification method and device |
Also Published As
Publication number | Publication date |
---|---|
CN111343200B (en) | 2020-10-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113327374B (en) | Shared charging equipment returning method and device | |
CN111343200B (en) | Credit-based service agent method and device | |
CN108764868B (en) | Block chain node proxy reconciliation method and block reconciliation proxy node | |
CN108038687B (en) | Transaction method based on voice recognition, server and computer-readable storage medium | |
CN110503510B (en) | Method, device and system for processing interaction of rents based on credit | |
CN108416670A (en) | Credit matches folk prescription method and server | |
CN109670968A (en) | Processing method, device, equipment and the computer storage medium of insurance data | |
CN108537530A (en) | A kind of online charged counsel service system and its application method | |
CN112150252A (en) | Credit-based service processing method and device | |
CN110245622A (en) | A kind of face identification method, device and equipment | |
TW202145123A (en) | Insurance implementation for electronic devices | |
CN113112254A (en) | Regional message sharing method and device | |
CN110555692A (en) | virtual resource transfer method, device and storage medium | |
CN110929237A (en) | Identity verification system, method and device and information verification system | |
CN111258750B (en) | Data volume processing method and system, and credit allocation method and system | |
WO2015101057A1 (en) | Data processing method and related device and system | |
CN110136002B (en) | Payment reminding method and device, computing equipment and computer readable storage medium | |
CN113169871B (en) | Computer implementation method of time-based risk management mechanism and smart card | |
CN111340603A (en) | Object processing method and device | |
CN108156206B (en) | Data transfer method, server, client and system | |
CN111382360B (en) | Information pushing method and device | |
CN110738480B (en) | Digital asset hosting risk control method, device and storage medium | |
CN111539742B (en) | Information processing method, information processing device, electronic equipment and storage medium | |
CN112200396B (en) | Resource transfer and allocation method and device | |
CN110610367B (en) | Transaction data payment method and device, electronic equipment and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |