CN115081842A - Legal user system authentication method - Google Patents

Legal user system authentication method Download PDF

Info

Publication number
CN115081842A
CN115081842A CN202210654211.1A CN202210654211A CN115081842A CN 115081842 A CN115081842 A CN 115081842A CN 202210654211 A CN202210654211 A CN 202210654211A CN 115081842 A CN115081842 A CN 115081842A
Authority
CN
China
Prior art keywords
legal
authorization
person
user
authentication method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210654211.1A
Other languages
Chinese (zh)
Inventor
陆静波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Big Data Co ltd
Original Assignee
Suzhou Big Data Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Big Data Co ltd filed Critical Suzhou Big Data Co ltd
Priority to CN202210654211.1A priority Critical patent/CN115081842A/en
Publication of CN115081842A publication Critical patent/CN115081842A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/105Human resources

Abstract

The application discloses a legal user system authentication method, which comprises the following steps: establishing an authorization information base, a natural person database, a legal representative, a manager, a clerk and the like; the legal representatives inquire all legal people lists which serve as legal representatives in an authentication system through a legal person database, and one or more legal representatives are selected for association; associating the system; and performing related authorization in turn. The legal account realizes the authentication mode of hands-free certificate handing; when the user logs in the system, the user does not need to manually designate whether to log in by the identity of a natural person or a legal person, so that the use is more convenient; the authentication of accounts (managers and clerks) of legal persons other than legal representatives realizes a two-dimensional code active authorization mode; the authentication of accounts (managers and clerks) of legal persons other than legal representatives realizes a two-dimensional code application authorization mode, avoids manual audit, reduces audit errors and improves user experience.

Description

Legal user system authentication method
Technical Field
The application relates to the field of legal user authentication, in particular to a legal user system authentication method.
Background
The legal person is an organization which has the ability of civil rights and the ability of civil behaviors, and legally and independently enjoys the civil rights and undertakes the civil obligations. The nature of the juridical is that juridical can have the same civil right ability as the natural person, and become a civil subject of rights and obligations.
The user must distinguish whether the user logs in with the natural person identity or the legal person identity, and inputs different user names and passwords to log in the application system; when a legal user authenticates, necessary certificates need to be provided, and the operation is complicated; after the user registers to the authentication, the user must be checked manually, and has a certain waiting time and poor user experience; the manual auditing is easy to make mistakes, and the conditions that the certificate is forged and the certificate passes the authentication cannot be avoided. Therefore, a legal user system authentication method is proposed to solve the above problems.
Disclosure of Invention
The embodiment provides a legal user system authentication method for solving the problem that in the prior art, a user needs to distinguish whether the user logs in with a natural person identity or a legal person identity and inputs different user names and passwords to log in an application system; when a legal user authenticates, necessary certificates need to be provided, and the operation is complicated; after the user registers to the authentication, the user must be checked manually, and has a certain waiting time and poor user experience; the manual auditing is easy to make mistakes, and the problems of counterfeit certificates and passing authentication cannot be avoided.
According to one aspect of the application, a legal user system authentication method is provided, which comprises the following steps:
(1) establishing an authorization information base, establishing a natural person database 1, a legal person database 2, a legal representative 3, a manager 4, a transactor 5 and 6, 7, 8 and 9 which are associated with each other;
(2) the legal representatives 3 inquire all legal people lists which serve as legal representatives in an authentication system through a legal person database 2, and select one or more legal people to associate;
(3) the system is associated, wherein the system associates the natural person data 1 corresponding to the legal representative 3 with the selected legal person database 2 to form an association 6 of the legal person user authentication system;
(4) the legal representative 3 authorizes the equal authority of the legal representative to the manager 4 by an active authorization mode, or the manager 4 obtains the authorization 7 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(5) the legal representative 3 authorizes the transacting authority to the transactor 5 in an active authorization mode, or the transactor 5 obtains the authorization 8 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(6) the administrator 4 authorizes the transacting authority to the transactor 5 by active authorization, or the transactor 5 obtains the authorization 9 after obtaining the consent of the administrator 4 by actively initiating an authorization request.
Further, the natural person user performs registration in the step (1) by using a mobile phone number and a mobile phone verification code mode, if the registration is successful, information of successful registration is summarized to form a natural person database 1, and if the registration is failed, the registration can be performed again.
Further, after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), real-name authentication is performed through the name and the identity card number. This step requires the use of a natural person database 1.
Further, after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), the real person authentication is performed through the face recognition of the living body detection.
Further, in the step (1), a relevant relation is established between data input in the natural person database 1 and the legal person database 2 to form a relation.
Further, in the step (2), all the legal persons in the renewal state of the legal representative are searched from the legal person database according to the user information of the natural person.
Further, the natural person user in the step (3) selects 1 or more legal persons from the list of the legal persons queried in the step (2) as legal account.
Furthermore, in the step (4), the natural person user scans the authorization two-dimensional code, receives the authorization of the administrator, and generates an administrator legal account; and (4) scanning the authorization two-dimensional code by the natural person user, receiving the authorization of the clerk, and generating the account of the clerk legal person.
Further, in the step (5), the legal representative scans the two-dimensional code for applying for authorization, appoints the role of the administrator, agrees to the authorization application, and generates an account of the administrator legal person; the legal representative scans the two-dimensional code for applying authorization, appoints the role of a transactor, agrees to the authorization application and generates a transactor legal account.
Further, in the step (6), the administrator scans the application authorization two-dimensional code, designates the role of the transactor, agrees to the authorization application, and generates a transactor legal account.
Through the embodiment of the application, the problem that a user needs to distinguish whether the user logs in by a natural person identity or a legal person identity and inputs different user names and passwords to log in the application system is solved; when a legal user authenticates, necessary certificates need to be provided, and the operation is complicated; after the user registers to the authentication, the user must be checked manually, and has a certain waiting time and poor user experience; the manual check is easy to make mistakes, the problems of counterfeit certificates and passing authentication cannot be avoided, and the authentication mode of hands-free certificate handing is realized by obtaining the account of a legal person; when the user logs in the system, the user does not need to manually designate whether to log in by the identity of a natural person or a legal person, so that the use is more convenient; the authentication of accounts (managers and clerks) of legal persons other than legal representatives realizes a two-dimensional code active authorization mode; the authentication of accounts (managers and clerks) of legal persons other than legal representatives realizes a two-dimensional code application authorization mode, avoids manual audit, reduces audit errors and improves the effect of user experience.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1 is a diagram of a user architecture of the applicant;
FIG. 2 is a flow chart of the authentication of a legal representative of the application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In this application, the terms "upper", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outer", "middle", "vertical", "horizontal", "lateral", "longitudinal", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings. These terms are used primarily to better describe the present application and its embodiments, and are not used to limit the indicated devices, elements or components to a particular orientation or to be constructed and operated in a particular orientation.
Moreover, some of the above terms may be used to indicate other meanings besides the orientation or positional relationship, for example, the term "on" may also be used to indicate some kind of attachment or connection relationship in some cases. The specific meaning of these terms in this application will be understood by those of ordinary skill in the art as appropriate.
Furthermore, the terms "mounted," "disposed," "provided," "connected," and "coupled" are to be construed broadly. For example, it may be a fixed connection, a removable connection, or a unitary construction; can be a mechanical connection, or an electrical connection; may be directly connected, or indirectly connected through intervening media, or may be in internal communication between two devices, elements or components. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art as appropriate.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Example 1
Referring to fig. 1, a legal user system authentication method includes the following steps:
(1) establishing an authorization information base, establishing a natural person database 1, a legal person database 2, a legal representative 3, a manager 4, a transactor 5 and 6, 7, 8 and 9 which are associated with each other;
(2) the legal representatives 3 inquire all legal people lists which serve as legal representatives in an authentication system through a legal person database 2, and select one or more legal people to associate;
(3) the system is associated, wherein the system associates the natural person data 1 corresponding to the legal representative 3 with the selected legal person database 2 to form an association 6 of the legal person user authentication system;
(4) the legal representative 3 authorizes the equal authority of the legal representative to the manager 4 by an active authorization mode, or the manager 4 obtains the authorization 7 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(5) the legal representative 3 authorizes the transacting authority to the transactor 5 in an active authorization mode, or the transactor 5 obtains the authorization 8 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(6) the administrator 4 authorizes the transacting authority to the transactor 5 by active authorization, or the transactor 5 obtains the authorization 9 after obtaining the consent of the administrator 4 by actively initiating an authorization request.
Further, the natural person user performs registration in the step (1) by using a mobile phone number and a mobile phone verification code mode, if the registration is successful, information of successful registration is summarized to form a natural person database 1, and if the registration is failed, the registration can be performed again.
Further, after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), real-name authentication is performed through the name and the identity card number. This step requires the use of a natural person database 1.
Further, after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), the real person authentication is performed through the face recognition of the living body detection.
Further, in the step (1), a relevant relation is established between data input in the natural person database 1 and the legal person database 2 to form a relation.
Further, in the step (2), all the legal persons in the renewal state of the legal representative are searched from the legal person database according to the user information of the natural person.
Further, the natural person user in the step (3) selects 1 or more legal persons from the list of the legal persons queried in the step (2) as legal account.
Furthermore, in the step (4), the natural person user scans the authorization two-dimensional code, receives authorization of the transactor, and generates a transactor legal account.
Further, in the step (5), the legal representative scans the two-dimensional code for applying for authorization, appoints the role of the administrator, agrees to the authorization application, and generates an account of the administrator legal person; the legal representative scans the two-dimensional code for applying authorization, appoints the role of a transactor, agrees to the authorization application and generates a transactor legal account.
Further, in the step (6), the administrator scans the application authorization two-dimensional code, designates the role of the transactor, agrees to the authorization application, and generates a transactor legal account.
The above method is applicable to an authentication method for authorizing a transactor account by a legal representative.
Example 2
Referring to fig. 1, a legal user system authentication method includes the following steps:
(1) establishing an authorization information base, establishing a natural person database 1, a legal person database 2, a legal representative 3, a manager 4, a transactor 5 and 6, 7, 8 and 9 which are associated with each other;
(2) the legal representatives 3 inquire all legal people lists which serve as legal representatives in an authentication system through a legal person database 2, and select one or more legal people to associate;
(3) the system is associated, wherein the system associates the natural person data 1 corresponding to the legal representative 3 with the selected legal person database 2 to form an association 6 of the legal person user authentication system;
(4) the legal representative 3 authorizes the equal authority of the legal representative to the manager 4 by an active authorization mode, or the manager 4 obtains the authorization 7 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(5) the legal representative 3 authorizes the transacting authority to the transactor 5 in an active authorization mode, or the transactor 5 obtains the authorization 8 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(6) the administrator 4 authorizes the transacting authority to the transactor 5 by active authorization, or the transactor 5 obtains the authorization 9 after obtaining the consent of the administrator 4 by actively initiating an authorization request.
Further, the natural person user performs registration in the step (1) by using a mobile phone number and a mobile phone verification code mode, if the registration is successful, information of successful registration is summarized to form a natural person database 1, and if the registration is failed, the registration can be performed again.
Further, after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), real-name authentication is performed through the name and the identity card number. This step requires the use of a natural person database 1.
Further, after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), the real person authentication is performed through the face recognition of the living body detection.
Further, in the step (1), a relevant relation is established between data input in the natural person database 1 and the legal person database 2 to form a relation.
Further, in the step (2), all the legal persons in the renewal state of the legal representative are searched from the legal person database according to the user information of the natural person.
Further, the natural person user in the step (3) selects 1 or more legal persons from the list of the legal persons queried in the step (2) as legal account.
Further, in the step (4), the natural person user scans the authorization two-dimensional code, receives the authorization of the administrator, and generates an administrator legal account.
Further, in the step (5), the legal representative scans the two-dimensional code for applying for authorization, appoints the role of the administrator, agrees to the authorization application, and generates an account of the administrator legal person; the legal representative scans the two-dimensional code for applying authorization, appoints the role of a transactor, agrees to the authorization application and generates a transactor legal account.
Further, in the step (6), the administrator scans the application authorization two-dimensional code, designates the role of the transactor, agrees to the authorization application, and generates a transactor legal account.
The above method is applicable to an authentication method for authorizing an administrator account by a legal representative.
The application has the advantages that:
the legal account realizes the authentication mode of hands-free certificate handing; when the user logs in the system, the user does not need to manually designate whether to log in by the identity of a natural person or a legal person, so that the use is more convenient; the authentication of accounts (managers and clerks) of legal persons other than legal representatives realizes a two-dimensional code active authorization mode; the authentication of accounts (managers and clerks) of legal persons other than legal representatives realizes a two-dimensional code application authorization mode, avoids manual audit, reduces audit errors and improves user experience.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. A legal user system authentication method is characterized in that: the legal user system authentication method comprises the following steps:
(1) establishing an authorization information base, establishing a natural person database 1, a legal person database 2, a legal representative 3, a manager 4, a transactor 5 and 6, 7, 8 and 9 which are associated with each other;
(2) the legal representatives 3 inquire all legal people lists which serve as legal representatives in an authentication system through a legal person database 2, and select one or more legal people to associate;
(3) the system is associated, wherein the system associates the natural person data 1 corresponding to the legal representative 3 with the selected legal person database 2 to form an association 6 of the legal person user authentication system;
(4) the legal representative 3 authorizes the equal authority of the legal representative to the manager 4 by an active authorization mode, or the manager 4 obtains the authorization 7 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(5) the legal representative 3 authorizes the transacting authority to the transactor 5 in an active authorization mode, or the transactor 5 obtains the authorization 8 after obtaining the agreement of the legal representative 3 by actively initiating an authorization request;
(6) the administrator 4 authorizes the transacting authority to the transactor 5 by active authorization, or the transactor 5 obtains the authorization 9 after obtaining the consent of the administrator 4 by actively initiating an authorization request.
2. The legal user system authentication method of claim 1, wherein: in the step (1), the natural person user uses a mobile phone number and a mobile phone verification code mode to register, if the registration is successful, information of successful registration is summarized to form a natural person database 1, and if the registration is failed, the registration can be carried out again.
3. The legal user system authentication method of claim 1, wherein: and (2) after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), performing real-name authentication by using the name and the identity card number. This step requires the use of a natural person database 1.
4. The legal user system authentication method of claim 1, wherein: and (2) after the natural person user logs in by using the mobile phone number and the mobile phone verification code in the step (1), carrying out real person authentication by living body detection face identification.
5. The legal user system authentication method of claim 1, wherein: in the step (1), a relevant relation is established between the data input in the natural person database 1 and the data input in the legal person database 2 to form a relation.
6. The legal user system authentication method of claim 1, characterized by: and (2) searching all the legal persons in the surviving state of the legal representative from a legal person database according to the user information of the natural person.
7. The legal user system authentication method of claim 1, wherein: and (3) selecting 1 or more legal persons from the legal person list inquired in the step (2) as legal person accounts by the natural person user.
8. The legal user system authentication method of claim 1, wherein: in the step (4), the natural person user scans the authorization two-dimensional code, receives the authorization of the administrator and generates an administrator legal account; and (4) scanning the authorization two-dimensional code by the natural person user, receiving the authorization of the clerk, and generating the account of the clerk legal person.
9. The legal user system authentication method of claim 1, characterized by: in the step (5), the legal representative scans the two-dimensional code for applying authorization, appoints the role of the administrator, agrees to the authorization application and generates an account of the administrator legal person; the legal representative scans the two-dimensional code for applying authorization, appoints the role of a transactor, agrees to the authorization application and generates a transactor legal account.
10. The legal user system authentication method of claim 1, wherein: and (6) scanning the two-dimensional code for applying authorization by the administrator, designating the role of the clerk, agreeing to the authorization application, and generating the account of the clerk legal person.
CN202210654211.1A 2022-06-09 2022-06-09 Legal user system authentication method Pending CN115081842A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210654211.1A CN115081842A (en) 2022-06-09 2022-06-09 Legal user system authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210654211.1A CN115081842A (en) 2022-06-09 2022-06-09 Legal user system authentication method

Publications (1)

Publication Number Publication Date
CN115081842A true CN115081842A (en) 2022-09-20

Family

ID=83251575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210654211.1A Pending CN115081842A (en) 2022-06-09 2022-06-09 Legal user system authentication method

Country Status (1)

Country Link
CN (1) CN115081842A (en)

Similar Documents

Publication Publication Date Title
US8141134B2 (en) Authentication engine for enrollment into a computer environment
KR101520511B1 (en) User authenication system by using personal identification number, user terminal device, inquiry apparatus, authenication server, and user authenication method therefor
CN101809582A (en) Smart identity system
US20110276486A1 (en) System and method for securing payment
US11734544B2 (en) Mobile passport, mobile passport generation system for generating same, and mobile passport certification method
CN107003830A (en) Safety moving coupled system (SMCS)
CN108681902A (en) Mobile payment confirmation method, device, system and storage medium
CN107038509A (en) Self-service registration-management system
CN108764919A (en) E-payment confirmation method, device, system and storage medium
US8601270B2 (en) Method for the preparation of a chip card for electronic signature services
CN113326488A (en) Personal information protection system and method
CN110941849B (en) Offline electronic certificate showing method, device and system and computer equipment
CN109285068A (en) Online loan inquiry method, apparatus, equipment and storage medium
CN117172786A (en) Identity authentication method, device, equipment, medium and program product
CN115081842A (en) Legal user system authentication method
US11216899B2 (en) Consent obtaining machine and process
CN108111490B (en) Method and equipment for establishing relationship between users and computer storage medium
CN111223025A (en) Intelligent shunting method and system for entry and exit service hall
JP2001312476A (en) Individual authenticating device for network, authenticated transaction system, and individual authentication system
TW201907688A (en) Systems, devices, and methods for performing verification of communications received from one or more computing devices
US20230026228A1 (en) Systems and methods for use in altering attributes of user identities on networks
CN111866846B (en) Data identification method and related device
CN112801723A (en) Method and system for processing service based on terminal equipment
JP2024008654A (en) Program, information processing apparatus, and information processing method
JP4500107B2 (en) Document creation support method and document creation support program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination