CN102447682A - System and method for obtaining network personal information - Google Patents

System and method for obtaining network personal information Download PDF

Info

Publication number
CN102447682A
CN102447682A CN2010105059272A CN201010505927A CN102447682A CN 102447682 A CN102447682 A CN 102447682A CN 2010105059272 A CN2010105059272 A CN 2010105059272A CN 201010505927 A CN201010505927 A CN 201010505927A CN 102447682 A CN102447682 A CN 102447682A
Authority
CN
China
Prior art keywords
user
secret information
integrated value
server
user side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010105059272A
Other languages
Chinese (zh)
Inventor
龙一铭
向东辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN PROFESSIONALS INFORMATION TECHNOLOGY CO LTD
Original Assignee
SHENZHEN PROFESSIONALS INFORMATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN PROFESSIONALS INFORMATION TECHNOLOGY CO LTD filed Critical SHENZHEN PROFESSIONALS INFORMATION TECHNOLOGY CO LTD
Priority to CN2010105059272A priority Critical patent/CN102447682A/en
Publication of CN102447682A publication Critical patent/CN102447682A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a method of obtaining network personal information, comprising the following steps: the first user terminal uploading the view request of secret information of personal registration information of the first user to the second user to the server, the second user terminal uploading the request processing results of the second user terminal to the sever; the sever returning the related secret information of the second user to the first user terminal according to the treatment results. In addition, the invention also provides a system for obtaining network personal information. The system and method for obtaining network personal information is characterized by the first user being capable of viewing the secret information after the permission of the second user, not only ensuring the security of the secret information, but having access to information for other users.

Description

Obtain the system and method for network personal information
[technical field]
The present invention relates to the internet information technical field, particularly a kind of system and method that obtains network personal information.
[background technology]
In some website, the user need fill in individual real information and could register and become the member, and the user need submit personal information data such as individual's Real Name, phone to, so that the audit authentication is through becoming the registered members.But the personal information data of user's registration simultaneously will be faced with safety problem, how could guarantee that these information are not leaked, and can let other users that need understand consult again, and this will be the problem that needs solution.
[summary of the invention]
Based on this, be necessary to provide a kind of system that obtains network personal information, both guaranteed user's in the network personal information data security, be convenient to other users again and obtain.
In addition, also be necessary to provide a kind of method of obtaining network personal information, both guaranteed user's in the network personal information data security, be convenient to other users again and browse.
A kind of system that obtains network personal information comprises at least: first user side, second user side and server, and first user side is uploaded onto the server first user to the request of checking of the secret information in second user's the individual log-on message;
The request of checking that said server will receive sends to second user side; Receive second user that said second user side uploads to the said processing of request result that checks, second user's relevant secret information is turned back to said first user side according to said result.
Preferably, said server comprises:
Registering modules is used to obtain user's individual log-on message and sign-on ID number, and said individual log-on message comprises public information and secret information;
Memory module is used to store the said user's who obtains individual log-on message and sign-on ID number;
Communication module is used for communicating with said first user side and second user side.
Preferably, said memory module also is used to store the corresponding relation that preset said secret information is checked the corresponding integrated value that need consume or given tacit consent to integrated value and integrated value and cost value.
Preferably, said server also comprises statistical module, is used for the credit grade of statistics of user's; Said memory module also is used to store the integrated value or the acquiescence integrated value of being checked required consumption according to the preset secret information of credit grade.
Preferably; Said server also comprises accounting module; Second user that said accounting module is used for uploading according to said second user side that receives calculates the integrated value that is consumed to the said processing of request result that checks; Calculate relevant expense according to integrated value and the said integrated value of calculating gained with the corresponding relation of cost value again, and the expense that deduction is correlated with from said first user's sign-on ID number.
Preferably; When the secret information of the request of secret information is a plurality of in the individual log-on message of checking second user that first user that said first user side obtains sends; When the number that returns to the relevant secret information of first user side is less than the number of secret information of the request of checking of said transmission; And when the result that first user that said first user side will obtain checks the relevant secret information refusal that returns is uploaded onto the server, said accounting module will be return the correlative charges of said deduction.
A kind of method of obtaining network personal information may further comprise the steps:
First user side is uploaded onto the server first user to the request of checking of secret information in second user's the individual log-on message;
The request of checking that said server will receive sends to second user side;
Said second user side uploads to said server with second user to the said processing of request result that checks;
Said server turns back to said first user side according to said result with second user's relevant secret information.
Preferably, said method is further comprising the steps of:
Obtain user's individual log-on message and sign-on ID number, said individual log-on message comprises public information and secret information;
Store the said user's who obtains individual log-on message and sign-on ID number.
Preferably, said method also comprises corresponding integrated value that the preset said secret information of storage is checked needs consumption or the step of giving tacit consent to the corresponding relation of integrated value and integrated value and cost value.
Preferably, said method also comprises:
The credit grade of statistics of user's;
The integrated value or the acquiescence integrated value of required consumption checked in storage according to the preset secret information of credit grade.
Preferably; Said method also comprises step: second user who uploads according to said second user side that receives calculates the integrated value that is consumed to the said processing of request result that checks; Calculate relevant expense according to integrated value and the said integrated value of calculating gained with the corresponding relation of cost value again, and the expense that deduction is correlated with from said first user's sign-on ID number.
Preferably; Said method also comprises step: the secret information of the request of secret information is a plurality of in the individual log-on message of checking second user of first user transmission that said first user side obtains; When the number that returns to the relevant secret information of first user side is less than the number of secret information of the request of checking of said transmission; First user that said first user side will obtain uploads onto the server to the result that the relevant secret information refusal that returns is checked, said server will be return the correlative charges of said deduction.
The above-mentioned system and method that obtains network personal information; Adopt first user side that first user is uploaded onto the server to the request of checking of second user's secret information, server checks that with this request sends to second user side, and second user side is uploaded onto the server second user to checking the processing of request result; Server returns relevant secret information to first user side according to result; First user side is shown to first user with this secret information that returns, and after so being allowed by second user, first user just can obtain and check secret information; Both guaranteed the safety of user's secret information, and let other users possibly obtain the information of wanting again.
[description of drawings]
Fig. 1 is the structural representation that obtains the system of network personal information among the embodiment;
Fig. 2 is the internal structure sketch map that obtains the system of network personal information among the embodiment;
Fig. 3 is for obtaining the sequential chart of the system works of network personal information among Fig. 2;
Fig. 4 is the internal structure sketch map of the server of the system that obtains network personal information among another embodiment;
Fig. 5 is the sequential chart of the work of the system that obtains network personal information among Fig. 4;
Fig. 6 is the flow chart that obtains the method for network personal information among the embodiment;
Fig. 7 is for obtaining the flow chart of the method for network personal information among another embodiment.
[embodiment]
Below in conjunction with concrete embodiment and accompanying drawing technical scheme of the present invention is carried out detailed description.
As shown in Figure 1, among the embodiment, a kind of system that obtains network personal information comprises a plurality of user sides 10 and server 20.Carry out data interaction between a plurality of user sides 10 and the server 20.
As shown in Figure 2, carrying out with two user sides 10 and server 20 is that example specifies alternately, and two user sides are first user side 11 and second user side 12.Wherein, first user side 11 comprises interconnective first input module 110, first transceiver module 111 and first display module 112.Second user side 12 comprises interconnective second input module 120, second transceiver module 121 and second display module 122.Server 20 comprises interconnective Registering modules 200, memory module 210 and communication module 220.Each user need login registration; Its registration process is the same; Be that example explanation user logins registration process with first user side 11 below: after first user logins first user side 11; Through first input module, 110 input register requirement, first transceiver module 111 sends to this register requirement the communication module 220 of server 20; Communication module 220 passes to Registering modules 200 with register requirement, and Registering modules 200 sends Registration Forms and returns to transceiver module 110 through communication module 220, and is shown to the user through first display module 112; First input module 110 gets access to the individual log-on message that first user fills in according to Registration Forms, sends to communication module 220 through first transceiver module 111 again, passes to Registering modules 200 again; Registering modules 200 distributes a sign-on ID number, and first user's individual log-on message and sign-on ID number are stored in the memory module 210; Registering modules 200 returns to user side with sign-on ID number and the information that succeeds in registration through communication module.After the registration, store user's individual log-on message and sign-on ID number in the memory module 210 of server 20.In addition, the internal structure of each user side 10 is basic identical, here only with first user side 11 and 12 explanations of second user side.
User's individual log-on message comprises public information and secret information.Public information in user's the individual log-on message can be checked after being meant and can letting other users login; The industry of being engaged in like the user, sex, hobby etc.; Secret information in user's the individual log-on message is meant can not be checked after other users login, like first user's Real Name, ID card No., address, telephone number etc.User's public information and secret information can be set according to the personal considerations by user oneself.
Fig. 3 is the system works sequential chart that obtains network personal information, in conjunction with the course of work of Fig. 2 with first user side 11, server 20 and second user side 12 system that is the example personal information that describes the user when checking.
The detailed process that user's individual log-on message is checked is:
(1) first user side 11 obtains the request of secret information in the individual log-on message that first user checks second user.First input module 110 (like button, touch-screen etc.) of first user side 11 gets access to the request of secret information in the individual log-on message of checking second user of first user input.First user can preengage one or more information in the secret information of checking second user according to the personal considerations.A plurality of requests that first user selection that first user side 11 will get access to is checked; As get access to first user and select to check one or more the request in second user's the Real Name, identity card, address, the request of checking that will obtain again uploads onto the server 20.
(2) first user sides 11 are checked this and are asked to upload onto the server 20.First user side 11 checks that with this request uploads onto the server 20 through first transceiver module 111.
(3) request of checking that server 20 will receive sends to second user side 12.
(4) second user sides 12 obtain second user this are checked the processing of request result.Second user side receives that server 20 sends check request after; Be shown to second user through second display module 122; Second user handles, second user side 12 will get access to second user through the input of second input module 120 to checking the processing of request result.Second user checks that to this processing of request result can be all processing of request of checking of refusal, perhaps can be part or all of check processing of request.For example check the request that comprises Real Name, ID card No. and the certificate address information of checking second user in the request, the result of second user processing can be the information that allows to check Real Name and ID card No..Second user side 12 uploads onto the server 20 through second transceiver module 121 after getting access to second user's result.
(5) second user sides 12 upload onto the server 20 with this result.Second user side 12 uploads onto the server 20 with this result through second transceiver module 121.
(6) server 20 turns back to first user side 11 according to this result with the second user-dependent secret information.Obtain corresponding second user's secret information in the memory module 210 of server 20 according to this result, send to first user side 11 through communication module 220.
The secret information that (7) first user sides 11 return reception is shown to first user.First user side 11 is shown to first user with the secret information that receives through first display module 112, so that it is checked.
In another embodiment, as shown in Figure 4, server 20 removes and comprises Registering modules 200, memory module 210 and communication module 220, also comprises statistical module 230 and accounting module 240.Among this embodiment, memory module 210 also is used to store preset secret information and is checked corresponding integrated value that needs consumption or the corresponding relation of giving tacit consent to integrated value and integrated value and cost value.Secret information that should be preset is checked to be needed the corresponding integrated value that consumes or gives tacit consent to integrated value; Be provided with in advance according to the personal considerations when registering by the user; The integrated value of the required consumption that this is provided with in advance or acquiescence integrated value upload onto the server 20 through user side 10 in advance, and are stored in the memory module 210 of server 20.Wherein, this acquiescence integrated value is checked required average product score value through all previous certain information that calculates, and this acquiescence integrated value also can be used as the reference value assisted user and is provided with in advance.Concrete presetting can be referring to shown in the table 1.In addition, the corresponding relation of integrated value and cost value is provided with by memory module 210 storages in advance.Integrated value can be the corresponding certain cost value of each integrated value with the corresponding relation of cost value.In addition, the integrated value in user's sign-on ID number be exchange through the mode of supplementing with money behind user's sign-on ID number supplement the equivalent numerical value of expense with money with this.
Table 1
Concealed field name Field value The integrated value number
Real Name Zhang San 10
Identification card number 420XXXXXXXX 25
The address The XXXXX of Shenzhen 40
Telephone number 135XXXXXXXX 55
Statistical module 230 is used for the credit grade of statistics of user's.Server 20 can be provided with the grading mode; Add up the result of other users to a certain user's credit appraisal; As the grade mode of five stars can be set, and other users estimate this user, and the various evaluation informations of statistical module 230 statistics carry out comprehensively on average drawing this user's credit grade.Like A, B, three users of C the D evaluation of user is respectively 3 stars, 4 stars, 5 stars, then to count D user's credit grade be 4 stars to statistical module 230.
Memory module 210 also is used to store the integrated value or the acquiescence integrated value of being checked required consumption according to the preset secret information of credit grade.User's secret information is checked that integrated value or the acquiescence integrated value that different quilts is checked needs consumption can be set according to different credit grades; This acquiescence integrated value is checked required average product score value through all previous certain information that calculates, and this acquiescence integrated value also can be used as the reference value assisted user and presets.Credit grade is high more checks that the integrated value that secret information need consume is few more.Predeterminable integrated value or acquiescence integrated value of being checked required consumption according to the different concealed informations of credit grade when the user registers, user side 10 will get access to this presupposed information and 20 memory module 210 storages of uploading onto the server.Concrete presetting can be referring to shown in the table 2.In addition, also predeterminable for credit grade when low secret information do not allow to be checked.
Table 2
Second user that accounting module 240 is used for uploading according to second user side 12 that receives calculates the integrated value that is consumed to checking the processing of request result; Calculate relevant expense according to integrated value and the integrated value of calculating gained with the corresponding relation of cost value again, and the expense that deduction is correlated with from first user's sign-on ID number.When calculating the integrated value that is consumed according to result; If do not preset the integrated value of the required consumption of credit grade; Can not consider the problem of credit grade; Only calculate the integrated value that preset secret information is checked required consumption,, then need consider because the integrated value of the required consumption that credit grade is brought if be provided with credit grade.As check the request in Real Name, ID card No. and address in second user's the secret information; Second user side 12 gets access to the result that second user allows Real Name and address to be checked; Under the situation of not considering credit rating, the integrated value that is then consumed is the summation that adds up that two information are checked the integrated value that consumes respectively.Specifically can be as shown in table 3, but be not limited thereto.
Table 3
Concealed field name Whether check
Real Name Be
Identification card number Not
The address Be
Telephone number Not
Shown in table 3 associative list 1, then the integrated value of required consumption is: the 10+0+40+0=50 branch, score value is: the 10+25+40+55=130 branch if first user selects to see entirely.
In addition; When the secret information of the request of secret information in the individual log-on message of checking second user that first user that first user side 11 obtains sends when being a plurality of; When the number that returns to the relevant secret information of first user side 11 is less than the number of secret information of the request of checking that first user that first user side 11 uploads sends; First user that first user side 11 will obtain uploaded onto the server 20 o'clock to the result that the relevant secret information refusal that returns is checked, the accounting module 240 of server 20 will be return the correlative charges of deduction.When all of sending as first user check that request is allowed to; First user has only checked; But when the request of checking of first user transmission has only part to be allowed to; After first user side 11 gets access to the result that first user selects the relevant secret information refusal that returns is checked, the expense that then will return deduction by the accounting module 240 of server 20.So, guaranteed the convenience that first user checks and do not obtain and reduced loss when needing information.
In addition, be less than first user and send when checking the secret information number that need check in the request even also can be set to return to first user's relevant secret information number, the expense of taking off is no longer return.
Fig. 5 is the sequential chart of system works among this embodiment.Compare with Fig. 3; In this sequential chart except comprising that process (1) is to (7); Also be included in the process that needs computational costs between (5) and (6); Be that second user that the accounting module 240 of server 20 is uploaded according to second user side 12 calculates the integrated value that is consumed to checking the processing of request result, the integrated value according to the integrated value of calculating gained and memory module 210 storages calculates relevant expense with the corresponding relation of cost value again, and the expense that deduction is correlated with from first user's sign-on ID number; Increase expense in first user's the sign-on ID number again, the corresponding service charge of deduction in first user's the sign-on ID number and second user's the sign-on ID number simultaneously.
In one embodiment, as shown in Figure 6, a kind of method of obtaining network personal information may further comprise the steps:
Step S10, first user side 11 uploads onto the server 20 with first user to the request of checking of secret information in second user's the individual log-on message.First input module 110 (like button, touch-screen etc.) of first user side 11 gets access to the request of secret information in the individual log-on message of checking second user of first user input, and this is checked that request uploads onto the server 20 through first transceiver module 111.First user can preengage one or more information in the secret information of checking second user according to the personal considerations.First user side 11 can get access to a plurality of requests that first user selection is checked; As get access to first user and select to check one or more the request in second user's the Real Name, identity card, address, telephone number, the request of checking that will get access to again uploads onto the server 20.
Step S20, the request of checking that server 20 will receive sends to second user side 12.
Step S30, second user side 12 checks that to this processing of request result uploads onto the server 20 with second user.Second user side 12 receives that server 20 sends check request after; Be shown to second user through second display module 122; Second user handles; Second user side 12 will get access to second user to checking the processing of request result, and this result is uploaded onto the server 20 through second transceiver module 121.Second user checks that to this processing of request result can be all processing of request of checking of refusal, perhaps can be part or all of check processing of request.As check and comprise in the request and check Real Name, ID card No. and certificate address information that second user processing is for allowing to check Real Name and ID card No..Second user side 12 will upload onto the server 20 after getting access to second user's result.
Step S40, server 20 turns back to first user side 11 according to this result with second user's relevant secret information.
The user need register earlier before step S10, so that user's individual log-on message is kept on the server, can check when supplying the user to login.The above-mentioned method of obtaining network personal information also comprises: obtain user's individual log-on message and sign-on ID number, this registration personal information comprises public information and secret information; Store this user's who obtains individual log-on message and sign-on ID number.The content of the concrete steps of user registration and user's public information and secret information such as aforementioned can be preestablished according to the personal considerations by the user and is kept on the server 20.
In one embodiment; As shown in Figure 7; The above-mentioned method of obtaining network personal information also comprises step before at step S10: the preset secret information of storage is checked to need corresponding integrated value that consumes or the corresponding relation of giving tacit consent to integrated value and integrated value and cost value.Secret information that should be preset is checked to be needed the corresponding integrated value that consumes or gives tacit consent to integrated value; Be provided with in advance according to the personal considerations when registering by the user; The integrated value of the required consumption that this is provided with in advance or acquiescence integrated value upload onto the server 20 through user side 10 in advance, and are stored in the memory module 210 of server 20.Wherein, this acquiescence integrated value is checked required average product score value through all previous certain information that calculates, and this acquiescence integrated value also can be used as the reference value assisted user and is provided with in advance.Concrete presetting can be referring to shown in the table 1.In addition, the corresponding relation of integrated value and cost value is provided with by memory module 210 storages in advance.Integrated value can be the corresponding certain cost value of each integrated value with the corresponding relation of cost value.
Among this embodiment, the above-mentioned method of obtaining network personal information also comprises step: the credit grade of statistics of user's; The integrated value or the acquiescence integrated value of required consumption checked in storage according to the preset secret information of credit grade.Server 20 can be provided with the grading mode; Add up the result of other users to a certain user's credit appraisal; As the grade mode of five stars can be set, and other users estimate this user, and the various evaluation informations of statistical module 230 statistics carry out comprehensively on average drawing this user's credit grade.Like A, B, three users of C the D evaluation of user is respectively 3 stars, 4 stars, 5 stars, then to count D user's credit grade be 4 stars to statistical module 230.User's secret information is checked that integrated value or the acquiescence integrated value that different quilts is checked needs consumption can be set according to different credit grades; This acquiescence integrated value is checked required average product score value through all previous certain information that calculates, and this acquiescence integrated value also can be used as the reference value assisted user and presets.Credit grade is high more checks that the integrated value that secret information need consume is few more.Predeterminable integrated value or acquiescence integrated value of being checked required consumption according to the different concealed informations of credit grade when the user registers, user side 10 will get access to this presupposed information and 20 memory module 210 storages of uploading onto the server.Concrete presetting can be referring to shown in the table 2.In addition, also predeterminable for credit grade when low secret information do not allow to be checked.
Among this embodiment; After step S40, also comprise step S50: second user who uploads according to second user side 12 that receives checks that to this processing of request result calculates the integrated value that is consumed; Calculate relevant expense according to integrated value and the integrated value of calculating gained with the corresponding relation of cost value again, and the expense that deduction is correlated with from first user's sign-on ID number.When calculating the integrated value that is consumed according to result; If do not preset the integrated value of the required consumption of credit grade; Can not consider the problem of credit grade; Only calculate the integrated value that preset secret information is checked required consumption,, then need consider because the integrated value of the required consumption that credit grade is brought if be provided with credit grade.As check the request in Real Name, ID card No. and address in second user's the secret information; Second user side 12 gets access to the result that second user allows Real Name and address to be checked; Under the situation of not considering credit rating, the integrated value that is then consumed is the summation that adds up that two information are checked the integrated value that consumes respectively.Specifically can be as shown in table 3, but be not limited thereto.
Among this embodiment; The above-mentioned method of obtaining network personal information also comprises: the secret information of the request of secret information is a plurality of in the individual log-on message of checking second user of first user transmission that first user side 11 obtains; When the number that returns to the relevant secret information of first user side 11 is less than the number of secret information of the request of checking of transmission; First user that first user side 11 will obtain uploaded onto the server 20 o'clock to the result that the relevant secret information refusal that returns is checked, server 20 will be return the correlative charges of said deduction.When all of sending as first user check that request is allowed to; First user has only checked; But when the request of checking of first user transmission has only part to be allowed to; After first user side 11 gets access to the result that first user selects the relevant secret information refusal that returns is checked, the expense that then will return deduction by the accounting module 240 of server 20.
In addition, be less than first user and send when checking the secret information number that need check in the request even also can be set to return to first user's relevant secret information number, the expense of taking off is no longer return.
The above-mentioned system and method that obtains network personal information; Adopt first user side 11 that first user is uploaded onto the server 20 to the request of checking of second user's secret information; Server 20 checks that with this request sends to second user side 12; Second user side 12 uploads onto the server 20 with second user to checking the processing of request result, and server 20 returns relevant secret information according to result and to first user side, 11, the first user sides 11 this secret information that returns is shown to first user; After so allowing by second user; First user just can obtain and check secret information, has both guaranteed the safety of user's secret information, lets other users possibly obtain the information of wanting again.
In addition, check that through setting secret information need consume corresponding integrated value, be exchanged into corresponding cost according to the integrated value that consumes again, the relevant expense of deduction from check user's sign-on ID number has realized the convenience of chargeing.
When the user did not obtain the secret information that needs, the expense of returning deduction had been avoided loss.
The above embodiment has only expressed several kinds of execution modes of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to claim of the present invention.Should be pointed out that for the person of ordinary skill of the art under the prerequisite that does not break away from the present invention's design, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection range of patent of the present invention should be as the criterion with accompanying claims.

Claims (12)

1. system that obtains network personal information; It is characterized in that; At least comprise: first user side, second user side and server, first user side is uploaded onto the server first user to the request of checking of the secret information in second user's the individual log-on message;
The request of checking that said server will receive sends to second user side; Receive second user that said second user side uploads to the said processing of request result that checks, second user's relevant secret information is turned back to said first user side according to said result.
2. the system that obtains network personal information according to claim 1 is characterized in that, said server comprises:
Registering modules is used to obtain user's individual log-on message and sign-on ID number, and said individual log-on message comprises public information and secret information;
Memory module is used to store the said user's who obtains individual log-on message and sign-on ID number;
Communication module is used for communicating with said first user side and second user side.
3. the system that obtains network personal information according to claim 2; It is characterized in that said memory module also is used to store preset said secret information and is checked corresponding integrated value that needs consumption or the corresponding relation of giving tacit consent to integrated value and integrated value and cost value.
4. the system that obtains network personal information according to claim 3 is characterized in that said server also comprises statistical module, is used for the credit grade of statistics of user's; Said memory module also is used to store the integrated value or the acquiescence integrated value of being checked required consumption according to the preset secret information of credit grade.
5. according to claim 3 or the 4 described systems that obtain network personal information; It is characterized in that; Said server also comprises accounting module; Second user that said accounting module is used for uploading according to said second user side that receives calculates the integrated value that is consumed to the said processing of request result that checks, calculates relevant expense according to integrated value and the said integrated value of calculating gained with the corresponding relation of cost value again, and the expense that deduction is correlated with from said first user's sign-on ID number.
6. the system that obtains network personal information according to claim 5; It is characterized in that; When the secret information of the request of secret information is a plurality of in the individual log-on message of checking second user that first user that said first user side obtains sends; When the number that returns to the relevant secret information of first user side is less than the number of secret information of the request of checking of said transmission; And when the result that first user that said first user side will obtain checks the relevant secret information refusal that returns is uploaded onto the server, said accounting module will be return the correlative charges of said deduction.
7. method of obtaining network personal information may further comprise the steps:
First user side is uploaded onto the server first user to the request of checking of secret information in second user's the individual log-on message;
The request of checking that said server will receive sends to second user side;
Said second user side uploads to said server with second user to the said processing of request result that checks;
Said server turns back to said first user side according to said result with second user's relevant secret information.
8. the method for obtaining network personal information according to claim 7 is characterized in that, said method is further comprising the steps of:
Obtain user's individual log-on message and sign-on ID number, said individual log-on message comprises public information and secret information;
Store the said user's who obtains individual log-on message and sign-on ID number.
9. the method for obtaining network personal information according to claim 8; It is characterized in that said method also comprises corresponding integrated value that the preset said secret information of storage is checked needs consumption or the step of giving tacit consent to the corresponding relation of integrated value and integrated value and cost value.
10. the method for obtaining network personal information according to claim 9 is characterized in that, said method also comprises:
The credit grade of statistics of user's;
The integrated value or the acquiescence integrated value of required consumption checked in storage according to the preset secret information of credit grade.
11. according to claim 9 or the 10 described systems that obtain network personal information; It is characterized in that; Said method also comprises step: second user who uploads according to said second user side that receives calculates the integrated value that is consumed to the said processing of request result that checks; Calculate relevant expense according to integrated value and the said integrated value of calculating gained with the corresponding relation of cost value again, and the expense that deduction is correlated with from said first user's sign-on ID number.
12. the system that obtains network personal information according to claim 11; It is characterized in that; Said method also comprises step: the secret information of the request of secret information is a plurality of in the individual log-on message of checking second user of first user transmission that said first user side obtains; When the number that returns to the relevant secret information of first user side is less than the number of secret information of the request of checking of said transmission; First user that said first user side will obtain uploads onto the server to the result that the relevant secret information refusal that returns is checked, said server will be return the correlative charges of said deduction.
CN2010105059272A 2010-10-12 2010-10-12 System and method for obtaining network personal information Pending CN102447682A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105059272A CN102447682A (en) 2010-10-12 2010-10-12 System and method for obtaining network personal information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105059272A CN102447682A (en) 2010-10-12 2010-10-12 System and method for obtaining network personal information

Publications (1)

Publication Number Publication Date
CN102447682A true CN102447682A (en) 2012-05-09

Family

ID=46009773

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105059272A Pending CN102447682A (en) 2010-10-12 2010-10-12 System and method for obtaining network personal information

Country Status (1)

Country Link
CN (1) CN102447682A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103686680A (en) * 2012-09-19 2014-03-26 王方淇 Information acquisition method, remote equipment, mobile terminal and information acquisition system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1764113A (en) * 2004-10-20 2006-04-26 华为技术有限公司 Method for realizing privacy authentication
CN101005519A (en) * 2001-04-18 2007-07-25 雅虎公司 Privacy control system for personal information card system and method thereof
CN101091369A (en) * 2004-12-22 2007-12-19 艾利森电话股份有限公司 Means and method for control of personal data
CN101105792A (en) * 2006-07-14 2008-01-16 吉林省天勤电子有限公司 Electronic VIP service method
CN101123644A (en) * 2006-08-11 2008-02-13 华为技术有限公司 An authorized management system and authorized management server
CN101217374A (en) * 2008-01-18 2008-07-09 北京工业大学 A protection method on user privacy in three-party conversation
CN101335745A (en) * 2007-06-27 2008-12-31 潘广和 Method and apparatus for data authorizing and authorized data access in Web application program system
WO2010021502A2 (en) * 2008-08-20 2010-02-25 Samsung Electronics Co., Ltd. Method and apparatus for protecting personal information in a home network
CN101730100A (en) * 2009-03-17 2010-06-09 中兴通讯股份有限公司 Supervisory method and supervisory entity of authorization service of identify providing entity
CN101819616A (en) * 2010-03-22 2010-09-01 北京工业大学 Method for tracking leakage of private information

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005519A (en) * 2001-04-18 2007-07-25 雅虎公司 Privacy control system for personal information card system and method thereof
CN1764113A (en) * 2004-10-20 2006-04-26 华为技术有限公司 Method for realizing privacy authentication
CN101091369A (en) * 2004-12-22 2007-12-19 艾利森电话股份有限公司 Means and method for control of personal data
CN101105792A (en) * 2006-07-14 2008-01-16 吉林省天勤电子有限公司 Electronic VIP service method
CN101123644A (en) * 2006-08-11 2008-02-13 华为技术有限公司 An authorized management system and authorized management server
CN101335745A (en) * 2007-06-27 2008-12-31 潘广和 Method and apparatus for data authorizing and authorized data access in Web application program system
CN101217374A (en) * 2008-01-18 2008-07-09 北京工业大学 A protection method on user privacy in three-party conversation
WO2010021502A2 (en) * 2008-08-20 2010-02-25 Samsung Electronics Co., Ltd. Method and apparatus for protecting personal information in a home network
CN101730100A (en) * 2009-03-17 2010-06-09 中兴通讯股份有限公司 Supervisory method and supervisory entity of authorization service of identify providing entity
CN101819616A (en) * 2010-03-22 2010-09-01 北京工业大学 Method for tracking leakage of private information

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103686680A (en) * 2012-09-19 2014-03-26 王方淇 Information acquisition method, remote equipment, mobile terminal and information acquisition system

Similar Documents

Publication Publication Date Title
EP2564308B1 (en) Secure and efficient login and transaction authentication using iphones and other smart mobile communication devices
US9672336B1 (en) Security system for verification of user credentials
CN102457507B (en) Cloud computing resources secure sharing method, Apparatus and system
CN101222333B (en) Data transaction processing method and apparatus
CN102571336A (en) Login authentication method, device and system
CA2676848A1 (en) Methods and a system for providing transaction related information
CN104717261A (en) Login method and desktop management device
EP2779669B1 (en) Method and system for acquiring access rights to conditional access content
CN106416336A (en) Identification and/or authentication system and method
CN103023901A (en) Login method and login system of mobile terminal
CN105357239B (en) Method and device for providing service and method and device for obtaining service
CN114268667A (en) Data forwarding method and device, computer equipment and storage medium
US20150332361A1 (en) Reputation System and Method
JP2015082140A (en) Onetime password issuing device, program, and onetime password issuing method
Tsai et al. Secure OTP and biometric verification scheme for mobile banking
CN102447682A (en) System and method for obtaining network personal information
WO2013119747A4 (en) Method and system for managing digital rights for content
US9961075B2 (en) Identity based ticketing
KR101744868B1 (en) Method and Device for Managing Security Keys
CN115297137A (en) Shared bicycle using method, electronic equipment and storage medium
Rech et al. A novel embedded platform for secure and privacy-concerned cross-domain service access
US20070174064A1 (en) Multiple tickets for receiving content
WO2020064519A1 (en) Improved system and method for electronic voting
CN101848228A (en) Method and system for authenticating computer terminal server ISP identity by using SIM cards
EP3425545A1 (en) Authentication processing device and authentication processing method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120509

WD01 Invention patent application deemed withdrawn after publication