CN114625756A - Data query method and device and server - Google Patents

Data query method and device and server Download PDF

Info

Publication number
CN114625756A
CN114625756A CN202210294558.XA CN202210294558A CN114625756A CN 114625756 A CN114625756 A CN 114625756A CN 202210294558 A CN202210294558 A CN 202210294558A CN 114625756 A CN114625756 A CN 114625756A
Authority
CN
China
Prior art keywords
data
target
user
ciphertext
target data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210294558.XA
Other languages
Chinese (zh)
Inventor
解媛媛
张阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210294558.XA priority Critical patent/CN114625756A/en
Publication of CN114625756A publication Critical patent/CN114625756A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24552Database cache management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Medical Informatics (AREA)
  • Mathematical Physics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The specification provides a data query method, a data query device and a server. The method can be applied to the financial field, and when a target user needs to inquire target data such as credit investigation data, a user terminal can be used for generating and initiating a data inquiry request at least carrying a face image of the target user. After receiving the data query request, the server firstly detects whether ciphertext data of target data are stored in a cache database according to the data query request; the cache database is used for storing ciphertext data of data queried by a user within an effective time period; under the condition that the ciphertext data of the target data are stored in the cache database, carrying out decryption processing on the ciphertext data of the target data by utilizing the face image of the target user according to a preset processing rule; and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal. Therefore, the verification operation of the user side is simplified, and the target user can efficiently and safely inquire and obtain the target data.

Description

Data query method and device and server
Technical Field
The specification belongs to the technical field of finance, and particularly relates to a data query method, a data query device and a server.
Background
In the financial field, users often need to inquire and use the credit investigation data of the users when applying for and handling related services. The credit investigation data of the user usually has higher security requirements, and most credit investigation data can only be stored in the system databases of some key network points with higher security levels.
Based on the existing data query method, a user often needs to go to the site of the key website and can finally query and obtain the required credit investigation data after performing relatively complicated verification operation. Therefore, when the method is implemented based on the existing method, the user operation is complicated and complicated, and the user experience is relatively poor.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The specification provides a data query method, a data query device and a data query server, which can simplify user operation and enable a target user to efficiently and safely query to obtain target data; meanwhile, the data security of the target data can be well protected, and the target data is prevented from being leaked.
The present specification provides a data query method, applied to a server, including:
receiving a data query request about target data initiated by a user terminal; wherein the data query request at least carries a facial image of a target user;
detecting whether ciphertext data of target data are stored in a cache database or not according to the data query request; the cache database stores ciphertext data of data queried by a user in an effective time period;
under the condition that the ciphertext data of the target data are stored in the cache database, carrying out decryption processing on the ciphertext data of the target data by using the face image of the target user according to a preset processing rule;
and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal.
In one embodiment, the decrypting the ciphertext data of the target data by using the facial image of the target user according to the preset processing rule comprises:
mapping the face image of the target user into a corresponding character string;
generating a corresponding decryption key according to the character string;
and decrypting the ciphertext data of the target data by using the decryption key.
In one embodiment, before detecting whether ciphertext data of the target data is stored in the cache database according to the data query request, the method further includes:
according to the face image of the target user, performing identity verification on the target user;
and generating a first type of error prompt under the condition that the target user identity authentication is determined not to pass.
In one embodiment, after detecting whether ciphertext data of the target data is stored in the cache database according to the data query request, the method further includes:
under the condition that the ciphertext data of the target data are not stored in the cache database, the target data are obtained by inquiring the system database; and transmits the target data to the user terminal.
In one embodiment, after obtaining the target data by querying the system database, the method further comprises:
encrypting the target data by using the face image of the target user according to a preset processing rule to obtain ciphertext data of the target data;
and storing the ciphertext data of the target data into a cache database.
In one embodiment, storing the ciphertext data of the target data into the cache database includes:
setting a time tag in the ciphertext data of the target data to obtain the ciphertext data of the target data carrying the time tag; the time tag is used for representing the acquisition time of ciphertext data of the target data;
and storing the ciphertext data of the target data carrying the time tag into a cache database.
In one embodiment, after the ciphertext data of the target data with the time tag is stored in the cache database, the method further includes:
detecting a time tag of ciphertext data of the data stored in the cache database at a preset time interval;
determining and deleting failure data in a cache database according to the time tag; the invalid data is ciphertext data of data, wherein the time interval length between the acquisition time and the current time is greater than or equal to the effective time period.
In one embodiment, sending the decrypted target data to the user terminal includes: and sending the target data obtained by decryption to the user terminal according to the 5G transmission protocol.
In one embodiment, the target data includes at least one of: credit investigation data of the target user, transaction data of the target user and achievement data of the target user.
The present specification also provides a data query method, applied to a user terminal, including:
responding to the operation of a target user, acquiring and utilizing a face image of the target user, and generating a data query request about target data; the data query request at least carries a face image of a target user;
sending the data query request to a server; the server is used for detecting whether ciphertext data of target data are stored in a cache database or not according to the data query request; the server decrypts the ciphertext data of the target data by using the face image of the target user according to a preset processing rule under the condition that the ciphertext data of the target data is determined to be stored in the cache database; and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal.
The present specification also provides a data query apparatus including:
a receiving module, configured to receive a data query request about target data initiated by a user terminal; wherein, the data query request at least carries a face image of a target user;
the detection module is used for detecting whether ciphertext data of the target data are stored in the cache database or not according to the data query request; the cache database stores ciphertext data of data queried by a user in an effective time period;
the decryption module is used for decrypting the ciphertext data of the target data by using the face image of the target user according to a preset processing rule under the condition that the ciphertext data of the target data is determined to be stored in the cache database;
and the sending module is used for sending the target data obtained by decryption to the user terminal under the condition of successful decryption.
The present specification also provides a server comprising a processor and a memory for storing processor-executable instructions, the instructions when executed by the processor implementing the steps of: receiving a data query request about target data initiated by a user terminal; wherein, the data query request at least carries a face image of a target user; detecting whether ciphertext data of target data are stored in a cache database or not according to the data query request; the cache database stores ciphertext data of data queried by a user in an effective time period; under the condition that the ciphertext data of the target data are stored in the cache database, carrying out decryption processing on the ciphertext data of the target data by using the face image of the target user according to a preset processing rule; and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal.
The present specification also provides a computer readable storage medium having stored thereon computer instructions that, when executed by a processor, implement: receiving a data query request about target data initiated by a user terminal; wherein the data query request at least carries a facial image of a target user; detecting whether ciphertext data of target data are stored in a cache database or not according to the data query request; the cache database stores ciphertext data of data queried by a user in an effective time period; under the condition that the ciphertext data of the target data are stored in the cache database, carrying out decryption processing on the ciphertext data of the target data by using the face image of the target user according to a preset processing rule; and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal.
The present specification also provides a computer program product comprising a computer program which when executed by a processor performs the steps of: receiving a data query request about target data initiated by a user terminal; wherein the data query request at least carries a facial image of a target user; detecting whether ciphertext data of target data are stored in a cache database or not according to the data query request; the cache database stores ciphertext data of data queried by a user in an effective time period; under the condition that the ciphertext data of the target data are stored in the cache database, carrying out decryption processing on the ciphertext data of the target data by using the face image of the target user according to a preset processing rule; and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal.
Based on the data query method, device and server provided by the specification, when a target user needs to query target data such as credit investigation data, a held user terminal can be used to generate and initiate a data query request at least carrying a face image of the target user. After receiving the data query request, the server may first detect whether ciphertext data of corresponding target data is stored in the cache database according to the data query request; the cache database is used for storing ciphertext data of data queried by a user within an effective time period; under the condition that the ciphertext data of the target data are stored in the cache database, the server can try to decrypt the ciphertext data of the target data by using the face image of the target user according to a preset processing rule; and under the condition of successful decryption, obtaining and sending the target data obtained by decryption to the user terminal. Therefore, on one hand, the verification operation at the user side can be effectively simplified, the target user can efficiently and safely inquire to obtain the target data, and the interaction experience of the target user is improved; on the other hand, the data security of the target data can be well protected, and the target data stored in the cache database is prevented from being leaked.
Drawings
In order to more clearly illustrate the embodiments of the present specification, the drawings needed to be used in the embodiments will be briefly described below, and the drawings in the following description are only some of the embodiments described in the specification, and it is obvious to those skilled in the art that other drawings can be obtained based on the drawings without any inventive work.
FIG. 1 is a flow chart diagram of a data query method provided by an embodiment of the present specification;
FIG. 2 is a diagram illustrating an embodiment of a structural component of a system to which the data query method provided in the embodiments of the present specification is applied;
FIG. 3 is a diagram illustrating an embodiment of a data query method provided by an embodiment of the present specification;
FIG. 4 is a schematic structural component diagram of a server provided in an embodiment of the present description;
fig. 5 is a schematic structural component diagram of a data query device provided in an embodiment of the present specification;
fig. 6 is a schematic structural component diagram of a data query device according to another embodiment of the present specification;
fig. 7 is a flowchart illustrating a data query method according to another embodiment of the present disclosure.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present specification, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only a part of the embodiments of the present specification, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present specification without making any creative effort shall fall within the protection scope of the present specification.
Referring to fig. 1, an embodiment of the present specification provides a data query method. The method is particularly applied to the server side. In particular implementations, the method may include the following.
S101: receiving a data query request about target data initiated by a user terminal; wherein the data query request carries at least a facial image of the target user.
S102: detecting whether ciphertext data of target data are stored in a cache database or not according to the data query request; and the cache database stores ciphertext data of data queried by a user in an effective time period.
S103: and under the condition that the ciphertext data of the target data are determined to be stored in the cache database, decrypting the ciphertext data of the target data by using the face image of the target user according to a preset processing rule.
S104: and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal.
In some embodiments, referring to fig. 2, the server may specifically include a background server disposed at a side of the network platform and capable of implementing functions such as data transmission and data processing. Specifically, the server may be, for example, an electronic device having data operation, storage function and network interaction function. Alternatively, the server may be a software program running in the electronic device and providing support for data processing, storage and network interaction. In the present embodiment, the number of servers is not particularly limited. The server may specifically be one server, or may also be several servers, or a server cluster formed by several servers.
The user terminal specifically comprises a front end which is arranged on one side of a target user and at least provided with a camera and can realize the functions of collecting and transmitting related image data and the like. Specifically, the user terminal may be, for example, an electronic device such as a desktop computer, a tablet computer, a notebook computer, a mobile phone, and a self-service transaction machine. Alternatively, the user terminal may be a software application capable of running in the electronic device. For example, it may be some APP running on a cell phone, etc.
In some embodiments, the target data may be specifically understood as data to be queried. The target user may be specifically understood as a user who currently wants to query the target data.
In some embodiments, the target data may be data that is only disclosed to the target user and kept secret from other users. The target data may be data associated with the target user or data not associated with the target user.
Specifically, the target data may include at least one of: credit data of the target user, transaction data of the target user, achievement data of the target user, and the like. Of course, it should be noted that the above listed target data is only an exemplary illustration. In specific implementation, the target data may further include other types of data according to specific application scenarios and business requirements, for example, asset data of the target user, mobile phone tariff data of the target user, and the like. The present specification is not limited to these.
It should be noted that the data referred to in this specification are all obtained and used on the premise that the user knows and agrees. In addition, the data acquisition, storage, use, processing and the like in the specification all conform to relevant regulations of national laws and regulations.
In some embodiments, the data query request carries at least a facial image of the target user to be served. Further, the data query request may also carry a user identifier of the target user and a data identifier of the target data. Wherein the user identifier is used to indicate the target user, for example, the name, user number, etc. of the target user. The data identifier is used to indicate target data, such as a data number, a storage address, and the like of the target data.
In some embodiments, referring to fig. 2, when a target user transacts a certain service, the target user needs to query and obtain target data. In this case, the target user can directly perform corresponding operations on the user terminal. The user terminal can receive and respond to the operation of the target user, and the face image of the current target user is collected through the camera; generating a data query request at least carrying the face image of the target user; and sending the data query request to a server in a wired or wireless mode. Correspondingly, the server receives and utilizes the cache database to perform corresponding data processing according to the data query request.
Therefore, on the side of the target user, only simple operation is needed to be carried out, the user terminal is matched to collect the face image of the user, the query request about the target data can be generated and sent, the user does not need to go to a relevant website, and complex and tedious multiple verification operation is not needed, so that the operation on the user side can be effectively simplified, and the interaction experience of the user is improved.
In some embodiments, before the data query request is based on, when the method is implemented, the following may be further included:
s1: according to the face image of the target user, performing identity verification on the target user;
s2: and generating a first type of error prompt under the condition that the identity authentication of the target user is determined not to pass.
Under the condition that the target user identity authentication is not passed, the user initiating the data query request can be determined not to have the authority of querying the target data; accordingly, the server does not respond to the data query request and does not trigger subsequent detection of the cache database.
The first type of error-reporting prompt may be specifically used for characterizing: the system does not have the inquiry authority of the target data, and cannot provide the prompt information of the inquiry service of the target data.
And under the condition that the target user identity authentication is confirmed to pass, the server can normally trigger the follow-up detection of the cache database.
In some embodiments, in case of a decryption failure, a first type error notification may also be generated and sent to the terminal.
In some embodiments, the authentication of the target user may be implemented as follows: comparing the face image of the target user with a reference image stored in a user database to obtain a comparison result; and determining whether the identity verification of the target user passes or not according to the comparison result. The reference image is a face image provided to a system server by a target user during registration.
Specifically, the server may query the user database according to the user identifier of the target user carried in the data query request, so as to obtain the corresponding reference image.
In some embodiments, the determining whether the target user identity verification passes according to the comparison result may include: according to the comparison result, under the condition that the difference value between the face image of the target user and the reference image is smaller than or equal to a preset difference threshold value, the identity of the target user is determined to be verified; and conversely, according to the comparison result, determining that the identity verification of the target user fails under the condition that the difference value between the face image of the target user and the reference image is greater than the preset difference threshold value.
In some embodiments, the cache database may specifically store ciphertext data of related data that is still in a valid time period and is recently queried by a user through a server. The ciphertext data of the data is obtained by encrypting the face image of the corresponding user based on a preset processing rule.
Through the embodiment, the server can encrypt the related data which is inquired by the system server with higher security level and longer inquiry time consumption and is recently responded to the data inquiry request of the user, and then store the encrypted related data in the cache database, so that on one hand, the user can conveniently inquire again and use the data, and the inquiry time consumption when the user inquires again is reduced; on the other hand, the stored ciphertext data encrypted by using the face image of the user can avoid data leakage and protect the data security of the data.
In some embodiments, in specific implementation, the server may query the cache database according to the data identifier of the target data carried in the data query request, so as to determine whether ciphertext data of the target data is stored in the cache database.
In some embodiments, when it is determined that the ciphertext data of the target data is stored in the cache database, a system database (for example, a database of a certain designated website) which has a high requirement on security of data processing time and a relatively complicated query process does not need to be consumed, but a face image of a target user carried by a data query request may be used to attempt to decrypt the ciphertext data of the queried target data according to a preset processing rule. Therefore, on one hand, whether the target user has the authority to inquire and obtain the target data can be verified again by using the face data of the target user carried by the data inquiry request, on the other hand, frequent and repeated access to a system database in a short time is avoided, the integral data processing amount of the inquiry process is reduced, and the processing efficiency is improved.
In some embodiments, referring to fig. 3, when the ciphertext data of the target data is decrypted by using the face image of the target user according to the preset processing rule, the decryption may include the following steps:
s103-1: mapping the face image of the target user into a corresponding character string;
s103-2: generating a corresponding decryption key according to the character string;
s103-3: and decrypting the ciphertext data of the target data by using the decryption key.
In some embodiments, before implementation, in order to eliminate interference of noise caused by environmental factors (e.g., dark light) or device factors (e.g., interference of current in the device) on subsequent data processing during the generation of the facial image, noise reduction processing may be performed on the facial image.
In specific implementation, the noise point can be removed by performing gaussian filtering, median filtering, wavelet denoising, or fast non-local average denoising on the face image, so as to obtain a denoised face image with higher precision. Of course, the above-mentioned noise reduction processing method is only an exemplary one. In specific implementation, according to specific situations and processing requirements, other suitable noise reduction modes can be adopted to perform noise reduction processing on the face image. The present specification is not limited to these.
In some embodiments, the preset processing rule may specifically include: an encryption rule for encrypting data using the related information in the face image, and a decryption rule for decrypting the ciphertext using the related information in the face image.
In some embodiments, in implementation, a plurality of key facial features may be extracted from the facial image; then according to a preset mapping rule, mapping the plurality of associated facial features into a plurality of corresponding characters; and combining the plurality of characters in a certain order to obtain a character string regarding the facial image information of the target user.
In some embodiments, the mapping the facial image of the target user to the corresponding character string may specifically include: determining position coordinates of a plurality of key points (e.g., eye corner points, nose bridge points, lip points, etc.) in a face image for a target; according to a preset mapping rule, using the position coordinates of the plurality of key points as characters corresponding to the plurality of key points; and arranging a plurality of characters according to a certain sequence to obtain the character string.
In some embodiments, the generating a corresponding decryption key according to the character string may include: and carrying out Hash operation on the character string to obtain a corresponding decryption secret key.
Further, when the decryption key is specifically generated, a plurality of characters at specified positions can be extracted from the character string to be combined to obtain a new character string; and constructing and obtaining a corresponding decryption key based on the new character string.
With the above-described embodiments, it is possible to generate a decryption key based on the face information of the target user with the face image efficiently.
In some embodiments, in order to better protect data security, the data query request may further carry a user key of the target user. The user key may be a pre-generated random key, and the target user may hold the random key. The server holds a verification key for verifying the user key. The target user may provide the user key when generating a data query request through the user terminal.
Correspondingly, when the target user identity authentication is performed, the server may perform the identity authentication on the target user by verifying the user key by using the verification key. And the target user can be authenticated according to the two data of the verification result of the user key and the face comparison result, so that the target user can be authenticated more accurately.
Further, the generating a corresponding decryption key according to the character string may further include, in specific implementation: generating a corresponding secret key according to the character string, and marking the secret key as an auxiliary secret key; and combining the user secret key and the auxiliary secret key to obtain a decryption secret key finally used for decrypting the ciphertext data of the target data.
Through the embodiment, the data security of the user can be effectively protected, and the data stored in the cache database can be better prevented from being leaked.
In some embodiments, after detecting whether ciphertext data of the target data is stored in the cache database according to the data query request, when the method is implemented, the method may further include: under the condition that the ciphertext data of the target data are not stored in the cache database, the target data are obtained by inquiring the system database; and transmits the target data to the user terminal.
The system database is a database with high security requirements, and can store relevant data of all registered users. By making the requirements for the access and query processes of the system database stricter, the data processing amount and processing time involved in the access and query processes are relatively larger.
In some embodiments, after querying the system database, when the method is implemented, the following may be further included: in the case that it is determined that the target data corresponding to the target user is queried in the system database, a second type of error notification may be generated and sent.
The second type of error-reporting prompt may be specifically used for characterizing: the user is asked to verify the confirmed prompt without querying the target data.
In some embodiments, after the target data is obtained by querying the system database, when the method is implemented, the following may be further included: according to a preset processing rule, carrying out encryption processing on target data by using the face image of a target user to obtain ciphertext data of the target data; and storing the ciphertext data of the target data into a cache database.
In some embodiments, when implemented, similarly, the facial image of the target user may be mapped to a corresponding character string; generating a corresponding encryption key according to the character string; and decrypting the target data by using the encryption key to obtain the ciphertext data of the target data.
In some embodiments, the above storing the ciphertext data of the target data into the cache database may include the following steps: setting a time tag in the ciphertext data of the target data to obtain the ciphertext data of the target data carrying the time tag; the time tag is used for representing the acquisition time of ciphertext data of the target data; and storing the ciphertext data of the target data carrying the time tag into a cache database.
The timestamp may specifically be an unalterable timestamp.
In some embodiments, after the ciphertext data of the target data with the time tag is stored in the cache database, when the method is implemented, the method may further include:
s1: detecting a time tag of ciphertext data of the data stored in the cache database at a preset time interval (for example, every two days);
s2: determining and deleting failure data in a cache database according to the time tag; the invalid data is ciphertext data of data, wherein the time interval length between the acquisition time and the current time is greater than or equal to the effective time period.
Through the embodiment, the server can regularly manage and maintain the cache database and delete the data ciphertext data stored in the cache database for a time period exceeding the effective time period, so that on one hand, invalid data can be timely cleaned, and the data storage capacity of the cache database is reduced, so that subsequent access query to the cache database is facilitated; on the other hand, the risk of storing the ciphertext data of huge data in the cache library can be reduced.
In some embodiments, the sending the decrypted target data to the user terminal may include, in specific implementation: and sending the target data obtained by decryption to the user terminal according to the 5G transmission protocol. Alternatively, the method may further include: and according to the 5G transmission protocol, sending the target data inquired by the system database to the user terminal.
Through the embodiment, the 5G transmission technology can be utilized to efficiently feed the target data back to the user terminal, so that the waiting time of the target user is further reduced, and the interactive experience of the user is improved.
In some embodiments, the target data may specifically include at least one of: credit investigation data of the target user, transaction data of the target user, achievement data of the target user and the like.
Referring to fig. 7, an embodiment of the present disclosure further provides a data query method, which is applied to a user terminal, and when implemented, the data query method may include the following steps:
s701: responding to the operation of a target user, acquiring and utilizing a face image of the target user, and generating a data query request about target data; the data query request at least carries a face image of a target user;
s702: sending the data query request to a server; the server is used for detecting whether ciphertext data of target data are stored in a cache database or not according to the data query request; the server decrypts the ciphertext data of the target data by using the face image of the target user according to a preset processing rule under the condition that the ciphertext data of the target data is determined to be stored in the cache database; and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal.
The cache database stores ciphertext data of data queried by the server in response to a data query request of a user within an effective time period.
In some embodiments, the method, when implemented, may further include: receiving and displaying a first type of error report prompt to a target user; or receiving and displaying a second type of error-reporting prompt to the user; or, receiving and presenting the target data to the user.
As can be seen from the above, based on the data query method provided in the embodiments of the present specification, when a target user needs to query target data, such as credit investigation data, a data query request about the target data may be generated and initiated by using a user terminal. After receiving the data query request, the server may first detect whether ciphertext data of the target data is stored in the cache database according to the data query request; the cache database is used for storing ciphertext data of data queried by a user within an effective time period; under the condition that the ciphertext data of the target data are stored in the cache database, carrying out decryption processing on the ciphertext data of the target data by using the face image of the target user according to a preset processing rule; and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal. On one hand, the verification operation of the user side can be effectively simplified, so that the target user can efficiently and safely inquire to obtain target data, and the interaction experience of the target user is improved; on the other hand, the data security of the target data can be well protected, and the target data temporarily stored in the cache database is prevented from being leaked.
Embodiments of the present specification further provide a server, including a processor and a memory for storing processor-executable instructions, where the processor, when implemented, may perform the following steps according to the instructions: receiving a data query request about target data initiated by a user terminal; wherein, the data query request at least carries a face image of a target user; detecting whether ciphertext data of target data are stored in a cache database or not according to the data query request; the cache database stores ciphertext data of data queried by a user in an effective time period; under the condition that the ciphertext data of the target data are stored in the cache database, carrying out decryption processing on the ciphertext data of the target data by utilizing the face image of the target user according to a preset processing rule; and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal.
In order to more accurately complete the above instructions, referring to fig. 4, another specific server is provided in the embodiments of the present specification, wherein the server includes a network communication port 401, a processor 402, and a memory 403, and the above structures are connected by an internal cable, so that the structures may perform specific data interaction.
The network communication port 401 may be specifically configured to receive a data query request about target data, where the data query request is initiated by a user terminal; wherein the data query request carries at least a facial image of the target user.
The processor 402 may be specifically configured to detect whether ciphertext data of the target data is stored in the cache database according to the data query request; the cache database stores ciphertext data of data queried by a user in an effective time period; under the condition that the ciphertext data of the target data are stored in the cache database, carrying out decryption processing on the ciphertext data of the target data by using the face image of the target user according to a preset processing rule; and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal.
The memory 403 may be specifically configured to store a corresponding instruction program.
In this embodiment, the network communication port 401 may be a virtual port bound to different communication protocols, so as to send or receive different data. For example, the network communication port may be a port responsible for web data communication, a port responsible for FTP data communication, or a port responsible for mail data communication. In addition, the network communication port can also be a communication interface or a communication chip of an entity. For example, it may be a wireless mobile network communication chip, such as GSM, CDMA, etc.; it can also be a Wifi chip; it may also be a bluetooth chip.
In this embodiment, the processor 402 may be implemented in any suitable manner. For example, the processor may take the form of, for example, a microprocessor or processor and a computer-readable medium that stores computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller and embedded microcontroller, and so forth. The description is not intended to be limiting.
In this embodiment, the memory 403 may include multiple layers, and in a digital system, the memory may be any memory as long as binary data can be stored; in an integrated circuit, a circuit without a physical form and with a storage function is also called a memory, such as a RAM, a FIFO and the like; in the system, the storage device in physical form is also called a memory, such as a memory bank, a TF card and the like.
An embodiment of the present specification further provides a computer storage medium based on the above data query method, where the computer storage medium stores computer program instructions, and when the computer program instructions are executed, the computer storage medium implements: receiving a data query request about target data initiated by a user terminal; wherein the data query request at least carries a facial image of a target user; detecting whether ciphertext data of target data are stored in a cache database or not according to the data query request; the cache database stores ciphertext data of data queried by a user in an effective time period; under the condition that the ciphertext data of the target data are stored in the cache database, carrying out decryption processing on the ciphertext data of the target data by using the face image of the target user according to a preset processing rule; and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal.
In this embodiment, the storage medium includes, but is not limited to, a Random Access Memory (RAM), a Read-Only Memory (ROM), a Cache (Cache), a Hard Disk Drive (HDD), or a Memory Card (Memory Card). The memory may be used to store computer program instructions. The network communication unit may be an interface for performing network connection communication, which is set in accordance with a standard prescribed by a communication protocol.
In this embodiment, functions and effects specifically realized by the program instructions stored in the computer storage medium may be explained in comparison with other embodiments, and are not described herein again.
Embodiments of the present specification further provide a computer program product, which includes a computer program, and when the computer program is executed by a processor, the computer program implements the following steps: receiving a data query request about target data initiated by a user terminal; wherein the data query request at least carries a facial image of a target user; detecting whether ciphertext data of target data are stored in a cache database or not according to the data query request; the cache database stores ciphertext data of data queried by a user in an effective time period; under the condition that the ciphertext data of the target data are stored in the cache database, carrying out decryption processing on the ciphertext data of the target data by using the face image of the target user according to a preset processing rule; and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal.
Referring to fig. 5, in a software level, the embodiment of the present specification further provides a data query apparatus, which may specifically include the following structural modules:
a receiving module 501, which may be specifically configured to receive a data query request about target data initiated by a user terminal; wherein the data query request at least carries a facial image of a target user;
the detection module 502 may be specifically configured to detect, according to the data query request, whether ciphertext data of the target data is stored in the cache database; the cache database stores ciphertext data of data queried by a user in an effective time period;
the decryption module 503 is specifically configured to, when it is determined that the ciphertext data of the target data is stored in the cache database, decrypt, according to a preset processing rule, the ciphertext data of the target data using the face image of the target user;
the sending module 504 may be specifically configured to send the target data obtained by decryption to the user terminal when the decryption is successful.
In some embodiments, when the decryption module 503 is implemented, the ciphertext data of the target data may be decrypted by using the face image of the target user according to the following manner according to a preset processing rule: mapping the face image of the target user into a corresponding character string; generating a corresponding decryption key according to the character string; and decrypting the ciphertext data of the target data by using the decryption key.
In some embodiments, referring to fig. 6, the apparatus may further include a verification module 601, where before the data query request, when the verification module 601 is implemented, the verification module may be configured to perform identity verification on the target user according to the facial image of the target user; and generating a first type of error prompt under the condition that the identity authentication of the target user is determined not to pass.
In some embodiments, referring to fig. 6, the apparatus may further include a query module 602, and the query module 602 may be connected to the detection module 503 and the sending module 504, respectively. In specific implementation, the query module 602 may query the system database to obtain the target data when the detection module 503 determines that the ciphertext data of the target data is not stored in the cache database; and transmits the target data to the user terminal through the transmission module 504.
In some embodiments, the apparatus may further include an encryption module, and in specific implementation, after the target data is obtained by querying the system database, the encryption module may be configured to encrypt the target data by using a face image of the target user according to a preset processing rule to obtain ciphertext data of the target data; and storing the ciphertext data of the target data into a cache database.
In some embodiments, when the encryption module is implemented, the ciphertext data of the target data may be stored in the cache database in the following manner: setting a time tag in the ciphertext data of the target data to obtain the ciphertext data of the target data carrying the time tag; the time tag is used for representing the acquisition time of ciphertext data of the target data; and storing the ciphertext data of the target data carrying the time tag into a cache database.
In some embodiments, after the ciphertext data of the target data with the time tag is stored in the cache database, when the detection module 502 is implemented specifically, the time tag of the ciphertext data of the data stored in the cache database may be detected at preset time intervals; determining and deleting failure data in a cache database according to the time tag; the invalid data is ciphertext data of data, wherein the time interval length between the acquisition time and the current time is greater than or equal to the effective time period.
In some embodiments, when the sending module 504 is implemented, the target data obtained by decryption may be sent to the user terminal in the following manner: and sending the target data obtained by decryption to the user terminal according to the 5G transmission protocol.
In some embodiments, the target data may specifically include at least one of: credit data of the target user, transaction data of the target user, achievement data of the target user, and the like.
It should be noted that, the units, devices, modules, etc. illustrated in the above embodiments may be implemented by a computer chip or an entity, or implemented by a product with certain functions. For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. It is to be understood that, in implementing the present specification, functions of each module may be implemented in one or more pieces of software and/or hardware, or a module that implements the same function may be implemented by a combination of a plurality of sub-modules or sub-units, or the like. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The embodiment of the present specification further provides a data query device, which when implemented specifically, may include the following structural modules:
the generating module is specifically used for responding to the operation of a target user, acquiring and utilizing a face image of the target user and generating a data query request about target data; the data query request at least carries a face image of a target user;
the sending module is specifically configured to send the data query request to a server; the server is used for detecting whether ciphertext data of target data are stored in a cache database or not according to the data query request; the server decrypts the ciphertext data of the target data by using the face image of the target user according to a preset processing rule under the condition that the ciphertext data of the target data is determined to be stored in the cache database; and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal.
In some embodiments, the apparatus may further include a display module, configured to receive and display the first type of error notification prompt to the target user; or receiving and displaying a second type of error-reporting prompt to the user; or, receiving and presenting the target data to the user.
As can be seen from the above, according to the data query apparatus provided in the embodiments of the present specification, when a target user needs to query target data, such as credit investigation data, a data query request about the target data may be generated and initiated by using a user terminal. After receiving the data query request, the server may first detect whether ciphertext data of the target data is stored in the cache database according to the data query request; the cache database is used for storing ciphertext data of data queried by a user within an effective time period; under the condition that the ciphertext data of the target data are stored in the cache database, carrying out decryption processing on the ciphertext data of the target data by utilizing the face image of the target user according to a preset processing rule; and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal. On one hand, the verification operation of the user side can be effectively simplified, so that the target user can efficiently and safely inquire to obtain target data, and the interaction experience of the target user is improved; on the other hand, the data security of the target data can be better protected, and the target data temporarily stored in the cache database is prevented from being leaked.
Although the present specification provides method steps as described in the examples or flowcharts, additional or fewer steps may be included based on conventional or non-inventive means. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of sequences, and does not represent a unique order of performance. When an apparatus or client product in practice executes, it may execute sequentially or in parallel (e.g., in a parallel processor or multithreaded processing environment, or even in a distributed data processing environment) according to the embodiments or methods shown in the figures. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the presence of additional identical or equivalent elements in a process, method, article, or apparatus that comprises the recited elements is not excluded. The terms first, second, etc. are used to denote names, but not any particular order.
Those skilled in the art will also appreciate that, in addition to implementing the controller in purely computer readable program code means, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may therefore be considered as a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
This description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, classes, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
From the above description of the embodiments, it is clear to those skilled in the art that the present specification can be implemented by software plus necessary general hardware platform. With this understanding, the technical solutions in the present specification may be essentially embodied in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a mobile terminal, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments in the present specification.
The embodiments in the present specification are described in a progressive manner, and the same or similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. The description is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable electronic devices, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
While the specification has been described with examples, those skilled in the art will appreciate that there are numerous variations and permutations of the specification that do not depart from the spirit of the specification, and it is intended that the appended claims include such variations and modifications that do not depart from the spirit of the specification.

Claims (14)

1. A data query method is applied to a server and comprises the following steps:
receiving a data query request about target data initiated by a user terminal; wherein the data query request at least carries a facial image of a target user;
detecting whether ciphertext data of target data are stored in a cache database or not according to the data query request; the cache database stores ciphertext data of data queried by a user in an effective time period;
under the condition that the ciphertext data of the target data are stored in the cache database, carrying out decryption processing on the ciphertext data of the target data by using the face image of the target user according to a preset processing rule;
and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal.
2. The method of claim 1, wherein performing decryption processing on ciphertext data of the target data by using the face image of the target user according to a preset processing rule comprises:
mapping the face image of the target user into a corresponding character string;
generating a corresponding decryption key according to the character string;
and decrypting the ciphertext data of the target data by using the decryption key.
3. The method according to claim 1, wherein before detecting whether ciphertext data of the target data is stored in the cache database according to the data query request, the method further comprises:
according to the face image of the target user, performing identity verification on the target user;
and generating a first type of error prompt under the condition that the target user identity authentication is determined not to pass.
4. The method according to claim 1, wherein after detecting whether ciphertext data of the target data is stored in the cache database according to the data query request, the method further comprises:
under the condition that the ciphertext data of the target data are not stored in the cache database, the target data are obtained by inquiring the system database; and transmits the target data to the user terminal.
5. The method of claim 4, wherein after obtaining the target data by querying a system database, the method further comprises:
according to a preset processing rule, carrying out encryption processing on target data by using the face image of a target user to obtain ciphertext data of the target data;
and storing the ciphertext data of the target data into a cache database.
6. The method of claim 5, wherein storing ciphertext data of the target data into a cache database comprises:
setting a time tag in the ciphertext data of the target data to obtain the ciphertext data of the target data carrying the time tag; the time tag is used for representing the acquisition time of ciphertext data of the target data;
and storing the ciphertext data of the target data carrying the time tag into a cache database.
7. The method of claim 6, wherein after storing the ciphertext data of the target data with the time tag into a cache database, the method further comprises:
detecting a time tag of ciphertext data of the data stored in the cache database at a preset time interval;
determining and deleting failure data in a cache database according to the time tag; the invalid data is ciphertext data of data, wherein the time interval length between the acquisition time and the current time is greater than or equal to the effective time period.
8. The method of claim 1, wherein sending the decrypted target data to the user terminal comprises:
and sending the target data obtained by decryption to the user terminal according to the 5G transmission protocol.
9. The method of claim 1, wherein the target data comprises at least one of: credit investigation data of the target user, transaction data of the target user and achievement data of the target user.
10. A data query method, applied to a user terminal, includes:
responding to the operation of a target user, acquiring and utilizing a face image of the target user, and generating a data query request about target data; the data query request at least carries a face image of a target user;
sending the data query request to a server; the server is used for detecting whether ciphertext data of target data are stored in a cache database or not according to the data query request; the server decrypts the ciphertext data of the target data by using the face image of the target user according to a preset processing rule under the condition that the ciphertext data of the target data are stored in the cache database; and under the condition of successful decryption, sending the target data obtained by decryption to the user terminal.
11. A data query apparatus, comprising:
a receiving module, configured to receive a data query request about target data initiated by a user terminal; wherein the data query request at least carries a facial image of a target user;
the detection module is used for detecting whether ciphertext data of the target data are stored in the cache database or not according to the data query request; the cache database stores ciphertext data of data queried by a user in an effective time period;
the decryption module is used for decrypting the ciphertext data of the target data by using the face image of the target user according to a preset processing rule under the condition that the ciphertext data of the target data is determined to be stored in the cache database;
and the sending module is used for sending the target data obtained by decryption to the user terminal under the condition of successful decryption.
12. A server comprising a processor and a memory for storing processor-executable instructions which, when executed by the processor, implement the steps of the method of any one of claims 1 to 9, or 10.
13. A computer-readable storage medium having stored thereon computer instructions which, when executed by a processor, carry out the steps of the method of any one of claims 1 to 9, or 10.
14. A computer program product comprising a computer program which, when executed by a processor, performs the steps of the method of any one of claims 1 to 9, or 10.
CN202210294558.XA 2022-03-24 2022-03-24 Data query method and device and server Pending CN114625756A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210294558.XA CN114625756A (en) 2022-03-24 2022-03-24 Data query method and device and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210294558.XA CN114625756A (en) 2022-03-24 2022-03-24 Data query method and device and server

Publications (1)

Publication Number Publication Date
CN114625756A true CN114625756A (en) 2022-06-14

Family

ID=81903075

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210294558.XA Pending CN114625756A (en) 2022-03-24 2022-03-24 Data query method and device and server

Country Status (1)

Country Link
CN (1) CN114625756A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115310126A (en) * 2022-08-01 2022-11-08 中图测绘技术(杭州)有限公司 Cadastral surveying and mapping management method, system and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115310126A (en) * 2022-08-01 2022-11-08 中图测绘技术(杭州)有限公司 Cadastral surveying and mapping management method, system and storage medium
CN115310126B (en) * 2022-08-01 2024-03-29 中图测绘技术(杭州)有限公司 Cadastral mapping management method, cadastral mapping management system and storage medium

Similar Documents

Publication Publication Date Title
US20210051023A1 (en) Cross-chain authentication method, system, server, and computer-readable storage medium
EP3100171B1 (en) Client authentication using social relationship data
CN111917773B (en) Service data processing method and device and server
CN105262779B (en) Identity authentication method, device and system
CN112217835B (en) Message data processing method and device, server and terminal equipment
CN108683667B (en) Account protection method, device, system and storage medium
CN110688662A (en) Sensitive data desensitization and inverse desensitization method and electronic equipment
CN104580316A (en) Software authorization management method and software authorization management system
CN110268406B (en) Password security
WO2015062530A1 (en) User account information management method, user account management server, sales terminal and system
CN105550627A (en) Fingerprint verification method and apparatus
CN112150113A (en) Method, device and system for borrowing file data and method for borrowing data
CN110417557B (en) Intelligent terminal peripheral data security control method and device
CN106685945B (en) Service request processing method, service handling number verification method and terminal thereof
CN114625756A (en) Data query method and device and server
CN114826604A (en) Applet login verification method, device and equipment based on face recognition and storage medium
CN113239401A (en) Big data analysis system and method based on power Internet of things and computer storage medium
CN107026826B (en) Data processing method and device, server and cloud management system
CN115482132A (en) Data processing method and device for electronic contract based on block chain and server
CN115567218A (en) Data processing method and device of security certificate based on block chain and server
CN113962695A (en) Data processing method and device and server
Lin Survey on cloud based mobile security and a new framework for improvement
CN110489253A (en) Data processing method, device, equipment and computer readable storage medium
WO2020071938A1 (en) Method and system for flagging actions of a user for subsequent analysis and storage
CN114912918A (en) Data processing method and device and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination