CN111444992A - User information checking method and system based on information code - Google Patents

User information checking method and system based on information code Download PDF

Info

Publication number
CN111444992A
CN111444992A CN202010230013.3A CN202010230013A CN111444992A CN 111444992 A CN111444992 A CN 111444992A CN 202010230013 A CN202010230013 A CN 202010230013A CN 111444992 A CN111444992 A CN 111444992A
Authority
CN
China
Prior art keywords
user
information
client
interface
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010230013.3A
Other languages
Chinese (zh)
Other versions
CN111444992B (en
Inventor
孙傲冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Cloud Computing Beijing Co Ltd
Original Assignee
Tencent Cloud Computing Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Cloud Computing Beijing Co Ltd filed Critical Tencent Cloud Computing Beijing Co Ltd
Priority to CN202010230013.3A priority Critical patent/CN111444992B/en
Publication of CN111444992A publication Critical patent/CN111444992A/en
Application granted granted Critical
Publication of CN111444992B publication Critical patent/CN111444992B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

The application provides a user information checking method and system based on information codes, and belongs to the technical field of internet and cloud. The method comprises the following steps: the first client displays a user interface of a first functional object of a target application program; the first client responds to a trigger signal of an information code display control in a user interface for a first function object and displays an information code of a first user; the second client scans the information code of the first user to acquire the user information of the first user; and the second client sends a bayonet control instruction in response to the fact that the user information of the first user meets the first condition. The method and the device have the advantages that the user information is automatically checked and reported, the contact risk between a manager and the user is reduced, the checking efficiency is improved, the information code in the form of the electronic graphic code is not easy to lose, and the tracing and checking are convenient.

Description

User information checking method and system based on information code
Technical Field
The embodiment of the application relates to the technical field of internet and cloud, in particular to a user information checking method and system based on an information code.
Background
When a user goes in and out of a cell, rides a vehicle or enters some public places, user information needs to be checked, and the user information is released under the condition that the user information meets the conditions.
Taking a scenario of checking the health condition of a user as an example, a common method is to require the user to go to a community to claim a health certificate, after the user fills personal information in the community and is subjected to health check, community staff will make a paper health certificate for the user, and sign and seal the health certificate to show that the health certificate is effective. When the user passes the check point, the health certificate is shown to the staff, and the health certificate is released after the staff passes the check.
The paper proves that the contact risk exists during the checking, and the checking efficiency is low; meanwhile, the problem that the user related information cannot be traced and checked due to easy loss of the certificate exists.
Disclosure of Invention
The embodiment of the application provides a user information checking method and system based on information codes, which can reduce the contact risk when information checking is carried out on users, improve the checking efficiency, and avoid the problem that the user information cannot be traced and checked because paper certification is easy to lose. The technical scheme is as follows:
in one aspect, an embodiment of the present application provides a method for checking user information based on an information code, where the method includes:
a first client displays a user interface of a first functional object of a target application program, wherein the first functional object is used for realizing information reporting; in response to receiving a trigger signal of an information code display control in a user interface for the first function object, displaying an information code of a first user, wherein the information code of the first user is a graphic code generated based on user information of the first user;
the second client scans the information code of the first user to acquire the user information of the first user; responding to the user information of the first user meeting a first condition, and sending a bayonet control instruction, wherein the bayonet control instruction is used for controlling a bayonet to be opened to permit the first user to pass through;
wherein the first condition comprises that the user information of the first user meets a health judgment index.
In another aspect, an embodiment of the present application provides an information code-based user information checking system, where the information code-based user information checking system includes a first client and a second client;
the first client is used for displaying a user interface of a first functional object of a target application program, wherein the first functional object is used for realizing information reporting; in response to receiving a trigger signal of an information code display control in a user interface for the first function object, displaying an information code of a first user, wherein the information code of the first user is a graphic code generated based on user information of the first user;
the second client is used for scanning the information code of the first user and acquiring the user information of the first user; responding to the user information of the first user meeting a first condition, and sending a bayonet control instruction, wherein the bayonet control instruction is used for controlling a bayonet to be opened to permit the first user to pass through;
wherein the first condition comprises that the user information of the first user meets a health judgment index.
The technical scheme provided by the embodiment of the application can have the following beneficial effects:
by displaying the information codes on the client of the user, the automatic code scanning equipment of the check point can scan the information codes of the user by using the client, so that the information of the user can be checked and reported, the user information can be automatically checked and reported, the contact risk between a manager and the user is reduced, and the checking efficiency is improved. In addition, compared with paper certification, the information code in the form of the electronic graphic code is not easy to lose, and a user can check the information code by logging in the user account through the client, so that the user can conveniently trace and check the information code.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic illustration of an implementation environment provided by one embodiment of the present application;
FIG. 2 is an overall flow chart illustrating the technical solution of the present application;
fig. 3 is a flowchart of a method for checking user information based on an information code according to an embodiment of the present application;
FIG. 4 is a schematic view of an interface involved in the embodiment of FIG. 3;
fig. 5 is a flowchart illustrating manual checking and reporting of user information according to an embodiment of the present application;
FIG. 6 is a schematic view of an interface involved in the embodiment of FIG. 5;
FIG. 7 is a flow diagram for viewing and analyzing background data provided by one embodiment of the present application;
FIG. 8 is a flow chart of adding information codes of other users according to an embodiment of the present application;
FIG. 9 is a schematic view of an interface according to the embodiment of FIG. 8;
fig. 10 is a schematic structural diagram of a terminal provided in an embodiment of the present application;
fig. 11 is a schematic structural diagram of a server according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Referring to fig. 1, a schematic diagram of an implementation environment provided by an embodiment of the present application is shown. The implementation environment may be a cloud service system. As shown in FIG. 1, the implementation environment may include: user terminal 11, configuration management device 12, ping terminal 13, server 14 and database 15.
The user terminal 11 may be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, and the like. The user terminal 11 may have installed therein a client running a target application, which may be, but is not limited to, a social application, an instant messaging application, a payment application, a life service application, and the like. In the embodiment of the present application, the user of the user terminal 11 may be a general user, or may be an administrator having a checking authority for user information of the general user. The first client and the third client in the embodiment of the method of the application may both run on the user terminal 11, where the first client runs on the user terminal 11 used by the ordinary user, and the third client runs on the user terminal 11 used by the administrator having the authority to check the user information of the ordinary user.
The configuration management device 12 may be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, etc. The configuration management device 12 is a device used by an administrator having a background configuration management authority, and the administrator can log in the management and control platform on the configuration management device 12, view some background data (such as personal information of a user, travel records, and the like) provided by the management and control platform, and perform some related processing.
The verification terminal 13 is a terminal device that can automatically verify the information code of the user and determine whether to let the user pass, for example, the verification terminal 13 may be an automatic code scanning device described in the embodiments of the present application method, and may also be an intelligent gate, an intelligent lifting rod, or the like. The checking terminal 13 may install and operate the target application program, or may separately install and operate an application program capable of implementing the checking function, which is not limited in this embodiment of the present application. The second client may run on the ping terminal 13, and may be a client of the above-mentioned target application program, or may be a client list of an application program capable of implementing the ping function. In this embodiment of the present application, each checkpoint may be provided with at least one checkpoint terminal 13, where the checkpoint terminal 13 may scan an information code of a user, acquire user information of the user, and control the gate to open to enable the user to pass through when it is determined that the user information of the user meets a certain condition.
The server 14 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a web service, cloud communication, a middleware service, a domain name service, a security service, a CDN (Content Delivery Network), a big data and artificial intelligence platform. A control platform is deployed in the server 14, and the control platform is a background software platform for implementing user information control. Optionally, the management and control platform is a health management and control platform, and is used for managing and controlling the user health information. It should be understood that, in the embodiment of the present application, the steps performed by the server may be performed by the management and control platform instead.
The database 15 can be regarded as an electronic file cabinet, i.e. a place for storing electronic files, and a user can add, query, update, delete, etc. to the data in the files. A "database" is a collection of data that is stored together in a manner that can be shared by multiple users, has as little redundancy as possible, and is independent of the application. The server 14 may store the generated data in the database 15.
The connection between the user terminal 11 and the server 14, the connection between the configuration management device 12 and the server 14, and the connection between the verification terminal 13 and the server 14 may be directly or indirectly through wired or wireless communication, and the present application is not limited thereto.
As shown in fig. 1, under the cloud service system architecture, the user terminal 11, the configuration management device 12, and the verification terminal 13 may access the enterprise public cloud system through the internet. The server 14 and the database 15 may be deployed in a VPC (Virtual Private Cloud) subnet under an enterprise public Cloud system.
Between the user terminal 11 and the Server 14, between the configuration management device 12 and the Server 14, and between the ping terminal 13 and the Server 14, an enterprise GS L B (Global Server L load Balancing) Server 16, a firewall 17, a configuration management device E L B (Elastic L load Balancing) 18, a user terminal E L B19, and a ping terminal E L B10 may also be included.
The enterprise GS L B server 16 is used for performing global load balancing control on equipment accessing the enterprise public cloud, the firewall 17 is used for isolating the internal network and the external network of the enterprise public cloud and providing guarantee for information security of the internal network of the enterprise public cloud, the configuration management equipment E L B18 is used for performing load balancing processing on access requests from the configuration management equipment 12, the user terminal E L B19 is used for performing load balancing processing on access requests from the user terminal 11, and the inspection terminal E L B10 is used for performing load balancing processing on access requests from the inspection terminal 13.
The Cloud service system described above may be constructed based on Cloud technology (Cloud technology). The cloud technology is a hosting technology for unifying series resources such as hardware, software, network and the like in a wide area network or a local area network to realize the calculation, storage, processing and sharing of data. The cloud technology is based on the general names of network technology, information technology, integration technology, management platform technology, application technology and the like applied in the cloud computing business model, can form a resource pool, is used as required, and is flexible and convenient. Cloud computing technology will become an important support. Background services of the technical network system require a large amount of computing and storage resources, such as video websites, picture-like websites and more web portals. With the high development and application of the internet industry, each article may have its own identification mark and needs to be transmitted to a background system for logic processing, data in different levels are processed separately, and various industrial data need strong system background support and can only be realized through cloud computing.
Cloud computing (cloud computing) is a computing model that distributes computing tasks over a pool of resources formed by a large number of computers, enabling various application systems to obtain computing power, storage space, and information services as needed. The network that provides the resources is referred to as the "cloud". Resources in the "cloud" appear to the user as being infinitely expandable and available at any time, available on demand, expandable at any time, and paid for on-demand.
As a basic capability provider of cloud computing, a cloud computing resource pool (called as an IaaS (Infrastructure as a Service) platform for short) is established, and multiple types of virtual resources are deployed in the resource pool and are selectively used by external clients. The cloud computing resource pool mainly comprises: computing devices (which are virtualized machines, including operating systems), storage devices, and network devices. According to the logic function division, a PaaS (Platform as a Service) layer can be deployed on the IaaS layer, a SaaS (Software as a Service) layer is deployed on the PaaS layer, and the SaaS can be directly deployed on the IaaS layer. PaaS is a platform on which software runs, such as a database, a web (web page) container, and the like. SaaS is a variety of business software, such as web portal, sms, and mass texting. Generally speaking, SaaS and PaaS are upper layers relative to IaaS.
Public Cloud (Public Cloud) generally refers to a Cloud that can be used and provided by a third-party provider for a user, the Public Cloud can be generally used through the Internet (Internet) and can be free or low-cost, and the core attribute of the Public Cloud is a shared resource service. There are many instances of such a cloud that can provide services throughout the open public network today. The VPC is a Private Cloud (Private Cloud) existing in a public Cloud, that is, an internet Cloud.
The embodiment of the application provides a technical scheme for checking user information based on an information code, which is used for realizing the report and control of the user information. As shown in fig. 2, it shows the overall flow chart of the present application.
A general user can log in a client of a target application program by using the user terminal 11, and use an information reporting function provided by the client, through the information reporting function, the user can report user information of the user (including health information and travel information, for example) and also can report user information of other people (namely, report for other people). User information reported by a user is submitted to a server of the control platform, the server generates an information code for a target user according to the user information of the target user, and the information code of the target user is a graphic code for recording the user information of the target user, such as a two-dimensional code, a bar code or a three-dimensional code. When the target user passes through check points such as a community access, a traffic checkpoint or an access of other public places, the target user can use the client to display the information code so as to be checked by staff at the check points. The staff of the check point can use the user terminal equipment of the staff to scan the information code of the target user, check the user information of the target user on the terminal equipment of the staff, then check the user information of the target user, and submit the travel record of the target user to the server. The checking terminal 13 of the checking point may also scan the information code of the target user, obtain the user information of the target user, and send a bayonet control instruction for controlling the opening of the bayonet to allow the target user to pass when the user information of the target user meets a certain condition.
The administrator can log in the management and control platform on the configuration management device 12 or its own user terminal 11 to obtain the user information stored by the server. The administrator can set a data query condition on the management and control platform to send a data query request to the server, and then the server obtains user data matched with the data query request and sends the user data to the device used by the administrator, so that the administrator views the user data or performs further analysis and processing.
The embodiment of the application provides a set of complete user information checking scheme based on information codes, which comprises automatic code scanning or manual code scanning to pass through a card port, information recording and analysis, information code addition and the like.
Please refer to fig. 3, which illustrates a flowchart of a method for checking user information based on an information code according to an embodiment of the present application. The method can be applied to the user information checking system based on the information code, and the system architecture of the user information checking system based on the information code can be shown as the figure 1. The user information checking method based on the information code comprises the following steps:
in step 310, the first client displays a user interface of a first function object of the target application.
The first functional object is a functional object for realizing information reporting. When the user needs to use the information reporting function provided by the target application program, a user interface for displaying the first functional object can be opened.
In step 320, the first client displays the information code of the first user in response to receiving the trigger signal of the information code display control in the user interface for the first function object.
The user interface of the first function object comprises an information code display control, and the information code display control is an operation control for triggering display of the information code, and can be a button, for example. The information code of the first user is a graphic code generated based on the user information of the first user, and can be used for viewing and tracing the user information. The implementation form of the graphic code is not limited in the embodiment of the present application, and for example, the graphic code may be a two-dimensional code, a barcode, or a three-dimensional code. It should be understood that the information code may also be referred to as a health code, a user code, an identity code, or other names, which are not limited in the embodiments of the present application. Optionally, the information code of the first user records identification information of the first user, and the user information of the first user, which is stored correspondingly, can be found through the identification information of the first user.
In one example, the user information includes at least one of: health information and travel information. The health information is information for reflecting the health condition of the user, for example, the health information may include information such as body temperature and symptoms; the travel information is information for reflecting a travel situation of the user, and for example, the travel information may include information on whether to go out, a place of going out, a time of going out, a person who is in contact with going out, and the like. Optionally, the user information further includes basic information of the user, for example, including information of name, gender, age, birth date, certificate number, phone number, address, and the like.
In the embodiment of the application, when a first user passes through a check point such as a community entrance, a traffic checkpoint or an entrance of other public places, the first user can use a first client to display the information code of the first user for checking by a worker at the check point.
As shown in fig. 4, the first client displays a user interface 40 of a first function object of the target application, the user interface 40 includes a health code display control 41, and the first user clicks the health code display control 41 to trigger displaying a health code 42 of the first user. Optionally, as shown in fig. 4, the display interface of the health code 42 further includes an expiration date of the health code 42 and an application update control, and when the health code 42 expires or needs to be updated, the first user may click the application update control to trigger updating the health code. Optionally, as shown in fig. 4, the display interface of the health code 42 further includes latest user information of the first user, such as latest health information and travel information of the first user.
In step 330, the second client scans the information code of the first user to obtain the user information of the first user.
Check points such as a community entrance, a traffic checkpoint or an entrance of other public places can be provided with automatic code scanning equipment, and a second client of a target application program runs on the automatic code scanning equipment. In the embodiment of the application, when a first user needs to access a certain check point, the user code of the first user can be displayed, and the user code is placed at the designated position or area of the automatic code scanning device corresponding to the access point, so that a second client running on the automatic code scanning device can automatically scan the information code of the first user, and the user information of the first user is obtained.
In one possible implementation, the step 330 includes: the second client scans the information code of the first user to acquire the identification information of the first user; the second client sends an information acquisition request to the server, wherein the information acquisition request comprises the identification information of the first user; and the server acquires the user information of the first user from the user information base according to the identification information of the first user and sends the user information of the first user to the second client. The information code of the first user records the identification information of the first user, the second client scans the information code of the first user to obtain the identification information of the first user, then the second client sends an information obtaining request to the server, the information obtaining request carries the identification information, and the server obtains the user information of the first user from the user information base according to the identification information and sends the user information to the second client.
Alternatively, the user information base may be divided into a plurality of databases according to types of the user information, for example, when the user information is divided into health information and travel information, the user information base may be divided into a user information database and a user trajectory database. Optionally, each type of user information may be separately stored in a plurality of databases to avoid insufficient storage capacity of a single database.
The method includes the steps that a user information base is divided into a plurality of databases according to the type of user information, and the server acquires the user information of a first user from the user information base according to the identification information of the first user, and the method includes the following steps: the server acquires the health information of the first user from the user information database according to the identification information of the first user; the server acquires the travel information of the first user from the user track database according to the identification information of the first user; the user information of the first user comprises health information and travel information. And the server acquires the health information and the travel information of the first user from the user information database and the user track database respectively and sends the health information and the travel information to the second client. Optionally, the server may separately send the health information and the trip information of the first user to the second client, or may package the health information and the trip information after obtaining the health information and the trip information of the first user, and then send the packaged information to the second client, so as to reduce the number of data traffic between the server and the second client.
And 340, the second client sends a bayonet control instruction in response to that the user information of the first user meets the first condition.
After receiving the user information of the first user, the second client may compare the user information of the first user with the first condition, and when the user information of the first user meets the first condition, the second client may send a gate control instruction, where the gate control instruction is used to control a gate to be opened to allow the first user to pass through. That is, the automatic code scanning device running with the second client may be connected to the gate through a network, and the second client may control the state of the gate through an instruction.
In an embodiment of the present application, the first condition includes that the user information of the first user meets a health judgment index. The user information of the first user may indicate a physical condition, a trip condition, and the like of the first user, for example, when the user information of the first user includes health information and trip information, the health information may indicate the physical condition of the user, and the trip information may indicate the trip condition of the user. The second client may set a first condition that the user information of the first user needs to meet the requirement when the user information of the first user meets the health determination criterion, for example, the second client may set the first condition that the body temperature of the first user is normal for seven consecutive days, and the first user does not enter or exit the high risk area for seven consecutive days. Optionally, different first conditions may be set for different checkpoints, different first conditions may also be set for different time periods of the same checkpoint, and different first conditions may also be set for different users within the same time period of the same checkpoint, which is not limited in this embodiment of the application.
In one example, the method further comprises: the server acquires the card port information corresponding to the second client; determining a checkpoint passing rule corresponding to the second client according to the checkpoint information; and sending the checkpoint passing rule to the second client. Wherein, the checkpoint information can instruct the inspection dynamics of the checkpoint that the second customer end corresponds, because the second customer end can distribute in different checkpoints, the inspection condition that every checkpoint corresponds is different, for example, to more important and stricter checkpoint, the inspection condition is stricter, the inspection dynamics is great, if the inspection dynamics at school gate is greater than the inspection dynamics that community imports and exports, then the inspection condition that school gate corresponds should be stricter, this application embodiment is to different checkpoints, propose to set up different bayonet socket rule of passing, in order to satisfy the demand that different checkpoints set up different inspection dynamics. In the embodiment of the application, the server obtains the checkpoint information of the checkpoint where the second client is located, where the checkpoint information may include the location, the type, and the like of the checkpoint where the second client is located, then, the server determines the checkpoint passing rule corresponding to the second client according to the checkpoint information, where the checkpoint passing rule is used to determine whether the user information meets the first condition, and then, the server sends the checkpoint passing rule to the second client.
In a possible embodiment, the method further includes: the second client receives health information from the associated intelligent equipment; and responding to the situation that the user information of the first user meets the first condition and the health information meets the second condition, and executing the step of sending the checkpoint control instruction.
The associated intelligent device is an intelligent device which is in communication connection with the user terminal where the second client is located, and can be an intelligent temperature gun, an intelligent bracelet, an intelligent blood pressure meter, an intelligent mobile phone and the like. The associated intelligent device can acquire the latest health information of the user, such as body temperature, heart rate, blood pressure and the like. In the embodiment of the application, the health information is acquired by the associated intelligent device in real time, and after the second client receives the health information from the associated intelligent device, a bayonet control instruction is sent out when the user information of the first user meets a first condition and the health information meets a second condition. According to the embodiment of the application, the second condition can be flexibly set according to the health information, for example, when the health information is the body temperature of the first user, the second condition is that the body temperature of the first user is in a normal range.
Optionally, after the second client receives the health information from the associated smart device, the method further includes: the second client submits the latest user information of the first user to the server; the server stores the latest user information of the first user. The second client may acquire the latest user information of the first user, which includes health information and travel information, when determining whether to let the first user pass, for example, acquire the latest body temperature (e.g., 37 degrees) and the latest travel state (e.g., entering a cell) of the first user, and transmit the latest user information of the first user to the server to store the latest user information through the server.
In summary, according to the technical scheme provided by the embodiment of the application, the information code is displayed on the client of the user, and the automatic code scanning device of the check point can scan the information code of the user by using the client, so that the information of the user can be checked and reported, the user information can be automatically checked and reported, the contact risk between a manager and the user is reduced, and the checking efficiency is improved. In addition, compared with paper certification, the information code in the form of the electronic graphic code is not easy to lose, and a user can check the information code by logging in the user account through the client, so that the user can conveniently trace and check the information code.
In addition, the user information can comprise health information and travel information, tracking and recording of the health condition and the travel condition of the user are achieved based on the two dimensions, an effective user information recording and tracing scheme is provided for health control scenes caused by outbreaks of infectious diseases (such as new coronary pneumonia, flu and the like), and the possible infected users can be located quickly.
In addition, because the checking force and the detection condition may be different under different checking points or the same checking point at different moments, the embodiment of the application determines the checkpoint passing rule of the checking point according to the checkpoint information of the checking point aiming at different checking points or at different moments, so that the checkpoint passing rule is set differently according to the difference of the checking points or time, the flexibility of setting the checkpoint passing rule is improved, and the method is also beneficial to adapting to different checking forces of infectious diseases and the like in different development states.
In an exemplary embodiment, a process of manually scanning an information code of a user, checking and reporting user information is described. As shown in fig. 5, the process of manually scanning the information code of the user, checking and reporting the user information may include the following steps:
in step 510, the third client displays a user interface of the second function object of the target application.
When an administrator (e.g., a community worker or a checkpoint worker) needs to check the user information of the first user, an information management function provided by the target application may be used. The administrator can open a user interface that displays a second functional object that is a functional object for realizing information management and control.
In step 520, the third client scans the information code of the first user and displays the information registration interface of the first user in response to receiving the trigger signal of the code scanning control in the user interface for the second functional object.
The user interface of the second function object comprises a code scanning control, and the code scanning control is an operation control for triggering the starting of the graphic code scanning function, and can be a button, for example. And the administrator touches the code scanning control, the third client displays a graphic code scanning interface, starts the camera and starts the graphic code scanning function. After the information code of the first user is obtained by scanning, the third client may display an information registration interface of the first user.
As shown in fig. 6, the third client displays a user interface 60 of the second function object of the target application, where the user interface 60 includes a code scanning control 61, and the administrator clicks the code scanning control 61 to trigger the start of the graphic code scanning function. After the health code of the first user is obtained by scanning, the information registration interface 62 of the first user is displayed.
In step 530, the third client enters the latest user information of the first user in the information registration interface of the first user.
The information registration interface is a user interface for registering latest user information of the first user.
In one possible implementation, the administrator manually enters the latest user information of the first user in the information registration interface, and accordingly, the third client acquires the latest user information of the first user input in the information registration interface and displays the latest user information of the first user in the information registration interface. For example, as shown in fig. 6, the administrator may select or input the latest information of the body temperature, symptom, travel state, and the like of the first user at the information registration interface 62.
In another possible implementation, the third client receives the latest user information from the first user associated with the smart device and displays the latest user information of the first user in the information registration interface. The associated intelligent device is an intelligent device which is in communication connection with a user terminal where the third client is located, and can be an intelligent temperature gun, an intelligent bracelet, an intelligent blood pressure meter, an intelligent mobile phone and the like. The associated intelligent device can acquire the latest health information of the user, such as body temperature, heart rate, blood pressure and the like, and also can acquire the position information or action track of the user, and the associated intelligent device automatically sends the latest user information to the user terminal where the third client is located through the communication connection, so that the third client can automatically acquire the latest user information without manual input of an administrator.
It should be understood that, in some other embodiments, the latest user information of the first user may also be obtained in a manner of combining the two manners, which is not limited in this application example.
In step 540, the third client sends the latest user information of the first user to the server in response to receiving the submission indication of the latest user information of the first user.
A submission control may be included in the information registration interface, and clicking on the submission control by the administrator may trigger an indication of submission of the most up-to-date user information for the first user. And after receiving the submission instruction, the third client sends the latest user information of the first user to the server. Optionally, when the third client sends the latest user information of the first user to the server, the third client may simultaneously carry the identification information of the first user.
As shown in fig. 6, after confirming that the latest user information of the first user in the information registration interface 62 is correct, the administrator may click a submit button 63 to trigger a submit instruction, and the third client, after receiving the submit instruction, sends the latest user information of the first user to the server.
In step 550, the server stores the latest user information of the first user.
After receiving the latest user information of the first user, the server may store the user information of the first user in the database. For the same user, the user information can be submitted in different times, the user information submitted in different times can be different, and the server can store the user information of the first user submitted in multiple times according to the time sequence to form the user information record of the first user.
In the embodiment of the application, the first user may confirm or object to the latest user information registered in the information registration interface by the administrator, that is, the server may send the latest user information of the first user to the first user before storing the latest user information of the first user, and different operations may be performed according to the confirmation or object of the first user. For the confirmation or objection of the first user, the embodiment of the present application provides the following two process flows.
In one example, after the step 540, the method further includes: the server sends the latest user information of the first user to the first client; the first client displays an information confirmation interface; the first client sends a confirmation indication of the latest user information of the first user to the server in response to receiving a trigger signal for a confirmation control in the information confirmation interface.
After receiving the latest user information, the first client may display the latest user information in the information confirmation interface, that is, the information confirmation interface includes the latest user information of the first user. In addition, a confirmation control and/or an objection control can be included in the information confirmation interface. When the first user confirms that the latest user information is correct, the first user can touch the confirmation control, so that the first client can receive the trigger information aiming at the confirmation control and send a confirmation indication of the latest user information to the server, wherein the confirmation indication is used for triggering the server to store the latest user information of the first user.
In another example, after the first client displays the information confirmation interface, the method further includes: the first client sends an objection indication of the latest user information of the first user to the server in response to receiving a trigger signal for an objection control in the information confirmation interface; the server sends an information updating indication to the third client according to the objection indication; the third client displays an information updating interface of the first user according to the information updating indication; the third client enters the updated user information of the first user in the information updating interface of the first user; the third client sends the updated user information of the first user to the server in response to receiving the submission indication of the updated user information of the first user; the server stores updated user information for the first user.
When the first user thinks that the latest user information is wrong or disagrees with the latest user information, the first user can touch an objection control in the information confirmation interface, so that the first client can receive trigger information for the objection control and send an objection indication of the latest user information to the server. When the server receives the objection indication, the server may send an information update indication to the third client, so that the third client re-enters the information of the first user, that is, the third client enters the updated user information of the first user. The third client may then submit the updated user information to the server, which stores the updated user information. Optionally, the server may continue to send the updated user information to the first client, and store the updated user information after the first user confirms that the updated user information is correct; if the first user still disagrees with the updated user information, the server may repeat the step of sending an information update instruction to the third client until the first user confirms that the information is correct.
In summary, according to the technical scheme provided by the embodiment of the application, the information code is displayed on the client of the user, so that the inspector can scan the information code of the user by using the client, the information inspection and report of the user are realized, the information inspection without contact between the user and the inspector is realized, the contact risk is reduced, and the inspection efficiency is improved. In addition, after the checking personnel report the latest information of the user, the user can confirm or reject the latest information reported by the checking personnel, so that the latest information can be confirmed from a plurality of angles such as the checking personnel, the user and the like, and the accuracy of the latest information is improved.
In an exemplary embodiment, the administrator may view background data (such as personal information of the user, travel records, and the like) of the target application program through the third client, and perform related processing. As shown in fig. 7, the process of the administrator viewing and analyzing the background data through the third client may include the following steps:
in step 710, the third client displays a user interface of the second functional object of the target application.
When an administrator (e.g., a community worker or a checkpoint worker) needs to check the user information of the first user, an information management function provided by the target application may be used. The administrator can open a user interface that displays a second functional object that is a functional object for realizing information management and control.
In step 720, the third client displays the data query interface in response to receiving the trigger signal for the query control in the user interface of the second functional object.
The user interface of the second function object includes a query control, which is an operation control for triggering the data query function to be turned on, and may be a button, for example. The administrator touches the query control, and the third client displays a data query interface.
And step 730, the third client enters a data query condition in the data query interface.
The administrator can enter the data query condition in the data query interface, for example, the data query interface comprises a plurality of text boxes, and the administrator can enter the data query condition in the text boxes; for another example, the data query interface includes a plurality of drop-down bars, and the administrator can click on the drop-down bars to select the data query conditions so as to enter the data query conditions required by the administrator. The specific content of the data query condition is not limited in the embodiment of the application, and optionally, the data query condition may include a user condition, a time condition, a region condition, and the like. Optionally, different types of administrators have different permissions, and accordingly, the data query conditions that can be selected by the administrators may also be different, for example, for an administrator in a certain area, the administrator may query only the data in the area, but may not query the data in other areas.
In step 740, the third client sends a data obtaining request to the server in response to receiving the submission indication of the data query condition.
A submission control, which is an operation control for triggering submission of a data query condition, such as a button, may also be included in the data query interface. And the administrator touches the submission control, and the third client sends a data acquisition request to the server, wherein the data acquisition request is used for acquiring the user data matched with the data query condition. For example, when the data query condition includes a user condition (e.g., a first) and a time condition (e.g., a last month), the data acquisition request is used to acquire user information of the first last month.
And step 750, the server acquires the user data according to the data acquisition request.
After receiving the data acquisition request, the server may acquire user data corresponding to the data acquisition request from the user information base.
Step 760, the server sends the user data to the third client.
The server can send the acquired user data to the third client through the network
Step 770, the third client displays a data analysis interface.
The data analysis interface includes user data. After receiving the user data, the third client can display a data analysis interface to display the user data in the data analysis interface, so that an administrator can conveniently check the user data, and further analyze and process the user data.
In one example, the user data includes travel records of the target user; after the step 770, the method further includes: the third client responds to a trigger signal which is received and aims at a track generation control in the data analysis interface, connects travel records of the target user in series according to the time sequence indicated by the user data, and generates a travel track of the target user; and the third client displays the travel track of the target user in the data analysis interface.
The data analysis interface may include a trajectory generation control, which is an operation control for triggering generation of the travel trajectory of the target user, and may be a button, for example. The administrator touches the track generation control, and the third client can serially connect the travel records of the target user according to the time sequence indicated by the acquired user data to generate the travel track of the target user and display the travel track in the data analysis interface. Optionally, the travel track may further include health information of the target user at each travel point, for example, a body temperature record of the target user at each travel point when the target user enters or exits.
To sum up, according to the technical scheme provided by the embodiment of the application, the data query interface is displayed at the client, the administrator enters the data query condition in the data query interface, the user data matched with the data query condition can be acquired, and the user data is displayed in the data analysis interface, so that the administrator can check the user data required by the administrator, further analyze and process the user data, more management requirements of the administrator are met, and the management mode of the administrator is expanded.
In an exemplary embodiment, a user may add information codes of other users besides the user, as shown in fig. 8, the process of adding information codes of other users may include the following steps:
step 810, the first client displays the information code management interface in response to receiving a trigger signal for a management control in the information code display interface.
The information code display interface is a user interface for displaying the information code, and a management control can be included in the information code display interface, and the management control is an operation control for triggering display of the information code management interface, and can be a button, for example. And the first client can display an information code management interface according to the acquired trigger information by touching the management control by the user. The specific content included in the information code management interface is not limited in the embodiment of the application, for example, the information code management interface includes at least one user entry, each user entry corresponds to an information code of a user, when a user touches a certain user entry, the first client displays a deletion control corresponding to the user entry, and the user can touch the deletion control to delete the user entry, so that a management mode of the information code of the user is realized.
And step 820, the first client displays a self-checking reporting interface of the second user in response to receiving a trigger signal for adding a control in the information code management interface.
An adding control can be further included in the information code management interface, and the adding control is used for triggering generation of the information code of the second user, and can be a button for example. And the user touches the adding control, so that the first client can acquire the trigger information and display the self-checking reporting interface of the second user. The self-check reporting interface is a user interface for a user to enter self-check information, and the self-check information refers to user information reported by the user after self-checking, and comprises health information and travel information.
And 830, the first client acquires the self-checking information of the second user, which is recorded in the self-checking reporting interface of the second user.
The user can manually input the self-checking information in the self-checking reporting interface, and accordingly the first client side obtains the self-checking information input in the self-checking reporting interface and displays the self-checking information in the self-checking reporting interface. Or the first client receives the self-checking information of the second user from the associated intelligent equipment and displays the self-checking information of the second user in the self-checking reporting interface. The associated intelligent device is an intelligent device which is in communication connection with a user terminal where the first client is located, and can be an intelligent temperature gun, an intelligent bracelet, an intelligent blood pressure meter, an intelligent mobile phone and the like. The associated intelligent device can acquire health information of a user such as body temperature, heart rate and blood pressure and also can acquire position information or action tracks of the user, and automatically sends self-checking information to a user terminal where the first client is located through the communication connection, so that the first client can automatically acquire the self-checking information without manual input of the user. Of course, in some other embodiments, the self-check information of the second user may also be obtained by combining the two manners, which is not limited in this application.
In step 840, the first client sends the second user's self-investigation information to the server in response to receiving the submission indication for the second user's self-investigation information.
The self-investigation reporting interface can comprise a submission control, and the user clicking the submission control can trigger the submission indication of the self-investigation information of the second user. And after receiving the submission instruction, the first client sends the self-checking information of the second user to the server. When the first client sends the self-checking information of the second user to the server, the first client can simultaneously carry the identification information of the second user.
As shown in fig. 9, the first client displays an information code display interface 90, the information code display interface 90 includes a management control 91, the user clicks the management control 91 to trigger the first client to display an information code management interface 92, an add control 93 is displayed in the information code management interface 92, and the user clicks the add control 93 to trigger to display a self-inspection report interface 94 of the second user. The user can select or input the self-examination information of the second user, such as the body temperature, symptoms, travel state and the like, on the self-examination reporting interface 94. After confirming that the self-checking information in the self-checking reporting interface 94 is correct, the user may click a submit button to trigger a submit instruction, and after receiving the submit instruction, the first client sends the self-checking information of the second user to the server.
And 850, generating the information code of the second user by the server according to the self-checking information of the second user and the information code generation rule.
The information code generation rule is a rule of a manner for generating an information code. After receiving the self-checking information of the second user, the server may encode the self-checking information of the second user according to an information code generation rule, and generate a corresponding graphic code as an information code of the second user.
Optionally, the information code includes a plurality of display styles, and different display styles correspond to different user ratings. The display style includes, but is not limited to, at least one of: color, shape, size, etc. For example, taking the health code as an example, the health code includes 3 display patterns of red, yellow and green, and the 3 display patterns correspond to 3 different health levels. For example, red indicates danger, yellow indicates pending, and green indicates healthy. Different user levels are represented by adopting the information codes with different display styles, so that the administrator of the check point can intuitively and efficiently determine the user levels of the users after checking the display styles of the information codes, and the checking efficiency is improved.
In one example, the above step 850 may include: the server acquires the history information of the second user; according to the historical information of the second user, the self-checking information of the second user is checked to obtain the self-checking information after checking; and generating the information code of the second user according to the verified self-checking information and the information code generation rule.
The history information refers to the user information of the second user recorded in history. Optionally, the historical information comprises at least one of: historical health information and historical travel information. The server may obtain the second user's historical information from a database or other channel. The second user's history information is historical and has authentic user information. For example, the history information of the second user may be user information reported to the server after the administrator performs information check on the second user at the check point, or user information acquired based on an operator positioning result of a user terminal used by the second user, which is not limited in this embodiment of the present application.
Since the authenticity of the self-checking information of the second user is in doubt, the server verifies the self-checking information of the second user according to the historical information of the second user, and then generates the information code of the second user according to the verified self-checking information, and the accuracy and the authenticity of the information code are improved. In addition, under the condition that the self-checking information of the second user is determined to be correct according to the historical information of the second user, the server can directly use the self-checking information of the second user as the self-checking information after verification to generate an information code without modifying the self-checking information of the second user; when the self-checking information of the second user is determined to be incorrect according to the history information of the second user, the server may correct the self-checking information of the second user according to the history information of the second user to obtain the checked self-checking information, and then generate an information code based on the checked self-checking information.
In another example, the server may also update the information code generation rule. Optionally, the server acquires epidemic situation statistical data; and updating the information code generation rule according to the epidemic situation statistical data. The epidemic situation statistical data is a statistical result for the epidemic situation, and may include information such as the number of confirmed cases, the number of suspected cases, and the number of cured cases in each area. For example, the number of patients in the area a is larger than a threshold, and the original information code generation rule includes that when the trip information of the user passes through the area a, a red information code is generated; if the number of diagnosed cases in the area a is less than the threshold value, the updated information code generation rule may include generating a yellow or green information code when the user's travel information includes the travel through the area a. In the embodiment of the present application, the manner of updating the barcode generation rule according to the epidemic situation statistic data is not limited, and for example, the manners such as rule matching and AI (Artificial Intelligence) may be adopted.
Through the mode, the information code generation rule is updated automatically according to the epidemic situation statistical data, the information code generation rule can be adjusted adaptively along with the development of the epidemic situation, and the accuracy and the reliability of the generated information code are improved.
Step 860, the server sends the information code of the second user to the first client.
After the server generates the information code of the second user, the server may send the information code of the second user to the first client.
In step 870, the first client displays the information code of the second user.
After receiving the information code of the second user, the first client can display the information code of the second user.
In another possible implementation, as shown in fig. 8, in the case that the server has generated the information codes of other users, the process of adding the information codes of other users may include the following steps:
in step 880, the first client displays the information code management interface in response to receiving the trigger signal for the management control in the information code display interface.
The information code display interface is a user interface for displaying the information code. For other descriptions of the information code display interface and the information code management interface, please refer to step 810 above, which is not described herein again.
And step 890, in response to receiving the trigger signal for the code scanning control in the information code management interface, the first client scans the information code of the third user and displays an addition confirmation interface of the third user.
The information code management interface can comprise a code scanning control which is an operation control for triggering the starting of the information code scanning function, and the code scanning control can be a button. And the user clicks the code scanning control to trigger the first client to display an information code scanning interface, and opens the camera to start an information code scanning function. After scanning the information code of the third user, the first client may display an addition confirmation interface of the third user.
As shown in fig. 9, a code scanning control 95 is displayed in the information code management interface 92, and when the user clicks the code scanning control 95, an addition confirmation interface 96 of a third user is triggered and displayed. The add confirmation interface 96 may include a confirmation control, and a user clicking on the confirmation control may trigger the addition of an information code of a third user. Optionally, as shown in fig. 9, the addition confirmation interface 96 may further include a cancel control, and when the user clicks the cancel control, the information code of the third user may be triggered to be cancelled.
Step 800, the first client adds a user entry of a third user in the information code management interface.
The information code management interface comprises at least one user entry, and after the information code of the third user is added by the first client, the user entry of the third user can be correspondingly added in the information code management interface. In addition, the first client can also add the information code of the third user in the information code display interface so as to display the information code of the third user.
In summary, according to the technical scheme provided by the embodiment of the application, the information codes of other users are added to the client of a certain user, so that the user can apply for, check, analyze and manage the information codes of family or friends of the user conveniently. And, to the crowd who is not convenient for use terminal, provide application and the user mode of an information code to satisfy the user demand of the crowd of different grade type, promote the popularity of information code. In addition, aiming at other users who have applied for the information codes, the users can directly acquire the information codes of other users in a scanning mode, the method is simple and convenient, and the information code sharing efficiency is improved.
Next, a description will be given of a first functional object and a second functional object related to embodiments of the present application.
In one possible implementation, the first functional object and/or the second functional object are sub-applications that run in dependence on the target application.
In this implementation, the first function object and/or the second function object serve as a sub-application, and the target application is a parent application of the sub-application. A child application is an application that runs in dependence of a parent application. The above-described sub-application may be referred to as an applet. The applet cannot run independently but can be used without download and installation. The user can directly open the sub-application program by scanning the two-dimensional code corresponding to the sub-application program or searching the name of the sub-application program. The child application can be conveniently acquired and propagated within the parent application. The parent application is an application for bearing the child application, and provides an environment for implementing the child application. The parent application is a native application. A native application is an application that can run directly on an operating system. The parent application may be a social application, a dedicated application that specifically supports the child applications, a file management application, a mail application, or a gaming application, among others. The Social application program includes an instant messaging application, an SNS (Social Network Service) application, or a live application.
In another possible implementation manner, the first functional object and/or the second functional object is a public platform account in the target application program.
The public platform account is also called a public number, and is a user account applied by a public operator on a public platform. The public number operator can realize the all-round communication and interaction of characters, pictures, voice and video with the attention people through the public platform. Public operators are typically highly interested organizations or individuals such as businesses, governments, media, celebrities, and the like. The public number operator can send messages to the attendees, receive the messages sent by the attendees, acquire the geographical location information of the attendees, provide various services for the attendees and the like through a public platform, and a mainstream online and offline interaction mode is formed. The public platform is an open platform used for performing online and offline interaction with a person concerned with the public platform account. Such as WeChat public platform, easy-to-believe public platform, to-and-from public platform, people-network public platform, etc. Public platforms are typically implemented based on social-like applications. After the public account operator applies for the user account in the social application, a common user in the social application can pay attention to the user account or become a friend relationship with the user account. And then, the common user and the public operator can perform information interaction such as text, pictures, voice, video and the like by taking the social application as a medium.
In another possible implementation, the first functional object and/or the second functional object is a native functional module provided by the target application.
The native function module refers to a function implemented by a main program framework of the target application program. For example, an operation entry of the first functional object and/or the second functional object is displayed in a native user interface of the target application program, and a user clicking the operation entry can trigger the user interface displaying the first functional object and/or the second functional object.
In the embodiment of the application, multiple implementation modes of the first functional object and the second functional object in the target application program are provided, so that the flexibility and the implementability of the scheme are better.
It should be noted that, in the above method embodiment, the technical solution of the present application is described only from the perspective of interaction among the first client, the second client, the third client, and the server. The steps executed by the first client can be realized separately as a user information checking method based on the information code on the first client side; the above steps executed by the second client can be implemented separately as a user information checking method based on the information code on the second client side; the steps executed by the third client can be implemented separately as a user information checking method based on the information code on the third client side; the steps executed by the server can be independently realized to be the user information checking method based on the information code on the server side.
The following are embodiments of the system of the present application that may be used to implement embodiments of the method of the present application. For details which are not disclosed in the embodiments of the system of the present application, reference is made to the embodiments of the method of the present application.
An exemplary embodiment of the present application provides an information code-based user information checking system, which includes a first client and a second client;
the first client is used for displaying a user interface of a first functional object of a target application program, wherein the first functional object is used for realizing information reporting; in response to receiving a trigger signal of an information code display control in a user interface for the first function object, displaying an information code of a first user, wherein the information code of the first user is a graphic code generated based on user information of the first user;
the second client is used for scanning the information code of the first user and acquiring the user information of the first user; responding to the user information of the first user meeting a first condition, and sending a bayonet control instruction, wherein the bayonet control instruction is used for controlling a bayonet to be opened to permit the first user to pass through;
wherein the first condition comprises that the user information of the first user meets a health judgment index.
In the exemplary embodiment, it is contemplated that,
the second client is used for scanning the information code of the first user and acquiring the identification information of the first user; sending an information acquisition request to a server, wherein the information acquisition request comprises identification information of the first user;
and the server is used for acquiring the user information of the first user from a user information base according to the identification information of the first user and sending the user information of the first user to the second client.
In an exemplary embodiment, the server is configured to obtain health information of the first user from a user information database according to the identification information of the first user; according to the identification information of the first user, obtaining the travel information of the first user from a user track database; wherein the user information of the first user includes the health information and the travel information.
In an exemplary embodiment, the server is further configured to obtain the checkpoint information corresponding to the second client; determining a checkpoint passing rule corresponding to the second client according to the checkpoint information; sending the passing rule of the gate to the second client; the bayonet passing rule is used for judging whether the user information meets the first condition or not.
In an exemplary embodiment, the second client is further configured to receive health information from an associated smart device, where the health information is acquired by the associated smart device in real time for the first user; and responding to the situation that the user information of the first user meets the first condition and the health information meets the second condition, and executing the step of sending the checkpoint control instruction.
In the exemplary embodiment, it is contemplated that,
the second client is further configured to submit the latest user information of the first user to a server, where the latest user information includes the health information and the travel information;
the server is further used for storing the latest user information of the first user.
In the exemplary embodiment, it is contemplated that,
the third client is also used for displaying a user interface of a second functional object of the target application program, wherein the second functional object is a functional object for realizing information management and control; in response to receiving a trigger signal of a code scanning control in a user interface for the second function object, scanning the information code of the first user and displaying an information registration interface of the first user; inputting the latest user information of the first user in an information registration interface of the first user; in response to receiving a submission indication of the latest user information for the first user, sending the latest user information for the first user to a server;
the server is further used for storing the latest user information of the first user.
In the exemplary embodiment, it is contemplated that,
the server is further used for sending the latest user information of the first user to the first client;
the first client is further used for displaying an information confirmation interface, wherein the information confirmation interface comprises the latest user information of the first user; in response to receiving a trigger signal for a confirmation control in the information confirmation interface, sending a confirmation indication of the latest user information of the first user to the server, wherein the confirmation indication is used for triggering the server to store the latest user information of the first user.
In the exemplary embodiment, it is contemplated that,
the first client is further used for responding to the receiving of a trigger signal aiming at an objection control in the information confirmation interface, and sending an objection indication of the latest user information of the first user to the server;
the server is further used for sending an information updating indication to the third client according to the objection indication;
the third client is further used for displaying an information updating interface of the first user according to the information updating indication; entering updated user information of the first user in an information updating interface of the first user; in response to receiving a submission indication of updated user information for the first user, sending the updated user information for the first user to the server;
the server is further used for storing the updated user information of the first user.
In the exemplary embodiment, it is contemplated that,
the third client is used for displaying a user interface of a second functional object of the target application program, wherein the second functional object is a functional object for realizing information management and control; in response to receiving a trigger signal for a query control in a user interface of the second functional object, displaying a data query interface; inputting a data query condition in the data query interface; in response to receiving a submission instruction of the data query condition, sending a data acquisition request to a server, wherein the data acquisition request is used for acquiring user data matched with the data query condition;
the server is further used for acquiring the user data according to the data acquisition request; sending the user data to the third client;
the third client is further configured to display a data analysis interface, where the data analysis interface includes the user data.
In an exemplary embodiment, the third client is further configured to, in response to receiving a trigger signal for a trajectory generation control in the data analysis interface, concatenate travel records of the target user in a time sequence indicated by the user data, and generate a travel trajectory of the target user; and displaying the travel track of the target user in the data analysis interface.
In the exemplary embodiment, it is contemplated that,
the first client is further used for responding to a trigger signal received for a management control in an information code display interface and displaying the information code management interface, wherein the information code display interface is a user interface used for displaying the information code; responding to a received trigger signal aiming at an adding control in the information code management interface, and displaying a self-checking reporting interface of a second user; acquiring the self-checking information of the second user, which is input in the self-checking reporting interface of the second user; in response to receiving a submission indication of the second user's introspection information, sending the second user's introspection information to a server;
the server is further used for generating an information code of the second user according to the self-checking information of the second user and an information code generation rule; sending the information code of the second user to the first client;
the first client is also used for displaying the information code of the second user.
In an exemplary embodiment, the server is further configured to obtain history information of the second user, where the history information refers to user information of the second user recorded in a history; according to the historical information of the second user, the self-checking information of the second user is checked to obtain the self-checking information after checking; and generating the information code of the second user according to the verified self-checking information and the information code generation rule.
In an exemplary embodiment, the first client is further configured to display an information code management interface in response to receiving a trigger signal for a management control in an information code presentation interface, where the information code presentation interface is a user interface for presenting the information code; in response to receiving a trigger signal aiming at a code scanning control in the information code management interface, scanning an information code of a third user, and displaying an addition confirmation interface of the third user; and adding the user entry of the third user in the information code management interface.
In summary, according to the technical scheme provided by the embodiment of the application, the information code is displayed on the client of the user, and the automatic code scanning device of the check point can scan the information code of the user by using the client, so that the information of the user can be checked and reported, the user information can be automatically checked and reported, the contact risk between a manager and the user is reduced, and the checking efficiency is improved. In addition, compared with paper certification, the information code in the form of the electronic graphic code is not easy to lose, and a user can check the information code by logging in the user account through the client, so that the user can conveniently trace and check the information code.
In addition, the user information can comprise health information and travel information, tracking and recording of the health condition and the travel condition of the user are achieved based on the two dimensions, an effective user information recording and tracing scheme is provided for health control scenes caused by outbreaks of infectious diseases (such as new coronary pneumonia, flu and the like), and the possible infected users can be located quickly.
In addition, because the checking force and the detection condition may be different under different checking points or the same checking point at different moments, the embodiment of the application determines the checkpoint passing rule of the checking point according to the checkpoint information of the checking point aiming at different checking points or at different moments, so that the checkpoint passing rule is set differently according to the difference of the checking points or time, the flexibility of setting the checkpoint passing rule is improved, and the method is also beneficial to adapting to different checking forces of infectious diseases and the like in different development states.
Referring to fig. 10, a block diagram of a terminal 1000 according to an embodiment of the present application is shown. The terminal 1000 can be an electronic device such as a mobile phone, a tablet computer, a wearable device, a multimedia playing device, and a PC.
In general, terminal 1000 can include: a processor 1001 and a memory 1002.
Processor 1001 may include one or more Processing cores, such as a 4-core processor, a 10-core processor, etc., processor 1001 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (field Programmable Gate Array), and a P L a (Programmable logic Array), processor 1001 may also include a main processor, which is a processor, also referred to as a CPU, for Processing data in a wake-up state, and a coprocessor, which is a low power processor for Processing data in a standby state.
Memory 1002 may include one or more computer-readable storage media, which may be non-transitory. The memory 1002 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in the memory 1002 is used to store at least one instruction, at least one program, code set, or instruction set for execution by the processor 1001 to implement the client-side information code-based user information verification method described above.
In some embodiments, terminal 1000 can also optionally include: a peripheral interface 1003 and at least one peripheral. The processor 1001, memory 1002 and peripheral interface 1003 may be connected by a bus or signal line. Various peripheral devices may be connected to peripheral interface 1003 via a bus, signal line, or circuit board. Specifically, the peripheral device may include: at least one of radio frequency circuitry 1004, touch screen display 1005, camera 1006, audio circuitry 1007, positioning components 1008, and power supply 1009.
Those skilled in the art will appreciate that the configuration shown in FIG. 10 is not intended to be limiting and that terminal 1000 can include more or fewer components than shown, or some components can be combined, or a different arrangement of components can be employed.
Referring to fig. 11, a block diagram of a server according to an embodiment of the present application is shown. The server can be used for implementing the user information checking method based on the information code on the server side. Specifically, the method comprises the following steps:
the server 1100 includes a Central Processing Unit (CPU) 1101, a system Memory 1104 including a Random Access Memory (RAM) 1102 and a Read Only Memory (ROM) 1103, and a system bus 1105 connecting the system Memory 1104 and the Central Processing Unit 1101. The server 1100 also includes a basic input/output system (I/O system) 1106, which facilitates transfer of information between devices within the computer, and a mass storage device 1107 for storing an operating system 1113, application programs 1114, and other program modules 1112.
The basic input/output system 1106 includes a display 1108 for displaying information and an input device 1109 such as a mouse, keyboard, etc. for user input of information. Wherein the display 1108 and the input device 1109 are connected to the central processing unit 1101 through an input output controller 1110 connected to the system bus 1105. The basic input/output system 1106 may also include an input/output controller 1110 for receiving and processing input from a number of other devices, such as a keyboard, mouse, or electronic stylus. Similarly, input-output controller 1110 also provides output to a display screen, a printer, or other type of output device.
The mass storage device 1107 is connected to the central processing unit 1101 through a mass storage controller (not shown) that is connected to the system bus 1105. The mass storage device 1107 and its associated computer-readable media provide non-volatile storage for the server 1100. That is, the mass storage device 1107 may include a computer-readable medium (not shown) such as a hard disk or a CD-ROM (Compact disk Read-Only Memory) drive.
Without loss of generality, computer readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes RAM, ROM, EPROM (Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), flash Memory or other solid state Memory technology, CD-ROM, DVD (Digital Video Disc) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Of course, those skilled in the art will appreciate that computer storage media is not limited to the foregoing. The system memory 1104 and mass storage device 1107 described above may be collectively referred to as memory.
The server 1100 may also operate in accordance with various embodiments of the application through remote computers connected to a network, such as the internet. That is, the server 1100 may connect to the network 1112 through the network interface unit 1111 that is coupled to the system bus 1105, or may connect to other types of networks or remote computer systems (not shown) using the network interface unit 1111.
The memory also includes a computer program stored in the memory and configured to be executed by the one or more processors to implement the above-mentioned server-side information code-based user information verification method.
In an exemplary embodiment, there is also provided a computer-readable storage medium having at least one instruction, at least one program, a code set, or a set of instructions stored therein, which when executed by a processor of a terminal, implements the above-described client-side information code-based user information verification method.
In an exemplary embodiment, there is also provided a computer readable storage medium having at least one instruction, at least one program, a code set, or a set of instructions stored therein, which when executed by a processor of a server, implements the above-mentioned server-side information code-based user information verification method.
Optionally, the computer-readable storage medium may include: ROM (Read Only Memory), RAM (Random Access Memory), SSD (Solid State drive), or optical disc. The Random Access Memory may include a ReRAM (resistive Random Access Memory) and a DRAM (Dynamic Random Access Memory).
In an exemplary embodiment, a computer program product is further provided, which is used to implement the above-mentioned client-side user information verification method based on information codes when being executed by a processor of a terminal.
In an exemplary embodiment, a computer program product is further provided, which when executed by a processor of a server, is used to implement the above-mentioned method for checking user information based on information codes on the server side.
It should be understood that reference to "a plurality" herein means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. In addition, the step numbers described herein only exemplarily show one possible execution sequence among the steps, and in some other embodiments, the steps may also be executed out of the numbering sequence, for example, two steps with different numbers are executed simultaneously, or two steps with different numbers are executed in a reverse order to the order shown in the figure, which is not limited by the embodiment of the present application.
The above description is only exemplary of the present application and should not be taken as limiting the present application, and any modifications, equivalents, improvements and the like that are made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (15)

1. A method for checking user information based on information codes is characterized in that the method comprises the following steps:
a first client displays a user interface of a first functional object of a target application program, wherein the first functional object is used for realizing information reporting; in response to receiving a trigger signal of an information code display control in a user interface for the first function object, displaying an information code of a first user, wherein the information code of the first user is a graphic code generated based on user information of the first user;
the second client scans the information code of the first user to acquire the user information of the first user; responding to the user information of the first user meeting a first condition, and sending a bayonet control instruction, wherein the bayonet control instruction is used for controlling a bayonet to be opened to permit the first user to pass through;
wherein the first condition comprises that the user information of the first user meets a health judgment index.
2. The method of claim 1, wherein the scanning, by the second client, the information code of the first user to obtain the user information of the first user comprises:
the second client scans the information code of the first user to acquire the identification information of the first user; sending an information acquisition request to a server, wherein the information acquisition request comprises identification information of the first user;
and the server acquires the user information of the first user from a user information base according to the identification information of the first user and sends the user information of the first user to the second client.
3. The method according to claim 2, wherein the server obtains the user information of the first user from a user information base according to the identification information of the first user, and comprises:
the server acquires the health information of the first user from a user information database according to the identification information of the first user;
the server acquires the travel information of the first user from a user track database according to the identification information of the first user;
wherein the user information of the first user includes the health information and the travel information.
4. The method of claim 1, further comprising:
the server acquires the card port information corresponding to the second client; determining a checkpoint passing rule corresponding to the second client according to the checkpoint information; sending the passing rule of the gate to the second client;
the bayonet passing rule is used for judging whether the user information meets the first condition or not.
5. The method of claim 1, further comprising:
the second client receives health information from associated intelligent equipment, wherein the health information is obtained by the associated intelligent equipment through real-time collection of the first user;
and in response to the user information of the first user meeting the first condition and the health information meeting a second condition, the second client executes the step of issuing the checkpoint control instruction.
6. The method of claim 5, wherein after the second client receives the health information from the associated smart device, further comprising:
the second client submits the latest user information of the first user to a server, wherein the latest user information comprises the health information and the travel information;
the server stores the latest user information of the first user.
7. The method of claim 1, further comprising:
the third client displays a user interface of a second functional object of the target application program, wherein the second functional object is a functional object for realizing information management and control; in response to receiving a trigger signal of a code scanning control in a user interface for the second function object, scanning the information code of the first user and displaying an information registration interface of the first user; inputting the latest user information of the first user in an information registration interface of the first user; in response to receiving a submission indication of the latest user information for the first user, sending the latest user information for the first user to a server;
the server stores the latest user information of the first user.
8. The method of claim 7, wherein after the third client sends the latest user information of the first user to the server, the method further comprises:
the server sends the latest user information of the first user to the first client;
the first client displays an information confirmation interface, wherein the information confirmation interface comprises the latest user information of the first user; in response to receiving a trigger signal for a confirmation control in the information confirmation interface, sending a confirmation indication of the latest user information of the first user to the server, wherein the confirmation indication is used for triggering the server to store the latest user information of the first user.
9. The method of claim 8, wherein after the first client displays the information confirmation interface, the method further comprises:
the first client sending an anti-object indication of the first user's most recent user information to the server in response to receiving a trigger signal for an anti-object control in the information confirmation interface;
the server sends an information updating indication to the third client according to the objection indication;
the third client displays an information updating interface of the first user according to the information updating indication; entering updated user information of the first user in an information updating interface of the first user; in response to receiving a submission indication of updated user information for the first user, sending the updated user information for the first user to the server;
the server stores updated user information for the first user.
10. The method of claim 1, further comprising:
the third client displays a user interface of a second functional object of the target application program, wherein the second functional object is a functional object for realizing information management and control; in response to receiving a trigger signal for a query control in a user interface of the second functional object, displaying a data query interface; inputting a data query condition in the data query interface; in response to receiving a submission instruction of the data query condition, sending a data acquisition request to a server, wherein the data acquisition request is used for acquiring user data matched with the data query condition;
the server acquires the user data according to the data acquisition request; sending the user data to the third client;
and the third client displays a data analysis interface, wherein the data analysis interface comprises the user data.
11. The method of claim 10, wherein the user data comprises travel records of a target user;
after the third client displays the data analysis interface, the method further includes:
the third client responds to a trigger signal which is received for a track generation control in the data analysis interface, connects travel records of the target user in series according to a time sequence indicated by the user data, and generates a travel track of the target user;
and the third client displays the travel track of the target user in the data analysis interface.
12. The method of claim 1, further comprising:
the first client responds to a trigger signal received for a management control in an information code display interface, and displays the information code management interface, wherein the information code display interface is a user interface used for displaying the information code; responding to a received trigger signal aiming at an adding control in the information code management interface, and displaying a self-checking reporting interface of a second user; acquiring the self-checking information of the second user, which is input in the self-checking reporting interface of the second user; in response to receiving a submission indication of the second user's introspection information, sending the second user's introspection information to a server;
the server generates an information code of the second user according to the self-checking information of the second user and an information code generation rule; sending the information code of the second user to the first client;
and the first client displays the information code of the second user.
13. The method according to claim 12, wherein the server generates the information code of the second user according to the self-check information of the second user and an information code generation rule, comprising:
the server acquires historical information of the second user, wherein the historical information refers to the user information of the second user recorded in history;
the server checks the self-checking information of the second user according to the historical information of the second user to obtain the self-checking information after checking;
and the server generates the information code of the second user according to the verified self-checking information and the information code generation rule.
14. The method of claim 1, further comprising:
the first client responds to a trigger signal received for a management control in an information code display interface, and displays the information code management interface, wherein the information code display interface is a user interface used for displaying the information code;
the first client side responds to a trigger signal which is received for a code scanning control in the information code management interface, scans an information code of a third user and displays an addition confirmation interface of the third user;
and the first client adds the user entry of the third user in the information code management interface.
15. A user information checking system based on information codes is characterized by comprising a first client and a second client;
the first client is used for displaying a user interface of a first functional object of a target application program, wherein the first functional object is used for realizing information reporting; in response to receiving a trigger signal of an information code display control in a user interface for the first function object, displaying an information code of a first user, wherein the information code of the first user is a graphic code generated based on user information of the first user;
the second client is used for scanning the information code of the first user and acquiring the user information of the first user; responding to the user information of the first user meeting a first condition, and sending a bayonet control instruction, wherein the bayonet control instruction is used for controlling a bayonet to be opened to permit the first user to pass through;
wherein the first condition comprises that the user information of the first user meets a health judgment index.
CN202010230013.3A 2020-03-27 2020-03-27 User information checking method and system based on information code Active CN111444992B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010230013.3A CN111444992B (en) 2020-03-27 2020-03-27 User information checking method and system based on information code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010230013.3A CN111444992B (en) 2020-03-27 2020-03-27 User information checking method and system based on information code

Publications (2)

Publication Number Publication Date
CN111444992A true CN111444992A (en) 2020-07-24
CN111444992B CN111444992B (en) 2023-04-07

Family

ID=71653964

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010230013.3A Active CN111444992B (en) 2020-03-27 2020-03-27 User information checking method and system based on information code

Country Status (1)

Country Link
CN (1) CN111444992B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111403034A (en) * 2020-03-09 2020-07-10 腾讯科技(深圳)有限公司 User information management and control method and system
CN112017031A (en) * 2020-09-01 2020-12-01 中国银行股份有限公司 Information pushing method and device
CN112529519A (en) * 2020-11-26 2021-03-19 数字广东网络建设有限公司 Epidemic prevention information acquisition system, method, device, computer equipment and storage medium
CN113467867A (en) * 2021-06-10 2021-10-01 北京达佳互联信息技术有限公司 Information processing method, information processing device, electronic equipment and storage medium
CN113867585A (en) * 2021-09-24 2021-12-31 维沃移动通信有限公司 Interface display method and device, electronic equipment and storage medium
CN113962673A (en) * 2021-12-20 2022-01-21 深圳市微付充科技有限公司 Information checking system, mobile terminal, checking machine and information checking method
CN114186575A (en) * 2021-12-16 2022-03-15 北京声智科技有限公司 Image code processing method, device, equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA3128956A1 (en) * 2015-10-09 2017-04-13 Wei Xu A method, apparatus and server of disseminating information based on a grid space
CN106652229A (en) * 2016-11-29 2017-05-10 北京千方科技股份有限公司 Method and system for depositing and extracting public bicycle
CN106846506A (en) * 2017-01-25 2017-06-13 腾讯科技(深圳)有限公司 A kind of method and system that Information Authentication is carried out based on message identification code
CN107341527A (en) * 2017-06-19 2017-11-10 上海德启信息科技有限公司 A kind of logistics increases order management method and system newly
CN107360179A (en) * 2017-07-31 2017-11-17 腾讯科技(深圳)有限公司 A kind of risk information shared method, terminal and computer-readable recording medium
US20180053138A1 (en) * 2016-08-21 2018-02-22 Certainty Logistics LLC System and method for securely transporting cargo
US10268762B1 (en) * 2013-07-19 2019-04-23 Open Invention Network Llc Color based search application interface and corresponding query control functions
CN110597832A (en) * 2019-09-12 2019-12-20 腾讯云计算(北京)有限责任公司 Government affair information processing method and device based on block chain network, electronic equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10268762B1 (en) * 2013-07-19 2019-04-23 Open Invention Network Llc Color based search application interface and corresponding query control functions
CA3128956A1 (en) * 2015-10-09 2017-04-13 Wei Xu A method, apparatus and server of disseminating information based on a grid space
US20180053138A1 (en) * 2016-08-21 2018-02-22 Certainty Logistics LLC System and method for securely transporting cargo
CN106652229A (en) * 2016-11-29 2017-05-10 北京千方科技股份有限公司 Method and system for depositing and extracting public bicycle
CN106846506A (en) * 2017-01-25 2017-06-13 腾讯科技(深圳)有限公司 A kind of method and system that Information Authentication is carried out based on message identification code
CN107341527A (en) * 2017-06-19 2017-11-10 上海德启信息科技有限公司 A kind of logistics increases order management method and system newly
CN107360179A (en) * 2017-07-31 2017-11-17 腾讯科技(深圳)有限公司 A kind of risk information shared method, terminal and computer-readable recording medium
CN110597832A (en) * 2019-09-12 2019-12-20 腾讯云计算(北京)有限责任公司 Government affair information processing method and device based on block chain network, electronic equipment and storage medium

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111403034A (en) * 2020-03-09 2020-07-10 腾讯科技(深圳)有限公司 User information management and control method and system
CN111403034B (en) * 2020-03-09 2023-04-11 腾讯科技(深圳)有限公司 User information management and control method and system
CN112017031A (en) * 2020-09-01 2020-12-01 中国银行股份有限公司 Information pushing method and device
CN112017031B (en) * 2020-09-01 2023-11-10 中国银行股份有限公司 Information pushing method and device
CN112529519A (en) * 2020-11-26 2021-03-19 数字广东网络建设有限公司 Epidemic prevention information acquisition system, method, device, computer equipment and storage medium
CN113467867A (en) * 2021-06-10 2021-10-01 北京达佳互联信息技术有限公司 Information processing method, information processing device, electronic equipment and storage medium
CN113467867B (en) * 2021-06-10 2024-05-07 北京达佳互联信息技术有限公司 Information processing method, information processing device, electronic equipment and storage medium
CN113867585A (en) * 2021-09-24 2021-12-31 维沃移动通信有限公司 Interface display method and device, electronic equipment and storage medium
CN113867585B (en) * 2021-09-24 2023-07-28 维沃移动通信有限公司 Interface display method, device, electronic equipment and storage medium
CN114186575A (en) * 2021-12-16 2022-03-15 北京声智科技有限公司 Image code processing method, device, equipment and storage medium
CN113962673A (en) * 2021-12-20 2022-01-21 深圳市微付充科技有限公司 Information checking system, mobile terminal, checking machine and information checking method

Also Published As

Publication number Publication date
CN111444992B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN111444992B (en) User information checking method and system based on information code
US11449379B2 (en) Root cause and predictive analyses for technical issues of a computing environment
US10942900B2 (en) Techniques for tenant controlled visualizations and management of files in cloud storage systems
US10284514B2 (en) Obtainability management in a social networking environment
CN111403034B (en) User information management and control method and system
CN109074265A (en) The preformed instruction of mobile cloud service
US20180247234A1 (en) Platform for management and tracking of collaborative projects
US20160330156A1 (en) Cloud based chat governance system based on behavioral patterns and situational-awareness
CN111444290A (en) Data processing method, data display method, device, equipment and storage medium
US10929491B2 (en) Social sharing path user interface insights
CN113076104A (en) Page generation method, device, equipment and storage medium
US10833963B2 (en) Adding a recommended participant to a communication system conversation
US11138239B2 (en) Bias identification in social network posts
CN108847948B (en) Method and device for creating activity group, medium and computing equipment
CN112181376B (en) Code resource management method, device, electronic equipment and medium
CN112102099B (en) Policy data processing method and device, electronic equipment and storage medium
CN113821254A (en) Interface data processing method, device, storage medium and equipment
US11256598B2 (en) Automated selection of performance monitors
US11102161B2 (en) Social networking service content sharing
CN113242148B (en) Method, device, medium and electronic equipment for generating monitoring alarm related information
CN114240339A (en) Background investigation method and device, storage medium and electronic equipment
CN108551484B (en) User information synchronization method, device, computer device and storage medium
US11068552B2 (en) Updating social media post based on subsequent related social media content
US20200356531A1 (en) Derived relationship for collaboration documents
US20150193496A1 (en) Indoor positioning service scanning with trap enhancement

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant