CN114253984A - Information updating method and device, electronic equipment and storage medium - Google Patents

Information updating method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114253984A
CN114253984A CN202111494671.4A CN202111494671A CN114253984A CN 114253984 A CN114253984 A CN 114253984A CN 202111494671 A CN202111494671 A CN 202111494671A CN 114253984 A CN114253984 A CN 114253984A
Authority
CN
China
Prior art keywords
verification
data set
target
target data
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202111494671.4A
Other languages
Chinese (zh)
Inventor
陆明亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Apollo Zhilian Beijing Technology Co Ltd
Apollo Zhixing Technology Guangzhou Co Ltd
Original Assignee
Apollo Zhilian Beijing Technology Co Ltd
Apollo Zhixing Technology Guangzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Apollo Zhilian Beijing Technology Co Ltd, Apollo Zhixing Technology Guangzhou Co Ltd filed Critical Apollo Zhilian Beijing Technology Co Ltd
Priority to CN202111494671.4A priority Critical patent/CN114253984A/en
Publication of CN114253984A publication Critical patent/CN114253984A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The disclosure provides an information updating method, relates to the technical field of computers, and particularly relates to intelligent cockpit, internet of vehicles and cloud computing technology. The specific implementation scheme is as follows: in response to receiving the target data set, obtaining an update communication identifier in the target data set; in response to receiving the communication request, acquiring a target communication identifier corresponding to the communication request; performing a first verification operation according to the target communication identifier and the updated communication identifier; and in response to receiving a result of a first verification operation which represents that verification is successful, performing information updating according to the target data set. The disclosure also provides an information updating apparatus, an electronic device and a storage medium.

Description

Information updating method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technology, and in particular, to intelligent cockpit, internet of vehicles, and cloud computing technology. More specifically, the present disclosure provides an information updating method, apparatus, electronic device, and storage medium.
Background
To obtain internet services from multiple websites, a user may create accounts on the websites. After creating the account, the user may update the information of the account. If the account information of each website needs to be updated, the user needs to enter each website respectively for information updating.
Disclosure of Invention
The disclosure provides an information updating method, an information updating device, an information updating apparatus and a storage medium.
According to a first aspect, there is provided an information updating method, the method comprising: in response to receiving a target data set, acquiring an update communication identifier in the target data set; responding to the received communication request, and acquiring a target communication identifier corresponding to the communication request; performing a first verification operation according to the target communication identifier and the updated communication identifier; and in response to receiving a result of a first verification operation representing successful verification, performing information updating according to the target data set.
According to a second aspect, there is provided an information updating method, the method comprising: aiming at a plurality of target service nodes, acquiring a target data set related to each target service node to obtain a plurality of target data sets, wherein each target data set comprises an updating communication identifier; according to the current communication identification, the target data set is sent to each target service node; and sending a communication request to each target service node according to the updated communication identifier so as to update information.
According to a third aspect, there is provided an information updating apparatus comprising: the first acquisition module is used for responding to the received target data set and acquiring the updated communication identifier in the target data set; the second acquisition module is used for responding to the received communication request and acquiring a target communication identifier corresponding to the communication request; the first verification module is used for performing first verification operation according to the target communication identifier and the updated communication identifier; and the updating module is used for responding to the received result of the first verification operation which represents that the verification is successful and updating information according to the target data set.
According to a fourth aspect, there is provided an information updating apparatus comprising: a sixth obtaining module, configured to obtain, for multiple target service nodes, a target data set associated with each target service node to obtain multiple target data sets, where each of the multiple target data sets includes an update communication identifier; a first sending module, configured to send the target data set associated with each service node to each target service node according to a current communication identifier; and a second sending module, configured to send a communication request to each target serving node according to the update communication identifier, so as to update information.
According to a fifth aspect, there is provided an electronic device comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method provided in accordance with the present disclosure.
According to a sixth aspect, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing a computer to perform a method provided in accordance with the present disclosure.
According to a seventh aspect, there is provided a computer program product comprising a computer program which, when executed by a processor, implements a method provided according to the present disclosure.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
FIG. 1 is a schematic diagram of an exemplary system architecture to which information update methods and apparatus may be applied, according to one embodiment of the present disclosure;
FIG. 2 is a flow diagram of an information update method according to one embodiment of the present disclosure;
FIG. 3 is a flow diagram of an information update method according to another embodiment of the present disclosure;
FIG. 4 is a flow diagram of an information update method according to one embodiment of the present disclosure;
fig. 5A-5B are schematic diagrams of an information update method according to one embodiment of the present disclosure;
FIG. 6 is a block diagram of an information updater apparatus, according to one embodiment of the present disclosure;
FIG. 7 is a block diagram of an information updating apparatus according to one embodiment of the present disclosure; and
fig. 8 is a block diagram of an electronic device of an information updating method according to one embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
When creating an account, the user needs to fill in some information, such as a mobile phone number or a mailbox. However, the information filled out by the user may change. In order to continue using the internet service, the user needs to log on to a plurality of different websites and enter an information modification page to update the information. Alternatively, the user may update the information through manual customer service.
However, in the information modification page of the website, the user needs to perform multiple operations to complete the modification. In addition, for a plurality of websites, the user needs to update information at each website, which is tedious in operation and time-consuming. When information is updated by manual customer service, communication with customer service staff is required, and labor cost and time cost are consumed.
Fig. 1 is a schematic diagram of an exemplary system architecture to which information update methods and apparatus may be applied, according to one embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, a system architecture 100 according to this embodiment may include a terminal device 101, a network 102, and a plurality of servers 103. Network 102 serves as a medium for providing communication links between terminal equipment 101 and a plurality of servers 103. Network 102 may include various connection types, such as wired and/or wireless communication links, and so forth.
A user may use terminal device 101 to interact with server 103 over network 102 to receive or send messages and the like. Terminal device 101 may be a variety of electronic devices including, but not limited to, a smart phone, a tablet computer, a laptop portable computer, and the like.
The server 103 may be a server that provides various services, such as a background management server (for example only) that provides support for websites browsed by users using the terminal devices 101. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
The terminal device 101 may acquire information filled in by the user and send the information to the server 103 via the network 102.
Fig. 2 is a flow chart of an information updating method according to one embodiment of the present disclosure.
As shown in fig. 2, the method 200 may include operations S210 to S240. The method 200 may be applied to each of a plurality of service nodes. Each service node may be deployed on one or more servers 103 in fig. 1, for example.
In operation S210, in response to receiving the target data set, an update communication identification in the target data set is obtained.
For example, the serving node may have stored therein a current communication identification of the user. In one example, the current communication identifier may be a mobile phone number, a mailbox account number, or the like currently used by the user.
It will be appreciated by those skilled in the art that a service node may be a node providing any service, such as a node providing take-away services, a node providing taxi-taking services, or a node providing e-commerce services, etc. The present disclosure is not so limited.
In one example, the update communication identifier may be a mobile phone number or a mailbox account number newly applied by the user.
For example, the target data set may be transmitted based on the current communication identification and may be received by the serving node.
In an embodiment of the present disclosure, the target data set may further include first authentication data.
In the embodiment of the present disclosure, the first authentication data in the target data set may also be acquired.
For example, the target data set may be acquired by a client. The first authentication data may be generated when performing an operation of obtaining a target data set of the serving node. In one example, corresponding first authentication data may be generated for a plurality of service nodes. The same or different first authentication data may be generated for different serving nodes.
In embodiments of the present disclosure, the target data set may also include verification data.
In embodiments of the present disclosure, verification data for the target data set may also be obtained.
For example, the verification data may include at least one of: presetting identity data and presetting safety data. In one example, the preset identity data may be a user's name, account name, identification number, and the like. In one example, the preset security data may be a user-set secret key question, secret key answer, security password, or the like.
In the disclosed embodiment, the target data set may further include a current terminal identification.
In the embodiment of the present disclosure, the current terminal identifier in the target data set may also be obtained.
For example, the current terminal identity may be the code of the terminal device bound to the serving node.
In operation S220, in response to receiving the communication request, a target communication identifier corresponding to the communication request is acquired.
In the disclosed embodiment, the communication request may be sent according to the target communication identifier.
For example, the target communication identity may be a different communication identity than the current communication identity.
For example, the target data set is sent by the user using the current phone number. Then, the communication request is sent by the user by using other mobile phone numbers. In one example, the other mobile phone number may be the mobile phone number of the new application described above, that is, the communication request is sent according to the updated communication identifier.
In the embodiment of the present disclosure, according to the communication request, the second authentication data may also be acquired.
For example, in response to receiving the communication request, the target communication identification and the second authentication data may be acquired.
In the embodiment of the present disclosure, the target terminal identifier may be obtained according to the communication request.
For example, the target terminal identification may be the encoding of the terminal device that sent the communication request.
In operation S230, a first verification operation is performed according to the target communication identifier and the updated communication identifier.
For example, a first verification operation may be performed to verify whether the target communication identity is consistent with the update communication identity.
In one example, the target communication identifier may be a mobile phone number or a mailbox account, and the update communication identifier may also be a mobile phone number or a mailbox account. Whether the two mobile phone numbers are the same or not can be verified, or whether the two mailbox account numbers are the same or not can be verified.
In the embodiment of the present disclosure, the second verification operation may be performed according to the second authentication data and the first authentication data.
For example, a second verification operation may be performed to verify whether the second authentication data is consistent with the first authentication data.
In one example, it may be verified whether the first authentication data and the second authentication data are the same, or a similarity of the first authentication data and the second authentication data may also be calculated for verification.
In the embodiment of the present disclosure, the third verification operation may be performed according to the verification data.
For example, the third authentication operation may be performed according to the preset identity data and the preset security data described above. For example, it may be verified whether the identity data of the user stored in the service node is consistent with the preset identity data in the target data set. It is also possible to verify whether the security data of the user stored in the service node are consistent with the preset security data in the target data set
In the embodiment of the present disclosure, a fourth verification operation may be performed according to the target terminal identifier and the current terminal identifier.
For example, a fourth verification operation may be performed to verify whether the target terminal identification coincides with the current terminal identification.
In one example, the target terminal identifier may be a code of a terminal device, and the current terminal identifier may also be a code of a terminal device. Whether the codes of the two terminal devices are consistent or not can be verified to verify.
In operation S240, in response to receiving a result of a first verification operation that characterizes a successful verification, information updating is performed according to the target data set.
For example, the result of the first verification operation may be a verification success. In one example, the target communication identifier corresponding to the communication request is a mobile phone number, and the update communication identifier is also a mobile phone number. If the two mobile phone numbers are consistent, the verification is successful. The current communication identifier can only be replaced by the updated information identifier in the target data set, thereby improving the safety of information update
In the embodiment of the disclosure, information updating is performed according to the target data set in response to receiving a result of a first verification operation that characterizes successful verification and a result of a second verification operation that characterizes successful verification.
For example, the result of the second verification operation may be a verification success. In one example, the first authentication data may be a key in the target data set. The second authentication data is a key obtained from the communication request. If the two are identical, the verification is successful. By adding one time of verification, the safety can be further improved.
In the embodiment of the disclosure, information updating is performed according to the target data set in response to receiving a result of a first verification operation that characterizes successful verification and a result of a third verification operation that characterizes successful verification.
For example, the verification result of the third verification operation may be verification success. In one example, if the name, account name, certificate information, and the like of the user stored in the service node are all consistent with those in the preset identity data, and the secret protection question, secret protection answer, security password, and the like set by the user stored in the service node are consistent with the preset security data, the verification is successful. Whether the user requesting information updating is the original registered user or not can be verified, malicious information change caused by loss of the mobile phone number or the mailbox account is avoided, and safety is further improved.
In the embodiment of the disclosure, information updating is performed according to the target data set in response to receiving the result of the first verification operation that the characterization verification is successful and the result of the fourth verification operation that the characterization verification is successful.
For example, the verification result of the fourth verification operation may be verification success. In one example, if the codes of the two terminal devices described above are identical, the verification is successful. The method and the system can ensure that the user can only use the terminal bound with the service node to update the information, and further improve the safety.
Those skilled in the art will appreciate that the verification results of the first, second, third, and fourth verification operations may also be verification failures. As long as the verification result of the verification failure is received, no information update is performed.
In the disclosed embodiment, a first request for confirming whether to update may be issued based on a target data set.
For example, the first request is for the user to confirm whether or not to update the information.
In the disclosed embodiment, in response to receiving a positive response for confirming the update, the current communication identifier is replaced with the updated communication identifier for information update.
For example, after the user confirms the update, in response to receiving a positive response for confirming the update, the old mobile phone number is replaced with the newly applied mobile phone number as described above to update the information.
Through the embodiment of the disclosure, the user can update the information without entering the information modification page of the website. The condition is provided for batch updating of information of a plurality of service nodes.
Fig. 3 is a flow chart of an information updating method according to another embodiment of the present disclosure.
As shown in fig. 3, the method 300 may include operations S301 to S311. The method 300 may be applied to each of a plurality of serving nodes.
In operation S301, in response to receiving the target data set, the update communication identifier, the first authentication data, the verification data, and the current terminal identifier in the target data set are acquired.
For example, the user's current communication identification may be a mobile phone number "13456789123". The service node receives a short message sent by the terminal equipment with the mobile phone number of '13456789123' to receive the target data set.
For example, the update communication identification may be a mobile phone number "12456789123". The first authentication data may be "123" and the verification data may be a secret key question 1 and a secret key answer 1. The privacy question 1 may be "favorite color", the privacy answer 1 may be "green", and the current terminal identification may be "uuux".
In operation S302, is the user' S data stored in the authentication service node consistent with the authentication data in the target data set?
For example, the third verification operation described above may be performed through operation S302. In a specific implementation, if the data of the user stored in the service node is consistent with the verification data in the target data set, for example, the answer to the secret protection question 1 stored in the service node is also green, operation S303 may be performed. If the user data stored in the service node is inconsistent with the verification data in the target data set, operation S311 may be performed without updating information.
In operation S303, in response to receiving the communication request, a target communication identifier corresponding to the communication request is acquired.
For example, a communication request (e.g., in the form of a short message) received by the serving node may not be sent based on the current communication identifier "13456789123". In one example, the service node may receive the short message which is not sent by the terminal device with the mobile phone number "13456789123". In this case, the service node may obtain the mobile phone number of the terminal sending the short message to obtain the target communication identifier.
In operation S304, is the verification-target communication identification consistent with the update communication identification?
For example, the first verification operation described above may be performed through operation S304. In one specific implementation, if the target communication identifier is "12456789123", and is consistent with the updated communication identifier, operation S305 may be performed. For another example, if the target communication identifier is "11456789123", which is not consistent with the updated communication identifier, operation S311 may be performed.
In operation 305, second authentication data is acquired according to the communication request.
For example, in operation S303, the short message received by the service node may include a second authentication data.
In operation S306, it is verified that the second authentication data is consistent with the first authentication data?
For example, the second verification operation described above may be performed through operation S306. In a specific implementation, if the second authentication data is "123" and is consistent with the first authentication data, operation S307 may be performed. For another example, if the second authentication data is "456" and does not match the first authentication data, operation S310 may be performed without updating information.
In operation S307, a target terminal identification is acquired according to the communication request.
For example, a communication request (e.g., in the form of a short message) received by the service node is sent by a terminal device, and the code of the terminal device may be obtained to obtain the target terminal identifier.
In operation S308, is the verification target terminal identification consistent with the current terminal identification?
For example, the fourth verification operation described above may be performed through operation S307. In a specific implementation manner, if the target terminal identifier is "uuux" and is consistent with the current terminal identifier, operation S308 may be performed. For another example, if the target terminal identifier is "uuuy" and is not consistent with the current terminal identifier, operation S311 may be performed.
In operation S309, a first request for confirming whether to update is issued according to the target data set.
For example, the first request may be issued in the form of a pop-up tab. Controls may be included in the tab to confirm whether to update. The tab may be popped up after the user logs in to the service node in this embodiment.
In operation S310, in response to receiving a positive response for confirming the update, the current communication identity is replaced with the update communication identity for information update.
For example, after receiving a positive response, the current communication identification "13456789123" is replaced with "12456789123" for information update.
Fig. 4 is a flow chart of an information updating method according to one embodiment of the present disclosure.
As shown in fig. 4, the method 400 includes operations S410 to S430. The method 400 may be applied to a client. The client may be deployed on, for example, the terminal device of fig. 1.
In operation S410, for a plurality of target service nodes, a target data set associated with each target service node is obtained, resulting in a plurality of target data sets.
For example, the plurality of target data sets each include an update communication identification.
For example, user-entered data associated with each target service node may be retrieved to obtain each target data set.
For example, the target dataset also includes first authentication data.
For example, verification data is also included in the target dataset. The verification data may include at least one of: presetting identity data and presetting safety data.
In operation S420, a target data set associated with each service node is transmitted to each target service node according to the current communication identification.
For example, the current communication identifier may be a mobile phone number or a mailbox account currently used by the user. In one example, after each target data set is obtained, a short message is sent to each service node by the old mobile phone number so as to send the target data set related to each service node. In one example, after obtaining each target data set, the user sends a mail to each service node with the old mailbox account to send the target data set related to the service node to each service node.
For example, in the target data set associated with each service node, validation data associated with the service node may be included to enable the service node to validate against the validation data associated with the service node. The safety can be further improved.
In operation S430, a communication request is sent to each target serving node according to the updated communication identifier to perform information updating.
For example, the update communication identifier may be a mobile phone number or a mailbox account number newly applied by the user. In an example, a short message may be sent to each service node by using a newly applied mobile phone number, so that the service node acquires the newly applied mobile phone number, and further, the service node executes a relevant operation according to the method in fig. 2 or fig. 3, for example. In another example, a mail may be sent to each service node by using the newly applied mailbox account, so that the service node acquires the newly applied mailbox account, and further, the service node performs the relevant operation according to the method in fig. 2 or fig. 3, for example.
For example, the first authentication data may be included in a communication request sent to each target serving node. In an example, the short message sent to each service node by the newly applied mobile phone number may include the first authentication data. In another example, the first authentication data may be included in the email sent to each service node by the newly applied mailbox account as described above. The service node may be enabled to verify in accordance with the first authentication data to further improve security.
Through the embodiment of the disclosure, the user only needs to fill in information at the client, and the information can be updated without entering the information modification page of each website. The current communication identifier and the updated communication identifier are respectively utilized to communicate with the service node, which is beneficial to improving the safety of information updating. Communication can be carried out to a plurality of service nodes, so that the information of the service nodes can be updated in batches by a user at one client.
It should be noted that operation S420 and operation S430 may be executed in parallel. However, the embodiments of the present disclosure are not limited thereto, and the two operations may be performed in other orders, for example, first performing operation S420 and then performing operation S430; or, the operation S430 is performed first, and then the operation S420 is performed.
Fig. 5A to 5B are schematic diagrams of an information updating method according to an embodiment of the present disclosure.
As shown in fig. 5A, terminal device C510 may communicate with serving node a 521. In one example, the number of service nodes is 2.
The terminal device C510 includes a communication module 511. The communication module 511 corresponds to a communication identifier. In the example of fig. 5A, the communication module 511 corresponds to the current communication identification 5111. In one example, the communication module 511 may be a module based on a GSM System (Global System for mobile Communications). The communication Module 511 may be communicatively connected to a SIM card (subscriber identity Module). The current communication identification 5111 may correspond to the corresponding SIM card 1.
The terminal device a 510 has a client 512 deployed thereon. Client 512 may obtain user-entered data for service node a521,.. service node N522 to obtain a target data set associated with each service node, such as target data set a 5121 associated with service node a521 and target data set N5122 associated with service node N. In one example, each target data set contains an update communication identification. In one example, the target data set a 5121 further includes the first authentication data, the current terminal identifier, and the verification data D _ a. The current terminal identity is associated with terminal device a and the verification data D _ a is associated with the serving node a. In one example, the target data set N5122 further includes the first authentication data, the current terminal identifier, and the verification data D _ N. The current terminal identity is associated with terminal device a and the verification data D _ N is associated with the service node N.
After client 512 acquires target data a 5121, the. Serving node a521 may receive target data set a 5121 and serving node N522 may receive target data set N5122. Next, the serving node a521 may acquire the update communication identifier in the target data set a 5121, and the serving node N522 may acquire the update communication identifier in the target data set N5122.
As shown in fig. 5B, after the serving node obtains the updated communication identity of the target data set, the current communication identity 5111 corresponding to the communication module 511 may be replaced with the target communication identity 5112. In one example, the SIM card 1 corresponding to the current communication identity 5111 may be replaced with the SIM card 2 corresponding to the target communication identity 5112.
Client 512 may send a communication request R _ a 5131 to serving node a521 according to target communication identification 5112.
The serving node a521 may receive the communication request R _ a 5131 and obtain a target communication identification 5112 corresponding to the communication request R _ a 5131. The serving node a521 may perform the first verification operation described above according to the target communication identifier 5112 corresponding to the communication request ra and the updated communication identifier obtained from the target data set a 5121. In one example, a result of a first authentication operation that characterizes a successful authentication may be received, and the service node a replaces the stored current communication identity with the updated communication identity for information updating. In another example, the service node a521 may receive the communication request R _ a 'and obtain a target communication identity corresponding to the communication request R _ a'. And then, performing the first verification operation to obtain a result of the first verification operation representing the verification failure, so that information updating is not performed.
In a similar manner, the service node N may replace the stored current communication identifier with the updated communication identifier for information updating.
In some embodiments, the communication module 511 in fig. 5A or 5B, for example, may also be a virtual module. Accordingly, the communication identifier corresponding to the communication module 511 may be a mailbox account.
In some embodiments, the verification data D _ a in fig. 5A may be verification data that may be a secret key question 1 and a secret key answer 1, for example. The privacy question a may be "favorite color" and the privacy answer 1 may be "green". The verification data D _ N may be a secret key question 2 and a secret key answer 2. The secret key question 2 may be "favorite person" and the secret key answer 2 may be "three.
Fig. 6 is a block diagram of an information updating apparatus according to one embodiment of the present disclosure.
As shown in fig. 6, the apparatus 600 may include a first obtaining module 610, a second obtaining module 620, a first verifying module 630, and an updating module 640.
A first obtaining module 610 is configured to, in response to receiving a target data set, obtain an updated communication identifier in the target data set.
A second obtaining module 620, configured to, in response to receiving the communication request, obtain a target communication identifier corresponding to the communication request.
The first verification module 630 is configured to perform a first verification operation according to the target communication identifier and the updated communication identifier.
And the updating module 640 is configured to, in response to receiving a result of the first verification operation that indicates that the verification is successful, update information according to the target data set.
In some embodiments, the method is applied to a plurality of service nodes, each service node being associated with a target data set; the target data set further comprises first authentication data, the apparatus 600 further comprises: a third obtaining module, configured to obtain second authentication data according to the communication request; the second verification module is used for performing second verification operation according to the second authentication data and the first authentication data; wherein the update module comprises: and the first updating submodule is used for responding to the received results of the first verification operation which represents that the verification is successful and the second verification operation which represents that the verification is successful, and updating information according to the target data set.
In some embodiments, the target data set includes verification data including at least one of: presetting identity data and safety data; the apparatus 600 further comprises: a fourth obtaining module, configured to obtain the verification data in the target dataset; the third verification module is used for performing third verification operation according to the verification data; wherein the update module comprises: and the second updating submodule is used for responding to the received results of the first verification operation which represents that the verification is successful and the received results of the third verification operation which represents that the verification is successful, and updating information according to the target data set.
In some embodiments, the target data set further comprises a current terminal identification, wherein the apparatus 600 further comprises: a fifth obtaining module, configured to obtain a target terminal identifier according to the communication request; a fourth verification module, configured to perform a fourth verification operation according to the target terminal identifier and the current terminal identifier, where the update module includes: and the third updating submodule is used for responding to the received results of the first verification operation which represents that the verification is successful and the fourth verification operation which represents that the verification is successful, and updating information according to the target data set.
In some embodiments, the update module comprises: the first sending submodule is used for sending a first request for confirming whether to update or not according to the target data set; and the first replacement submodule is used for replacing the current communication identifier with the updated communication identifier to update the information in response to receiving a positive response for confirming the update.
Fig. 7 is a block diagram of an information updating apparatus according to another embodiment of the present disclosure.
As shown in fig. 7, the apparatus 700 may include: a sixth acquisition module 710, a first transmission module 720 and a second transmission module 730.
A sixth obtaining module 710, configured to obtain, for multiple target service nodes, a target data set associated with each target service node to obtain multiple target data sets, where the multiple target data sets each include an update communication identifier.
A first sending module 720, configured to send the target data set related to each of the serving nodes to each of the target serving nodes according to the current communication identifier.
A second sending module 730, configured to send a communication request to each target serving node according to the updated communication identifier, so as to update information.
In some embodiments, the target data set further comprises first authentication data; the target data set includes verification data including at least one of: presetting identity data and presetting safety data.
In some embodiments, the target data set comprises a current terminal identity, wherein the second sending module comprises: and the first sending submodule is used for sending a communication request to each target service node according to the updated communication identifier and the current terminal identifier.
In the technical scheme of the disclosure, the collection, storage, use, processing, transmission, provision, disclosure and other processing of the personal information of the related user are all in accordance with the regulations of related laws and regulations and do not violate the good customs of the public order.
The present disclosure also provides an electronic device, a readable storage medium, and a computer program product according to embodiments of the present disclosure.
FIG. 8 illustrates a schematic block diagram of an example electronic device 800 that can be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 8, the apparatus 800 includes a computing unit 801 that can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM)802 or a computer program loaded from a storage unit 808 into a Random Access Memory (RAM) 803. In the RAM 803, various programs and data required for the operation of the device 800 can also be stored. The calculation unit 801, the ROM 802, and the RAM 803 are connected to each other by a bus 804. An input/output (I/O) interface 805 is also connected to bus 804.
A number of components in the device 800 are connected to the I/O interface 805, including: an input unit 806, such as a keyboard, a mouse, or the like; an output unit 807 such as various types of displays, speakers, and the like; a storage unit 808, such as a magnetic disk, optical disk, or the like; and a communication unit 809 such as a network card, modem, wireless communication transceiver, etc. The communication unit 809 allows the device 800 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
Computing unit 801 may be a variety of general and/or special purpose processing components with processing and computing capabilities. Some examples of the computing unit 801 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and the like. The calculation unit 801 executes the respective methods and processes described above, such as the information update method. For example, in some embodiments, the information updating method may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 808. In some embodiments, part or all of the computer program can be loaded and/or installed onto device 800 via ROM 802 and/or communications unit 809. When loaded into RAM 803 and executed by computing unit 801, a computer program may perform one or more of the steps of the information updating method described above. Alternatively, in other embodiments, the computing unit 801 may be configured to perform the information updating method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel, sequentially, or in different orders, as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved, and the present disclosure is not limited herein.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (19)

1. An information updating method, comprising:
in response to receiving a target data set, obtaining an update communication identifier in the target data set;
in response to receiving a communication request, acquiring a target communication identifier corresponding to the communication request;
performing a first verification operation according to the target communication identifier and the updated communication identifier; and
and in response to receiving a result of a first verification operation representing successful verification, updating information according to the target data set.
2. The method of claim 1, wherein the method is applied to a plurality of service nodes, each service node being associated with a target data set; the target data set further comprises first authentication data,
the method further comprises the following steps:
acquiring second authentication data according to the communication request;
performing a second verification operation according to the second authentication data and the first authentication data;
wherein the updating information according to the target data set comprises:
and in response to receiving the result of the first verification operation which represents that the verification is successful and the result of the second verification operation which represents that the verification is successful, updating information according to the target data set.
3. The method of claim 1, wherein the target data set includes validation data comprising at least one of:
presetting identity data and safety data;
the method further comprises the following steps:
obtaining the verification data in the target dataset;
performing a third verification operation according to the verification data;
wherein the updating information according to the target data set comprises:
and in response to receiving the result of the first verification operation which represents that the verification is successful and the result of the third verification operation which represents that the verification is successful, updating information according to the target data set.
4. The method of claim 1, wherein the target data set further comprises a current terminal identification,
the method further comprises the following steps:
acquiring a target terminal identifier according to the communication request;
performing a fourth verification operation according to the target terminal identification and the current terminal identification,
wherein the updating information according to the target data set comprises:
and in response to receiving the result of the first verification operation which represents that the verification is successful and the result of the fourth verification operation which represents that the verification is successful, updating information according to the target data set.
5. The method of any of claims 1 to 4, wherein the updating information according to the target data set comprises:
sending a first request for confirming whether to update according to the target data set;
and in response to receiving a positive response for confirming the update, replacing the current communication identification with the updated communication identification for information update.
6. An information updating method, comprising:
aiming at a plurality of target service nodes, acquiring a target data set related to each target service node to obtain a plurality of target data sets, wherein each target data set comprises an updating communication identifier;
sending the target data set related to each service node to each target service node according to the current communication identification; and
and sending a communication request to each target service node according to the updated communication identifier so as to update information.
7. The method of claim 6, wherein the target data set further comprises first authentication data; the target data set includes verification data including at least one of: presetting identity data and presetting safety data.
8. The method of claim 6, wherein the target data set includes a current terminal identification,
wherein the sending a communication request to each target serving node according to the updated communication identifier comprises:
and sending a communication request to each target service node according to the updated communication identifier and the current terminal identifier.
9. An information updating apparatus comprising:
the device comprises a first acquisition module, a second acquisition module and a communication updating module, wherein the first acquisition module is used for responding to the reception of a target data set and acquiring an update communication identifier in the target data set;
a second obtaining module, configured to, in response to receiving a communication request, obtain a target communication identifier corresponding to the communication request:
the first verification module is used for performing first verification operation according to the target communication identifier and the updated communication identifier; and
and the updating module is used for responding to the received result of the first verification operation representing successful verification and updating information according to the target data set.
10. The apparatus of claim 9, wherein the method is applied to a plurality of service nodes, each service node being associated with a target data set; the target data set further comprises first authentication data,
the device further comprises:
a third obtaining module, configured to obtain second authentication data according to the communication request;
the second verification module is used for performing second verification operation according to the second authentication data and the first authentication data;
wherein the update module comprises:
and the first updating submodule is used for responding to the received results of the first verification operation which represents that the verification is successful and the second verification operation which represents that the verification is successful, and updating information according to the target data set.
11. The apparatus of claim 9, wherein the target data set comprises validation data comprising at least one of:
presetting identity data and safety data;
the device further comprises:
a fourth obtaining module, configured to obtain the verification data in the target dataset;
the third verification module is used for performing third verification operation according to the verification data;
wherein the update module comprises:
and the second updating submodule is used for responding to the received results of the first verification operation which represents that the verification is successful and the received results of the third verification operation which represents that the verification is successful, and updating information according to the target data set.
12. The apparatus of claim 9, wherein the target data set further comprises a current terminal identification,
the device further comprises:
a fifth obtaining module, configured to obtain a target terminal identifier according to the communication request;
a fourth verification submodule for performing a fourth verification operation according to the target terminal identifier and the current terminal identifier,
wherein the updated module comprises:
and the third updating submodule is used for responding to the received results of the first verification operation which represents that the verification is successful and the fourth verification operation which represents that the verification is successful, and updating information according to the target data set.
13. The apparatus of any of claims 9 to 12, wherein the update module comprises:
the first sending submodule is used for sending a first request for confirming whether to update or not according to the target data set;
and the first replacement submodule is used for replacing the current communication identifier with the updated communication identifier to update the information in response to receiving a positive response for confirming the update.
14. An information updating apparatus comprising:
a sixth obtaining module, configured to obtain, for multiple target service nodes, a target data set associated with each target service node to obtain multiple target data sets, where each of the multiple target data sets includes an update communication identifier;
a first sending module, configured to send the target data set related to each target service node according to a current communication identifier; and
and the second sending module is used for sending a communication request to each target service node according to the updated communication identifier so as to update information.
15. The apparatus of claim 14, wherein the target data set further comprises first authentication data; the target data set includes verification data including at least one of: presetting identity data and presetting safety data.
16. The apparatus of claim 14, wherein the target data set includes a current terminal identification,
wherein the second sending module comprises:
and the first sending submodule is used for sending a communication request to each target service node according to the updated communication identifier and the current terminal identifier.
17. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1 to 8.
18. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1 to 8.
19. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1 to 8.
CN202111494671.4A 2021-12-07 2021-12-07 Information updating method and device, electronic equipment and storage medium Withdrawn CN114253984A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111494671.4A CN114253984A (en) 2021-12-07 2021-12-07 Information updating method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111494671.4A CN114253984A (en) 2021-12-07 2021-12-07 Information updating method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114253984A true CN114253984A (en) 2022-03-29

Family

ID=80794230

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111494671.4A Withdrawn CN114253984A (en) 2021-12-07 2021-12-07 Information updating method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114253984A (en)

Similar Documents

Publication Publication Date Title
CN107249004B (en) Identity authentication method, device and client
CN109766479B (en) Data processing method and device, electronic equipment and storage medium
CN110895603B (en) Multi-system account information integration method and device
US11244153B2 (en) Method and apparatus for processing information
CN107634947A (en) Limitation malice logs in or the method and apparatus of registration
CN115038062A (en) Bluetooth authentication method, device and equipment
CN114513350A (en) Identity verification method, system and storage medium
CN114186206A (en) Login method and device based on small program, electronic equipment and storage medium
CN109391658B (en) Account data synchronization method and equipment, storage medium and terminal thereof
CN113010238A (en) Permission determination method, device and system for micro application call interface
CN113641388A (en) Cloud mobile phone updating method, related device and computer program product
CN116611411A (en) Business system report generation method, device, equipment and storage medium
CN107634942B (en) Method and device for identifying malicious request
CN114253984A (en) Information updating method and device, electronic equipment and storage medium
CN113946816A (en) Cloud service-based authentication method and device, electronic equipment and storage medium
US11573808B2 (en) Methods of providing an integrated interface that includes a virtual mobile device
CN114374686A (en) File processing method, device and equipment based on browser
CN114091909A (en) Collaborative development method, system, device and electronic equipment
CN113890906A (en) Call forwarding method and device, electronic equipment and computer readable storage medium
CN112272211A (en) Service request processing method, device and system
US9674160B2 (en) Methods for anti-fraud masking of a universal resource indentifier (“URI”)
CN108830441B (en) Resource query method and device
CN110175305B (en) Data processing method, data processing device, computer equipment and storage medium
CN115080205B (en) Task execution method, device, electronic equipment and readable storage medium
CN115840604B (en) Data processing method, device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20220329