CN110111080A - A kind of PIM method and relevant device - Google Patents
A kind of PIM method and relevant device Download PDFInfo
- Publication number
- CN110111080A CN110111080A CN201910389964.2A CN201910389964A CN110111080A CN 110111080 A CN110111080 A CN 110111080A CN 201910389964 A CN201910389964 A CN 201910389964A CN 110111080 A CN110111080 A CN 110111080A
- Authority
- CN
- China
- Prior art keywords
- node
- information
- personal information
- user
- audit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000012550 audit Methods 0.000 claims abstract description 65
- 238000012797 qualification Methods 0.000 claims abstract description 62
- 230000005540 biological transmission Effects 0.000 claims description 13
- 238000007726 management method Methods 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 6
- 238000012423 maintenance Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000009434 installation Methods 0.000 description 3
- 210000000056 organ Anatomy 0.000 description 3
- 239000000047 product Substances 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 201000010099 disease Diseases 0.000 description 2
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 2
- 239000003814 drug Substances 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000004438 eyesight Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000036541 health Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 208000036693 Color-vision disease Diseases 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 201000007254 color blindness Diseases 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000001727 in vivo Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Marketing (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the present application discloses a kind of PIM method and its relevant device, for improving the realization efficiency of personal information audit.The embodiment of the present application method includes: that server node obtains the qualification examination request that first node is sent, and the qualification examination request includes User Identity code;Userspersonal information is determined according to the User Identity code;The userspersonal information is audited using default auditing rule, generates auditing result;The auditing result is sent to the qualification examination and requests corresponding audit node, so that the audit node is audited using the auditing result.Wherein, server node is a node in distributed memory system, auditing result is sent to qualification examination and requests corresponding audit node by the server node, as the Auditing Principal reference of audit node, i.e., using in distributed memory system data can not tamper can largely improve the realization efficiency of personal information audit.
Description
Technical field
This application involves data management field more particularly to a kind of PIM methods and relevant device.
Background technique
Personal information, spy can be identified with what electronics or other modes recorded individually or in conjunction with other information by referring to
Determine the various information of natural person's identity or the specific natural person's activity condition of reflection, including name, identification card number, communication are logical
Interrogate contact method, address, account number cipher, property status, whereabouts track, social relationships etc..
In the prior art, the maintenance of personal information generally by authority government organs carry out, when need to
When the personal information at family carries out title examination, it is necessary to got by these different mechanisms relevant personal information again into
Row title examination.By taking certain user carries out driving license application as an example, traffic control department is needed from the household register information for sending the acquired user
(including age, gender, native place etc.), career in medicine school get health and fitness information (including height, eyesight, hearing, the disease of the user
History etc.).
However, this information management mode needs multi-party progress data maintenance, the identity information of user and matching are verified
It verifies, collect evidence many times as a result, generally requiring centre for one out, need a large amount of man power and material, the data pipe of this mode
It is lower to manage mode efficiencies, influences user experience.
Summary of the invention
The embodiment of the present application provides a kind of PIM method and its relevant device, examines for improving personal information
The realization efficiency of core.
The embodiment of the present application first aspect provides a kind of PIM method, is applied to server node, described
Server node is a node in distributed memory system, and the distributed memory system further includes first node and audit
Node, which comprises
The qualification examination request that first node is sent is obtained, the qualification examination request includes User Identity code;
Userspersonal information is determined according to the User Identity code;
The userspersonal information is audited using default auditing rule, generates auditing result;
The auditing result is sent to the qualification examination and requests corresponding audit node, so that the audit node
It is audited using the auditing result.
Optionally, the method also includes:
The user information that trusted node is sent is received, the user information includes User Identity code and individual subscriber
Information;
The User Identity code and the userspersonal information are subjected to binding storage, generate personal information data
Library;
It is described to determine that target user's personal information includes: according to target user's Identity Code
Target user's personal information is determined in the personal information database.
Optionally, the User Identity code and the userspersonal information are being subjected to binding storage, generated personal
After information database, the method also includes:
The more new information that the trusted node is sent is obtained, the more new packets include User Identity code and update
Userspersonal information afterwards;
The personal information database is updated according to the more new information.
Optionally, the personal information of the target user is audited using default auditing rule, generates audit knot
Before fruit, the method also includes:
Obtain the corresponding qualification examination rule of the audit node;
The default auditing rule is generated according to the qualification examination rule.
The embodiment of the present application second aspect provides a kind of personal information management system, is applied to server node, described
Server node is a node in distributed memory system, and the distributed memory system further includes first node and audit
Node, the personal information management system include:
First acquisition unit, for obtaining the qualification examination request of first node transmission, the qualification examination request includes
User Identity code;
Determination unit, for determining userspersonal information according to the User Identity code;
Unit is audited, for using default auditing rule to audit the userspersonal information, generates auditing result;
Transmission unit requests corresponding audit node for the auditing result to be sent to the qualification examination, so that
The audit node is obtained to be audited using the auditing result.
Optionally, the system also includes:
Receiving unit, for receiving the user information of trusted node transmission, the user information includes user identity mark
Know code and userspersonal information;
First generation unit, for the User Identity code and the userspersonal information to be carried out binding storage,
Generate personal information database;
The determination unit is specifically used for:
Target user's personal information is determined in the personal information database.
Optionally, the system also includes:
Second acquisition unit, the more new information sent for obtaining the trusted node, the more new packets include use
Family Identity Code and updated userspersonal information;
Updating unit, for being updated according to the more new information to the personal information database.
Optionally, the system also includes:
Third acquiring unit, for obtaining the corresponding qualification examination rule of the audit node;
Second generation unit, for generating the default auditing rule according to the qualification examination rule.
The embodiment of the present application third aspect provides a kind of computer equipment, comprising:
Processor, memory, input-output equipment and bus;
The processor, memory, input-output equipment are connected with the bus respectively;
The processor is used to execute the method as described in any one of preceding method embodiment.
The embodiment of the present application fourth aspect provides a kind of computer readable storage medium, is stored thereon with computer journey
Sequence, it is characterised in that: the side as described in any one of preceding method embodiment is realized when the computer program is executed by processor
The step of method.
As can be seen from the above technical solutions, the embodiment of the present application has the advantage that in the present embodiment, obtains first segment
The qualification examination request that point is sent, the qualification examination request includes User Identity code;According to the User Identity
Code determines userspersonal information;The userspersonal information is audited using default auditing rule, generates auditing result;
The auditing result is sent to the qualification examination and requests corresponding audit node, so that described in the audit node use
Auditing result is audited.Wherein, server node is a node in distributed memory system, which will examine
Core result is sent to qualification examination and requests corresponding audit node, as the Auditing Principal reference of audit node, i.e., using distribution
In formula storage system data can not tamper can largely improve personal information audit realization efficiency.
Detailed description of the invention
Fig. 1 is an a kind of schematic diagram of PIM method embodiment in the embodiment of the present application;
Fig. 2 is a kind of another schematic diagram of PIM method embodiment in the embodiment of the present application;
Fig. 3 is a kind of another schematic diagram of PIM method embodiment in the embodiment of the present application;
Fig. 4 is a kind of another schematic diagram of PIM method embodiment in the embodiment of the present application;
Fig. 5 is a kind of another schematic diagram of personal information management system embodiment in the embodiment of the present application;
Fig. 6 is a kind of another schematic diagram of computer installation embodiment in the embodiment of the present application.
Specific embodiment
The embodiment of the present application provides a kind of PIM method and its relevant device, examines for improving personal information
The realization efficiency of core.
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only
The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people
Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection
It encloses.
The description and claims of this application and term " first ", " second ", " third ", " in above-mentioned attached drawing
Four " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way
Data be interchangeable under appropriate circumstances, so that the embodiments described herein can be in addition to illustrating herein or describing
Sequence other than appearance is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that covering is non-exclusive
Include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to clearly arrange
Those of out step or unit, but may include be not clearly listed or it is solid for these process, methods, product or equipment
The other step or units having.
Personal information, spy can be identified with what electronics or other modes recorded individually or in conjunction with other information by referring to
Determine the various information of natural person's identity or the specific natural person's activity condition of reflection, including name, identification card number, communication are logical
Interrogate contact method, address, account number cipher, property status, whereabouts track, social relationships etc..In the prior art, personal information
Maintenance is carried out generally by the government organs of authority, when needing the personal information to user to carry out title examination, is just needed
Title examination is carried out again to get relevant personal information by these different mechanisms.Driving license application is carried out with certain user
For, traffic control department is needed from the household register information (including age, gender, native place etc.) for sending the acquired user, career in medicine school
Get the health and fitness information (including height, eyesight, hearing, history of disease etc.) of the user.However, this information management mode needs
It is multi-party to carry out data maintenance, to verify the identity information of user and match one as a result, generally require intermediate verifying many times,
Evidence obtaining, needs a large amount of man power and material, the Db Management Model efficiency of this mode is lower, influences user experience.For this purpose, this
Application embodiment provides a kind of PIM method and its relevant device, for improving the realization effect of personal information audit
Rate.
In order to make it easy to understand, the detailed process in the embodiment of the present application is described below, referring to Fig. 1, the application
A kind of one embodiment of PIM method includes: in embodiment
101, the qualification examination request that first node is sent is obtained;
In the present embodiment, server node obtains the qualification examination request that first node is sent, the qualification examination request
Including User Identity code.
Wherein, server node is a node in distributed memory system, further includes in the distributed memory system
First node and audit node.Illustratively, in the specific implementation process of this embodiment scheme, block catenary system can be used
A kind of implementation as the distributed memory system.
Specifically, server node can receive the qualification examination request of first node transmission, and herein, first node can be with
It is user terminal directly as application node, first node is also possible to audit node as first node, is needing to use certain
Qualification examination request is sent to server node when family carries out qualification examination request, first node is also possible to the operation of block chain
One node platform, the transfer for communicating as user terminal with server node, first node can also be other forms
First node, herein without limitation.In addition, User Identity code can be telephone number, ID card No., user make by oneself
Justice field information or other for identity information in one or more, can also be to information therein into
Information (such as Hash encryption) after row encryption, herein without limitation.
102, userspersonal information is determined according to the User Identity code;
In the present embodiment, server node determines the personal information of user according to User Identity code.
Specifically, server node, which can be used User Identity code and search in the database, determines and user's body
The corresponding userspersonal information of part identification code, database herein can be can not usurping in server node self maintained
The database changed, the database being also possible in third party's data maintenance end, then interacts with server node and determines
Userspersonal information.
103, the userspersonal information is audited using default auditing rule, generates auditing result;
In the present embodiment, server node audits the userspersonal information using default auditing rule, generates
Auditing result.
Specifically, default auditing rule can be preset in server node, when the distributed system is block catenary system
When, which can be the intelligent contract in block catenary system.In addition, (for example getting married pre- in default auditing rule
If auditing rule, application lawyer's operation preset auditing rule, driving license presets auditing rule etc.) in, it has pre-seted each qualification and has examined
Information needed for core and condition etc..Such as: having pre-seted driving license and preset auditing rule are as follows: must be 18 years old or more, have submitted medical certificate
It is bright, the conditions such as no colour blindness.Auditing rule is preset using this to audit userspersonal information, generates auditing result, it is general next
It says, which can directly indicate whether the userspersonal information passes through audit, be also possible to the tool for examining content
Hold description in vivo, herein without limitation.
104, the auditing result is sent to the qualification examination and requests corresponding audit node.
In the present embodiment, the auditing result is sent to the qualification examination by server node requests corresponding audit to save
Point, so that the audit node uses the auditing result to be audited as Auditing Principal.At this point, the auditing result conduct
The Auditing Principal reference for auditing node can be largely without multiple authentication in the prior art in carrying out, evidence obtaining process
Improve the realization efficiency of personal information audit.
In the present embodiment, the qualification examination request that first node is sent is obtained, the qualification examination request includes user's body
Part identification code;Userspersonal information is determined according to the User Identity code;Using default auditing rule to the user
Personal information is audited, and auditing result is generated;The auditing result is sent to the qualification examination and requests corresponding audit
Node.Wherein, server node is a node in distributed memory system, which is sent to auditing result
Qualification examination requests corresponding audit node, as the Auditing Principal reference of audit node, i.e., using in distributed memory system
Data can not tamper can largely improve personal information audit realization efficiency.
In the embodiment of the present application, based on embodiment described in Fig. 1, specifically, server node can be with self maintained user
Personal information database, for execute step 102 according to target user's Identity Code determine target user individual
The process of information.Below referring to Fig. 2, based on embodiment described in Fig. 1, in the embodiment of the present application, a kind of personal information management side
Another embodiment of method includes:
201, the user information that trusted node is sent is received;
In the present embodiment, server node receives the user information that trusted node is sent, and the user information includes using
Family Identity Code and userspersonal information.
Specifically, trusted node refers to reliable agency node or user's node typing, agency node
Such as hospital, public security department, traffic control department government organs node, user can also be accessed as node to this by terminal
The personal information of user such as supplements, modifies at the operation.User information includes User Identity code and individual subscriber letter herein
Breath, User Identity code can be telephone number, ID card No., the customized field information of user or other for body
One or more in the information of part mark, can also be that the information after information therein is encrypted (such as is breathed out
Uncommon encryption), herein without limitation.
202, the User Identity code and the userspersonal information are subjected to binding storage, generate personal information number
According to library;
In the present embodiment, after the user information that step 201 receives that trusted node is sent, server node can be incited somebody to action
The User Identity code and the userspersonal information carry out binding storage, personal information database are generated, at this point, taking
Be engaged in device node, the personal information database have it is unique, the data characteristics such as can not distort, ensure that the peace of userspersonal information
Quan Xing, authenticity etc..
In the present embodiment, after step 201 and step 202, according to target user's identity described in step 102
Code determines that target user's personal information specifically includes: determining target in the personal information database generated in step 202
Userspersonal information.
In the embodiment of the present application, based on embodiment described in Fig. 2, in step 202 by the User Identity code and described
Userspersonal information carries out binding storage, after generating personal information database, when userspersonal information exists and updates,
The personal information database can also be updated.Below referring to Fig. 3, based on embodiment described in Fig. 2, the embodiment of the present application
In, a kind of another embodiment of PIM method includes:
301, the more new information that trusted node is sent is obtained;
In the present embodiment, the more new information that trusted node is sent is obtained, the more new packets include User Identity
Code and updated userspersonal information.
Specifically, the trusted node find certain user personal information exist update when, such as hospital side exist should
It, can be into the server node when case history of user updates, traffic control department is updated there are data such as the processing violating the regulations of the user
More new information is sent, specifically the Identity Code in this more new information including the user and updated individual subscriber letter
Breath.
302, the personal information database is updated according to the more new information.
In the present embodiment, server node according to the more new information in the personal information database safeguarded to data into
Row updates, and specifically, is accordingly safeguarded more to personal information database according to the more new information that step 301 acquires
Newly, such as personal information is carried out the operation such as revising.
In the present embodiment, based on embodiment described in Fig. 1 to Fig. 3, specifically use default auditing rule to described in step 103
The personal information of target user is audited, before generating auditing result, can also generating process to intelligent contract it is further
Optimization.Specifically in server node, the initialization of intelligent contract can be carried out according to big data, is also possible to further basis
The respective auditing rule of each audit node is generated, and will specifically be introduced below.
Referring to Fig. 4, in the embodiment of the present application, using default audit in step 103 based on embodiment described in Fig. 1 to Fig. 3
Rule audits the personal information of the target user, before generating auditing result, a kind of PIM method
Another embodiment includes:
401, the corresponding qualification examination rule of the audit node is obtained;
In the present embodiment, itself corresponding qualification examination rule is sent in server node by audit node, such as is tied
Wedding qualification examination intelligence contract, the intelligent contract of application lawyer's practicing requirements audit, driving license qualification examination intelligence contract etc. are right respectively
In the qualification demand of personal information.
402, default auditing rule is generated according to the qualification examination rule.
In the present embodiment, after step 401, according to the qualification examination rule got according to the rule of block chain technology
Generate default auditing rule.In intelligent contract, the conditions such as personal information needed for having pre-seted each qualification examination.
The embodiment of the present application is illustrated from the angle of method above, below from the angle of virtual bench to the application
A kind of personal information management system is introduced in embodiment.Below referring to Fig. 5, a kind of personal information in the embodiment of the present application
One embodiment of management system includes:
First acquisition unit 501, for obtaining the qualification examination request of first node transmission, the qualification examination request packet
Include User Identity code;
Determination unit 502, for determining userspersonal information according to the User Identity code;
Unit 503 is audited, for using default auditing rule to audit the userspersonal information, generates audit knot
Fruit;
Transmission unit 504 requests corresponding audit node for the auditing result to be sent to the qualification examination, with
So that the audit node uses the auditing result to be audited as Auditing Principal.
In the present embodiment, first acquisition unit 501, for obtaining the qualification examination request of first node transmission, the money
Lattice audit request includes User Identity code;Determination unit 502, for determining user according to the User Identity code
Personal information;Unit 503 is audited, for using default auditing rule to audit the userspersonal information, generates audit
As a result;Transmission unit 504 requests corresponding audit node for the auditing result to be sent to the qualification examination, so that
Obtaining the audit node uses the auditing result to be audited as Auditing Principal.Wherein, server node is deposited for distribution
Auditing result is sent to qualification examination and requests corresponding audit node, made by a node in storage system, the server node
For the Auditing Principal reference for auditing node, i.e., using in distributed memory system data can not tamper can be largely
Improve the realization efficiency of personal information audit.
As a preferred embodiment, the system also includes:
Receiving unit 505, for receiving the user information of trusted node transmission, the user information includes user identity
Identification code and userspersonal information;
First generation unit 506 is deposited for the User Identity code and the userspersonal information to be carried out binding
Storage generates personal information database;
The determination unit 502 is specifically used for:
Target user's personal information is determined in the personal information database.
As a preferred embodiment, the system also includes:
Second acquisition unit 507, for obtaining the more new information of trusted node transmission, the more new packets include user
Identity Code and updated userspersonal information;
Updating unit 508, for being updated according to the more new information to the personal information database.
As a preferred embodiment, the system also includes:
Third acquiring unit 509, for obtaining the corresponding qualification examination rule of the audit node;
Second generation unit 510, for generating default auditing rule according to the qualification examination rule.
One of the embodiment of the present application personal information management system is described from the angle of virtual bench above,
The computer installation in the embodiment of the present application is described from the angle of hardware entities device below.
Referring to Fig. 6, an a kind of specific embodiment of computer installation includes: in the embodiment of the present application
The device 600 can generate bigger difference because configuration or performance are different, may include one or more
Central processing unit (central processing units, CPU) 601 (for example, one or more processors) and storage
Device 605 is stored with one or more application program or data in the memory 605.
Wherein, memory 605 can be volatile storage or persistent storage.The program for being stored in memory 605 can wrap
One or more modules are included, each module may include to the series of instructions operation in server.Further, in
Central processor 601 can be set to communicate with memory 605, and a series of fingers in memory 605 are executed on intelligent terminal 600
Enable operation.
The device 600 can also include one or more power supplys 602, one or more wired or wireless networks
Interface 603, one or more input/output interfaces 604, and/or, one or more operating systems, such as
Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
The processor 601 is specifically used for executing following steps:
The qualification examination request that first node is sent is obtained, the qualification examination request includes User Identity code;
Userspersonal information is determined according to the User Identity code;
The userspersonal information is audited using default auditing rule, generates auditing result;
The auditing result is sent to the qualification examination and requests corresponding audit node, so that the audit node
The auditing result is used to be audited as Auditing Principal.
As a preferred embodiment, the method also includes:
The user information that trusted node is sent is received, the user information includes User Identity code and individual subscriber
Information;
The User Identity code and the userspersonal information are subjected to binding storage, generate personal information data
Library;
It is described to determine that target user's personal information includes: according to target user's Identity Code
Target user's personal information is determined in the personal information database.
As a preferred embodiment, bound by the User Identity code and the userspersonal information
Storage, after generating personal information database, the method also includes:
The more new information that trusted node is sent is obtained, the more new packets include User Identity code and updated
Userspersonal information;
The personal information database is updated according to the more new information.
As a preferred embodiment, the personal information of the target user is examined using default auditing rule
Core, before generating auditing result, the method also includes:
Obtain the corresponding qualification examination rule of the audit node;
Default auditing rule is generated according to the qualification examination rule.
It is understood that the size of the serial number of above steps is not meant in the various embodiments of the application
Execution sequence it is successive, the execution of each step sequence should be determined by its function and internal logic, without coping with the embodiment of the present application
Implementation process constitute any restriction.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components
It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit
It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the application
Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, RandomAccess Memory), magnetic or disk etc. are various can store journey
The medium of sequence code.
The above, above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although referring to before
Embodiment is stated the application is described in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of PIM method, which is characterized in that be applied to server node, the server node is distribution
A node in storage system, the distributed memory system further include first node and audit node, which comprises
The qualification examination request that first node is sent is obtained, the qualification examination request includes User Identity code;
Userspersonal information is determined according to the User Identity code;
The userspersonal information is audited using default auditing rule, generates auditing result;
The auditing result is sent to the qualification examination and requests corresponding audit node, so that the audit node uses
The auditing result is audited.
2. the method according to claim 1, wherein the method also includes:
The user information that trusted node is sent is received, the user information includes User Identity code and individual subscriber letter
Breath;
The User Identity code and the userspersonal information are subjected to binding storage, generate personal information database;
It is described to determine that target user's personal information includes: according to target user's Identity Code
Target user's personal information is determined in the personal information database.
3. according to the method described in claim 2, it is characterized in that, by the User Identity code and the individual subscriber
Information carries out binding storage, after generating personal information database, the method also includes:
Obtain the more new information that the trusted node is sent, the more new packets include User Identity code and updated
Userspersonal information;
The personal information database is updated according to the more new information.
4. method according to any one of claims 1 to 3, which is characterized in that preset auditing rule to the mesh using
The personal information of mark user is audited, before generating auditing result, the method also includes:
Obtain the corresponding qualification examination rule of the audit node;
The default auditing rule is generated according to the qualification examination rule.
5. a kind of personal information management system, which is characterized in that be applied to server node, the server node is distribution
A node in storage system, the distributed memory system further include first node and audit node, the personal information
Management system includes:
First acquisition unit, for obtaining the qualification examination request of first node transmission, the qualification examination request includes user
Identity Code;
Determination unit, for determining userspersonal information according to the User Identity code;
Unit is audited, for using default auditing rule to audit the userspersonal information, generates auditing result;
Transmission unit requests corresponding audit node for the auditing result to be sent to the qualification examination, so that institute
Audit node is stated to be audited using the auditing result.
6. system according to claim 5, which is characterized in that the system also includes:
Receiving unit, for receiving the user information of trusted node transmission, the user information includes User Identity code
And userspersonal information;
First generation unit is generated for the User Identity code and the userspersonal information to be carried out binding storage
Personal information database;
The determination unit is specifically used for:
Target user's personal information is determined in the personal information database.
7. system according to claim 6, which is characterized in that the system also includes:
Second acquisition unit, the more new information sent for obtaining the trusted node, the more new packets include user's body
Part identification code and updated userspersonal information;
Updating unit, for being updated according to the more new information to the personal information database.
8. according to the described in any item systems of claim 5 to 7, which is characterized in that the system also includes:
Third acquiring unit, for obtaining the corresponding qualification examination rule of the audit node;
Second generation unit, for generating the default auditing rule according to the qualification examination rule.
9. a kind of computer equipment characterized by comprising
Processor, memory, input-output equipment and bus;
The processor, memory, input-output equipment are connected with the bus respectively;
The processor is for executing such as the described in any item methods of Claims 1-4.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that: the computer program
It realizes when being executed by processor such as the step of any one of claims 1 to 4 the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910389964.2A CN110111080A (en) | 2019-05-10 | 2019-05-10 | A kind of PIM method and relevant device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910389964.2A CN110111080A (en) | 2019-05-10 | 2019-05-10 | A kind of PIM method and relevant device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110111080A true CN110111080A (en) | 2019-08-09 |
Family
ID=67489408
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910389964.2A Pending CN110111080A (en) | 2019-05-10 | 2019-05-10 | A kind of PIM method and relevant device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110111080A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111008818A (en) * | 2019-11-28 | 2020-04-14 | 深圳市智微智能软件开发有限公司 | EOP signing management method and system |
CN111831953A (en) * | 2020-07-20 | 2020-10-27 | 汉海信息技术(上海)有限公司 | Data processing method, device, equipment and storage medium |
CN113344476A (en) * | 2021-08-05 | 2021-09-03 | 深圳市数标国际科技有限公司 | Vocational education evaluation method and system based on intelligent identification and block chain |
CN113609870A (en) * | 2021-07-23 | 2021-11-05 | 深圳市元征信息技术开发有限公司 | Translation method, translation device, server and readable storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170353311A1 (en) * | 2016-06-06 | 2017-12-07 | Thomson Reuters Global Resources | Systems and methods for providing identity scores |
CN107633469A (en) * | 2017-08-18 | 2018-01-26 | 暨南大学 | A kind of scholarship management method and system based on block chain technology |
CN107833103A (en) * | 2017-11-13 | 2018-03-23 | 北京牛链科技有限公司 | The tax-free qualification circulation of Li Island based on block chain and verification method, platform and system |
CN108596749A (en) * | 2018-04-24 | 2018-09-28 | 深圳市元征科技股份有限公司 | Qualification method based on block chain and relevant apparatus |
CN109345095A (en) * | 2018-09-19 | 2019-02-15 | 北京智行者科技有限公司 | A kind of user's checking method |
CN109492559A (en) * | 2018-10-27 | 2019-03-19 | 平安医疗健康管理股份有限公司 | Title examination method, server and storage medium based on image recognition |
CN109636429A (en) * | 2019-02-27 | 2019-04-16 | 深圳市元征科技股份有限公司 | A kind of information authentication method, device and associated component |
-
2019
- 2019-05-10 CN CN201910389964.2A patent/CN110111080A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170353311A1 (en) * | 2016-06-06 | 2017-12-07 | Thomson Reuters Global Resources | Systems and methods for providing identity scores |
CN107633469A (en) * | 2017-08-18 | 2018-01-26 | 暨南大学 | A kind of scholarship management method and system based on block chain technology |
CN107833103A (en) * | 2017-11-13 | 2018-03-23 | 北京牛链科技有限公司 | The tax-free qualification circulation of Li Island based on block chain and verification method, platform and system |
CN108596749A (en) * | 2018-04-24 | 2018-09-28 | 深圳市元征科技股份有限公司 | Qualification method based on block chain and relevant apparatus |
CN109345095A (en) * | 2018-09-19 | 2019-02-15 | 北京智行者科技有限公司 | A kind of user's checking method |
CN109492559A (en) * | 2018-10-27 | 2019-03-19 | 平安医疗健康管理股份有限公司 | Title examination method, server and storage medium based on image recognition |
CN109636429A (en) * | 2019-02-27 | 2019-04-16 | 深圳市元征科技股份有限公司 | A kind of information authentication method, device and associated component |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111008818A (en) * | 2019-11-28 | 2020-04-14 | 深圳市智微智能软件开发有限公司 | EOP signing management method and system |
CN111831953A (en) * | 2020-07-20 | 2020-10-27 | 汉海信息技术(上海)有限公司 | Data processing method, device, equipment and storage medium |
CN111831953B (en) * | 2020-07-20 | 2024-03-15 | 汉海信息技术(上海)有限公司 | Data processing method, device, equipment and storage medium |
CN113609870A (en) * | 2021-07-23 | 2021-11-05 | 深圳市元征信息技术开发有限公司 | Translation method, translation device, server and readable storage medium |
CN113344476A (en) * | 2021-08-05 | 2021-09-03 | 深圳市数标国际科技有限公司 | Vocational education evaluation method and system based on intelligent identification and block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110111080A (en) | A kind of PIM method and relevant device | |
CN110990871B (en) | Machine learning model training method, prediction method and device based on artificial intelligence | |
CN106682984A (en) | Block chain-based transaction business processing method and system | |
CN107770182A (en) | The date storage method and home gateway of home gateway | |
CN108292414A (en) | The automatic recommendation of deployment in data center | |
CN110383752A (en) | Compact recording agreement | |
CN110879827B (en) | Information processing method and equipment based on block chain network | |
CN110347501A (en) | A kind of service testing method, device, storage medium and electronic equipment | |
CN112712182A (en) | Model training method and device based on federal learning and storage medium | |
CN111125420B (en) | Object recommendation method and device based on artificial intelligence and electronic equipment | |
CN108769230A (en) | Transaction data storage method, device, server and storage medium | |
CN108985569A (en) | A kind of vehicle risk appraisal procedure, server | |
CN114422224B (en) | Threat information intelligent analysis method and system for attack tracing | |
CN110264354A (en) | It creates block chain account and verifies the method and device of block chain transaction | |
CN107798538A (en) | One kind transaction accounting method and client | |
CN107567020A (en) | Information safety system in intelligent mobile environment | |
Gong et al. | Surakav: Generating realistic traces for a strong website fingerprinting defense | |
CN109543458A (en) | A kind of prescription data method of calibration, equipment and server based on block chain | |
CN107679149A (en) | A kind of data processing method and server | |
CN112685787A (en) | Big data information security protection method applied to artificial intelligence and cloud server | |
CN113011632A (en) | Enterprise risk assessment method, device, equipment and computer readable storage medium | |
CN109558724A (en) | A kind of software action integrity verification method | |
Saini et al. | LSP: lightweight smart-contract-based transaction prioritization scheme for smart healthcare | |
CN109509516A (en) | A kind of Profile management method based on block chain | |
CN110460447A (en) | Edge calculations data accountability system and auditing method based on Hash binary tree |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190809 |