CN113836502A - Method, apparatus, medium, and program product for re-identifying user information - Google Patents

Method, apparatus, medium, and program product for re-identifying user information Download PDF

Info

Publication number
CN113836502A
CN113836502A CN202110881444.0A CN202110881444A CN113836502A CN 113836502 A CN113836502 A CN 113836502A CN 202110881444 A CN202110881444 A CN 202110881444A CN 113836502 A CN113836502 A CN 113836502A
Authority
CN
China
Prior art keywords
information
user
terminal
users
query result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110881444.0A
Other languages
Chinese (zh)
Inventor
赵明鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shengpay E Payment Service Co ltd
Original Assignee
Shanghai Shengpay E Payment Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Shengpay E Payment Service Co ltd filed Critical Shanghai Shengpay E Payment Service Co ltd
Priority to CN202110881444.0A priority Critical patent/CN113836502A/en
Publication of CN113836502A publication Critical patent/CN113836502A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/248Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Accounting & Taxation (AREA)
  • Computational Linguistics (AREA)
  • Computer Security & Cryptography (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

An object of the present application is to provide a method, apparatus, medium, and program product for re-identifying user information, including: receiving re-identification requests about a plurality of users sent by user equipment; responding to the re-identification request, sending the user identification information of the users to a second terminal, and receiving query result information returned by the second terminal based on the user identification information of the users; and detecting whether the query result information is consistent with the information to be identified, which is stored in the first terminal and corresponds to the user identification information of the plurality of users, and if not, updating the query result to the first terminal. The method and the device can improve the efficiency of re-identifying the user identity.

Description

Method, apparatus, medium, and program product for re-identifying user information
Technical Field
The present application relates to the field of communications, and more particularly, to a technique for re-identifying user information.
Background
The illegal fund transfer is legal obligation which must be fulfilled by a financial institution, one of the three core obligations is due diligence, and the basic principle of the due diligence is to know your customer, namely to know the identity information of the customer, the nature of fund transaction, the fund source, the fund destination and the like. However, it is difficult to accurately judge the client identity and the risk of illegal fund transfer by only depending on the client information acquired when the business relationship is initially established, and continuous client identity recognition is performed in the later business transaction, and the original grasped client information is re-recognized and modified under specific conditions.
Disclosure of Invention
It is an object of the present application to provide a method, apparatus, medium, and program product for re-identifying user information.
According to an aspect of the present application, there is provided a method for re-identifying user information, the method including:
receiving a re-identification request which is sent by user equipment and relates to a plurality of users, wherein the re-identification request comprises user identification information of the users;
responding to the re-identification request, sending the user identification information of the users to a second terminal, and receiving query result information returned by the second terminal based on the user identification information of the users;
and detecting whether the query result information is consistent with the information to be identified, which is stored in the first terminal and corresponds to the user identification information of the plurality of users, and if not, updating the query result to the first terminal.
According to an aspect of the present application, there is provided a first terminal device for re-identifying user information, the device including:
a module, configured to receive a re-identification request sent by a user equipment, where the re-identification request includes user identification information of a plurality of users;
a second module, configured to send, in response to the re-identification request, the user identification information of the multiple users to a second terminal, and receive query result information returned by the second terminal based on the user identification information of the multiple users;
and a third module, configured to detect whether the query result information is consistent with the information to be identified, stored in the first terminal, corresponding to the user identification information of the multiple users, and if not, update the query result to the first terminal.
According to one aspect of the application, there is provided a computer device for re-identifying user information, comprising a memory, a processor and a computer program stored on the memory, wherein the computer program is adapted to re-identify user information
A processor executes the computer program to implement the operations of any of the methods described above.
According to an aspect of the application, there is provided a computer-readable storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, performs the operations of any of the methods described above.
According to an aspect of the application, a computer program product is provided, comprising a computer program which, when executed by a processor, carries out the steps of any of the methods as described above.
Compared with the prior art, the first terminal receives re-identification requests about a plurality of users sent by user equipment, responds to the re-identification requests, sends the user identification information of the users to the second terminal, receives inquiry result information returned by the second terminal based on the user identification information of the users, then detects whether the inquiry result information is consistent with the information to be identified stored in the first terminal and corresponding to the user identification information of the users, and if not, updates the inquiry result to the first terminal. The method and the device can automatically complete the re-identification work of mass users, and improve the efficiency of re-identification of the user identities, so that daily work and emergency tasks can be efficiently met, and the operation cost is greatly reduced.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a flow diagram of a method for re-identifying user information according to one embodiment of the present application;
FIG. 2 illustrates a flow diagram of a method for re-identifying user information according to yet another embodiment of the present application;
fig. 3 illustrates a device structure diagram of a first terminal for re-identifying user information according to an embodiment of the present application;
FIG. 4 illustrates an exemplary system that can be used to implement the various embodiments described in this application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include forms of volatile Memory, Random Access Memory (RAM), and/or non-volatile Memory in a computer-readable medium, such as Read Only Memory (ROM) or Flash Memory. Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change Memory (PCM), Programmable Random Access Memory (PRAM), Static Random-Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium, may be used to store information that may be accessed by the computing device.
The device referred to in the present application includes, but is not limited to, a terminal, a network device, or a device formed by integrating a terminal and a network device through a network. The terminal includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an Android operating system, an iOS operating system, etc. The network Device includes an electronic Device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded Device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the terminal, the network device, or a device formed by integrating the terminal and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
Fig. 1 shows a method for re-identifying user information, applied to a first terminal, according to an embodiment of the present application, and the method includes steps S101, S102, and S103.
Specifically, in step S101, the first terminal receives a re-identification request about a plurality of users sent by the user equipment, where the re-identification request includes user identification information of the plurality of users. The user device includes, but is not limited to, a mobile phone, a tablet, a notebook, and other computing devices, the user may be a personal user (e.g., a user registered on a personal name), or may be an enterprise user (e.g., registered on a business name), and in some embodiments, the user may be a legal representative, a high-head pipe, or a stakeholder of a registered enterprise, and the first terminal is a business system server in which business between a financial institution and a client is stored. For example, in response to a batch trigger event in the user equipment, where the batch trigger event may be generated by a service staff performing a trigger operation on a profile of a plurality of users in the user equipment (for example, the trigger operation includes checking user identifiers of the plurality of users, or a menu interface presented in the user equipment may be used by the service staff for triggering, that is, the plurality of users may be selected in batches), the user equipment sends a re-identification request about the plurality of users to a corresponding first terminal, where the re-identification request includes user identifier information of the plurality of users, and the first terminal receives the re-identification request.
In some embodiments, in order to reduce waste of resources, the user equipment does not package all user information in real time to send a re-identification request to the first terminal, and the user equipment detects whether a plurality of users in the system meet first preset condition information in real time, and if so, triggers the user equipment to send the re-identification request to the first terminal, where the re-identification request includes user identifiers of the plurality of first users. In some embodiments, the plurality of users satisfy the first preset condition information.
In some embodiments, the first preset condition information includes at least any one of:
the user has requested to change identity information;
the transaction behavior of the user is abnormal;
an anomaly exists in the financial activity of the user;
the current information of the user is inconsistent with the previously stored information;
the user's stored information is abnormal;
other behavioral anomalies exist for the user. For example, the user equipment records whether one of the following situations occurs under the account of each user, and if so, determines that the user meets a first preset condition:
1) the user device has recorded therein any one of a name or name, an identification document kind, an identification document number, registered capital, a scope of business, a legal representative, or a principal that the user requires to be changed.
(2) Abnormal signs appear in the user's behavior (e.g., the user's behavior does not match the user's identity) or in the transaction situation (the user's transaction situation does not match the user's identity).
(3) The name or name of the user is the same as the name or name of criminal suspects, illegal fund transfers and terrorist financing molecules which are legally required by relevant departments, organizations and judicial authorities of the state service.
(4) The user has the suspicion of illegal fund transfer and terrorist financing activities.
(5) The customer information obtained by the financial institution is inconsistent or contradictory with the related information that has been previously grasped.
(6) The authenticity, validity and integrity of the user identification data obtained by the user before exist doubt (for example, the change of the identification document number by the client can be identified as the non-identical client before and after the change of the identification document number by the client; after the control right of the non-natural person client is transferred, the name of the client, the operated service, the legal representative and other important identification information are changed, so that the client belongs to different clients in essence).
(7) Other situations where the financial institution believes the identity of the user should be re-identified. When the users meet the first preset condition information and the financial institution suspects that the saved user information and the latest information are accessed, the judgment of the illegal fund transfer risk condition of the users and the monitoring of suspicious transactions are necessarily influenced, and the financial institution should identify the users again at the moment.
In step S102, the first terminal sends the user identification information of the multiple users to the second terminal in response to the re-identification request, and receives query result information returned by the second terminal based on the user identification information of the multiple users. The second terminal is an authentication server, a data interface for acquiring authority data information of the official database is arranged in the authentication server, and a basis is provided for subsequently judging whether the authority data information of the official database is consistent with the registration information in the first terminal.
In some embodiments, in step S102, the first terminal sends, in response to the re-identification request, the user identification information of the multiple users to the second terminal, and receives query result information returned by the second terminal based on the user identification information of the multiple users, where the query result information returned by the third-party database is received after the second terminal sends a query request to the third-party database, and the query request includes the user identification information of the multiple users. The user identification information includes information used for identifying the user identity, such as identity card information of the user, a mobile phone number, name information of the user, or user ID information of the user in the first terminal, and the like, the third-party database is a business database used for providing authoritative data information to the second terminal. For example, the second terminal performs a matching query in the third-party database based on the user identification information of the plurality of users to obtain query result information matching with each user identification information, where the query result information includes information registered by each user in the industrial and commercial database, for example, if the user is an enterprise, the query information includes an enterprise name, a number, a registration time, an operation range, a registered capital, a legal representative, a registered address, a senior manager, and the like. And then, the second terminal returns the acquired query information to the first terminal so that the first terminal can compare the acquired query information with the information to be identified stored in the first terminal.
In some embodiments, the method further includes step S104 (not shown), in step S104, the first terminal performs, in response to the re-identification request, a matching query in an information storage database of the first terminal according to the user identification information of the plurality of users to determine the information to be identified corresponding to each of the user identification information. For example, the first terminal stores a mapping relationship between a user identifier of each user and related information of the user, wherein the related information includes information such as an enterprise name, a serial number, registration time, an operating range, registration capital, a legal representative, a registration address, a senior manager and the like of each user (for example, the user represents an enterprise). The first terminal takes the relevant information of the plurality of users as the information to be identified, in some embodiments, the relevant information of the plurality of users has the necessity of re-identification, and the first terminal determines that the relevant information of the plurality of users has certain unreliability. In some embodiments, the first terminal sends a re-identification request to the second terminal according to the information to be identified of the plurality of users, where the re-identification request includes the information to be identified of the plurality of users, the second terminal sends a query request to the third-party database according to the information to be identified of the plurality of users, and returns query result information matched with the information to be identified to the second terminal, where a similarity between the query result information and the information to be identified is greater than a preset similarity threshold.
In some embodiments, the information to be identified includes at least any one of the following field information:
user basic field information;
the information of the industrial and commercial state field;
and registering data field information. For a common individual user, the user basic field information includes identity information (e.g., personal information such as name, address, etc.) of the user, and for an enterprise user, the user basic field information includes a user enterprise name, a number, a senior manager, etc.; the business state field information comprises the business state of the enterprise user (for example, whether the business state is normal or not, logout, expense, abnormity and the like), the business establishment time and the like; the registration data field information includes registration time, scope of operation, registration capital, currency of registration capital, legal representative, registration address, etc.
In step S103, the first terminal detects whether the query result information is consistent with the information to be identified, stored in the first terminal, corresponding to the user identification information of the multiple users, and if not, updates the query result to the first terminal. For example, the first terminal detects whether the relevant information of the multiple users stored in the first terminal is complete and real according to the official authority data information of the multiple users, and updates the relevant information of the multiple users in the first terminal based on the detection result, so as to perform recognition of illegal fund transfer prevention activity based on the relevant information of the users in the first terminal.
In some embodiments, the detecting whether the query result information is consistent with the information to be identified corresponding to the user identification information of the plurality of users stored in the first terminal includes: matching a plurality of field information in the query result information with a plurality of field information in the information to be identified one by one, and if the matching result is successful, determining that the query result information is consistent with the information to be identified which is stored in the first terminal and corresponds to the user identification information of the plurality of users; otherwise, determining that the query result information is inconsistent with the information to be identified, which is stored in the first terminal and corresponds to the user identification information of the plurality of users. For example, after receiving the query result information, the first terminal first extracts data (e.g., basic field information of a user, business state field information, and registered data field information) corresponding to each field information in the query result information and matches the data corresponding to each field information in the information to be identified, and if the matching result is a successful match, the first terminal determines that the query result information is completely consistent with the information to be identified; otherwise, if the matching result is matching failure, the first terminal determines that the field of the query result information which is not matched with the information to be identified exists. Thereby providing a basis for the subsequent first terminal to update the information to be identified. For example, if the data corresponding to each field information in the query result information is the same as the data corresponding to each field information in the information to be identified, the matching result is a successful matching; and if the data corresponding to at least one field information in the query result information is different from the data corresponding to the corresponding field information in the information to be identified, the matching result is matching failure.
In some embodiments, the updating the query result to the first terminal if the query result is inconsistent with the first terminal includes: and if the field information in the query result information is inconsistent with the field information in the information to be identified, determining at least one piece of field information which is different from the field information in the information to be identified, and updating the content corresponding to the at least one piece of field information into an information storage database of the first terminal. For example, for the information to be identified of each user, since the query result information and the information to be identified are compared according to fields, the first terminal obtains at least one piece of field information that is unmatched when the query result information and the information to be identified are compared, and the first terminal replaces the content corresponding to the at least one piece of field information in the query field with the content corresponding to the at least one piece of field information in the information to be identified, so as to update the related information in the information database corresponding to each user.
In some embodiments, the method further includes step S105 (not shown), in step S105, if the query result information is inconsistent with the to-be-identified information stored in the first terminal and corresponding to the user identification information of at least one first user of the plurality of users, the first terminal sends the to-be-identified information stored in the first terminal and corresponding to the user identification information of the at least one first user to the at least one first user, so that the at least one first user provides the update profile. For example, in a case that the query result information is inconsistent with the to-be-identified information stored in the first terminal and corresponding to the user identification information of at least one first user of the plurality of users, the first terminal may provide the at least one user with the relevant content in the to-be-identified information that is not matched with the query result information, so as to request the user to supplement other identity materials or identity documents. In this case, the user's confirmation may be directly based on to supplement the update of the user's relevant information in the information storage database.
In some embodiments, the method further comprises step S106 (not shown), in step S106, the first terminal provides the updated content in the information storage database to a third terminal for the third terminal to monitor the transaction of the user based on the content in the updated information storage database. The third terminal is an illegal fund transfer prevention server, the first terminal provides the updated content in the information storage database to the third terminal, and then the third terminal identifies whether the transaction performed by each user accords with the identity characteristics of the user or not based on the updated reliable data, so that important data guarantee is provided for finding the illegal fund transfer transaction.
FIG. 2 is a flowchart of a method for re-identifying user information according to an embodiment of the present application, in which a re-identification request is initiated by a service system (i.e. a client re-identification system), the re-identification request is pushed directly to an authentication platform according to request data of the service system, the authentication platform initiates a query request to a business query interface server through an interface to query business information in real time and receive a query result, the authentication platform returns the query result to the service system, the service system performs real-time comparison and verification on historical data according to the returned data of the authentication system, and updates inconsistent information to a client information menu in the service system (e.g. the menu includes information of enterprise name, number, registration time, business scope, registration capital, legal representative, registration address, senior manager, account opening information, cooperative product, etc.), and the service system pushes the latest customer information to the anti-illegal fund transfer system, and the anti-illegal fund transfer system is updated to finish the customer identity recognition work.
Fig. 2 shows a first terminal for re-identifying user information according to an embodiment of the present application, which includes a one-module 101, a two-module 102, and a three-module 103.
Specifically, the module 101 is configured to receive a re-identification request sent by a user equipment, where the re-identification request includes user identification information of a plurality of users. The user device includes, but is not limited to, a mobile phone, a tablet, a notebook, and other computing devices, the user may be a personal user (e.g., a user registered on a personal name), or may be an enterprise user (e.g., registered on a business name), and in some embodiments, the user may be a legal representative, a high-head pipe, or a stakeholder of a registered enterprise, and the first terminal is a business system server in which business between a financial institution and a client is stored. For example, in response to a batch trigger event in the user equipment, where the batch trigger event may be generated by a service staff performing a trigger operation on a profile of a plurality of users in the user equipment (for example, the trigger operation includes checking user identifiers of the plurality of users, or a menu interface presented in the user equipment may be used by the service staff for triggering, that is, the plurality of users may be selected in batches), the user equipment sends a re-identification request about the plurality of users to a corresponding first terminal, where the re-identification request includes user identifier information of the plurality of users, and the first terminal receives the re-identification request.
A secondary module 102, configured to send, in response to the re-identification request, the user identification information of the multiple users to a second terminal, and receive query result information returned by the second terminal based on the user identification information of the multiple users. The second terminal is an authentication server, a data interface for acquiring authority data information of the official database is arranged in the authentication server, and a basis is provided for subsequently judging whether the authority data information of the official database is consistent with the registration information in the first terminal.
A third module 103, configured to detect whether the query result information is consistent with the to-be-identified information stored in the first terminal and corresponding to the user identification information of the multiple users, and if not, update the query result to the first terminal. For example, the first terminal detects whether the relevant information of the multiple users stored in the first terminal is complete and real according to the official authority data information of the multiple users, and updates the relevant information of the multiple users in the first terminal based on the detection result, so as to perform recognition of illegal fund transfer prevention activity based on the relevant information of the users in the first terminal.
In some embodiments, the plurality of users satisfy the first preset condition information. The related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the first preset condition information includes at least any one of:
the user has requested to change identity information;
the transaction behavior of the user is abnormal;
an anomaly exists in the financial activity of the user;
the current information of the user is inconsistent with the previously stored information;
the user's stored information is abnormal;
other behavioral anomalies that exist for the user; the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the first terminal further includes a fourth module 104 (not shown), and the fourth module 104 is configured to perform, in response to the re-identification request, a matching query in an information storage database of the first terminal according to the user identification information of the multiple users, so as to determine the information to be identified corresponding to each of the user identification information. The related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the information to be identified includes at least any one of the following field information:
user basic field information;
the information of the industrial and commercial state field;
registering data field information; the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, a second module 102 for
Responding to the re-identification request, sending the user identification information of the users to a second terminal, and receiving query result information returned by the second terminal based on the user identification information of the users, wherein the query result information returned by a third-party database is received after the second terminal sends a query request to the third-party database, and the query request comprises the user identification information of the users. The related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the detecting whether the query result information is consistent with the information to be identified corresponding to the user identification information of the plurality of users stored in the first terminal includes:
matching a plurality of field information in the query result information with a plurality of field information in the information to be identified one by one, and if the matching result is not null, determining that the query result information is consistent with the information to be identified which is stored in the first terminal and corresponds to the user identification information of the plurality of users; otherwise, determining that the query result information is inconsistent with the information to be identified, which is stored in the first terminal and corresponds to the user identification information of the plurality of users. The related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the updating the query result to the first terminal if the query result is inconsistent with the first terminal includes:
and if the field information in the query result information is inconsistent with the field information in the information to be identified, determining at least one piece of field information which is different from the field information in the information to be identified, and updating the content corresponding to the at least one piece of field information into an information storage database of the first terminal. The related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the first terminal further comprises a five-module 105 (not shown), a five-module 105 for
And if the query result information is inconsistent with the to-be-identified information which is stored in the first terminal and corresponds to the user identification information of at least one first user in the plurality of users, sending the to-be-identified information which is stored in the first terminal and corresponds to the user identification information of the at least one first user to the at least one user so as to provide the at least one user with update data. The related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the first terminal further comprises a six-module 106 (not shown), and the six-module 106 is used for
And providing the updated content in the information storage database to a third terminal so that the third terminal can monitor the transaction of the user based on the updated content in the information storage database.
In addition to the methods and apparatus described in the embodiments above, the present application also provides a computer readable storage medium storing computer code that, when executed, performs the method as described in any of the preceding claims.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
FIG. 4 illustrates an exemplary system that can be used to implement the various embodiments described herein;
in some embodiments, as shown in FIG. 4, the system 300 can be implemented as any of the devices in the various embodiments described. In some embodiments, system 300 may include one or more computer-readable media (e.g., system memory or NVM/storage 320) having instructions and one or more processors (e.g., processor(s) 305) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 310 may include any suitable interface controllers to provide any suitable interface to at least one of processor(s) 305 and/or any suitable device or component in communication with system control module 310.
The system control module 310 may include a memory controller module 330 to provide an interface to the system memory 315. Memory controller module 330 may be a hardware module, a software module, and/or a firmware module.
System memory 315 may be used, for example, to load and store data and/or instructions for system 300. For one embodiment, system memory 315 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 315 may include a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, system control module 310 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 320 and communication interface(s) 325.
For example, NVM/storage 320 may be used to store data and/or instructions. NVM/storage 320 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives).
NVM/storage 320 may include storage resources that are physically part of the device on which system 300 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 320 may be accessible over a network via communication interface(s) 325.
Communication interface(s) 325 may provide an interface for system 300 to communicate over one or more networks and/or with any other suitable device. System 300 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) (e.g., memory controller module 330) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) of the system control module 310 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310 to form a system on a chip (SoC).
In various embodiments, system 300 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.). In various embodiments, system 300 may have more or fewer components and/or different architectures. For example, in some embodiments, system 300 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (13)

1. A method for re-identifying user information, applied to a first terminal, wherein the method comprises:
receiving a re-identification request which is sent by user equipment and relates to a plurality of users, wherein the re-identification request comprises user identification information of the users;
responding to the re-identification request, sending the user identification information of the users to a second terminal, and receiving query result information returned by the second terminal based on the user identification information of the users;
and detecting whether the query result information is consistent with the information to be identified, which is stored in the first terminal and corresponds to the user identification information of the plurality of users, and if not, updating the query result to the first terminal.
2. The method of claim 1, wherein the plurality of users satisfy first preset condition information.
3. The method according to claim 2, wherein the first preset condition information includes at least any one of:
the user has requested to change identity information;
the transaction behavior of the user is abnormal;
an anomaly exists in the financial activity of the user;
the current information of the user is inconsistent with the previously stored information;
the user's stored information is abnormal;
other behavioral anomalies exist for the user.
4. The method of any of claims 1-3, wherein the method further comprises:
and responding to the re-identification request, and performing matching query in an information storage database of the first terminal according to the user identification information of the users so as to determine the information to be identified corresponding to each user identification information.
5. The method of claim 4, wherein the information to be identified comprises at least any one of the following field information:
user basic field information;
the information of the industrial and commercial state field;
and registering data field information.
6. The method of claim 1, wherein the sending user identification information of the plurality of users to a second terminal in response to the re-identification request, and receiving query result information returned by the second terminal based on the user identification information of the plurality of users comprises:
responding to the re-identification request, sending the user identification information of the users to a second terminal, and receiving query result information returned by the second terminal based on the user identification information of the users, wherein the query result information returned by a third-party database is received after the second terminal sends a query request to the third-party database, and the query request comprises the user identification information of the users.
7. The method of claim 6, wherein the detecting whether the query result information is consistent with the information to be identified corresponding to the user identification information of the plurality of users stored in the first terminal comprises:
matching a plurality of field information in the query result information with a plurality of field information in the information to be identified one by one, and if the matching result is successful, determining that the query result information is consistent with the information to be identified which is stored in the first terminal and corresponds to the user identification information of the plurality of users; otherwise, determining that the query result information is inconsistent with the information to be identified, which is stored in the first terminal and corresponds to the user identification information of the plurality of users.
8. The method of claim 7, wherein the updating the query result to the first terminal if the query result is inconsistent comprises:
and if the field information in the query result information is inconsistent with the field information in the information to be identified, determining at least one piece of field information which is different from the field information in the information to be identified, and updating the content corresponding to the at least one piece of field information into an information storage database of the first terminal.
9. The method of claim 1, wherein the method further comprises:
and if the query result information is inconsistent with the to-be-identified information which is stored in the first terminal and corresponds to the user identification information of at least one first user in the plurality of users, sending the to-be-identified information which is stored in the first terminal and corresponds to the user identification information of the at least one first user to the at least one user so as to provide the at least one user with update data.
10. The method of claim 8, wherein the method further comprises:
and providing the updated content in the information storage database to a third terminal so that the third terminal can monitor the transaction of the user based on the updated content in the information storage database.
11. A computer device for re-identifying user information, comprising a memory, a processor and a computer program stored on the memory, characterized in that the processor executes the computer program to implement the steps of the method according to any of claims 1 to 10.
12. A computer-readable storage medium, on which a computer program/instructions are stored, which, when being executed by a processor, carry out the steps of the method according to any one of claims 1 to 11.
13. A computer program product comprising a computer program, characterized in that the computer program realizes the steps of the method according to any one of claims 1 to 11 when executed by a processor.
CN202110881444.0A 2021-08-02 2021-08-02 Method, apparatus, medium, and program product for re-identifying user information Pending CN113836502A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110881444.0A CN113836502A (en) 2021-08-02 2021-08-02 Method, apparatus, medium, and program product for re-identifying user information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110881444.0A CN113836502A (en) 2021-08-02 2021-08-02 Method, apparatus, medium, and program product for re-identifying user information

Publications (1)

Publication Number Publication Date
CN113836502A true CN113836502A (en) 2021-12-24

Family

ID=78963179

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110881444.0A Pending CN113836502A (en) 2021-08-02 2021-08-02 Method, apparatus, medium, and program product for re-identifying user information

Country Status (1)

Country Link
CN (1) CN113836502A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117294526A (en) * 2023-11-22 2023-12-26 深圳大智软件技术有限公司 Communication information sharing method and system

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108038179A (en) * 2017-12-07 2018-05-15 泰康保险集团股份有限公司 Identity information authentication method and device
CN108400971A (en) * 2018-01-25 2018-08-14 长春市万易科技有限公司 A kind of anti-fake system and method
CN109003178A (en) * 2018-06-26 2018-12-14 深圳市买买提信息科技有限公司 A kind of recognition of face service-seeking method, apparatus and terminal device
CN109634996A (en) * 2018-10-25 2019-04-16 深圳壹账通智能科技有限公司 Customer information table generating method, device, equipment and computer readable storage medium
CN110223159A (en) * 2019-05-22 2019-09-10 深圳壹账通智能科技有限公司 Credit data query method, apparatus, computer equipment and storage medium
CN110569658A (en) * 2019-09-12 2019-12-13 腾讯科技(深圳)有限公司 User information processing method and device based on block chain network, electronic equipment and storage medium
CN110717156A (en) * 2019-09-06 2020-01-21 上海陆家嘴国际金融资产交易市场股份有限公司 Identity authentication method, system, computer device and storage medium
CN111242645A (en) * 2020-01-19 2020-06-05 福建省农村信用社联合社 Method for identifying bank customer information and controlling integrity
CN111639119A (en) * 2020-06-03 2020-09-08 上海盛付通电子支付服务有限公司 Customer information query method and equipment in anti-money laundering system
CN111695031A (en) * 2020-04-28 2020-09-22 中国平安人寿保险股份有限公司 Label-based searching method, device, server and storage medium
CN112651841A (en) * 2020-12-18 2021-04-13 中国平安人寿保险股份有限公司 Online business handling method and device, server and computer readable storage medium
CN113112274A (en) * 2021-04-12 2021-07-13 支付宝(杭州)信息技术有限公司 Payment information processing method, device, equipment and medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108038179A (en) * 2017-12-07 2018-05-15 泰康保险集团股份有限公司 Identity information authentication method and device
CN108400971A (en) * 2018-01-25 2018-08-14 长春市万易科技有限公司 A kind of anti-fake system and method
CN109003178A (en) * 2018-06-26 2018-12-14 深圳市买买提信息科技有限公司 A kind of recognition of face service-seeking method, apparatus and terminal device
CN109634996A (en) * 2018-10-25 2019-04-16 深圳壹账通智能科技有限公司 Customer information table generating method, device, equipment and computer readable storage medium
CN110223159A (en) * 2019-05-22 2019-09-10 深圳壹账通智能科技有限公司 Credit data query method, apparatus, computer equipment and storage medium
CN110717156A (en) * 2019-09-06 2020-01-21 上海陆家嘴国际金融资产交易市场股份有限公司 Identity authentication method, system, computer device and storage medium
CN110569658A (en) * 2019-09-12 2019-12-13 腾讯科技(深圳)有限公司 User information processing method and device based on block chain network, electronic equipment and storage medium
CN111242645A (en) * 2020-01-19 2020-06-05 福建省农村信用社联合社 Method for identifying bank customer information and controlling integrity
CN111695031A (en) * 2020-04-28 2020-09-22 中国平安人寿保险股份有限公司 Label-based searching method, device, server and storage medium
CN111639119A (en) * 2020-06-03 2020-09-08 上海盛付通电子支付服务有限公司 Customer information query method and equipment in anti-money laundering system
CN112651841A (en) * 2020-12-18 2021-04-13 中国平安人寿保险股份有限公司 Online business handling method and device, server and computer readable storage medium
CN113112274A (en) * 2021-04-12 2021-07-13 支付宝(杭州)信息技术有限公司 Payment information processing method, device, equipment and medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
湖北金融年鉴编辑部编: "湖北金融年鉴", 武汉出版社, pages: 270 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117294526A (en) * 2023-11-22 2023-12-26 深圳大智软件技术有限公司 Communication information sharing method and system
CN117294526B (en) * 2023-11-22 2024-03-12 深圳大智软件技术有限公司 Communication information sharing method and system

Similar Documents

Publication Publication Date Title
KR102452782B1 (en) Blockchain-based resource valuation methods and apparatus
TWI782205B (en) Risk control model training, risk control method, device and equipment for identifying the theft of second-hand door number accounts
US20190109837A1 (en) Systems and methods of user authentication for data services
AU2018425723A1 (en) Blockchain-based information processing method and device, and blockchain network
US10217178B2 (en) Customer identity verification
US20140012716A1 (en) Systems and methods for detecting tax refund fraud
CN113468602A (en) Data inspection method, device and equipment
US20080283593A1 (en) Compromised Account Detection
CN109995523B (en) Activation code management method and device and activation code generation method and device
US20210192523A1 (en) Techniques to improve fraud detection at financial terminals
US11790638B2 (en) Monitoring devices at enterprise locations using machine-learning models to protect enterprise-managed information and resources
CN113315828A (en) Traffic recording method and device, traffic recording equipment and storage medium
US20190122226A1 (en) Suspicious activity report smart validation
CN113836502A (en) Method, apparatus, medium, and program product for re-identifying user information
CN116028917A (en) Authority detection method and device, storage medium and electronic equipment
US20220222334A1 (en) System and methods for automated software analysis and classification
US11763362B2 (en) Prototype message service
CN114357403A (en) User login request processing method and device based on equipment credibility and equipment
WO2017129068A1 (en) Event execution method and device and system therefor
CN114296651A (en) Method and equipment for storing user-defined data information
CN112769782A (en) Method and equipment for multi-cloud security baseline management
CN110958315A (en) Method and equipment for presenting message notification
KR102250037B1 (en) Method, apparatus and computer-readable medium of providing an response solution to financial fraud
CN116596304A (en) Bank account management method, apparatus, electronic device, medium and program product
CN118820309A (en) Request processing method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination