CN108924258A - Background information method for pushing, device, computer equipment and storage medium - Google Patents
Background information method for pushing, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN108924258A CN108924258A CN201810925228.XA CN201810925228A CN108924258A CN 108924258 A CN108924258 A CN 108924258A CN 201810925228 A CN201810925228 A CN 201810925228A CN 108924258 A CN108924258 A CN 108924258A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- background information
- image
- subapplication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
This application involves a kind of background information method for pushing, device, computer equipment and storage mediums.The method includes:Receive the inquiry request that subapplication is sent;Subapplication generates the inquiry request according to the characteristics of image and account information of user;It is inquired according to described image feature in customer data base, obtains corresponding query result;The query result includes the identity information of user;Corresponding user activity is obtained according to the identity information;According to the user activity, the administration authority of the account information is determined;Background information corresponding with the administration authority is transferred, and the background information is pushed into the subapplication.The background information obtained in platform by subapplication is realized using this method, and to the purpose that the background information in platform is handled, reduce user uses threshold, meets user and handles the demand of background information whenever and wherever possible, to improve background information treatment effeciency.
Description
Technical field
This application involves Internet technical fields, set more particularly to a kind of background information method for pushing, device, computer
Standby and storage medium.
Background technique
With the rapid development of Internet technology, various operation platform background management systems emerge one after another.It is right for convenience
The background information of oneself operation platform is managed, and more and more enterprises begin to use corresponding background management system.
However, traditional operation platform background management system, the computer equipment that needs to rely on could push away background information
User is given, user needs to log in computer equipment, is just able to achieve the management to background information, and process is comparatively laborious, leads to nothing
Method is whenever and wherever possible handled background information, to cause background information processing inconvenient, the processing of background information is caused to be imitated
Rate is low.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of backstage that can be improved background information treatment effeciency
Information-pushing method, device, computer equipment and storage medium.
A kind of background information method for pushing, the method includes:
Receive the inquiry request that subapplication is sent;The subapplication is believed according to the characteristics of image and account of user
Breath generates the inquiry request;
It is inquired according to described image feature in customer data base, obtains corresponding query result;The query result
Identity information including user;
Corresponding user activity is obtained according to the identity information;
According to the user activity, the administration authority of the account information is determined;
Background information corresponding with the administration authority is transferred, and the background information is pushed into the son using journey
Sequence.
It is described in one of the embodiments, to be inquired according to described image feature in customer data base, it obtains corresponding
Query result include:
Extract the characteristics of image of known users in customer data base;
The described image feature of user is matched with the characteristics of image of known users;
When the characteristics of image of user and the characteristics of image of wherein user match, the identity letter of the known users is obtained
Breath, the identity information as the user.
It is described in one of the embodiments, to include according to the corresponding user activity of identity information acquisition:
According to the identity information, the history background information processing record of the user is obtained;
The behavioural characteristic that user is extracted from history background information processing record, according to behavioural characteristic and characteristic value
Corresponding relationship determines the corresponding characteristic value of behavioural characteristic described in user;
According to the corresponding characteristic value of the behavioural characteristic, user activity corresponding with the characteristic value is determined.
The user activity includes the first label and the second label in one of the embodiments,;It is described according to
User activity determines that the administration authority of the account information includes:
The content for identifying first label, according to the content of first label, determination is corresponding with first label
Permission classification;
The content for identifying second label, according to the content of second label, determination is corresponding with second label
Permission Levels;
According to the permission classification and the Permission Levels, the administration authority of the account information is determined.
Transferring background information corresponding with the administration authority described in one of the embodiments, includes:
It by the permission classification and the Permission Levels, is combined according to preset order, obtains corresponding sequence code;
Background information corresponding with the sequence code is transferred in information database, as the administration authority it is corresponding after
Station information.
A kind of background information driving means, described device include:
Request receiving module, for receiving the inquiry request of subapplication transmission;The subapplication is according to user
Characteristics of image and account information generate the inquiry request;
Image querying module is inquired accordingly for being inquired according to described image feature in customer data base
As a result;The query result includes the identity information of user;
Liveness obtains module, for obtaining corresponding user activity according to the identity information;
Permission determining module, for determining the administration authority of the account information according to the user activity;
Info push module is pushed away for transferring background information corresponding with the administration authority, and by the background information
It send to the subapplication.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
Device realizes following steps when executing the computer program:
Receive the inquiry request that subapplication is sent;The subapplication is believed according to the characteristics of image and account of user
Breath generates the inquiry request;
It is inquired according to described image feature in customer data base, obtains corresponding query result;The query result
Identity information including user;
Corresponding user activity is obtained according to the identity information;
According to the user activity, the administration authority of the account information is determined;
Background information corresponding with the administration authority is transferred, and the background information is pushed into the son using journey
Sequence.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
Following steps are realized when row:
Receive the inquiry request that subapplication is sent;The subapplication is believed according to the characteristics of image and account of user
Breath generates the inquiry request;
It is inquired according to described image feature in customer data base, obtains corresponding query result;The query result
Identity information including user;
Corresponding user activity is obtained according to the identity information;
According to the user activity, the administration authority of the account information is determined;
Background information corresponding with the administration authority is transferred, and the background information is pushed into the son using journey
Sequence.
Above-mentioned background information method for pushing, device, computer equipment and storage medium, server are obtained according to subapplication
The user images feature taken, determines the identity information of user;According to the identity information of user, corresponding user activity is obtained,
So that it is determined that the administration authority of user account information;Background information corresponding with administration authority is transferred, and background information is pushed
To subapplication, user is facilitated to handle by subapplication background information, reduces using threshold, meet use
The demand that family is whenever and wherever possible handled background information effectively improves background information treatment effeciency, after overcoming tradition
Station information handles the defect for the computer equipment that needs to rely on.Simultaneously by setting administration authority, only allow specified administration authority
User access, it is ensured that the safety of information avoids information from being tampered.
Detailed description of the invention
Fig. 1 is the application scenario diagram of background information method for pushing in one embodiment;
Fig. 2 is the flow diagram of background information method for pushing in one embodiment;
Fig. 3 is flow diagram the step of obtaining corresponding user activity according to identity information in one embodiment;
Fig. 4 is the flow diagram of background information method for pushing in another embodiment;
Fig. 5 is the flow diagram of background information method for pushing in another embodiment;
Fig. 6 is the structural block diagram of background information driving means in one embodiment;
Fig. 7 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Background information processing method provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, eventually
End 110 is communicated with server 120 by network.Terminal 110 can run multiple female application programs, each mother's application program
One or more subapplications can be run.In terminal 110, the subapplication operated in female application program obtains user
Characteristics of image and account information, and generate inquiry request, inquiry request be sent to server 120.The parsing of server 120 is looked into
Request is ask, user images feature is obtained;It is inquired according to characteristics of image in customer data base, obtains the identity information of user;
Corresponding user activity is obtained by identification identity information;User activity is analyzed, determines the administration authority of account information;?
Information database transfers background information corresponding with administration authority, and background information is pushed to the son run in terminal 110 and is answered
With program, background information is handled with triggering user by subapplication.Wherein, terminal 110 can be, but not limited to be
Smart phone and portable wearable device, server 120 can use the either multiple server compositions of independent server
Server cluster is realized.
In one embodiment, as shown in Fig. 2, providing a kind of background information processing method, it is applied to Fig. 1 in this way
In server for be illustrated, include the following steps:
Step S201 receives the inquiry request that subapplication is sent;Subapplication according to the characteristics of image of user and
Account information generates inquiry request.
Subapplication, which refers to, to be operated in female application program, and the i.e. workable application of downloading installation is not needed.Such as
Wechat small routine may operate in wechat client.Characteristics of image refers to the face feature information of user, including face, view
Film and iris etc..Account information refers to that user logs in the account information of subapplication, with the account of corresponding female application program
Information is the same, for example is logged in as wechat small routine with the account information of wechat client is.
User logs in subapplication, by the human face image information of the picture pick-up device acquisition user of terminal built-in, and on
Image processing system is passed to, to be detected to human face image information, pretreatment operation, extracts the image in human face image information
Feature, and characteristics of image is returned into subapplication.Subapplication is raw in conjunction with the account information of acquisition according to characteristics of image
Corresponding server is sent at inquiry request, and by inquiry request.The inquiry that server is sent by receiving subapplication
Request, the rear identity information for being conducive to determine user subsequently through inquiry.
Step S202 is inquired in customer data base according to characteristics of image, obtains corresponding query result;Query result
Identity information including user.
The characteristics of image and corresponding identity information that the known users of interconnection Web realease are obtained by big data, than
Such as name, ID card No., on-job company, and store into customer data base.Using the characteristics of image of user as inquiry item
Part is inquired in customer data base, obtains the characteristics of image with the Image Feature Matching of user, by belonging to the characteristics of image
The identity information for knowing user, the identity information as user.By identifying to characteristics of image, the identity of user can be confirmed
Information is conducive to the accuracy for improving identification user identity.
Step S203 obtains corresponding user activity according to identity information.
User activity refers to that user in an operation platform background management system, handles the liveness of background information.
User's pipe can be confirmed based on big data analysis by calling data-processing interface, and according to subscriber identity information in server
The operation platform of reason, such as one account lead to platform, and therefrom the background information of calling and obtaining user handles record.After analysis user
Station information processing record, can be confirmed the active degree of user, and then confirm user activity.
Step S204 determines the administration authority of account information according to user activity.
Administration authority refers to user to the administration authority of background information, and user activity is bigger, corresponding account information
Administration authority is bigger.By the way that the administration authority of account information is arranged, the user of specified administration authority is only allowed to access, it can be with
The safety for guaranteeing background information, avoids background information from being tampered.
Step S205 transfers background information corresponding with administration authority, and background information is pushed to subapplication.
Information database is established, for storing background information corresponding with the administration authority of multiple account informations.Server
Background information corresponding with administration authority is transferred in information database, and background information is pushed into subapplication, facilitates use
Family is handled background information by subapplication.For example, background information is pushed to wechat small routine, wechat by server
Small routine shows background information processing interface (such as Zijin bank National Day sweepstake setting), and user is small by logging in wechat
Program can be handled background information (such as rate of winning prize of adjustment Zijin bank National Day sweepstake), convenient and efficient,
Without relying on computer equipment, to improve background information treatment effeciency.
In above-mentioned background information method for pushing, the user images feature that server is obtained according to subapplication is determined and is used
The identity information at family;According to the identity information of user, corresponding user activity is obtained, so that it is determined that the pipe of user account information
Manage permission;Background information corresponding with administration authority is transferred, and background information is pushed into subapplication, user is facilitated to pass through
Subapplication handles background information, reduces using threshold, meets user and carries out whenever and wherever possible to background information
The demand of processing effectively improves background information treatment effeciency, overcomes traditional background information and handles the calculating that needs to rely on
The defect of machine equipment.Simultaneously by setting administration authority, the user of specified administration authority is only allowed to access, it is ensured that letter
The safety of breath, avoids information from being tampered.
Server needs to identify the characteristics of image of user to confirm the identity information of user.Implement at one
In example, specifically included the step of customer data base is inquired, obtains corresponding query result according to characteristics of image:It extracts and uses
The characteristics of image of known users in user data library;The characteristics of image of user is matched with the characteristics of image of known users;When
When the characteristics of image of user and the characteristics of image of known users match, the identity information of known users is obtained, as user's
Identity information.
For example, the matching degree of the characteristics of image of user and the characteristics of image of multiple known users is calculated, from multiple known use
In the characteristics of image at family, the highest characteristics of image of matching degree is filtered out;It is corresponding known to obtain the highest characteristics of image of matching degree
The identity information of user, the identity information as user.At regular intervals, customer data base can update original known users
Data and store the data of newly-increased known users.It is inquired according to the characteristics of image of user in customer data base, it can be fast
Speed determines the identity information of user, while improving the accuracy of identification subscriber identity information, facilitates the corresponding use of subsequent determination
Family liveness.
In one embodiment, as shown in figure 3, the step of obtaining corresponding user activity according to identity information is specifically wrapped
It includes:
Step S301 obtains the history background information processing record of user according to identity information.
In the same operation platform background management system, different user handles the number and row of background information in systems
To be different, corresponding history background information processing record is also different.By identifying subscriber identity information, user can be confirmed
The operation platform of management, and then therefrom the history background information of calling and obtaining user handles record, facilitates subsequent confirmation user activity,
Further improve the accuracy of confirmation user activity.
Step S302 extracts the behavioural characteristic of user, according to behavioural characteristic and spy from history background information processing record
The corresponding relationship of value indicative determines the corresponding characteristic value of user behavior characteristics.
The behavioural characteristic of user refer to user handle background information feature, including information processing frequecy characteristic, to activity
Feature etc. is paid close attention to, these can embody the active degree of user.Characteristic value is the active degree for measuring user.Different user
The corresponding characteristic value of behavioural characteristic it is different, such as information processing frequecy characteristic, information processing frequency it is high feature letter
Breath, corresponding characteristic value are higher;The low characteristic information of information processing frequency, corresponding characteristic value are lower.For example, from history backstage
The behavioural characteristic that user is extracted in information processing record, identifies the characteristic information that the behavioural characteristic of extraction includes, according to behavior spy
The characteristic information of sign and the corresponding relationship of characteristic value determine the corresponding characteristic value of user behavior characteristics.
Step S303 determines user activity corresponding with characteristic value according to the corresponding characteristic value of behavioural characteristic.
According to subscriber identity information, the history background information of calling and obtaining user handles record;After the history for comprehensively considering user
Station information processing record, can be provided with accurate judgement user activity, the administration authority for subsequent determining user account information
It is convenient.
In one embodiment, after obtaining corresponding user activity according to identity information, including:If user account
Information does not have administration authority, then generates a prompting message, and prompting message is sent to subapplication.At the same time it can also
Triggering alarm.In the case where user account information does not have administration authority, by information reminding user, user is avoided to carry out mistake
Operation and cause unnecessary consequence.
In one embodiment, user activity includes the first label and the second label.So, according to user activity,
The administration authority for determining account information includes:The content for identifying the first label determines and the first mark according to the content of the first label
Sign corresponding permission classification;The content for identifying the second label determines power corresponding with the second label according to the content of the second label
Limit rank;According to permission classification and Permission Levels, the administration authority of account information is determined.For example, the first label is platform label,
Second label is liveness label;The content of identifying platform label determines the platform that user is runed, according to platform and permission class
Other corresponding relationship confirms permission classification corresponding with the platform that user is runed;Identify the content of liveness label, confirmation is used
The liveness at family confirms that Permission Levels corresponding with the activity of the user are (living according to the corresponding relationship of liveness and Permission Levels
Jerk is higher, and Permission Levels are higher);Permission classification and Permission Levels are combined, can determine the management of account information
Permission.By the way that the administration authority of account information is arranged, only allows specified account information to access, ensure that background information
Safety is tampered so as to avoid background information.
In one embodiment, transferring background information corresponding with administration authority includes:By permission classification and Permission Levels,
It is combined according to preset order, obtains corresponding sequence code;Backstage letter corresponding with sequence code is transferred in information database
Breath, as the corresponding background information of administration authority;Information database is stored with the corresponding background information of multiple sequence codes.
In another embodiment, transferring background information corresponding with administration authority includes:According to permission classification in information
Database is inquired, and data corresponding with permission classification in information database are marked;From the data marked, obtain
Background information corresponding with Permission Levels is taken, as the corresponding background information of administration authority.By permission classification and Permission Levels,
Background information corresponding with the administration authority of account information can be accurately obtained, avoids obtaining not corresponding background information, cause
Information leakage, so as to cause unnecessary consequence.
In one embodiment, which further includes:Receive the information processing that subapplication is sent
Request;Information process request is the request that subapplication is generated according to processing operation of the user to background information;Parse information
Processing request, is correspondingly handled background information, and processing result is back to subapplication.In subapplication
On information processing interface, information also untreated and to be treated (i.e. information can classify displaying) can be checked.For also not
Processing and information to be treated, user can increase, delete, changing, looking into operation.For same category of information, user can be with
By the way of key processing.Background information is managed by subapplication, is reduced using threshold, backstage is improved
Information processing efficiency meets the demand that user is whenever and wherever possible handled background information.
Further, by information database, background information corresponding with administration authority is updated.Moreover, every one
Section time, server can also carry out the background information of information database storage according to the traffic-operating period of each operation platform
It updates.By the way that the background information of information database to be updated, it is corresponding with the administration authority of account information that acquisition can be improved
Background information accuracy and timeliness, avoid that newest background information cannot be obtained, and influence user to background information
Treatment effeciency, so as to cause unnecessary consequence.
In one embodiment, as shown in figure 4, providing another background information method for pushing, include the following steps:
Step S401, subapplication obtain the characteristics of image and account information of user, are believed according to characteristics of image and account
Breath generates inquiry request.
Step S402, server receives the inquiry request that subapplication is sent, according to characteristics of image in customer data base
It is inquired, obtains corresponding query result;Query result includes the identity information of user;It is obtained according to identity information corresponding
User activity;According to user activity, the administration authority of account information is determined;Transfer backstage letter corresponding with administration authority
Breath.
Step S403, subapplication receive the background information of server push.
Above-mentioned background information method for pushing, server transfer backstage letter corresponding with the administration authority of user account information
Breath, and background information is pushed into subapplication, facilitate user to handle by subapplication background information, reduces
Threshold is used, meets the demand that user is whenever and wherever possible handled background information, effectively improves information processing effect
Rate overcomes the defect that traditional background information handles the computer equipment that needs to rely on.Simultaneously by setting administration authority, only permit
Perhaps the user of specified administration authority accesses, it is ensured that the safety of information avoids information from being tampered.
In one embodiment, from the angle of subapplication, another background information method for pushing is provided, is wrapped
Include following steps:
Step S501 obtains the characteristics of image and account information of user, generates inquiry according to characteristics of image and account information
Request.
Inquiry request is sent to server by step S502;Inquiry request exists for trigger the server according to characteristics of image
Customer data base is inquired, and corresponding query result is obtained;Query result includes the identity information of user;According to identity information
Obtain corresponding user activity;According to user activity, the administration authority of account information is determined;It transfers corresponding with administration authority
Background information.
Step S503 receives the background information of server push.
Above-mentioned background information method for pushing, subapplication receive the administrative power with user account information that server is transferred
Corresponding background information is limited, user is facilitated to handle by subapplication background information, reduces using threshold, meets
The demand that user is whenever and wherever possible handled background information, effectively improves information processing efficiency, after overcoming tradition
Station information handles the defect for the computer equipment that needs to rely on.Simultaneously by setting administration authority, only allow specified administration authority
User access, it is ensured that the safety of information avoids information from being tampered.
It should be understood that although each step in the flow chart of Fig. 2-5 is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-5
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively
It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately
It executes.
In one embodiment, as shown in fig. 6, providing a kind of background information driving means, including:Request receiving module
610, image querying module 620, liveness obtain module 630, permission determining module 640 and info push module 650, wherein:
Request receiving module 610, for receiving the inquiry request of subapplication transmission;Subapplication is according to user's
Characteristics of image and account information generate inquiry request.
Image querying module 620 obtains inquiring knot accordingly for being inquired according to characteristics of image in customer data base
Fruit;Query result includes the identity information of user.
Liveness obtains module 630, for obtaining corresponding user activity according to identity information.
Permission determining module 640, for determining the administration authority of account information according to user activity.
Background information for transferring background information corresponding with administration authority, and is pushed to son by info push module 650
Application program.
In one embodiment, image querying module includes:Image extraction unit, it is known in customer data base for extracting
The characteristics of image of user;Image matching unit, for carrying out the characteristics of image of the described image feature of user and known users
Matching;Information acquisition unit, for when the characteristics of image of the characteristics of image of user and known users matches, obtaining known use
The identity information at family, the identity information as user.
In one embodiment, liveness acquisition module includes:Acquiring unit is recorded, for obtaining according to identity information
The history background information of user handles record;Characteristic analysis unit extracts the row of user from history background information processing record
It is characterized, according to the corresponding relationship of behavioural characteristic and characteristic value, determines the corresponding characteristic value of user behavior characteristics;Liveness confirmation
Unit, for determining user activity corresponding with characteristic value according to the corresponding characteristic value of behavioural characteristic.
In one embodiment, permission determining module is also used to identify the content of the first label, according in the first label
Hold, determines permission classification corresponding with the first label;The content for identifying the second label, according to the content of the second label, determine with
The corresponding Permission Levels of second label;According to permission classification and Permission Levels, the administration authority of account information is determined.
In one embodiment, info push module is also used to permission classification and Permission Levels, according to preset order into
Row combination, obtains corresponding sequence code;Background information corresponding with sequence code is transferred in information database, as administration authority
Corresponding background information.
Above-mentioned each embodiment, background information driving means transfer backstage corresponding with the administration authority of user account information
Information, and background information is pushed into subapplication, facilitate user to handle by subapplication background information, drops
It is low to use threshold, the demand that user is whenever and wherever possible handled background information is met, information processing is effectively improved
Efficiency overcomes the defect that traditional background information handles the computer equipment that needs to rely on.Simultaneously by setting administration authority, only
The user of specified administration authority is allowed to access, it is ensured that the safety of information avoids information from being tampered.
Specific about background information driving means limits the limit that may refer to above for background information method for pushing
Fixed, details are not described herein.Modules in above-mentioned background information driving means can fully or partially through software, hardware and its
Combination is to realize.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with
It is stored in the memory in computer equipment in a software form, in order to which processor calls the above modules of execution corresponding
Operation.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 7.The computer equipment include by system bus connect processor, memory, network interface and
Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment
Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data
Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The database of machine equipment is for storing background information.The network interface of the computer equipment is used to pass through network with external terminal
Connection communication.To realize a kind of background information method for pushing when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 7, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with
Computer program, the processor realize following steps when executing computer program:
Receive the inquiry request that subapplication is sent;Subapplication is raw according to the characteristics of image and account information of user
At inquiry request;
It is inquired according to characteristics of image in customer data base, obtains corresponding query result;Query result includes user
Identity information;
Corresponding user activity is obtained according to identity information;
According to user activity, the administration authority of account information is determined;
Background information corresponding with administration authority is transferred, and background information is pushed into subapplication.
In one embodiment, following steps are also realized when processor executes computer program:It extracts in customer data base
The characteristics of image of known users;The characteristics of image of user is matched with the characteristics of image of known users;When the image of user
When the characteristics of image of feature and known users matches, the identity information of known users is obtained, the identity information as user.
In one embodiment, following steps are also realized when processor executes computer program:According to identity information, obtain
The history background information of user handles record;The behavioural characteristic that user is extracted from history background information processing record, according to row
It is characterized the corresponding relationship with characteristic value, determines the corresponding characteristic value of user behavior characteristics;According to the corresponding feature of behavioural characteristic
Value determines user activity corresponding with characteristic value.
In one embodiment, following steps are also realized when processor executes computer program:Identify the interior of the first label
Hold, according to the content of the first label, determines permission classification corresponding with the first label;The content for identifying the second label, according to
The content of two labels determines Permission Levels corresponding with the second label;According to permission classification and Permission Levels, account information is determined
Administration authority.
In one embodiment, following steps are also realized when processor executes computer program:By permission classification and permission
Rank is combined according to preset order, obtains corresponding sequence code;Transferred in information database it is corresponding with sequence code after
Station information, as the corresponding background information of administration authority.
Above-mentioned each embodiment, computer equipment are realized user and are passed through by the computer program run on processor
The purpose that subapplication handles background information is reduced using threshold, is met user and is believed whenever and wherever possible backstage
The demand handled is ceased, information processing efficiency is effectively improved, traditional background information is overcome and handles the meter that needs to rely on
Calculate the defect of machine equipment.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program realizes following steps when being executed by processor:
Receive the inquiry request that subapplication is sent;Subapplication is raw according to the characteristics of image and account information of user
At inquiry request;
It is inquired according to characteristics of image in customer data base, obtains corresponding query result;Query result includes user
Identity information;
Corresponding user activity is obtained according to identity information;
According to user activity, the administration authority of account information is determined;
Background information corresponding with administration authority is transferred, and background information is pushed into subapplication.
In one embodiment, following steps are also realized when computer program is executed by processor:Extract customer data base
The characteristics of image of middle known users;The characteristics of image of user is matched with the characteristics of image of known users;When the figure of user
When matching as the characteristics of image of feature and known users, the identity information of known users is obtained, the identity information as user.
In one embodiment, following steps are also realized when computer program is executed by processor:According to identity information, obtain
Take the history background information processing record at family;The behavioural characteristic that user is extracted from history background information processing record, according to
The corresponding relationship of behavioural characteristic and characteristic value determines the corresponding characteristic value of user behavior characteristics;According to the corresponding spy of behavioural characteristic
Value indicative determines user activity corresponding with characteristic value.
In one embodiment, following steps are also realized when computer program is executed by processor:Identify the first label
Content determines permission classification corresponding with the first label according to the content of the first label;The content for identifying the second label, according to
The content of second label determines Permission Levels corresponding with the second label;According to permission classification and Permission Levels, determine that account is believed
The administration authority of breath.
In one embodiment, following steps are also realized when computer program is executed by processor:By permission classification and power
Rank is limited, is combined according to preset order, obtains corresponding sequence code;It is transferred in information database corresponding with sequence code
Background information, as the corresponding background information of administration authority;Information database is stored with the corresponding background information of multiple sequence codes.
It is logical to realize user for above-mentioned each embodiment, the computer program that computer readable storage medium is stored by it
The purpose that subapplication handles background information is crossed, is reduced using threshold, meets user whenever and wherever possible to backstage
The demand that information is handled, effectively improves information processing efficiency, overcomes traditional background information processing and needs to rely on
The defect of computer equipment.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of background information method for pushing, the method includes:
Receive the inquiry request that subapplication is sent;The subapplication is raw according to the characteristics of image and account information of user
At the inquiry request;
It is inquired according to described image feature in customer data base, obtains corresponding query result;The query result includes
The identity information of user;
Corresponding user activity is obtained according to the identity information;
According to the user activity, the administration authority of the account information is determined;
Background information corresponding with the administration authority is transferred, and the background information is pushed into the subapplication.
2. the method according to claim 1, wherein described carry out according to described image feature in customer data base
Inquiry, obtaining corresponding query result includes:
Extract the characteristics of image of known users in customer data base;
The described image feature of user is matched with the characteristics of image of known users;
When the characteristics of image of the characteristics of image of user and known users matches, the identity information of the known users is obtained,
Identity information as the user.
3. the method according to claim 1, wherein described living according to the corresponding user of identity information acquisition
Jerk includes:
According to the identity information, the history background information processing record of the user is obtained;
The behavioural characteristic of user is extracted from history background information processing record, it is corresponding with characteristic value according to behavioural characteristic
Relationship determines the corresponding characteristic value of behavioural characteristic described in user;
According to the corresponding characteristic value of the behavioural characteristic, user activity corresponding with the characteristic value is determined.
4. the method according to claim 1, wherein the user activity includes the first label and the second mark
Label;
It is described according to the user activity, determine that the administration authority of the account information includes:
The content for identifying first label determines power corresponding with first label according to the content of first label
Limit classification;
The content for identifying second label determines power corresponding with second label according to the content of second label
Limit rank;
According to the permission classification and the Permission Levels, the administration authority of the account information is determined.
5. according to the method described in claim 4, it is characterized in that, described transfer background information corresponding with the administration authority
Including:
It by the permission classification and the Permission Levels, is combined according to preset order, obtains corresponding sequence code;
Background information corresponding with the sequence code is transferred in information database, as the corresponding backstage letter of the administration authority
Breath.
6. a kind of background information driving means, which is characterized in that described device includes:
Request receiving module, for receiving the inquiry request of subapplication transmission;The subapplication is according to the figure of user
As feature and account information generate the inquiry request;
Image querying module obtains corresponding query result for being inquired according to described image feature in customer data base;
The query result includes the identity information of user;
Liveness obtains module, for obtaining corresponding user activity according to the identity information;
Permission determining module, for determining the administration authority of the account information according to the user activity;
Info push module is pushed to for transferring background information corresponding with the administration authority, and by the background information
The subapplication.
7. device according to claim 6, which is characterized in that described image enquiry module includes:
Image extraction unit, for extracting the characteristics of image of known users in customer data base;
Image matching unit, for matching the described image feature of user with the characteristics of image of known users;
Information acquisition unit, for when the characteristics of image of the characteristics of image of user and known users matches, acquisition to be described
The identity information for knowing user, the identity information as the user.
8. device according to claim 6, which is characterized in that the liveness obtains module and includes:
Acquiring unit is recorded, for obtaining the history background information processing record of the user according to the identity information;
Characteristic analysis unit extracts the behavioural characteristic of user, according to behavioural characteristic from history background information processing record
With the corresponding relationship of characteristic value, the corresponding characteristic value of behavioural characteristic described in user is determined;
Liveness confirmation unit, for determining use corresponding with the characteristic value according to the corresponding characteristic value of the behavioural characteristic
Family liveness.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the processor realizes method described in any one of claims 1 to 5 when executing computer program the step of.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 5 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810925228.XA CN108924258B (en) | 2018-08-14 | 2018-08-14 | Background information pushing method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810925228.XA CN108924258B (en) | 2018-08-14 | 2018-08-14 | Background information pushing method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108924258A true CN108924258A (en) | 2018-11-30 |
CN108924258B CN108924258B (en) | 2022-07-08 |
Family
ID=64404680
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810925228.XA Active CN108924258B (en) | 2018-08-14 | 2018-08-14 | Background information pushing method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108924258B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109785102A (en) * | 2019-01-02 | 2019-05-21 | 深圳壹账通智能科技有限公司 | System of account information-pushing method, device, computer equipment and storage medium |
CN109992601A (en) * | 2019-03-12 | 2019-07-09 | 中国平安财产保险股份有限公司 | Method for pushing, device and the computer equipment of backlog information |
CN111078995A (en) * | 2019-11-08 | 2020-04-28 | 卓尔智联(武汉)研究院有限公司 | Data backtracking method and device, computer equipment and storage medium |
CN112256998A (en) * | 2019-07-22 | 2021-01-22 | 百度时代网络技术(北京)有限公司 | Promotion information management method and device and electronic equipment |
CN113704830A (en) * | 2021-07-26 | 2021-11-26 | 王旭 | Intelligent website data tamper-proof system and method |
CN117579692A (en) * | 2024-01-16 | 2024-02-20 | 北京睿企信息科技有限公司 | Data processing system for information push |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101165696A (en) * | 2006-10-16 | 2008-04-23 | 中国长城计算机深圳股份有限公司 | Safety identification method based on safe computer |
US20120240166A1 (en) * | 2009-11-11 | 2012-09-20 | Zte Corporation | Method and system for managing program in word service of video program |
CN103634412A (en) * | 2013-12-16 | 2014-03-12 | 信雅达系统工程股份有限公司 | Service information pushing system |
CN104268212A (en) * | 2014-09-23 | 2015-01-07 | 北京奇虎科技有限公司 | Internet product release method and device |
CN105263052A (en) * | 2015-10-13 | 2016-01-20 | 微鲸科技有限公司 | Audio-video push method and system based on face identification |
CN105550022A (en) * | 2015-12-23 | 2016-05-04 | 北京奇虎科技有限公司 | Business data processing method and apparatus |
CN105653903A (en) * | 2015-12-18 | 2016-06-08 | 小米科技有限责任公司 | Application program authority management method and device |
US20160306803A1 (en) * | 2014-06-10 | 2016-10-20 | Tencent Technology (Shenzhen) Company Limited | Group user level association method and system |
CN106713255A (en) * | 2015-11-17 | 2017-05-24 | 腾讯科技(深圳)有限公司 | Use information management method and system |
CN107395777A (en) * | 2017-09-14 | 2017-11-24 | 广州华多网络科技有限公司 | A kind of method of information push, server |
CN107612989A (en) * | 2017-08-18 | 2018-01-19 | 广州今也社教育科技有限公司 | A kind of information-pushing method, terminal and system |
CN108156522A (en) * | 2018-02-06 | 2018-06-12 | 南京创维信息技术研究院有限公司 | Homepage content method for pushing, device and computer readable storage medium |
WO2018107727A1 (en) * | 2016-12-13 | 2018-06-21 | 中兴通讯股份有限公司 | Method and device for information processing, and terminal |
CN108334625A (en) * | 2018-02-09 | 2018-07-27 | 深圳壹账通智能科技有限公司 | Processing method, device, computer equipment and the storage medium of user information |
CN108346018A (en) * | 2018-01-12 | 2018-07-31 | 吴展 | Intelligent classification based on wechat shows order production management billboard |
-
2018
- 2018-08-14 CN CN201810925228.XA patent/CN108924258B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101165696A (en) * | 2006-10-16 | 2008-04-23 | 中国长城计算机深圳股份有限公司 | Safety identification method based on safe computer |
US20120240166A1 (en) * | 2009-11-11 | 2012-09-20 | Zte Corporation | Method and system for managing program in word service of video program |
CN103634412A (en) * | 2013-12-16 | 2014-03-12 | 信雅达系统工程股份有限公司 | Service information pushing system |
US20160306803A1 (en) * | 2014-06-10 | 2016-10-20 | Tencent Technology (Shenzhen) Company Limited | Group user level association method and system |
CN104268212A (en) * | 2014-09-23 | 2015-01-07 | 北京奇虎科技有限公司 | Internet product release method and device |
CN105263052A (en) * | 2015-10-13 | 2016-01-20 | 微鲸科技有限公司 | Audio-video push method and system based on face identification |
CN106713255A (en) * | 2015-11-17 | 2017-05-24 | 腾讯科技(深圳)有限公司 | Use information management method and system |
CN105653903A (en) * | 2015-12-18 | 2016-06-08 | 小米科技有限责任公司 | Application program authority management method and device |
CN105550022A (en) * | 2015-12-23 | 2016-05-04 | 北京奇虎科技有限公司 | Business data processing method and apparatus |
WO2018107727A1 (en) * | 2016-12-13 | 2018-06-21 | 中兴通讯股份有限公司 | Method and device for information processing, and terminal |
CN107612989A (en) * | 2017-08-18 | 2018-01-19 | 广州今也社教育科技有限公司 | A kind of information-pushing method, terminal and system |
CN107395777A (en) * | 2017-09-14 | 2017-11-24 | 广州华多网络科技有限公司 | A kind of method of information push, server |
CN108346018A (en) * | 2018-01-12 | 2018-07-31 | 吴展 | Intelligent classification based on wechat shows order production management billboard |
CN108156522A (en) * | 2018-02-06 | 2018-06-12 | 南京创维信息技术研究院有限公司 | Homepage content method for pushing, device and computer readable storage medium |
CN108334625A (en) * | 2018-02-09 | 2018-07-27 | 深圳壹账通智能科技有限公司 | Processing method, device, computer equipment and the storage medium of user information |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109785102A (en) * | 2019-01-02 | 2019-05-21 | 深圳壹账通智能科技有限公司 | System of account information-pushing method, device, computer equipment and storage medium |
CN109992601A (en) * | 2019-03-12 | 2019-07-09 | 中国平安财产保险股份有限公司 | Method for pushing, device and the computer equipment of backlog information |
CN109992601B (en) * | 2019-03-12 | 2023-10-27 | 中国平安财产保险股份有限公司 | To-do information pushing method and device and computer equipment |
CN112256998A (en) * | 2019-07-22 | 2021-01-22 | 百度时代网络技术(北京)有限公司 | Promotion information management method and device and electronic equipment |
CN112256998B (en) * | 2019-07-22 | 2024-03-22 | 百度时代网络技术(北京)有限公司 | Popularization information management method and device and electronic equipment |
CN111078995A (en) * | 2019-11-08 | 2020-04-28 | 卓尔智联(武汉)研究院有限公司 | Data backtracking method and device, computer equipment and storage medium |
CN111078995B (en) * | 2019-11-08 | 2022-05-17 | 卓尔智联(武汉)研究院有限公司 | Data backtracking method and device, computer equipment and storage medium |
CN113704830A (en) * | 2021-07-26 | 2021-11-26 | 王旭 | Intelligent website data tamper-proof system and method |
CN113704830B (en) * | 2021-07-26 | 2023-08-29 | 山东赛宝电子信息工程有限责任公司 | Intelligent website data tamper-proof system and method |
CN117579692A (en) * | 2024-01-16 | 2024-02-20 | 北京睿企信息科技有限公司 | Data processing system for information push |
CN117579692B (en) * | 2024-01-16 | 2024-03-15 | 北京睿企信息科技有限公司 | Data processing system for information push |
Also Published As
Publication number | Publication date |
---|---|
CN108924258B (en) | 2022-07-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108924258A (en) | Background information method for pushing, device, computer equipment and storage medium | |
CN108829727B (en) | Data storage method and device, computer equipment and storage medium | |
US10073916B2 (en) | Method and system for facilitating terminal identifiers | |
CN104765689B (en) | A kind of interface capability data supervise method and apparatus in real time | |
US8955143B1 (en) | Use of decoy data in a data store | |
CN106485261B (en) | Image recognition method and device | |
CN109597949B (en) | Third party buried point identification generation method and equipment based on data standardization | |
CN108334625B (en) | User information processing method and device, computer equipment and storage medium | |
CN112631633B (en) | Function module upgrading method and device based on double-core intelligent ammeter | |
CN110020262A (en) | Pushed information sending method, device, computer equipment and storage medium | |
CN108287823A (en) | Message data processing method, device, computer equipment and storage medium | |
CN111464513A (en) | Data detection method, device, server and storage medium | |
CN103490978A (en) | Terminal, server and message monitoring method | |
CN109766316A (en) | File acquisition method, device, computer equipment and storage medium | |
US9665574B1 (en) | Automatically scraping and adding contact information | |
CN108920357A (en) | Operation system detection method, device, computer equipment and storage medium | |
CN102387255B (en) | Method and device for utilizing intelligent card to process third-party expanded service data | |
CN116668187B (en) | Honeypot identification method and device and electronic equipment | |
CN113111078A (en) | Resource data processing method and device, computer equipment and storage medium | |
CN113158944A (en) | Physical examination queuing method, system, equipment and storage medium based on face recognition | |
CN116578984A (en) | Risk management and control method, system, equipment and medium for business data | |
CN110502549A (en) | User data processing method, device, computer equipment and storage medium | |
CN115482631A (en) | Information interaction method and device | |
CN111291127B (en) | Data synchronization method, device, server and storage medium | |
CN110851446B (en) | Data table generation method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |