CN115081842A - Legal user system authentication method - Google Patents
Legal user system authentication method Download PDFInfo
- Publication number
- CN115081842A CN115081842A CN202210654211.1A CN202210654211A CN115081842A CN 115081842 A CN115081842 A CN 115081842A CN 202210654211 A CN202210654211 A CN 202210654211A CN 115081842 A CN115081842 A CN 115081842A
- Authority
- CN
- China
- Prior art keywords
- legal
- authorization
- person
- user
- authentication method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/105—Human resources
Abstract
The application discloses a legal user system authentication method, which comprises the following steps: establishing an authorization information base, a natural person database, a legal representative, a manager, a clerk and the like; the legal representatives inquire all legal people lists which serve as legal representatives in an authentication system through a legal person database, and one or more legal representatives are selected for association; associating the system; and performing related authorization in turn. The legal account realizes the authentication mode of hands-free certificate handing; when the user logs in the system, the user does not need to manually designate whether to log in by the identity of a natural person or a legal person, so that the use is more convenient; the authentication of accounts (managers and clerks) of legal persons other than legal representatives realizes a two-dimensional code active authorization mode; the authentication of accounts (managers and clerks) of legal persons other than legal representatives realizes a two-dimensional code application authorization mode, avoids manual audit, reduces audit errors and improves user experience.
Description
Technical Field
The application relates to the field of legal user authentication, in particular to a legal user system authentication method.
Background
The legal person is an organization which has the ability of civil rights and the ability of civil behaviors, and legally and independently enjoys the civil rights and undertakes the civil obligations. The nature of the juridical is that juridical can have the same civil right ability as the natural person, and become a civil subject of rights and obligations.
The user must distinguish whether the user logs in with the natural person identity or the legal person identity, and inputs different user names and passwords to log in the application system; when a legal user authenticates, necessary certificates need to be provided, and the operation is complicated; after the user registers to the authentication, the user must be checked manually, and has a certain waiting time and poor user experience; the manual auditing is easy to make mistakes, and the conditions that the certificate is forged and the certificate passes the authentication cannot be avoided. Therefore, a legal user system authentication method is proposed to solve the above problems.
Disclosure of Invention
The embodiment provides a legal user system authentication method for solving the problem that in the prior art, a user needs to distinguish whether the user logs in with a natural person identity or a legal person identity and inputs different user names and passwords to log in an application system; when a legal user authenticates, necessary certificates need to be provided, and the operation is complicated; after the user registers to the authentication, the user must be checked manually, and has a certain waiting time and poor user experience; the manual auditing is easy to make mistakes, and the problems of counterfeit certificates and passing authentication cannot be avoided.
According to one aspect of the application, a legal user system authentication method is provided, which comprises the following steps:
(1) establishing an authorization information base, establishing a natural person database 1, a legal person database 2, a legal representative 3, a manager 4, a transactor 5 and 6, 7, 8 and 9 which are associated with each other;
(2) the legal representatives 3 inquire all legal people lists which serve as legal representatives in an authentication system through a legal person database 2, and select one or more legal people to associate;
(3) the system is associated, wherein the system associates the natural person data 1 corresponding to the legal representative 3 with the selected legal person database 2 to form an association 6 of the legal person user authentication system;
(4) the legal representative 3 authorizes the equal authority of the legal representative to the manager 4 by an active authorization mode, or the manager 4 obtains the authorization 7 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(5) the legal representative 3 authorizes the transacting authority to the transactor 5 in an active authorization mode, or the transactor 5 obtains the authorization 8 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(6) the administrator 4 authorizes the transacting authority to the transactor 5 by active authorization, or the transactor 5 obtains the authorization 9 after obtaining the consent of the administrator 4 by actively initiating an authorization request.
Further, the natural person user performs registration in the step (1) by using a mobile phone number and a mobile phone verification code mode, if the registration is successful, information of successful registration is summarized to form a natural person database 1, and if the registration is failed, the registration can be performed again.
Further, after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), real-name authentication is performed through the name and the identity card number. This step requires the use of a natural person database 1.
Further, after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), the real person authentication is performed through the face recognition of the living body detection.
Further, in the step (1), a relevant relation is established between data input in the natural person database 1 and the legal person database 2 to form a relation.
Further, in the step (2), all the legal persons in the renewal state of the legal representative are searched from the legal person database according to the user information of the natural person.
Further, the natural person user in the step (3) selects 1 or more legal persons from the list of the legal persons queried in the step (2) as legal account.
Furthermore, in the step (4), the natural person user scans the authorization two-dimensional code, receives the authorization of the administrator, and generates an administrator legal account; and (4) scanning the authorization two-dimensional code by the natural person user, receiving the authorization of the clerk, and generating the account of the clerk legal person.
Further, in the step (5), the legal representative scans the two-dimensional code for applying for authorization, appoints the role of the administrator, agrees to the authorization application, and generates an account of the administrator legal person; the legal representative scans the two-dimensional code for applying authorization, appoints the role of a transactor, agrees to the authorization application and generates a transactor legal account.
Further, in the step (6), the administrator scans the application authorization two-dimensional code, designates the role of the transactor, agrees to the authorization application, and generates a transactor legal account.
Through the embodiment of the application, the problem that a user needs to distinguish whether the user logs in by a natural person identity or a legal person identity and inputs different user names and passwords to log in the application system is solved; when a legal user authenticates, necessary certificates need to be provided, and the operation is complicated; after the user registers to the authentication, the user must be checked manually, and has a certain waiting time and poor user experience; the manual check is easy to make mistakes, the problems of counterfeit certificates and passing authentication cannot be avoided, and the authentication mode of hands-free certificate handing is realized by obtaining the account of a legal person; when the user logs in the system, the user does not need to manually designate whether to log in by the identity of a natural person or a legal person, so that the use is more convenient; the authentication of accounts (managers and clerks) of legal persons other than legal representatives realizes a two-dimensional code active authorization mode; the authentication of accounts (managers and clerks) of legal persons other than legal representatives realizes a two-dimensional code application authorization mode, avoids manual audit, reduces audit errors and improves the effect of user experience.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1 is a diagram of a user architecture of the applicant;
FIG. 2 is a flow chart of the authentication of a legal representative of the application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In this application, the terms "upper", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outer", "middle", "vertical", "horizontal", "lateral", "longitudinal", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings. These terms are used primarily to better describe the present application and its embodiments, and are not used to limit the indicated devices, elements or components to a particular orientation or to be constructed and operated in a particular orientation.
Moreover, some of the above terms may be used to indicate other meanings besides the orientation or positional relationship, for example, the term "on" may also be used to indicate some kind of attachment or connection relationship in some cases. The specific meaning of these terms in this application will be understood by those of ordinary skill in the art as appropriate.
Furthermore, the terms "mounted," "disposed," "provided," "connected," and "coupled" are to be construed broadly. For example, it may be a fixed connection, a removable connection, or a unitary construction; can be a mechanical connection, or an electrical connection; may be directly connected, or indirectly connected through intervening media, or may be in internal communication between two devices, elements or components. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art as appropriate.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Example 1
Referring to fig. 1, a legal user system authentication method includes the following steps:
(1) establishing an authorization information base, establishing a natural person database 1, a legal person database 2, a legal representative 3, a manager 4, a transactor 5 and 6, 7, 8 and 9 which are associated with each other;
(2) the legal representatives 3 inquire all legal people lists which serve as legal representatives in an authentication system through a legal person database 2, and select one or more legal people to associate;
(3) the system is associated, wherein the system associates the natural person data 1 corresponding to the legal representative 3 with the selected legal person database 2 to form an association 6 of the legal person user authentication system;
(4) the legal representative 3 authorizes the equal authority of the legal representative to the manager 4 by an active authorization mode, or the manager 4 obtains the authorization 7 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(5) the legal representative 3 authorizes the transacting authority to the transactor 5 in an active authorization mode, or the transactor 5 obtains the authorization 8 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(6) the administrator 4 authorizes the transacting authority to the transactor 5 by active authorization, or the transactor 5 obtains the authorization 9 after obtaining the consent of the administrator 4 by actively initiating an authorization request.
Further, the natural person user performs registration in the step (1) by using a mobile phone number and a mobile phone verification code mode, if the registration is successful, information of successful registration is summarized to form a natural person database 1, and if the registration is failed, the registration can be performed again.
Further, after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), real-name authentication is performed through the name and the identity card number. This step requires the use of a natural person database 1.
Further, after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), the real person authentication is performed through the face recognition of the living body detection.
Further, in the step (1), a relevant relation is established between data input in the natural person database 1 and the legal person database 2 to form a relation.
Further, in the step (2), all the legal persons in the renewal state of the legal representative are searched from the legal person database according to the user information of the natural person.
Further, the natural person user in the step (3) selects 1 or more legal persons from the list of the legal persons queried in the step (2) as legal account.
Furthermore, in the step (4), the natural person user scans the authorization two-dimensional code, receives authorization of the transactor, and generates a transactor legal account.
Further, in the step (5), the legal representative scans the two-dimensional code for applying for authorization, appoints the role of the administrator, agrees to the authorization application, and generates an account of the administrator legal person; the legal representative scans the two-dimensional code for applying authorization, appoints the role of a transactor, agrees to the authorization application and generates a transactor legal account.
Further, in the step (6), the administrator scans the application authorization two-dimensional code, designates the role of the transactor, agrees to the authorization application, and generates a transactor legal account.
The above method is applicable to an authentication method for authorizing a transactor account by a legal representative.
Example 2
Referring to fig. 1, a legal user system authentication method includes the following steps:
(1) establishing an authorization information base, establishing a natural person database 1, a legal person database 2, a legal representative 3, a manager 4, a transactor 5 and 6, 7, 8 and 9 which are associated with each other;
(2) the legal representatives 3 inquire all legal people lists which serve as legal representatives in an authentication system through a legal person database 2, and select one or more legal people to associate;
(3) the system is associated, wherein the system associates the natural person data 1 corresponding to the legal representative 3 with the selected legal person database 2 to form an association 6 of the legal person user authentication system;
(4) the legal representative 3 authorizes the equal authority of the legal representative to the manager 4 by an active authorization mode, or the manager 4 obtains the authorization 7 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(5) the legal representative 3 authorizes the transacting authority to the transactor 5 in an active authorization mode, or the transactor 5 obtains the authorization 8 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(6) the administrator 4 authorizes the transacting authority to the transactor 5 by active authorization, or the transactor 5 obtains the authorization 9 after obtaining the consent of the administrator 4 by actively initiating an authorization request.
Further, the natural person user performs registration in the step (1) by using a mobile phone number and a mobile phone verification code mode, if the registration is successful, information of successful registration is summarized to form a natural person database 1, and if the registration is failed, the registration can be performed again.
Further, after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), real-name authentication is performed through the name and the identity card number. This step requires the use of a natural person database 1.
Further, after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), the real person authentication is performed through the face recognition of the living body detection.
Further, in the step (1), a relevant relation is established between data input in the natural person database 1 and the legal person database 2 to form a relation.
Further, in the step (2), all the legal persons in the renewal state of the legal representative are searched from the legal person database according to the user information of the natural person.
Further, the natural person user in the step (3) selects 1 or more legal persons from the list of the legal persons queried in the step (2) as legal account.
Further, in the step (4), the natural person user scans the authorization two-dimensional code, receives the authorization of the administrator, and generates an administrator legal account.
Further, in the step (5), the legal representative scans the two-dimensional code for applying for authorization, appoints the role of the administrator, agrees to the authorization application, and generates an account of the administrator legal person; the legal representative scans the two-dimensional code for applying authorization, appoints the role of a transactor, agrees to the authorization application and generates a transactor legal account.
Further, in the step (6), the administrator scans the application authorization two-dimensional code, designates the role of the transactor, agrees to the authorization application, and generates a transactor legal account.
The above method is applicable to an authentication method for authorizing an administrator account by a legal representative.
The application has the advantages that:
the legal account realizes the authentication mode of hands-free certificate handing; when the user logs in the system, the user does not need to manually designate whether to log in by the identity of a natural person or a legal person, so that the use is more convenient; the authentication of accounts (managers and clerks) of legal persons other than legal representatives realizes a two-dimensional code active authorization mode; the authentication of accounts (managers and clerks) of legal persons other than legal representatives realizes a two-dimensional code application authorization mode, avoids manual audit, reduces audit errors and improves user experience.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Claims (10)
1. A legal user system authentication method is characterized in that: the legal user system authentication method comprises the following steps:
(1) establishing an authorization information base, establishing a natural person database 1, a legal person database 2, a legal representative 3, a manager 4, a transactor 5 and 6, 7, 8 and 9 which are associated with each other;
(2) the legal representatives 3 inquire all legal people lists which serve as legal representatives in an authentication system through a legal person database 2, and select one or more legal people to associate;
(3) the system is associated, wherein the system associates the natural person data 1 corresponding to the legal representative 3 with the selected legal person database 2 to form an association 6 of the legal person user authentication system;
(4) the legal representative 3 authorizes the equal authority of the legal representative to the manager 4 by an active authorization mode, or the manager 4 obtains the authorization 7 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(5) the legal representative 3 authorizes the transacting authority to the transactor 5 in an active authorization mode, or the transactor 5 obtains the authorization 8 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(6) the administrator 4 authorizes the transacting authority to the transactor 5 by active authorization, or the transactor 5 obtains the authorization 9 after obtaining the consent of the administrator 4 by actively initiating an authorization request.
2. The legal user system authentication method of claim 1, wherein: in the step (1), the natural person user uses a mobile phone number and a mobile phone verification code mode to register, if the registration is successful, information of successful registration is summarized to form a natural person database 1, and if the registration is failed, the registration can be carried out again.
3. The legal user system authentication method of claim 1, wherein: and (2) after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), performing real-name authentication by using the name and the identity card number. This step requires the use of a natural person database 1.
4. The legal user system authentication method of claim 1, wherein: and (2) after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), carrying out real person authentication by living body detection face identification.
5. The legal user system authentication method of claim 1, wherein: in the step (1), a relevant relation is established between the data input in the natural person database 1 and the data input in the legal person database 2 to form a relation.
6. The legal user system authentication method of claim 1, characterized by: and (2) searching all the legal persons in the surviving state of the legal representative from a legal person database according to the user information of the natural person.
7. The legal user system authentication method of claim 1, wherein: and (3) selecting 1 or more legal persons from the legal person list inquired in the step (2) as legal person accounts by the natural person user.
8. The legal user system authentication method of claim 1, wherein: in the step (4), the natural person user scans the authorization two-dimensional code, receives the authorization of the administrator and generates an administrator legal account; and (4) scanning the authorization two-dimensional code by the natural person user, receiving the authorization of the clerk, and generating the account of the clerk legal person.
9. The legal user system authentication method of claim 1, characterized by: in the step (5), the legal representative scans the two-dimensional code for applying authorization, appoints the role of the administrator, agrees to the authorization application and generates an account of the administrator legal person; the legal representative scans the two-dimensional code for applying authorization, appoints the role of a transactor, agrees to the authorization application and generates a transactor legal account.
10. The legal user system authentication method of claim 1, wherein: and (6) scanning the two-dimensional code for applying authorization by the administrator, designating the role of the clerk, agreeing to the authorization application, and generating the account of the clerk legal person.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210654211.1A CN115081842A (en) | 2022-06-09 | 2022-06-09 | Legal user system authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210654211.1A CN115081842A (en) | 2022-06-09 | 2022-06-09 | Legal user system authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115081842A true CN115081842A (en) | 2022-09-20 |
Family
ID=83251575
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210654211.1A Pending CN115081842A (en) | 2022-06-09 | 2022-06-09 | Legal user system authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115081842A (en) |
-
2022
- 2022-06-09 CN CN202210654211.1A patent/CN115081842A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8141134B2 (en) | Authentication engine for enrollment into a computer environment | |
KR101520511B1 (en) | User authenication system by using personal identification number, user terminal device, inquiry apparatus, authenication server, and user authenication method therefor | |
CN101809582A (en) | Smart identity system | |
US20110276486A1 (en) | System and method for securing payment | |
US11734544B2 (en) | Mobile passport, mobile passport generation system for generating same, and mobile passport certification method | |
CN107003830A (en) | Safety moving coupled system (SMCS) | |
CN108681902A (en) | Mobile payment confirmation method, device, system and storage medium | |
CN107038509A (en) | Self-service registration-management system | |
CN108764919A (en) | E-payment confirmation method, device, system and storage medium | |
US8601270B2 (en) | Method for the preparation of a chip card for electronic signature services | |
CN113326488A (en) | Personal information protection system and method | |
CN110941849B (en) | Offline electronic certificate showing method, device and system and computer equipment | |
CN109285068A (en) | Online loan inquiry method, apparatus, equipment and storage medium | |
CN117172786A (en) | Identity authentication method, device, equipment, medium and program product | |
CN115081842A (en) | Legal user system authentication method | |
US11216899B2 (en) | Consent obtaining machine and process | |
CN108111490B (en) | Method and equipment for establishing relationship between users and computer storage medium | |
CN111223025A (en) | Intelligent shunting method and system for entry and exit service hall | |
JP2001312476A (en) | Individual authenticating device for network, authenticated transaction system, and individual authentication system | |
TW201907688A (en) | Systems, devices, and methods for performing verification of communications received from one or more computing devices | |
US20230026228A1 (en) | Systems and methods for use in altering attributes of user identities on networks | |
CN111866846B (en) | Data identification method and related device | |
CN112801723A (en) | Method and system for processing service based on terminal equipment | |
JP2024008654A (en) | Program, information processing apparatus, and information processing method | |
JP4500107B2 (en) | Document creation support method and document creation support program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |