Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention can be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
Fig. 1 shows a flowchart of a user information processing method according to an embodiment of the present invention. The method is applied to the computing equipment. As shown in fig. 1, the method comprises the steps of:
and step 110, acquiring a user certificate number and a user photo.
The user certificate number refers to the certificate number of the user who is not put in storage. The method comprises the following steps of obtaining a user certificate number, specifically: and scanning the users to be warehoused with the capability circle, acquiring the user certificate numbers of the users to be warehoused, and acquiring the identification information of the business hall. The identification number can be an identity identification number, and most of current network users are in real-name systems, so that the information of the users can be acquired through the identity identification number. Of course, in some other embodiments, the certificate number may also be other certificate numbers, such as a pass number, a personal identification number, and so forth.
The user photo refers to a photo of a user who is not put in a database. The method for acquiring the user photo specifically includes: and acquiring the user photo from the customer relationship management database according to the user certificate number. A Customer Relationship Management database (CRM) is a CRM real name database, and the CRM real name database stores a user certificate number and a user photo corresponding to the user certificate number. For example, the CRM real name library may obtain the user's license number and the corresponding user's photo by scanning the identification card, or may obtain the user's license number by field input. Wherein, a user's certificate number can correspond many user's photos, then acquires user's photo, specifically can be: the latest user photo is acquired. Optionally, in some other embodiments, obtaining the user photo may further be: the user's picture is obtained by taking a picture on site.
And 120, generating a designated identification code based on the user certificate number.
Wherein, before step 120, the method may further comprise: inquiring whether a user information base has an appointed identification code associated with the user certificate number or not; if yes, deleting the designated identification code stored in the user information base; if not, go to step 120. The corresponding relation between the preset identification code and the user certificate number is stored in the user information base, so that whether the certificate number identical to the user certificate number exists or not can be inquired in the user information base, if the certificate number identical to the user certificate number exists, the specified identification code associated with the user certificate number exists, and if the certificate number identical to the user certificate number does not exist, the specified identification code associated with the user certificate number does not exist.
The specified Identifier is a Universal Unique Identifier (UUID). A UUID is a machine-generated identifier that is unique within a range (from a particular namespace to the world). UUID has the following meaning: 1. generating via an algorithmic machine: in order to ensure the uniqueness of the UUID, the specification defines elements including a network card MAC address, a timestamp, a Namespace (Namespace), a random or pseudo-random number, a timing sequence, and an algorithm for generating the UUID from the elements; 2. non-manual designation, non-manual identification: UUIDs cannot be specified manually unless the risk of UUID duplication is present. The complexity of UUIDs determines that the "average person" cannot know directly from a UUID which object is associated with it; 3. the multiplicity is limited within a certain range and can only be guaranteed within a certain range, which is extremely unlikely depending on the type of UUID: the generation specification of the UUID defines an algorithm whose main purpose is to ensure its uniqueness, but this uniqueness is the one.
In step 120, when it is determined that the designated identification code associated with the user certificate number does not exist, the designated identification code is generated according to the user certificate number and the generation method of the UUID.
And step 130, storing the user certificate number and the specified identification code into a user information base.
And step 140, sending the user picture and the designated identification code to a third party so that the third party performs face recognition according to the obtained user picture.
Wherein, before step 140, the method may further comprise: and inquiring whether the third party has the generated identification code, and if not, executing the step 140.
In step 140, when it is determined that the third party does not have the designated identification code, the designated identification code is sent to the third party database together with the user photo, so that the third party stores the designated identification code and the user photo.
The third party may be an application or a company for providing the user information processing service. The user's photograph and the specified identification code may be stored in a database of a third party.
In this embodiment, when the user goes to a business hall for business transaction, the third party obtains the face information of the user, and the third party performs face recognition according to the obtained face information of the user and the user's picture in the database. The face information may include one or more of a captured picture, a local feature of the face, and the like. For example, a third party acquires a snapshot of a user and performs face recognition according to the snapshot; or, the third party acquires the local facial features of the user and carries out face recognition according to the local facial features. The face recognition by the third party may be: after the snapshot of the user is obtained, the third party performs feature extraction and analysis on the snapshot and matches the snapshot with a plurality of user photos in the database, if the matching is successful, the face recognition is successful, if the matching is failed, the face recognition is failed, and the database can be considered as not containing the user photos corresponding to the user in the snapshot.
And 150, receiving a face recognition result and an appointed identification code returned by the third party.
And after the third party performs face recognition according to the acquired user picture, the third party generates a face recognition result. The face recognition result may include face information of the user acquired by the third party. In this embodiment, if the face recognition of the third party is successful, the third party obtains the designated identification code corresponding to the user photo from the database according to the face information of the user, and returns the face recognition result containing the face information of the user and the designated identification code, so that the face recognition result and the designated identification code returned by the third party are received.
And 160, converting the specified identification code into a user certificate number according to the user information in the user information base, and performing service processing by combining a face identification result.
Specifically, step 160 includes:
and 161, converting the specified identification code into a user certificate number according to the user information in the user information base, and acquiring the mobile phone number of the user according to the user certificate number.
The user information base can store the corresponding relation between the user certificate number and the appointed identification code. The appointed identification code is converted into a user certificate number, and the method specifically comprises the following steps: and searching the user certificate number corresponding to the specified identification code according to the corresponding relation between the user certificate number and the specified identification code, so that the specified identification code is converted into the user certificate number.
And step 162, carrying out service push on the user according to the mobile phone number of the user.
According to the user certificate number, the information of the user to be processed can be obtained from each platform or database, and therefore identity query, information updating, service pushing and other operations are conducted on the user to be processed.
The embodiment of the invention obtains the user certificate number and the user photo, generates the appointed identification code based on the user certificate number, stores the user certificate number and the appointed identification code in the user information base, sends the user photo and the appointed identification code to the third party, so that the third party carries out face identification according to the obtained user photo, receives the face identification result and the appointed identification code returned by the third party, converts the appointed identification code into the user certificate number according to the user information in the user information base, carries out service processing by combining the face identification result, can convert the identity information into the identification code, and provides the identification code and the photo to the third party, thereby avoiding the third party from directly contacting with the personal identity information of the user, and can prevent privacy leakage when obtaining the identity information of the user by isolating the third party application platform from the personal identity information resource.
In some embodiments, step 162 may include:
step 1621, determining whether the user is a different network user according to the mobile phone number of the user.
And inquiring whether the user mobile phone number exists in the customer relationship management database, if not, determining that the user mobile phone number is a different-network user, and if so, determining that the user mobile phone number is not the different-network user.
Step 1622, if the user is not a different network user, adding the user into the designated user group, and pushing the service to the user.
And when the mobile phone number of the user is determined not to be a user in a different network, inquiring name information of the identity card of the user, adding the user into the capacity circle to expand the user group, and warehousing the next time of the batch operation, thereby pushing the service to the user.
The service push for the user specifically includes: acquiring service information of a user according to the user certificate number; and carrying out service pushing on the user based on the big data according to the service information. The mobile phone number of the user can be inquired according to the service information, and the service information of the user can be inquired in the user information base through the mobile phone number of the user. After the service information of the user is obtained, service pushing is performed on the user based on the big data, for example, assuming that the obtained call time of the user is mostly working time, it is presumed that the user is a working group, and package service for working people is pushed to the user.
In some embodiments, step 160 may further include:
and 163, inquiring the historical photo information in the user information base according to the user certificate number.
The user information base stores historical photo information, the historical photo information comprises a user expansion photo table, and the user expansion photo table records information such as the number of photos of the historical photos and the photo entry time. According to the user certificate number, historical photo information can be inquired.
And 164, if the number of photos in the historical photo information is greater than or equal to the threshold value, inquiring the earliest photo in the historical photo information according to time, and deleting the earliest photo.
The threshold is a preset threshold for the number of stored photos, for example, the threshold may be 10, and if the number of photos included in the historical photo information is 10, the number of photos included in the historical photo information is equal to the preset number of photos. Step 164 may specifically be: and when the number of photos contained in the historical photo information is determined to be greater than or equal to the threshold value, inquiring the earliest photo in the historical photos according to the photo entry time recorded in the user extended photo table, and deleting the earliest photo and the extended information of the earliest photo. The oldest photograph is a photograph stored in the stored photographs at the earliest time, and the extension information of the oldest photograph is information of the oldest photograph in the user extension photograph table.
And 165, updating the historical photo information in the user information base according to the face recognition result.
The method specifically comprises the following steps: and storing the face information of the user into a user information base to be used as a historical photo of the user, and updating the extension information of the face information of the user to a user extension photo table.
In some embodiments, the method further comprises:
and step 166, binding and storing the face information of the user, the mobile phone number of the user and the specified identification code.
After the mobile phone number of the user is obtained, face information (such as a snapshot of the user), the mobile phone number of the user and the specified identification code of the user are stored in a user information base together.
Fig. 2 is a flowchart illustrating a user information processing method according to another embodiment of the present invention. As shown in fig. 2, the method comprises the steps of:
step 201, a third party shoots a user through a camera to obtain a snapshot of the user;
and step 202, the third party carries out face recognition on the user according to the user snapshot and the database.
The third party matches the snapshot with the user photos in the database, if the matching is successful, the face recognition is successful, and if the matching is failed, the face recognition is failed.
And 203, if the face recognition is successful, the third party sends the snapshot and the designated identification code corresponding to the snapshot to the computing equipment.
And when the face recognition is successful, the third party acquires the specified identification code corresponding to the user photo matched with the snapshot photo, and sends the specified identification code and the snapshot photo to the computing equipment.
And 204, the computing equipment receives the appointed identification code, and acquires the user certificate number corresponding to the appointed identification code according to the corresponding relation between the user certificate number in the user information base and the appointed identification code.
And when the appointed identification code is received, namely the user is considered as an old user, acquiring the user certificate number corresponding to the appointed identification code from the user information base.
Step 205, the computing device queries the historical photo information in the user database according to the user certificate number.
And step 206, if the number of the photos contained in the historical photo information is greater than or equal to the threshold value, inquiring the earliest photo in the historical photo information according to time, deleting the earliest photo, and storing the snapshot photo.
And step 207, the computing equipment sends an information acquisition recommendation instruction to the user, and if an approval confirmation command is received, the mobile phone number of the user is acquired according to the user certificate number.
And step 208, the computing equipment binds and stores the snapshot, the user photo, the user mobile phone number and the specified identification code to a user information base.
And step 209, if the face recognition fails, the third party sends the snapshot to the computing equipment.
Step 210, the computing device receives the snapshot, generates an information acquisition recommendation instruction and sends the information acquisition recommendation instruction to the user, and if a confirmation consent command sent by the user is received, uploads the snapshot to a user information base.
And step 211, the computing equipment acquires the user certificate number input by the user, generates an identification code based on the user certificate number, and stores the identification code and the snapshot in a user information base.
And step 212, if the mobile phone number of the user is acquired from the user information base and is determined not to be the different-network mobile phone number, the computing equipment inquires the name information of the user, adds the user into the capacity circle to expand the user group, and puts the user into storage for the next batch operation.
The embodiment of the invention acquires the user certificate number and the user photo, generates the appointed identification code based on the user certificate number, stores the user certificate number and the appointed identification code in the user information base, sends the user photo and the appointed identification code to the third party so that the third party carries out face identification according to the acquired user photo, receives the face identification result and the appointed identification code returned by the third party, converts the appointed identification code into the user certificate number according to the user information in the user information base, carries out service processing by combining the face identification result, can convert the identity information into the identification code, and provides the identification code and the photo to the third party, thereby avoiding the third party from directly contacting with the personal identity information of the user, and can prevent privacy leakage when acquiring the identity information of the user by isolating the third party application platform from the personal identity information resource.
Fig. 3 is a schematic structural diagram of a user information processing apparatus according to an embodiment of the present invention. As shown in fig. 3, the apparatus 300 includes: the system comprises an information acquisition module 310, an identification code generation module 320, a sending module 330, a receiving module 340 and a processing module 350.
The information acquisition module 310 is used for acquiring a user certificate number and a user photo; the identification code generating module 320 is used for generating an appointed identification code based on the user certificate number and storing the user certificate number and the appointed identification code in a user information base; the sending module 330 is configured to send the user picture and the designated identification code to a third party, so that the third party performs face recognition according to the obtained user picture; the receiving module 340 is configured to receive a face recognition result and the specified identification code returned by the third party; the processing module 350 is configured to convert the specified identification code into the user certificate number according to the user information in the user information base, and perform service processing in combination with the face recognition result.
In an optional manner, the processing module 350 is specifically configured to: converting the specified identification code into the user certificate number according to the user information in the user information base, and acquiring the mobile phone number of the user according to the user certificate number; and carrying out service push on the user according to the mobile phone number of the user.
In an optional manner, the processing module 350 is specifically configured to: confirming whether the user is a different network user or not according to the user mobile phone number; if not, adding the user into the appointed user group, and pushing the service to the user.
In an optional manner, the apparatus 300 further comprises: and updating the module. The update module is to: inquiring whether the user information base has a specified identification code associated with the user certificate number; and if so, deleting the specified identification code stored in the user information base.
In an optional manner, the processing module 350 is specifically configured to: inquiring historical photo information in the user information base according to the user certificate number; if the number of photos contained in the historical photo information is larger than or equal to a threshold value, inquiring the earliest photo in the historical photo information according to time, and deleting the earliest photo; and updating the historical photo information in the user information base according to the face recognition result.
In an alternative mode, the assigned identification code is a universal unique identification code.
It should be noted that, the user information processing apparatus provided in the embodiment of the present invention is an apparatus capable of executing the user information processing method, and all embodiments of the user information processing method are applicable to the apparatus and can achieve the same or similar beneficial effects.
The embodiment of the invention acquires the user certificate number and the user photo, generates the appointed identification code based on the user certificate number, stores the user certificate number and the appointed identification code in the user information base, sends the user photo and the appointed identification code to the third party so that the third party carries out face identification according to the acquired user photo, receives the face identification result and the appointed identification code returned by the third party, converts the appointed identification code into the user certificate number according to the user information in the user information base, carries out service processing by combining the face identification result, can convert the identity information into the identification code, and provides the identification code and the photo to the third party, thereby avoiding the third party from directly contacting with the personal identity information of the user, and can prevent privacy leakage when acquiring the identity information of the user by isolating the third party application platform from the personal identity information resource.
An embodiment of the present invention provides a computer-readable storage medium, where at least one executable instruction is stored in the storage medium, and the executable instruction causes a processor to execute the user information processing method in any method embodiment described above.
The embodiment of the invention obtains the user certificate number and the user photo, generates the appointed identification code based on the user certificate number, stores the user certificate number and the appointed identification code in the user information base, sends the user photo and the appointed identification code to the third party, so that the third party carries out face identification according to the obtained user photo, receives the face identification result and the appointed identification code returned by the third party, converts the appointed identification code into the user certificate number according to the user information in the user information base, carries out service processing by combining the face identification result, can convert the identity information into the identification code, and provides the identification code and the photo to the third party, thereby avoiding the third party from directly contacting with the personal identity information of the user, and can prevent privacy leakage when obtaining the identity information of the user by isolating the third party application platform from the personal identity information resource.
An embodiment of the present invention provides a computer program product, which includes a computer program stored on a computer storage medium, the computer program including program instructions, which, when executed by a computer, cause the computer to execute the user information processing method in any of the above-mentioned method embodiments.
The embodiment of the invention obtains the user certificate number and the user photo, generates the appointed identification code based on the user certificate number, stores the user certificate number and the appointed identification code in the user information base, sends the user photo and the appointed identification code to the third party, so that the third party carries out face identification according to the obtained user photo, receives the face identification result and the appointed identification code returned by the third party, converts the appointed identification code into the user certificate number according to the user information in the user information base, carries out service processing by combining the face identification result, can convert the identity information into the identification code, and provides the identification code and the photo to the third party, thereby avoiding the third party from directly contacting with the personal identity information of the user, and can prevent privacy leakage when obtaining the identity information of the user by isolating the third party application platform from the personal identity information resource.
Fig. 4 is a schematic structural diagram of a computing device according to an embodiment of the present invention, and the specific embodiment of the present invention does not limit the specific implementation of the computing device.
As shown in fig. 4, the computing device may include: a processor (processor)402, a Communications Interface 404, a memory 406, and a Communications bus 408.
Wherein: the processor 402, communication interface 404, and memory 406 communicate with each other via a communication bus 408. A communication interface 404 for communicating with network elements of other devices, such as clients or other servers. The processor 402 is configured to execute the program 410, and may specifically execute the user information processing method in any of the method embodiments described above.
In particular, program 410 may include program code comprising computer operating instructions.
The processor 402 may be a central processing unit CPU or an application Specific Integrated circuit asic or one or more Integrated circuits configured to implement embodiments of the present invention. The computing device includes one or more processors, which may be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 406 for storing a program 410. Memory 406 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The embodiment of the invention obtains the user certificate number and the user photo, generates the appointed identification code based on the user certificate number, stores the user certificate number and the appointed identification code in the user information base, sends the user photo and the appointed identification code to the third party, so that the third party carries out face identification according to the obtained user photo, receives the face identification result and the appointed identification code returned by the third party, converts the appointed identification code into the user certificate number according to the user information in the user information base, carries out service processing by combining the face identification result, can convert the identity information into the identification code, and provides the identification code and the photo to the third party, thereby avoiding the third party from directly contacting with the personal identity information of the user, and can prevent privacy leakage when obtaining the identity information of the user by isolating the third party application platform from the personal identity information resource.
The algorithms or displays presented herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. In addition, embodiments of the present invention are not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the embodiments of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the invention and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names. The steps in the above embodiments should not be construed as limiting the order of execution unless specified otherwise.