Disclosure of Invention
The invention provides a personal information data query interactive authorization method, which aims to solve the technical problem that the prior art can not authorize personal information to be queried by appointed personnel through a terminal on the Internet, so that the personal information is associated in a two-dimensional code, and the security of the user information is ensured while the authorization to the appointed personnel for querying the personal information is realized through the double verification of the face information and the personal information of the user.
In order to solve the above technical problem, an embodiment of the present invention provides a method for querying, interacting and authorizing personal information data, including:
the method comprises the steps that a first terminal obtains face information of a first user and personal information needing external authorization query, and generates a two-dimensional code according to the face information of the first user and the personal information;
after the second terminal scans the two-dimensional code for data interaction, the second terminal acquires personal information of a second user and face information of the second user, matches and verifies whether the personal information of the second user and the face information of the second user are consistent through the Internet, and if the personal information of the second user and the face information of the second user are consistent, confirmation information is sent to the first terminal;
after the first terminal acquires the confirmation information, acquiring a temporary face information record of the current user, matching and verifying whether the temporary face information is consistent with the first user face information associated in the two-dimensional code, and if so, sending an authorization instruction to the second terminal;
and after the second terminal acquires the authorization instruction, acquiring and displaying the personal information.
As a preferred scheme, the method for generating a two-dimensional code by a first terminal includes the steps of:
the first terminal acquires and records face information of the first user;
the first terminal acquires and records personal information of the first user needing external authorization query;
after the first terminal obtains a generation instruction sent by the first user, generating a two-dimensional code according to the face information of the first user and the personal information of the first user, wherein the two-dimensional code is associated with the face information of the first user and the personal information of the first user;
and the first terminal sends the two-dimension code to the second terminal.
As a preferred scheme, after the second terminal scans the two-dimensional code for data interaction, the second terminal obtains personal information of a second user and face information of the second user, matches and verifies whether the personal information of the second user and the face information of the second user are consistent through the internet, and if the personal information of the second user and the face information of the second user are consistent, sends confirmation information to the first terminal, and the method includes:
after scanning the two-dimensional code for data interaction, the second terminal acquires address information and a skip request of the two-dimensional code, and skips to enter a personal information filling interface;
the second terminal acquires the personal information input by the second user on the personal information filling interface, and acquires and records the face information of the second user;
and the second terminal performs matching verification on the second user personal information and the second user face information through an internet inquiry link by applying a face recognition technology to determine whether the second user personal information and the second user face information are consistent, and if the second user personal information and the second user face information are consistent, sends confirmation information to the first terminal.
Preferably, the content of the confirmation information includes a name of the second user, a summary of the content to be queried, and a sending time.
As a preferred scheme, after acquiring the confirmation information, the first terminal acquires temporary face information of the current user, matches and verifies whether the temporary face information is consistent with first user face information associated in the two-dimensional code, and if so, sends an authorization instruction to the second terminal, including:
after the first terminal acquires the confirmation information, displaying a judgment interface to receive an agreement instruction or a rejection instruction sent by the first user;
when the first terminal acquires an agreement instruction sent by the first user, acquiring and recording temporary face information of the current user;
and the first terminal performs matching verification on the temporary face information and the first user face information associated in the two-dimensional code by applying a face recognition technology to determine whether the temporary face information and the first user face information are consistent, and if so, sends an authorization instruction to the second terminal.
As a preferred scheme, the face recognition technology includes an AI algorithm, a face recognition algorithm, and a neural network algorithm.
Preferably, the personal information of the second user includes a name and an identification number of the second user.
As a preferred scheme, the first terminal and the second terminal are a smart phone with a camera, a tablet computer and a computer.
As a preferred scheme, each time the first terminal and the second terminal execute one instruction action, a corresponding operation log record is generated and stored in a corresponding local storage module, or the operation log record is stored in a cloud server through the internet.
As a preferred scheme, when the matching verification results of the first terminal are inconsistent, an alarm signal is sent out; and when the matching verification results of the second terminal are inconsistent, sending an alarm signal and sending alarm information to the first terminal.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
1. the method of the invention relates the personal information in the two-dimensional code, and through the double verification of the face information and the personal information of the user, the technical problem that the prior art can not authorize the personal information to be inquired by the appointed personnel through the terminal on the Internet is solved, thereby realizing the authorization to the appointed personnel to inquire the personal information and simultaneously ensuring the safety of the user information.
2. By using the face recognition technology to carry out matching verification on the face information of the user, the face recognition accuracy can be improved.
3. By carrying out log recording and storing on each execution instruction, when an operation has an error, the source of the problem can be found by inquiring the log record, so that the operation process can be traced.
4. When the terminal verifies that the matching is inconsistent, corresponding alarm information is sent out, so that the protection of the personal information of the user can be enhanced, and the safety of the information is ensured.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the field of information inquiry, the application of scanning the two-dimensional code to acquire information is very wide, but an authorized inquiry mechanism is lacked, and information cannot be authorized to be checked for a specific person in the inquiry process, so that the two-dimensional code is disclosed equivalently to disclose information to all persons. In the payment field, although the authorized payment based on the biological characteristics and the two-dimensional codes is widely applied, the payee can directly transfer the money of the payer to an account of the payee after inputting the amount of the collected money and scanning the payment two-dimensional codes shown by the payer, and an authorized payment mechanism is lacked in the payment process.
In summary, the invention provides a personal information data query interactive authorization method.
Example one
Referring to fig. 1, a preferred embodiment of the present invention provides a method for querying and interactively authorizing personal information data, including:
s1, a first terminal acquires face information of a first user and personal information needing external authorization query, and generates a two-dimensional code according to the face information of the first user and the personal information;
s2, after the second terminal scans the two-dimensional code for data interaction, the second terminal obtains personal information of a second user and face information of the second user, matching verification is carried out on the personal information of the second user and the face information of the second user through the Internet to determine whether the personal information of the second user and the face information of the second user are consistent, and if the personal information of the second user and the face information of the second user are consistent, confirmation information is sent to the first terminal;
s3, after the first terminal acquires the confirmation information, acquiring a temporary face information record of the current user, matching and verifying whether the temporary face information is consistent with the first user face information associated in the two-dimensional code, and if so, sending an authorization instruction to the second terminal;
and S4, after the second terminal acquires the authorization instruction, acquiring and displaying the personal information.
According to the embodiment, the personal information is associated in the two-dimensional code, and the technical problem that the personal information cannot be authorized to be inquired by appointed personnel through the terminal on the Internet in the prior art is solved through the dual verification of the face information and the personal information of the user, so that the personal information is authorized to be inquired by the appointed personnel, and the safety of the user information is guaranteed.
Example two
Referring to fig. 2, in the present embodiment, the step S1 includes:
s11, the first terminal acquires and records face information of the first user;
s12, the first terminal acquires and records the personal information of the first user needing to be inquired by external authorization;
s13, after the first terminal acquires a generation instruction sent by the first user, generating a two-dimensional code according to the face information of the first user and the personal information of the first user, wherein the two-dimensional code is associated with the face information of the first user and the personal information of the first user;
and S14, the first terminal sends the two-dimensional code to the second terminal.
EXAMPLE III
Referring to fig. 3, in the present embodiment, the step S2 includes:
s21, after the second terminal scans the two-dimensional code for data interaction, address information and a skip request of the two-dimensional code are obtained, and the second terminal skips to enter a personal information filling interface;
s22, the second terminal acquires the personal information input by the second user on the personal information filling interface, and acquires and records the face information of the second user;
and S23, the second terminal carries out matching verification on the second user personal information and the second user face information through an internet inquiry link by applying a face recognition technology, and if the matching is consistent, confirmation information is sent to the first terminal.
In this embodiment, the content of the confirmation information includes the name of the second user, the summary of the content to be queried, and the sending time.
In this embodiment, the face recognition technology includes an AI algorithm, a face recognition algorithm, and a neural network algorithm. By using the face recognition technology to carry out matching verification on the face information of the user, the face recognition accuracy can be improved.
Example four
Referring to fig. 4, in the present embodiment, the step S3 includes:
s31, after the first terminal acquires the confirmation information, displaying a judgment interface to receive an agreement instruction or a rejection instruction sent by the first user;
s32, after the first terminal acquires an agreement instruction sent by the first user, acquiring and recording temporary face information of the current user;
and S33, the first terminal performs matching verification on the temporary face information and the first user face information associated in the two-dimensional code by applying a face recognition technology, and if the temporary face information and the first user face information are consistent, an authorization instruction is sent to the second terminal.
In this embodiment, the face recognition technology includes an AI algorithm, a face recognition algorithm, and a neural network algorithm. By using the face recognition technology to carry out matching verification on the face information of the user, the face recognition accuracy can be improved.
EXAMPLE five
In this embodiment, each time the first terminal and the second terminal execute one instruction action, a corresponding operation log record is generated and stored in a corresponding local storage module, or the operation log record is stored in a cloud server through the internet.
According to the method and the device, log recording and storage are carried out on each execution instruction, and when an operation is wrong, the source of the problem can be found by inquiring the log record, so that the operation process can be traced.
EXAMPLE six
In this embodiment, when the matching verification results of the first terminal are inconsistent, an alarm signal is sent; and when the matching verification results of the second terminal are inconsistent, sending an alarm signal and sending alarm information to the first terminal.
According to the embodiment, when the terminal verification is inconsistent, corresponding alarm information is sent out, so that the protection of the personal information of the user can be enhanced, and the safety of the information is ensured.
It should be understood that in the above embodiment, the personal information of the second user includes the name and identification number of the second user.
It should be understood that, in the above embodiments, the first terminal and the second terminal are a smartphone, a tablet computer, and a computer having a camera.
The invention will be described in detail with reference to one of the embodiments.
Firstly, after an information provider (hereinafter referred to as provider) acquires face information of the provider by using equipment such as a mobile phone and the like, searching information needing external authorization query and generating an authorization query two-dimensional code, wherein the query two-dimensional code is associated with the face information of the provider and the authorization query information; secondly, after an information inquiry party (hereinafter called inquiry party) scans the two-dimensional code by using equipment such as a mobile phone and the like, inputting the name and the identity card number of the information inquiry party and obtaining the face information of the inquiry party by using the equipment, wherein the equipment checks whether the face information currently input is matched with the input personal information by using a face recognition technology; thirdly, after the currently input face information and the input personal information are confirmed to be matched, the equipment sends a message to a provider to confirm whether the provider is authorized to refer to the information; and finally, if the provider agrees, the face information of the provider is acquired by using equipment such as a mobile phone and the like, and then whether the face information associated with the two-dimensional code is consistent or not is checked, and if so, the inquirer can check the authorized public information.
Step 1: an information provider (hereinafter referred to as a provider) acquires and records face information through a mobile phone and other equipment;
and 2, step: a provider searches information needing external authorization query; (the information searched here is not only information in government systems, but also information that any group or individual needs to authorize the inquiry)
And step 3: a provider clicks to generate a query two-dimensional code, and the query two-dimensional code is associated with face information and authorized queryable information of the provider;
and 4, step 4: the provider shares the query two-dimensional code;
and 5: an information inquiring party (hereinafter referred to as an inquiring party) scans an inquiring two-dimensional code of a provider through equipment such as a mobile phone;
step 6: the inquiring party inputs personal information such as names, identification card numbers and the like through equipment such as a mobile phone and the like;
and 7: the inquiring party acquires and records the face information of the inquiring party through equipment such as a mobile phone and the like;
and step 8: the equipment checks the face information input by the inquiring party by applying a face recognition technology, and verifies whether the face information is matched with the input personal information; (the inquiring party does not need to be directly connected with the resident information system of the public security bureau and can use a human Face core interface provided by an internet company to realize the interface, for example, the interface http:// ai, baidu, com/docs #/Face-PersonVerify-V3/topqq-pf-to = pcqq.c2c, and the equipment of the inquiring party can check whether the human Face information is matched with the personal information as long as the equipment can be connected with the internet)
And step 9: after the face information input by the inquirer is matched with the personal information input by the input personal information check result, the equipment sends information (the message content comprises the name of the inquirer, the abstract of the content to be inquired, the inquiry time and the like) to the equipment of the provider; if the matching is not consistent, the flow is ended.
Step 10: after the provider receives the information, if the provider agrees to authorize the inquiry of the inquirer to continue the next operation, otherwise, the process is ended;
step 11: a provider acquires and records face information of a user by using equipment such as a mobile phone;
step 12: the equipment checks whether the face information of the provider is consistent with the face information associated with the query two-dimensional code or not by applying a face recognition technology, if so, the query party can check the authorized and published information of the provider, and if not, the flow is ended.
Step 13: the inquirer views the information authorized to be disclosed by the provider.
The above-mentioned embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, and it should be understood that the above-mentioned embodiments are only examples of the present invention and are not intended to limit the scope of the present invention. It should be understood that any modifications, equivalents, improvements and the like, which come within the spirit and principle of the invention, may occur to those skilled in the art and are intended to be included within the scope of the invention.