Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
One or more embodiment of this specification provides a kind of processing method of electronic insurance policy, with solution or portion
That decomposes certainly current electronic insurance policy not can guarantee technical problem shared safely.
The method of the present embodiment is used for the processing server of electronic insurance policy, which can be AR processing server can also
To be the insurance class service server etc. with AR function.
It is a kind of disclosed implementation flow chart of the processing method of electronic insurance policy of the present embodiment referring to Fig. 1.It specifically includes
Following steps:
Step 11, the processing request and entity object image that first terminal is sent are obtained.
In the specific implementation process, the type of first terminal is unlimited, and according to the operation of the first user, generation processing is asked
It asks.Content and respective handling instruction to be treated is carried in processing request.Specifically, the place is requested in the processing
Reason request is the request for the Classical correlation object of the electronic insurance policy and the entity object image to be carried out to AR fusion, and phase
Identification object is closed to encrypt to obtain by the related data of the electronic insurance policy.
There are many kinds of types for the related data of the electronic insurance policy, comprising: the odd numbers of the electronic insurance policy, the electronics are protected
Single web page interlinkage, the multimedia file generated by the electronic insurance policy (video, picture, audio etc.).
And Classical correlation object, it is the identification object that will be intercepted the related data encryption of part electronic insurance policy and generate.The identification object
It can be number of different types arbitrary shape, such as two dimensional code, a piece of petal, passage, a picture etc..
Entity object image is entity object to be shot or scanned obtained image, such as hang picture shooting to a width entity
The image etc. that the desk of obtained image, an entity is shot.
Further, the content that processing request carries can be the related data of electronic insurance policy, be also possible to Classical correlation
Object.
According to circumstances different, the content that processing request carries is different.If the content that processing request carries is Classical correlation object.
Classical correlation object is encrypted to obtain by the first terminal according to the related data of the electronic insurance policy.So first eventually
In addition end can also send the related data of electronic insurance policy to processing server.
If what processing request carried is the related data of electronic insurance policy, processing server can be based on processing request to the electricity
The related data of sub- declaration form encrypts to obtain Classical correlation object.
First terminal is sent except processing request, also the image scanning of entity object can be sent to server, with housecoat
Business device carries out subsequent AR processing.
Step 12, it responds the processing to request, obtains the Classical correlation object, and to the entity object image and described
Classical correlation object carries out AR virtual reality fusion treatment, and the Classical correlation object is hidden into the entity object image.
In the specific implementation process, obtaining the Classical correlation object of the electronic insurance policy, there are two types of modes:
First way is, if processing request carries the Classical correlation object;Processing request is responded, from described
Classical correlation object is directly extracted in processing request;Wherein, Classical correlation object is by the first terminal according to the electronic insurance policy
Related data is encrypted to obtain, so processing server only needs to call directly.
The second way is to respond the processing request, transfers the related data of the electronic insurance policy, protects to the electronics
Single related data is encrypted to obtain the Classical correlation object.That is, what is carried in processing request is electronics
The related data of declaration form, so processing server needs itself to encrypt it to obtain Classical correlation object.Further, it can incite somebody to action
Corresponding Crypted password returns to first terminal.
The meaning that AR virtual reality fusion treatment is carried out to the entity object image and the Classical correlation object is to utilize
It (more specifically, is the entity object hidden in the picture that Classical correlation object is hidden in the entity object image by AR technology
The inside), need to see using the equipment with AR function the related knowledge being hidden in entity object image after processed
Other object, and other equipment scan the entity object cannot hide Classical correlation object therein, and then can guarantee electronic insurance policy
Safety.For example, the secondary flowers (Classical correlation object) two dimensional code and shooting obtained hang the figure of picture (entity object)
As carrying out AR virtual reality fusion treatment, two dimensional code is hidden in flowers and is hung in picture, it is that AR hangs picture that flowers at this time, which hang picture,.It is right
For other equipment, it is exactly that a secondary simple flowers hang picture which, which hangs picture, and only using has the equipment of AR function can
Identify the two dimensional code being hidden in AR extension picture.
Further, after the Classical correlation object is hidden into the entity object, a response message is produced,
And give the returning response message to the first terminal.The response message is for indicating that AR virtual reality fusion treatment finishes.When
So, server and first terminal can also arrange in advance, such as the content of agreement is that " processing for receiving first terminal requests it
Afterwards, it immediately treats.", then after receiving processing request, so that it may according to agreement, immediately to the entity object image
AR virtual reality fusion treatment is carried out with the Classical correlation object, the Classical correlation object is hidden into the entity object figure
As in.So for first terminal, it can obtain processing result according to agreement.
Further, after by above-mentioned processing, the first user (user of first terminal) can inform the second use
Family (user of second terminal) above-mentioned processing result.Alternatively, above-mentioned message can be shared with to for first terminal
Two terminals, such as the position of entity object or form etc. are shared with second terminal, it finds second terminal and scans this
Entity object.
As a kind of optional embodiment, the difference of first terminal and second terminal is only sent for server
Processing request different difference, in fact, first terminal and second terminal can be the same terminal, such as two users are
With the same terminal.First user's operation terminal sends processing request to server, responds the processing request pair by server
The entity object image and the Classical correlation object carry out AR virtual reality fusion treatment.First user and second user are families
People or friend, two people use the same terminal, and second user operating terminal carries out AR to the entity object and scanned
Data, and scan data is sent to server, the Classical correlation object is obtained according to the scan data by server;It is based on
The open verifying authorization of the Classical correlation object gives the terminal, and receives the password to be verified that the terminal is sent and verified;
If being verified, the related data of the electronic insurance policy is sent to the terminal.
Step 13, it receives second terminal and the scan data that AR is scanned is carried out to the entity object, and according to described
Scan data obtains the Classical correlation object.
In the specific implementation process, the entity object is shared with the second terminal by the first terminal, shares
There are many modes, such as position or form for informing entity object etc. are shared with second terminal, for the mode sheet of sharing
Invention is with no restrictions.Second user can certainly be shared with by the first user.
Second terminal can carry out AR scanning to entity object, and the scan data for obtaining entity object is transferred to server.And
The scan data may include scan image.
So after server receives the scan image that the second terminal scans entity object progress AR,
It can detect whether the scan image is associated with the Classical correlation object.If association, according to scan image acquisition
Classical correlation object.If not being associated with, then it represents that there is no Classical correlation objects for the scan image that second terminal is sent, then will not send phase
Identification object is closed to show to second terminal.
Further, after obtaining the Classical correlation object according to the scan data, on the one hand, can be by the correlation
Identification object is sent to second terminal and shows, and according to the operation of second terminal (such as click, access etc. operation) open claim
To second terminal.On the other hand, after obtaining the Classical correlation object, without being shown to second terminal, can be known according to the correlation
The directly open verifying authorization of other object specifically please refers to following processing step to second terminal.
Step 14, the second terminal is given based on the open verifying authorization of the Classical correlation object, and receives described second eventually
The password to be verified that end is sent is verified.
During giving the second terminal based on the open verifying authorization of the Classical correlation object, prompting frame can be generated
It is supplied to second terminal, the prompting frame is for prompting the second terminal to input the password to be verified;If second terminal is defeated
Enter password to be verified, then processing server can obtain the password to be verified in the prompting frame.The type of password to be verified
It is indefinite, such as can be one or more kinds of combinations such as number, letter, word, character.Certainly, also there are other open verifying power
The mode of limit, is not limited in prompting frame.Such as the modes such as voice print verification, speech verification, other verification modes should also be as include
Within the protection scope of this specification.
The process of voice print verification is that prompt second terminal inputs vocal print to be verified, and whether verifies the vocal print to be verified
It is identical with default vocal print, if they are the same, then it represents that be verified.
The process of speech verification is that prompt prompt second terminal inputs voice to be verified, and verifies the voice to be verified
In vocal print it is whether identical with default vocal print, and need to verify the voice content in the voice to be verified whether and it is default in
Hold identical.If all identical, just indicate to be verified.
On the other hand, since Classical correlation object is to encrypt to obtain by the related data of electronic insurance policy.So needing to phase
It closes identification object to be decrypted, if the related data of electronic insurance policy can be sent to second eventually to password authentification to be verified success
End.
In specific decrypting process, according to the difference of cipher mode, the mode of decryption is also different.
Specifically, if Classical correlation object is encrypted to obtain by related data of the first terminal to electronic insurance policy, then servicing
Device can then receive the corresponding clear crytpographic key of the Classical correlation object that the first terminal is sent;Using the clear crytpographic key to institute
It states Classical correlation object to be decrypted, obtains the related data of the electronic insurance policy.
If Classical correlation object is encrypted to obtain by processing server itself to the related data to electronic insurance policy, then directly
The Classical correlation object is decrypted, the related data of the electronic insurance policy is obtained.
Step 15, if being verified, the related data of the electronic insurance policy is sent to the second terminal.
In the specific implementation process, due to there are many related datas of electronic insurance policy, such as the list of the electronic insurance policy
Number, the web page interlinkage of the electronic insurance policy, the video generated by the electronic insurance policy, the picture generated by the electronic insurance policy,
The audio etc. generated by the electronic insurance policy.
So, can be according to the phase of electronic insurance policy after the related data of the electronic insurance policy is sent to the second terminal
It closes data and carries out corresponding processing.
If the related data of electronic insurance policy is video, the picture etc. of electronic insurance policy, directly the video, picture etc. are sent
It is played out to second terminal.
If the related data of electronic insurance policy is the web page interlinkage of electronic insurance policy, receives the second terminal and be based on the electricity
The first access request that the web page interlinkage of sub- declaration form generates;The webpage of the electronic insurance policy is accessed based on first access request
Link, obtains the content of the electronic insurance policy;The content of the electronic insurance policy is sent to the second terminal.
If the related data of the electronic insurance policy is the odd numbers of the electronic insurance policy;It then receives the second terminal and is based on institute
State the second access request that the odd numbers of electronic insurance policy generates;Second access request is responded, according to the list of the electronic insurance policy
Number inquiry obtains the content of the electronic insurance policy;The content of the electronic insurance policy is sent to the second terminal.
By above-mentioned one or more kinds of embodiments, first subject description discloses a kind of processing method of electronic insurance policy and
Server, in order to which solve current electronic insurance policy not can guarantee safely shared technical problem, acquisition first terminal hair first
The processing request sent and entity object image are then responding to the processing request, obtain the Classical correlation object, and to the reality
Body object images and the Classical correlation object carry out AR virtual reality fusion treatment, the Classical correlation object are hidden into described
In entity object image.After above-mentioned processing, since the equipment that entity object has to have AR function can identify
Hiding Classical correlation object out, so can guarantee safety of electronic insurance policy during sharing.Further, second is received eventually
It holds and the scan data that AR is scanned is carried out to the entity object, and and the Classical correlation is obtained according to the scan data
Object is then based on the open verifying authorization of the Classical correlation object to the second terminal.Due to for being concealed with Classical correlation object
Entity object for, as long as the equipment for having AR function can scan to obtain the Classical correlation object, so Classical correlation object
It is not the related data of electronic insurance policy itself, but the identification object encrypted by the related data of electronic insurance policy.Therefore,
Two terminal recognitions go out Classical correlation object and are merely able to be verified permission, it is also necessary to input corresponding password to be verified.For processing
The password to be verified that the second terminal is sent can be received for server to be verified;If being verified, just by the electronics
The related data of declaration form is sent to the second terminal, guarantees the safety of electronic insurance policy with this.
The following examples illustrate the technical solution of this specification.
The user A of mobile phone A obtains a electronic insurance policy after having bought insurance, and the web page interlinkage of the electronic insurance policy is encrypted to
Two dimensional code and request are sent to processing server together.In addition, mobile phone A can also scan family a width flowers hang picture image to
Processing server.
Two dimensional code is hidden into the flowers using AR technology and hung in the image of picture by processing server, certainly, herein actually
It is that two dimensional code and flowers are hung the petal as in of drawing using AR related algorithm to be overlapped, two dimensional code is hidden into petal, but
Be family entity flowers hang picture do not change.Message informing is returned after the completion to handle successfully.
User B and user A is household.User A can use mobile phone A and mobile phone B led to after learning and handling successfully
Letter, by the flowers of family hang picture position and correlation circumstance (for example AR is carried out to the extension picture of so-and-so position of family and is merged,
Situations such as electronic insurance policy has been ensconced into the inside etc.) it informs and gives user B.It scans, obtains if user B hangs picture to the flowers using mobile phone B
To the corresponding picture transfer of scanning to processing server.
After processing server obtains the picture, it can monitor whether the picture is associated with the two dimensional code, if association, by two
Dimension code shows mobile phone B, if mobile phone B scans the two dimensional code, then can be based on the open permission of two dimensional code to mobile phone B, after progress
Continuous processing.
As a kind of optional embodiment, after detecting whether the picture is associated with the two dimensional code;If association, is opened
Limit delegate power to mobile phone B, for example, generating prompting frame is sent to mobile phone B, prompting mobile telephone set B inputs password to be verified.And password to be verified
User B can be told privately by user A.User B can input corresponding password to be verified in prompting frame.
Processing server can receive password to be verified and be verified, if being verified, by the webpage chain of electronic insurance policy
It connects and is shown to mobile phone B.
Further, if user B clicks the web page interlinkage, then mobile phone B can correspond to generation access request.
Corresponding electronic insurance policy content can be shown to mobile phone B based on the access request by processing server.
Based on inventive concept same in previous embodiment, this specification embodiment also provides a kind of place of electronic insurance policy
Server is managed, referring to Fig. 2, comprising:
First obtains module 21, for obtaining processing request and the entity object image of first terminal transmission;Wherein, described
Processing request is the request for the Classical correlation object of the electronic insurance policy and the entity object image to be carried out to AR fusion, institute
Classical correlation object is stated to encrypt to obtain by the related data of the electronic insurance policy;
AR processing module 22 obtains the Classical correlation object, and to the entity object for responding the processing request
Image and the Classical correlation object carry out AR virtual reality fusion treatment, and the Classical correlation object is hidden into the entity pair
As in image;
Second obtains module 23, carries out the scanning number that AR is scanned to the entity object for receiving second terminal
According to, and the Classical correlation object is obtained according to the scan data;
Authentication module 24 for giving the second terminal based on the open verifying authorization of the Classical correlation object, and receives institute
The password to be verified for stating second terminal transmission is verified;
First sending module 25, if the related data of the electronic insurance policy is sent to described for being verified
Two terminals.
As a kind of optional embodiment, the AR processing module 22 is specifically used for responding the processing request, transfers institute
The related data for stating electronic insurance policy is encrypted the related data of the electronic insurance policy to obtain the Classical correlation object.
As a kind of optional embodiment, the server further include:
First deciphering module obtains the related data of the electronic insurance policy for the Classical correlation object to be decrypted.
As a kind of optional embodiment, if processing request carries the Classical correlation object, the AR processing module
22, it is specifically used for responding the processing request, extracts the Classical correlation object from processing request;Wherein, the correlation
Identification object is encrypted to obtain by the first terminal according to the related data of the electronic insurance policy.
As a kind of optional embodiment, the server further include:
First receiving module, the corresponding clear crytpographic key of the Classical correlation object sent for receiving the first terminal;
Second deciphering module obtains the electricity for the Classical correlation object to be decrypted using the clear crytpographic key
The related data of sub- declaration form.
As a kind of optional embodiment, described second obtains module 23, specifically includes:
Second receiving module carries out the scan image that AR is scanned for receiving the second terminal;
Detection module, for detecting whether the scan image is associated with the Classical correlation object;
Third obtains module, is used for if so, obtaining the Classical correlation object according to the scan image.
As a kind of optional embodiment, the authentication module 24 is specifically included:
Generation module, for generating prompting frame, the prompting frame is described to be verified for prompting the second terminal input
Password;
4th obtains module, and the password to be verified for obtaining in the prompting frame is verified.
As a kind of optional embodiment, the related data of the electronic insurance policy includes: the odd numbers of the electronic insurance policy, institute
The web page interlinkage for stating electronic insurance policy, the multimedia file generated by the electronic insurance policy.
As a kind of optional embodiment, if the related data of the electronic insurance policy includes: the webpage of the electronic insurance policy
Link;
The server further include:
Third receiving module, first generated for receiving the second terminal based on the web page interlinkage of the electronic insurance policy
Access request;
5th obtains module, for accessing the web page interlinkage of the electronic insurance policy based on first access request, obtains
The content of the electronic insurance policy;
Second sending module, for the content of the electronic insurance policy to be sent to the second terminal.
As a kind of optional embodiment, if the related data of the electronic insurance policy includes: the odd numbers of the electronic insurance policy;
The server further include:
4th receiving module, the second access generated for receiving the second terminal based on the odd numbers of the electronic insurance policy
Request;
6th obtains module, for responding second access request, is inquired and is obtained according to the odd numbers of the electronic insurance policy
The content of the electronic insurance policy;
Third sending module, for the content of the electronic insurance policy to be sent to the second terminal.
Based on inventive concept same in previous embodiment, this specification embodiment also provides a kind of computer-readable deposit
The step of storage media is stored thereon with computer program, and any the method above is realized when which is executed by processor.
Based on inventive concept same in previous embodiment, the embodiment of this specification also provides a kind of computer and sets
It is standby, as shown in figure 3, including memory 304, processor 302 and being stored on memory 304 and can run on processor 302
Computer program, the step of processor 302 realizes any the method above when executing described program.
Wherein, in Fig. 3, bus architecture (is represented) with bus 300, and bus 300 may include any number of interconnection
Bus and bridge, bus 300 will include the one or more processors represented by processor 302 and what memory 304 represented deposits
The various circuits of reservoir link together.Bus 300 can also will peripheral equipment, voltage-stablizer and management circuit etc. it
Various other circuits of class link together, and these are all it is known in the art, therefore, no longer carry out further to it herein
Description.Bus interface 305 provides interface between bus 300 and receiver 301 and transmitter 303.Receiver 301 and transmitter
303 can be the same element, i.e. transceiver, provide the unit for communicating over a transmission medium with various other terminals.Place
It manages device 302 and is responsible for management bus 300 and common processing, and memory 304 can be used for storage processor 302 and execute behaviour
Used data when making.
By one or more embodiment of this specification, this specification has the advantages that or advantage:
Subject description discloses a kind of processing method of electronic insurance policy and servers, in order to solve current electronic insurance policy
Technical problem shared safely, first the processing request of acquisition first terminal transmission and entity object image are not can guarantee, then
The processing request is responded, obtains the Classical correlation object, and carry out to the entity object image and the Classical correlation object
AR virtual reality fusion treatment, the Classical correlation object is hidden into the entity object image.By above-mentioned processing it
Afterwards, since the equipment that entity object has to have AR function can identify hiding Classical correlation object, so can protect
Demonstrate,prove safety of electronic insurance policy during sharing.Further, second terminal is received to scan entity object progress AR
The scan data arrived, and and the Classical correlation object is obtained according to the scan data, be then based on the Classical correlation object and open
Verifying authorization is put to the second terminal.Due to for the entity object for being concealed with Classical correlation object, as long as having AR function
The equipment of energy can scan to obtain the Classical correlation object, so Classical correlation object is not the related data sheet of electronic insurance policy
Body, but the identification object encrypted by the related data of electronic insurance policy.Therefore, second terminal identifies that Classical correlation object can only
Access verifying authorization, it is also necessary to input corresponding password to be verified.Described second can be received for processing server eventually
The password to be verified that end is sent is verified;If being verified, the related data of the electronic insurance policy is just sent to described
Two terminals guarantee the safety of electronic insurance policy with this.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein.
Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system
Structure be obvious.In addition, this specification is also not for any particular programming language.It should be understood that can use each
Kind programming language realizes the content of this specification described herein, and the description done above to language-specific is to disclose
The preferred forms of this specification.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that the reality of this specification
Applying example can practice without these specific details.In some instances, well known method, knot is not been shown in detail
Structure and technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects,
Above in the description of the exemplary embodiment of this specification, each feature of this specification is grouped together into single reality sometimes
It applies in example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required
This specification of protection requires features more more than feature expressly recited in each claim.More precisely, such as
As following claims reflect, inventive aspect is all features less than single embodiment disclosed above.
Therefore, it then follows thus claims of specific embodiment are expressly incorporated in the specific embodiment, wherein each right is wanted
It asks in itself all as the separate embodiments of this specification.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments in this include institute in other embodiments
Including certain features rather than other feature, but the combination of the feature of different embodiment means the model for being in this specification
Within enclosing and form different embodiments.For example, in the following claims, embodiment claimed it is any
One of can in any combination mode come using.
The various component embodiments of this specification can be implemented in hardware, or to transport on one or more processors
Capable software module is realized, or is implemented in a combination thereof.It will be understood by those of skill in the art that can make in practice
It realized with microprocessor or digital signal processor (DSP) according to the gateway of this specification embodiment, proxy server, be
The some or all functions of some or all components in system.This specification is also implemented as being retouched here for executing
The some or all device or device programs (for example, computer program and computer program product) for the method stated.
Such program for realizing this specification can store on a computer-readable medium, or can have one or more letter
Number form.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any
Other forms provide.
This specification is limited it should be noted that above-described embodiment illustrates rather than this specification, and
Those skilled in the art can be designed alternative embodiment without departing from the scope of the appended claims.In claim
In, any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" is not excluded for depositing
In element or step not listed in the claims.Word "a" or "an" located in front of the element do not exclude the presence of it is multiple this
The element of sample.This specification can be by means of including the hardware of several different elements and by means of properly programmed computer
To realize.In the unit claims listing several devices, several in these devices can be by same hard
Part item embodies.The use of word first, second, and third does not indicate any sequence.These words can be explained
For title.