Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and system for authorizing service acceptance based on Internet personal identity

A technology of the Internet and authorized parties, applied in transmission systems, electromagnetic radiation induction, instruments, etc., can solve problems such as inability to authorize business, inability to authorize user personal information, and single business usage scenarios, so as to increase convenience and improve security , the effect of convenient handling

Inactive Publication Date: 2018-10-12
新大陆(福建)公共服务有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, business authorization cannot be performed in an asynchronous manner, and complex user personal information cannot be authorized, resulting in a single business usage scenario

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for authorizing service acceptance based on Internet personal identity
  • Method and system for authorizing service acceptance based on Internet personal identity
  • Method and system for authorizing service acceptance based on Internet personal identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] like figure 1 As shown, the present invention authorizes the method for accepting business based on Internet personal identity, comprising the following steps:

[0029] Step 1. The authorizer submits the materials required for the acceptance process to the server;

[0030] Step 2. The server receives the material, encrypts the material, and then returns the encrypted serial code, and generates an authorization party authentication code according to the serial code, and the authorization party authentication code is a two-dimensional code, a one-dimensional code or a network link;

[0031] Step 3. The authorizing party provides the authorizing party authentication code to the agent, and the agent generates an authorization serial number and an authorization authentication code on the server through the authorizing party authentication code, and the authorizer sets the time limit of the authorization authentication code through the server;

[0032] Step 4. The handling p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for authorizing service acceptance based on Internet personal identity. The method comprises the following steps that: an authorizing party submits materials needed to be provided by an acceptance flow to a server; the server receives and generates an authorizing party authorization code; the authorizing party provides the authorizing party authorization code for an agent, and the agent generates an authorization serial number and an authorization authentication code on a server side through the authorizing party authorization code; an affair handling acceptor acquires the materials submitted by the authorizing party through the authorization code, and performs acceptance if the materials satisfy conditions; and if not, the affair handling acceptor does not perform acceptance. By means of online authorization and offline acceptance, the authorization and services are decoupled, thereby greatly improving the flexibility of the services.

Description

technical field [0001] The invention relates to a method and system for authorizing and accepting business based on Internet personal identity. Background technique [0002] With the rapid development of mobile communication technology, the use of Internet identity authorization is becoming more and more common. For example: 1. Mainstream Internet applications provide third-party login portals. For example, CSDN uses QQ to log in; King of Glory uses WeChat to log in; Meituan supports WeChat to log in ; 2. Use third-party payment software to pay when paying, for example: 12306 uses Alipay to pay for tickets. [0003] The above-mentioned identity authorization is embedded in the business flow, and is authorized when the business is handled. After the authorization is completed, the business process needs to be continued. In this way, business authorization cannot be performed in an asynchronous manner, and complex user personal information cannot be authorized, resulting in a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06K7/14
CPCH04L63/0428H04L63/08G06K7/1417H04L67/56
Inventor 林龙陈承平李钻达叶明吴海珊
Owner 新大陆(福建)公共服务有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More