CN108460263A - Information sharing method, device and electronic equipment - Google Patents
Information sharing method, device and electronic equipment Download PDFInfo
- Publication number
- CN108460263A CN108460263A CN201810071589.2A CN201810071589A CN108460263A CN 108460263 A CN108460263 A CN 108460263A CN 201810071589 A CN201810071589 A CN 201810071589A CN 108460263 A CN108460263 A CN 108460263A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- sharing
- biometric image
- biometric
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/04—Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0623—Item investigation
- G06Q30/0625—Directed, with specific intent or strategy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Medical Informatics (AREA)
- Game Theory and Decision Science (AREA)
- Databases & Information Systems (AREA)
- Technology Law (AREA)
- Collating Specific Patterns (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The embodiment of the present application discloses a kind of information sharing method, device and electronic equipment, this method:In the first user success log-in service platform, the first biometric image of second user is obtained;First biometric image is matched with the biometric templates of the second user;Based on matching result, it is determined whether show the second user to first user waits for sharing information.
Description
Technical field
This application involves information technology fields, relate more specifically to information sharing method, device and electronic equipment.
Background technology
In daily life, it is often desirable to which other people information can be shared.For example, if a user is passing through one
When a transaction platform purchase insurance products, it is desirable to be able to refer to other people selection, this user is it should be understood that other people buy
Insurance products type, that is, need to share other people declaration form.But declaration form is usually directed to individual privacy, it is contemplated that information it is hidden
Private and safety issue, the holder of declaration form may only want to declaration form being shared with oneself known people, but currently without conjunction
Suitable method can realize sharing for information in the case of the privacy of protection information and safety.
Therefore, a kind of method of Information Sharing of demand, to overcome above-mentioned technical problem.
Invention content
The application's is designed to provide a kind of information sharing method, device and electronic equipment, can realize and believe in protection
In the case of the privacy of breath and safety, sharing for information is realized.
In order to solve the above technical problems, what the embodiment of the present application was realized in:
In a first aspect, a kind of method of Information Sharing is provided, including:
In the first user success log-in service platform, the first biometric image of second user is obtained;
First biometric image is matched with the biometric templates of the second user;
Based on matching result, it is determined whether show the second user to first user waits for sharing information.
Second aspect provides a kind of Information Sharing device, including:
Acquiring unit obtains the first biometric image of second user in the first user success log-in service platform;
Matching unit matches first biometric image with the biometric templates of the second user;
Processing unit is based on matching result, it is determined whether shows that the second user waits sharing to first user
Information.
The third aspect provides a kind of electronic equipment, including:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction uses described when executed
Processor executes following operation:
In the first user success log-in service platform, the first biometric image of second user is obtained;
First biometric image is matched with the biometric templates of the second user;
Based on matching result, it is determined whether show the second user to first user waits for sharing information.
Fourth aspect, provides a kind of computer-readable medium, the computer-readable medium storage one or more program,
One or more of programs by the electronic equipment including multiple application programs when being executed so that the electronic equipment execute with
Lower operation:
In the first user success log-in service platform, the first biometric image of second user is obtained;
First biometric image is matched with the biometric templates of the second user;
Based on matching result, it is determined whether show the second user to first user waits for sharing information.
By the above technical solution provided by the embodiments of the present application as it can be seen that the embodiment of the present application takes in first user's successful log
Be engaged in platform when, obtain the first biometric image of second user, and by the biology of the first biometric image and second user
Feature templates are matched, according to matched as a result, determining whether that first user shows that second user waits for sharing information.It is logical
Often in first user's successful log service platform, second user is needed to agree to just get the biological characteristic figure of second user
Second user can only be waited for that sharing information is shared with the user that second user wishes to share by picture, therefore can protect
The privacy of the information of two users.And the matching check results of the biometric image based on second user determine whether
One user shows the sharing information of second user, can ensure the safety of the information of second user.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments described in application, for those of ordinary skill in the art, in the premise of not making the creative labor property
Under, other drawings may also be obtained based on these drawings.
Fig. 1 is the schematic flow chart according to the information sharing method of one embodiment of the application.
Fig. 2 is the schematic flow chart according to the information sharing method of the specific embodiment of the application.
Fig. 3 is the structure diagram according to the electronic equipment of the embodiment of the present application.
Fig. 4 is the structural schematic diagram according to the Information Sharing device of the embodiment of the present application.
Specific implementation mode
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality
The attached drawing in example is applied, technical solutions in the embodiments of the present application is clearly and completely described, it is clear that described implementation
Example is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field is common
The every other embodiment that technical staff is obtained without creative efforts should all belong to the application protection
Range.
Fig. 1 is the flow chart according to the information sharing method of one embodiment of the application.The method of Fig. 1 is by Information Sharing
Device executes.It should be understood that the scheme of the embodiment of the present application is applicable to sharing for the relevant information of declaration form.Certainly be also not excluded for by
The method of the embodiment of the present application is applied to other information and shares, such as the commodity relevant information of user's purchase is shared.
As illustrated in FIG. 1, at S102, in first user's successful log service platform, obtain the of second user
One biometric image.
It is understood that the service platform at S102 can be can provide to the user service any one is flat
The form of platform, service platform can be application program (Application, APP), and APP may be mounted on terminal device, terminal
Equipment is such as can be smart mobile phone, computer.
Optionally, in some embodiments, the first user is logged in by modes such as password, finger print identifying or short message certifications
Service platform.By taking the first user is by password login as an example, the first user service platform login interface input password it
Afterwards, whether the password inputted with the first user when the service platform is registered is the first password input by user of service platform verification
It is no consistent.If consistent, then it is assumed that first user's successful log service platform, if it is inconsistent, thinking that the first user logs in
Failure.Or by taking the first user is logged in by finger print identifying as an example, refer in the log-in interface input of service platform in the first user
After line information, service platform verify finger print information that the first user inputs in login interface whether with the first user in the service
The finger print information of typing is consistent when platform is registered.If consistent, then it is assumed that first user's successful log service platform, if differed
It causes, then it is assumed that the first login failed for user.
The ID of used terminal device, which is determined, when it is possible to further according to the first user login services platform logs in clothes
Platform of being engaged in is the first user, or can according to the first user login services platform when used service account determine and log in
When the first user of service platform.
Optionally, in some embodiments, it is provided on service platform and chooses whether to need to share other people for user
The option of information, if the first user selects the option, prompting the first user, further selection needs to share which user's
Information prompts the first user to need to carry out second user if the first user selection needs the information for sharing second user
Verification can allow the first user to select the mode verified to second user at this time, if selection passes through biometric image
The mode of matching certification is authenticated second user, then the first user is prompted to input the biometric image of second user.It is logical
Often in this case, the first user needs to obtain the agreement of second user, service platform could be made to get second user
Biometric image.For example, under the first user and the aspectant scene of second user, the first user obtains the agreement of second user
Later, second user carries out the input of biometric image.Thus, it is possible to avoid, general dissenting in second user
The Information Sharing of second user gives the first user, protects the privacy of the information of second user.
Optionally, as an example, the first biometric image of the second user got at S102 is second
The face-image of user.Or the fingerprint that the first biometric image of the second user got at S102 is second user
Image.
It should be noted that the first biometric image of the second user at S102 can be directly collected the
The image of the biological characteristic of two users can also be to be obtained after handling the figure of the biological characteristic of collected second user
The image arrived, above-mentioned processing for example can be Denoising disposals.
At S104, first biometric image is matched with the biometric templates of the second user.
It should be noted that the biometric templates of second user are the biological characteristics that second user is retained or registered in advance
Image.
Optionally, in some embodiments, the biometric templates of second user are that the clothes are logged in before second user
Business platform and the biometric image for carrying out retention when authentication.And, it is understood that the biological characteristic of second user
Template is can be newer.For example, every time when second user logs in the service platform and carries out authentication, if identity is recognized
Card passes through, then the biometric image inputted second user in this authentication procedures is special as the biology of second user
Levy template.That is, can with certification by when the biometric image that inputs replace biometric templates.Thus, it is possible to
So that biometric templates utmostly reflect the newest biological characteristic of second user, the prevention and control performance to malicious attack is improved.
At S106, it is based on matching result, it is determined whether show that the second user waits sharing to first user
Information.
Optionally, in some embodiments, if successful match, waiting for point for the second user is shown to the first user
Enjoy information.I.e. if fitted through, second user is waited for that sharing information is shared with the first user.If it fails to match, really
It is fixed do not show the second user to the first user wait for sharing information.Thereby, it is possible to ensure the safety of the information of second user
Property.
In the embodiment of the present application, optionally, before first user's successful log service platform, method shown in FIG. 1
Further include:Determine the second user waits for sharing information.
Optionally, as an example, the relevant all information of the second user stored in systems can be determined as
Second user waits for sharing information.
Optionally, as another example, determine that the sharing information that waits for of second user includes:Receive second user input
Selection instruction, the information that will be selected from the relevant information of the second user according to the selection instruction are determined as described
Wait for sharing information.That is, the multiple and relevant information of second user is stored in system, it can be according to second user oneself
Selection determine second user wish the information for being shared with other users.
Further, in some embodiments, determining that second user wishes to share according to the selection of second user oneself
After the information of other users, it can be determined that second user wishes be shared in the information of other users whether relate to second
The information of the privacy of user, if there is then wishing that the information for being shared with other users is further processed to second user.Example
Such as, the second user that can erase wishes to be shared with the information or right of the privacy of second user involved in the information of other users
The information that second user wishes to be shared with the privacy of second user involved in the information of other users carries out stamp.
Optionally, in some embodiments, the selection instruction for receiving the second user input, including:In determination
When the second user is validated user, the selection instruction of the second user input is received.
Specifically, in some embodiments, before determining that the second user is validated user, method shown in FIG. 1
Further include:Obtain the second biometric image of the second user;Based on the letter carried on second biometric image
Breath carries out matched as a result, determining whether the second user is validated user with the information in ID card information source, wherein institute
The ID card information that ID card information source includes validated user is stated, the ID card information includes biological information.
In other words, can by obtain second user the second biometric image, and by get second biology
The information carried on characteristic image is matched with the information in ID card information source, and second user is determined according to matched result
Whether it is validated user.Herein, the information in ID card information source can be the ID card information got on the net from public security.
For example, the second biometric image of second user is the face-image of second user, then by second user
Face-image matched with the head image information on the identity card in ID card information source, if successful match, then it is assumed that
Two users are validated user, otherwise it is assumed that second user is disabled user.Alternatively, the biometric image of second user is second
The fingerprint image of user, then by the identity in the fingerprint image of second user and ID card information source just on finger print information carry out
Matching, if successful match, then it is assumed that second user is validated user, otherwise it is assumed that second user is disabled user.
Further, in some embodiments, method shown in FIG. 1 further includes:It is carried on the second biometric image
Information and ID card information source in information matches success when, preserve second biometric image;Described second is given birth to
Object characteristic image is determined as the biometric templates of the second user.That is, if verification second user is legal use
Family then stores the biometric image of the second user got in this verification process, the life as second user
Object feature templates, for it is follow-up other people need the template that matching verification is carried out when sharing information for sharing second user.
Specifically, in some embodiments, second user waits for that sharing information is the relevant letter of declaration form with second user
Breath, then the determination second user wait for sharing information, including:It determines in the declaration form of the second user and waits sharing guarantor
It is single;The information waited for except the privacy information of the second user involved in participating policy is determined as the letter to be shared
Breath.For example, second user has 5 parts of declaration forms, but second user only wants to give wherein 3 parts of relevant Information Sharings of declaration form to other use
Family then determines this 3 parts of declaration forms, and further handles this 3 parts of declaration forms that extraction is wherein used with second according to the user's choice
The unrelated information of the privacy at family waits for sharing information by what the information extracted was determined as second user.Herein, this 3 parts are protected
The process singly handled can also become desensitization process, and the information unrelated with the privacy of second user for example may include declaration form
The information such as the specific set meal of involved insurance products, protection amount or insurance products.
In the embodiment of the present application, optionally, shown to the first user the second user wait for sharing information after,
Method shown in FIG. 1 further includes:First user is received based on the purchase instruction for waiting for sharing information input, the purchase
Instruction is for buying the insurance products involved by the declaration form of second user;It is instructed based on the purchase, generates first user
Declaration form.
That is, shown to the first user second user wait for sharing information after, the first user can consult the
The relevant information of declaration form with second user that two users share, if the first user finds what the declaration form of second user was related to
The insurance products for having oneself to be satisfied in insurance products, then can be directly entered product details, then buy this insurance products, thus
Complementary buying is generated, the sales volume and sale speed of insurance products are improved.
Fig. 2 is the flow chart according to the information sharing method of the specific embodiment of the application.The method of Fig. 2 is by information
Sharing apparatus executes.
As illustrated in FIG. 2, at S202, the facial feature image of acquisition user A, and be authenticated.
Specifically, in S202, user A is in brush face, the facial feature image of acquisition user A, then will get
Facial feature image is compared with public security net ID card information, thinks that user's A certifications pass through if comparing and passing through, will obtain
To the facial feature image of user A store.
At S204, determine user A certifications by when, according to the selection of user A, determine the declaration form that user A wishes to share.
At S206, the declaration form shared, which carries out desensitization process, the declaration form after being desensitized, is wished to user A.
Specifically, at S206, it can erase involved in declaration form to wish that the declaration form shared carries out desensitization process to user A
The information of the privacy of user A only retains the information for the privacy for not being related to user A.Or it can be to the hidden of user A involved in declaration form
Private information carries out stamp.The information for referring here to the privacy of user A for example may include the ID card information of user A, user A
Home address information etc..The information for not being related to the privacy of user A for example may include insurance products involved by declaration form, protection amount
Or the information such as set meal of insurance products.
At S208, after user's B log-in service platforms, the facial feature image of user A is acquired again, and matched
Certification.
Or it is to be understood that at S208, user B needs the face for brushing user A to be authenticated.
Optionally, at S208, user B passes through the modes log-in service platform such as password, finger print identifying or short message certification.
By taking user B is by password login as an example, in user B after the login interface input password of service platform, service platform verification
Whether the password whether password of user B input is inputted when the service platform is registered with user B is consistent.If consistent, permit
B Sign-On services platforms in family allowable, if it is inconsistent, refusal user's B log-in service platforms.Or recognized by fingerprint with user B
For card logs in, in user B after the log-in interface input finger print information of service platform, service platform verification user B is being stepped on
Recording the finger print information that interface inputs, whether when the service platform is registered, the finger print information of typing is consistent with user B.If consistent,
Then allow user's B Sign-On services platforms, if it is inconsistent, refusal user's B log-in service platforms.
Specifically, the matching at S208 recognize refer to by S208 the facial feature image of collected user A with
The facial feature image of the user A stored at S202 is compared.
At S210, if matching certification success, the declaration form to after user's A displaying desensitizations.
At S212, the purchase instruction based on user B generates the declaration form of user B.
It is understood that after the declaration form to after user's A displaying desensitizations, after user A can consult these desensitizations
Thus the insurance products that declaration form is related to generate complementary buying if there is satisfied insurance products can directly be bought.
It should be noted that, although method shown in Fig. 2 is described by taking declaration form as an example, but waited in the embodiment of the present application
Sharing information is not limited to and the relevant information of declaration form.And be described by taking brush face certification as an example in method shown in Fig. 2, but
Authentication mode in the embodiment of the present application is not limited to this, such as can also be brush finger print identifying.
The information sharing method according to the embodiment of the present application is described in detail above in association with Fig. 1 and Fig. 2.Below in conjunction with figure
3 are described in detail the electronic equipment according to the embodiment of the present application.With reference to figure 3, in hardware view, electronic equipment includes processor, can
Selection of land, including internal bus, network interface, memory.Wherein, memory may be deposited comprising memory, such as high random access
Reservoir (Random-Access Memory, RAM), it is also possible to further include nonvolatile memory (non-volatile
Memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible that other business are required hard
Part.
Processor, network interface and memory can be connected with each other by internal bus, which can be industry
Standard architecture (Industry Standard Architecture, ISA) bus, Peripheral Component Interconnect standard
(Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended
Industry Standard Architecture, EISA) bus etc..The bus can be divided into address bus, data/address bus,
Controlling bus etc..For ease of indicating, only indicated with a four-headed arrow in Fig. 3, it is not intended that an only bus or one kind
The bus of type.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating
Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from then operation in corresponding computer program to memory is read in nonvolatile memory, in logical layer
Information Sharing device is formed on face.Processor executes the program that memory is stored, and specifically for executing following operation:
In the first user success log-in service platform, the first biometric image of second user is obtained;
First biometric image is matched with the biometric templates of the second user;
Based on matching result, it is determined whether show the second user to first user waits for sharing information.
The method that the above-mentioned Information Sharing device as disclosed in the application Fig. 1 and embodiment illustrated in fig. 2 executes can be applied to
In processor, or realized by processor.Processor may be a kind of IC chip, the processing capacity with signal.
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor or software form
Instruction is completed.Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit,
CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal
Processor, DSP), it is application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing
Field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device are divided
Vertical door or transistor logic, discrete hardware components.It may be implemented or execute and is in the embodiment of the present application disclosed each
Method, step and logic diagram.General processor can be microprocessor or the processor can also be any conventional place
Manage device etc..The step of method in conjunction with disclosed in the embodiment of the present application, can be embodied directly in hardware decoding processor and execute
At, or in decoding processor hardware and software module combination execute completion.Software module can be located at random access memory,
This fields such as flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register maturation
In storage medium.The storage medium is located at memory, and processor reads the information in memory, and above-mentioned side is completed in conjunction with its hardware
The step of method.
The method that the electronic equipment can also carry out Fig. 2, and realize the function of Information Sharing device embodiment shown in Fig. 2,
Details are not described herein for the embodiment of the present application.
Certainly, other than software realization mode, other realization methods are not precluded in the electronic equipment of the application, for example patrol
Collect the mode etc. of device or software and hardware combining, that is to say, that the executive agent of following process flow is not limited to each patrol
Unit is collected, can also be hardware or logical device.
The embodiment of the present application also proposed a kind of computer readable storage medium, the computer-readable recording medium storage one
A or multiple programs, the one or more program include instruction, which works as is held by the electronic equipment including multiple application programs
When row, the method that the electronic equipment can be made to execute Fig. 1 and embodiment illustrated in fig. 2, and specifically for executing following methods:
In the first user success log-in service platform, the first biometric image of second user is obtained;
First biometric image is matched with the biometric templates of the second user;
Based on matching result, it is determined whether show the second user to first user waits for sharing information.
Fig. 4 is the structural schematic diagram of the Information Sharing device of one embodiment of the application.Referring to FIG. 4, a kind of soft
In part embodiment, Information Sharing device 400 may include:Acquiring unit 401, matching unit 402 and processing unit 403, wherein
Acquiring unit 401 obtains the first biological characteristic figure of second user in the first user success log-in service platform
Picture;
Matching unit 402, by first biometric image and the progress of the biometric templates of the second user
Match;
Processing unit 403 is based on matching result, it is determined whether shows waiting for point for the second user to first user
Enjoy information.
According to the embodiment of the present application Information Sharing device, the can be obtained in first user's successful log service platform
The first biometric image of two users, and the first biometric image and the biometric templates of second user are carried out
Match, according to matched as a result, determining whether that first user shows that second user waits for sharing information.Usually the first user at
When work(Sign-On services platform, second user is needed to agree to just get the biometric image of second user, i.e., it can only be by the
Two users' waits for that sharing information is shared with the user that second user wishes to share, therefore the information of second user can be protected
Privacy.And the matching check results of the biometric image based on second user determine whether the first user displaying second
The sharing information of user can ensure the safety of the information of second user.
Optionally, as one embodiment, before first user's successful log service platform, the processing unit 403:
Determine the second user waits for sharing information.
Optionally, as one embodiment, the processing unit 403:
Receive the selection instruction of the second user input;
The information that will be selected from the relevant information of the second user according to the selection instruction is determined as described wait for
Sharing information.
Optionally, as one embodiment, the processing unit 403:
When it is validated user to determine the second user, the selection instruction of the second user input is received.
Optionally, as one embodiment, the processing unit 403 determine the second user be validated user it
Before, the acquiring unit 401:Obtain the second biometric image of the second user;
The processing unit 403:
It is matched based on the information carried on second biometric image and the information progress in ID card information source
As a result, determining whether the second user is validated user, wherein the ID card information source includes the identity of validated user
Information is demonstrate,proved, the ID card information includes biological information.
Optionally, as one embodiment, the processing unit 403:
When information matches in the information and ID card information source carried on the second biometric image are successful, institute is preserved
State the second biometric image;
Second biometric image is determined as to the biometric templates of the second user.
Optionally, described to wait for that sharing information is the relevant information of declaration form with second user as one embodiment;
Wherein, processing unit 403:
It determines in the declaration form of the second user and waits for participating policy;
The information waited for except the privacy information of the second user involved in participating policy is determined as described wait for point
Enjoy information.
Optionally, as one embodiment, the processing unit 403:
In successful match, show the second user to first user waits for sharing information.
Optionally, as one embodiment, shown to the first user the second user wait for sharing information after, institute
State processing unit 403:
First user is received based on the purchase instruction for waiting for sharing information input, the purchase instruction is for buying
Insurance products involved by the declaration form of second user;
It is instructed based on the purchase, generates the declaration form of first user.
The method that Information Sharing device 400 can also carry out Fig. 1 and embodiment illustrated in fig. 2, and realize that Information Sharing device exists
The function of Fig. 1 and embodiment illustrated in fig. 2, details are not described herein for the embodiment of the present application.
In short, the foregoing is merely the preferred embodiment of the application, it is not intended to limit the protection domain of the application.
Within the spirit and principles of this application, any modification, equivalent replacement, improvement and so on should be included in the application's
Within protection domain.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic disk storage or other magnetic storage apparatus
Or any other non-transmission medium, it can be used for storage and can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
Including so that process, method, commodity or equipment including a series of elements include not only those elements, but also wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described
There is also other identical elements in the process of element, method, commodity or equipment.
Each embodiment in this specification is described in a progressive manner, identical similar portion between each embodiment
Point just to refer each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so description is fairly simple, related place is referring to embodiment of the method
Part explanation.
Claims (12)
1. a kind of information sharing method, including:
In the first user success log-in service platform, the first biometric image of second user is obtained;
First biometric image is matched with the biometric templates of the second user;
Based on matching result, it is determined whether show the second user to first user waits for sharing information.
2. according to the method described in claim 1, before first user's successful log service platform, further include:
Determine the second user waits for sharing information.
3. according to the method described in claim 2, the determination second user waits for sharing information, including:
Receive the selection instruction of the second user input;
The information that will be selected from the relevant information of the second user according to the selection instruction is determined as described waiting sharing
Information.
4. according to the method described in claim 3, the selection instruction for receiving second user input, including:
When it is validated user to determine the second user, the selection instruction of the second user input is received.
5. according to the method described in claim 4, before determining that the second user is validated user, further include:
Obtain the second biometric image of the second user;
Based on the information that is carried on second biometric image and the information in ID card information source carry out it is matched as a result,
Determine whether the second user is validated user, wherein the ID card information source includes the identity card letter of validated user
Breath, the ID card information includes biological information.
6. according to the method described in claim 5, further including:
When the information that is carried on the second biometric image is with information matches success in ID card information source, described the is preserved
Two biometric images;
Second biometric image is determined as to the biometric templates of the second user.
7. method according to any one of claim 1 to 6, described to wait for that sharing information is related to the declaration form of second user
Information;
Wherein, the determination second user waits for sharing information, including:
It determines in the declaration form of the second user and waits for participating policy;
The information waited for except the privacy information of the second user involved in participating policy is determined as the letter to be shared
Breath.
8. according to the method described in claim 7, further including:
In successful match, show the second user to first user waits for sharing information.
9. according to the method described in claim 8, shown to the first user the second user wait for sharing information after, also
Including:
First user is received based on the purchase instruction for waiting for sharing information input, the purchase instruction is for buying second
Insurance products involved by the declaration form of user;
It is instructed based on the purchase, generates the declaration form of first user.
10. a kind of Information Sharing device, including:
Acquiring unit obtains the first biometric image of second user in the first user success log-in service platform;
Matching unit matches first biometric image with the biometric templates of the second user;
Processing unit is based on matching result, it is determined whether show the second user to first user waits for sharing information.
11. a kind of electronic equipment, including:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction uses the processing when executed
Device executes following operation:
In the first user success log-in service platform, the first biometric image of second user is obtained;
First biometric image is matched with the biometric templates of the second user;
Based on matching result, it is determined whether show the second user to first user waits for sharing information.
12. a kind of computer-readable medium, the computer-readable medium storage one or more program is one or more of
Program by the electronic equipment including multiple application programs when being executed so that the electronic equipment executes following operation:
In the first user success log-in service platform, the first biometric image of second user is obtained;
First biometric image is matched with the biometric templates of the second user;
Based on matching result, it is determined whether show the second user to first user waits for sharing information.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810071589.2A CN108460263A (en) | 2018-01-25 | 2018-01-25 | Information sharing method, device and electronic equipment |
TW107144998A TWI697860B (en) | 2018-01-25 | 2018-12-13 | Information sharing method, device and electronic equipment |
PCT/CN2019/071093 WO2019144806A1 (en) | 2018-01-25 | 2019-01-10 | Information sharing method and apparatus, and electronic device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810071589.2A CN108460263A (en) | 2018-01-25 | 2018-01-25 | Information sharing method, device and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108460263A true CN108460263A (en) | 2018-08-28 |
Family
ID=63238986
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810071589.2A Pending CN108460263A (en) | 2018-01-25 | 2018-01-25 | Information sharing method, device and electronic equipment |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN108460263A (en) |
TW (1) | TWI697860B (en) |
WO (1) | WO2019144806A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110046313A (en) * | 2019-02-19 | 2019-07-23 | 阿里巴巴集团控股有限公司 | The method of information sharing, client and server |
CN110070448A (en) * | 2019-03-08 | 2019-07-30 | 阿里巴巴集团控股有限公司 | A kind of processing method and server of electronic insurance policy |
WO2019144806A1 (en) * | 2018-01-25 | 2019-08-01 | 阿里巴巴集团控股有限公司 | Information sharing method and apparatus, and electronic device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020174345A1 (en) * | 2001-05-17 | 2002-11-21 | Patel Pankaj B. | Remote authenticating biometric apparatus and method for networks and the like |
CN105940423A (en) * | 2014-01-31 | 2016-09-14 | 苹果公司 | Use of biometric image for authorization |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103379098B (en) * | 2012-04-19 | 2017-02-22 | 华为技术有限公司 | Content sharing method, device and network system thereof |
CN105025043B (en) * | 2014-04-17 | 2019-06-04 | 腾讯科技(深圳)有限公司 | Information sharing method, apparatus and system |
CN108460263A (en) * | 2018-01-25 | 2018-08-28 | 阿里巴巴集团控股有限公司 | Information sharing method, device and electronic equipment |
-
2018
- 2018-01-25 CN CN201810071589.2A patent/CN108460263A/en active Pending
- 2018-12-13 TW TW107144998A patent/TWI697860B/en active
-
2019
- 2019-01-10 WO PCT/CN2019/071093 patent/WO2019144806A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020174345A1 (en) * | 2001-05-17 | 2002-11-21 | Patel Pankaj B. | Remote authenticating biometric apparatus and method for networks and the like |
CN105940423A (en) * | 2014-01-31 | 2016-09-14 | 苹果公司 | Use of biometric image for authorization |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019144806A1 (en) * | 2018-01-25 | 2019-08-01 | 阿里巴巴集团控股有限公司 | Information sharing method and apparatus, and electronic device |
CN110046313A (en) * | 2019-02-19 | 2019-07-23 | 阿里巴巴集团控股有限公司 | The method of information sharing, client and server |
CN110046313B (en) * | 2019-02-19 | 2023-09-22 | 创新先进技术有限公司 | Information sharing method, client and server |
CN110070448A (en) * | 2019-03-08 | 2019-07-30 | 阿里巴巴集团控股有限公司 | A kind of processing method and server of electronic insurance policy |
CN110070448B (en) * | 2019-03-08 | 2023-10-03 | 创新先进技术有限公司 | Electronic policy processing method and server |
Also Published As
Publication number | Publication date |
---|---|
TWI697860B (en) | 2020-07-01 |
WO2019144806A1 (en) | 2019-08-01 |
TW201933233A (en) | 2019-08-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10892894B2 (en) | Identity verification using biometric data and non-invertible functions via a blockchain | |
US10027663B2 (en) | Anonymizing biometric data for use in a security system | |
EP2929479B1 (en) | Method and apparatus of account login | |
US8595808B2 (en) | Methods and systems for increasing the security of network-based transactions | |
US9577999B1 (en) | Enhanced security for registration of authentication devices | |
AU2016247162B2 (en) | Methods and systems for improving the accuracy performance of authentication systems | |
US20200242232A1 (en) | User account recovery techniques using secret sharing scheme with trusted referee | |
US20090193519A1 (en) | Systems and Methods for Accessing a Tamperproof Storage Device in a Wireless Communication Device Using Biometric Data | |
US10346634B2 (en) | Obscuring and deleting information from a messaging account | |
US11303443B2 (en) | Electronic system to enable rapid acquisition and delivery of services and to provide strong protection of security and privacy | |
WO2020181809A1 (en) | Data processing method and system based on interface checking, and computer device | |
WO2016003605A1 (en) | Method and system for information authentication | |
US8433288B2 (en) | Multilevel authentication | |
US9807103B2 (en) | Data communication | |
CN110032846B (en) | Identity data anti-misuse method and device and electronic equipment | |
CN108460263A (en) | Information sharing method, device and electronic equipment | |
US11861582B2 (en) | Security protection of association between a user device and a user | |
US11874752B1 (en) | Methods and systems for facilitating cyber inspection of connected and autonomous electrical vehicles using smart charging stations | |
US20110264900A1 (en) | Method and arrangement for configuring electronic devices | |
CN107026816A (en) | A kind of identity identifying method and device | |
US20140215592A1 (en) | Method, apparatus and system for user authentication | |
US20230164570A1 (en) | Systems and methods for mitigating fraud based on geofencing | |
WO2014117563A1 (en) | Method, apparatus and system for user authentication | |
EP2813962A1 (en) | Method for controlling access to a specific service type and authentication device for controlling access to such a service type. | |
TW202016782A (en) | Account transferring method, device and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1259093 Country of ref document: HK |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180828 |