CN113436036B - Identity credential processing method and device - Google Patents

Identity credential processing method and device Download PDF

Info

Publication number
CN113436036B
CN113436036B CN202110776010.4A CN202110776010A CN113436036B CN 113436036 B CN113436036 B CN 113436036B CN 202110776010 A CN202110776010 A CN 202110776010A CN 113436036 B CN113436036 B CN 113436036B
Authority
CN
China
Prior art keywords
user
property
information
server
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110776010.4A
Other languages
Chinese (zh)
Other versions
CN113436036A (en
Inventor
戴美赏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202110776010.4A priority Critical patent/CN113436036B/en
Priority to CN202311410591.5A priority patent/CN117291760A/en
Publication of CN113436036A publication Critical patent/CN113436036A/en
Application granted granted Critical
Publication of CN113436036B publication Critical patent/CN113436036B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Abstract

The embodiment of the specification provides an identity credential processing method and device, wherein the identity credential processing method comprises the following steps: acquiring an authorization application submitted by a first user after the first terminal scans the identification code of a second user; desensitizing the second user information in the authorized application, and issuing the acquired desensitized user information to the first terminal; determining a target property and a user type of the second user through interaction with the first terminal according to an authorization instruction submitted by the first terminal for the desensitized user information; and creating an identity credential of the second user for the target property according to the user type.

Description

Identity credential processing method and device
Technical Field
The present document relates to the field of data processing technologies, and in particular, to a method and an apparatus for processing identity credentials.
Background
With the rapid development of economies and the driving of urban and rural construction, relatively developed cities are rushing into a large number of floating populations, which are generally selected to reside in rented houses. Residential rental house management is related to city construction, production and life of users and economic development. With the development of intelligent terminals, owners can perform online service through the intelligent terminals, but how to identify owners and users who actually live is an important problem in community management, so as to provide online service for owners and users who actually live.
Disclosure of Invention
One or more embodiments of the present specification provide a first identity credential processing method. The identity credential processing method is applied to a server and comprises the following steps: and acquiring an authorization application submitted by the first user after the first terminal scans the identification code of the second user. And performing desensitization processing on the second user information in the authorized application, and issuing the obtained desensitized user information to the first terminal. And determining a target property and the user type of the second user through interaction with the first terminal according to the authorization instruction submitted by the first terminal for the desensitization user information. And creating an identity credential of the second user for the target property according to the user type.
One or more embodiments of the present disclosure provide a second identity credential processing method, applied to a first terminal, including: and collecting and identifying the identification code of the second user, and submitting an authorization application to the server based on the identification result. And receiving and displaying the desensitized user information issued by the server. And acquiring an authorization instruction which is input by a first user and is used for desensitizing the user information, and submitting the authorization instruction to the server. And interacting with the server to determine a target property and a user type of the second user.
One or more embodiments of the present disclosure provide a third identity credential processing method, applied to a server, including: and acquiring a credential application submitted by the second user through the second terminal scanning the identification code of the target property. And inquiring second user information of the second user based on the second user identification carried in the credential application. And transmitting the credential application and the second user information into a third party verification interface to carry out credential admission verification of the second user, and acquiring a returned admission verification result. And creating an identity credential of the second user for the target property according to the admission verification result.
One or more embodiments of the present disclosure provide a fourth identity credential processing method, applied to a second terminal, including: and acquiring an identification code of the target property to obtain a first user identification and a property identification of the target property. And submitting a credential application to a server based on the first user identification, the property identification and the read second user identification. And acquiring and displaying the information transmission authorization prompt sent by the server. And acquiring an authorization instruction of the second user based on the information transmission authorization prompt and submitting the authorization instruction to the server.
One or more embodiments of the present disclosure provide a first identity credential processing device, running on a server, including: the application acquisition module is configured to acquire an authorized application submitted after the first user scans the identification code of the second user through the first terminal. The desensitization processing module is configured to carry out desensitization processing on the second user information in the authorized application and send the obtained desensitized user information to the first terminal. And the information determining module is configured to determine a target real estate and a user type of the second user through interaction with the first terminal according to an authorization instruction submitted by the first terminal for the desensitized user information. And the credential creation module is configured to create an identity credential of the second user for the target property according to the user type.
One or more embodiments of the present disclosure provide a second identity credential processing device, which operates on a first terminal and includes: and the application submitting module is configured to collect and identify the identification code of the second user and submit an authorized application to the server based on the identification result. And the information display module is configured to receive and display the desensitized user information issued by the server. And the authorization submitting module is configured to acquire an authorization instruction which is input by a first user and is used for desensitizing the user information and submit the authorization instruction to the server. And the interaction coordination module is configured to interact with the server to determine a target property and the user type of the second user.
One or more embodiments of the present disclosure provide a third identity credential processing device, running on a server, including: the application acquisition module is configured to acquire a credential application submitted by a second user through the second terminal scanning the identification code of the target property. And the information inquiry module is configured to inquire second user information of the second user based on the second user identification carried in the credential application. And the admission verification module is configured to transmit the credential application and the second user information into a third party verification interface to perform credential admission verification of the second user, and acquire a returned admission verification result. And the credential creation module is configured to create an identity credential of the second user for the target property according to the admission verification result.
One or more embodiments of the present disclosure provide a fourth identity credential processing device, which operates on a second terminal and includes: the system comprises an identification acquisition module, a first user identification module and a second user identification module, wherein the identification acquisition module is configured to acquire an identification code of a target property and acquire a first user identification and a property identification of the target property. And the application submitting module is configured to submit a credential application to a server based on the first user identification, the property identification and the read second user identification. And the reminding display module is configured to acquire and display the information transmission authorization reminding sent by the server. And the instruction submitting module is configured to collect the authorization instruction of the second user based on the information transmission authorization prompt and submit the authorization instruction to the server.
One or more embodiments of the present specification provide a first identity credential processing device, including: a processor; and a memory configured to store computer-executable instructions that, when executed, cause the processor to: and acquiring an authorization application submitted by the first user after the first terminal scans the identification code of the second user. And performing desensitization processing on the second user information in the authorized application, and issuing the obtained desensitized user information to the first terminal. And determining a target property and the user type of the second user through interaction with the first terminal according to the authorization instruction submitted by the first terminal for the desensitization user information. And creating an identity credential of the second user for the target property according to the user type.
One or more embodiments of the present specification provide a second identity credential processing device, including: a processor; and a memory configured to store computer-executable instructions that, when executed, cause the processor to: and collecting and identifying the identification code of the second user, and submitting an authorization application to the server based on the identification result. And receiving and displaying the desensitized user information issued by the server. And acquiring an authorization instruction which is input by a first user and is used for desensitizing the user information, and submitting the authorization instruction to the server. And interacting with the server to determine a target property and a user type of the second user.
One or more embodiments of the present specification provide a third identity credential processing device including: a processor; and a memory configured to store computer-executable instructions that, when executed, cause the processor to: and acquiring a credential application submitted by the second user through the second terminal scanning the identification code of the target property. And inquiring second user information of the second user based on the second user identification carried in the credential application. And transmitting the credential application and the second user information into a third party verification interface to carry out credential admission verification of the second user, and acquiring a returned admission verification result. And creating an identity credential of the second user for the target property according to the admission verification result.
One or more embodiments of the present specification provide a fourth identity credential processing device including: a processor; and a memory configured to store computer-executable instructions that, when executed, cause the processor to: and acquiring an identification code of the target property to obtain a first user identification and a property identification of the target property. And submitting a credential application to a server based on the first user identification, the property identification and the read second user identification. And acquiring and displaying the information transmission authorization prompt sent by the server. And acquiring an authorization instruction of the second user based on the information transmission authorization prompt and submitting the authorization instruction to the server.
One or more embodiments of the present specification provide a first storage medium storing computer-executable instructions that, when executed, implement the following: and acquiring an authorization application submitted by the first user after the first terminal scans the identification code of the second user. And performing desensitization processing on the second user information in the authorized application, and issuing the obtained desensitized user information to the first terminal. And determining a target property and the user type of the second user through interaction with the first terminal according to the authorization instruction submitted by the first terminal for the desensitization user information. And creating an identity credential of the second user for the target property according to the user type.
One or more embodiments of the present specification provide a second storage medium for storing computer-executable instructions that, when executed, implement the following: and collecting and identifying the identification code of the second user, and submitting an authorization application to the server based on the identification result. And receiving and displaying the desensitized user information issued by the server. And acquiring an authorization instruction which is input by a first user and is used for desensitizing the user information, and submitting the authorization instruction to the server. And interacting with the server to determine a target property and a user type of the second user.
One or more embodiments of the present specification provide a third storage medium storing computer-executable instructions that, when executed, implement the following: and acquiring a credential application submitted by the second user through the second terminal scanning the identification code of the target property. And inquiring second user information of the second user based on the second user identification carried in the credential application. And transmitting the credential application and the second user information into a third party verification interface to carry out credential admission verification of the second user, and acquiring a returned admission verification result. And creating an identity credential of the second user for the target property according to the admission verification result.
One or more embodiments of the present specification provide a fourth storage medium storing computer-executable instructions that, when executed, implement the following: and acquiring an identification code of the target property to obtain a first user identification and a property identification of the target property. And submitting a credential application to a server based on the first user identification, the property identification and the read second user identification. And acquiring and displaying the information transmission authorization prompt sent by the server. And acquiring an authorization instruction of the second user based on the information transmission authorization prompt and submitting the authorization instruction to the server.
Drawings
For a clearer description of one or more embodiments of the present description or of the solutions of the prior art, the drawings that are needed in the description of the embodiments or of the prior art will be briefly described below, it being obvious that the drawings in the description that follow are only some of the embodiments described in the present description, from which other drawings can be obtained, without inventive faculty, for a person skilled in the art;
FIG. 1 is a process flow diagram of a method for processing identity credentials according to one or more embodiments of the present disclosure;
FIG. 2 is a schematic diagram of a create guide page provided by one or more embodiments of the present disclosure;
FIG. 3 is a schematic diagram of an identity verification page provided in one or more embodiments of the present disclosure;
FIG. 4 is a schematic diagram of an information delivery authorization page provided in one or more embodiments of the present disclosure;
FIG. 5 is a schematic illustration of a property list page provided in one or more embodiments of the present disclosure;
FIG. 6 is a schematic diagram of a detail presentation page provided by one or more embodiments of the present disclosure;
FIG. 7 is a schematic diagram of an identity credential list page provided in one or more embodiments of the present disclosure;
FIG. 8 is a schematic diagram of an identification code display page provided in one or more embodiments of the present disclosure;
FIG. 9 is a schematic diagram of an owner authorization page provided in one or more embodiments of the present disclosure;
FIG. 10 is a schematic diagram of an information authorization page provided in one or more embodiments of the present disclosure;
FIG. 11 is a schematic diagram of an expiration reminder window provided in one or more embodiments of the present disclosure;
FIG. 12 is a diagram of a member list page provided in one or more embodiments of the present disclosure;
FIG. 13 is a schematic diagram of an invitation code display page according to one or more embodiments of the present disclosure;
FIG. 14 is a flow diagram of a primary identity credential creation process applied to a primary identity credential creation scenario provided by one or more embodiments of the present disclosure;
FIG. 15 is a process flow diagram of an identity credential processing method applied to a subordinate identity credential creation scenario provided by one or more embodiments of the present disclosure;
FIG. 16 is a process flow diagram of a second identity credential processing method provided by one or more embodiments of the present disclosure;
FIG. 17 is a process flow diagram of a third identity credential processing method provided in one or more embodiments of the present disclosure;
FIG. 18 is a process flow diagram of an identity credential processing method applied to an identity credential creation scenario provided by one or more embodiments of the present disclosure;
FIG. 19 is a process flow diagram of a fourth method for identity credential processing provided in one or more embodiments of the present disclosure;
FIG. 20 is a schematic diagram of a first identity credential processing device provided in one or more embodiments of the present disclosure;
FIG. 21 is a schematic diagram of a second identity credential processing device provided in one or more embodiments of the present disclosure;
FIG. 22 is a schematic diagram of a third identity credential processing device provided in one or more embodiments of the present disclosure;
FIG. 23 is a schematic diagram of a fourth identity credential processing device provided in one or more embodiments of the present disclosure;
FIG. 24 is a schematic diagram of a first identity credential processing device provided in one or more embodiments of the present disclosure;
FIG. 25 is a schematic diagram of a second identity credential processing device provided in one or more embodiments of the present disclosure;
FIG. 26 is a schematic diagram of a third identity credential processing device provided in one or more embodiments of the present disclosure;
fig. 27 is a schematic structural diagram of a fourth identity credential processing device provided in one or more embodiments of the present disclosure.
Detailed Description
In order to enable a person skilled in the art to better understand the technical solutions in one or more embodiments of the present specification, the technical solutions in one or more embodiments of the present specification will be clearly and completely described below with reference to the drawings in one or more embodiments of the present specification, and it is obvious that the described embodiments are only some embodiments of the present specification, not all embodiments. All other embodiments, which can be made by one or more embodiments of the present disclosure without inventive effort, are intended to be within the scope of the present disclosure.
The first identity credential processing method embodiment provided in the present specification:
referring to fig. 1, which shows a processing flow chart of an identity credential processing method provided by the present embodiment, referring to fig. 2, which shows a creation guidance page diagram provided by the present embodiment, referring to fig. 3, which shows an identity verification page diagram provided by the present embodiment, referring to fig. 4, which shows an information transmission authorization page diagram provided by the present embodiment, referring to fig. 5, which shows a property list page diagram provided by the present embodiment, referring to fig. 6, which shows a detail presentation page diagram provided by the present embodiment, referring to fig. 7, which shows an identity credential list page diagram provided by the present embodiment, referring to fig. 8, which shows an identification code presentation page diagram provided by the present embodiment, referring to fig. 9, which shows an owner authorization page diagram provided by the present embodiment, referring to fig. 10, which shows an information authorization page diagram provided by the present embodiment, referring to fig. 11, which shows an expiration window 12 provided by the present embodiment, which shows a subordinate credential identifier window, referring to fig. 14, which shows a creation scenario of an application of the present embodiment, which shows a status credential processing scenario of the present embodiment, is provided by the application, referring to fig. 14, which shows a creation scenario of an application credential is provided by the present embodiment, and which shows a processing flow chart of the identity credential is provided by the present embodiment, referring to fig. 14.
Referring to fig. 1, the identity credential processing method provided in the present embodiment is applied to a server, and specifically includes steps S102 to S108.
Step S102, obtaining an authorized application submitted by a first user after the first terminal scans the identification code of a second user.
The identity credential processing method provided by the embodiment cooperates with the third party verification platform, the identity credential is used for authenticating the property information, the owner can invite the family members or the tenants to acquire the subordinate identity credential when acquiring the main identity credential, the family members or the tenants can also establish the subordinate identity credential through the owner authorization under the condition that the acquisition of the main identity credential fails, the owner utilizes the main identity credential, and the family members or the tenants utilize the subordinate identity credential to effectively butt joint with the service provider, so that the aggregation and the display of the service are realized, and the housing experience of the owner, the family members and the tenants is improved.
In practical application, owners rent their own property to tenants, and the tenants are required to pay water and electricity fees, use electronic access control, and the like. In particular, in order to improve the convenience of the owners enjoying community services, the owners can open the owner identity credentials of the own property, and realize various services such as one-card passing, one-card reservation, one-card payment, one-card voting and the like through the owner identity credentials, after renting the own property to the tenants, the owners can authorize the tenants to obtain the subordinate identity credentials renting the property so that the tenants enjoy the corresponding services by utilizing the subordinate identity credentials, and in addition, the owners can invite the families to open the subordinate identity credentials so that the families enjoy the corresponding services.
The first user in this embodiment includes a user with title management qualification. Such as a user of an owner, a property person, or a third party agency that obtains authorization from the owner. The second user comprises a family member and/or a tenant opening the subordinate identity credential. The identification code includes an identification code generated based on identity information of the second user in the event of failure to open the primary identity credential to the second user. In this embodiment, if it is determined that the user has property management qualification, the user is determined to be the first user, and a master identity credential is created according to the owner identity. If the user does not have the property management qualification through the third party verification platform, determining that the user is a second user, generating an identification code according to the user information of the second user, and then scanning the identification code by the first user and authorizing the identification code, so that a subordinate identity credential of the second user can be created.
In particular, the first user who has received the master identity credential may only authorize the second user after scanning the second user's identification code to create a slave identity credential for the second user. In an optional implementation manner provided in this embodiment, the primary identity credential of the first user is opened in the following manner:
Acquiring the first user identification submitted by the first terminal;
reading first user information based on the first user identification, and carrying out identity verification on the first user according to the first user information;
and transmitting the first user information into a third party verification interface to carry out admission verification of the first user based on the information transmitting authorization instruction submitted by the first terminal under the condition that verification passes.
Specifically, because the first user information belongs to the privacy of the first user to a certain extent, the server needs to obtain the authorization of the first user first to ensure the privacy security of the first user, and in order to further ensure the privacy security of the first user, the server transmits the first user information to the third party verification interface and also needs to obtain the authorization of the first user.
Based on this, in the process of opening the primary identity credential of the first user, the following steps are performed: acquiring the first user identification submitted by the first terminal; transmitting an information reading authorization reminder to the first terminal based on the first user identification; the first terminal receives and displays the information reading authorization prompt; the first terminal collects information reading authorization instructions of a first user and submits the information reading authorization instructions to the server; the server reads first user information based on the information reading authorization instruction and the first user identification, and carries out biological feature recognition on the first user according to the first user information; if the identification is not passed, not processing; if the identification is passed, an information transmission authorization prompt is sent to the first terminal; the first terminal receives and displays the information transmission authorization prompt; collecting an information transmission authorization instruction of the first user and submitting the information transmission authorization instruction to the server; and after receiving the information transmission authorization instruction, the server transmits the first user information to a third party verification interface to carry out admission verification of the first user.
Further, in order to guarantee the validity and the authenticity of the property management qualification of the first user, the third party verification platform verifies the first user information, and under the condition that the first user has the property management qualification, a main identity certificate of the first user aiming at the property is created. In an optional implementation manner provided in this embodiment, the third party platform performs admission verification in the following manner:
inquiring property information corresponding to the first user based on the first user information;
the property information is sent to the first terminal, so that the first terminal displays the property information;
third party identity credentials are created for the target property selected by the first user via the property information.
Specifically, the third party verification platform queries the property information of the first user based on the first user information; the method comprises the steps of sending the property information to a first terminal so that the first terminal displays the property information in a property list mode; and the third party verification platform creates a third party identity certificate of the first user aiming at the target property under the condition that the target property selected by the first user through the property list is received. In an optional implementation manner provided in this embodiment, after the third party verification platform creates the third party identity credential for the target property of the first user, the server performs the following operations:
Acquiring a certificate identifier of the third party identity certificate returned by the third party verification interface and a property identifier of the target property;
based on the credential identity and the property identity, a master identity credential for the first user for the target property is created.
And the server creates a main identity certificate of the first user aiming at the target property according to the certificate identification of the third-party identity certificate returned by the third-party verification interface and the property identification of the target property. It should be noted that, the property information of the first user is maintained by the third party verification platform, so that in order to ensure the information security of the first user, the server cannot obtain the property information of the first user maintained by the third party verification platform, and therefore, the third party verification platform queries the property information of the first user and obtains the target property selected by the first user. In order to further ensure the property information safety of the first user, the third party verification platform can desensitize the property information when returning the property information of the target property to the server, and then returns the acquired desensitized property information.
For example, the first user submits a first user identification of the first user to the server under the condition that the first user access credential application is detected by scanning a program identification code, searching a program name or other channel access credential application, the server sends an information reading authorization reminder to the first terminal based on the first user identification, and the first terminal renders and displays a creation guide page shown in fig. 2 based on the creation guide content of the identity credential and the information reading authorization reminder after receiving the information reading authorization reminder. When the first terminal detects that the first user triggers an agreement and swipes a face acquisition control in the figure 2, submitting an information reading authorization instruction to the server, after receiving the information reading authorization instruction, reading first user information according to a first user identification, performing desensitization processing on the first user information, sending the desensitized first user information to the first terminal, so that the first terminal acquires a face image of the first user through an identity verification page shown in the figure 3, uploads the acquired face image to the server, after the face image verification passes, sending an information transmission authorization prompt to the first terminal, rendering an information transmission authorization page shown in the figure 4 according to the information transmission authorization prompt, displaying the information transmission authorization page, after detecting the agreement control configured by the first user identification, submitting the information transmission authorization instruction to the server, sending the first user information into a third party verification interface according to the information transmission authorization instruction, inquiring the first user information to be a property verification platform based on the first user information, and sending the acquired face image to a property verification card shown in the figure 5, and creating a property removal list of a property object property of a user shown in the figure 1, if the property removal list is shown in the figure 1; the server acquires the desensitized property identification returned by the third party verification interface and the third party owner card identification of the third party owner card, and creates the owner card of the first user aiming at the target property based on the property identification acquired by the desensitization processing and the third party owner card identification, wherein the owner card corresponds to the third party owner card one by one. After creating the owner card, the first user may view the owner card, and upon detecting a user's access request to the owner card, the user is presented with a detail presentation page as shown in fig. 6.
In addition, after creating the master identity credential for the first user for the target property, the first user may also create master identity credentials for multiple properties. When a first user opens a main identity credential of a plurality of properties, in order to reduce the operation flow of the first user in the process of creating the main identity credential, the experience of the first user is improved, if the first user opens a plurality of properties, the first user does not need to be authorized repeatedly, but in order to ensure the identity validity of the first user, identity verification needs to be carried out on the first user. Specifically, a new application of the identity certificate submitted by a first user through a first terminal is obtained, first user information is read based on the new application, and identity verification is carried out on the first user according to the first user information; if the verification passes, the first user information is transmitted into a third party verification interface to conduct admission verification, a certificate identification of a third party newly-added identity certificate returned by the third party verification interface and a property identification of the newly-added property are obtained, and a main identity certificate of the first user aiming at the newly-added property is created based on the certificate identification and the property identification.
As shown in fig. 7, the first user can view the created owner card and the sub-card through the identity credential list page, and can also perform the real estate augmentation through the identity credential list page.
In the implementation process, if the result returned by the third party verification interface is that the query result of the property information is null, the user is determined to be a second user, an identification code of the second user is generated based on the second user information of the second user, the identification code is sent to the second terminal, the second user can share the identification code with the first terminal, and the first terminal authorizes the second user information after scanning the identification code, so that the second user receives the subordinate identity credential. In an alternative implementation manner provided in this embodiment, the identification code is generated in the following manner:
reading the second user information according to the second user identifier, and carrying out identity verification on the second user according to the second user information;
transmitting an authorization instruction based on information submitted by a second terminal under the condition that verification passes, and transmitting the second user information into a third party verification interface to carry out admission verification of the second user;
and if the third party verification interface returns that the property information of the second user is empty, generating the identification code based on the second user information and sending the identification code to the second terminal.
Specifically, in order to enable the second user without the property management qualification to obtain the identity credential by using the identity of the tenant or the family, under the condition that the inquiring result of the property information of the second user is empty, an identification code is generated according to the second user information of the second user and sent to the second terminal, the second user can share the identification code, so that the user with the main identity credential scans the identification code and performs authorization, and the second user obtains the identity credential.
For example, when the second terminal detects that the second user accesses the credential application program, the second terminal submits a second user identification of the second user to the server, the server performs identity verification on the second user based on the second user information after acquiring an information reading authorization instruction of the second user, and when the verification passes, the second user information is transmitted to the third party verification interface based on an information transmission authorization instruction of the second user to perform admission verification, if the verification result returned by the third party verification interface is that the property information of the second user is empty, an identification code is generated according to the second user information, and the identification code is sent to the second terminal, and after receiving the identification code, the second terminal renders an identification code display page shown in fig. 8 based on the identification code and displays the identification code display page.
It should be noted that, after the second user obtains the identification code, the second user may share the identification code, and after the identification code is scanned, the first user scanning the identification code is checked for authorization authority, i.e. whether the first user has the main identity credential is checked. In an optional implementation manner provided in this embodiment, a first terminal collects and identifies an identification code of a second user, submits an authorization application to a server based on an identification result, and after the server obtains the authorization application submitted after the first user scans the identification code of the second user through the first terminal, performs the following operations: querying whether the first user has a master identity credential based on the first user identification; if yes, executing the following step S104, performing desensitization processing on the second user information in the authorized application, and issuing the obtained desensitized user information to the first terminal; if not, the first terminal is enabled to display the creation guide page shown in the figure 2.
Step S104, desensitizing the second user information in the authorized application, and transmitting the obtained desensitized user information to the first terminal.
In the specific implementation, in order to avoid information leakage caused by the fact that the first user does not have the credential authorization authority to check the second user information, after the authorization application is acquired, the credential authorization authority of the first user is checked according to the first user identification in the authorization application; in order to improve the perception degree of the first user on the second user information, the second user is prevented from forging the identification code to obtain authorization, the identity certificate is further obtained to cause loss to the first user, and the second user information is sent to the first terminal under the condition that the first user has certificate authorization authority is determined, so that the first user confirms the second user information; the second user information at least comprises the name, the contact information and the identity of the second user, so that the information security of the second user is ensured in order to further prevent the second user information from being revealed, the second user information is subjected to desensitization before being sent to the first terminal, and the second user information after the desensitization is sent to the first terminal, so that the first terminal displays the second user information after the desensitization.
In the process, a first terminal receives and displays the desensitized user information issued by the server, acquires an authorization instruction which is input by a first user and is used for the desensitized user information, and submits the authorization instruction to the server.
For example, under the condition that the identification code of the second user is scanned by the first terminal, acquiring an authorization application submitted by the first terminal based on the identification result of the identification code, and inquiring whether the first user has created the owner card based on the authorization application; if not, sending an opening prompt to the first terminal so that the first terminal displays the creation guide page shown in the figure 2; if yes, the second user information in the identification result is subjected to desensitization processing to obtain desensitized user information, the desensitized user information is sent to the first terminal, and the first terminal renders and displays an owner authorization page shown in fig. 9 based on the desensitized user information.
And step S106, determining a target property and the user type of the second user through interaction with the first terminal according to the authorization instruction of the desensitization user information submitted by the first terminal.
When the method is implemented, the first terminal submits an authorization instruction of the first user to the second user information to the server after acquiring the authorization instruction, and the server determines the user types of the target property and the second user through interaction with the first terminal according to the authorization instruction.
As described above, in an alternative implementation manner provided in this embodiment, whether the first user has the primary identity credential is queried based on the first user identifier, if so, step S104 is executed, desensitizing processing is performed on the second user information in the authorization application, and the obtained desensitized user information is issued to the first terminal; if not, the first terminal is enabled to display the creation guide page shown in the figure 2. Correspondingly, in the process of determining the target property and the user type of the second user through interaction with the first terminal, the following steps are executed:
reading a property identifier in the main identity certificate, and sending the property identifier to the first terminal so as to enable the first terminal to display;
acquiring a property identifier of a target property selected by the first user and submitted by the first terminal, and sending a type selection prompt to the first terminal based on the property identifier of the target property;
and acquiring the user type submitted by the first terminal.
Specifically, the server reads a property identifier of a main identity certificate created by a first user according to an authorization instruction submitted by the first terminal, and sends the property identifier to the first terminal; the first terminal displays the property identification in the form of a property identification list so that a first user selects a target property for authorization; the first terminal submits a property identifier of the target property to the server under the condition that the first user selects the target property; the server sends a type selection reminder of the second user to the first terminal based on the property identifier; and rendering and displaying a user type acquisition page by the first terminal after receiving the type selection prompt, and submitting the user type to the server if the first terminal detects that the first user inputs the user type through the type acquisition page.
For example, after receiving an authorization instruction submitted by a property terminal, the server inquires at least one property card which is already created according to the property identification, reads the property identification corresponding to each property card, sends the property identification to the property terminal, so that the property terminal can display the property identification of a target property which is authorized to the property terminal in a property identification list mode, after acquiring the property identification of the target property, sends a type selection prompt to the property terminal, the property terminal acquires a page and displays the page according to the type selection prompt rendering type, and submits the page to the server after acquiring the type of the user input by the property.
In addition, in this embodiment, for the user type, the collection may be performed on a page on which the desensitized user information is displayed. Specifically, after receiving the desensitized user information, the first terminal renders and displays an information authorization page shown in fig. 10 based on the desensitized information, the first user inputs a user type through the information authorization page, if the user type is a tenant type, the first user inputs a valid period through the information authorization page, and the first user submits an authorization instruction and the user type of the first user to the server through a control configured by triggering the information authorization page; correspondingly, in the implementation process of determining the target property and the user type of the second user through interaction with the first terminal, the server reads the property identifier in the main identity certificate of the first user and sends the property identifier to the first terminal so as to enable the first terminal to display; and the server acquires the property identifier of the target property selected by the first user and submitted by the first terminal.
Step S108, according to the user type, creating an identity certificate of the second user aiming at the target property.
The user types include a family type and/or a tenant type. If the user type is the tenant type, the created identity credential is configured with a valid period.
In practical application, the family members of the first user can open the identity credentials of the target property, if the first user leases the target property to the tenant, the tenant can also open the identity credentials of the target property, but the tenant has a certain period for renting the target property, which is not long-lived.
In order to improve the convenience of the owners and the tenants in using the identity credentials, the perception degree of the owners and the tenants on the credential application program is improved, if the user type selected by the owners is the tenant type, the owners are reminded of inputting the valid period of the identity credentials, the tenants can enjoy corresponding services through the identity credentials within the valid period, and after the valid period is reached, the identity credentials of the tenants are logged off. In an optional implementation manner provided in this embodiment, in a process of creating the identity credential of the second user for the target property according to the user type, the following steps are performed:
If the user type is a tenant type, acquiring the valid period of the subordinate identity credential of the first user for authorizing the second user to use the target property;
creating a subordinate identity credential of the second user for the target property based on the tenant type and the expiration date;
if the user type is a family type, creating a subordinate identity credential of the second user for the target property based on the family type.
In a first optional implementation manner provided in this embodiment, if the user type is a tenant type, the created subordinate identity credential for the target property configures an effective period, and if the condition that the effective period of the subordinate identity credential is reached is detected, an expiration reminder is sent to the second terminal, so that the second terminal performs display; after receiving the expiration reminding, the second terminal can touch the expiration reminding to the second user in an instant messaging or station communication mode and the like, and displays the expiration reminding to the second user when the second user accesses the subordinate identity credential.
As shown in fig. 11, if the second user accesses the sub card after the expiration date of the sub card has arrived, the second user is presented with an expiration reminder through an expiration reminder pop-up. The user can remind the popup window to conduct the pin card of the auxiliary card through expiration.
In a second optional implementation manner provided in this embodiment, if the owner information of the target real estate maintained by the third party verification platform changes, the server receives the owner change reminder transmitted from the third party verification interface, and sends a real estate failure reminder to the first terminal based on the owner change reminder, so that the first terminal displays the real estate failure reminder when the first user accesses the main identity certificate. It should be noted that the first user and the second user may actively initiate a logoff request for the master identity credential and the slave identity credential.
In addition, in order to improve the perception degree of the owner to the credential application program, in order to improve the simplicity of the owner after the owner rents the property to the tenant, the owner can actively invite the tenant or the family to get the subordinate identity credential after creating the main identity credential. In this embodiment, after the first user creates the master identity credential for the target property, the member management item of the master identity credential may invite the family member or the tenant to obtain the subordinate identity credential. In an optional implementation manner provided in this embodiment, a sharing request submitted by the first terminal for the target property is obtained; generating a family invitation code based on the property identification of the target property and the first user identification of the first user and sending the family invitation code to the first terminal; the first terminal receives the family invitation code, renders an invitation code display page based on the family invitation code and displays the invitation code display page, wherein the invitation code display page is configured with a trigger control of a tenant invitation code; if the first terminal detects that the trigger control is triggered, acquiring the valid period of the second user authorized to use the subordinate identity credential by the first user; submitting the expiration date to the server; and the server generates the tenant invitation code and sends the tenant invitation code to the first terminal based on the valid period, so that the first terminal displays the tenant invitation code. It should be noted that, both the family invitation code and the tenant invitation code are identification codes of the target property. In an optional implementation manner provided in this embodiment, the identification code of the target property is generated in the following manner:
Acquiring a user adding request submitted by the first user aiming at the target property;
if the user type in the user adding request is a family type, generating the identification code based on the family type, the target property and/or the first user information;
if the user type in the user adding request is a tenant type, acquiring the valid period of renting the target property by the first user;
the identification code is generated based on the tenant type, the expiration date, the target property, and/or the first user information.
For example, when the owner views the detail presentation page shown in fig. 6 and triggers the member management item, the owner terminal presents a member list page shown in fig. 12, and the member list includes the user who gets the owner card or the sub card for the target property, so that the information security of the user is protected, and the member information in the member list is presented in a desensitization manner. The owner triggers and adds a member control, the owner terminal submits a sharing request aiming at the target property to the server, the server generates a family invitation code based on the property identifier of the target property and the owner identifier and sends the family invitation code to the owner terminal, the owner terminal renders an invitation code display page shown in fig. 13 and displays the invitation code display page, if the owner terminal detects that a 'tenant invitation code' control configured by the invitation code display page is triggered, the owner terminal reminds the owner to enter an effective period and submits the effective period to the server, the server creates a tenant invitation code based on the effective period, the property identifier and the owner identifier and sends the tenant invitation code to the owner terminal, and the owner terminal displays the tenant invitation code after receiving the tenant invitation code. The owner may send the invitation code to the second user through the "share invitation" control of the invitation code presentation page configuration.
In an optional implementation manner provided in this embodiment, after receiving the identifier of the target property shared by the first terminal, the second terminal performs the following operations:
acquiring an identification code of the target property, and acquiring the first user identification and the property identification of the target property;
and submitting a credential application to a server based on the first user identification, the property identification and the read second user identification.
Accordingly, the server performs the following operations:
and acquiring the certificate application submitted by the second user through the second terminal scanning the identification code of the target property.
In order to prevent the second user from opening the card multiple times, in an optional implementation manner provided in this embodiment, after obtaining the credential application, the server further performs the following operations:
querying whether the second user has the identity credential for the target property;
if yes, sending an identity credential viewing prompt to the second terminal so that the second terminal displays the identity credential;
if not, inquiring second user information of the second user based on the second user identification carried in the credential application.
In a specific implementation, in order to ensure the validity of the second user scanning the identification code of the target property, in an alternative implementation provided in this embodiment, the subordinate identity credential of the second user is created by:
Acquiring a credential application submitted by a second user through a second terminal scanning an identification code of a target property;
inquiring second user information of the second user based on a second user identifier carried in the credential application;
transmitting the credential application and the second user information into a third party verification interface to carry out credential admission verification of the second user, and acquiring a returned admission verification result;
and creating an identity credential of the second user for the target property according to the admission verification result.
Specifically, if the second user does not get the identity credentials for the target property after inquiry, sending an information reading authorization prompt to the second terminal; the second terminal displays the information reading authorization prompt sent by the server, and submits the information reading authorization prompt to the server when the information reading authorization instruction of the second user is acquired; after receiving the information reading authorization instruction, the server inquires second user information of a second user based on a second user identifier carried in the credential application, after reading the second user information, the server sends an information transmission authorization prompt to a second terminal based on the second user information, the second terminal displays the information transmission authorization prompt, and the information transmission authorization prompt is submitted to the server after the information transmission authorization instruction of the second user is acquired; and the server transmits the credential application and the second user information to a third party verification interface according to the information transmission authorization instruction to carry out credential admission verification of the second user, and obtains a returned admission verification result.
In the process of verifying the certificate admission by the third party verification platform, whether the second user has the property management qualification of the target property or not needs to be verified, and whether the first user is a property person of the target property or not needs to be verified. In an optional implementation manner provided in this embodiment, the third party verification platform performs credential admission verification in the following manner:
verifying whether the second user is a title person of the target property based on the second user information;
if yes, returning the second user to the server as the property right person of the target property;
if not, checking whether the first user is the property right person of the target property or not based on the first user information carried by the credential application; if yes, determining that the admission verification passes; if not, determining that the admission verification is not passed.
Further, in the process of creating the identity credential of the second user for the target property, if the admission verification result returned by the third party verification interface is that the second user is the property right person of the target property, creating the main identity credential of the second user for the target property; if the access verification result returned by the third party verification interface is verification passing, creating a subordinate identity certificate of the second user aiming at the target property; and if the admission verification result returned by the third party verification interface is that the verification is not passed, the processing is not performed.
In the process of creating the identity credential by the second user scanning the identification code of the target property, the second terminal performs the following steps in an alternative implementation provided in this embodiment: acquiring an identification code of a target property, and acquiring a first user identification and a property identification of the target property; submitting a credential application to a server based on the first user identification, the property identification, and the read second user identification; acquiring and displaying an information transmission authorization prompt sent by the server; and acquiring an authorization instruction of the second user based on the information transmission authorization prompt and submitting the authorization instruction to the server.
The following further describes the process of creating the master identity credential provided in this embodiment, referring to fig. 14, applied to the process of creating the master identity credential in the scene of creating the master identity credential, specifically including the following steps.
Step S1404, based on the first user identification, issuing an information reading authorization reminder to the first terminal.
Before this, the first terminal submits a first user identification to the server.
After that, the first terminal reads the authorization prompt rendering based on the information to create a guide page and display; and acquiring an information reading authorization instruction of the first user and submitting the information reading authorization instruction to the server.
Step S1410, reads the first user information based on the information reading authorization instruction, and issues an authorization alert to the first terminal based on the first user information.
After that, the first terminal collects the information transfer authorization instruction based on the information transfer authorization reminder and submits it to the server.
Step S1414, the first user information is transmitted into a third party verification interface to carry out admission verification based on the information transmission authorization instruction.
Step S1416, acquiring a property identifier of the target property returned by the third party verification interface.
Step S1418, creating a master identity credential for the first user for the target property based on the property identification.
The following further describes the identity credential processing method provided in this embodiment by taking an application of the identity credential processing method provided in this embodiment to a subordinate identity credential creation scenario as an example, and referring to fig. 15, the identity credential processing method applied to the subordinate identity credential creation scenario specifically includes the following steps.
Step S1506, inquiring the primary identity credential of the first user according to the authorization application.
Before the identification code of the second user is collected and identified by the first terminal, and an authorization application is submitted to the server based on the identification result.
The identification code of the second user is generated in the following way: the second terminal submits a second user identification to the server, the server sends information reading authorization prompt to the second terminal based on the second user identification, the second terminal creates a guide page and displays the guide page based on the information reading authorization prompt, collects the information reading authorization instruction of the second user and submits the information reading authorization instruction to the server, the server reads the second user information based on the information reading authorization instruction and sends information transmitting authorization prompt to the second terminal based on the second user information, the second terminal collects the information transmitting authorization instruction based on the information transmitting authorization prompt and submits the information transmitting authorization instruction to the server, the server sends the second user information to the third party verification interface for admission verification based on the information transmitting authorization instruction, and the property information of the second user returned by the third party verification interface is acquired to be null, and then the identification code of the second user is generated based on the second user information.
In step S1508, if the primary identity credential is not null, desensitizing the second user information in the authorization application.
In step S1510, the desensitized user information obtained by the desensitization processing is transmitted to the first terminal.
After that, the first terminal renders and displays an owner authorization page according to the desensitized user information; and collecting and submitting an authorization instruction of the first user to the server.
Step S1516, reading the property identifier corresponding to the main identity credential based on the authorization instruction.
And step S1518, issuing the property identification to the first terminal.
After that, the first terminal displays the property identification in the form of a property list and determines a target property selected by the first user; and sending the property identification of the target property to a server.
Step S1524, a type selection reminder is sent to the first terminal, and the user type submitted by the first terminal is obtained.
Step S1526, based on the user type, creates a subordinate identity credential for the second user for the target property.
It should be noted that, the above-mentioned process of creating the master identity credential and the identity credential processing method applied to the scenario of creating the slave identity credential may be split and combined at will, for example, the master identity credential of the first user is created through the process of creating the master identity credential of the first user, and in the process of creating the master identity credential of the second user through the process of creating the master identity credential, if the property identifier returned by the third party verification interface is obtained in step S1416 is empty, the slave identity credential of the second user is created through the identity credential processing method applied to the scenario of creating the slave identity credential.
In summary, in the identity credential processing method provided in this embodiment, a first user first obtains an authorization application submitted after scanning an identification code of a second user through a first terminal, then desensitizes second user information in the authorization application, issues the obtained desensitized user information to the first terminal, then determines a target property and a user type of the second user by interacting with the first terminal according to an authorization instruction submitted by the first terminal on the desensitized user information, and finally creates an identity credential of the second user for the target property according to the user type, thereby improving convenience of the user in using the credential application program and user experience.
The second identity credential processing method embodiment provided in the present specification:
referring to fig. 16, which shows a processing flow chart of an identity credential processing method provided in this embodiment, referring to fig. 2, which shows a creation guidance page diagram provided in this embodiment, referring to fig. 3, which shows an identity verification page diagram provided in this embodiment, referring to fig. 4, which shows an information transfer authorization page diagram provided in this embodiment, referring to fig. 5, which shows a property list page diagram provided in this embodiment, referring to fig. 6, which shows a detail presentation page diagram provided in this embodiment, referring to fig. 7, which shows an identity credential list page diagram provided in this embodiment, referring to fig. 8, which shows an identification code presentation page diagram provided in this embodiment, referring to fig. 9, it shows a schematic view of an owner authorization page provided in this embodiment, refer to fig. 10, which shows a schematic view of an information authorization page provided in this embodiment, refer to fig. 11, which shows a schematic view of an expiration reminding popup provided in this embodiment, refer to fig. 12, which shows a schematic view of a member list page provided in this embodiment, refer to fig. 13, which shows a schematic view of an invitation code presentation page provided in this embodiment, refer to fig. 14, which shows a process flow chart of a main identity credential creation process applied to a main identity credential creation scenario provided in this embodiment, refer to fig. 15, which shows a process flow chart of an identity credential processing method applied to a subordinate identity credential creation scenario provided in this embodiment.
Referring to fig. 16, the identity credential processing method provided in this embodiment is applied to a first terminal, and specifically includes steps S1602 to S1608.
The execution body of the identity credential processing method provided by the embodiment is a first terminal, the execution body of the first identity credential processing method embodiment provided by the present specification is a server, and the identity credential processing method applied to the first terminal provided by the present embodiment is matched with the identity credential processing method applied to the server provided by the above method embodiment in the execution process, so that the corresponding content of the above method embodiment is read.
Step S1602, collecting and identifying the identification code of the second user, and submitting an authorization application to the server based on the identification result.
The identity credential processing method provided by the embodiment cooperates with the third party verification platform, the identity credential is used for authenticating the property information, the owner can invite the family members or the tenants to acquire the subordinate identity credential when acquiring the main identity credential, the family members or the tenants can also establish the subordinate identity credential through the owner authorization under the condition that the acquisition of the main identity credential fails, the owner utilizes the main identity credential, and the family members or the tenants utilize the subordinate identity credential to effectively butt joint with the service provider, so that the aggregation and the display of the service are realized, and the housing experience of the owner, the family members and the tenants is improved.
In practical application, owners rent their own property to tenants, and the tenants are required to pay water and electricity fees, use electronic access control, and the like. In particular, in order to improve the convenience of the owners enjoying community services, the owners can open the owner identity credentials of the own property, and realize various services such as one-card passing, one-card reservation, one-card payment, one-card voting and the like through the owner identity credentials, after renting the own property to the tenants, the owners can authorize the tenants to obtain the subordinate identity credentials renting the property so that the tenants enjoy the corresponding services by utilizing the subordinate identity credentials, and in addition, the owners can invite the families to open the subordinate identity credentials so that the families enjoy the corresponding services.
The first terminal in this embodiment corresponds to a first user, where the first user includes a user with property management qualification. Such as a user of an owner, a property person, or a third party agency that obtains authorization from the owner. The second user comprises a family member and/or a tenant opening the subordinate identity credential. The identification code includes an identification code generated based on identity information of the second user in the event of failure to open the primary identity credential to the second user. In this embodiment, if it is determined that the user has property management qualification, the user is determined to be the first user, and a master identity credential is created according to the owner identity. If the user does not have the property management qualification through the third party verification platform, determining that the user is a second user, generating an identification code according to the user information of the second user, and then scanning the identification code by the first user and authorizing the identification code, so that a subordinate identity credential of the second user can be created.
In particular, the first user who has received the master identity credential may only authorize the second user after scanning the second user's identification code to create a slave identity credential for the second user. In this embodiment, the server opens the primary identity credential of the first user by:
acquiring the first user identification submitted by the first terminal;
reading first user information based on the first user identification, and carrying out identity verification on the first user according to the first user information;
and transmitting the first user information into a third party verification interface to carry out admission verification of the first user based on the information transmitting authorization instruction submitted by the first terminal under the condition that verification passes.
Specifically, because the first user information belongs to the privacy of the first user to a certain extent, the server needs to obtain the authorization of the first user first to ensure the privacy security of the first user, and in order to further ensure the privacy security of the first user, the server transmits the first user information to the third party verification interface and also needs to obtain the authorization of the first user.
Based on this, in the process of opening the primary identity credential of the first user, the following steps are performed: the server acquires the first user identification submitted by the first terminal; transmitting an information reading authorization reminder to the first terminal based on the first user identification; the first terminal receives and displays the information reading authorization prompt; the first terminal collects information reading authorization instructions of a first user and submits the information reading authorization instructions to the server; the server reads first user information based on the information reading authorization instruction and the first user identification, and carries out biological feature recognition on the first user according to the first user information; if the identification is not passed, not processing; if the identification is passed, an information transmission authorization prompt is sent to the first terminal; the first terminal receives and displays the information transmission authorization prompt; collecting an information transmission authorization instruction of the first user and submitting the information transmission authorization instruction to the server; and after receiving the information transmission authorization instruction, the server transmits the first user information to a third party verification interface to carry out admission verification of the first user.
Further, in order to guarantee the validity and the authenticity of the property management qualification of the first user, the third party verification platform verifies the first user information, and under the condition that the first user has the property management qualification, a main identity certificate of the first user aiming at the property is created. In an optional implementation manner provided in this embodiment, the third party platform performs admission verification in the following manner:
inquiring property information corresponding to the first user based on the first user information;
the property information is sent to the first terminal, so that the first terminal displays the property information;
third party identity credentials are created for the target property selected by the first user via the property information.
Specifically, the third party verification platform queries the property information of the first user based on the first user information; the house property information is sent to a first terminal; after receiving the property information, the first terminal displays the property information in a property list form; and the third party verification platform creates a third party identity certificate of the first user aiming at the target property under the condition that the target property selected by the first user through the property list is received. In this embodiment, after the third party verification platform creates the third party identity credential for the first user for the target property, the server performs the following operations:
Acquiring a certificate identifier of the third party identity certificate returned by the third party verification interface and a property identifier of the target property;
based on the credential identity and the property identity, a master identity credential for the first user for the target property is created.
And the server creates a main identity certificate of the first user aiming at the target property according to the certificate identification of the third-party identity certificate returned by the third-party verification interface and the property identification of the target property. It should be noted that, the property information of the first user is maintained by the third party verification platform, so that in order to ensure the information security of the first user, the server cannot obtain the property information of the first user maintained by the third party verification platform, and therefore, the third party verification platform queries the property information of the first user and obtains the target property selected by the first user. In order to further ensure the property information safety of the first user, the third party verification platform can desensitize the property information when returning the property information of the target property to the server, and then returns the acquired desensitized property information.
For example, the first user submits a first user identification of the first user to the server under the condition that the first user access credential application is detected by scanning a program identification code, searching a program name or other channel access credential application, the server sends an information reading authorization reminder to the first terminal based on the first user identification, and the first terminal renders and displays a creation guide page shown in fig. 2 based on the creation guide content of the identity credential and the information reading authorization reminder after receiving the information reading authorization reminder. When the first terminal detects that the first user triggers an agreement and swipes a face acquisition control in the figure 2, submitting an information reading authorization instruction to the server, after receiving the information reading authorization instruction, reading first user information according to a first user identification, performing desensitization processing on the first user information, sending the desensitized first user information to the first terminal, so that the first terminal acquires a face image of the first user through an identity verification page shown in the figure 3, uploads the acquired face image to the server, after the face image verification passes, sending an information transmission authorization prompt to the first terminal, rendering an information transmission authorization page shown in the figure 4 according to the information transmission authorization prompt, displaying the information transmission authorization page, after detecting the agreement control configured by the first user identification, submitting the information transmission authorization instruction to the server, sending the first user information into a third party verification interface according to the information transmission authorization instruction, inquiring the first user information to be a property verification platform based on the first user information, and sending the acquired face image to a property verification card shown in the figure 5, and creating a property removal list of a property object property of a user shown in the figure 1, if the property removal list is shown in the figure 1; the server acquires the desensitized property identification returned by the third party verification interface and the third party owner card identification of the third party owner card, and creates the owner card of the first user aiming at the target property based on the property identification acquired by the desensitization processing and the third party owner card identification, wherein the owner card corresponds to the third party owner card one by one. After creating the owner card, the first user may view the owner card, and upon detecting a user's access request to the owner card, the user is presented with a detail presentation page as shown in fig. 6.
In addition, after creating the master identity credential for the first user for the target property, the first user may also create master identity credentials for multiple properties. When a first user opens a main identity credential of a plurality of properties, in order to reduce the operation flow of the first user in the process of creating the main identity credential, the experience of the first user is improved, if the first user opens a plurality of properties, the first user does not need to be authorized repeatedly, but in order to ensure the identity validity of the first user, identity verification needs to be carried out on the first user. Specifically, the server acquires a new application of the identity credential submitted by a first user through a first terminal; reading first user information based on the newly added application; identity verification is carried out on the first user according to the first user information; if the verification passes, the first user information is transmitted to a third party verification interface for admission verification; acquiring a certificate identifier of a third-party newly-added identity certificate returned by a third-party verification interface and a property identifier of a newly-added property; and creating a master identity credential of the first user for the newly added property based on the credential identification and the property identification.
As shown in fig. 7, the first user can view the created owner card and the sub-card through the identity credential list page, and can also perform the real estate augmentation through the identity credential list page.
When the method is implemented, if the result returned by the third party verification interface to the server is that the query result of the real estate information is empty, the server determines that the user is a second user, generates an identification code of the second user based on the second user information of the second user, sends the identification code to the second terminal, the second user can share the identification code with the first terminal, and the first terminal authorizes the second user information after scanning the identification code, so that the second user can receive the subordinate identity credential. In this embodiment, the identification code is generated as follows:
reading the second user information according to the second user identifier, and carrying out identity verification on the second user according to the second user information;
transmitting an authorization instruction based on information submitted by a second terminal under the condition that verification passes, and transmitting the second user information into a third party verification interface to carry out admission verification of the second user;
and if the third party verification interface returns that the property information of the second user is empty, generating the identification code based on the second user information and sending the identification code to the second terminal.
Specifically, in order to enable the second user without the property management qualification to obtain the identity credential by using the identity of the tenant or the family, under the condition that the inquiring result of the property information of the second user is empty, an identification code is generated according to the second user information of the second user and sent to the second terminal, the second user can share the identification code, so that the user with the main identity credential scans the identification code and performs authorization, and the second user obtains the identity credential.
For example, when the second terminal detects that the second user accesses the credential application program, the second terminal submits a second user identification of the second user to the server, the server performs identity verification on the second user based on the second user information after acquiring an information reading authorization instruction of the second user, and when the verification passes, the second user information is transmitted to the third party verification interface based on an information transmission authorization instruction of the second user to perform admission verification, if the verification result returned by the third party verification interface is that the property information of the second user is empty, an identification code is generated according to the second user information, and the identification code is sent to the second terminal, and after receiving the identification code, the second terminal renders an identification code display page shown in fig. 8 based on the identification code and displays the identification code display page.
It should be noted that, after the second user obtains the identification code, the second user may share the identification code, and after the identification code is scanned, the first user scanning the identification code is checked for authorization authority, i.e. whether the first user has the main identity credential is checked. In an optional implementation manner provided in this embodiment, a first terminal collects and identifies an identification code of a second user, submits an authorization application to a server based on an identification result, and after the server obtains the authorization application submitted after the first user scans the identification code of the second user through the first terminal, performs the following operations: querying whether the first user has a master identity credential based on the first user identification; if yes, desensitizing the second user information in the authorized application, and issuing the obtained desensitized user information to the first terminal; if not, the first terminal is enabled to display the creation guide page shown in the figure 2.
Step S1604, receiving and displaying the desensitized identity information issued by the server.
In the implementation, in order to avoid information leakage caused by the fact that the first user does not have the credential authorization authority to check the second user information, after the authorization application is acquired, the server performs verification of the credential authorization authority on the first user according to the first user identifier in the authorization application; in order to improve the perception degree of the first user on the second user information, the second user is prevented from forging the identification code to obtain authorization, the identity certificate is further obtained to cause loss to the first user, and the second user information is displayed under the condition that the first user is determined to have the certificate authorization authority, so that the first user confirms the second user information; the second user information at least comprises the name, the contact information and the identity of the second user, so that the information security of the second user is ensured in order to further prevent the second user information from being revealed, the server desensitizes the second user information before sending the second user information to the first terminal, and sends the second user information after the desensitization to the first terminal, so that the first terminal displays the second user information after the desensitization.
In the process, desensitization user information issued by the server is received and displayed, an authorization instruction which is input by a first user and is used for the desensitization user information is acquired, and the authorization instruction is submitted to the server.
For example, in the case that the identification code of the second user is scanned, submitting an authorization application based on the recognition result of the identification code, and the server querying whether the first user has created the owner card based on the authorization application; if not, the first terminal receives the opening prompt sent by the server and displays the creation guide page shown in the figure 2; if yes, the server performs desensitization processing on the second user information in the identification result to obtain desensitized user information, the first terminal receives the desensitized user information sent by the server, and based on the desensitized user information, the owner authorization page shown in fig. 9 is rendered and displayed.
Step S1606, an authorization instruction of the desensitization identity information, which is input by the first user, is obtained and submitted to the server.
When the method is implemented, after an authorization instruction of a first user to second user information is obtained, the authorization instruction is submitted to a server, and the server determines the user types of the target property and the second user through interaction with the first terminal according to the authorization instruction.
And step S1608, interacting with the server to determine the target property and the user type of the second user.
In this embodiment, the server queries whether the first user has the master identity credential based on the first user identifier, if so, desensitizes the second user information in the authorization application, and issues the obtained desensitized user information to the first terminal; if not, the first terminal is caused to display the creation guide page shown in fig. 2. Correspondingly, in the process of interacting with the server to determine the target property and the user type of the second user, the first terminal executes the following steps:
receiving a property identifier sent by the server, and displaying the property identifier in a property identifier list form;
acquiring a property identifier of a target property selected by the first user through the property identifier list, and submitting the property identifier of the target property to the server;
and receiving a type selection prompt sent by the server, collecting the user type of the second user based on the type selection prompt, and submitting the user type to the server.
Specifically, the server reads a property identifier of a main identity certificate created by a first user according to an authorization instruction submitted by the first terminal, and sends the property identifier to the first terminal; the first terminal displays the property identification in the form of a property identification list so that a first user selects a target property for authorization; the first terminal submits a property identifier of the target property to the server under the condition that the first user selects the target property; the server sends a type selection reminder of the second user to the first terminal based on the property identifier; and rendering and displaying a user type acquisition page by the first terminal after receiving the type selection prompt, and submitting the user type to the server if the first terminal detects that the first user inputs the user type through the type acquisition page.
For example, after receiving an authorization instruction submitted by a property terminal, the server inquires at least one property card which is already created according to the property identification, reads the property identification corresponding to each property card, sends the property identification to the property terminal, so that the property terminal can display the property identification of a target property which is authorized by the property terminal in a property identification list mode, the server sends a type selection reminder to the property terminal after acquiring the property identification of the target property, and the property terminal acquires a type collection page and displays the type according to the type selection reminder and submits the type to the server after acquiring the type of a user which is input by the property.
In addition, in this embodiment, for the user type, the collection may be performed on a page on which the desensitized user information is displayed. Specifically, after receiving the desensitized user information, rendering and displaying an information authorization page shown in fig. 10 based on the desensitized information, wherein the first user inputs a user type through the information authorization page, if the user type is a tenant type, the first user inputs a valid period through the information authorization page, and submits an authorization instruction and the user type of the first user to a server through a control of 'agreeing to open' configured by triggering the information authorization page; correspondingly, the server is matched for interaction to determine the target property and the property identification in the main identity certificate of the first user, which is read and sent by the server, in the implementation process of the user type of the second user, and the property identification is displayed; submitting a property identifier of the target property to a server under the condition that the first user selects the target property; and the server acquires the property identifier of the target property selected by the first user and submitted by the first terminal.
The user types include a family type and/or a tenant type. If the user type is the tenant type, the created identity credential is configured with a valid period.
In practical application, the family members of the first user can open the identity credentials of the target property, if the first user leases the target property to the tenant, the tenant can also open the identity credentials of the target property, but the tenant has a certain period for renting the target property, which is not long-lived.
In order to improve the convenience of the owners and the tenants in using the identity credentials, the perception degree of the owners and the tenants on the credential application program is improved, if the user type selected by the owners is the tenant type, the owners are reminded of inputting the valid period of the identity credentials, the tenants can enjoy corresponding services through the identity credentials within the valid period, and after the valid period is reached, the identity credentials of the tenants are logged off. In this embodiment, the server performs the following steps in the process of creating the identity credential of the second user for the target property according to the user type:
if the user type is a tenant type, acquiring the valid period of the subordinate identity credential of the first user for authorizing the second user to use the target property;
Creating a subordinate identity credential of the second user for the target property based on the tenant type and the expiration date;
if the user type is a family type, creating a subordinate identity credential of the second user for the target property based on the family type.
In the implementation, if the user type is a tenant type, the established subordinate identity certificate aiming at the target property is configured with the valid period, and if the server detects that the valid period of the subordinate identity certificate is reached, an expiration prompt is sent to the second terminal so that the second terminal displays the result; after receiving the expiration reminding, the second terminal can touch the expiration reminding to the second user in an instant messaging or station communication mode and the like, and displays the expiration reminding to the second user when the second user accesses the subordinate identity credential.
As shown in fig. 11, if the second user accesses the sub card after the expiration date of the sub card has arrived, the second user is presented with an expiration reminder through an expiration reminder pop-up. The user can remind the popup window to conduct the pin card of the auxiliary card through expiration.
If the owner information of the target property maintained by the third-party verification platform changes, the server receives the owner change prompt transmitted by the third-party verification interface, and sends a property failure prompt to the first terminal based on the owner change prompt, so that the first terminal displays the property failure prompt when the first user accesses the main identity certificate. It should be noted that the first user and the second user may actively initiate a logoff request for the master identity credential and the slave identity credential.
In addition, in order to improve the perception degree of the owner to the credential application program, in order to improve the simplicity of the owner after the owner rents the property to the tenant, the owner can actively invite the tenant or the family to get the subordinate identity credential after creating the main identity credential. In this embodiment, after the first user creates the master identity credential for the target property, the member management item of the master identity credential may invite the family member or the tenant to obtain the subordinate identity credential. In this embodiment, the server obtains a sharing request submitted by the first terminal for the target property; generating a family invitation code based on the property identification of the target property and the first user identification of the first user and sending the family invitation code to the first terminal; the first terminal receives the family invitation code, renders an invitation code display page based on the family invitation code and displays the invitation code display page, wherein the invitation code display page is configured with a trigger control of a tenant invitation code; if the first terminal detects that the trigger control is triggered, acquiring the valid period of the second user authorized to use the subordinate identity credential by the first user; submitting the expiration date to the server; and the server generates the tenant invitation code and sends the tenant invitation code to the first terminal based on the valid period, so that the first terminal displays the tenant invitation code. It should be noted that, both the family invitation code and the tenant invitation code are identification codes of the target property. The identification code of the target property is initiated by the first user and is generated based on first user information of the first user, a user type of the second user selected by the first user and a property identification of the target property.
In this embodiment, for the identification code of the target property, the following manner is adopted to generate:
acquiring a user adding request submitted by the first user aiming at the target property;
if the user type in the user adding request is a family type, generating the identification code based on the family type, the target property and/or the first user information;
if the user type in the user adding request is a tenant type, acquiring the valid period of renting the target property by the first user;
the identification code is generated based on the tenant type, the expiration date, the target property, and/or the first user information.
For example, when the owner views the detail presentation page shown in fig. 6 and triggers the member management item, the member list page shown in fig. 12 is presented, and the member list includes the user who gets the owner card or the auxiliary card for the target property, and the member information in the member list is presented in a desensitization manner for protecting the information security of the user. The method comprises the steps that a member control is triggered and added by an owner, a sharing request aiming at a target property is submitted to a server, the server generates a family invitation code based on a property identifier of the target property and the owner identifier and sends the family invitation code to an owner terminal, the owner terminal renders an invitation code display page shown in fig. 13 and displays the invitation code, if the condition that the 'tenant invitation code' control configured by the invitation code display page is triggered is detected, the owner is reminded of recording an effective period, the effective period is submitted to the server, the server creates a tenant invitation code based on the effective period, the property identifier and the owner identifier and sends the tenant invitation code to the owner terminal, and the owner terminal displays the tenant invitation code after receiving the tenant invitation code. The owner may send the invitation code to the second user through the "share invitation" control of the invitation code presentation page configuration.
In specific implementation, the first terminal shares the identification code of the target property with the second terminal, and after receiving the identification code of the target property shared by the first terminal, the second terminal executes the following operations:
acquiring an identification code of the target property, and acquiring the first user identification and the property identification of the target property;
submitting a credential application to a server based on the first user identification, the property identification, and the read second user identification;
accordingly, the server performs the following operations: and acquiring the certificate application submitted by the second user through the second terminal scanning the identification code of the target property.
In order to prevent the second user from opening the card for multiple times, the server further executes the following operations after acquiring the credential application:
querying whether the second user has the identity credential for the target property;
if yes, sending an identity credential viewing prompt to the second terminal so that the second terminal displays the identity credential;
if not, inquiring second user information of the second user based on the second user identification carried in the credential application.
To ensure the validity of the second user scanning the identification code of the target property, the server creates a subordinate identity credential of the second user by:
Acquiring a credential application submitted by a second user through a second terminal scanning an identification code of a target property;
inquiring second user information of the second user based on a second user identifier carried in the credential application;
transmitting the credential application and the second user information into a third party verification interface to carry out credential admission verification of the second user, and acquiring a returned admission verification result;
and creating an identity credential of the second user for the target property according to the admission verification result.
Specifically, if the second user does not get the identity credentials for the target property after inquiry, sending an information reading authorization prompt to the second terminal; the second terminal displays the information reading authorization prompt sent by the server, and submits the information reading authorization prompt to the server when the information reading authorization instruction of the second user is acquired; after receiving the information reading authorization instruction, the server inquires second user information of a second user based on a second user identifier carried in the credential application, after reading the second user information, the server sends an information transmission authorization prompt to a second terminal based on the second user information, the second terminal displays the information transmission authorization prompt, and the information transmission authorization prompt is submitted to the server after the information transmission authorization instruction of the second user is acquired; and the server transmits the credential application and the second user information to a third party verification interface according to the information transmission authorization instruction to carry out credential admission verification of the second user, and obtains a returned admission verification result.
In the process of verifying the certificate admission by the third party verification platform, whether the second user has the property management qualification of the target property or not needs to be verified, and whether the first user is a property person of the target property or not needs to be verified. Based on the above, the third party verification platform performs credential admission verification by:
verifying whether the second user is a title person of the target property based on the second user information;
if yes, returning the second user to the server as the property right person of the target property;
if not, checking whether the first user is the property right person of the target property or not based on the first user information carried by the credential application; if yes, determining that the admission verification passes; if not, determining that the admission verification is not passed.
Further, in the process of creating the identity credential of the second user for the target property, if the admission verification result returned by the third party verification interface is that the second user is the property right person of the target property, creating the main identity credential of the second user for the target property; if the access verification result returned by the third party verification interface is verification passing, creating a subordinate identity certificate of the second user aiming at the target property; and if the admission verification result returned by the third party verification interface is that the verification is not passed, the processing is not performed.
In the process of creating the identity credential by scanning the identification code of the target property by the second user, the second terminal performs the following steps: acquiring an identification code of a target property, and acquiring a first user identification and a property identification of the target property; submitting a credential application to a server based on the first user identification, the property identification, and the read second user identification; acquiring and displaying an information transmission authorization prompt sent by the server; and acquiring an authorization instruction of the second user based on the information transmission authorization prompt and submitting the authorization instruction to the server.
The following further describes the process of creating the master identity credential provided in this embodiment, referring to fig. 14, applied to the process of creating the master identity credential in the scene of creating the master identity credential, specifically including the following steps.
Step S1402, the first terminal submits a first user identification to the server.
After that, the server issues an information reading authorization reminder to the first terminal based on the first user identification.
Step S1406, a guide page is created and displayed based on the information reading authorization reminding rendering.
In step S1408, the information reading authorization instruction of the first user is collected and submitted to the server.
After that, the first user information is read based on the information reading authorization instruction, and an authorization reminder is transmitted to the first terminal by issuing information based on the first user information.
In step S1412, the information transfer authorization instruction is collected based on the information transfer authorization reminder and submitted to the server.
After that, the server transmits the first user information to a third party verification interface for admission verification based on the information transmission authorization instruction; acquiring a property identifier of a target property returned by a third party verification interface; based on the property identification, a master identity credential for the first user for the target property is created.
The following further describes the identity credential processing method provided in this embodiment by taking an application of the identity credential processing method provided in this embodiment to a subordinate identity credential creation scenario as an example, and referring to fig. 15, the identity credential processing method applied to the subordinate identity credential creation scenario specifically includes the following steps.
Step S1502, an identification code of the second user is collected and identified.
Step S1504, submitting an authorization application to the server based on the recognition result.
After that, the server inquires the main identity credentials of the first user according to the authorization application; if the main identity certificate is not empty, desensitizing the second user information in the authorized application; and transmitting the desensitized user information obtained by the desensitization processing to the first terminal.
Step S1512, rendering and displaying the owner authorization page according to the desensitized user information.
Step S1514, collecting and submitting the authorization instruction of the first user to the server.
After that, the server reads the property identification corresponding to the main identity credential based on the authorization instruction; and issuing the property identification to the first terminal.
In step S1520, the first terminal displays the property identifier in the form of a property list, and determines a target property selected by the first user.
Step S1522, the property identifier of the target property is sent to the server.
After that, the server sends a type selection reminder to the first terminal and acquires the user type submitted by the first terminal; based on the user type, a subordinate identity credential for the second user for the target property is created.
In summary, in the identity credential processing method provided in this embodiment, the identification code of the second user is collected and identified, and an authorization application is submitted to the server based on the identification result, then the desensitized identity information issued by the server is received and displayed, then the authorization instruction of the first user for the desensitized identity information is acquired and submitted to the server, and finally the interaction is performed in cooperation with the server, so as to determine the target property and the user type of the second user, thereby improving the convenience of the user in using the credential application program and improving the user experience.
The third identity credential processing method embodiment provided in the present specification:
referring to fig. 17, which shows a processing flow chart of an identity credential processing method provided in this embodiment, referring to fig. 2, which shows a creation guidance page diagram provided in this embodiment, referring to fig. 3, which shows an identity verification page diagram provided in this embodiment, referring to fig. 4, which shows an information transfer authorization page diagram provided in this embodiment, referring to fig. 5, which shows a property list page diagram provided in this embodiment, referring to fig. 6, which shows a detailed presentation page diagram provided in this embodiment, referring to fig. 7, which shows an identity credential list page diagram provided in this embodiment, referring to fig. 8, which shows an identification code presentation page diagram provided in this embodiment, referring to fig. 12, which shows a member list page diagram provided in this embodiment, referring to fig. 13, which shows an invitation code presentation page diagram provided in this embodiment, and referring to fig. 18, which shows a detailed presentation page diagram provided in this embodiment applied to the identity credential processing method provided in this embodiment.
Referring to fig. 17, the identity credential processing method provided in the present embodiment is applied to a server, and specifically includes steps S1702 to S1708.
Step S1702, acquiring a credential application submitted by a second user through a second terminal scanning an identification code of a target property.
The identity credential processing method provided by the embodiment cooperates with the third party verification platform, the identity credential is used for authenticating the property information, the owner can invite the family members or the tenants to acquire the subordinate identity credential when acquiring the main identity credential, the family members or the tenants can also establish the subordinate identity credential through the owner authorization under the condition that the acquisition of the main identity credential fails, the owner utilizes the main identity credential, and the family members or the tenants utilize the subordinate identity credential to effectively butt joint with the service provider, so that the aggregation and the display of the service are realized, and the housing experience of the owner, the family members and the tenants is improved.
In practical application, owners rent their own property to tenants, and the tenants are required to pay water and electricity fees, use electronic access control, and the like. In particular, in order to improve the convenience of the owners enjoying community services, the owners can open the owner identity credentials of the own property, and realize various services such as one-card passing, one-card reservation, one-card payment, one-card voting and the like through the owner identity credentials, after renting the own property to the tenants, the owners can authorize the tenants to obtain the subordinate identity credentials renting the property so that the tenants enjoy the corresponding services by utilizing the subordinate identity credentials, and in addition, the owners can invite the families to open the subordinate identity credentials so that the families enjoy the corresponding services.
The second user in this embodiment includes a family member and/or a tenant that opens the subordinate identity credential. The identification code of the target property is initiated by the first user and is generated based on first user information of the first user, a user type of the second user selected by the first user and a property identification of the target property. The first user comprises a user with title management qualification. Such as a user of an owner, a property person, or a third party agency that obtains authorization from the owner. In this embodiment, if it is determined that the user has property management qualification, the user is determined to be the first user, and a master identity credential is created according to the owner identity of the first user. If the user does not have the property management qualification through the third party verification platform, the user is determined to be the second user, after the identification code is generated according to the user information of the second user, the first user scans the identification code and authorizes the identification code, the subordinate identity certificate of the second user can be created, in addition, the first user can also receive the main identity certificate and generate the identification code of the target real estate and share the identification code with the second terminal, and the second terminal creates the subordinate identity certificate of the second user aiming at the target real estate through scanning the identification code.
In the implementation, the first user who has acquired the master identity credential can only generate the identification code of the target property, and the second user can create the slave identity credential of the second user after scanning the identification code. In an optional implementation manner provided in this embodiment, the primary identity credential of the first user is opened in the following manner:
acquiring the first user identification submitted by the first terminal;
reading first user information based on the first user identification, and carrying out identity verification on the first user according to the first user information;
and transmitting the first user information into a third party verification interface to carry out admission verification of the first user based on the information transmitting authorization instruction submitted by the first terminal under the condition that verification passes.
Specifically, because the first user information belongs to the privacy of the first user to a certain extent, the server needs to obtain the authorization of the first user first to ensure the privacy security of the first user, and in order to further ensure the privacy security of the first user, the server transmits the first user information to the third party verification interface and also needs to obtain the authorization of the first user.
Based on this, in the process of opening the primary identity credential of the first user, the following steps are performed: acquiring the first user identification submitted by the first terminal; transmitting an information reading authorization reminder to the first terminal based on the first user identification; the first terminal receives and displays the information reading authorization prompt; the first terminal collects information reading authorization instructions of a first user and submits the information reading authorization instructions to the server; the server reads first user information based on the information reading authorization instruction and the first user identification, and carries out biological feature recognition on the first user according to the first user information; if the identification is not passed, not processing; if the identification is passed, an information transmission authorization prompt is sent to the first terminal; the first terminal receives and displays the information transmission authorization prompt; collecting an information transmission authorization instruction of the first user and submitting the information transmission authorization instruction to the server; and after receiving the information transmission authorization instruction, the server transmits the first user information to a third party verification interface to carry out admission verification of the first user.
Further, in order to guarantee the validity and the authenticity of the property management qualification of the first user, the third party verification platform verifies the first user information, and under the condition that the first user has the property management qualification, a main identity certificate of the first user aiming at the property is created. In an optional implementation manner provided in this embodiment, the third party platform performs admission verification in the following manner:
Inquiring property information corresponding to the first user based on the first user information;
the property information is sent to the first terminal, so that the first terminal displays the property information;
third party identity credentials are created for the target property selected by the first user via the property information.
Specifically, the third party verification platform queries the property information of the first user based on the first user information; the method comprises the steps of sending the property information to a first terminal so that the first terminal displays the property information in a property list mode; and the third party verification platform creates a third party identity certificate of the first user aiming at the target property under the condition that the target property selected by the first user through the property list is received. In an optional implementation manner provided in this embodiment, after the third party verification platform creates the third party identity credential for the target property of the first user, the server performs the following operations:
acquiring a certificate identifier of the third party identity certificate returned by the third party verification interface and a property identifier of the target property;
based on the credential identity and the property identity, a master identity credential for the first user for the target property is created.
And the server creates a main identity certificate of the first user aiming at the target property according to the certificate identification of the third-party identity certificate returned by the third-party verification interface and the property identification of the target property. It should be noted that, the property information of the first user is maintained by the third party verification platform, so that in order to ensure the information security of the first user, the server cannot obtain the property information of the first user maintained by the third party verification platform, and therefore, the third party verification platform queries the property information of the first user and obtains the target property selected by the first user. In order to further ensure the property information safety of the first user, the third party verification platform can desensitize the property information when returning the property information of the target property to the server, and then returns the acquired desensitized property information.
For example, the first user submits a first user identification of the first user to the server under the condition that the first user access credential application is detected by scanning a program identification code, searching a program name or other channel access credential application, the server sends an information reading authorization reminder to the first terminal based on the first user identification, and the first terminal renders and displays a creation guide page shown in fig. 2 based on the creation guide content of the identity credential and the information reading authorization reminder after receiving the information reading authorization reminder. When the first terminal detects that the first user triggers an agreement and swipes a face acquisition control in the figure 2, submitting an information reading authorization instruction to the server, after receiving the information reading authorization instruction, reading first user information according to a first user identification, performing desensitization processing on the first user information, sending the desensitized first user information to the first terminal, so that the first terminal acquires a face image of the first user through an identity verification page shown in the figure 3, uploads the acquired face image to the server, after the face image verification passes, sending an information transmission authorization prompt to the first terminal, rendering an information transmission authorization page shown in the figure 4 according to the information transmission authorization prompt, displaying the information transmission authorization page, after detecting the agreement control configured by the first user identification, submitting the information transmission authorization instruction to the server, sending the first user information into a third party verification interface according to the information transmission authorization instruction, inquiring the first user information to be a property verification platform based on the first user information, and sending the acquired face image to a property verification card shown in the figure 5, and creating a property removal list of a property object property of a user shown in the figure 1, if the property removal list is shown in the figure 1; the server acquires the desensitized property identification returned by the third party verification interface and the third party owner card identification of the third party owner card, and creates the owner card of the first user aiming at the target property based on the property identification acquired by the desensitization processing and the third party owner card identification, wherein the owner card corresponds to the third party owner card one by one. After creating the owner card, the first user may view the owner card, and upon detecting a user's access request to the owner card, the user is presented with a detail presentation page as shown in fig. 6.
In addition, after creating the master identity credential for the first user for the target property, the first user may also create master identity credentials for multiple properties. When a first user opens a main identity credential of a plurality of properties, in order to reduce the operation flow of the first user in the process of creating the main identity credential, the experience of the first user is improved, if the first user opens a plurality of properties, the first user does not need to be authorized repeatedly, but in order to ensure the identity validity of the first user, identity verification needs to be carried out on the first user. Specifically, a new application of the identity certificate submitted by a first user through a first terminal is obtained, first user information is read based on the new application, and identity verification is carried out on the first user according to the first user information; if the verification passes, the first user information is transmitted into a third party verification interface to conduct admission verification, a certificate identification of a third party newly-added identity certificate returned by the third party verification interface and a property identification of the newly-added property are obtained, and a main identity certificate of the first user aiming at the newly-added property is created based on the certificate identification and the property identification.
As shown in fig. 7, the first user can view the created owner card and the sub-card through the identity credential list page, and can also perform the real estate augmentation through the identity credential list page.
In the implementation process, if the result returned by the third party verification interface is that the query result of the property information is null, the user is determined to be a second user, an identification code of the second user is generated based on the second user information of the second user, the identification code is sent to the second terminal, the second user can share the identification code with the first terminal, and the first terminal authorizes the second user information after scanning the identification code, so that the second user receives the subordinate identity credential. In an alternative implementation manner provided in this embodiment, the identification code is generated in the following manner:
reading the second user information according to the second user identifier, and carrying out identity verification on the second user according to the second user information;
transmitting an authorization instruction based on information submitted by a second terminal under the condition that verification passes, and transmitting the second user information into a third party verification interface to carry out admission verification of the second user;
and if the third party verification interface returns that the property information of the second user is empty, generating the identification code based on the second user information and sending the identification code to the second terminal.
Specifically, in order to enable the second user without the property management qualification to obtain the identity credential by using the identity of the tenant or the family, under the condition that the inquiring result of the property information of the second user is empty, an identification code is generated according to the second user information of the second user and sent to the second terminal, the second user can share the identification code, so that the user with the main identity credential scans the identification code and performs authorization, and the second user obtains the identity credential.
For example, when the second terminal detects that the second user accesses the credential application program, the second terminal submits a second user identification of the second user to the server, the server performs identity verification on the second user based on the second user information after acquiring an information reading authorization instruction of the second user, and when the verification passes, the second user information is transmitted to the third party verification interface based on an information transmission authorization instruction of the second user to perform admission verification, if the verification result returned by the third party verification interface is that the property information of the second user is empty, an identification code is generated according to the second user information, and the identification code is sent to the second terminal, and after receiving the identification code, the second terminal renders an identification code display page shown in fig. 8 based on the identification code and displays the identification code display page.
It should be noted that, after the second user obtains the identification code, the second user may share the identification code, and after the identification code is scanned, the first user scanning the identification code is checked for authorization authority, i.e. whether the first user has the main identity credential is checked. In an optional implementation manner provided in this embodiment, a first terminal collects and identifies an identification code of a second user, submits an authorization application to a server based on an identification result, and after the server obtains the authorization application submitted after the first user scans the identification code of the second user through the first terminal, performs the following operations: querying whether the first user has a master identity credential based on the first user identification; if yes, desensitizing the second user information in the authorized application, and issuing the obtained desensitized user information to the first terminal; if not, the first terminal is enabled to display the creation guide page shown in the figure 2.
In order to improve the perception degree of the owner to the credential application program, and to improve the simplicity of the owner after the owner rents the property to the tenant, the owner can actively invite the tenant or the family to get the subordinate identity credential after creating the master identity credential. In this embodiment, after the first user creates the master identity credential for the target property, the member management item of the master identity credential may invite the family member or the tenant to obtain the subordinate identity credential. In an optional implementation manner provided in this embodiment, a sharing request submitted by the first terminal for the target property is obtained; generating a family invitation code based on the property identification of the target property and the first user identification of the first user and sending the family invitation code to the first terminal; the first terminal receives the family invitation code, renders an invitation code display page based on the family invitation code and displays the invitation code display page, wherein the invitation code display page is configured with a trigger control of a tenant invitation code; if the first terminal detects that the trigger control is triggered, acquiring the valid period of the second user authorized to use the subordinate identity credential by the first user; submitting the expiration date to the server; and the server generates the tenant invitation code and sends the tenant invitation code to the first terminal based on the valid period, so that the first terminal displays the tenant invitation code. It should be noted that, both the family invitation code and the tenant invitation code are identification codes of the target property. In an optional implementation manner provided in this embodiment, the identification code of the target property is generated in the following manner:
Acquiring a user adding request submitted by the first user aiming at the target property;
if the user type in the user adding request is a family type, generating the identification code based on the family type, the target property and/or the first user information;
if the user type in the user adding request is a tenant type, acquiring the valid period of renting the target property by the first user;
the identification code is generated based on the tenant type, the expiration date, the target property, and/or the first user information.
For example, when the owner views the detail presentation page shown in fig. 6 and triggers the member management item, the owner terminal presents a member list page shown in fig. 12, and the member list includes the user who gets the owner card or the sub card for the target property, so that the information security of the user is protected, and the member information in the member list is presented in a desensitization manner. The owner triggers and adds a member control, the owner terminal submits a sharing request aiming at the target property to the server, the server generates a family invitation code based on the property identifier of the target property and the owner identifier and sends the family invitation code to the owner terminal, the owner terminal renders an invitation code display page shown in fig. 13 and displays the invitation code display page, if the owner terminal detects that a 'tenant invitation code' control configured by the invitation code display page is triggered, the owner terminal reminds the owner to enter an effective period and submits the effective period to the server, the server creates a tenant invitation code based on the effective period, the property identifier and the owner identifier and sends the tenant invitation code to the owner terminal, and the owner terminal displays the tenant invitation code after receiving the tenant invitation code. The owner may send the invitation code to the second user through the "share invitation" control of the invitation code presentation page configuration.
In an optional implementation manner provided in this embodiment, after receiving the identifier of the target property shared by the first terminal, the second terminal performs the following operations:
acquiring an identification code of the target property, and acquiring the first user identification and the property identification of the target property;
and submitting a credential application to a server based on the first user identification, the property identification and the read second user identification.
Accordingly, the server performs the following operations:
and acquiring the certificate application submitted by the second user through the second terminal scanning the identification code of the target property.
In order to prevent the second user from opening the card multiple times, in an optional implementation manner provided in this embodiment, after obtaining the credential application, the server further performs the following operations:
querying whether the second user has the identity credential for the target property;
if yes, sending an identity credential viewing prompt to the second terminal so that the second terminal displays the identity credential;
if not, inquiring second user information of the second user based on the second user identification carried in the credential application.
Step S1704, query second user information of the second user based on the second user identifier carried in the credential application.
Step S1706, transmitting the credential application and the second user information to a third party verification interface to perform credential admission verification of the second user, and obtaining a returned admission verification result.
Step S1708, creating an identity credential of the second user for the target property according to the admission verification result.
If the second user does not get the identity credentials for the target property after inquiry, sending an information reading authorization prompt to the second terminal; the second terminal displays the information reading authorization prompt sent by the server, and submits the information reading authorization prompt to the server when the information reading authorization instruction of the second user is acquired; after receiving the information reading authorization instruction, the server inquires second user information of a second user based on a second user identifier carried in the credential application, after reading the second user information, the server sends an information transmission authorization prompt to a second terminal based on the second user information, the second terminal displays the information transmission authorization prompt, and the information transmission authorization prompt is submitted to the server after the information transmission authorization instruction of the second user is acquired; and the server transmits the credential application and the second user information to a third party verification interface according to the information transmission authorization instruction to carry out credential admission verification of the second user, and obtains a returned admission verification result.
In the process of verifying the certificate admission by the third party verification platform, whether the second user has the property management qualification of the target property or not needs to be verified, and whether the first user is a property person of the target property or not needs to be verified. In an optional implementation manner provided in this embodiment, the third party verification platform performs credential admission verification in the following manner:
verifying whether the second user is a title person of the target property based on the second user information;
if yes, returning the second user to the server as the property right person of the target property;
if not, checking whether the first user is the property right person of the target property or not based on the first user information carried by the credential application; if yes, determining that the admission verification passes; if not, determining that the admission verification is not passed.
Further, in the process of creating the identity credential of the second user for the target property, if the admission verification result returned by the third party verification interface is that the second user is the property right person of the target property, creating the main identity credential of the second user for the target property; if the access verification result returned by the third party verification interface is verification passing, creating a subordinate identity certificate of the second user aiming at the target property; and if the admission verification result returned by the third party verification interface is that the verification is not passed, the processing is not performed.
In the process of creating the identity credential by the second user scanning the identification code of the target property, the second terminal performs the following steps in an alternative implementation provided in this embodiment: acquiring an identification code of a target property, and acquiring a first user identification and a property identification of the target property; submitting a credential application to a server based on the first user identification, the property identification, and the read second user identification; acquiring and displaying an information transmission authorization prompt sent by the server; and acquiring an authorization instruction of the second user based on the information transmission authorization prompt and submitting the authorization instruction to the server.
The following further describes the identity credential processing method provided in this embodiment by taking an application of the identity credential processing method provided in this embodiment to an identity credential creation scenario as an example, and referring to fig. 18, the identity credential processing method applied to the identity credential creation scenario specifically includes the following steps.
Step S1806, query the identity credential of the second user for the target property based on the second user identification in the credential application.
Before the identification code of the target property is acquired and identified by the second terminal, and a certificate application is submitted to the server based on the identification result.
Step S1808, if the query result is null, sending an information reading authorization prompt to the second terminal.
And after that, the second terminal displays the information reading authorization prompt and submits the information reading authorization prompt to the server when the information reading authorization instruction of the second user is acquired.
Step S1812, reading the second user information according to the information reading authorization instruction and the second user identifier.
Step S1814, transmitting an information transfer authorization reminder to the second terminal based on the second user information.
And after that, the second terminal displays the information transmission authorization prompt, and collects the information transmission authorization instruction of the second user and submits the information transmission authorization instruction to the server.
Step S1818, according to the information transmission authorization instruction, the credential application and the second user information are transmitted into a third party verification interface for credential admission verification, and the returned verification result is obtained.
Step S1820, creating an identity credential of the second user for the target property according to the returned verification result.
In summary, in the identity credential processing method provided in this embodiment, a credential application submitted by a second user through an identifier code of a target property is first obtained, then second user information of the second user is queried based on a second user identifier carried in the credential application, then the credential application and the second user information are transferred into a third party verification interface to perform credential admission verification of the second user, a returned admission verification result is obtained, and finally an identity credential of the second user for the target property is created according to the admission verification result, so that the identity credential of the second user is created by inviting the first user, and the second user can enjoy a corresponding service after creating the identity credential.
The fourth identity credential processing method embodiment provided in the present specification:
referring to fig. 19, a process flow chart of an identity credential processing method provided in this embodiment is shown, referring to fig. 2, a creation guidance page schematic diagram provided in this embodiment is shown, referring to fig. 3, an identity verification page schematic diagram provided in this embodiment is shown, referring to fig. 4, an information transmission authorization page schematic diagram provided in this embodiment is shown, referring to fig. 5, a property list page schematic diagram provided in this embodiment is shown, referring to fig. 6, a detail presentation page schematic diagram provided in this embodiment is shown, referring to fig. 7, an identity credential list page schematic diagram provided in this embodiment is shown, referring to fig. 8, an identification code presentation page schematic diagram provided in this embodiment is shown, referring to fig. 12, a member list page schematic diagram provided in this embodiment is shown, referring to fig. 13, an invitation code presentation page schematic diagram provided in this embodiment is shown, and referring to fig. 18, a detailed presentation page schematic diagram provided in this embodiment is shown, which is applied to a process flow chart of an identity credential processing scene provided in this embodiment is shown.
Referring to fig. 19, the identity credential processing method provided in this embodiment is applied to a second terminal, and specifically includes steps S1902 to S1908.
The execution body of the identity credential processing method provided by the embodiment is a second terminal, the execution body of the third identity credential processing method embodiment provided by the present specification is a server, and the identity credential processing method applied to the second terminal provided by the present embodiment is matched with the identity credential processing method applied to the server provided by the above method embodiment in the execution process, so that the corresponding content of the above method embodiment is read.
Step 1902, collecting an identification code of a target property, and obtaining a first user identification and a property identification of the target property.
The identity credential processing method provided by the embodiment cooperates with the third party verification platform, the identity credential is used for authenticating the property information, the owner can invite the family members or the tenants to acquire the subordinate identity credential when acquiring the main identity credential, the family members or the tenants can also establish the subordinate identity credential through the owner authorization under the condition that the acquisition of the main identity credential fails, the owner utilizes the main identity credential, and the family members or the tenants utilize the subordinate identity credential to effectively butt joint with the service provider, so that the aggregation and the display of the service are realized, and the housing experience of the owner, the family members and the tenants is improved.
In practical application, owners rent their own property to tenants, and the tenants are required to pay water and electricity fees, use electronic access control, and the like. In particular, in order to improve the convenience of the owners enjoying community services, the owners can open the owner identity credentials of the own property, and realize various services such as one-card passing, one-card reservation, one-card payment, one-card voting and the like through the owner identity credentials, after renting the own property to the tenants, the owners can authorize the tenants to obtain the subordinate identity credentials renting the property so that the tenants enjoy the corresponding services by utilizing the subordinate identity credentials, and in addition, the owners can invite the families to open the subordinate identity credentials so that the families enjoy the corresponding services.
The first user in this embodiment includes a user with title management qualification. Such as a user of an owner, a property person, or a third party agency that obtains authorization from the owner. The second terminal corresponds to a second user, which includes a family and/or tenant opening a subordinate identity credential. The identification code of the target property is initiated by the first user and is generated based on first user information of the first user, a user type of the second user selected by the first user and a property identification of the target property.
In particular implementations, a first user who has received the master identity credential can create the identification code of the target property and share with a second user to create a slave identity credential of the second user. In this embodiment, the server opens the primary identity credential of the first user by:
acquiring the first user identification submitted by the first terminal;
reading first user information based on the first user identification, and carrying out identity verification on the first user according to the first user information;
and transmitting the first user information into a third party verification interface to carry out admission verification of the first user based on the information transmitting authorization instruction submitted by the first terminal under the condition that verification passes.
Specifically, because the first user information belongs to the privacy of the first user to a certain extent, the server needs to obtain the authorization of the first user first to ensure the privacy security of the first user, and in order to further ensure the privacy security of the first user, the server transmits the first user information to the third party verification interface and also needs to obtain the authorization of the first user.
Based on this, in the process of opening the primary identity credential of the first user, the following steps are performed: the server acquires the first user identification submitted by the first terminal; transmitting an information reading authorization reminder to the first terminal based on the first user identification; the first terminal receives and displays the information reading authorization prompt; the first terminal collects information reading authorization instructions of a first user and submits the information reading authorization instructions to the server; the server reads first user information based on the information reading authorization instruction and the first user identification, and carries out biological feature recognition on the first user according to the first user information; if the identification is not passed, not processing; if the identification is passed, an information transmission authorization prompt is sent to the first terminal; the first terminal receives and displays the information transmission authorization prompt; collecting an information transmission authorization instruction of the first user and submitting the information transmission authorization instruction to the server; and after receiving the information transmission authorization instruction, the server transmits the first user information to a third party verification interface to carry out admission verification of the first user.
Further, in order to guarantee the validity and the authenticity of the property management qualification of the first user, the third party verification platform verifies the first user information, and under the condition that the first user has the property management qualification, a main identity certificate of the first user aiming at the property is created. In an optional implementation manner provided in this embodiment, the third party platform performs admission verification in the following manner:
inquiring property information corresponding to the first user based on the first user information;
the property information is sent to the first terminal, so that the first terminal displays the property information;
third party identity credentials are created for the target property selected by the first user via the property information.
Specifically, the third party verification platform queries the property information of the first user based on the first user information; the method comprises the steps that property information is sent to a first terminal, and the property information is displayed in a property list mode after the first terminal receives the property information; and the third party verification platform creates a third party identity certificate of the first user aiming at the target property under the condition that the target property selected by the first user through the property list is received. In this embodiment, after the third party verification platform creates the third party identity credential for the first user for the target property, the server performs the following operations:
Acquiring a certificate identifier of the third party identity certificate returned by the third party verification interface and a property identifier of the target property;
based on the credential identity and the property identity, a master identity credential for the first user for the target property is created.
And the server creates a main identity certificate of the first user aiming at the target property according to the certificate identification of the third-party identity certificate returned by the third-party verification interface and the property identification of the target property. It should be noted that, the property information of the first user is maintained by the third party verification platform, so that in order to ensure the information security of the first user, the server cannot obtain the property information of the first user maintained by the third party verification platform, and therefore, the third party verification platform queries the property information of the first user and obtains the target property selected by the first user. In order to further ensure the property information safety of the first user, the third party verification platform can desensitize the property information when returning the property information of the target property to the server, and then returns the acquired desensitized property information.
For example, the first user submits a first user identification of the first user to the server under the condition that the first user access credential application is detected by scanning a program identification code, searching a program name or other channel access credential application, the server sends an information reading authorization reminder to the first terminal based on the first user identification, and the first terminal renders and displays a creation guide page shown in fig. 2 based on the creation guide content of the identity credential and the information reading authorization reminder after receiving the information reading authorization reminder. When the first terminal detects that the first user triggers an agreement and swipes a face acquisition control in the figure 2, submitting an information reading authorization instruction to the server, after receiving the information reading authorization instruction, reading first user information according to a first user identification, performing desensitization processing on the first user information, sending the desensitized first user information to the first terminal, so that the first terminal acquires a face image of the first user through an identity verification page shown in the figure 3, uploads the acquired face image to the server, after the face image verification passes, sending an information transmission authorization prompt to the first terminal, rendering an information transmission authorization page shown in the figure 4 according to the information transmission authorization prompt, displaying the information transmission authorization page, after detecting the agreement control configured by the first user identification, submitting the information transmission authorization instruction to the server, sending the first user information into a third party verification interface according to the information transmission authorization instruction, inquiring the first user information to be a property verification platform based on the first user information, and sending the acquired face image to a property verification card shown in the figure 5, and creating a property removal list of a property object property of a user shown in the figure 1, if the property removal list is shown in the figure 1; the server acquires the desensitized property identification returned by the third party verification interface and the third party owner card identification of the third party owner card, and creates the owner card of the first user aiming at the target property based on the property identification acquired by the desensitization processing and the third party owner card identification, wherein the owner card corresponds to the third party owner card one by one. After creating the owner card, the first user may view the owner card, and upon detecting a user's access request to the owner card, the user is presented with a detail presentation page as shown in fig. 6.
In addition, after creating the master identity credential for the first user for the target property, the first user may also create master identity credentials for multiple properties. When a first user opens a main identity credential of a plurality of properties, in order to reduce the operation flow of the first user in the process of creating the main identity credential, the experience of the first user is improved, if the first user opens a plurality of properties, the first user does not need to be authorized repeatedly, but in order to ensure the identity validity of the first user, identity verification needs to be carried out on the first user. Specifically, the server acquires a new application of the identity credential submitted by a first user through a first terminal; reading first user information based on the newly added application; identity verification is carried out on the first user according to the first user information; if the verification passes, the first user information is transmitted to a third party verification interface for admission verification; acquiring a certificate identifier of a third-party newly-added identity certificate returned by a third-party verification interface and a property identifier of a newly-added property; and creating a master identity credential of the first user for the newly added property based on the credential identification and the property identification.
As shown in fig. 7, the first user can view the created owner card and the sub-card through the identity credential list page, and can also perform the real estate augmentation through the identity credential list page.
In the implementation process, if the result returned by the third party verification interface is that the query result of the property information is null, the user is determined to be a second user, an identification code of the second user is generated based on the second user information of the second user, the identification code is sent to the second terminal, the second user can share the identification code with the first terminal, and the first terminal authorizes the second user information after scanning the identification code, so that the second user receives the subordinate identity credential. In an alternative implementation manner provided in this embodiment, the identification code is generated in the following manner:
reading the second user information according to the second user identifier, and carrying out identity verification on the second user according to the second user information;
transmitting an authorization instruction based on information submitted by a second terminal under the condition that verification passes, and transmitting the second user information into a third party verification interface to carry out admission verification of the second user;
and if the third party verification interface returns that the property information of the second user is empty, generating the identification code based on the second user information and sending the identification code to the second terminal.
Specifically, in order to enable the second user without the property management qualification to obtain the identity credential by using the identity of the tenant or the family, under the condition that the inquiring result of the property information of the second user is empty, an identification code is generated according to the second user information of the second user and sent to the second terminal, the second user can share the identification code, so that the user with the main identity credential scans the identification code and performs authorization, and the second user obtains the identity credential.
For example, when the second terminal detects that the second user accesses the credential application program, the second terminal submits a second user identification of the second user to the server, the server performs identity verification on the second user based on the second user information after acquiring an information reading authorization instruction of the second user, and when the verification passes, the second user information is transmitted to the third party verification interface based on an information transmission authorization instruction of the second user to perform admission verification, if the verification result returned by the third party verification interface is that the property information of the second user is empty, an identification code is generated according to the second user information, and the identification code is sent to the second terminal, and after receiving the identification code, the second terminal renders an identification code display page shown in fig. 8 based on the identification code and displays the identification code display page.
It should be noted that, after the second user obtains the identification code, the second user may share the identification code, and after the identification code is scanned, the first user scanning the identification code is checked for authorization authority, i.e. whether the first user has the main identity credential is checked. In an optional implementation manner provided in this embodiment, a first terminal collects and identifies an identification code of a second user, submits an authorization application to a server based on an identification result, and after the server obtains the authorization application submitted after the first user scans the identification code of the second user through the first terminal, performs the following operations: querying whether the first user has a master identity credential based on the first user identification; if yes, desensitizing the second user information in the authorized application, and issuing the obtained desensitized user information to the first terminal; if not, the first terminal is enabled to display the creation guide page shown in the figure 2.
Step S1904, submitting a credential application to a server based on the first user identification, the property identification, and the read second user identification.
Step S1906, obtaining and displaying the information transmission authorization prompt sent by the server.
Step S1908, collecting the authorization instruction of the second user based on the information transmission authorization prompt and submitting the authorization instruction to the server.
In order to improve the perception degree of the owner to the credential application program, and to improve the simplicity of the owner after the owner rents the property to the tenant, the owner can actively invite the tenant or the family to get the subordinate identity credential after creating the master identity credential. In this embodiment, after the first user creates the master identity credential for the target property, the member management item of the master identity credential may invite the family member or the tenant to obtain the subordinate identity credential. In an optional implementation manner provided in this embodiment, a sharing request submitted by the first terminal for the target property is obtained; generating a family invitation code based on the property identification of the target property and the first user identification of the first user and sending the family invitation code to the first terminal; the first terminal receives the family invitation code, renders an invitation code display page based on the family invitation code and displays the invitation code display page, wherein the invitation code display page is configured with a trigger control of a tenant invitation code; if the first terminal detects that the trigger control is triggered, acquiring the valid period of the second user authorized to use the subordinate identity credential by the first user; submitting the expiration date to the server; and the server generates the tenant invitation code and sends the tenant invitation code to the first terminal based on the valid period, so that the first terminal displays the tenant invitation code. It should be noted that, both the family invitation code and the tenant invitation code are identification codes of the target property. In an optional implementation manner provided in this embodiment, the identification code of the target property is generated in the following manner:
Acquiring a user adding request submitted by the first user aiming at the target property;
if the user type in the user adding request is a family type, generating the identification code based on the family type, the target property and/or the first user information;
if the user type in the user adding request is a tenant type, acquiring the valid period of renting the target property by the first user;
the identification code is generated based on the tenant type, the expiration date, the target property, and/or the first user information.
For example, when the owner views the detail presentation page shown in fig. 6 and triggers the member management item, the owner terminal presents a member list page shown in fig. 12, and the member list includes the user who gets the owner card or the sub card for the target property, so that the information security of the user is protected, and the member information in the member list is presented in a desensitization manner. The owner triggers and adds a member control, the owner terminal submits a sharing request aiming at the target property to the server, the server generates a family invitation code based on the property identifier of the target property and the owner identifier and sends the family invitation code to the owner terminal, the owner terminal renders an invitation code display page shown in fig. 13 and displays the invitation code display page, if the owner terminal detects that a 'tenant invitation code' control configured by the invitation code display page is triggered, the owner terminal reminds the owner to enter an effective period and submits the effective period to the server, the server creates a tenant invitation code based on the effective period, the property identifier and the owner identifier and sends the tenant invitation code to the owner terminal, and the owner terminal displays the tenant invitation code after receiving the tenant invitation code. The owner may send the invitation code to the second user through the "share invitation" control of the invitation code presentation page configuration.
In an optional implementation manner provided in this embodiment, after receiving the identifier of the target property shared by the first terminal, the second terminal performs the following operations:
acquiring an identification code of the target property, and acquiring the first user identification and the property identification of the target property;
and submitting a credential application to a server based on the first user identification, the property identification and the read second user identification.
Accordingly, the server performs the following operations:
and acquiring the certificate application submitted by the second user through the second terminal scanning the identification code of the target property.
In order to prevent the second user from opening the card multiple times, in an optional implementation manner provided in this embodiment, after obtaining the credential application, the server further performs the following operations:
querying whether the second user has the identity credential for the target property;
if yes, sending an identity credential viewing prompt to the second terminal so that the second terminal displays the identity credential;
if not, inquiring second user information of the second user based on the second user identification carried in the credential application.
The server inquires second user information of the second user based on a second user identification carried in the credential application, transmits the credential application and the second user information into a third party verification interface to carry out credential admission verification of the second user, and acquires a returned admission verification result; and creating an identity credential of the second user for the target property according to the admission verification result.
If the second user does not get the identity credentials for the target property after inquiry, sending an information reading authorization prompt to the second terminal; the second terminal displays the information reading authorization prompt sent by the server, and submits the information reading authorization prompt to the server when the information reading authorization instruction of the second user is acquired; after receiving the information reading authorization instruction, the server inquires second user information of a second user based on a second user identifier carried in the credential application, after reading the second user information, the server sends an information transmission authorization prompt to a second terminal based on the second user information, the second terminal displays the information transmission authorization prompt, and the information transmission authorization prompt is submitted to the server after the information transmission authorization instruction of the second user is acquired; and the server transmits the credential application and the second user information to a third party verification interface according to the information transmission authorization instruction to carry out credential admission verification of the second user, and obtains a returned admission verification result.
In the process of verifying the certificate admission by the third party verification platform, whether the second user has the property management qualification of the target property or not needs to be verified, and whether the first user is a property person of the target property or not needs to be verified. In an optional implementation manner provided in this embodiment, the third party verification platform performs credential admission verification in the following manner:
Verifying whether the second user is a title person of the target property based on the second user information;
if yes, returning the second user to the server as the property right person of the target property;
if not, checking whether the first user is the property right person of the target property or not based on the first user information carried by the credential application; if yes, determining that the admission verification passes; if not, determining that the admission verification is not passed.
Further, in the process of creating the identity credential of the second user for the target property, if the admission verification result returned by the third party verification interface is that the second user is the property right person of the target property, creating the main identity credential of the second user for the target property; if the access verification result returned by the third party verification interface is verification passing, creating a subordinate identity certificate of the second user aiming at the target property; and if the admission verification result returned by the third party verification interface is that the verification is not passed, the processing is not performed.
In the process of creating the identity credential by the second user scanning the identification code of the target property, the second terminal performs the following steps in an alternative implementation provided in this embodiment: acquiring an identification code of a target property, and acquiring a first user identification and a property identification of the target property; submitting a credential application to a server based on the first user identification, the property identification, and the read second user identification; acquiring and displaying an information transmission authorization prompt sent by the server; and acquiring an authorization instruction of the second user based on the information transmission authorization prompt and submitting the authorization instruction to the server.
The following further describes the identity credential processing method provided in this embodiment by taking an application of the identity credential processing method provided in this embodiment to an identity credential creation scenario as an example, and referring to fig. 18, the identity credential processing method applied to the identity credential creation scenario specifically includes the following steps.
In step S1802, the second terminal collects and identifies an identification code of the target property.
Step S1804, submitting a credential application to the server based on the recognition result.
After that, the server queries the identity credentials of the second user for the target property based on the second user identification in the credential application; and if the query result is null, sending an information reading authorization prompt to the second terminal.
In step S1810, the second terminal displays the information reading authorization reminder and submits the information reading authorization reminder to the server when the information reading authorization instruction of the second user is acquired.
And after that, the server reads the second user information according to the information reading authorization instruction and the second user identification, and sends an information transmission authorization prompt to the second terminal based on the second user information.
In step S1816, the second terminal displays the information transmission authorization reminder, and collects the information transmission authorization instruction of the second user and submits the information transmission authorization instruction to the server.
After that, the server transmits the certificate application and the second user information into a third party verification interface for certificate admission verification according to the information transmission authorization instruction, and acquires a returned verification result; and creating an identity credential of the second user for the target property according to the returned verification result.
In summary, in the identity credential processing method provided in this embodiment, the identification code of the target property is collected first, the first user identification and the property identification of the target property are obtained, then the credential application is submitted to the server based on the first user identification, the property identification and the read second user identification, then the information transmission authorization prompt sent by the server is obtained and displayed, and finally the authorization instruction of the second user is collected based on the information transmission authorization prompt and submitted to the server, so that the identity credential of the second user is created in a manner of inviting by the first user, and the second user can enjoy the corresponding service after creating the identity credential.
The first identity credential processing device provided in the present specification is as follows:
in the foregoing embodiments, an identity credential processing method applied to a server is provided, and corresponding identity credential processing device is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 20, a schematic diagram of an identity credential processing device provided in this embodiment is shown.
Since the apparatus embodiments correspond to the method embodiments, the description is relatively simple, and the relevant portions should be referred to the corresponding descriptions of the method embodiments provided above. The device embodiments described below are merely illustrative.
The embodiment provides an identity credential processing device, which is operated in a server and includes:
the application acquisition module 2002 is configured to acquire an authorized application submitted after the first user scans the identification code of the second user through the first terminal;
a desensitization processing module 2004 configured to desensitize the second user information in the authorized application, and issue the obtained desensitized user information to the first terminal;
an information determining module 2006 configured to determine a target property and a user type of the second user by interacting with the first terminal according to an authorization instruction submitted by the first terminal for the desensitized user information;
a credential creation module 2008 configured to create an identity credential of the second user for the target property according to the user type.
The second identity credential processing device provided in the present specification is as follows:
In the foregoing embodiments, an identity credential processing method applied to a first terminal is provided, and an identity credential processing device corresponding to the identity credential processing method is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 21, a schematic diagram of an identity credential processing device according to this embodiment is shown.
Since the apparatus embodiments correspond to the method embodiments, the description is relatively simple, and the relevant portions should be referred to the corresponding descriptions of the method embodiments provided above. The device embodiments described below are merely illustrative.
The embodiment provides an identity credential processing device, which is operated at a first terminal and includes:
an application submitting module 2102 configured to collect and identify an identification code of the second user and submit an authorized application to the server based on the identification result;
an information presentation module 2104 configured to receive and present desensitized user information issued by the server;
an authorization submission module 2106 configured to obtain an authorization instruction entered by a first user for the desensitized user information and submit the authorization instruction to the server;
an interaction coordination module 2108 configured to interact with the server to determine a target property and a user type of the second user.
The third identity credential processing device provided in the present specification is as follows:
in the foregoing embodiments, an identity credential processing method applied to a server is provided, and corresponding identity credential processing device is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 22, a schematic diagram of an identity credential processing device according to this embodiment is shown.
Since the apparatus embodiments correspond to the method embodiments, the description is relatively simple, and the relevant portions should be referred to the corresponding descriptions of the method embodiments provided above. The device embodiments described below are merely illustrative.
The embodiment provides an identity credential processing device, which is operated in a server and includes:
an application acquisition module 2202 configured to acquire a credential application submitted by a second user through a second terminal scanning an identification code of a target property;
an information query module 2204 configured to query second user information of the second user based on a second user identifier carried in the credential application;
an admission verification module 2206 configured to transfer the credential application and the second user information into a third party verification interface for performing credential admission verification of the second user, and obtain a returned admission verification result;
A credential creation module 2208 configured to create an identity credential of the second user for the target property based on the admission verification result.
The fourth identity credential processing device provided in the present specification is as follows:
in the foregoing embodiments, an identity credential processing method applied to a second terminal is provided, and an identity credential processing device corresponding to the identity credential processing method is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 23, a schematic diagram of an identity credential processing device according to this embodiment is shown.
Since the apparatus embodiments correspond to the method embodiments, the description is relatively simple, and the relevant portions should be referred to the corresponding descriptions of the method embodiments provided above. The device embodiments described below are merely illustrative.
The embodiment provides an identity credential processing device, which is operated at a second terminal and includes:
an identification acquisition module 2302 configured to acquire an identification code of a target property, and to obtain a first user identification and a property identification of the target property;
an application submission module 2304 configured to submit a credential application to a server based on the first user identification, the property identification, and the read second user identification;
A reminder display module 2306 configured to obtain and display information delivery authorization reminders sent by the server;
an instruction submission module 2308 configured to gather and submit authorization instructions for a second user to the server based on the information delivery authorization prompt.
The first identity credential processing device embodiment provided in this specification is as follows:
corresponding to the above-described identity credential processing method applied to the server, one or more embodiments of the present disclosure further provide an identity credential processing device, based on the same technical concept, where the identity credential processing device is configured to perform the above-provided identity credential processing method, and fig. 24 is a schematic structural diagram of an identity credential processing device provided by one or more embodiments of the present disclosure.
The identity credential processing device provided in this embodiment includes:
as shown in fig. 24, the identity credential processing device may have a relatively large difference due to different configurations or capabilities, and may include one or more processors 2401 and a memory 2402, where the memory 2402 may store one or more storage applications or data. Wherein memory 2402 may be transient or persistent. The application program stored in memory 2402 may include one or more modules (not shown in the figures), each of which may include a series of computer executable instructions in the identity credential processing device. Still further, processor 2401 may be configured to communicate with memory 2402 to execute a series of computer executable instructions in memory 2402 on an identity credential processing device. The identity credential processing device may also include one or more power supplies 2403, one or more wired or wireless network interfaces 2404, one or more input/output interfaces 2405, one or more keyboards 2406, and the like.
In a particular embodiment, an identity credential processing device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the identity credential processing device, and execution of the one or more programs by one or more processors comprises computer-executable instructions for:
acquiring an authorization application submitted by a first user after the first terminal scans the identification code of a second user;
desensitizing the second user information in the authorized application, and issuing the acquired desensitized user information to the first terminal;
determining a target property and a user type of the second user through interaction with the first terminal according to an authorization instruction submitted by the first terminal for the desensitized user information;
and creating an identity credential of the second user for the target property according to the user type.
The second identity credential processing device embodiment provided in this specification is as follows:
Corresponding to the above-described identity credential processing method applied to the first terminal, one or more embodiments of the present disclosure further provide an identity credential processing device, based on the same technical concept, where the identity credential processing device is configured to perform the above-provided identity credential processing method, and fig. 25 is a schematic structural diagram of an identity credential processing device provided by one or more embodiments of the present disclosure.
The identity credential processing device provided in this embodiment includes:
as shown in FIG. 25, the identity credential processing device may vary considerably in configuration or performance, and may include one or more processors 2501 and memory 2502, where the memory 2502 may store one or more storage applications or data. Wherein the memory 2502 may be transient or persistent. The application program stored in memory 2502 may include one or more modules (not shown in the figures) each of which may include a series of computer executable instructions in the identity credential processing device. Still further, the processor 2501 may be configured to communicate with a memory 2502 and execute a series of computer executable instructions in the memory 2502 on an identity credential processing device. The identity credential processing device can also include one or more power supplies 2503, one or more wired or wireless network interfaces 2504, one or more input/output interfaces 2505, one or more keyboards 2506, and the like.
In a particular embodiment, an identity credential processing device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the identity credential processing device, and execution of the one or more programs by one or more processors comprises computer-executable instructions for:
collecting and identifying the identification code of the second user, and submitting an authorization application to the server based on the identification result;
receiving and displaying desensitized user information issued by the server;
acquiring an authorization instruction which is input by a first user and is used for desensitizing the user information, and submitting the authorization instruction to the server;
and interacting with the server to determine a target property and a user type of the second user.
The third identity credential processing device embodiment provided in this specification is as follows:
corresponding to the above-described identity credential processing method applied to the server, one or more embodiments of the present disclosure further provide an identity credential processing device, based on the same technical concept, where the identity credential processing device is configured to perform the above-provided identity credential processing method, and fig. 26 is a schematic structural diagram of an identity credential processing device provided by one or more embodiments of the present disclosure.
The identity credential processing device provided in this embodiment includes:
as shown in fig. 26, the identity credential processing device may include one or more processors 2601 and a memory 2602, where the memory 2602 may store one or more storage applications or data, which may vary in configuration or performance. Wherein the memory 2602 may be transient storage or persistent storage. The application program stored in memory 2602 may include one or more modules (not shown in the figures), each of which may include a series of computer executable instructions in the identity credential processing device. Still further, the processor 2601 may be configured to communicate with a memory 2602 and execute a series of computer executable instructions in the memory 2602 on the identity credential processing device. The identity credential processing device may also include one or more power supplies 2603, one or more wired or wireless network interfaces 2604, one or more input/output interfaces 2605, one or more keyboards 2606, and the like.
In a particular embodiment, an identity credential processing device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the identity credential processing device, and execution of the one or more programs by one or more processors comprises computer-executable instructions for:
Acquiring a credential application submitted by a second user through a second terminal scanning an identification code of a target property;
inquiring second user information of the second user based on a second user identifier carried in the credential application;
transmitting the credential application and the second user information into a third party verification interface to carry out credential admission verification of the second user, and acquiring a returned admission verification result;
and creating an identity credential of the second user for the target property according to the admission verification result.
The fourth identity credential processing device embodiment provided in this specification is as follows:
corresponding to the above-described identity credential processing method applied to the second terminal, one or more embodiments of the present disclosure further provide an identity credential processing device, based on the same technical concept, where the identity credential processing device is configured to perform the above-provided identity credential processing method, and fig. 27 is a schematic structural diagram of an identity credential processing device provided by one or more embodiments of the present disclosure.
The identity credential processing device provided in this embodiment includes:
as shown in fig. 27, the identity credential processing device may be configured or configured differently to provide a relatively large variance, and may include one or more processors 2701 and memory 2702, where the memory 2702 may store one or more storage applications or data. Wherein memory 2702 may be transient storage or persistent storage. The application programs stored in memory 2702 may include one or more modules (not shown in the figures), each of which may include a series of computer executable instructions in the identity credential processing device. Still further, the processor 2701 may be configured to communicate with a memory 2702 and execute a series of computer executable instructions in the memory 2702 on an identity credential processing device. The identity credential processing device may also include one or more power supplies 2703, one or more wired or wireless network interfaces 2704, one or more input/output interfaces 2705, one or more keyboards 2706, and the like.
In a particular embodiment, an identity credential processing device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the identity credential processing device, and execution of the one or more programs by one or more processors comprises computer-executable instructions for:
acquiring an identification code of a target property, and acquiring a first user identification and a property identification of the target property;
submitting a credential application to a server based on the first user identification, the property identification, and the read second user identification;
acquiring and displaying an information transmission authorization prompt sent by the server;
and acquiring an authorization instruction of the second user based on the information transmission authorization prompt and submitting the authorization instruction to the server.
The first storage medium embodiment provided in the present specification is as follows:
corresponding to the identity credential processing method applied to the server, one or more embodiments of the present disclosure further provide a storage medium based on the same technical concept.
The storage medium provided in this embodiment is configured to store computer executable instructions, where the computer executable instructions when executed implement the following procedures:
acquiring an authorization application submitted by a first user after the first terminal scans the identification code of a second user;
desensitizing the second user information in the authorized application, and issuing the acquired desensitized user information to the first terminal;
determining a target property and a user type of the second user through interaction with the first terminal according to an authorization instruction submitted by the first terminal for the desensitized user information;
and creating an identity credential of the second user for the target property according to the user type.
It should be noted that, the embodiments related to the storage medium in the present specification and the embodiments related to the identity credential processing method in the present specification are based on the same inventive concept, so that the specific implementation of the embodiments may refer to the implementation of the corresponding method, and the repetition is omitted.
The second storage medium embodiment provided in the present specification is as follows:
corresponding to the identity credential processing method applied to the first terminal, one or more embodiments of the present disclosure further provide a storage medium based on the same technical concept.
The storage medium provided in this embodiment is configured to store computer executable instructions, where the computer executable instructions when executed implement the following procedures:
collecting and identifying the identification code of the second user, and submitting an authorization application to the server based on the identification result;
receiving and displaying desensitized user information issued by the server;
acquiring an authorization instruction which is input by a first user and is used for desensitizing the user information, and submitting the authorization instruction to the server;
and interacting with the server to determine a target property and a user type of the second user.
It should be noted that, the embodiments related to the storage medium in the present specification and the embodiments related to the identity credential processing method in the present specification are based on the same inventive concept, so that the specific implementation of the embodiments may refer to the implementation of the corresponding method, and the repetition is omitted.
A third storage medium embodiment provided in the present specification is as follows:
corresponding to the identity credential processing method applied to the server, one or more embodiments of the present disclosure further provide a storage medium based on the same technical concept.
The storage medium provided in this embodiment is configured to store computer executable instructions, where the computer executable instructions when executed implement the following procedures:
Acquiring a credential application submitted by a second user through a second terminal scanning an identification code of a target property;
inquiring second user information of the second user based on a second user identifier carried in the credential application;
transmitting the credential application and the second user information into a third party verification interface to carry out credential admission verification of the second user, and acquiring a returned admission verification result;
and creating an identity credential of the second user for the target property according to the admission verification result.
It should be noted that, the embodiments related to the storage medium in the present specification and the embodiments related to the identity credential processing method in the present specification are based on the same inventive concept, so that the specific implementation of the embodiments may refer to the implementation of the corresponding method, and the repetition is omitted.
A fourth storage medium embodiment provided in the present specification is as follows:
corresponding to the identity credential processing method applied to the second terminal, one or more embodiments of the present disclosure further provide a storage medium based on the same technical concept.
The storage medium provided in this embodiment is configured to store computer executable instructions, where the computer executable instructions when executed implement the following procedures:
Acquiring an identification code of a target property, and acquiring a first user identification and a property identification of the target property;
submitting a credential application to a server based on the first user identification, the property identification, and the read second user identification;
acquiring and displaying an information transmission authorization prompt sent by the server;
and acquiring an authorization instruction of the second user based on the information transmission authorization prompt and submitting the authorization instruction to the server.
It should be noted that, the embodiments related to the storage medium in the present specification and the embodiments related to the identity credential processing method in the present specification are based on the same inventive concept, so that the specific implementation of the embodiments may refer to the implementation of the corresponding method, and the repetition is omitted.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
In the 30 s of the 20 th century, improvements to one technology could clearly be distinguished as improvements in hardware (e.g., improvements to circuit structures such as diodes, transistors, switches, etc.) or software (improvements to the process flow). However, with the development of technology, many improvements of the current method flows can be regarded as direct improvements of hardware circuit structures. Designers almost always obtain corresponding hardware circuit structures by programming improved method flows into hardware circuits. Therefore, an improvement of a method flow cannot be said to be realized by a hardware entity module. For example, a programmable logic device (Programmable Logic Device, PLD) (e.g., field programmable gate array (Field Programmable Gate Array, FPGA)) is an integrated circuit whose logic function is determined by the programming of the device by a user. A designer programs to "integrate" a digital system onto a PLD without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Moreover, nowadays, instead of manually manufacturing integrated circuit chips, such programming is mostly implemented by using "logic compiler" software, which is similar to the software compiler used in program development and writing, and the original code before the compiling is also written in a specific programming language, which is called hardware description language (Hardware Description Language, HDL), but not just one of the hdds, but a plurality of kinds, such as ABEL (Advanced Boolean Expression Language), AHDL (Altera Hardware Description Language), confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), lava, lola, myHDL, PALASM, RHDL (Ruby Hardware Description Language), etc., VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog are currently most commonly used. It will also be apparent to those skilled in the art that a hardware circuit implementing the logic method flow can be readily obtained by merely slightly programming the method flow into an integrated circuit using several of the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, application specific integrated circuits (Application Specific Integrated Circuit, ASIC), programmable logic controllers, and embedded microcontrollers, examples of which include, but are not limited to, the following microcontrollers: ARC625D, atmel AT91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic of the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller in a pure computer readable program code, it is well possible to implement the same functionality by logically programming the method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers, etc. Such a controller may thus be regarded as a kind of hardware component, and means for performing various functions included therein may also be regarded as structures within the hardware component. Or even means for achieving the various functions may be regarded as either software modules implementing the methods or structures within hardware components.
The system, apparatus, module or unit set forth in the above embodiments may be implemented in particular by a computer chip or entity, or by a product having a certain function. One typical implementation is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each unit may be implemented in the same piece or pieces of software and/or hardware when implementing the embodiments of the present specification.
One skilled in the relevant art will recognize that one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present description can take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The present description is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the specification. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable identity credential processing device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable identity credential processing device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable identity credential processing device to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable identity credential processing device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer implemented process such that the instructions which execute on the computer or other programmable device provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
One or more embodiments of the present specification may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more embodiments of the specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments.
The foregoing description is by way of example only and is not intended to limit the present disclosure. Various modifications and changes may occur to those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. that fall within the spirit and principles of the present document are intended to be included within the scope of the claims of the present document.

Claims (24)

1. An identity credential processing method is applied to a server and comprises the following steps:
acquiring an authorization application submitted by a first user after the first terminal scans the identification code of a second user; the identification code is generated based on the user information of the second user after a third party verification platform verifies that the second user does not have the property management qualification;
querying whether a first user has a primary identity credential based on a first user identification;
If yes, desensitizing the second user information in the authorized application, and issuing the obtained desensitized user information to the first terminal; reading a property identifier in the main identity certificate according to an authorization instruction submitted by the first terminal to the desensitized user information, and sending the property identifier to the first terminal so as to enable the first terminal to display; acquiring a property identifier of a target property selected by the first user and submitted by the first terminal, and sending a type selection prompt to the first terminal based on the property identifier of the target property; acquiring the family type of the second user submitted by the first terminal; creating a subordinate identity credential of the second user for the target property according to the family member type, so that the second user pays the hydropower fee of the target property based on the subordinate identity credential;
if not, reading first user information based on the first user identification, carrying out identity verification on the first user according to the first user information, and transmitting an authorization instruction based on information submitted by the first terminal under the condition that verification passes, and transmitting the first user information into a third party verification interface to carry out admission verification of the first user; acquiring a certificate identifier of a third-party identity certificate returned by the third-party verification interface and a property identifier of the target property, and creating a main identity certificate of the first user aiming at the target property based on the certificate identifier and the property identifier of the target property; and the third party identity certificate is created after the first user selects the target room through the queried property information corresponding to the first user.
2. The method for processing identity credentials according to claim 1, wherein before the step of obtaining the authorization application submitted after the first user scans the identification code of the second user through the first terminal is performed, the method further comprises:
acquiring the first user identification submitted by the first terminal;
reading first user information based on the first user identification, and carrying out identity verification on the first user according to the first user information;
and transmitting the first user information into a third party verification interface to carry out admission verification of the first user based on the information transmitting authorization instruction submitted by the first terminal under the condition that verification passes.
3. The identity credential processing method of claim 2, the admission verification comprising:
inquiring property information corresponding to the first user based on the first user information;
the property information is sent to the first terminal, so that the first terminal displays the property information;
third party identity credentials are created for the target property selected by the first user via the property information.
4. The identity credential processing method according to claim 3, wherein after the step of performing the admission verification of the first user by transferring the first user information into a third party verification interface based on an information transfer authorization instruction submitted by the first terminal if verification is passed, further comprising:
Acquiring a certificate identifier of the third party identity certificate returned by the third party verification interface and a property identifier of the target property;
based on the credential identity and the property identity, a master identity credential for the first user for the target property is created.
5. The method for processing identity credentials according to claim 1, wherein after the step of obtaining the authorization application submitted after the first user scans the identification code of the second user through the first terminal is performed, and before the step of performing desensitization processing on the second user information in the authorization application and issuing the obtained desensitized user information to the first terminal is performed, the method further comprises:
querying whether the first user has a master identity credential based on the first user identification;
if yes, the step of performing desensitization processing on the second user information in the authorized application and issuing the obtained desensitized user information to the first terminal is executed.
6. The identity credential processing method of claim 1, further comprising:
if the user type of the second user submitted by the first terminal is a tenant type, acquiring the valid period of the subordinate identity credential of the first user for authorizing the second user to use the target property;
Based on the tenant type and the expiration date, a subordinate identity credential of the second user for the target property is created.
7. The identity credential processing method of claim 1, the identification code being generated by:
reading the second user information according to a second user identifier, and carrying out identity verification on the second user according to the second user information;
transmitting an authorization instruction based on information submitted by a second terminal under the condition that verification passes, and transmitting the second user information into a third party verification interface to carry out admission verification of the second user;
and if the third party verification interface returns that the property information of the second user is empty, generating the identification code based on the second user information and sending the identification code to the second terminal.
8. An identity credential processing method applied to a first terminal includes:
collecting and identifying an identification code of a second user, and submitting an authorization application to a server based on an identification result so as to inquire whether the first user has a main identity credential based on a first user identification carried in the authorization application; the identification code is generated based on the user information of the second user after a third party verification platform verifies that the second user does not have the property management qualification;
If the first user has the main identity certificate, receiving and displaying desensitized user information issued by the server; acquiring an authorization instruction which is input by the first user and is used for desensitizing the user information, and submitting the authorization instruction to the server; receiving and displaying the property identification sent by the server, and submitting the property identification of the target property to the server under the condition that the first user selects the target property; receiving and selecting a reminder according to the type sent by the server, rendering a type acquisition page and displaying the type acquisition page; if the first user is detected to enter a family type through the type acquisition page, submitting the family type to the server;
if the first user does not have the main identity certificate, receiving and displaying an information transmission authorization prompt sent by the server; and collecting an information transmission authorization instruction of the first user and submitting the information transmission authorization instruction to the server so as to transmit the first user information into a third party verification interface for the admission verification of the first user based on the information transmission authorization instruction.
9. An identity credential processing method is applied to a server and comprises the following steps:
acquiring a certificate application submitted by a family member through a family member invitation code of a second terminal scanning target property;
Inquiring family information of the family based on family identification carried in the voucher application;
transmitting the certificate application and the family information into a third party verification interface to carry out certificate admission verification of the family, and acquiring a returned admission verification result; the credential admission verification includes: verifying whether the family members are property rights of the target property based on the family member information; if yes, returning the family members to the server as property rights of the target property; if not, checking whether the first user is the property right person of the target property or not based on the first user information carried by the credential application; if yes, determining that the admission verification passes; if not, determining that the admission verification is not passed;
if the access verification result is that the family members are property rights of the target property, creating a main identity certificate of the family members aiming at the target property;
if the admission verification result is that the admission verification passes, creating a subordinate identity certificate of the family member aiming at the target property, so that the family member pays the hydropower fee of the target property based on the subordinate identity certificate.
10. The identity credential processing method as in claim 9, wherein the step of obtaining the credential application submitted by the family member through the second terminal scanning the identification code of the target property further comprises:
Reading first user information of a first user according to a first user identification of the first user, and carrying out identity verification on the first user according to the first user information;
performing admission verification of the first user on the condition that verification passes, wherein the first user information is transmitted into the third party verification interface;
and creating a main identity certificate of the first user aiming at the target property according to the property identifier of the target property returned by the third party verification interface.
11. The identity credential processing method of claim 10, the identification code being generated by:
acquiring a user adding request submitted by the first user aiming at the target property;
if the user type in the user adding request is a family type, generating the identification code based on the family type, the target property and/or the first user information;
if the user type in the user adding request is a tenant type, acquiring the valid period of renting the target property by the first user;
the identification code is generated based on the tenant type, the expiration date, the target property, and/or the first user information.
12. An identity credential processing method applied to a second terminal includes:
acquiring a family invitation code of a target property, and obtaining a first user identification and a property identification of the target property;
submitting a credential application to a server based on the first user identification, the property identification, and the read family identification;
acquiring and displaying an information transmission authorization prompt sent by the server;
transmitting an authorization prompt to collect an authorization instruction of family members based on the information and submitting the authorization instruction to the server; the server transmits the certificate application and family information of the family members to a third party verification interface for certificate admission verification based on the authorization instruction, if the admission verification result is that the family members are property rights of the target property, a main identity certificate of the family members for the target property is created, if the admission verification result is that the admission verification is passed, a subordinate identity certificate of the family members for the target property is created, so that the family members pay the water and electricity fee of the target property based on the subordinate identity certificate; the credential admission verification includes: verifying whether the family members are property rights of the target property based on the family member information; if yes, returning the family members to the server as the property rights of the target property; if not, checking whether the first user is the property right person of the target property or not based on the first user information carried by the credential application; if yes, determining that the admission verification passes; if not, determining that the admission verification is not passed.
13. An identity credential processing device, operating on a server, comprising:
the application acquisition module is configured to acquire an authorized application submitted after the first user scans the identification code of the second user through the first terminal; the identification code is generated based on the user information of the second user after a third party verification platform verifies that the second user does not have the property management qualification; querying whether a first user has a primary identity credential based on a first user identification;
if yes, the following modules are operated: the desensitization processing module is configured to carry out desensitization processing on the second user information in the authorized application and send the obtained desensitized user information to the first terminal; the information determining module is configured to read a property identifier in the main identity certificate according to an authorization instruction submitted by the first terminal to the desensitized user information, and send the property identifier to the first terminal so as to enable the first terminal to display; acquiring a property identifier of a target property selected by the first user and submitted by the first terminal, and sending a type selection prompt to the first terminal based on the property identifier of the target property; acquiring the family type of the second user submitted by the first terminal; the certificate creation module is configured to create a subordinate identity certificate of the second user aiming at the target property according to the family type so as to enable the second user to pay the water fee of the target property based on the subordinate identity certificate;
If not, reading first user information based on the first user identification, carrying out identity verification on the first user according to the first user information, and transmitting an authorization instruction based on information submitted by the first terminal under the condition that verification passes, and transmitting the first user information into a third party verification interface to carry out admission verification of the first user; acquiring a certificate identifier of a third-party identity certificate returned by the third-party verification interface and a property identifier of the target property, and creating a main identity certificate of the first user aiming at the target property based on the certificate identifier and the property identifier of the target property; and the third party identity certificate is created after the first user selects the target room through the queried property information corresponding to the first user.
14. An identity credential processing device, operating at a first terminal, comprising:
the application submitting module is configured to collect and identify the identification code of the second user, and submit an authorized application to the server based on the identification result so as to inquire whether the first user has a main identity credential based on the first user identification carried in the authorized application; the identification code is generated based on the user information of the second user after a third party verification platform verifies that the second user does not have the property management qualification;
If the first user has the main identity credentials, the following modules are operated: the information display module is configured to receive and display desensitized user information issued by the server; the authorization submitting module is configured to acquire an authorization instruction which is input by the first user and is used for desensitizing the user information and submit the authorization instruction to the server; the interactive matching module is configured to receive the property identification sent by the server and display the property identification, and submit the property identification of the target property to the server under the condition that the first user selects the target property; receiving and selecting a reminder according to the type sent by the server, rendering a type acquisition page and displaying the type acquisition page; if the first user is detected to enter a family type through the type acquisition page, submitting the family type to the server;
if the first user does not have the main identity certificate, receiving and displaying an information transmission authorization prompt sent by the server; and collecting an information transmission authorization instruction of the first user and submitting the information transmission authorization instruction to the server so as to transmit the first user information into a third party verification interface for the admission verification of the first user based on the information transmission authorization instruction.
15. An identity credential processing device, operating on a server, comprising:
the application acquisition module is configured to acquire a certificate application submitted by the family member through the identification code of the target property scanned by the second terminal;
the information inquiry module is configured to inquire family information of the family based on family identification carried in the credential application;
the admission verification module is configured to transmit the credential application and the family information into a third party verification interface to perform credential admission verification of the family, and acquire a returned admission verification result; the credential admission verification includes: verifying whether the family members are property rights of the target property based on the family member information; if yes, returning the family members to the server as the property rights of the target property; if not, checking whether the first user is the property right person of the target property or not based on the first user information carried by the credential application; if yes, determining that the admission verification passes; if not, determining that the admission verification is not passed;
a credential creation module configured to create a master identity credential for the home owner for the target property if the admission verification result indicates that the home owner is a property owner of the target property; if the admission verification result is that the admission verification passes, creating a subordinate identity certificate of the family member aiming at the target property, so that the family member pays the hydropower fee of the target property based on the subordinate identity certificate.
16. An identity credential processing device, operating at a second terminal, comprising:
the system comprises an identification acquisition module, a first user identification module and a second user identification module, wherein the identification acquisition module is configured to acquire a family invitation code of a target property to acquire a first user identification and a property identification of the target property;
an application submitting module configured to submit a credential application to a server based on the first user identification, the property identification, and the read family identification;
the reminding display module is configured to acquire and display the information transmission authorization reminding sent by the server;
an instruction submitting module configured to transmit an authorization instruction of an authorized reminder acquisition family member based on the information and submit the authorization instruction to the server; the server transmits the certificate application and family information of the family members to a third party verification interface for certificate admission verification based on the authorization instruction, if the admission verification result is that the family members are property rights of the target property, a main identity certificate of the family members for the target property is created, if the admission verification result is that the admission verification is passed, a subordinate identity certificate of the family members for the target property is created, so that the family members pay the water and electricity fee of the target property based on the subordinate identity certificate; the credential admission verification includes: verifying whether the family members are property rights of the target property based on the family member information; if yes, returning the family members to the server as the property rights of the target property; if not, checking whether the first user is the property right person of the target property or not based on the first user information carried by the credential application; if yes, determining that the admission verification passes; if not, determining that the admission verification is not passed.
17. An identity credential processing device comprising:
a processor; the method comprises the steps of,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
acquiring an authorization application submitted by a first user after the first terminal scans the identification code of a second user; the identification code is generated based on the user information of the second user after a third party verification platform verifies that the second user does not have the property management qualification;
querying whether a first user has a primary identity credential based on a first user identification;
if yes, desensitizing the second user information in the authorized application, and issuing the obtained desensitized user information to the first terminal; reading a property identifier in the main identity certificate according to an authorization instruction submitted by the first terminal to the desensitized user information, and sending the property identifier to the first terminal so as to enable the first terminal to display; acquiring a property identifier of a target property selected by the first user and submitted by the first terminal, and sending a type selection prompt to the first terminal based on the property identifier of the target property; acquiring the family type of the second user submitted by the first terminal; creating a subordinate identity credential of the second user for the target property according to the family member type, so that the second user pays the hydropower fee of the target property based on the subordinate identity credential;
If not, reading first user information based on the first user identification, carrying out identity verification on the first user according to the first user information, and transmitting an authorization instruction based on information submitted by the first terminal under the condition that verification passes, and transmitting the first user information into a third party verification interface to carry out admission verification of the first user; acquiring a certificate identifier of a third-party identity certificate returned by the third-party verification interface and a property identifier of the target property, and creating a main identity certificate of the first user aiming at the target property based on the certificate identifier and the property identifier of the target property; and the third party identity certificate is created after the first user selects the target room through the queried property information corresponding to the first user.
18. An identity credential processing device comprising:
a processor; the method comprises the steps of,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
collecting and identifying an identification code of a second user, and submitting an authorization application to a server based on an identification result so as to inquire whether the first user has a main identity credential based on a first user identification carried in the authorization application; the identification code is generated based on the user information of the second user after a third party verification platform verifies that the second user does not have the property management qualification;
If the first user has the main identity certificate, receiving and displaying desensitized user information issued by the server; acquiring an authorization instruction which is input by the first user and is used for desensitizing the user information, and submitting the authorization instruction to the server; receiving and displaying the property identification sent by the server, and submitting the property identification of the target property to the server under the condition that the first user selects the target property; receiving and selecting a reminder according to the type sent by the server, rendering a type acquisition page and displaying the type acquisition page; if the first user is detected to enter a family type through the type acquisition page, submitting the family type to the server;
if the first user does not have the main identity certificate, receiving and displaying an information transmission authorization prompt sent by the server; and collecting an information transmission authorization instruction of the first user and submitting the information transmission authorization instruction to the server so as to transmit the first user information into a third party verification interface for the admission verification of the first user based on the information transmission authorization instruction.
19. An identity credential processing device comprising:
a processor; the method comprises the steps of,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
Acquiring a certificate application submitted by a family member through a family member invitation code of a second terminal scanning target property;
inquiring family information of the family based on family identification carried in the voucher application;
transmitting the certificate application and the family information into a third party verification interface to carry out certificate admission verification of the family, and acquiring a returned admission verification result; the credential admission verification includes: verifying whether the family members are property rights of the target property based on the family member information; if yes, returning the family members to the server as property rights of the target property; if not, checking whether the first user is the property right person of the target property or not based on the first user information carried by the credential application; if yes, determining that the admission verification passes; if not, determining that the admission verification is not passed;
if the access verification result is that the family members are property rights of the target property, creating a main identity certificate of the family members aiming at the target property;
if the admission verification result is that the admission verification passes, creating a subordinate identity certificate of the family member aiming at the target property, so that the family member pays the hydropower fee of the target property based on the subordinate identity certificate.
20. An identity credential processing device comprising:
a processor; the method comprises the steps of,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
acquiring a family invitation code of a target property, and obtaining a first user identification and a property identification of the target property;
submitting a credential application to a server based on the first user identification, the property identification, and the read family identification;
acquiring and displaying an information transmission authorization prompt sent by the server;
transmitting an authorization prompt to collect an authorization instruction of family members based on the information and submitting the authorization instruction to the server; the server transmits the certificate application and family information of the family members to a third party verification interface for certificate admission verification based on the authorization instruction, if the admission verification result is that the family members are property rights of the target property, a main identity certificate of the family members for the target property is created, if the admission verification result is that the admission verification is passed, a subordinate identity certificate of the family members for the target property is created, so that the family members pay the water and electricity fee of the target property based on the subordinate identity certificate; verifying whether the family members are property rights of the target property based on the family member information; if yes, returning the family members to the server as the property rights of the target property; if not, checking whether the first user is the property right person of the target property or not based on the first user information carried by the credential application; if yes, determining that the admission verification passes; if not, determining that the admission verification is not passed.
21. A storage medium storing computer-executable instructions that when executed implement the following:
acquiring an authorization application submitted by a first user after the first terminal scans the identification code of a second user; the identification code is generated based on the user information of the second user after a third party verification platform verifies that the second user does not have the property management qualification;
querying whether a first user has a primary identity credential based on a first user identification;
if yes, desensitizing the second user information in the authorized application, and issuing the obtained desensitized user information to the first terminal; reading a property identifier in the main identity certificate according to an authorization instruction submitted by the first terminal to the desensitized user information, and sending the property identifier to the first terminal so as to enable the first terminal to display; acquiring a property identifier of a target property selected by the first user and submitted by the first terminal, and sending a type selection prompt to the first terminal based on the property identifier of the target property; acquiring the family type of the second user submitted by the first terminal; creating a subordinate identity credential of the second user for the target property according to the family member type, so that the second user pays the hydropower fee of the target property based on the subordinate identity credential;
If not, reading first user information based on the first user identification, carrying out identity verification on the first user according to the first user information, and transmitting an authorization instruction based on information submitted by the first terminal under the condition that verification passes, and transmitting the first user information into a third party verification interface to carry out admission verification of the first user; acquiring a certificate identifier of a third-party identity certificate returned by the third-party verification interface and a property identifier of the target property, and creating a main identity certificate of the first user aiming at the target property based on the certificate identifier and the property identifier of the target property; and the third party identity certificate is created after the first user selects the target room through the queried property information corresponding to the first user.
22. A storage medium storing computer-executable instructions that when executed implement the following:
collecting and identifying an identification code of a second user, and submitting an authorization application to a server based on an identification result so as to inquire whether the first user has a main identity credential based on a first user identification carried in the authorization application; the identification code is generated based on the user information of the second user after a third party verification platform verifies that the second user does not have the property management qualification;
If the first user has the main identity certificate, receiving and displaying desensitized user information issued by the server; acquiring an authorization instruction which is input by the first user and is used for desensitizing the user information, and submitting the authorization instruction to the server; receiving and displaying the property identification sent by the server, and submitting the property identification of the target property to the server under the condition that the first user selects the target property; receiving and selecting a reminder according to the type sent by the server, rendering a type acquisition page and displaying the type acquisition page; if the first user is detected to enter a family type through the type acquisition page, submitting the family type to the server;
if the first user does not have the main identity certificate, receiving and displaying an information transmission authorization prompt sent by the server; and collecting an information transmission authorization instruction of the first user and submitting the information transmission authorization instruction to the server so as to transmit the first user information into a third party verification interface for the admission verification of the first user based on the information transmission authorization instruction.
23. A storage medium storing computer-executable instructions that when executed implement the following:
Acquiring a certificate application submitted by a family member through a family member invitation code of a second terminal scanning target property;
inquiring family information of the family based on family identification carried in the voucher application;
transmitting the certificate application and the family information into a third party verification interface to carry out certificate admission verification of the family, and acquiring a returned admission verification result; the credential admission verification includes: verifying whether the family members are property rights of the target property based on the family member information; if yes, returning the family members to the server as property rights of the target property; if not, checking whether the first user is the property right person of the target property or not based on the first user information carried by the credential application; if yes, determining that the admission verification passes; if not, determining that the admission verification is not passed;
if the access verification result is that the family members are property rights of the target property, creating a main identity certificate of the family members aiming at the target property;
if the admission verification result is that the admission verification passes, creating a subordinate identity certificate of the family member aiming at the target property, so that the family member pays the hydropower fee of the target property based on the subordinate identity certificate.
24. A storage medium storing computer-executable instructions that when executed implement the following:
acquiring a family invitation code of a target property, and obtaining a first user identification and a property identification of the target property;
submitting a credential application to a server based on the first user identification, the property identification, and the read family identification;
acquiring and displaying an information transmission authorization prompt sent by the server;
transmitting an authorization prompt to collect an authorization instruction of family members based on the information and submitting the authorization instruction to the server; the server transmits the certificate application and family information of the family members to a third party verification interface for certificate admission verification based on the authorization instruction, if the admission verification result is that the family members are property owners of the target property, a main identity certificate of the family members for the target property is created, if the admission verification result is that the admission verification is passed, a subordinate identity certificate of the family members for the target property is created, so that the family members pay hydropower of the target property based on the subordinate identity certificate; the credential admission verification includes: verifying whether the family members are property rights of the target property based on the family member information; if yes, returning the family members to the server as the property rights of the target property; if not, checking whether the first user is the property right person of the target property or not based on the first user information carried by the credential application; if yes, determining that the admission verification passes; if not, determining that the admission verification is not passed.
CN202110776010.4A 2021-07-08 2021-07-08 Identity credential processing method and device Active CN113436036B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110776010.4A CN113436036B (en) 2021-07-08 2021-07-08 Identity credential processing method and device
CN202311410591.5A CN117291760A (en) 2021-07-08 2021-07-08 Identity credential processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110776010.4A CN113436036B (en) 2021-07-08 2021-07-08 Identity credential processing method and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202311410591.5A Division CN117291760A (en) 2021-07-08 2021-07-08 Identity credential processing method and device

Publications (2)

Publication Number Publication Date
CN113436036A CN113436036A (en) 2021-09-24
CN113436036B true CN113436036B (en) 2023-11-14

Family

ID=77759790

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202311410591.5A Pending CN117291760A (en) 2021-07-08 2021-07-08 Identity credential processing method and device
CN202110776010.4A Active CN113436036B (en) 2021-07-08 2021-07-08 Identity credential processing method and device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202311410591.5A Pending CN117291760A (en) 2021-07-08 2021-07-08 Identity credential processing method and device

Country Status (1)

Country Link
CN (2) CN117291760A (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114429341B (en) * 2022-01-24 2022-12-02 吉林银行股份有限公司 Grouped payment method, device and equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156799A (en) * 2014-07-11 2014-11-19 广东建邦计算机软件有限公司 Floating population information management method and system
CN105913531A (en) * 2016-06-15 2016-08-31 广州市华标科技发展有限公司 Access control system and method based on certificate two-dimension codes
CN106097509A (en) * 2016-06-15 2016-11-09 广州市华标科技发展有限公司 A kind of access control system based on certificate Quick Response Code and method
CN107615339A (en) * 2015-06-09 2018-01-19 深圳市迈斯云门禁网络科技有限公司 Access control management method and system
CN110021092A (en) * 2018-10-29 2019-07-16 深圳市微开互联科技有限公司 A kind of lessee's access permission control method based on openid
CN112184972A (en) * 2020-09-09 2021-01-05 支付宝(杭州)信息技术有限公司 Service passing processing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156799A (en) * 2014-07-11 2014-11-19 广东建邦计算机软件有限公司 Floating population information management method and system
CN107615339A (en) * 2015-06-09 2018-01-19 深圳市迈斯云门禁网络科技有限公司 Access control management method and system
CN105913531A (en) * 2016-06-15 2016-08-31 广州市华标科技发展有限公司 Access control system and method based on certificate two-dimension codes
CN106097509A (en) * 2016-06-15 2016-11-09 广州市华标科技发展有限公司 A kind of access control system based on certificate Quick Response Code and method
CN110021092A (en) * 2018-10-29 2019-07-16 深圳市微开互联科技有限公司 A kind of lessee's access permission control method based on openid
CN112184972A (en) * 2020-09-09 2021-01-05 支付宝(杭州)信息技术有限公司 Service passing processing method and device

Also Published As

Publication number Publication date
CN117291760A (en) 2023-12-26
CN113436036A (en) 2021-09-24

Similar Documents

Publication Publication Date Title
CN107682339B (en) Accommodation data processing method, apparatus, storage medium and computer device
CN107835121B (en) Property line offline and online service platform based on WeChat public number and implementation method thereof
CN101321105B (en) Network system, message processing method and device for the same
CN113422811B (en) Equipment payment method and device
CN104079538A (en) Microblog aggregation method and system supporting cross-platform interaction
CN103428069A (en) Method and device for adding friends in social network
CN110334824B (en) Safe check-in method and device
KR101553478B1 (en) Method and system for controlling device and service based internet of things
WO2016183378A1 (en) Instant communication
JP7013711B2 (en) Digital community system
CN103902535A (en) Method, device and system for obtaining associational word
CN110391959B (en) Method and device for setting control authority based on intelligent home control system
CN111880887B (en) Message interaction method and device, storage medium and electronic equipment
KR102361227B1 (en) An apparatus for recognizing natural language of instant message and method thereof
CN113436036B (en) Identity credential processing method and device
CN102592215B (en) A kind of method of quick online payment and server
CN111163132A (en) Service providing method, device, equipment and system based on block chain
JP6142687B2 (en) Document disclosure system and program
CN110930561A (en) Control method and device of intelligent lock
CN102057376A (en) Method for carrying out a distributed search
CN106487655A (en) A kind of method for message interaction, device and processing server
CN101655716B (en) Remote labor division and cooperative system and method comprising idiom
CN103747133A (en) Meeting invitation processing method and system of mobile terminal
KR20090000597A (en) System and method for operation of direct fan letter
CN106506844B (en) A kind of monitoring of wechat remote mobile and return system, method based on agreement short message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant