CN112463817A - Mask information processing method and related equipment thereof - Google Patents

Mask information processing method and related equipment thereof Download PDF

Info

Publication number
CN112463817A
CN112463817A CN202011332436.2A CN202011332436A CN112463817A CN 112463817 A CN112463817 A CN 112463817A CN 202011332436 A CN202011332436 A CN 202011332436A CN 112463817 A CN112463817 A CN 112463817A
Authority
CN
China
Prior art keywords
mask
information
identification code
user terminal
target identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011332436.2A
Other languages
Chinese (zh)
Inventor
刘新
黄庆财
王玉平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xinsi Blockchain Technology Co ltd
Original Assignee
Shenzhen Xinsi Blockchain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xinsi Blockchain Technology Co ltd filed Critical Shenzhen Xinsi Blockchain Technology Co ltd
Priority to CN202011332436.2A priority Critical patent/CN112463817A/en
Publication of CN112463817A publication Critical patent/CN112463817A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/219Managing data history or versioning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification

Abstract

The embodiment of the application discloses a mask information processing method and related equipment thereof, which are used for prompting a user whether a mask can be used or not. The method in the embodiment of the application comprises the following steps: acquiring a mask information processing request sent by a user terminal, wherein the mask information processing request comprises an object identification code of a mask, and the object identification code is obtained by analyzing an identification code image associated with the mask; inquiring whether historical user identity information bound by the target identification code exists in a preset mask information database according to the target identification code; generating using prompt information of the mask according to the query result; and sending the use prompt information to the user terminal.

Description

Mask information processing method and related equipment thereof
Technical Field
The embodiment of the application relates to a data processing method, in particular to a mask information processing method and related equipment.
Background
The mask is a medical product which is necessary for hospitals and families and is used as a medical health product for effectively isolating viruses and bacteria in the current society. In epidemic disease epidemic stage, the demand of the mask is rapidly increased, so that a renovated mask like a brand-new mask appears in the market, namely, the used mask carrying virus and bacteria is simply tidied and sold again. The public often mispurchases the renovated mask because the public can not identify the sanitation and safety of the mask, and the virus infection is caused. Therefore, it is very important to identify the hygiene and safety of the mask.
Disclosure of Invention
The embodiment of the application provides a mask information processing method and related equipment thereof, which are used for prompting whether a mask can be used or not to a user.
A first implementation manner of the first aspect of the embodiments of the present application provides a method for processing information of a mask, which is applied to a server, and includes:
acquiring a mask information processing request sent by a user terminal, wherein the mask information processing request comprises an object identification code of a mask, and the object identification code is obtained by analyzing an identification code image associated with the mask;
inquiring whether historical user identity information bound by the target identification code exists in a preset mask information database according to the target identification code;
generating using prompt information of the mask according to the query result;
and sending the use prompt information to the user terminal.
With reference to the first implementation manner of the first aspect of the embodiments of the present application, a second implementation manner of the first aspect of the embodiments of the present application includes:
if the historical user identity information bound with the target identification code is inquired, generating the use prompt information for prompting that the mask is used;
and if the historical user identity information bound with the target identification code is not inquired, generating the use prompt information for prompting that the mask is not used.
With reference to the first implementation manner of the first aspect of the embodiments of the present application, in a third implementation manner of the first aspect of the embodiments of the present application, if the mask information processing request further includes target user identity information, after generating a prompt message according to a query result, the method further includes:
if historical user identity information bound with the target identification code is not inquired in the preset mask information database, establishing a binding relationship between the target user identity information and the target identification code;
recording the binding relationship in the preset mask information database;
and updating the preset mask information database.
With reference to the third implementation manner of the first aspect of the embodiment of the present application, in a fourth implementation manner of the first aspect of the embodiment of the present application, if the target user identity information is complete face information, after the binding relationship is recorded in the preset mask information database, the method further includes:
acquiring an identity verification request sent by the user terminal, wherein the identity verification request carries the target identification code and part of face information wearing the mask;
acquiring complete face information according to the target identification code and the preset mask information database;
synthesizing to-be-verified face information according to the complete face information and the partial face information;
and carrying out face recognition on the face information to be verified to obtain an identity verification result.
And sending the authentication result to the user terminal, wherein the authentication result is used for enabling the user terminal to unlock the application associated with the authentication result.
With reference to the first implementation manner of the first aspect of the embodiments of the present application, in a fifth implementation manner of the first aspect of the embodiments of the present application, after the generating the usage prompt information of the mask according to the query result, the method further includes:
if the historical user identity information bound with the target identification code is not inquired, determining the time of the acquired mask information processing request sent by the user terminal as the use starting time of the mask, and acquiring the standard use duration of the mask;
monitoring whether the mask needs to be replaced or not according to the use starting time and the standard use duration;
and if the user terminal needs to be replaced, sending replacement prompt information to the user terminal so that the user terminal outputs the replacement prompt information.
A first implementation manner of the second aspect of the embodiment of the present application provides a method for processing mask information, which is applied to a user terminal, and includes:
responding to a user instruction to obtain a target identification code from an identification code image of the mask through analysis, and sending a mask information processing request containing target user identity information and the target identification code to a server, so that the server inquires whether historical user identity information bound by the target identification code exists in a preset mask information database according to the target identification code, and generates using prompt information of the mask according to an inquiry result;
receiving the use prompt information returned by the server;
and outputting the use prompt information.
With reference to the first implementation manner of the second aspect of the embodiment of the present application, if the usage prompting message indicates that the mask is not used, the method further includes:
if a verification instruction of a target application is received, acquiring the target identification code and part of face information wearing the mask;
sending an identity verification request to the server, wherein the identity verification request carries the target identification code and part of face information wearing the mask, and the identity verification information is used for enabling the server to return an identity verification result according to the target identification code and the part of face information wearing the mask;
and receiving the identity verification result, and unlocking the target application according to the identity verification result.
A first implementation manner of the third aspect of the embodiments of the present application provides a server, including:
the mask information processing device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a mask information processing request sent by a user terminal, the mask information processing request comprises an object identification code of a mask, and the object identification code is obtained by analyzing an identification code image related to the mask;
the query unit is used for querying whether historical user identity information bound by the target identification code exists in a preset mask information database according to the target identification code;
the generating unit is used for generating using prompt information of the mask according to the query result;
a first sending unit, configured to send the usage hint information to the user terminal.
With reference to the first implementation manner of the third aspect of the embodiments of the present application, in a second implementation manner of the third aspect of the embodiments of the present application, the generating unit includes:
the first generation subunit is used for generating the use prompt information for prompting that the mask is used if the historical user identity information bound with the target identification code is inquired by the inquiry unit;
and the second generation subunit is used for generating the use prompt information for prompting that the mask is not used if the historical user identity information bound with the target identification code is not queried by the query unit.
With reference to the first implementation manner of the third aspect of the embodiments of the present application, the third implementation manner of the third aspect of the embodiments of the present application further includes:
the establishing unit is used for establishing a binding relationship between the target user identity information and the target identification code if the historical user identity information bound with the target identification code is not inquired in the preset mask information database by the inquiring unit;
the recording unit is used for recording the binding relationship in the preset mask information database;
and the updating unit is used for updating the preset mask information database.
With reference to the third implementation manner of the third aspect of the example of the present application, the fourth implementation manner of the third aspect of the example of the present application further includes:
the second acquisition unit is used for acquiring an authentication request sent by the user terminal, wherein the authentication request carries the target identification code and part of face information wearing the mask;
the third acquisition unit is used for acquiring complete face information according to the target identification code and the preset mask information database;
the synthesis unit is used for synthesizing the face information to be verified according to the complete face information and the partial face information;
and the third acquisition unit is used for carrying out face identification on the face information to be verified to acquire an identity verification result.
A second sending unit, configured to send the authentication result to the user terminal, where the authentication result is used to enable the user terminal to unlock an application associated with the authentication result.
With reference to the first implementation manner of the third aspect of the embodiments of the present application, a fifth implementation manner of the third aspect of the embodiments of the present application further includes:
the determining unit is used for determining the acquired time of the mask information processing request sent by the user terminal as the use starting time of the mask and acquiring the standard use duration of the mask if the historical user identity information bound with the target identification code is not inquired by the inquiring unit;
the monitoring unit is used for monitoring whether the mask needs to be replaced or not according to the use starting time and the standard use duration;
and the third sending unit is used for sending a replacement prompt message to the user terminal if the monitoring unit monitors that the replacement is needed, so that the user terminal outputs the replacement prompt message.
A first implementation manner of the fourth aspect of the embodiment of the present application provides a user terminal, including:
the response unit is used for responding to a user instruction to analyze and obtain a target identification code from an identification code image of the mask, and sending a mask information processing request containing target user identity information and the target identification code to a server, so that the server inquires whether historical user identity information bound by the target identification code exists in a preset mask information database according to the target identification code, and generates using prompt information of the mask according to an inquiry result;
the first receiving unit is used for receiving the use prompt information returned by the server;
and the output unit is used for outputting the use prompt information.
In combination with the first implementation manner of the fourth aspect of the embodiments of the present application, the second implementation manner of the fourth aspect of the embodiments of the present application further includes:
the acquisition unit is used for acquiring the target identification code and part of face information wearing the mask if a verification instruction of a target application is received;
the transmitting unit is used for transmitting an identity verification request to the server, wherein the identity verification request carries the target identification code and part of face information wearing the mask, and the identity verification request is used for enabling the server to return an identity verification result according to the target identification code and the part of face information wearing the mask;
and the second receiving unit is used for receiving the authentication result and unlocking the target application according to the authentication result.
In a fifth aspect of embodiments of the present application, a server is provided, including:
the system comprises a central processing unit, a memory, an input/output interface, a wired or wireless network interface and a power supply;
the memory is a transient memory or a persistent memory;
the central processor is configured to communicate with the memory, and the instructions in the memory are executed on the server to perform the method of any one of the preceding first aspects.
In a sixth aspect of the embodiments of the present application, a user terminal is provided, including:
the system comprises a central processing unit, a memory, an input/output interface, a wired or wireless network interface and a power supply;
the memory is a transient memory or a persistent memory;
the central processor is configured to communicate with the memory, and to execute the instruction operations in the memory on the user terminal to perform the method of any one of the second aspects.
An eighth aspect of the embodiments of the present application provides a computer-readable storage medium, in which a program is stored, and when the program is executed by a computer, the computer performs the method according to any one of the first aspect, or performs the method according to any one of the second aspect.
In an eighth aspect of embodiments of the present application, there is provided a computer program product, which when executed on a computer, performs the method of any one of the first aspect or performs the method of any one of the second aspect.
According to the technical scheme, the embodiment of the application has the following advantages:
the server of the technical scheme can acquire the mask information processing request which is sent by the user terminal and contains the target identification code of the mask, then can inquire whether historical user identity information bound by the target identification code exists in a preset mask information database, generates the use prompt information of the mask according to the inquiry result, and finally sends the use prompt information to the user terminal, so that the server can judge the use condition of the mask based on the historical user identity information bound by the target identification code, namely generates the use prompt information of the mask, and the safety supervision of the mask is realized.
Drawings
FIG. 1 is a schematic flow chart illustrating a method for processing information of a mask according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of a portion of a method for processing mask information according to an embodiment of the present application;
FIG. 3 is a schematic flow chart of a portion of a method for processing mask information according to an embodiment of the present application;
FIG. 4 is a schematic flow chart of a portion of a method for processing mask information according to an embodiment of the present application;
FIG. 5 is a schematic flow chart of a portion of a method for processing mask information according to an embodiment of the present application;
FIG. 6 is a schematic structural diagram of a server in an embodiment of the present application;
fig. 7 is a schematic structural diagram of a user terminal in an embodiment of the present application;
FIG. 8 is another schematic diagram of a server in an embodiment of the present application;
fig. 9 is another schematic structural diagram of the user terminal in the embodiment of the present application.
Detailed Description
The embodiment of the application provides a mask information processing method and related equipment thereof, which are used for prompting whether a mask can be used or not to a user.
The mask as a medical hygienic product affects the health and safety of a wearer to some extent, for example, if the wearer wears the used mask by mistake without knowing, the mask carries infectious virus and germs, and the wearer wearing the mask by mistake is infected. At present, means for providing using state information of the mask to a mask wearer is lost in the market, and based on the means, the technical scheme can be used for informing the wearer of the using state information of the mask to be worn and can also be used for restraining the market circulation of the renovated mask to a certain extent based on the informed using state information.
The mask of the technical scheme is provided with the identification code image, such as the image identification code, the bar code and the like, the identification code image and the mask have unique correspondence, and a user can return the use state information of the mask corresponding to the image identification code through the identification code image through the application request server, so that the use condition of the mask can be known. Moreover, after the mask is worn by a wearer, the application needing identity verification can be unlocked based on the face information of the wearer.
Based on the above, please refer to fig. 1, an embodiment of the present application provides a method for processing information of a mask, including:
101. and the user terminal responds to the user instruction to analyze the identification code image of the mask to obtain the target identification code.
Before a user wears the mask, the user triggers a mask information processing request through application of a user terminal, the application can be called mask application, the mask application can scan an identification code image on the mask, such as a two-dimensional code, through a camera of the user terminal, and therefore the target identification code which is only corresponding to the mask is obtained through analysis.
102. The user terminal sends a mask information processing request containing the target identification code and the target user identity information to the server.
After the application of the user terminal acquires the target identification code, the application of the user terminal sends a mask information processing request carrying the target identification code and the identity information of the target user to a corresponding server.
103. The server receives a mask information processing request sent by the user terminal.
The server receives and acquires the mask information processing request sent by the user terminal, and acquires the target identification code from the mask information processing request.
104. And the server inquires whether historical user identity information bound by the target identification code exists in a preset mask information database according to the target identification code.
After the server acquires the target identification code, the server searches whether the target identification code has historical user identity information or not by taking the target identification code as a guide in a preset mask information database in which the binding relationship between other mask identification codes and the historical user identity information is recorded. If the identification code exists, the using state of the mask corresponding to the target identification code is indicated as used; if the target code does not exist, the use state of the mask corresponding to the target code is not used. Therefore, the server can indicate whether the mask corresponding to the target identification code is used or not by inquiring the historical user identity information through the preset mask information database and the target identification code.
It should be noted that the preset mask information database records the identification codes of all masks, the identification codes of all masks correspond to used masks and unused masks, the used masks are already bound with associated historical user identity information, the binding relationship between the used masks and the used masks is already recorded in the preset mask information database, and the unused masks are not recorded with associated target user identity information in the preset mask information database but will be recorded in the future. The historical user identity information or the target user identity information may be user identity information, such as complete face information, fingerprint information, and identification card information of the user, which is not limited herein.
Illustratively, after the server acquires the target identification code, the server queries whether historical user identity information corresponding to the target identification code exists in a preset mask information database by taking the target identification code as a guide, if the historical user identity information exists, the mask corresponding to the target identification code is indicated to be used, and if the historical user identity information does not exist, the mask corresponding to the target identification code is indicated to be unused.
It should be noted that, in the present embodiment, whether the mask corresponding to the target identification code is used or not is represented by whether the historical user identification information exists or not, the used condition of the mask may also be represented by directly using the used or unused mask, and the used condition of the mask may also be represented by using other contents, which is specifically limited herein.
105. And the server generates using prompt information of the mask according to the query result.
If the historical user identity information associated with the target identification code is not inquired in a preset mask information database, the server generates prompt information that the mask corresponding to the target identification code is not used; if the server inquires the historical user identity information associated with the target identification code in a preset mask information database, the server can further perform consistency inquiry on the historical user identity information and the acquired target user identity information, and if the inquiry result is inconsistent, the server indicates that the mask is used by other users, and then prompt information that the mask is used is generated; if the inquiry result is consistent, in order to reduce the frequency of the mask wasting, the server can further acquire the used time length and the preset use time length of the mask, inquire whether the used time length of the mask exceeds the preset use time length, if not, generate the prompt message that the mask can be continuously used, and if so, generate the prompt message that the mask cannot be continuously used.
106. The server sends the use prompt information to the user terminal.
And after the server generates specific use prompt information, the server sends the use prompt information back to the user terminal.
107. The user terminal receives the use prompt information.
After the server sends the use prompt message, the user terminal receives the use prompt message.
108. The user terminal outputs the use prompt information.
And after the user terminal receives the use prompt information, the application of the user terminal outputs the use prompt information. If the use prompt information is used for representing that the mask corresponding to the target identification code is not used, outputting an unused meaning representation; and if the use prompt information is used for representing that the mask corresponding to the target identification code is used, outputting a used meaning representation. The output mode can be interface mode, speech mode, and is not limited here.
For example, after the user terminal receives the use prompt message, an interface of "the mask is used", "the mask is not used", "the mask can be used continuously" or "the mask cannot be used continuously" is output, or a voice of "the mask is used", "the mask is not used", "the mask can be used continuously" or "the mask cannot be used continuously" is output.
In the embodiment, the user terminal sends the target identification code of the mask to the server, the server inquires whether historical user identity information corresponding to the target identification code exists or not through the target identification code, the using prompt information of the mask is generated according to the condition that the historical user identity information exists or not, the using prompt information indicating the using condition of the mask is returned to the user terminal, and finally the user terminal outputs the using prompt information, so that the using state of the mask is monitored, and the sanitation and safety of the mask are provided for a wearer.
Further, referring to fig. 2 based on the embodiment of fig. 1, fig. 2 supplements the description of fig. 1, including:
after the user terminal outputs the usage prompt information of the mask corresponding to the target identification code to indicate that the usage prompt information is not used, the user terminal can form a binding relationship related to the identity information of the target user based on the acquired identity information of the target user related to the wearer and use the binding relationship as a support for unlocking the target application in the later period, and it is pointed out that the binding relationship between the target identification code and the identity information of the target user can also be established in other manners.
201. The user terminal acquires the identity information of the target user and the target identification code.
After the user triggers the mask information processing request through the application of the user terminal, the target user identity information and the target identification code can be acquired. The target user identity information may be face information, fingerprint information or identity card information of a naked whole face of the user.
It should be noted that, the application of the user terminal may obtain the target user identity information and the target identification code at the same time, or may obtain the target user identity information and the target identification code sequentially, which is not limited herein.
202. And the user terminal records the binding relationship between the target user identity information and the target identification code.
And after the user terminal outputs the use prompt information of the mask to indicate that the mask is not used, the user terminal establishes a binding relationship between the target user identity information and the target identification code and stores the binding relationship. The binding relationship is used for unlocking other applications based on the binding relationship locally stored in the user terminal and the target user identity information at the later stage of the user terminal, see fig. 4.
203. And the user terminal sends the target user identity information and the target identification code to the server.
After acquiring the target user identity information and the target identification code, the user terminal sends the target user identity information and the target identification code to the server.
204. And the server establishes a binding relationship between the target user identity information and the target identification code.
After the server receives the target user identity information and the target identification code sent by the user terminal, the binding relationship between the target user identity information and the target identification code is established in a preset mask information database.
It should be noted that the server may also establish a binding relationship between the target identification code and the acquired target user identity information after the historical user identity information is not queried based on the target identification code in the preset mask information database.
205. The server records the binding relationship in a preset mask information database;
and after the server establishes the binding relationship between the target identification code and the identity information of the target user, recording the binding relationship in a preset mask information database.
206. And the server updates a preset mask information database.
The server updates the mask information database in which the binding relationship is recorded, wherein the binding relationship can be used for the server to provide support for unlocking other applications in the later period, see fig. 3.
It should be noted that, in the technical solution described in fig. 2, both the user terminal and the server record the binding relationship between the target user identity information and the target identification code, and the binding relationship may also be recorded only on the server side. It should be noted again that the server may directly establish the binding relationship between the target identification code and the target user identity information after the historical user identity information bound with the target identification code is not queried in the preset mask information database, that is, step 204.
Further, referring to fig. 3 based on the embodiment of fig. 1 and fig. 2, fig. 3 supplements the description of fig. 1 and fig. 2, including:
after the user terminal and the server execute the content shown in fig. 2, that is, after the user terminal and the server record the binding relationship between the target identification code and the target user identity information, the user terminal can acquire part of face information of a wearer wearing the mask in the technical scheme, and unlock other applications except the mask application according to the part of face information.
In this embodiment, the target user identity information is used as the complete face information for description. It can be understood that, at present, the user terminal is installed in many applications, the user authentication is required in the using process, one of the authentication modes is user face recognition, the user needs to take off the mask to complete the authentication under the condition of wearing the mask, and the user operation is inconvenient. In order to reduce the tedious operation of a user in the process of applying face recognition verification, the application provides the following technical scheme.
301. And the user terminal sends an identity verification request carrying the target identification code and part of face information of the mask to the server.
After a user triggers a target application at a user terminal to perform face recognition identity verification, the user terminal receives a verification instruction of the target application, then obtains partial face information of the user wearing the mask of the technical scheme through a camera, and triggers the user terminal to send an identity verification request to a server based on the verification instruction, wherein the identity verification request comprises a target identification code and partial face information. The target identification code is obtained by analyzing the identification code image of the mask with the technical scheme based on face recognition. The target application may be an application such as WeChat, QQ, etc., and is not limited herein.
302. The server receives an authentication request sent by a target application of the user terminal.
After the user terminal sends out the identity authentication request, the server receives the identity authentication request.
303. And the server acquires complete face information according to a preset mask information database and the target identification code.
After the server receives the identity authentication request, the target identification code is obtained from the identity authentication request, and the target user identity information, namely the complete face information, associated with the target identification code is obtained from a preset mask information database by taking the target identification code as a guide.
304. And the server synthesizes the information of the face to be verified according to the complete face information and the partial face information.
And after the server acquires the complete face information and the partial face information from the identity authentication request, synthesizing the complete face information and the partial face information to obtain the face information to be authenticated.
It should be noted that the complete face information contains unlocking information formed by two eyes, two mouth corners and a nose of a user, while part of the face information only contains incomplete unlocking information of the two eyes because the nose and the two mouth corners are covered by the mask, so that the face information to be verified is obtained by synthesizing the two mouth corners and the nose in the complete face information with the two eyes of the part of the face information, and finally the face information to be verified is used as a face recognition object.
305. And the server sends the face information to be verified to the user terminal.
And after the server synthesizes the face information to be verified, sending the face information to be verified to the user terminal.
306. And the user terminal receives the face information to be verified returned by the server.
And the user terminal receives the face information to be verified sent by the server.
307. And the user terminal sends the face information to be verified to the application server.
After the user terminal receives the face information to be verified sent by the server, the user terminal sends the face information to be verified to the application server corresponding to the target application.
308. And the application server receives the face information to be verified and acquires an identity verification result according to the face information to be verified.
After the user terminal sends the face information to be verified to the application server, the application server receives the face information to be verified, and carries out face recognition on the face information to be verified to obtain an identity verification result.
After the application server obtains the authentication result, the application server returns the authentication result to the target application of the user terminal, so that the target application can judge whether to unlock the target application according to the authentication result.
For example, if the target application of the user terminal obtains the identity verification result that is approved, the target application is unlocked; and if the target application of the user terminal obtains the identity verification result that the verification fails, the target application maintains locking.
It should be noted that, alternatively, in the foregoing steps 305 to 308, the server sends the face information to be verified to the application server corresponding to the target application, so that the application server performs face recognition on the face information to be verified to obtain an authentication result, and finally, the application server returns the authentication result to the target application of the user terminal. The authentication process can be executed in various functional scenarios of the target application, including but not limited to login, payment, unlocking, information query, and the like, as long as the scenario requires obtaining the face image for authentication.
In the embodiment, when the user terminal triggers the target application of the user terminal to perform identity verification, the user terminal can directly achieve the purpose of unlocking or maintaining the locking of the target application through part of face information, so that the complicated operation that the face recognition identity verification can be performed only by taking off the mask when the mask is worn is avoided, and the situation that the virus is infected due to the fact that the mask is taken off is also avoided to a certain extent.
As mentioned above, the binding relationship between the target user identity information and the target identification code of the mask may be recorded in the server or in the user terminal, so that the step of stitching and synthesizing the complete face image may be completed by the server or the user terminal when the target user identity information is the face information. Referring to fig. 4, the embodiment also describes that the target user identity information is taken as complete face information, and the user terminal provides an identity verification result of the target application, including:
401. and if a verification instruction of the target application is received, the user terminal acquires the target identification code and part of face information of the worn mask.
After a user triggers the target application at the user terminal to perform face recognition identity verification, the user terminal receives a verification instruction of the target application, then obtains partial face information of the user wearing the mask of the technical scheme through the camera, and obtains a target identification code by analyzing an identification code image of the mask.
402. And acquiring complete face information corresponding to the target identification code according to the binding relationship.
After the user terminal acquires the target identification code and part of the face information, the user terminal acquires the complete face information corresponding to the target identification code according to the stored binding relationship by taking the target identification code as a guide.
403. And synthesizing to-be-verified face information according to the complete face information and the partial face information.
This step is similar to step 304, and will not be described herein again.
404. And carrying out face recognition on the face information to be verified to obtain an identity verification result.
The user terminal returns the face information to be verified to the target application after obtaining the face information to be verified, then the face information to be verified is recognized by the face of the target application, so that an identity verification result is obtained, and whether the user terminal unlocks the user terminal according to the identity verification result, namely the target application is judged.
Further, referring to fig. 5 based on the embodiments of fig. 1, fig. 2 and fig. 3, the embodiment performs supplementary description on fig. 1, fig. 2 and fig. 3, including:
the mask is used as a medical article and has a service life of a certain duration, virus and germs can be effectively isolated by the mask within the service life, the isolation effect of the mask can be obviously reduced when the specified service life is exceeded, and on the basis, the description of reminding is carried out on the service life of the mask after historical user identity information bound with the target identification code is not inquired by the server.
501. If the server does not inquire the historical user identity information bound with the target identification code, the acquired time of the mask information processing request sent by the user terminal is determined as the using starting time of the mask, and the standard using time of the mask is acquired.
After the server does not inquire historical user identity information bound by the target identification code, determining the time of the acquired mask information processing request sent by the user terminal as the using starting time of the mask worn by the user, and acquiring the standard using time of the mask, wherein the standard using time corresponding to the mask can be acquired by analyzing and acquiring the identification code image of the mask by the user terminal and then sending the acquired standard using time to the server, and can also be acquired from the server.
502. The server monitors whether the mask needs to be replaced or not according to the use starting time and the standard use duration.
After the server acquires the use start time and the standard use duration, the server may determine a use end time based on the use start time and the standard use duration, and use the use end time as a monitoring mask to determine whether the mask needs to be replaced. Also, the server can set a timer according to the standard using time length, and the timer is reset to zero to monitor whether the mask needs to be replaced.
503. And the server sends the replacement prompt information to the user terminal.
When the server monitors that the mask needs to be replaced, the server sends replacement prompt information to the user terminal, and the replacement prompt information indicates that the mask needs to be replaced.
504. And the user terminal receives and outputs the replacement prompt information.
And after the user terminal receives the replacement prompt information, the user terminal outputs the replacement prompt information for prompting the user to replace the mask.
Referring to fig. 6, the present embodiment is a structural diagram of a server, including:
an acquisition unit 601 configured to acquire a mask information processing request transmitted by a user terminal, the mask information processing request including an object identification code of a mask, the object identification code being obtained by parsing an identification code image associated with the mask;
the query unit 602 is configured to query whether historical user identity information bound by the target identification code exists in a preset mask information database according to the target identification code;
a generating unit 603 configured to generate usage prompt information of the mask according to the query result;
a first sending unit 604, configured to send the usage hint information to the user terminal.
In one implementation, the generating unit 603 includes:
the first generation subunit is used for generating the use prompt information for prompting that the mask is used if the historical user identity information bound with the target identification code is inquired by the inquiry unit;
and the second generation subunit is used for generating the use prompt information for prompting that the mask is not used if the historical user identity information bound with the target identification code is not queried by the query unit.
In one implementation, the server further includes:
the establishing unit is used for establishing a binding relationship between the target user identity information and the target identification code if the historical user identity information bound with the target identification code is not inquired in the preset mask information database by the inquiring unit;
the recording unit is used for recording the binding relationship in the preset mask information database;
and the updating unit is used for updating the preset mask information database.
In one implementation, the server further includes:
the second acquisition unit is used for acquiring an authentication request sent by the user terminal, wherein the authentication request carries the target identification code and part of face information wearing the mask;
the third acquisition unit is used for acquiring complete face information according to the target identification code and the preset mask information database;
the synthesis unit is used for synthesizing the face information to be verified according to the complete face information and the partial face information;
and the third acquisition unit is used for carrying out face identification on the face information to be verified to acquire an identity verification result.
A second sending unit, configured to send the authentication result to the user terminal, where the authentication result is used to enable the user terminal to unlock an application associated with the authentication result.
In one implementation, the server further includes:
the determining unit is used for determining the acquired time of the mask information processing request sent by the user terminal as the use starting time of the mask and acquiring the standard use duration of the mask if the historical user identity information bound with the target identification code is not inquired by the inquiring unit;
the monitoring unit is used for monitoring whether the mask needs to be replaced or not according to the use starting time and the standard use duration;
and the third sending unit is used for sending a replacement prompt message to the user terminal if the monitoring unit monitors that the replacement is needed, so that the user terminal outputs the replacement prompt message.
Referring to fig. 7, the present embodiment is a structure diagram of a ue, including:
a response unit 701, configured to analyze an identification code image of a mask in response to a user instruction to obtain a target identification code, and send a mask information processing request including target user identity information and the target identification code to a server, so that the server queries whether there is historical user identity information bound by the target identification code in a preset mask information database according to the target identification code, and generates usage prompt information of the mask according to a query result;
a first receiving unit 702, configured to receive the usage prompting information returned by the server;
an output unit 703 is configured to output the usage hint information.
In one implementation manner, the user terminal further includes:
the acquisition unit is used for acquiring the target identification code and part of face information wearing the mask if a verification instruction of a target application is received;
the transmitting unit is used for transmitting an identity verification request to the server, wherein the identity verification request carries the target identification code and part of face information wearing the mask, and the identity verification request is used for enabling the server to return an identity verification result according to the target identification code and the part of face information wearing the mask;
and the second receiving unit is used for receiving the authentication result and unlocking the target application according to the authentication result.
Fig. 8 is a schematic structural diagram of a server 801 according to an embodiment of the present application, where the server may include one or more Central Processing Units (CPUs) 802 and a memory 804, and one or more applications or data are stored in the memory 804.
The memory 804 may be volatile storage or persistent storage, among others. The program stored in the memory 804 may include one or more modules, each of which may include a sequence of instructions operating on a server. Still further, the central processor 802 may be disposed in communication with the memory 804, and the series of instruction operations in the memory 804 may be executed on the server 801.
The server 801 may also include one or more power supplies 803, one or more wired or wireless network interfaces 805, one or more input-output interfaces 806, and/or one or more operating systems, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
The server 801 may perform the operations in the embodiments shown in fig. 1, fig. 2, fig. 3, or fig. 5, which are not described herein again in detail.
Fig. 9 is a schematic structural diagram of a user terminal according to an embodiment of the present application, where the user terminal 901 may include one or more Central Processing Units (CPUs) 902 and a memory 904, and one or more applications or data are stored in the memory 904.
Memory 904 may be volatile storage or persistent storage, among others. The program stored in the memory 904 may include one or more modules, each of which may include a sequence of instructions operating on a user terminal. Still further, the central processor 902 may be arranged in communication with the memory 904 for executing a sequence of instruction operations in the memory 904 on the user terminal 901.
The user terminal 901 may also include one or more power supplies 903, one or more wired or wireless network interfaces 905, one or more input-output interfaces 906, and/or one or more operating systems, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
The user terminal 901 may perform the operations in the embodiments shown in fig. 1, fig. 2, fig. 3, fig. 4, or fig. 5, which are not described herein again in detail.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like.

Claims (10)

1. A mask information processing method applied to a server includes:
acquiring a mask information processing request sent by a user terminal, wherein the mask information processing request comprises an object identification code of a mask, and the object identification code is obtained by analyzing an identification code image associated with the mask;
inquiring whether historical user identity information bound by the target identification code exists in a preset mask information database according to the target identification code;
generating using prompt information of the mask according to the query result;
and sending the use prompt information to the user terminal.
2. The mask information processing method according to claim 1, wherein the generating of the use prompt information of the mask according to the inquiry result includes:
if the historical user identity information bound with the target identification code is inquired, generating the use prompt information for prompting that the mask is used;
and if the historical user identity information bound with the target identification code is not inquired, generating the use prompt information for prompting that the mask is not used.
3. The mask information processing method according to claim 1, wherein the mask information processing request further includes target user identification information, and after the generating of the prompt information according to the inquiry result, the method further includes:
if historical user identity information bound with the target identification code is not inquired in the preset mask information database, establishing a binding relationship between the target user identity information and the target identification code;
recording the binding relationship in the preset mask information database;
and updating the preset mask information database.
4. The mask information processing method according to claim 3, wherein if the target user identification information is complete face information, after recording the binding relationship in the preset mask information database, the method further comprises:
acquiring an identity verification request sent by the user terminal, wherein the identity verification request carries the target identification code and part of face information wearing the mask;
acquiring complete face information according to the target identification code and the preset mask information database;
synthesizing to-be-verified face information according to the complete face information and the partial face information;
and carrying out face recognition on the face information to be verified to obtain an identity verification result.
And sending the authentication result to the user terminal, wherein the authentication result is used for enabling the user terminal to unlock the application associated with the authentication result.
5. The mask information processing method according to claim 1, wherein after the generation of the use prompt information of the mask according to the inquiry result, the method further comprises:
if the historical user identity information bound with the target identification code is not inquired, determining the acquired time of the mask information processing request sent by the user terminal as the use starting time of the mask, and acquiring the standard use duration of the mask;
monitoring whether the mask needs to be replaced or not according to the use starting time and the standard use duration;
and if the user terminal needs to be replaced, sending replacement prompt information to the user terminal so that the user terminal outputs the replacement prompt information.
6. A mask information processing method applied to a user terminal includes:
responding to a user instruction to obtain a target identification code from an identification code image of the mask through analysis, and sending a mask information processing request containing target user identity information and the target identification code to a server, so that the server inquires whether historical user identity information bound by the target identification code exists in a preset mask information database according to the target identification code, and generates using prompt information of the mask according to an inquiry result;
receiving the use prompt information returned by the server;
and outputting the use prompt information.
7. The mask information processing method according to claim 6, wherein if the use notice information indicates that the mask is not used, the method further comprises:
if a verification instruction of a target application is received, acquiring the target identification code and part of face information wearing the mask;
sending an identity verification request to the server, wherein the identity verification request carries the target identification code and part of face information wearing the mask, and the identity verification request is used for enabling the server to return an identity verification result according to the target identification code and the part of face information wearing the mask;
and receiving the identity verification result, and unlocking the target application according to the identity verification result.
8. A server, comprising:
the system comprises a central processing unit, a memory, an input/output interface, a wired or wireless network interface and a power supply;
the memory is a transient memory or a persistent memory;
the central processor is configured to communicate with the memory, the instructions in the memory being executable on the server to perform the method of any one of claims 1 to 5.
9. A user terminal, comprising:
the system comprises a central processing unit, a memory, an input/output interface, a wired or wireless network interface and a power supply;
the memory is a transient memory or a persistent memory;
the central processor is configured to communicate with the memory, the instructions in the memory being executable on the server to perform the method of any of claims 6 to 7.
10. A computer-readable storage medium comprising instructions that, when executed on a computer, cause the computer to perform the method of any one of claims 1 to 5, or perform the method of claim 6 or 7.
CN202011332436.2A 2020-11-24 2020-11-24 Mask information processing method and related equipment thereof Pending CN112463817A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011332436.2A CN112463817A (en) 2020-11-24 2020-11-24 Mask information processing method and related equipment thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011332436.2A CN112463817A (en) 2020-11-24 2020-11-24 Mask information processing method and related equipment thereof

Publications (1)

Publication Number Publication Date
CN112463817A true CN112463817A (en) 2021-03-09

Family

ID=74799784

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011332436.2A Pending CN112463817A (en) 2020-11-24 2020-11-24 Mask information processing method and related equipment thereof

Country Status (1)

Country Link
CN (1) CN112463817A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101589407A (en) * 2005-01-21 2009-11-25 证实公司 Product authenticity validation system
CN103237051A (en) * 2013-03-22 2013-08-07 深圳市九洲电器有限公司 Product information providing system, product information providing method, server and terminal
CN106295741A (en) * 2016-08-09 2017-01-04 中国科学院计算机网络信息中心 Method for anti-counterfeit and system
CN106570711A (en) * 2016-11-07 2017-04-19 广州中国科学院计算机网络信息中心 Authenticity analysis method and system
CN110059782A (en) * 2019-04-29 2019-07-26 上海诚明融鑫科技有限公司 A kind of article service condition monitoring device, system and method
CN110609970A (en) * 2019-08-29 2019-12-24 北京大米科技有限公司 User identity identification method and device, storage medium and electronic equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101589407A (en) * 2005-01-21 2009-11-25 证实公司 Product authenticity validation system
CN103237051A (en) * 2013-03-22 2013-08-07 深圳市九洲电器有限公司 Product information providing system, product information providing method, server and terminal
CN106295741A (en) * 2016-08-09 2017-01-04 中国科学院计算机网络信息中心 Method for anti-counterfeit and system
CN106570711A (en) * 2016-11-07 2017-04-19 广州中国科学院计算机网络信息中心 Authenticity analysis method and system
CN110059782A (en) * 2019-04-29 2019-07-26 上海诚明融鑫科技有限公司 A kind of article service condition monitoring device, system and method
CN110609970A (en) * 2019-08-29 2019-12-24 北京大米科技有限公司 User identity identification method and device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
JP7190238B2 (en) Delivery and data sharing of clinical data in equipment management
CN113452755B (en) Medical equipment data processing method and device and electronic equipment
JP6417972B2 (en) Medical image classification system, medical image classification device, medical image classification method and program
US20110209214A1 (en) Method and system for providing recording device privileges through biometric assessment
CN111460329A (en) Information query method, system, terminal and computer storage medium
KR101989474B1 (en) System and method for transmitting electronic prescription based on cloud computing
CN106453622B (en) Pet disease information method for pushing, apparatus and system
CN109961827A (en) A kind of generation method of health account information
KR101611024B1 (en) Method and system for managing tooth information service
CN113705506B (en) Nucleic acid detection method, apparatus, device, and computer-readable storage medium
JP3845380B2 (en) Nursing support system, nursing support method, and nursing support program
CN112463817A (en) Mask information processing method and related equipment thereof
CN112102965A (en) Medical information management system based on clinical assistance and regional collaboration
CN110706765A (en) Newborn health card handling method and system
WO2020087792A1 (en) Artificial-intelligence disease analysis method and apparatus, storage medium, and computer device
JP6942251B2 (en) Medical support device, information processing device and medical support method
JP2018185560A (en) PC support system, information display program and information reading transmission program
CN106859597B (en) Remote monitoring method and device
CN109545304A (en) Medical care method, apparatus, equipment and storage medium based on Intelligent bracelet
CN111492673B (en) Method for transmitting processing states and hearing matching application system
CN114668581A (en) Laser attenuation stability monitoring method and device
JP6607543B1 (en) Medical support system
CN112992306A (en) Method and system for improving efficiency of acquiring medical records of discharge hospital
CN114491459B (en) Urological laboratory test information transmission system
KR20010104084A (en) Method for diagnosing and treating service through remote measuring pulse on internet

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination