[go: up one dir, main page]

CN113704808A - User information processing method and device and computing equipment - Google Patents

User information processing method and device and computing equipment Download PDF

Info

Publication number
CN113704808A
CN113704808A CN202010431038.XA CN202010431038A CN113704808A CN 113704808 A CN113704808 A CN 113704808A CN 202010431038 A CN202010431038 A CN 202010431038A CN 113704808 A CN113704808 A CN 113704808A
Authority
CN
China
Prior art keywords
user
identification code
photo
information
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010431038.XA
Other languages
Chinese (zh)
Other versions
CN113704808B (en
Inventor
黄文婷
石益宇
吴逊
谢贤娟
杨俏
柳淑婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Zhejiang Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Zhejiang Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Zhejiang Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202010431038.XA priority Critical patent/CN113704808B/en
Publication of CN113704808A publication Critical patent/CN113704808A/en
Application granted granted Critical
Publication of CN113704808B publication Critical patent/CN113704808B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本发明实施例涉及数据安全技术领域,公开了一种用户信息处理方法、装置及计算设备。其中,该方法包括:获取用户证件号和用户照片;基于待用户证件号生成指定识别码,将用户证件号和指定识别码存入用户信息库;将用户照片和指定识别码发送至第三方,以使第三方根据获取的用户照片进行人脸识别;接收第三方返回的人脸识别结果和所述指定识别码;根据所述用户信息库中的用户信息,将所述指定识别码转化为所述用户证件号,结合所述人脸识别结果,进行业务处理。通过上述方式,本发明实施例能够防止隐私泄露。

Figure 202010431038

Embodiments of the present invention relate to the technical field of data security, and disclose a user information processing method, device and computing device. The method includes: acquiring the user ID number and the user photo; generating a designated identification code based on the ID number of the user to be used, storing the user ID number and the designated identification code in the user information database; sending the user photo and the designated identification code to a third party, In order to make the third party perform face recognition according to the obtained user photo; receive the face recognition result and the designated identification code returned by the third party; according to the user information in the user information database, convert the designated identification code into all The user ID number is combined with the face recognition result, and business processing is performed. In the above manner, the embodiments of the present invention can prevent privacy leakage.

Figure 202010431038

Description

User information processing method and device and computing equipment
Technical Field
The embodiment of the invention relates to the technical field of data security, in particular to a user information processing method and device and computing equipment.
Background
With the rapid development of technologies such as big data, cloud computing and artificial intelligence, application scenarios of user information processing are more and more common, however, data abuse such as data abuse, data stealing, data buying and selling and the like often occurs, and privacy protection becomes an urgent task.
At present, a third-party user information processing technology providing company acquires personal information from a providing part of a data source through an identification card number to realize identity recognition, and the third party can directly contact individual identity information, so that the risk of privacy disclosure exists.
Disclosure of Invention
In view of the foregoing problems, embodiments of the present invention provide a user information processing method, apparatus, and computing device, which can prevent privacy disclosure.
According to an aspect of an embodiment of the present invention, there is provided a user information processing method, including: acquiring a user certificate number and a user photo; generating a designated identification code based on the user certificate number; storing the user certificate number and the specified identification code into a user information base; sending the user photo and the designated identification code to a third party so that the third party performs face recognition according to the obtained user photo; receiving a face recognition result and the specified identification code returned by a third party; and converting the specified identification code into the user certificate number according to the user information in the user information base, and performing service processing by combining the face identification result.
In an optional manner, the converting, according to the user information in the user information base, the specified identification code into the user certificate number, and performing service processing in combination with the face recognition result includes: converting the specified identification code into the user certificate number according to the user information in the user information base, and acquiring the mobile phone number of the user according to the user certificate number; and carrying out service push on the user according to the mobile phone number of the user.
In an optional manner, the pushing a service to a user according to the mobile phone number of the user includes: confirming whether the user is a different network user or not according to the user mobile phone number; if not, adding the user into the appointed user group, and pushing the service to the user.
In an optional manner, before generating the specified identification code based on the user license number, the method further includes: inquiring whether the user information base has a specified identification code associated with the user certificate number; and if so, deleting the specified identification code stored in the user information base.
In an optional manner, the performing service processing by combining the face recognition result includes: inquiring historical photo information in the user information base according to the user certificate number; and if the number of photos contained in the historical photo information is greater than or equal to a threshold value, inquiring the earliest photo in the historical photo information according to time, and deleting the earliest photo.
In an optional manner, the performing service processing by combining the face recognition result further includes: and updating the historical photo information in the user information base according to the face recognition result.
In an alternative mode, the assigned identification code is a universal unique identification code.
According to another aspect of embodiments of the present invention, there is provided a user information processing apparatus including: the information acquisition module is used for acquiring a user certificate number and a user photo; the identification code generation module is used for generating an appointed identification code based on the user certificate number and storing the user certificate number and the appointed identification code into a user information base; the sending module is used for sending the user photo and the specified identification code to a third party so that the third party can perform face recognition according to the obtained user photo; the receiving module is used for receiving a face recognition result and the specified identification code returned by a third party; and the processing module is used for converting the specified identification code into the user certificate number according to the user information in the user information base and carrying out service processing by combining the face identification result.
According to still another aspect of an embodiment of the present invention, there is provided a computing device including: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus; the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation of the user information processing method.
According to another aspect of the embodiments of the present invention, there is provided a computer-readable storage medium having at least one executable instruction stored therein, the executable instruction causing a processor to execute the user information processing method as described above.
The embodiment of the invention obtains the user certificate number and the user photo, generates the appointed identification code based on the user certificate number, stores the user certificate number and the appointed identification code in the user information base, sends the user photo and the appointed identification code to the third party, so that the third party carries out face identification according to the obtained user photo, receives the face identification result and the appointed identification code returned by the third party, converts the appointed identification code into the user certificate number according to the user information in the user information base, carries out service processing by combining the face identification result, can convert the identity information into the identification code, and provides the identification code and the photo to the third party, thereby avoiding the third party from directly contacting with the personal identity information of the user, and can prevent privacy leakage when obtaining the identity information of the user by isolating the third party application platform from the personal identity information resource.
The foregoing description is only an overview of the technical solutions of the embodiments of the present invention, and the embodiments of the present invention can be implemented according to the content of the description in order to make the technical means of the embodiments of the present invention more clearly understood, and the detailed description of the present invention is provided below in order to make the foregoing and other objects, features, and advantages of the embodiments of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart illustrating a user information processing method according to an embodiment of the invention;
fig. 2 is a flowchart illustrating a user information processing method according to another embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a user information processing apparatus according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a computing device provided in an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention can be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
Fig. 1 shows a flowchart of a user information processing method according to an embodiment of the present invention. The method is applied to the computing equipment. As shown in fig. 1, the method comprises the steps of:
and step 110, acquiring a user certificate number and a user photo.
The user certificate number refers to the certificate number of the user who is not put in storage. The method comprises the following steps of obtaining a user certificate number, specifically: and scanning the users to be warehoused with the capability circle, acquiring the user certificate numbers of the users to be warehoused, and acquiring the identification information of the business hall. The identification number can be an identity identification number, and most of current network users are in real-name systems, so that the information of the users can be acquired through the identity identification number. Of course, in some other embodiments, the certificate number may also be other certificate numbers, such as a pass number, a personal identification number, and so forth.
The user photo refers to a photo of a user who is not put in a database. The method for acquiring the user photo specifically includes: and acquiring the user photo from the customer relationship management database according to the user certificate number. A Customer Relationship Management database (CRM) is a CRM real name database, and the CRM real name database stores a user certificate number and a user photo corresponding to the user certificate number. For example, the CRM real name library may obtain the user's license number and the corresponding user's photo by scanning the identification card, or may obtain the user's license number by field input. Wherein, a user's certificate number can correspond many user's photos, then acquires user's photo, specifically can be: the latest user photo is acquired. Optionally, in some other embodiments, obtaining the user photo may further be: the user's picture is obtained by taking a picture on site.
And 120, generating a designated identification code based on the user certificate number.
Wherein, before step 120, the method may further comprise: inquiring whether a user information base has an appointed identification code associated with the user certificate number or not; if yes, deleting the designated identification code stored in the user information base; if not, go to step 120. The corresponding relation between the preset identification code and the user certificate number is stored in the user information base, so that whether the certificate number identical to the user certificate number exists or not can be inquired in the user information base, if the certificate number identical to the user certificate number exists, the specified identification code associated with the user certificate number exists, and if the certificate number identical to the user certificate number does not exist, the specified identification code associated with the user certificate number does not exist.
The specified Identifier is a Universal Unique Identifier (UUID). A UUID is a machine-generated identifier that is unique within a range (from a particular namespace to the world). UUID has the following meaning: 1. generating via an algorithmic machine: in order to ensure the uniqueness of the UUID, the specification defines elements including a network card MAC address, a timestamp, a Namespace (Namespace), a random or pseudo-random number, a timing sequence, and an algorithm for generating the UUID from the elements; 2. non-manual designation, non-manual identification: UUIDs cannot be specified manually unless the risk of UUID duplication is present. The complexity of UUIDs determines that the "average person" cannot know directly from a UUID which object is associated with it; 3. the multiplicity is limited within a certain range and can only be guaranteed within a certain range, which is extremely unlikely depending on the type of UUID: the generation specification of the UUID defines an algorithm whose main purpose is to ensure its uniqueness, but this uniqueness is the one.
In step 120, when it is determined that the designated identification code associated with the user certificate number does not exist, the designated identification code is generated according to the user certificate number and the generation method of the UUID.
And step 130, storing the user certificate number and the specified identification code into a user information base.
And step 140, sending the user picture and the designated identification code to a third party so that the third party performs face recognition according to the obtained user picture.
Wherein, before step 140, the method may further comprise: and inquiring whether the third party has the generated identification code, and if not, executing the step 140.
In step 140, when it is determined that the third party does not have the designated identification code, the designated identification code is sent to the third party database together with the user photo, so that the third party stores the designated identification code and the user photo.
The third party may be an application or a company for providing the user information processing service. The user's photograph and the specified identification code may be stored in a database of a third party.
In this embodiment, when the user goes to a business hall for business transaction, the third party obtains the face information of the user, and the third party performs face recognition according to the obtained face information of the user and the user's picture in the database. The face information may include one or more of a captured picture, a local feature of the face, and the like. For example, a third party acquires a snapshot of a user and performs face recognition according to the snapshot; or, the third party acquires the local facial features of the user and carries out face recognition according to the local facial features. The face recognition by the third party may be: after the snapshot of the user is obtained, the third party performs feature extraction and analysis on the snapshot and matches the snapshot with a plurality of user photos in the database, if the matching is successful, the face recognition is successful, if the matching is failed, the face recognition is failed, and the database can be considered as not containing the user photos corresponding to the user in the snapshot.
And 150, receiving a face recognition result and an appointed identification code returned by the third party.
And after the third party performs face recognition according to the acquired user picture, the third party generates a face recognition result. The face recognition result may include face information of the user acquired by the third party. In this embodiment, if the face recognition of the third party is successful, the third party obtains the designated identification code corresponding to the user photo from the database according to the face information of the user, and returns the face recognition result containing the face information of the user and the designated identification code, so that the face recognition result and the designated identification code returned by the third party are received.
And 160, converting the specified identification code into a user certificate number according to the user information in the user information base, and performing service processing by combining a face identification result.
Specifically, step 160 includes:
and 161, converting the specified identification code into a user certificate number according to the user information in the user information base, and acquiring the mobile phone number of the user according to the user certificate number.
The user information base can store the corresponding relation between the user certificate number and the appointed identification code. The appointed identification code is converted into a user certificate number, and the method specifically comprises the following steps: and searching the user certificate number corresponding to the specified identification code according to the corresponding relation between the user certificate number and the specified identification code, so that the specified identification code is converted into the user certificate number.
And step 162, carrying out service push on the user according to the mobile phone number of the user.
According to the user certificate number, the information of the user to be processed can be obtained from each platform or database, and therefore identity query, information updating, service pushing and other operations are conducted on the user to be processed.
The embodiment of the invention obtains the user certificate number and the user photo, generates the appointed identification code based on the user certificate number, stores the user certificate number and the appointed identification code in the user information base, sends the user photo and the appointed identification code to the third party, so that the third party carries out face identification according to the obtained user photo, receives the face identification result and the appointed identification code returned by the third party, converts the appointed identification code into the user certificate number according to the user information in the user information base, carries out service processing by combining the face identification result, can convert the identity information into the identification code, and provides the identification code and the photo to the third party, thereby avoiding the third party from directly contacting with the personal identity information of the user, and can prevent privacy leakage when obtaining the identity information of the user by isolating the third party application platform from the personal identity information resource.
In some embodiments, step 162 may include:
step 1621, determining whether the user is a different network user according to the mobile phone number of the user.
And inquiring whether the user mobile phone number exists in the customer relationship management database, if not, determining that the user mobile phone number is a different-network user, and if so, determining that the user mobile phone number is not the different-network user.
Step 1622, if the user is not a different network user, adding the user into the designated user group, and pushing the service to the user.
And when the mobile phone number of the user is determined not to be a user in a different network, inquiring name information of the identity card of the user, adding the user into the capacity circle to expand the user group, and warehousing the next time of the batch operation, thereby pushing the service to the user.
The service push for the user specifically includes: acquiring service information of a user according to the user certificate number; and carrying out service pushing on the user based on the big data according to the service information. The mobile phone number of the user can be inquired according to the service information, and the service information of the user can be inquired in the user information base through the mobile phone number of the user. After the service information of the user is obtained, service pushing is performed on the user based on the big data, for example, assuming that the obtained call time of the user is mostly working time, it is presumed that the user is a working group, and package service for working people is pushed to the user.
In some embodiments, step 160 may further include:
and 163, inquiring the historical photo information in the user information base according to the user certificate number.
The user information base stores historical photo information, the historical photo information comprises a user expansion photo table, and the user expansion photo table records information such as the number of photos of the historical photos and the photo entry time. According to the user certificate number, historical photo information can be inquired.
And 164, if the number of photos in the historical photo information is greater than or equal to the threshold value, inquiring the earliest photo in the historical photo information according to time, and deleting the earliest photo.
The threshold is a preset threshold for the number of stored photos, for example, the threshold may be 10, and if the number of photos included in the historical photo information is 10, the number of photos included in the historical photo information is equal to the preset number of photos. Step 164 may specifically be: and when the number of photos contained in the historical photo information is determined to be greater than or equal to the threshold value, inquiring the earliest photo in the historical photos according to the photo entry time recorded in the user extended photo table, and deleting the earliest photo and the extended information of the earliest photo. The oldest photograph is a photograph stored in the stored photographs at the earliest time, and the extension information of the oldest photograph is information of the oldest photograph in the user extension photograph table.
And 165, updating the historical photo information in the user information base according to the face recognition result.
The method specifically comprises the following steps: and storing the face information of the user into a user information base to be used as a historical photo of the user, and updating the extension information of the face information of the user to a user extension photo table.
In some embodiments, the method further comprises:
and step 166, binding and storing the face information of the user, the mobile phone number of the user and the specified identification code.
After the mobile phone number of the user is obtained, face information (such as a snapshot of the user), the mobile phone number of the user and the specified identification code of the user are stored in a user information base together.
Fig. 2 is a flowchart illustrating a user information processing method according to another embodiment of the present invention. As shown in fig. 2, the method comprises the steps of:
step 201, a third party shoots a user through a camera to obtain a snapshot of the user;
and step 202, the third party carries out face recognition on the user according to the user snapshot and the database.
The third party matches the snapshot with the user photos in the database, if the matching is successful, the face recognition is successful, and if the matching is failed, the face recognition is failed.
And 203, if the face recognition is successful, the third party sends the snapshot and the designated identification code corresponding to the snapshot to the computing equipment.
And when the face recognition is successful, the third party acquires the specified identification code corresponding to the user photo matched with the snapshot photo, and sends the specified identification code and the snapshot photo to the computing equipment.
And 204, the computing equipment receives the appointed identification code, and acquires the user certificate number corresponding to the appointed identification code according to the corresponding relation between the user certificate number in the user information base and the appointed identification code.
And when the appointed identification code is received, namely the user is considered as an old user, acquiring the user certificate number corresponding to the appointed identification code from the user information base.
Step 205, the computing device queries the historical photo information in the user database according to the user certificate number.
And step 206, if the number of the photos contained in the historical photo information is greater than or equal to the threshold value, inquiring the earliest photo in the historical photo information according to time, deleting the earliest photo, and storing the snapshot photo.
And step 207, the computing equipment sends an information acquisition recommendation instruction to the user, and if an approval confirmation command is received, the mobile phone number of the user is acquired according to the user certificate number.
And step 208, the computing equipment binds and stores the snapshot, the user photo, the user mobile phone number and the specified identification code to a user information base.
And step 209, if the face recognition fails, the third party sends the snapshot to the computing equipment.
Step 210, the computing device receives the snapshot, generates an information acquisition recommendation instruction and sends the information acquisition recommendation instruction to the user, and if a confirmation consent command sent by the user is received, uploads the snapshot to a user information base.
And step 211, the computing equipment acquires the user certificate number input by the user, generates an identification code based on the user certificate number, and stores the identification code and the snapshot in a user information base.
And step 212, if the mobile phone number of the user is acquired from the user information base and is determined not to be the different-network mobile phone number, the computing equipment inquires the name information of the user, adds the user into the capacity circle to expand the user group, and puts the user into storage for the next batch operation.
The embodiment of the invention acquires the user certificate number and the user photo, generates the appointed identification code based on the user certificate number, stores the user certificate number and the appointed identification code in the user information base, sends the user photo and the appointed identification code to the third party so that the third party carries out face identification according to the acquired user photo, receives the face identification result and the appointed identification code returned by the third party, converts the appointed identification code into the user certificate number according to the user information in the user information base, carries out service processing by combining the face identification result, can convert the identity information into the identification code, and provides the identification code and the photo to the third party, thereby avoiding the third party from directly contacting with the personal identity information of the user, and can prevent privacy leakage when acquiring the identity information of the user by isolating the third party application platform from the personal identity information resource.
Fig. 3 is a schematic structural diagram of a user information processing apparatus according to an embodiment of the present invention. As shown in fig. 3, the apparatus 300 includes: the system comprises an information acquisition module 310, an identification code generation module 320, a sending module 330, a receiving module 340 and a processing module 350.
The information acquisition module 310 is used for acquiring a user certificate number and a user photo; the identification code generating module 320 is used for generating an appointed identification code based on the user certificate number and storing the user certificate number and the appointed identification code in a user information base; the sending module 330 is configured to send the user picture and the designated identification code to a third party, so that the third party performs face recognition according to the obtained user picture; the receiving module 340 is configured to receive a face recognition result and the specified identification code returned by the third party; the processing module 350 is configured to convert the specified identification code into the user certificate number according to the user information in the user information base, and perform service processing in combination with the face recognition result.
In an optional manner, the processing module 350 is specifically configured to: converting the specified identification code into the user certificate number according to the user information in the user information base, and acquiring the mobile phone number of the user according to the user certificate number; and carrying out service push on the user according to the mobile phone number of the user.
In an optional manner, the processing module 350 is specifically configured to: confirming whether the user is a different network user or not according to the user mobile phone number; if not, adding the user into the appointed user group, and pushing the service to the user.
In an optional manner, the apparatus 300 further comprises: and updating the module. The update module is to: inquiring whether the user information base has a specified identification code associated with the user certificate number; and if so, deleting the specified identification code stored in the user information base.
In an optional manner, the processing module 350 is specifically configured to: inquiring historical photo information in the user information base according to the user certificate number; if the number of photos contained in the historical photo information is larger than or equal to a threshold value, inquiring the earliest photo in the historical photo information according to time, and deleting the earliest photo; and updating the historical photo information in the user information base according to the face recognition result.
In an alternative mode, the assigned identification code is a universal unique identification code.
It should be noted that, the user information processing apparatus provided in the embodiment of the present invention is an apparatus capable of executing the user information processing method, and all embodiments of the user information processing method are applicable to the apparatus and can achieve the same or similar beneficial effects.
The embodiment of the invention acquires the user certificate number and the user photo, generates the appointed identification code based on the user certificate number, stores the user certificate number and the appointed identification code in the user information base, sends the user photo and the appointed identification code to the third party so that the third party carries out face identification according to the acquired user photo, receives the face identification result and the appointed identification code returned by the third party, converts the appointed identification code into the user certificate number according to the user information in the user information base, carries out service processing by combining the face identification result, can convert the identity information into the identification code, and provides the identification code and the photo to the third party, thereby avoiding the third party from directly contacting with the personal identity information of the user, and can prevent privacy leakage when acquiring the identity information of the user by isolating the third party application platform from the personal identity information resource.
An embodiment of the present invention provides a computer-readable storage medium, where at least one executable instruction is stored in the storage medium, and the executable instruction causes a processor to execute the user information processing method in any method embodiment described above.
The embodiment of the invention obtains the user certificate number and the user photo, generates the appointed identification code based on the user certificate number, stores the user certificate number and the appointed identification code in the user information base, sends the user photo and the appointed identification code to the third party, so that the third party carries out face identification according to the obtained user photo, receives the face identification result and the appointed identification code returned by the third party, converts the appointed identification code into the user certificate number according to the user information in the user information base, carries out service processing by combining the face identification result, can convert the identity information into the identification code, and provides the identification code and the photo to the third party, thereby avoiding the third party from directly contacting with the personal identity information of the user, and can prevent privacy leakage when obtaining the identity information of the user by isolating the third party application platform from the personal identity information resource.
An embodiment of the present invention provides a computer program product, which includes a computer program stored on a computer storage medium, the computer program including program instructions, which, when executed by a computer, cause the computer to execute the user information processing method in any of the above-mentioned method embodiments.
The embodiment of the invention obtains the user certificate number and the user photo, generates the appointed identification code based on the user certificate number, stores the user certificate number and the appointed identification code in the user information base, sends the user photo and the appointed identification code to the third party, so that the third party carries out face identification according to the obtained user photo, receives the face identification result and the appointed identification code returned by the third party, converts the appointed identification code into the user certificate number according to the user information in the user information base, carries out service processing by combining the face identification result, can convert the identity information into the identification code, and provides the identification code and the photo to the third party, thereby avoiding the third party from directly contacting with the personal identity information of the user, and can prevent privacy leakage when obtaining the identity information of the user by isolating the third party application platform from the personal identity information resource.
Fig. 4 is a schematic structural diagram of a computing device according to an embodiment of the present invention, and the specific embodiment of the present invention does not limit the specific implementation of the computing device.
As shown in fig. 4, the computing device may include: a processor (processor)402, a Communications Interface 404, a memory 406, and a Communications bus 408.
Wherein: the processor 402, communication interface 404, and memory 406 communicate with each other via a communication bus 408. A communication interface 404 for communicating with network elements of other devices, such as clients or other servers. The processor 402 is configured to execute the program 410, and may specifically execute the user information processing method in any of the method embodiments described above.
In particular, program 410 may include program code comprising computer operating instructions.
The processor 402 may be a central processing unit CPU or an application Specific Integrated circuit asic or one or more Integrated circuits configured to implement embodiments of the present invention. The computing device includes one or more processors, which may be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 406 for storing a program 410. Memory 406 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The embodiment of the invention obtains the user certificate number and the user photo, generates the appointed identification code based on the user certificate number, stores the user certificate number and the appointed identification code in the user information base, sends the user photo and the appointed identification code to the third party, so that the third party carries out face identification according to the obtained user photo, receives the face identification result and the appointed identification code returned by the third party, converts the appointed identification code into the user certificate number according to the user information in the user information base, carries out service processing by combining the face identification result, can convert the identity information into the identification code, and provides the identification code and the photo to the third party, thereby avoiding the third party from directly contacting with the personal identity information of the user, and can prevent privacy leakage when obtaining the identity information of the user by isolating the third party application platform from the personal identity information resource.
The algorithms or displays presented herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. In addition, embodiments of the present invention are not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the embodiments of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the invention and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names. The steps in the above embodiments should not be construed as limiting the order of execution unless specified otherwise.

Claims (10)

1.一种用户信息处理方法,其特征在于,包括:1. a user information processing method, is characterized in that, comprises: 获取用户证件号和用户照片;Obtain user ID number and user photo; 基于所述用户证件号生成指定识别码;generating a designated identification code based on the user ID number; 将所述用户证件号和所述指定识别码存入用户信息库;Store the user ID number and the designated identification code in the user information database; 将所述用户照片和所述指定识别码发送至第三方,以使所述第三方根据获取的用户照片进行人脸识别;Send the user photo and the designated identification code to a third party, so that the third party can perform face recognition according to the obtained user photo; 接收第三方返回的人脸识别结果和所述指定识别码;Receive the face recognition result and the designated identification code returned by the third party; 根据所述用户信息库中的用户信息,将所述指定识别码转化为所述用户证件号,结合所述人脸识别结果,进行业务处理。According to the user information in the user information database, the designated identification code is converted into the user ID number, and business processing is performed in combination with the face recognition result. 2.根据权利要求1所述的方法,其特征在于,所述根据所述用户信息库中的用户信息,将所述指定识别码转化为所述用户证件号,结合所述人脸识别结果,进行业务处理,包括:2. The method according to claim 1, wherein, according to the user information in the user information base, the specified identification code is converted into the user ID number, combined with the face recognition result, Conduct business processing, including: 根据所述用户信息库中的用户信息,将所述指定识别码转化为所述用户证件号,根据所述用户证件号获取用户手机号;According to the user information in the user information database, the designated identification code is converted into the user certificate number, and the user mobile phone number is obtained according to the user certificate number; 根据所述用户手机号,对用户进行业务推送。According to the mobile phone number of the user, the service is pushed to the user. 3.根据权利要求2所述的方法,其特征在于,所述根据所述用户手机号,对用户进行业务推送,包括:3. The method according to claim 2, wherein, according to the mobile phone number of the user, performing service push to the user, comprising: 根据所述用户手机号,确认是否异网用户;According to the user's mobile phone number, confirm whether it is a different network user; 若不是异网用户,将该用户加入指定用户群,对用户进行业务推送。If it is not a user on a different network, add the user to the specified user group and push services to the user. 4.根据权利要求1所述的方法,其特征在于,所述基于所述用户证件号生成指定识别码之前,还包括:4. The method according to claim 1, wherein before generating the specified identification code based on the user ID number, the method further comprises: 查询所述用户信息库是否存在与所述用户证件号相关联的指定识别码;Query whether the user information database has a designated identification code associated with the user ID number; 若存在,删除所述用户信息库内存储的指定识别码。If it exists, delete the designated identification code stored in the user information database. 5.根据权利要求1所述的方法,其特征在于,所述结合所述人脸识别结果,进行业务处理,包括:5. The method according to claim 1, wherein, performing business processing in combination with the face recognition result, comprising: 根据所述用户证件号查询所述用户信息库中的历史照片信息;Query the historical photo information in the user information database according to the user ID number; 若所述历史照片信息中包含的照片数量大于或者等于阈值,按照时间查询所述历史照片信息中的最早照片,删除所述最早照片。If the number of photos contained in the historical photo information is greater than or equal to the threshold, the oldest photo in the historical photo information is queried according to time, and the oldest photo is deleted. 6.根据权利要求5所述的方法,其特征在于,所述结合所述人脸识别结果,进行业务处理,还包括:6. The method according to claim 5, wherein, performing business processing in combination with the face recognition result, further comprising: 根据所述人脸识别结果,更新所述用户信息库中的历史照片信息。According to the face recognition result, the historical photo information in the user information database is updated. 7.根据权利要求1-6任一项所述的方法,其特征在于,所述指定识别码为唯一通用识别码。7. The method according to any one of claims 1-6, wherein the designated identification code is a unique universal identification code. 若接收到所述第三方根据所述第三方数据库中所述待入库用户照片和所述待入库识别码发送的与所述待处理用户的人脸信息对应的识别码,则根据所述用户信息库中所述待入库用户证件号和所述待入库识别码的对应关系,获取与所述识别码对应的用户证件号;If an identification code corresponding to the face information of the user to be processed sent by the third party according to the photo of the user to be stored and the identification code to be stored in the third-party database is received, The corresponding relationship between the user ID number to be stored and the ID code to be stored in the user information database, and the user ID number corresponding to the ID code is obtained; 根据所述用户证件号,获取所述待处理用户的信息,以对所述待处理用户的信息进处理。According to the user certificate number, the information of the to-be-processed user is acquired, so as to process the information of the to-be-processed user. 8.一种用户信息处理装置,其特征在于,所述装置包括:8. A user information processing device, wherein the device comprises: 信息采集模块,用于获取用户证件号和用户照片;The information collection module is used to obtain the user ID number and user photo; 识别码生成模块,用于基于所述用户证件号生成指定识别码,并将所述用户证件号和所述指定识别码存入用户信息库;An identification code generation module, configured to generate a designated identification code based on the user certificate number, and store the user certificate number and the designated identification code in a user information database; 发送模块,用于将所述用户照片和所述指定识别码发送至第三方,以使所述第三方根据获取的用户照片进行人脸识别;A sending module, configured to send the user photo and the designated identification code to a third party, so that the third party can perform face recognition according to the obtained user photo; 接收模块,用于接收第三方返回的人脸识别结果和所述指定识别码;a receiving module for receiving the face recognition result and the designated identification code returned by a third party; 处理模块,用于根据所述用户信息库中的用户信息,将所述指定识别码转化为所述用户证件号,结合所述人脸识别结果,进行业务处理。The processing module is configured to convert the designated identification code into the user ID number according to the user information in the user information database, and perform business processing in combination with the face recognition result. 9.一种计算设备,其特征在于,包括:处理器、存储器和通信接口,所述处理器、所述存储器和所述通信接口之间相互通信;9. A computing device, comprising: a processor, a memory and a communication interface, wherein the processor, the memory and the communication interface communicate with each other; 所述存储器用于存放至少一可执行指令,所述可执行指令使所述处理器执行如权利要求1-7中任意一项所述的用户信息处理方法的操作。The memory is used for storing at least one executable instruction, and the executable instruction enables the processor to perform the operation of the user information processing method according to any one of claims 1-7. 10.一种计算机可读存储介质,其特征在于,所述存储介质中存储有至少一可执行指令,所述可执行指令使处理器执行如权利要求1-7中任意一项所述的用户信息处理方法。10. A computer-readable storage medium, wherein the storage medium stores at least one executable instruction, the executable instruction enables a processor to execute the user according to any one of claims 1-7 Information processing method.
CN202010431038.XA 2020-05-20 2020-05-20 User information processing method and device and computing equipment Active CN113704808B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010431038.XA CN113704808B (en) 2020-05-20 2020-05-20 User information processing method and device and computing equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010431038.XA CN113704808B (en) 2020-05-20 2020-05-20 User information processing method and device and computing equipment

Publications (2)

Publication Number Publication Date
CN113704808A true CN113704808A (en) 2021-11-26
CN113704808B CN113704808B (en) 2024-05-24

Family

ID=78645695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010431038.XA Active CN113704808B (en) 2020-05-20 2020-05-20 User information processing method and device and computing equipment

Country Status (1)

Country Link
CN (1) CN113704808B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120038601A (en) * 2010-10-14 2012-04-24 심혁훈 The method operating and system for third party call api using recognition of character and image
CN105450407A (en) * 2014-07-31 2016-03-30 阿里巴巴集团控股有限公司 Identity authentication method and device
US9336435B1 (en) * 2012-11-21 2016-05-10 Ozog Media, LLC System, method, and computer program product for performing processing based on object recognition
CN106453341A (en) * 2016-10-21 2017-02-22 腾讯科技(北京)有限公司 Information processing method and device
CN107196943A (en) * 2017-05-26 2017-09-22 浙江大学 A kind of security display implementation method of private data in third-party platform
CN108021825A (en) * 2017-12-28 2018-05-11 维沃移动通信有限公司 A privacy information protection method, mobile terminal
CN108734099A (en) * 2018-04-16 2018-11-02 深圳市商汤科技有限公司 Auth method and device, electronic equipment, computer program and storage medium
CN109450872A (en) * 2018-10-23 2019-03-08 中国联合网络通信集团有限公司 Method for authenticating user identity, system, storage medium and electronic equipment
CN110097161A (en) * 2019-05-05 2019-08-06 葛莘莘 A kind of person ID Card Recognition System and method
GB201915570D0 (en) * 2019-10-27 2019-12-11 Paycasso Verify Ltd Method, system and computer program for registering a user with a third-party service
CN110598464A (en) * 2019-10-10 2019-12-20 山东浪潮人工智能研究院有限公司 Data and model safety protection method of face recognition system
CN110941849A (en) * 2019-10-10 2020-03-31 数字广东网络建设有限公司 Offline electronic certificate showing method, device and system and computer equipment

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120038601A (en) * 2010-10-14 2012-04-24 심혁훈 The method operating and system for third party call api using recognition of character and image
US9336435B1 (en) * 2012-11-21 2016-05-10 Ozog Media, LLC System, method, and computer program product for performing processing based on object recognition
CN105450407A (en) * 2014-07-31 2016-03-30 阿里巴巴集团控股有限公司 Identity authentication method and device
CN106453341A (en) * 2016-10-21 2017-02-22 腾讯科技(北京)有限公司 Information processing method and device
CN107196943A (en) * 2017-05-26 2017-09-22 浙江大学 A kind of security display implementation method of private data in third-party platform
CN108021825A (en) * 2017-12-28 2018-05-11 维沃移动通信有限公司 A privacy information protection method, mobile terminal
CN108734099A (en) * 2018-04-16 2018-11-02 深圳市商汤科技有限公司 Auth method and device, electronic equipment, computer program and storage medium
CN109450872A (en) * 2018-10-23 2019-03-08 中国联合网络通信集团有限公司 Method for authenticating user identity, system, storage medium and electronic equipment
CN110097161A (en) * 2019-05-05 2019-08-06 葛莘莘 A kind of person ID Card Recognition System and method
CN110598464A (en) * 2019-10-10 2019-12-20 山东浪潮人工智能研究院有限公司 Data and model safety protection method of face recognition system
CN110941849A (en) * 2019-10-10 2020-03-31 数字广东网络建设有限公司 Offline electronic certificate showing method, device and system and computer equipment
GB201915570D0 (en) * 2019-10-27 2019-12-11 Paycasso Verify Ltd Method, system and computer program for registering a user with a third-party service

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
韩青: "云环境下人脸安全识别技术研究与实现", 信息科技, no. 2, 15 February 2020 (2020-02-15), pages 20 - 30 *

Also Published As

Publication number Publication date
CN113704808B (en) 2024-05-24

Similar Documents

Publication Publication Date Title
US9219808B2 (en) Contact information synchronization system and method
US20190306163A1 (en) Method and device for information interaction and association between human biological feature data and account
CN109493073B (en) Identity recognition method and device based on human face and electronic equipment
WO2013004035A1 (en) Business card information exchange method combining character recognition and image matching
CN113434910A (en) Business data chaining method and device
CN108282527A (en) Generate the distributed system and method for Service Instance
CN109710609B (en) Method and device for generating data table identification
CN105550205A (en) A contact information processing method and device thereof
CN114328029B (en) A backup method, device, electronic device and storage medium for application resources
US20170180506A1 (en) Method and apparatus for obtaining user account
WO2020233014A1 (en) Message sending method and apparatus, and computer device and storage medium
CN112667415A (en) Data calling method and device, readable storage medium and electronic equipment
CN112200680B (en) Blockchain node management method, device, computer and readable storage medium
CN111427923B (en) Vehicle information query method, device and storage medium based on blockchain
CN114780778A (en) Image searching method, image searching device, storage medium and electronic device
CN113704808A (en) User information processing method and device and computing equipment
WO2016171617A1 (en) Multi-variable documentation of delivery of goods
CN113269538A (en) Method, device and equipment for forwarding parallel approval nodes and storage medium
KR102602086B1 (en) Operation server for safe phone service using qr code and its operation method
CN113553379B (en) A data collection method and device
CN115827280A (en) Message processing method and device, electronic equipment and storage medium
CN115348254A (en) File packaging and downloading method and device, electronic equipment and storage medium
CN107704557B (en) Processing method and device for operating mutually exclusive data, computer equipment and storage medium
CN110363537B (en) Remote surface signature screen calling method and device, storage medium and computer equipment
CN113342579A (en) Data restoration method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant