CN112528343A - Method, device and medium for personalized data inspection applied to fingerprint card - Google Patents

Method, device and medium for personalized data inspection applied to fingerprint card Download PDF

Info

Publication number
CN112528343A
CN112528343A CN202011609456.XA CN202011609456A CN112528343A CN 112528343 A CN112528343 A CN 112528343A CN 202011609456 A CN202011609456 A CN 202011609456A CN 112528343 A CN112528343 A CN 112528343A
Authority
CN
China
Prior art keywords
user
data
fingerprint information
target
collection module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011609456.XA
Other languages
Chinese (zh)
Inventor
邬亮
彭浩毅
蒋曲明
郭树超
刘宗文
张烨
谭春华
祁春媛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chutian Dragon Co ltd
Original Assignee
Chutian Dragon Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chutian Dragon Co ltd filed Critical Chutian Dragon Co ltd
Priority to CN202011609456.XA priority Critical patent/CN112528343A/en
Publication of CN112528343A publication Critical patent/CN112528343A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method, a device and a medium for personalized data inspection applied to a fingerprint card, wherein the method comprises the steps that a collection module acquires a plurality of user fingerprint information, each user fingerprint information is used for proving user target data of each user identity provided by a user data management terminal, and the user fingerprint information and the collection module have a binding relationship; requesting a user data management terminal to verify whether each user identity stores user fingerprint information bound to user target data; and if the verification result indicates that the user data management terminal stores the user fingerprint information bound to the user target data, the user fingerprint information is sent, and if the verification result indicates that the user fingerprint information is not stored, the user fingerprint information is not sent. User target data of the user identity can be conveniently managed through the collection module for fingerprint information of each user, false information sent by the user target data is avoided, and therefore reliable and effective detection and management of personal data of the fingerprint card are facilitated.

Description

Method, device and medium for personalized data inspection applied to fingerprint card
Technical Field
The invention relates to the technical field of data inspection of fingerprint cards, in particular to a method, a device and a medium for personalized data inspection of a fingerprint card.
Background
Since personal data in fingerprint cards are becoming more and more convenient for individuals and businesses, fingerprint personal data is also considered to be managed in the digital era and is regarded as a great concern for many people. However, the existing fingerprint card has the problems of inconvenient, unreliable and inefficient user data checking management, so the personal data checking method of the fingerprint card is a problem which needs to be solved urgently.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a method, a device and a medium for personalized data inspection applied to a fingerprint card.
The technical scheme adopted by the invention for solving the technical problems is as follows:
method for personalized data checking applied to fingerprint cards, comprising the following steps:
the method comprises the steps that a collection module obtains a plurality of user fingerprint information, each user fingerprint information is used for proving user target data of each user identity provided by a user data management terminal, and the user fingerprint information and the collection module have a binding relation;
requesting a user data management terminal to verify whether each user identity stores user fingerprint information bound to user target data;
and if the verification result indicates that the user data management terminal stores the user fingerprint information bound to the user target data, the user fingerprint information is sent, and if the verification result indicates that the user fingerprint information is not stored, the user fingerprint information is not sent.
As a preferred technical solution of the present invention, before acquiring fingerprint information of a plurality of users, the method includes:
acquiring user target data of each user identity and acquiring identification information of a collection module;
generating an identity binding request according to the user target data and the identification information of the collection module; the identity identification binding request is used for requesting to establish the corresponding relation between the user identity and the collection module;
sending a binding request for user target data of the user identity to the collection module.
As a preferred technical solution of the present invention, the acquiring module acquires a plurality of user fingerprint information, including:
the method comprises the steps that a collection module obtains user target data of each user identity from terminal equipment, and a data monitoring program arranged in the collection module is used for processing the user target data to obtain target data;
and generating user fingerprint information to be issued aiming at the target data.
As a preferred technical solution of the present invention, the method further includes storing, in the collection module, a private key of the user target data of each user identity, and storing, in a document of the user target data of each user identity, a public key corresponding to the private key.
As a preferred technical solution of the present invention, after the sending of the user fingerprint information, the method includes:
acquiring an acquisition request aiming at user target data, which is generated by a data user according to the user fingerprint information;
and responding to the acquisition request, performing authorization confirmation on the target data stored in the collection module by using the private key to obtain data after authorization confirmation, and sending the data after authorization confirmation to a data user.
As a preferable aspect of the present invention, the method further includes:
when user fingerprint information is uploaded to the collection module, preprocessing a plurality of user fingerprint information to be uploaded to obtain data to be uploaded in a first format;
determining a target rule corresponding to user fingerprint information to be uploaded from a preset rule base according to a plurality of user fingerprint information to be uploaded;
and verifying target sample data of the user fingerprint information to be uploaded in the first format according to the target rule, determining whether the target sample data accords with the target rule, and uploading the uploaded user fingerprint information to a collection module when the uploaded user fingerprint information accords with the target rule.
As a preferred technical solution of the present invention, the preprocessing of a plurality of user fingerprint information to be uploaded includes:
acquiring a data sample of user fingerprint information to be uploaded, wherein the data sample comprises a sample label, and the sample label comprises target field data;
inputting the data sample into an initial model to obtain predicted field data;
and determining a loss value based on the prediction field data and the target sample data, and training the initial model based on the loss value until a training stopping condition is reached to obtain a preprocessing model.
As a preferred technical solution of the present invention, under the condition that the target field data does not meet the target rule, determining that the data of the target field is violation information;
and determining a target uploading mode of the user fingerprint information to be uploaded according to the violation information, and uploading the user fingerprint information to be uploaded to a collection module.
Device for personalized data checking applied to fingerprint cards, comprising the following:
the system comprises a collecting module, a data processing module and a data processing module, wherein the collecting module acquires a plurality of user fingerprint information, each user fingerprint information is used for proving user target data of each user identity provided by a user data management terminal, and the user fingerprint information and the collecting module have a binding relationship;
the verification module requests the user data management terminal to verify whether the user identity stores the user fingerprint information bound to the user target data;
and the feedback module is used for sending the user fingerprint information if the verification result shows that the user data management terminal stores the user fingerprint information bound to the user target data, and not sending the user fingerprint information if the verification result shows that the user fingerprint information is not stored.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method.
Compared with the prior art, the invention has the beneficial effects that:
the collection module which has a binding relation with the user target data can request the collection module to verify whether each user identity is stored or not to verify whether user fingerprint information bound to the user target data is stored or not after the user target data used for describing the user identity provided by the terminal equipment is obtained; if so, the user fingerprint information can be considered to be real and effective, and can be sent out through the collection module. The scheme not only enables the user target data of the user identity to conveniently manage the fingerprint information of each user through the collection module, and avoids the user target data from sending false information, thereby being convenient for reliably and effectively detecting and managing the personal data of the fingerprint card.
Drawings
Fig. 1 is a flowchart of an embodiment of a method applied to personalized data check of a fingerprint card according to an embodiment of the present invention.
Fig. 2 is a flow chart of another embodiment of the invention, which is applied to the method for checking the personalized data of the fingerprint card.
Fig. 3 is a flow chart of another embodiment of the invention, which is applied to the method for checking the personalized data of the fingerprint card.
Fig. 4 is a schematic view of the overall structure of the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a method for personal data inspection of a fingerprint card, which is mainly used for more convenient and reliable personal data inspection management of the fingerprint card, and specifically comprises the following steps according to the following drawings 1-4:
the collecting module obtains a plurality of user fingerprint information according to step 101, each user fingerprint information is used for proving user target data of each user identity provided by the user data management terminal, and the user fingerprint information and the collecting module have a binding relationship.
102, requesting a user data management terminal to verify whether each user identity stores user fingerprint information bound to user target data;
the collection module may build a trusted execution environment on the hardware device to protect program code and data in the collection module from being disclosed and modified, which in turn may protect the privacy and security of user fingerprint information data in the collection module. In practical applications, there are various types of collection modules of fingerprint cards, and in the embodiment of the present specification, there is no particular limitation on the specific model of the fingerprint card or the collection module of the fingerprint card. Of course, the fingerprint card may also include a terminal device or a server on which the collection chip is mounted.
The collection module can be understood as a data chain formed by sequentially storing a plurality of blocks, thereby realizing mutual authentication between the data chains and forming a non-tampered block. Each block can be understood as a data block (unit of storage data). The block chain is a decentralized database, and is a series of data blocks generated by correlating with each other by using a cryptographic method, and each data block contains information of one network transaction, which is used for verifying the validity of the information and generating a next block. The block chain is formed by connecting the blocks end to end. If the data in the block needs to be modified, the contents of all blocks after the block need to be modified, and the data backed up by all nodes in the blockchain network needs to be modified. Therefore, the blockchain has the characteristic of being difficult to tamper and delete, and the blockchain has reliability as a method for keeping the integrity of the content after the data is stored in the blockchain.
The block chain passing platform provides distributed digital identity services. In particular, user target data for user identity may be requested by an application for managing user identity to a distributed identity server to create user target data for user identity for individuals and documents for user target data for user identity. In practical applications, user target data of user identity can be stored in the blockchain platform.
The user target data of the user identity can also utilize the collection module or an application which is in communication connection with the collection module and is used for managing the user fingerprint information to request to establish the binding relationship between the user fingerprint information and the collection module, so that the collection module can be conveniently utilized to detect and manage the data of the individual user fingerprint.
Step 201, before acquiring a plurality of user fingerprint information, the following steps are also executed:
step 202, acquiring user target data of each user identity, and acquiring identification information of a collection module;
step 203, generating an identity binding request according to the user target data and the identification information of the collection module; the identity identification binding request is used for requesting to establish the corresponding relation between the user identity and the collection module;
step 204, sending a binding request of the user target data of the user identity to the collection module.
The collecting module responds to the user target data binding request of the user identity, and the corresponding relation information between the user target data storage of the user identity and the identification information of the collecting module is obtained, so that the establishment of the binding relation between the collecting module and the user target data of the user identity is completed.
The step of acquiring the fingerprint information of the plurality of users by the collecting module specifically comprises the following steps:
the method comprises the steps that a collection module obtains user target data of each user identity from terminal equipment, and a data monitoring program arranged in the collection module is used for processing the user target data to obtain target data;
and generating user fingerprint information to be issued aiming at the target data.
The collection module stores the private key of the user target data of each user identity, the public key corresponding to the private key is stored in the document of the user target data of each user identity,
the collection module may also generate a set of key pairs for user target data binding with the user identity, the private keys of which may be stored in the collection module.
After the user fingerprint information is sent, the method comprises the following steps:
acquiring an acquisition request aiming at user target data, which is generated by a data user according to the user fingerprint information;
and responding to the acquisition request, performing authorization confirmation on the target data stored in the collection module by using a private key to obtain data after authorization confirmation, and sending the data after authorization confirmation to a data user.
Therefore, the user target data can utilize the private key stored in the collection module to authorize and confirm the operation instruction or the personal data, and other users can utilize the public key in the user target data to authorize and confirm the operation instruction or the personal fingerprint data, so as to realize the verification of other fingerprint user identity users. This also allows the user identity itself to be effectively managed by the collection module for personal data assets and personal identities. The user target data of the user identity may contain information enabling the identity of the owner of the data in the fingerprint card, which is the fingerprint data in the fingerprint card entered by each user himself.
Since the information stored in the collection module cannot be tampered, the credibility of the stored fingerprint data can be ensured. When the collection module is required to be used for managing personal data assets, the execution main body can automatically request to acquire the user fingerprint information stored in the collection module, the operation is convenient and fast, and the reliability can be guaranteed.
The collection module stores the private key of the user target data, and the public key corresponding to the private key is stored in the collection module. Therefore, the collection module may be used to send a data description information verification request to the terminal device, where the data description information may include: the identity identification information of the user target data and the data description information after the private key digital authorization in the collection module are utilized.
If the verification result indicates step 104, the user data management side stores the user fingerprint information bound to the user target data, and sends the user fingerprint information, and if the verification result indicates step 105, the user fingerprint information is not stored, and the user fingerprint information is not sent.
The user fingerprint information is sent to the data management department, so that the data management department can obtain that the user target data has the fingerprint information indicated by the data description information, and therefore, the data management department can provide sending, transferring and the like of the fingerprint information. The data management department may be one application or different applications, and is not limited in particular.
Step 301, when user fingerprint information is uploaded to a collection module, preprocessing a plurality of user fingerprint information to be uploaded to obtain data to be uploaded in a first format;
step 302, determining a target rule corresponding to user fingerprint information to be uploaded from a preset rule base according to a plurality of user fingerprint information to be uploaded;
and 303, auditing target sample data of the user fingerprint information to be uploaded in the first format according to the target rule, determining whether the target sample data accords with the target rule, and uploading the uploaded user fingerprint information to a collection module when the uploaded user fingerprint information accords with the target rule.
In order to know the risk of the user fingerprint information to be uploaded in advance, the user fingerprint information to be uploaded can be preprocessed according to the user fingerprint information to be uploaded to obtain data to be uploaded in a first format; determining a target rule corresponding to the data to be uploaded from a preset rule base according to the fingerprint information of a plurality of users to be uploaded; and then, directly auditing the data of the target sample of the user fingerprint information to be uploaded in the first format based on the target rule, determining whether the data of the target sample accords with the target rule, and uploading the user fingerprint information to be uploaded to the collection module under the condition that the data of the target sample accords with the target rule, so that the user fingerprint information to be uploaded is self-checked before being uploaded to the collection module, whether the user fingerprint information to be uploaded has a compliance risk is known in advance, non-compliance can be managed in advance, and the data uploaded to the target collection module is ensured to accord with the target rule.
The preprocessing of the fingerprint information of the user to be uploaded refers to the step of carrying out standardized processing on the fingerprint information of the user to be uploaded, and processing the fingerprint information of the user to be uploaded in different formats into data in a uniform format (namely, a first format), wherein the first format is a format matched with a target rule corresponding to the fingerprint information of the user to be uploaded, and the fingerprint information of the user to be uploaded in the first format refers to the fingerprint information of the user to be uploaded including a target data sample.
The method for preprocessing the fingerprint information of a plurality of users to be uploaded comprises the following steps:
step 401, obtaining a data sample of user fingerprint information to be uploaded, wherein the data sample comprises a sample label, and the sample label comprises target field data;
step 402, inputting a data sample into an initial model to obtain predicted field data;
and 403, determining a loss value based on the prediction field data and the target sample data, and training the initial model based on the loss value until a training stopping condition is reached to obtain a preprocessing model.
In the subsequent rule matching process in the uploading of different user fingerprint information, the required data samples are different, so that the user fingerprint information to be uploaded should correspond to different extraction rules, that is, each user fingerprint information to be uploaded corresponds to a trained preprocessing model, and the preprocessing model can process the user fingerprint information to be uploaded at the moment and output the user fingerprint information to be uploaded in the first format. During specific implementation, each preprocessing model is configured with an identifier, a corresponding relationship exists between each preprocessing model and each model identifier, and after the fingerprint information of the user to be uploaded is determined, the model corresponding to the model identifier can be determined as the preprocessing model corresponding to the fingerprint information of the user to be uploaded according to the corresponding relationship between the preprocessing models and the model identifiers.
And calculating a cross entropy loss function by the prediction field data and the target field data included by the sample label to generate a loss value. The sample label is a result which is really output by the preprocessing model, namely, the target field data included in the sample label is a real result, the data sample is input into the initial model, the output prediction field data is a prediction result, the prediction result is close to the real result when the difference threshold value between the prediction result and the real result indicates that the prediction result is close to the real result, and the initial model is trained to obtain the preprocessing model.
The difference between the prediction result and the real result of the model can be visually shown by calculating the loss value, the initial model is trained in a targeted manner, parameters are adjusted, and the model training speed and the model training effect can be effectively improved.
Determining the data of the target field as violation information under the condition that the data of the target field does not accord with the target rule;
and determining a target uploading mode of the fingerprint information of the user to be uploaded according to the violation information, and uploading the fingerprint information of the user to be uploaded to the collection module.
Sending violation report information of user fingerprint information to be uploaded to a collection module under the condition that the violation information belongs to target violation information and meets a processing condition, determining the user fingerprint information to be uploaded as data to be processed, and uploading the processed user fingerprint information to be uploaded to the collection module under the condition that the processing of the data to be uploaded is finished; and sending violation warning information of the data to be uploaded to the collection module under the condition that the violation information belongs to the target violation information and does not meet the processing conditions.
And if the violation information does not belong to the target violation information and the violation information of the target field indicating the fingerprint information of the user to be uploaded does not relate to the limit information of the collection module, processing the violation information to ensure that the violation information is in compliance and then uploading the violation information, so that the fingerprint information of the user to be uploaded is directly processed under the condition that the violation information does not belong to the target violation information, and the violation information is uploaded to the collection module under the condition that the fingerprint information of the user to be uploaded is completely processed.
The invention also provides a device for checking the personalized data applied to the fingerprint card, which comprises the following specific structures:
the collecting module is used for acquiring a plurality of user fingerprint information, each user fingerprint information is used for proving user target data of each user identity provided by the user data management terminal, and the user fingerprint information and the collecting module have a binding relationship;
the verification module requests the user data management terminal to verify whether the user identity stores the user fingerprint information bound to the user target data;
and the feedback module is used for sending the user fingerprint information if the verification result shows that the user data management terminal stores the user fingerprint information bound to the user target data, and not sending the user fingerprint information if the verification result shows that the user fingerprint information is not stored.
For the above specific limitations of the apparatus for personalized data inspection applied to fingerprint cards, reference may be made to the above limitations of the method for personalized data inspection applied to fingerprint cards, and details thereof are not repeated herein. The various modules in the above described apparatus for personalized data checking applied to fingerprint cards can be implemented in whole or in part by software, hardware and combinations thereof. The modules can be embedded in a processor in a mobile terminal device in a hardware form, or can be stored in a memory in other mobile computer devices in a software form, so that the processor can call and execute the corresponding operations of the modules.
An embodiment of the present specification further provides a computer-readable storage medium, which is an exemplary scheme of the computer-readable storage medium of the embodiment. It should be noted that the technical solution of the storage medium and the technical solution of the data uploading method belong to the same concept, and details that are not described in detail in the technical solution of the storage medium can be referred to the description of the technical solution of the data uploading method.
Compared with the prior art, the collection module which has a binding relation with the user target data can request the collection module to verify whether each user identity is stored or not after the user target data used for describing the user identity provided by the terminal equipment is obtained; if so, the user fingerprint information can be considered to be real and effective, and can be sent out through the collection module. The scheme not only enables the user target data of the user identity to conveniently manage the fingerprint information of each user through the collection module, and avoids the user target data from sending false information, thereby being convenient for reliably and effectively detecting and managing the personal data of the fingerprint card.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (10)

1. Method for personalized data checking applied to fingerprint cards, characterized in that it comprises the following steps:
the method comprises the steps that a collection module obtains a plurality of user fingerprint information, each user fingerprint information is used for proving user target data of each user identity provided by a user data management terminal, and the user fingerprint information and the collection module have a binding relation;
requesting a user data management terminal to verify whether each user identity stores user fingerprint information bound to user target data;
and if the verification result indicates that the user data management terminal stores the user fingerprint information bound to the user target data, the user fingerprint information is sent, and if the verification result indicates that the user fingerprint information is not stored, the user fingerprint information is not sent.
2. The method of claim 1, wherein prior to obtaining the plurality of user fingerprint information, comprising:
acquiring user target data of each user identity and acquiring identification information of a collection module;
generating an identity binding request according to the user target data and the identification information of the collection module; the identity identification binding request is used for requesting to establish the corresponding relation between the user identity and the collection module;
sending a binding request for user target data of the user identity to the collection module.
3. The method of claim 2, wherein the collecting module obtains a plurality of user fingerprint information, comprising:
the method comprises the steps that a collection module obtains user target data of each user identity from terminal equipment, and a data monitoring program arranged in the collection module is used for processing the user target data to obtain target data;
and generating user fingerprint information to be issued aiming at the target data.
4. The method of claim 3, further comprising:
the collection module stores private keys of user target data of each user identity, and public keys corresponding to the private keys are stored in documents of the user target data of each user identity.
5. The method of claim 4, wherein after transmitting the user fingerprint information, comprising:
acquiring an acquisition request aiming at user target data, which is generated by a data user according to the user fingerprint information;
and responding to the acquisition request, performing authorization confirmation on the target data stored in the collection module by using the private key to obtain data after authorization confirmation, and sending the data after authorization confirmation to a data user.
6. The method of claim 1, further comprising:
when user fingerprint information is uploaded to the collection module, preprocessing a plurality of user fingerprint information to be uploaded to obtain data to be uploaded in a first format;
determining a target rule corresponding to user fingerprint information to be uploaded from a preset rule base according to a plurality of user fingerprint information to be uploaded;
and verifying target sample data of the user fingerprint information to be uploaded in the first format according to a target rule, determining whether the target sample data accords with the target rule, and uploading the uploaded user fingerprint information to a collection module when the uploaded user fingerprint information accords with the target rule.
7. The method of claim 6, wherein the preprocessing of the plurality of user fingerprint information to be uploaded comprises:
acquiring a data sample of user fingerprint information to be uploaded, wherein the data sample comprises a sample label, and the sample label comprises target field data;
inputting the data sample into an initial model to obtain predicted field data;
and determining a loss value based on the prediction field data and the target sample data, and training the initial model based on the loss value until a training stopping condition is reached to obtain a preprocessing model.
8. The method according to claim 6, wherein in the case that the target field data does not meet a target rule, determining the data of the target field as violation information;
and determining a target uploading mode of the user fingerprint information to be uploaded according to the violation information, and uploading the user fingerprint information to be uploaded to a collection module.
9. Device for personalized data checking applied to fingerprint cards, characterized in that it comprises the following:
the system comprises a collecting module, a data processing module and a data processing module, wherein the collecting module acquires a plurality of user fingerprint information, each user fingerprint information is used for proving user target data of each user identity provided by a user data management terminal, and the user fingerprint information and the collecting module have a binding relationship;
the verification module requests the user data management terminal to verify whether the user identity stores the user fingerprint information bound to the user target data;
and the feedback module is used for sending the user fingerprint information if the verification result shows that the user data management terminal stores the user fingerprint information bound to the user target data, and not sending the user fingerprint information if the verification result shows that the user fingerprint information is not stored.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 8.
CN202011609456.XA 2020-12-30 2020-12-30 Method, device and medium for personalized data inspection applied to fingerprint card Pending CN112528343A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011609456.XA CN112528343A (en) 2020-12-30 2020-12-30 Method, device and medium for personalized data inspection applied to fingerprint card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011609456.XA CN112528343A (en) 2020-12-30 2020-12-30 Method, device and medium for personalized data inspection applied to fingerprint card

Publications (1)

Publication Number Publication Date
CN112528343A true CN112528343A (en) 2021-03-19

Family

ID=74977208

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011609456.XA Pending CN112528343A (en) 2020-12-30 2020-12-30 Method, device and medium for personalized data inspection applied to fingerprint card

Country Status (1)

Country Link
CN (1) CN112528343A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101784411B1 (en) * 2016-05-09 2017-10-12 (재)한국건설생활환경시험연구원 Controlling system for counterfeiting, authenticating, and accessing using plurality of security of information
CN111598573A (en) * 2020-04-10 2020-08-28 维沃移动通信有限公司 Equipment fingerprint verification method and device
CN111814195A (en) * 2020-09-04 2020-10-23 支付宝(杭州)信息技术有限公司 Data management method, device and equipment based on trusted hardware
CN111932426A (en) * 2020-09-15 2020-11-13 支付宝(杭州)信息技术有限公司 Identity management method, device and equipment based on trusted hardware
CN112015747A (en) * 2020-09-14 2020-12-01 支付宝(杭州)信息技术有限公司 Data uploading method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101784411B1 (en) * 2016-05-09 2017-10-12 (재)한국건설생활환경시험연구원 Controlling system for counterfeiting, authenticating, and accessing using plurality of security of information
CN111598573A (en) * 2020-04-10 2020-08-28 维沃移动通信有限公司 Equipment fingerprint verification method and device
CN111814195A (en) * 2020-09-04 2020-10-23 支付宝(杭州)信息技术有限公司 Data management method, device and equipment based on trusted hardware
CN112015747A (en) * 2020-09-14 2020-12-01 支付宝(杭州)信息技术有限公司 Data uploading method and device
CN111932426A (en) * 2020-09-15 2020-11-13 支付宝(杭州)信息技术有限公司 Identity management method, device and equipment based on trusted hardware

Similar Documents

Publication Publication Date Title
CN109088871B (en) Data transmission method and system based on block chain technology
CN110098932B (en) Electronic document signing method based on safe electronic notarization technology
CN110879903A (en) Evidence storage method, evidence verification method, evidence storage device, evidence verification device, evidence storage equipment and evidence verification medium
CN110096639B (en) Method and device for monitoring and obtaining evidence of infringement and terminal equipment
EP4007984A1 (en) Self-sovereign identity systems and methods for identification documents
CN109948320B (en) Block chain-based identity recognition management method, device, medium and electronic equipment
CN112487042B (en) Electric energy metering data processing method, device, computer equipment and storage medium
CN110598478A (en) Block chain based evidence verification method, device, equipment and storage medium
CN115270193B (en) Data file secure sharing method and device based on block chain and collaborative synchronization
CN110740140A (en) network information security supervision system based on cloud platform
CN110969723B (en) Data management method, detection device, server, and computer-readable storage medium
CN110825776A (en) Air quality detection report processing method and device, computing equipment and storage medium
CN111339141A (en) Data transmission method, block link node equipment and medium
CN109150898B (en) Method and apparatus for processing information
CN110555669A (en) electronic certificate, electronic seal and application method and equipment for unified identity authentication
CN110910141A (en) Transaction processing method, system, device, equipment and computer readable storage medium
CN114547701A (en) Block chain-based tamper-proof identification chip information trusted storage system
CN107294981B (en) Authentication method and equipment
US20200334430A1 (en) Self-sovereign identity systems and methods for identification documents
CN112862589A (en) Identity verification method, device and system in financial scene
CN113988862B (en) Safety early warning system and safety early warning method for block chain data chaining method
CN112528343A (en) Method, device and medium for personalized data inspection applied to fingerprint card
CN113938314B (en) Method and device for detecting encrypted traffic and storage medium
CN111654591B (en) Picture tamper-proof method, computer device and storage medium
CN114549221A (en) Vehicle accident loss processing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination