A kind of personal information data query interaction authorization method
Technical field
The present invention relates to information inquiry field more particularly to a kind of personal information data query interaction authorization methods.
Background technique
Personal house property information belongs to than more sensitive individual privacy information, under normal circumstances not external disclosure, but certain
It specific occasion at present can only be by consulting property ownership certificate as needed to disclose house property information to specific shareholder when house deal
To realize.The approach for having official at this stage allows house property information of the public in internet checking under one's name, but none
Allow the public to apply by mobile phone and oneself personal house property information is licensed to the method or process that designated person inquires in internet.
Based on actual demand, the present invention proposes an authorizing information querying method based on recognition of face.
Summary of the invention
The present invention provides a kind of personal information data query interaction authorization methods, cannot pass through end to solve the prior art
End is the technical issues of oneself personal information is licensed to designated person's inquiry by internet, so that personal information is associated in two dimension
In code, and by user's facial information and personal information double verification, and then realizes and license to designated person's querying individual information
While, guarantee user information safety.
In order to solve the above-mentioned technical problem, the embodiment of the invention provides a kind of personal information data query interaction authorized parties
Method, comprising:
First terminal obtains the facial information of the first user and needs the personal information of external authorization query, and according to institute
It states first user's facial information and the personal information generates two dimensional code;
After second terminal scans the two dimensional code progress data interaction, the second terminal obtains the personal letter of second user
The facial information of breath and the second user, and by internet to the second user personal information and the second user face
Portion's information carries out matching and verifies whether unanimously, if matching is consistent, sends confirmation message to the first terminal;
After the first terminal obtains the confirmation message, the interim facial information record of active user is obtained, and by institute
It states interim facial information and match with first user's facial information associated in the two dimensional code and verify whether unanimously, if one
It causes, then sends authorized order to the second terminal;
After the second terminal obtains the authorized order, obtains and show the personal information.
Preferably, the facial information that the first terminal obtains the first user needs the individual of external authorization query
Information, and two dimensional code is generated according to the first user facial information and the personal information, comprising:
The first terminal acquisition obtains and records the face information of first user;
The first terminal acquisition obtains and records the personal information for needing first user of external authorization query;
After the first terminal obtains the generation instruction issued by first user, according to the face of first user
Information and the personal information of first user generate two dimensional code, the two dimensional code be associated with first user face information and
The personal information of first user;
The first terminal sends the two dimensional code to the second terminal.
Preferably, after the second terminal scans the two dimensional code progress data interaction, the second terminal is obtained
The personal information of second user and the facial information of the second user are taken, and the second user individual is believed by internet
Breath and the second user facial information carry out matching verify whether it is consistent, if matching unanimously, to the first terminal transmission
Confirmation message, comprising:
After the second terminal scans the two dimensional code progress data interaction, the address information and jump of the two dimensional code are obtained
Turn request, jumps into personal information user interface;
The second terminal obtains the personal information that the second user is inputted in the personal information user interface, with
And acquisition obtains and records the facial information of the second user;
The second terminal is by internet checking connectivity application face recognition technology to the second user personal information
Matching is carried out with the second user facial information and verifies whether consistent, if matching is consistent, is sent really to the first terminal
Recognize information.
Preferably, the content that the content of the confirmation message includes the name of the second user, needs to inquire
Abstract and sending time.
Preferably, after the first terminal obtains the confirmation message, the interim face letter of active user is obtained
Breath, and the interim facial information match verifying whether with first user's facial information associated in the two dimensional code
Unanimously, if unanimously, sending authorized order to the second terminal, comprising:
After the first terminal obtains the confirmation message, display judges interface to receive the same of the first user sending
Mean to enable or refuse instruction;
After the first terminal gets the agreement instruction that first user issues, acquisition obtains and records current use
The interim facial information at family;
The first terminal application face recognition technology is to associated in the interim facial information and the two dimensional code
First user's facial information carries out matching and verifies whether unanimously, if unanimously, sending authorized order to the second terminal.
Preferably, the face recognition technology includes AI algorithm, face recognition algorithms and neural network algorithm.
Preferably, the personal information of the second user includes the name and identification card number of the second user
Code.
Preferably, the first terminal and the second terminal are smart phone, plate electricity with camera
Brain and computer.
Preferably, one instruction action of the first terminal and the every execution of the second terminal generates corresponding
Operation log recording, and be stored in and be locally stored in module accordingly, or stored the operation log recording by internet
In Cloud Server.
Preferably, the first terminal carry out matching verification result it is inconsistent when, signal an alert;Described
Two terminals carry out matching verification result it is inconsistent when, signal an alert simultaneously to the first terminal send warning information.
Compared with the prior art, the embodiment of the present invention has the following beneficial effects:
1, personal information is associated in two dimensional code by the method for the present invention, and dual by user's facial information and personal information
Verifying, the technology that oneself personal information licenses to designated person's inquiry cannot be asked in internet by terminal by solving the prior art
Topic, to guarantee user information safety while realization licenses to designated person's querying individual information.
2, matching verifying is carried out to user's facial information by using face recognition technology, the standard of face recognition can be improved
Exactness.
3, by log recording and save to each execute instruction, when operation when the error occurs, inquiry can be passed through
Log recording finds the source of problem, so that operating process traceableization.
4, when terminal authentication matching is inconsistent, corresponding warning information is issued, can be reinforced to userspersonal information's
Protection, guarantees the safety of information.
Detailed description of the invention
Fig. 1: for the method step flow diagram in the embodiment of the present invention;
Fig. 2: for the flow diagram of the step S1 in the embodiment of the present invention;
Fig. 3: for the flow diagram of the step S2 in the embodiment of the present invention;
Fig. 4: for the flow diagram of the step S3 in the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Inquire field in information, scan the two-dimensional code obtain information using very extensive, but lack authorization query mechanism, no
Specific people can be licensed to during inquiry and checks information, lead to disclose two dimensional code being equivalent to disclose to owner
Information.In payment technical field, although the authority to pay based on biological characteristic and two dimensional code is using very extensive, beneficiary input receipts
The money amount of money and after scanning the payment two dimensional code that payer is shown, can directly transfer the money of payer the account of beneficiary
Number, authority to pay mechanism is lacked in payment process.
To sum up, the invention proposes a kind of personal information data query interaction authorization methods.
Embodiment one
Fig. 1 is please referred to, the preferred embodiment of the present invention provides a kind of personal information data query interaction authorization method, packet
It includes:
S1, first terminal obtain the facial information of the first user and need the personal information of external authorization query, and root
Two dimensional code is generated according to the first user facial information and the personal information;
S2, after second terminal scans the two dimensional code progress data interaction, the second terminal obtains of second user
The facial information of people's information and the second user, and the second user personal information and described second are used by internet
Family facial information carries out matching and verifies whether unanimously, if matching is consistent, sends confirmation message to the first terminal;
S3 after the first terminal obtains the confirmation message, obtains the interim facial information record of active user, and will
The interim facial information, which match with first user's facial information associated in the two dimensional code, to be verified whether unanimously, if
Unanimously, then authorized order is sent to the second terminal;
S4 is obtained after the second terminal obtains the authorized order and is shown the personal information.
The present embodiment by the way that personal information is associated in two dimensional code, and by user's facial information and personal information it is dual
Verifying, the technology that oneself personal information licenses to designated person's inquiry cannot be asked in internet by terminal by solving the prior art
Topic, to guarantee user information safety while realization licenses to designated person's querying individual information.
Embodiment two
Referring to figure 2., in the present embodiment, the step S1 includes:
S11, the first terminal acquisition obtain and record the face information of first user;
S12, the first terminal acquisition obtain and record the personal letter for first user for needing external authorization query
Breath;
S13, after the first terminal obtains the generation instruction issued by first user, according to first user's
Face information and the personal information of first user generate two dimensional code, and the two dimensional code is associated with the face letter of first user
The personal information of breath and first user;
S14, the first terminal send the two dimensional code to the second terminal.
Embodiment three
Referring to figure 3., in the present embodiment, the step S2 includes:
S21 obtains the address information of the two dimensional code after the second terminal scans the two dimensional code progress data interaction
And jump request, it jumps into personal information user interface;
S22, the second terminal obtain the personal information that the second user is inputted in the personal information user interface,
And acquisition obtains and records the facial information of the second user;
S23, the second terminal are personal to the second user by internet checking connectivity application face recognition technology
Information and the second user facial information carry out matching verify whether it is consistent, if matching is consistent, to first terminal hair
Send confirmation message.
In the present embodiment, the content that the content of the confirmation message includes the name of the second user, needs to inquire
Abstract and sending time.
In the present embodiment, the face recognition technology includes AI algorithm, face recognition algorithms and neural network algorithm.It is logical
It crosses and matching verifying is carried out to user's facial information using face recognition technology, the accuracy of face recognition can be improved.
Example IV
Referring to figure 4., in the present embodiment, the step S3 includes:
S31, after the first terminal obtains the confirmation message, display judges interface to receive first user and issue
Agreement instruction or refusal instruction;
S32, after the first terminal gets the agreement instruction that first user issues, acquisition, which is obtained and recorded, works as
The interim facial information of preceding user;
S33, the first terminal application face recognition technology in the interim facial information and the two dimensional code to being closed
First user's facial information of connection carries out matching and verifies whether unanimously, if unanimously, sending authorized order to the second terminal.
In the present embodiment, the face recognition technology includes AI algorithm, face recognition algorithms and neural network algorithm.It is logical
It crosses and matching verifying is carried out to user's facial information using face recognition technology, the accuracy of face recognition can be improved.
Embodiment five
In the present embodiment, one instruction action of the first terminal and the every execution of the second terminal generates corresponding
Operation log recording, and be stored in and be locally stored in module accordingly, or stored the operation log recording by internet
In Cloud Server.
The present embodiment by log recording and save to each execute instruction, when operation when the error occurs, Ke Yitong
The source that inquiry log record finds problem is crossed, so that operating process traceableization.
Embodiment six
In the present embodiment, the first terminal carry out matching verification result it is inconsistent when, signal an alert;Described
Two terminals carry out matching verification result it is inconsistent when, signal an alert simultaneously to the first terminal send warning information.
The present embodiment issues corresponding warning information, can reinforce to individual subscriber when terminal authentication matching is inconsistent
The protection of information guarantees the safety of information.
It should be understood that in the above embodiment, the personal information of the second user includes the second user
Name and ID card No..
It should be understood that in the above embodiment, the first terminal and the second terminal are with camera
Smart phone, tablet computer and computer.
Below with reference to one of embodiment, the present invention is described in detail.
Firstly, after face information of the information providing (calling provider in the following text) using the equipment such as mobile phone acquisition provider, search
It needs the information of external authorization query and generates an authorization query two dimensional code, this inquiry two dimensional code is associated with the people of provider
The information of face information and authorization query;Second, information issuer (calling issuer in the following text) scans the two dimensional code using equipment such as mobile phones
Afterwards, oneself name, ID card No. and the face information that issuer is obtained using equipment, equipment application recognition of face skill are inputted
Art checks whether the face information of current typing matches with the personal information of input;Third, the face information of current typing and defeated
After the personal information confirmation matching entered, equipment sends messages to provider and is confirmed whether that licensing to issuer consults the information;Most
Afterwards, if provider agrees to, the inquiry associated face of two dimensional code is checked after the face information of provider is obtained using equipment such as mobile phones
Whether information is consistent, and issuer can check information disclosed in above-mentioned authorization if consistent.
Step 1: information providing (calling " provider " in the following text) obtains by equipment such as mobile phones and records face information;
Step 2: provider searches for the information for needing external authorization query;(information searched for here does not refer to government system singly
In information, can be the information of any group or individual demand authorization query)
Step 3: provider, which clicks, generates inquiry two dimensional code, which is associated with the face information of provider and awards
Weigh the information that can be inquired;
Step 4: provider shares the inquiry two dimensional code;
Step 5: information issuer (calling " issuer " in the following text) scans the inquiry two dimensional code of provider by equipment such as mobile phones;
Step 6: issuer inputs the personal information such as name, ID card No. by equipment such as mobile phones;
Step 7: issuer is obtained and is recorded my face information by equipment such as mobile phones;
Step 8: equipment is verified whether and is inputted by the face information using face recognition technology inspection issuer's typing
Personal information matching;(issuer does not need the resident information system for being directly connected to public security bureau, and Internet company pair can be used
" the face core body " interface of outer offer is realized, such as this interface http://ai.baidu.com/docs#/Face-
PersonVerify-V3/top? qq-pf-to=pcqq.c2c, the equipment of issuer can scrutineers as long as it can connect internet
Whether face information has matched with personal information)
Step 9: after the face information of issuer's typing and the personal information inspection result of input are matching, equipment will be sent
Information (message content includes the name of issuer, needs synopsis, the query time inquired etc.) is to the equipment of provider;If
It matches inconsistent, then terminates process.
Step 10: after provider receives information, if agreeing to that the inquiry of authorization query side continues to operate in next step, otherwise terminating
Process;
Step 11: provider obtains using equipment such as mobile phones and records my face information;
Step 12: equipment is associated by the face information and inquiry two dimensional code for checking provider using face recognition technology
Whether face information is consistent, if unanimously, issuer can check that provider authorizes disclosed information to terminate if inconsistent
Process.
Step 13: issuer checks that provider authorizes disclosed information.
Particular embodiments described above has carried out further the purpose of the present invention, technical scheme and beneficial effects
It is described in detail, it should be understood that the above is only a specific embodiment of the present invention, the protection being not intended to limit the present invention
Range.It particularly points out, to those skilled in the art, all within the spirits and principles of the present invention, that is done any repairs
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.