CN110111080A - A kind of PIM method and relevant device - Google Patents

A kind of PIM method and relevant device Download PDF

Info

Publication number
CN110111080A
CN110111080A CN201910389964.2A CN201910389964A CN110111080A CN 110111080 A CN110111080 A CN 110111080A CN 201910389964 A CN201910389964 A CN 201910389964A CN 110111080 A CN110111080 A CN 110111080A
Authority
CN
China
Prior art keywords
node
information
personal information
user
audit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910389964.2A
Other languages
Chinese (zh)
Inventor
刘新
王玉平
黄庆财
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201910389964.2A priority Critical patent/CN110111080A/en
Publication of CN110111080A publication Critical patent/CN110111080A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the present application discloses a kind of PIM method and its relevant device, for improving the realization efficiency of personal information audit.The embodiment of the present application method includes: that server node obtains the qualification examination request that first node is sent, and the qualification examination request includes User Identity code;Userspersonal information is determined according to the User Identity code;The userspersonal information is audited using default auditing rule, generates auditing result;The auditing result is sent to the qualification examination and requests corresponding audit node, so that the audit node is audited using the auditing result.Wherein, server node is a node in distributed memory system, auditing result is sent to qualification examination and requests corresponding audit node by the server node, as the Auditing Principal reference of audit node, i.e., using in distributed memory system data can not tamper can largely improve the realization efficiency of personal information audit.

Description

A kind of PIM method and relevant device
Technical field
This application involves data management field more particularly to a kind of PIM methods and relevant device.
Background technique
Personal information, spy can be identified with what electronics or other modes recorded individually or in conjunction with other information by referring to Determine the various information of natural person's identity or the specific natural person's activity condition of reflection, including name, identification card number, communication are logical Interrogate contact method, address, account number cipher, property status, whereabouts track, social relationships etc..
In the prior art, the maintenance of personal information generally by authority government organs carry out, when need to When the personal information at family carries out title examination, it is necessary to got by these different mechanisms relevant personal information again into Row title examination.By taking certain user carries out driving license application as an example, traffic control department is needed from the household register information for sending the acquired user (including age, gender, native place etc.), career in medicine school get health and fitness information (including height, eyesight, hearing, the disease of the user History etc.).
However, this information management mode needs multi-party progress data maintenance, the identity information of user and matching are verified It verifies, collect evidence many times as a result, generally requiring centre for one out, need a large amount of man power and material, the data pipe of this mode It is lower to manage mode efficiencies, influences user experience.
Summary of the invention
The embodiment of the present application provides a kind of PIM method and its relevant device, examines for improving personal information The realization efficiency of core.
The embodiment of the present application first aspect provides a kind of PIM method, is applied to server node, described Server node is a node in distributed memory system, and the distributed memory system further includes first node and audit Node, which comprises
The qualification examination request that first node is sent is obtained, the qualification examination request includes User Identity code;
Userspersonal information is determined according to the User Identity code;
The userspersonal information is audited using default auditing rule, generates auditing result;
The auditing result is sent to the qualification examination and requests corresponding audit node, so that the audit node It is audited using the auditing result.
Optionally, the method also includes:
The user information that trusted node is sent is received, the user information includes User Identity code and individual subscriber Information;
The User Identity code and the userspersonal information are subjected to binding storage, generate personal information data Library;
It is described to determine that target user's personal information includes: according to target user's Identity Code
Target user's personal information is determined in the personal information database.
Optionally, the User Identity code and the userspersonal information are being subjected to binding storage, generated personal After information database, the method also includes:
The more new information that the trusted node is sent is obtained, the more new packets include User Identity code and update Userspersonal information afterwards;
The personal information database is updated according to the more new information.
Optionally, the personal information of the target user is audited using default auditing rule, generates audit knot Before fruit, the method also includes:
Obtain the corresponding qualification examination rule of the audit node;
The default auditing rule is generated according to the qualification examination rule.
The embodiment of the present application second aspect provides a kind of personal information management system, is applied to server node, described Server node is a node in distributed memory system, and the distributed memory system further includes first node and audit Node, the personal information management system include:
First acquisition unit, for obtaining the qualification examination request of first node transmission, the qualification examination request includes User Identity code;
Determination unit, for determining userspersonal information according to the User Identity code;
Unit is audited, for using default auditing rule to audit the userspersonal information, generates auditing result;
Transmission unit requests corresponding audit node for the auditing result to be sent to the qualification examination, so that The audit node is obtained to be audited using the auditing result.
Optionally, the system also includes:
Receiving unit, for receiving the user information of trusted node transmission, the user information includes user identity mark Know code and userspersonal information;
First generation unit, for the User Identity code and the userspersonal information to be carried out binding storage, Generate personal information database;
The determination unit is specifically used for:
Target user's personal information is determined in the personal information database.
Optionally, the system also includes:
Second acquisition unit, the more new information sent for obtaining the trusted node, the more new packets include use Family Identity Code and updated userspersonal information;
Updating unit, for being updated according to the more new information to the personal information database.
Optionally, the system also includes:
Third acquiring unit, for obtaining the corresponding qualification examination rule of the audit node;
Second generation unit, for generating the default auditing rule according to the qualification examination rule.
The embodiment of the present application third aspect provides a kind of computer equipment, comprising:
Processor, memory, input-output equipment and bus;
The processor, memory, input-output equipment are connected with the bus respectively;
The processor is used to execute the method as described in any one of preceding method embodiment.
The embodiment of the present application fourth aspect provides a kind of computer readable storage medium, is stored thereon with computer journey Sequence, it is characterised in that: the side as described in any one of preceding method embodiment is realized when the computer program is executed by processor The step of method.
As can be seen from the above technical solutions, the embodiment of the present application has the advantage that in the present embodiment, obtains first segment The qualification examination request that point is sent, the qualification examination request includes User Identity code;According to the User Identity Code determines userspersonal information;The userspersonal information is audited using default auditing rule, generates auditing result; The auditing result is sent to the qualification examination and requests corresponding audit node, so that described in the audit node use Auditing result is audited.Wherein, server node is a node in distributed memory system, which will examine Core result is sent to qualification examination and requests corresponding audit node, as the Auditing Principal reference of audit node, i.e., using distribution In formula storage system data can not tamper can largely improve personal information audit realization efficiency.
Detailed description of the invention
Fig. 1 is an a kind of schematic diagram of PIM method embodiment in the embodiment of the present application;
Fig. 2 is a kind of another schematic diagram of PIM method embodiment in the embodiment of the present application;
Fig. 3 is a kind of another schematic diagram of PIM method embodiment in the embodiment of the present application;
Fig. 4 is a kind of another schematic diagram of PIM method embodiment in the embodiment of the present application;
Fig. 5 is a kind of another schematic diagram of personal information management system embodiment in the embodiment of the present application;
Fig. 6 is a kind of another schematic diagram of computer installation embodiment in the embodiment of the present application.
Specific embodiment
The embodiment of the present application provides a kind of PIM method and its relevant device, examines for improving personal information The realization efficiency of core.
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection It encloses.
The description and claims of this application and term " first ", " second ", " third ", " in above-mentioned attached drawing Four " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so that the embodiments described herein can be in addition to illustrating herein or describing Sequence other than appearance is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that covering is non-exclusive Include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to clearly arrange Those of out step or unit, but may include be not clearly listed or it is solid for these process, methods, product or equipment The other step or units having.
Personal information, spy can be identified with what electronics or other modes recorded individually or in conjunction with other information by referring to Determine the various information of natural person's identity or the specific natural person's activity condition of reflection, including name, identification card number, communication are logical Interrogate contact method, address, account number cipher, property status, whereabouts track, social relationships etc..In the prior art, personal information Maintenance is carried out generally by the government organs of authority, when needing the personal information to user to carry out title examination, is just needed Title examination is carried out again to get relevant personal information by these different mechanisms.Driving license application is carried out with certain user For, traffic control department is needed from the household register information (including age, gender, native place etc.) for sending the acquired user, career in medicine school Get the health and fitness information (including height, eyesight, hearing, history of disease etc.) of the user.However, this information management mode needs It is multi-party to carry out data maintenance, to verify the identity information of user and match one as a result, generally require intermediate verifying many times, Evidence obtaining, needs a large amount of man power and material, the Db Management Model efficiency of this mode is lower, influences user experience.For this purpose, this Application embodiment provides a kind of PIM method and its relevant device, for improving the realization effect of personal information audit Rate.
In order to make it easy to understand, the detailed process in the embodiment of the present application is described below, referring to Fig. 1, the application A kind of one embodiment of PIM method includes: in embodiment
101, the qualification examination request that first node is sent is obtained;
In the present embodiment, server node obtains the qualification examination request that first node is sent, the qualification examination request Including User Identity code.
Wherein, server node is a node in distributed memory system, further includes in the distributed memory system First node and audit node.Illustratively, in the specific implementation process of this embodiment scheme, block catenary system can be used A kind of implementation as the distributed memory system.
Specifically, server node can receive the qualification examination request of first node transmission, and herein, first node can be with It is user terminal directly as application node, first node is also possible to audit node as first node, is needing to use certain Qualification examination request is sent to server node when family carries out qualification examination request, first node is also possible to the operation of block chain One node platform, the transfer for communicating as user terminal with server node, first node can also be other forms First node, herein without limitation.In addition, User Identity code can be telephone number, ID card No., user make by oneself Justice field information or other for identity information in one or more, can also be to information therein into Information (such as Hash encryption) after row encryption, herein without limitation.
102, userspersonal information is determined according to the User Identity code;
In the present embodiment, server node determines the personal information of user according to User Identity code.
Specifically, server node, which can be used User Identity code and search in the database, determines and user's body The corresponding userspersonal information of part identification code, database herein can be can not usurping in server node self maintained The database changed, the database being also possible in third party's data maintenance end, then interacts with server node and determines Userspersonal information.
103, the userspersonal information is audited using default auditing rule, generates auditing result;
In the present embodiment, server node audits the userspersonal information using default auditing rule, generates Auditing result.
Specifically, default auditing rule can be preset in server node, when the distributed system is block catenary system When, which can be the intelligent contract in block catenary system.In addition, (for example getting married pre- in default auditing rule If auditing rule, application lawyer's operation preset auditing rule, driving license presets auditing rule etc.) in, it has pre-seted each qualification and has examined Information needed for core and condition etc..Such as: having pre-seted driving license and preset auditing rule are as follows: must be 18 years old or more, have submitted medical certificate It is bright, the conditions such as no colour blindness.Auditing rule is preset using this to audit userspersonal information, generates auditing result, it is general next It says, which can directly indicate whether the userspersonal information passes through audit, be also possible to the tool for examining content Hold description in vivo, herein without limitation.
104, the auditing result is sent to the qualification examination and requests corresponding audit node.
In the present embodiment, the auditing result is sent to the qualification examination by server node requests corresponding audit to save Point, so that the audit node uses the auditing result to be audited as Auditing Principal.At this point, the auditing result conduct The Auditing Principal reference for auditing node can be largely without multiple authentication in the prior art in carrying out, evidence obtaining process Improve the realization efficiency of personal information audit.
In the present embodiment, the qualification examination request that first node is sent is obtained, the qualification examination request includes user's body Part identification code;Userspersonal information is determined according to the User Identity code;Using default auditing rule to the user Personal information is audited, and auditing result is generated;The auditing result is sent to the qualification examination and requests corresponding audit Node.Wherein, server node is a node in distributed memory system, which is sent to auditing result Qualification examination requests corresponding audit node, as the Auditing Principal reference of audit node, i.e., using in distributed memory system Data can not tamper can largely improve personal information audit realization efficiency.
In the embodiment of the present application, based on embodiment described in Fig. 1, specifically, server node can be with self maintained user Personal information database, for execute step 102 according to target user's Identity Code determine target user individual The process of information.Below referring to Fig. 2, based on embodiment described in Fig. 1, in the embodiment of the present application, a kind of personal information management side Another embodiment of method includes:
201, the user information that trusted node is sent is received;
In the present embodiment, server node receives the user information that trusted node is sent, and the user information includes using Family Identity Code and userspersonal information.
Specifically, trusted node refers to reliable agency node or user's node typing, agency node Such as hospital, public security department, traffic control department government organs node, user can also be accessed as node to this by terminal The personal information of user such as supplements, modifies at the operation.User information includes User Identity code and individual subscriber letter herein Breath, User Identity code can be telephone number, ID card No., the customized field information of user or other for body One or more in the information of part mark, can also be that the information after information therein is encrypted (such as is breathed out Uncommon encryption), herein without limitation.
202, the User Identity code and the userspersonal information are subjected to binding storage, generate personal information number According to library;
In the present embodiment, after the user information that step 201 receives that trusted node is sent, server node can be incited somebody to action The User Identity code and the userspersonal information carry out binding storage, personal information database are generated, at this point, taking Be engaged in device node, the personal information database have it is unique, the data characteristics such as can not distort, ensure that the peace of userspersonal information Quan Xing, authenticity etc..
In the present embodiment, after step 201 and step 202, according to target user's identity described in step 102 Code determines that target user's personal information specifically includes: determining target in the personal information database generated in step 202 Userspersonal information.
In the embodiment of the present application, based on embodiment described in Fig. 2, in step 202 by the User Identity code and described Userspersonal information carries out binding storage, after generating personal information database, when userspersonal information exists and updates, The personal information database can also be updated.Below referring to Fig. 3, based on embodiment described in Fig. 2, the embodiment of the present application In, a kind of another embodiment of PIM method includes:
301, the more new information that trusted node is sent is obtained;
In the present embodiment, the more new information that trusted node is sent is obtained, the more new packets include User Identity Code and updated userspersonal information.
Specifically, the trusted node find certain user personal information exist update when, such as hospital side exist should It, can be into the server node when case history of user updates, traffic control department is updated there are data such as the processing violating the regulations of the user More new information is sent, specifically the Identity Code in this more new information including the user and updated individual subscriber letter Breath.
302, the personal information database is updated according to the more new information.
In the present embodiment, server node according to the more new information in the personal information database safeguarded to data into Row updates, and specifically, is accordingly safeguarded more to personal information database according to the more new information that step 301 acquires Newly, such as personal information is carried out the operation such as revising.
In the present embodiment, based on embodiment described in Fig. 1 to Fig. 3, specifically use default auditing rule to described in step 103 The personal information of target user is audited, before generating auditing result, can also generating process to intelligent contract it is further Optimization.Specifically in server node, the initialization of intelligent contract can be carried out according to big data, is also possible to further basis The respective auditing rule of each audit node is generated, and will specifically be introduced below.
Referring to Fig. 4, in the embodiment of the present application, using default audit in step 103 based on embodiment described in Fig. 1 to Fig. 3 Rule audits the personal information of the target user, before generating auditing result, a kind of PIM method Another embodiment includes:
401, the corresponding qualification examination rule of the audit node is obtained;
In the present embodiment, itself corresponding qualification examination rule is sent in server node by audit node, such as is tied Wedding qualification examination intelligence contract, the intelligent contract of application lawyer's practicing requirements audit, driving license qualification examination intelligence contract etc. are right respectively In the qualification demand of personal information.
402, default auditing rule is generated according to the qualification examination rule.
In the present embodiment, after step 401, according to the qualification examination rule got according to the rule of block chain technology Generate default auditing rule.In intelligent contract, the conditions such as personal information needed for having pre-seted each qualification examination.
The embodiment of the present application is illustrated from the angle of method above, below from the angle of virtual bench to the application A kind of personal information management system is introduced in embodiment.Below referring to Fig. 5, a kind of personal information in the embodiment of the present application One embodiment of management system includes:
First acquisition unit 501, for obtaining the qualification examination request of first node transmission, the qualification examination request packet Include User Identity code;
Determination unit 502, for determining userspersonal information according to the User Identity code;
Unit 503 is audited, for using default auditing rule to audit the userspersonal information, generates audit knot Fruit;
Transmission unit 504 requests corresponding audit node for the auditing result to be sent to the qualification examination, with So that the audit node uses the auditing result to be audited as Auditing Principal.
In the present embodiment, first acquisition unit 501, for obtaining the qualification examination request of first node transmission, the money Lattice audit request includes User Identity code;Determination unit 502, for determining user according to the User Identity code Personal information;Unit 503 is audited, for using default auditing rule to audit the userspersonal information, generates audit As a result;Transmission unit 504 requests corresponding audit node for the auditing result to be sent to the qualification examination, so that Obtaining the audit node uses the auditing result to be audited as Auditing Principal.Wherein, server node is deposited for distribution Auditing result is sent to qualification examination and requests corresponding audit node, made by a node in storage system, the server node For the Auditing Principal reference for auditing node, i.e., using in distributed memory system data can not tamper can be largely Improve the realization efficiency of personal information audit.
As a preferred embodiment, the system also includes:
Receiving unit 505, for receiving the user information of trusted node transmission, the user information includes user identity Identification code and userspersonal information;
First generation unit 506 is deposited for the User Identity code and the userspersonal information to be carried out binding Storage generates personal information database;
The determination unit 502 is specifically used for:
Target user's personal information is determined in the personal information database.
As a preferred embodiment, the system also includes:
Second acquisition unit 507, for obtaining the more new information of trusted node transmission, the more new packets include user Identity Code and updated userspersonal information;
Updating unit 508, for being updated according to the more new information to the personal information database.
As a preferred embodiment, the system also includes:
Third acquiring unit 509, for obtaining the corresponding qualification examination rule of the audit node;
Second generation unit 510, for generating default auditing rule according to the qualification examination rule.
One of the embodiment of the present application personal information management system is described from the angle of virtual bench above, The computer installation in the embodiment of the present application is described from the angle of hardware entities device below.
Referring to Fig. 6, an a kind of specific embodiment of computer installation includes: in the embodiment of the present application
The device 600 can generate bigger difference because configuration or performance are different, may include one or more Central processing unit (central processing units, CPU) 601 (for example, one or more processors) and storage Device 605 is stored with one or more application program or data in the memory 605.
Wherein, memory 605 can be volatile storage or persistent storage.The program for being stored in memory 605 can wrap One or more modules are included, each module may include to the series of instructions operation in server.Further, in Central processor 601 can be set to communicate with memory 605, and a series of fingers in memory 605 are executed on intelligent terminal 600 Enable operation.
The device 600 can also include one or more power supplys 602, one or more wired or wireless networks Interface 603, one or more input/output interfaces 604, and/or, one or more operating systems, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
The processor 601 is specifically used for executing following steps:
The qualification examination request that first node is sent is obtained, the qualification examination request includes User Identity code;
Userspersonal information is determined according to the User Identity code;
The userspersonal information is audited using default auditing rule, generates auditing result;
The auditing result is sent to the qualification examination and requests corresponding audit node, so that the audit node The auditing result is used to be audited as Auditing Principal.
As a preferred embodiment, the method also includes:
The user information that trusted node is sent is received, the user information includes User Identity code and individual subscriber Information;
The User Identity code and the userspersonal information are subjected to binding storage, generate personal information data Library;
It is described to determine that target user's personal information includes: according to target user's Identity Code
Target user's personal information is determined in the personal information database.
As a preferred embodiment, bound by the User Identity code and the userspersonal information Storage, after generating personal information database, the method also includes:
The more new information that trusted node is sent is obtained, the more new packets include User Identity code and updated Userspersonal information;
The personal information database is updated according to the more new information.
As a preferred embodiment, the personal information of the target user is examined using default auditing rule Core, before generating auditing result, the method also includes:
Obtain the corresponding qualification examination rule of the audit node;
Default auditing rule is generated according to the qualification examination rule.
It is understood that the size of the serial number of above steps is not meant in the various embodiments of the application Execution sequence it is successive, the execution of each step sequence should be determined by its function and internal logic, without coping with the embodiment of the present application Implementation process constitute any restriction.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the application Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, RandomAccess Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
The above, above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although referring to before Embodiment is stated the application is described in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of PIM method, which is characterized in that be applied to server node, the server node is distribution A node in storage system, the distributed memory system further include first node and audit node, which comprises
The qualification examination request that first node is sent is obtained, the qualification examination request includes User Identity code;
Userspersonal information is determined according to the User Identity code;
The userspersonal information is audited using default auditing rule, generates auditing result;
The auditing result is sent to the qualification examination and requests corresponding audit node, so that the audit node uses The auditing result is audited.
2. the method according to claim 1, wherein the method also includes:
The user information that trusted node is sent is received, the user information includes User Identity code and individual subscriber letter Breath;
The User Identity code and the userspersonal information are subjected to binding storage, generate personal information database;
It is described to determine that target user's personal information includes: according to target user's Identity Code
Target user's personal information is determined in the personal information database.
3. according to the method described in claim 2, it is characterized in that, by the User Identity code and the individual subscriber Information carries out binding storage, after generating personal information database, the method also includes:
Obtain the more new information that the trusted node is sent, the more new packets include User Identity code and updated Userspersonal information;
The personal information database is updated according to the more new information.
4. method according to any one of claims 1 to 3, which is characterized in that preset auditing rule to the mesh using The personal information of mark user is audited, before generating auditing result, the method also includes:
Obtain the corresponding qualification examination rule of the audit node;
The default auditing rule is generated according to the qualification examination rule.
5. a kind of personal information management system, which is characterized in that be applied to server node, the server node is distribution A node in storage system, the distributed memory system further include first node and audit node, the personal information Management system includes:
First acquisition unit, for obtaining the qualification examination request of first node transmission, the qualification examination request includes user Identity Code;
Determination unit, for determining userspersonal information according to the User Identity code;
Unit is audited, for using default auditing rule to audit the userspersonal information, generates auditing result;
Transmission unit requests corresponding audit node for the auditing result to be sent to the qualification examination, so that institute Audit node is stated to be audited using the auditing result.
6. system according to claim 5, which is characterized in that the system also includes:
Receiving unit, for receiving the user information of trusted node transmission, the user information includes User Identity code And userspersonal information;
First generation unit is generated for the User Identity code and the userspersonal information to be carried out binding storage Personal information database;
The determination unit is specifically used for:
Target user's personal information is determined in the personal information database.
7. system according to claim 6, which is characterized in that the system also includes:
Second acquisition unit, the more new information sent for obtaining the trusted node, the more new packets include user's body Part identification code and updated userspersonal information;
Updating unit, for being updated according to the more new information to the personal information database.
8. according to the described in any item systems of claim 5 to 7, which is characterized in that the system also includes:
Third acquiring unit, for obtaining the corresponding qualification examination rule of the audit node;
Second generation unit, for generating the default auditing rule according to the qualification examination rule.
9. a kind of computer equipment characterized by comprising
Processor, memory, input-output equipment and bus;
The processor, memory, input-output equipment are connected with the bus respectively;
The processor is for executing such as the described in any item methods of Claims 1-4.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that: the computer program It realizes when being executed by processor such as the step of any one of claims 1 to 4 the method.
CN201910389964.2A 2019-05-10 2019-05-10 A kind of PIM method and relevant device Pending CN110111080A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910389964.2A CN110111080A (en) 2019-05-10 2019-05-10 A kind of PIM method and relevant device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910389964.2A CN110111080A (en) 2019-05-10 2019-05-10 A kind of PIM method and relevant device

Publications (1)

Publication Number Publication Date
CN110111080A true CN110111080A (en) 2019-08-09

Family

ID=67489408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910389964.2A Pending CN110111080A (en) 2019-05-10 2019-05-10 A kind of PIM method and relevant device

Country Status (1)

Country Link
CN (1) CN110111080A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111008818A (en) * 2019-11-28 2020-04-14 深圳市智微智能软件开发有限公司 EOP signing management method and system
CN111831953A (en) * 2020-07-20 2020-10-27 汉海信息技术(上海)有限公司 Data processing method, device, equipment and storage medium
CN113344476A (en) * 2021-08-05 2021-09-03 深圳市数标国际科技有限公司 Vocational education evaluation method and system based on intelligent identification and block chain
CN113609870A (en) * 2021-07-23 2021-11-05 深圳市元征信息技术开发有限公司 Translation method, translation device, server and readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170353311A1 (en) * 2016-06-06 2017-12-07 Thomson Reuters Global Resources Systems and methods for providing identity scores
CN107633469A (en) * 2017-08-18 2018-01-26 暨南大学 A kind of scholarship management method and system based on block chain technology
CN107833103A (en) * 2017-11-13 2018-03-23 北京牛链科技有限公司 The tax-free qualification circulation of Li Island based on block chain and verification method, platform and system
CN108596749A (en) * 2018-04-24 2018-09-28 深圳市元征科技股份有限公司 Qualification method based on block chain and relevant apparatus
CN109345095A (en) * 2018-09-19 2019-02-15 北京智行者科技有限公司 A kind of user's checking method
CN109492559A (en) * 2018-10-27 2019-03-19 平安医疗健康管理股份有限公司 Title examination method, server and storage medium based on image recognition
CN109636429A (en) * 2019-02-27 2019-04-16 深圳市元征科技股份有限公司 A kind of information authentication method, device and associated component

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170353311A1 (en) * 2016-06-06 2017-12-07 Thomson Reuters Global Resources Systems and methods for providing identity scores
CN107633469A (en) * 2017-08-18 2018-01-26 暨南大学 A kind of scholarship management method and system based on block chain technology
CN107833103A (en) * 2017-11-13 2018-03-23 北京牛链科技有限公司 The tax-free qualification circulation of Li Island based on block chain and verification method, platform and system
CN108596749A (en) * 2018-04-24 2018-09-28 深圳市元征科技股份有限公司 Qualification method based on block chain and relevant apparatus
CN109345095A (en) * 2018-09-19 2019-02-15 北京智行者科技有限公司 A kind of user's checking method
CN109492559A (en) * 2018-10-27 2019-03-19 平安医疗健康管理股份有限公司 Title examination method, server and storage medium based on image recognition
CN109636429A (en) * 2019-02-27 2019-04-16 深圳市元征科技股份有限公司 A kind of information authentication method, device and associated component

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111008818A (en) * 2019-11-28 2020-04-14 深圳市智微智能软件开发有限公司 EOP signing management method and system
CN111831953A (en) * 2020-07-20 2020-10-27 汉海信息技术(上海)有限公司 Data processing method, device, equipment and storage medium
CN111831953B (en) * 2020-07-20 2024-03-15 汉海信息技术(上海)有限公司 Data processing method, device, equipment and storage medium
CN113609870A (en) * 2021-07-23 2021-11-05 深圳市元征信息技术开发有限公司 Translation method, translation device, server and readable storage medium
CN113344476A (en) * 2021-08-05 2021-09-03 深圳市数标国际科技有限公司 Vocational education evaluation method and system based on intelligent identification and block chain

Similar Documents

Publication Publication Date Title
CN110111080A (en) A kind of PIM method and relevant device
CN110990871B (en) Machine learning model training method, prediction method and device based on artificial intelligence
CN106682984A (en) Block chain-based transaction business processing method and system
CN107770182A (en) The date storage method and home gateway of home gateway
CN108292414A (en) The automatic recommendation of deployment in data center
CN110383752A (en) Compact recording agreement
CN110879827B (en) Information processing method and equipment based on block chain network
CN110347501A (en) A kind of service testing method, device, storage medium and electronic equipment
CN112712182A (en) Model training method and device based on federal learning and storage medium
CN111125420B (en) Object recommendation method and device based on artificial intelligence and electronic equipment
CN108769230A (en) Transaction data storage method, device, server and storage medium
CN108985569A (en) A kind of vehicle risk appraisal procedure, server
CN114422224B (en) Threat information intelligent analysis method and system for attack tracing
CN110264354A (en) It creates block chain account and verifies the method and device of block chain transaction
CN107798538A (en) One kind transaction accounting method and client
CN107567020A (en) Information safety system in intelligent mobile environment
Gong et al. Surakav: Generating realistic traces for a strong website fingerprinting defense
CN109543458A (en) A kind of prescription data method of calibration, equipment and server based on block chain
CN107679149A (en) A kind of data processing method and server
CN112685787A (en) Big data information security protection method applied to artificial intelligence and cloud server
CN113011632A (en) Enterprise risk assessment method, device, equipment and computer readable storage medium
CN109558724A (en) A kind of software action integrity verification method
Saini et al. LSP: lightweight smart-contract-based transaction prioritization scheme for smart healthcare
CN109509516A (en) A kind of Profile management method based on block chain
CN110460447A (en) Edge calculations data accountability system and auditing method based on Hash binary tree

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190809