CN112560815B - File calling method, device, medium and electronic equipment - Google Patents

File calling method, device, medium and electronic equipment Download PDF

Info

Publication number
CN112560815B
CN112560815B CN202110192827.7A CN202110192827A CN112560815B CN 112560815 B CN112560815 B CN 112560815B CN 202110192827 A CN202110192827 A CN 202110192827A CN 112560815 B CN112560815 B CN 112560815B
Authority
CN
China
Prior art keywords
user
file
calling
online
initiator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110192827.7A
Other languages
Chinese (zh)
Other versions
CN112560815A (en
Inventor
侯战斌
马靖宇
张渠波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jutongda Technology Co ltd
Original Assignee
Beijing Jutongda Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jutongda Technology Co ltd filed Critical Beijing Jutongda Technology Co ltd
Priority to CN202110192827.7A priority Critical patent/CN112560815B/en
Publication of CN112560815A publication Critical patent/CN112560815A/en
Application granted granted Critical
Publication of CN112560815B publication Critical patent/CN112560815B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • AHUMAN NECESSITIES
    • A47FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
    • A47BTABLES; DESKS; OFFICE FURNITURE; CABINETS; DRAWERS; GENERAL DETAILS OF FURNITURE
    • A47B63/00Cabinets, racks or shelf units, specially adapted for storing books, documents, forms, or the like

Abstract

The disclosure relates to a file calling method, a file calling device, a file calling medium and electronic equipment. The method comprises the following steps: responding to a paper file calling request of a first user, and acquiring state information of a target paper file to be called; if the on-line calling application is passed through by the state information indication line, acquiring biological characteristic information of the first user through the terminal; determining whether the first user is an initiator of the online calling application or not according to the biological characteristic information of the first user; and if the first user is the initiator of the online calling application, controlling the file cabinet to be opened. Therefore, the user can automatically call the files, the operation is convenient and fast, and the workload of a file manager is reduced. In addition, whether the first user is the initiator of the online calling application is authenticated, so that the file calling by the faking name is avoided, the possibility that the file information is illegally stolen and leaked is effectively reduced, and the safety of the file is improved. In addition, the collection of the biological characteristic information of the first user can be realized through the original components of the terminal, and the archive management cost is reduced.

Description

File calling method, device, medium and electronic equipment
Technical Field
The present disclosure relates to the field of archive management, and in particular, to an archive calling method, apparatus, medium, and electronic device.
Background
At present, daily management activities of most enterprises and public institutions are not required to manage various files with complexity, large volume and disordered time sequence, and the files are used as internal information resources and are utilized by members in a fair, orderly, compliant and traceable manner. When the existing file is called, the identity of a user is mostly checked and registered by an administrator and then loaned, and the user returns to register and enters the file, so that the phenomenon of impersonation easily exists in the borrowing mode, so that the leakage or loss of data is caused, and the workload of the administrator is increased.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides a file calling method, apparatus, medium, and electronic device.
In order to achieve the above object, in a first aspect, the present disclosure provides a file calling method applied to a file calling application running on a terminal, including:
responding to a paper file calling request of a first user, and acquiring state information of a target paper file to be called, wherein the paper file calling request comprises an identification code of a file cabinet scanned by the terminal, the target paper file is a file stored in the file cabinet, and the state information is used for representing whether an online calling application initiated by a file calling application and carried out in advance aiming at the target paper file passes or not;
if the state information indicates that the online calling application passes, acquiring biological characteristic information of the first user through the terminal;
determining whether the first user is an initiator of the online calling application according to the biological characteristic information of the first user, wherein the initiator of the online calling application is a login user of the archive calling application when the online calling application is initiated;
and if the first user is the initiator of the online calling application, controlling the file cabinet to be opened.
Optionally, the determining, according to the biometric information of the first user, whether the first user is an initiator of the online invocation application includes:
judging whether the biological characteristic information of the first user is matched with the biological characteristic information of the initiator of the online calling application;
and if the biological characteristic information of the first user is matched with the biological characteristic information of the initiator of the online calling application, determining that the first user is the initiator of the online calling application.
Optionally, the determining, according to the biometric information of the first user, whether the first user is an initiator of the online invocation application further includes:
if the biological characteristic information of the first user is not matched with the biological characteristic information of the initiator of the online calling application, judging whether the acquisition frequency of the biological characteristic information of the first user reaches a preset frequency threshold value;
if the collection times do not reach the preset times threshold value, the terminal collects the biological feature information of the first user again, and then the step of judging whether the biological feature information of the first user is matched with the biological feature information of the initiator of the online calling application is executed;
and if the acquisition times reach the preset times threshold value, determining that the first user is not the initiator of the online calling application.
Optionally, the method further comprises:
acquiring biological characteristic information of a second user through the terminal in response to an electronic file calling request for calling a target electronic file, wherein the second user is a current operator of the terminal;
determining whether the second user is a current login user of the file calling application according to the biological characteristic information of the second user;
if the second user is the current login user, judging whether the second user has the calling authority of the target electronic file;
and if the second user has the calling authority, calling the target electronic file for the second user to look up.
Optionally, the determining whether the second user has the right to invoke the target electronic profile includes:
acquiring the role information of the current login user;
and determining whether the second user has the calling authority to the target electronic file or not according to the role information.
Optionally, before the step of invoking the target electronic archive, the method further includes:
acquiring a historical archive borrowing and returning record of the current login user;
judging whether the current login user has files which are not returned due to the overdue according to the historical file borrowing and returning records;
if the second user has the calling authority, calling the target electronic file, including:
and if the second user has the calling authority and the current login user does not have the file which is not expired and returned, calling the target electronic file.
Optionally, the method further comprises:
if the state information indicates that the online calling application does not pass or the first user is not the initiator of the online calling application, generating first reminding information for representing the calling failure of the target paper file; and/or
And if the second user is not the current login user or the second user does not have the calling authority, generating second reminding information for representing the calling failure of the target electronic file.
In a second aspect, the present disclosure provides a device for invoking a file, applied to an application for invoking a file running on a terminal, including:
the acquisition module is used for responding to a paper file calling request of a first user and acquiring state information of a target paper file to be called, wherein the paper file calling request comprises an identification code of a file cabinet scanned by the terminal, the target paper file is a file stored in the file cabinet, and the state information is used for representing whether an online calling application initiated by the file calling application and carried out in advance aiming at the target paper file passes or not;
the acquisition module is used for acquiring the biological characteristic information of the first user through the terminal if the state information acquired by the acquisition module indicates that the online calling application passes;
the determining module is used for determining whether the first user is an initiator of the online calling application according to the biological characteristic information of the first user acquired by the acquiring module, wherein the initiator of the online calling application is a login user of the archive calling application when the online calling application is initiated;
and the control module is used for controlling the file cabinet to be opened if the determining module determines that the first user is the initiator of the online calling application.
In a third aspect, the present disclosure provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method provided by the first aspect of the present disclosure.
In a fourth aspect, the present disclosure provides an electronic device comprising:
a memory having a computer program stored thereon;
a processor for executing the computer program in the memory to implement the steps of the method provided by the first aspect of the present disclosure.
In the technical scheme, after a first user scans an identification code of a file cabinet through a terminal, a file calling application on the terminal receives a scanning result and generates a paper file calling request containing the identification code; then, responding to the paper file calling request, and determining whether an online calling application which is performed in advance for the target paper file to be called passes; if the first user is the online calling application, acquiring first biological characteristic information of the first user by using the terminal, and judging whether the first user is an initiator of the online calling application according to the first biological characteristic information; and if the first user is the initiator of the online calling application, controlling the file cabinet to be opened. Therefore, the user can automatically call the files, the operation is convenient and fast, and the workload of a file manager is reduced. In addition, when the paper archives are called, whether the first user is the initiator of the online calling application or not is authenticated, the problem of calling the archives by impersonation is well avoided, the possibility that the information of the archives is illegally stolen and leaked is effectively reduced, and the safety of the archives is effectively improved. In addition, can realize the collection of first user's biological characteristic information through the original part of terminal (for example, fingerprint collection module, camera etc.), and need not additionally to set up corresponding biological characteristic information acquisition device on the terminal, also need not to install corresponding biological characteristic information acquisition device on the filing cabinet, reduced archives administrative cost to, can guarantee biological characteristic information acquisition's accuracy and convenience, promoted user experience.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure without limiting the disclosure. In the drawings:
FIG. 1 is a flow diagram illustrating a dossier invocation method in accordance with an exemplary embodiment.
FIG. 2 is a flow diagram illustrating a method of determining whether a first user is an originator of an online invocation application according to an exemplary embodiment.
Fig. 3 is a flow chart illustrating a method of determining whether a first user is an originator of an online invocation application according to another exemplary embodiment.
FIG. 4 is a flow diagram illustrating a dossier invocation method according to another exemplary embodiment.
FIG. 5 is a block diagram illustrating a dossier invocation device according to an exemplary embodiment.
FIG. 6 is a block diagram illustrating an electronic device in accordance with an example embodiment.
Detailed Description
The following detailed description of specific embodiments of the present disclosure is provided in connection with the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present disclosure, are given by way of illustration and explanation only, not limitation.
An implementation scenario of the present disclosure is first introduced. A plurality of file cabinets can be arranged in the archive management center, wherein a paper archive can be stored in each file cabinet, and identification codes (for example, two-dimensional codes, bar codes, etc.) for uniquely identifying the file cabinet (that is, uniquely identifying the archive stored in the file cabinet, wherein the identification codes correspond to the archive stored in the file cabinet one by one) are provided on the outer surface of the file cabinet. Therefore, when a user needs to call a certain paper file, the user can log in a file calling application on a terminal such as a smart phone, a tablet personal computer and the like in a biological characteristic verification (such as face verification, fingerprint verification and the like), an account password or a combination of the account password and the biological characteristic verification, and then the user initiates an online calling application aiming at the target paper file to be called through the file calling application; after that, the administrator may approve the request to determine whether to pass the online call request, or determine whether the user has a call authority according to the role information of the user, so as to determine whether to pass the online call request, or determine whether to pass the online call request in a manner of combining the role information of the user and the approval of the administrator (for example, first, determine whether the user has a call authority according to the role information of the user, and if it is determined that the user has a call authority, send an approval message to the administrator, so as to be checked by the administrator for the second time). If the online calling application is passed through, the position information of the file cabinet for storing the target paper file is fed back to the user, so that the user can directly find the file cabinet for storing the target paper file according to the position information, and then the user can scan the identification code on the outer surface of the file cabinet through image acquisition devices such as a camera on the terminal so as to independently call the target paper file stored in the file cabinet.
The following is a detailed description of a specific embodiment of the user autonomously invoking a target paper archive stored in the archive cabinet. Fig. 1 is a flowchart illustrating a profile calling method applied to a profile calling application running on a terminal according to an exemplary embodiment. As shown in FIG. 1, the method includes S101-S106.
In S101, in response to a paper archive calling request of a first user, state information of a target paper archive to be called is acquired.
In this disclosure, the paper archive calling request includes an identification code of the archive cabinet scanned by the terminal, wherein the identification code may be, for example, a two-dimensional code, a bar code, or the like, the target paper archive is an archive stored in the archive cabinet, and the status information is used to characterize whether an online calling application initiated by the archive calling application and performed in advance for the target paper archive passes or not.
In addition, the state information of the target paper file to be called can be acquired by communicating with a server of the file management center, wherein the server stores the state information of each file in the file management center.
In S102, it is determined whether the status information indicates an online call application pass.
If the state information of the target paper file indicates that the online calling application passes, S103 is executed; if the status information of the target paper file indicates that the online call application call does not pass, S106 is executed.
In S103, biometric information of the first user is acquired by the terminal.
In the present disclosure, the biometric information may be one of fingerprint feature information, iris feature information, face feature information, and voiceprint feature information. The biometric information may be face feature information, and the biometric information of the first user may be acquired by an image acquisition device such as a camera on the terminal.
In S104, it is determined whether the first user is an initiator of the online call application according to the biometric information of the first user.
In the present disclosure, the initiator of the online call application is a login user of the archive call application when initiating the online call application. If the first user is the initiator of the online calling application, it indicates that the user currently calling the target paper file (i.e., the first user) and the initiator of the online calling application are the same person, and at this time, the file cabinet for storing the target paper file (i.e., the file cabinet corresponding to the identification code scanned by the terminal) may be controlled to open, i.e., S105 is executed; if the first user is not the initiator of the online calling application, it indicates that the user currently calling the target paper archive (i.e., the first user) is not the same person as the initiator of the online calling application, and at this time, in order to avoid the problem of calling the archive by impersonation, the first user may be rejected from calling the target paper archive, and first reminding information for representing that the target paper archive is failed to be called may be generated, i.e., S106 is performed.
In S105, the filing cabinet is controlled to open.
In S106, first reminding information for representing the calling failure of the target paper file is generated.
In the disclosure, the first reminding information may be a voice reminding message or a text reminding message, so that the terminal can remind that the target paper file fails to be called in a mode of voice broadcasting or pop-up window on a terminal screen.
In the technical scheme, after a first user scans an identification code of a file cabinet through a terminal, a file calling application on the terminal receives a scanning result and generates a paper file calling request containing the identification code; then, responding to the paper file calling request, and determining whether an online calling application which is performed in advance for the target paper file to be called passes; if the first user is the online calling application, acquiring first biological characteristic information of the first user by using the terminal, and judging whether the first user is an initiator of the online calling application according to the first biological characteristic information; and if the first user is the initiator of the online calling application, controlling the file cabinet to be opened. Therefore, the user can automatically call the files, the operation is convenient and fast, and the workload of a file manager is reduced. In addition, when the paper archives are called, whether the first user is the initiator of the online calling application or not is authenticated, the problem of calling the archives by impersonation is well avoided, the possibility that the information of the archives is illegally stolen and leaked is effectively reduced, and the safety of the archives is effectively improved. In addition, can realize the collection of first user's biological characteristic information through the original part of terminal (for example, fingerprint collection module, camera etc.), and need not additionally to set up corresponding biological characteristic information acquisition device on the terminal, also need not to install corresponding biological characteristic information acquisition device on the filing cabinet, reduced archives administrative cost to, can guarantee biological characteristic information acquisition's accuracy and convenience, promoted user experience.
The following describes in detail a specific embodiment of determining whether the first user is the initiator of the online invocation application according to the biometric information of the first user in S104. Specifically, the method can be realized through S1041-S1043 shown in FIG. 2.
In S1041, it is determined whether the biometric information of the first user matches the biometric information of the initiator of the online call application.
In the present disclosure, the server further stores information such as a user name of each login user and biometric information of the login user. In this way, the terminal can acquire the biometric information of the initiator of the online calling application for the target paper file in a mode of communicating with the server of the archive management center.
If the biometric information of the first user matches the biometric information of the initiator of the online call application, S1042 is executed; if the biometric information of the first user is not matched with the biometric information of the initiator of the online call application, S1043 is executed.
In S1042, it is determined that the first user is an initiator of the online invocation application.
In S1043, it is determined that the first user is not the originator of the online invocation application.
In addition, when the biometric information of the first user collected by the terminal is inaccurate or incomplete, it may be misjudged that the biometric information of the first user is not matched with the biometric information of the initiator of the online calling application, so that the calling experience of the user is affected. For this reason, as shown in fig. 3, the above S104 further includes S1044 and S1045, so as to avoid misjudgment caused by inaccuracy or incompleteness of the biometric information of the first user acquired by the terminal.
In S1044, it is determined whether the collection frequency of the biometric information of the first user reaches a preset frequency threshold.
If it is determined in S1041 that the biometric information of the first user does not match the biometric information of the initiator of the online call application, S1044 is executed to determine whether the collection frequency of the biometric information of the first user reaches a preset frequency threshold (e.g., 3 times). If the collection frequency of the biological characteristic information of the first user does not reach a preset frequency threshold value, executing S1045; and if the collection frequency of the biological characteristic information of the first user reaches a preset frequency threshold value, executing S1043.
In S1045, the biometric information of the first user is reacquired by the terminal.
After the biometric information of the first user is collected again through the terminal, the process may return to S1041 to continue execution.
In addition, when a user needs to return a target paper file, a return process can be initiated in advance through a file calling application, wherein if the number of pages of the file is missing or modified, remarking can be performed on the initiated return process, the return process is sent to an administrator after being approved, so that the administrator can check whether the file is damaged or not, the number of pages of the file is missing, the file is modified and the like, and the target paper is put into a fixed file cabinet (namely, a file cabinet corresponding to an identification code scanned by a terminal) for storing the target paper file after the file is checked to be passed.
Or, after the returning process passes the examination and approval, the paper file is directly put back into a fixed file cabinet for storing the target paper file, specifically, after the examination and approval, the position information of the file cabinet for storing the target paper file is fed back to the first user, so that the first user can directly find the file cabinet for storing the target paper file according to the position information, and then, the identification code on the outer surface of the file cabinet is scanned through image acquisition devices such as a camera on the terminal, so that the target paper file is automatically returned. In addition, in order to avoid the leakage of the target paper file through the file information caused by the hands of other users except the first user, when the third user scans the identification code through the terminal, the biological characteristic information of the third user is collected, so that whether the third user is the caller (namely the first user) of the target paper file is verified according to the biological characteristic information, and when the third user is the caller of the target paper file, the file cabinet is opened, so that the third user puts the target paper file back to the file cabinet, and at the moment, the return work of the target paper file is completed. And when the third user is not the caller of the target paper file, generating a third reminding message for reminding the third user of returning to the administrator or failing to return.
In addition, in order to further improve the convenience of file calling, the user can call the target electronic file through the file calling application besides independently calling the paper file. As shown in FIG. 4, the method further includes S401 to S405.
In S401, in response to an electronic profile calling request for calling a target electronic profile, biometric information of a second user is acquired through a terminal.
In this disclosure, the second user is the current operator of the terminal. A user can select a target electronic file to be called through a file calling application and submit the target electronic file, and then an electronic file calling request containing the target file information is generated; and then, responding to the electronic file calling request, and acquiring the biological feature information of the second user through the terminal.
In S402, it is determined whether the second user is a currently logged-on user of the profile invocation application according to the biometric information of the second user.
In the present disclosure, the terminal may acquire biometric information of a currently logged-in user of the profile calling application running on the terminal by communicating with the server of the profile management center. If the biometric information of the second user matches the biometric information of the currently logged-in user of the archive calling application, determining that the second user is the currently logged-in user of the archive calling application, that is, the user currently calling the target electronic archive is the currently logged-in user himself, at this time, S403 may be executed; if the biometric information of the second user does not match the biometric information of the current login user of the archive calling application, it is determined that the second user is not the current login user of the archive calling application, that is, the user who calls the target electronic archive is not the current login user himself, at this time, in order to avoid the problem of calling the archive by impersonation, the second user may be rejected from calling the target electronic archive, and second reminding information for representing that the target electronic archive is failed to be called may be generated, that is, S405 is executed.
In S403, it is determined whether the second user has a right to call the target electronic archive.
In the present disclosure, if the second user has the right to call the target electronic file, S404 is executed; if the second user does not have the right to call the target electronic file, S405 is executed.
In S404, the target electronic profile is invoked for review by the second user.
In the present disclosure, the second user may be referred to by displaying the target electronic profile at the time of the upper limit of the terminal, but the second user is not allowed to download or capture the screen.
In S405, second reminding information for characterizing that the target electronic archive call fails is generated.
In this disclosure, the second reminding information may be a voice reminding message or a text reminding message, so that the terminal reminds that the target electronic file fails to be called in a voice broadcasting or popup window manner on the terminal screen.
In the embodiment, the user can call the target electronic file through the file calling application without specially running to the file management center to call the corresponding paper file, so that the convenience and the efficiency of file calling are further improved. In addition, when the electronic file is called, whether the second user is the current login user of the file calling application or not is authenticated, the problem of calling the file by impersonation is well avoided, the possibility that the file information is illegally stolen and leaked is effectively reduced, and the safety of the file is improved.
A detailed description will be given below of a specific embodiment of determining whether the second user has the right to call the target electronic file in S403. Specifically, this can be achieved by:
firstly, role information of a current login user is obtained.
In the present disclosure, different roles may be given to a user according to the role of the user. For example, the roles of the current login user are classified into high-level enterprise, middle-level enterprise and ordinary staff.
And then, determining whether the second user has the calling authority to the target electronic file or not according to the role information of the current login user.
In the present disclosure, the invoking authority of each electronic file may be preset according to the security level of the file, for example, the file is open to all roles (i.e., all roles have invoking authority, for example, all roles are developed for files with lower security level), and only some roles are open (i.e., only part of roles have invoking authority, for files with higher security level, only enterprise upper level has invoking authority).
If the target electronic file is open to the role of the current login user, determining that the second user has the calling authority to the target electronic file; and if the target electronic file is not open to the role of the current login user, determining that the second user does not have the calling authority to the target electronic file.
In addition, before the S404 calls the target electronic archive, the method further includes the following steps (1) and (2):
(1) and acquiring the historical file borrowing and returning record of the current login user.
In the present disclosure, the server further stores history file borrowing and returning records of each login user. In this way, the terminal can acquire the historical archive borrowing and returning record of the current login user by communicating with the server of the archive management center.
(2) And judging whether the current login user has files which are not returned due to the overdue according to the historical file borrowing and returning records.
In the present disclosure, the archive may include a paper archive and an electronic archive. If the current login user has the file which is not returned after the expiration, or the second user does not have the calling authority of the target electronic file, the current login user refuses to call the file, and at the moment, S405 can be executed; if the second user has the calling authority and the currently logged-in user has no file which is not returned due to the expiration, the target electronic file is called, and step S404 is executed. Therefore, the user can return the called file in time, and the safety of the file is further improved.
In addition, when the user finds that the time is not enough in the process of using the file, the file can be used for lending through the file calling application.
Fig. 5 is a block diagram illustrating a profile calling apparatus according to an exemplary embodiment, wherein the apparatus 500 is applied to a profile calling application running on a terminal. As shown in fig. 5, the apparatus 500 includes: an obtaining module 501, configured to respond to a paper archive calling request of a first user, to obtain status information of a target paper archive to be called, where the paper archive calling request includes an identification code of an archive cabinet scanned by the terminal, the target paper archive is an archive stored in the archive cabinet, and the status information is used to represent whether an online calling application initiated by the archive calling application and performed in advance for the target paper archive passes or not; an acquiring module 502, configured to acquire, by the terminal, biometric information of the first user if the state information acquired by the acquiring module 501 indicates that the online call application passes; a determining module 503, configured to determine, according to the biometric information of the first user acquired by the acquiring module 502, whether the first user is an initiator of the online transfer application, where the initiator of the online transfer application is a login user of the archive transfer application when initiating the online transfer application; a control module 504, configured to control the filing cabinet to open if the determining module 503 determines that the first user is an initiator of the online call application.
In the technical scheme, after a first user scans an identification code of a file cabinet through a terminal, a file calling application on the terminal receives a scanning result and generates a paper file calling request containing the identification code; then, responding to the paper file calling request, and determining whether an online calling application which is performed in advance for the target paper file to be called passes; if the first user is the online calling application, acquiring first biological characteristic information of the first user by using the terminal, and judging whether the first user is an initiator of the online calling application according to the first biological characteristic information; and if the first user is the initiator of the online calling application, controlling the file cabinet to be opened. Therefore, the user can automatically call the files, the operation is convenient and fast, and the workload of a file manager is reduced. In addition, when the paper archives are called, whether the first user is the initiator of the online calling application or not is authenticated, the problem of calling the archives by impersonation is well avoided, the possibility that the information of the archives is illegally stolen and leaked is effectively reduced, and the safety of the archives is effectively improved. In addition, can realize the collection of first user's biological characteristic information through the original part of terminal (for example, fingerprint collection module, camera etc.), and need not additionally to set up corresponding biological characteristic information acquisition device on the terminal, also need not to install corresponding biological characteristic information acquisition device on the filing cabinet, reduced archives administrative cost to, can guarantee biological characteristic information acquisition's accuracy and convenience, promoted user experience.
Optionally, the determining module 503 includes: the first judgment sub-module is used for judging whether the biological characteristic information of the first user is matched with the biological characteristic information of the initiator of the online calling application; and the first determining submodule is used for determining that the first user is the initiator of the online calling application if the biological characteristic information of the first user is matched with the biological characteristic information of the initiator of the online calling application.
Optionally, the determining module 503 further includes: a second determining sub-module, configured to determine whether the collection frequency of the biometric information of the first user reaches a preset frequency threshold value if the biometric information of the first user is not matched with the biometric information of the initiator of the online call application; the acquisition sub-module is used for re-acquiring the biological characteristic information of the first user through the terminal if the acquisition frequency does not reach the preset frequency threshold value, and then triggering the first judgment sub-module to judge whether the biological characteristic information of the first user is matched with the biological characteristic information of the initiator of the online calling application; and the second determining submodule is used for determining that the first user is not the initiator of the online calling application if the acquisition times reach the preset times threshold.
Optionally, the acquiring module 502 is further configured to acquire, by the terminal, biometric information of a second user in response to an electronic profile calling request for calling a target electronic profile, where the second user is a current operator of the terminal; the apparatus 500 further comprises: the login user determining module is used for determining whether the second user is the current login user of the file calling application according to the biological characteristic information of the second user; the first judgment module is used for judging whether the second user has the calling authority to the target electronic file if the second user is the current login user; and the calling module is used for calling the target electronic file for the second user to look up if the second user has the calling authority.
Optionally, the first determining module includes: the obtaining submodule is used for obtaining the role information of the current login user; and the third determining submodule is used for determining whether the second user has the calling authority of the target electronic file or not according to the role information.
Optionally, the apparatus 500 further comprises: the record acquisition module is used for acquiring the historical file borrowing and returning record of the current login user before the target electronic file is called by the calling module; the second judgment module is used for judging whether the current login user has files which are not returned due to the overdue according to the historical file borrowing and returning records;
the calling module is used for calling the target electronic file if the second user has the calling authority and the current login user does not have the file which is not expired and returned.
Optionally, the apparatus 500 further comprises: a first generating module, configured to generate first reminding information for representing that the target paper archive is failed to be called if the state information indicates that the online calling application does not pass or the first user is not an initiator of the online calling application; and/or a second generation module, configured to generate second reminding information for representing that the target electronic archive is failed to be called if the second user is not the current login user or the second user does not have the calling authority.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
The present disclosure also provides a computer-readable storage medium on which a computer program is stored, which when executed by a processor implements the steps of the above-mentioned archive calling method provided by the present disclosure.
FIG. 6 is a block diagram illustrating an electronic device in accordance with an example embodiment. As shown in fig. 6, the electronic device may include: a processor 601 and a memory 602. The electronic device may also include one or more of a multimedia component 603, an input/output (I/O) interface 604, and a communications component 605.
The processor 601 is configured to control the overall operation of the electronic device, so as to complete all or part of the steps in the above file calling method. The memory 602 is used to store various types of data to support operation at the electronic device, such data can include, for example, instructions for any application or method operating on the electronic device, as well as application-related data, such as contact data, messaging, pictures, audio, video, and so forth. The Memory 602 may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk or optical disk. The multimedia components 603 may include a screen and audio components. Wherein the screen may be, for example, a touch screen and the audio component is used for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signal may further be stored in the memory 602 or transmitted through the communication component 605. The audio assembly also includes at least one speaker for outputting audio signals. The I/O interface 604 provides an interface between the processor 601 and other interface modules, such as a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 605 is used for wired or wireless communication between the electronic device and other devices. Wireless Communication, such as Wi-Fi, bluetooth, Near Field Communication (NFC), 2G, 3G, 4G, NB-IOT, eMTC, or other 5G, etc., or a combination of one or more of them, which is not limited herein. The corresponding communication component 605 may therefore include: Wi-Fi module, Bluetooth module, NFC module, etc.
In an exemplary embodiment, the electronic Device may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic components for executing the above-mentioned archive calling method.
In another exemplary embodiment, a computer readable storage medium is also provided, which comprises program instructions, which when executed by a processor, implement the steps of the above-described archive call method. For example, the computer readable storage medium may be the memory 602 described above that includes program instructions that are executable by the processor 601 of the electronic device to perform the archive call method described above.
The preferred embodiments of the present disclosure are described in detail with reference to the accompanying drawings, however, the present disclosure is not limited to the specific details of the above embodiments, and various simple modifications may be made to the technical solution of the present disclosure within the technical idea of the present disclosure, and these simple modifications all belong to the protection scope of the present disclosure.
It should be noted that the various features described in the above embodiments may be combined in any suitable manner without departing from the scope of the invention. In order to avoid unnecessary repetition, various possible combinations will not be separately described in this disclosure.
In addition, any combination of various embodiments of the present disclosure may be made, and the same should be considered as the disclosure of the present disclosure, as long as it does not depart from the spirit of the present disclosure.

Claims (10)

1. A file calling method is applied to a file calling application running on a terminal, and is characterized by comprising the following steps:
responding to a paper file calling request of a first user, and acquiring state information of a target paper file to be called, wherein the paper file calling request comprises an identification code of a file cabinet scanned by the terminal, the target paper file is a file stored in the file cabinet, and the state information is used for representing whether an online calling application initiated by a file calling application and carried out in advance aiming at the target paper file passes or not;
if the state information indicates that the online calling application passes, acquiring biological characteristic information of the first user through the terminal;
determining whether the first user is an initiator of the online calling application according to the biological characteristic information of the first user, wherein the initiator of the online calling application is a login user of the archive calling application when the online calling application is initiated;
and if the first user is the initiator of the online calling application, controlling the file cabinet to be opened.
2. The method of claim 1, wherein the determining whether the first user is an initiator of the online invocation application according to the biometric information of the first user comprises:
judging whether the biological characteristic information of the first user is matched with the biological characteristic information of the initiator of the online calling application;
and if the biological characteristic information of the first user is matched with the biological characteristic information of the initiator of the online calling application, determining that the first user is the initiator of the online calling application.
3. The method of claim 2, wherein determining whether the first user is an initiator of the online invocation application based on biometric information of the first user further comprises:
if the biological characteristic information of the first user is not matched with the biological characteristic information of the initiator of the online calling application, judging whether the acquisition frequency of the biological characteristic information of the first user reaches a preset frequency threshold value;
if the collection times do not reach the preset times threshold value, the terminal collects the biological feature information of the first user again, and then the step of judging whether the biological feature information of the first user is matched with the biological feature information of the initiator of the online calling application is executed;
and if the acquisition times reach the preset times threshold value, determining that the first user is not the initiator of the online calling application.
4. The method of claim 1, further comprising:
acquiring biological characteristic information of a second user through the terminal in response to an electronic file calling request for calling a target electronic file, wherein the second user is a current operator of the terminal;
determining whether the second user is a current login user of the file calling application according to the biological characteristic information of the second user;
if the second user is the current login user, judging whether the second user has the calling authority of the target electronic file;
and if the second user has the calling authority, calling the target electronic file for the second user to look up.
5. The method of claim 4, wherein said determining whether the second user has the right to invoke the target electronic profile comprises:
acquiring the role information of the current login user;
and determining whether the second user has the calling authority to the target electronic file or not according to the role information.
6. The method of claim 4, wherein prior to the step of invoking the target electronic profile, the method further comprises:
acquiring a historical archive borrowing and returning record of the current login user;
judging whether the current login user has files which are not returned due to the overdue according to the historical file borrowing and returning records;
if the second user has the calling authority, calling the target electronic file, including:
and if the second user has the calling authority and the current login user does not have the file which is not expired and returned, calling the target electronic file.
7. The method according to any one of claims 4-6, further comprising:
if the state information indicates that the online calling application does not pass or the first user is not the initiator of the online calling application, generating first reminding information for representing the calling failure of the target paper file; and/or
And if the second user is not the current login user or the second user does not have the calling authority, generating second reminding information for representing the calling failure of the target electronic file.
8. A device is called to archives, is applied to archives of operation on terminal and calls application, its characterized in that includes:
the acquisition module is used for responding to a paper file calling request of a first user and acquiring state information of a target paper file to be called, wherein the paper file calling request comprises an identification code of a file cabinet scanned by the terminal, the target paper file is a file stored in the file cabinet, and the state information is used for representing whether an online calling application initiated by the file calling application and carried out in advance aiming at the target paper file passes or not;
the acquisition module is used for acquiring the biological characteristic information of the first user through the terminal if the state information acquired by the acquisition module indicates that the online calling application passes;
the determining module is used for determining whether the first user is an initiator of the online calling application according to the biological characteristic information of the first user acquired by the acquiring module, wherein the initiator of the online calling application is a login user of the archive calling application when the online calling application is initiated;
and the control module is used for controlling the file cabinet to be opened if the determining module determines that the first user is the initiator of the online calling application.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
10. An electronic device, comprising:
a memory having a computer program stored thereon;
a processor for executing the computer program in the memory to carry out the steps of the method of any one of claims 1 to 7.
CN202110192827.7A 2021-02-20 2021-02-20 File calling method, device, medium and electronic equipment Active CN112560815B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110192827.7A CN112560815B (en) 2021-02-20 2021-02-20 File calling method, device, medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110192827.7A CN112560815B (en) 2021-02-20 2021-02-20 File calling method, device, medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN112560815A CN112560815A (en) 2021-03-26
CN112560815B true CN112560815B (en) 2021-05-07

Family

ID=75034431

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110192827.7A Active CN112560815B (en) 2021-02-20 2021-02-20 File calling method, device, medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN112560815B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115080822A (en) * 2022-04-29 2022-09-20 山东日照发电有限公司 Internet of things system for office archive management
CN117648349B (en) * 2024-01-29 2024-04-09 河北省中医院 File calling method and platform

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070026371A1 (en) * 2005-08-01 2007-02-01 Beryl Wood Personal electronic text library system patent
CN111901494A (en) * 2020-07-21 2020-11-06 莱芜职业技术学院 Library information platform service system
CN111915783A (en) * 2020-07-31 2020-11-10 北京睿家科技有限公司 Information registration checking method and device

Also Published As

Publication number Publication date
CN112560815A (en) 2021-03-26

Similar Documents

Publication Publication Date Title
AU2019202631B2 (en) Toggling biometric authentication
US9131377B2 (en) Method and apparatus for unlocking operating system
CN107800672B (en) Information verification method, electronic equipment, server and information verification system
EP3163851A1 (en) User mode control method and system based on iris recognition technology for mobile terminal
US11057372B1 (en) System and method for authenticating a user to provide a web service
CN112560815B (en) File calling method, device, medium and electronic equipment
CN110392054A (en) Log in method of calibration, device, system, equipment and readable storage medium storing program for executing
CN111541546B (en) Multi-platform login method, device, equipment and readable medium
CN111259358B (en) Login method, login device, computer equipment and storage medium
CN110942528A (en) Sign-in method, device and system
CN107230060B (en) Account loss reporting method and device
US10778434B2 (en) Smart login method using messenger service and apparatus thereof
CN111181832B (en) Account creating method, device, system, server and storage medium
CN110546638A (en) Improvements in biometric authentication
US11599607B2 (en) Authentication method and system for a telecommunications system
Clarke et al. A composite user authentication architecture for mobile devices
US11336646B2 (en) Alternate user communication routing
CN113326539B (en) Method, device and system for private data leakage detection aiming at applet
US20210168129A1 (en) System and method for persistent authentication of a user for issuing virtual tokens
CN114398090A (en) Data processing method, device and equipment
CN114124873A (en) Account abnormity processing method and device, computer equipment and storage medium
CN117113320A (en) Login verification method and device of bank teller system based on palm print recognition
CN117151845A (en) Method, device and equipment for generating account opening application form
CN114915486A (en) Identity authentication method, device, system, electronic equipment and medium
CN115511618A (en) Bank card binding method and related equipment thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant