CN114065006A - Method, device, equipment and storage medium for collecting user information - Google Patents

Method, device, equipment and storage medium for collecting user information Download PDF

Info

Publication number
CN114065006A
CN114065006A CN202111359440.2A CN202111359440A CN114065006A CN 114065006 A CN114065006 A CN 114065006A CN 202111359440 A CN202111359440 A CN 202111359440A CN 114065006 A CN114065006 A CN 114065006A
Authority
CN
China
Prior art keywords
user
information
user information
target
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111359440.2A
Other languages
Chinese (zh)
Inventor
魏新胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Financial Technology Co Ltd Shanghai
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN202111359440.2A priority Critical patent/CN114065006A/en
Publication of CN114065006A publication Critical patent/CN114065006A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/904Browsing; Visualisation therefor

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to the technical field of information processing, and discloses a method, a device, equipment and a storage medium for collecting user information, wherein the method comprises the following steps: receiving an information collection request of a first user; respectively generating corresponding sharing information for each second user; sending sharing information corresponding to each second user to the first user; receiving user information fed back by part or all of the at least one second user through the target webpage, verifying the user information fed back by the part or all of the second users, and obtaining target user information based on at least one user information passing verification; and sending the target user information to the first user. By the method and the device, the information collection efficiency can be improved under the condition of ensuring the reliability of information collection.

Description

Method, device, equipment and storage medium for collecting user information
Technical Field
The present application relates to the field of information processing technologies, and in particular, to a method, an apparatus, a device, and a storage medium for collecting user information.
Background
In daily work and life, various information needs to be collected on line. Sometimes, a user needs to collect information of multiple persons (such as the user himself, other persons related to the user, and the like), and if the user collects the information of other related persons and fills the information one by one, errors are easy to occur, and the efficiency is low. For example, in the process of handling a large-amount loan transaction such as a home mortgage, information submission of a plurality of related persons such as a borrower, a spouse, a borrower or a security person needs to be completed online, and at present, a customer manager or a borrower generally completes item-by-item filling of information of a plurality of persons, so that the time for preparing loan data is long, and the information collection efficiency is low.
Disclosure of Invention
The embodiment of the application provides a method, a device, equipment and a storage medium for collecting user information, wherein the information is collected item by item and is converted into parallel collection through sharing information, the collected information is verified, and the information collection efficiency can be improved under the condition of ensuring the reliability of the collected information.
In a first aspect, an embodiment of the present application provides a method for collecting user information, including:
receiving an information collection request of a first user, wherein the information collection request is used for requesting to collect user information of at least one second user;
respectively generating corresponding sharing information for each second user, wherein the sharing information is used for providing an entrance for the second user to enter a target webpage, and the target webpage is used for collecting user information of the second user;
sending sharing information corresponding to each second user to the first user, wherein the sharing information is used for being sent to the second user by the first user;
receiving user information fed back by part or all of the at least one second user through the target webpage, verifying the user information fed back by the part or all of the second users, and obtaining target user information based on at least one user information passing verification;
and sending the target user information to the first user.
In a possible implementation manner, after the generating the corresponding shared information for each of the second users, the method further includes:
respectively generating corresponding target numbers for the second users based on the information collection requests, wherein the target numbers are used for representing the uniqueness of the first users on the collection requests of the user information of the second users;
after receiving the user information fed back by some or all of the at least one second user through the target webpage, the method further includes:
respectively generating a corresponding number to be identified for each second user in the part or all of the second users based on the user information fed back by the part or all of the second users, wherein the number to be identified is used for verifying the legality of the received user information;
the verifying the user information fed back by the part or all of the second users comprises:
and determining that the user information of the second user corresponding to the number to be identified passes the verification under the condition that the target number matched with the number to be identified exists in at least one target number corresponding to the at least one second user.
In a possible implementation manner, the generating, by the information collection request, a corresponding target number for each second user based on the information collection request, where the information collection request carries a request identifier and a first identifier of each second user, includes:
and for each second user, respectively performing data processing on the request identifier and the first identifier of the second user by using a target algorithm to obtain the target number, wherein the data processing comprises one or more items of splicing processing, mapping processing, encryption processing and logic operation.
In a possible implementation manner, the step of generating, by using the user information fed back by each of the partial or all second users, a corresponding to-be-identified number for each of the partial or all second users based on the user information fed back by the partial or all second users includes:
and aiming at each second user in the part or all of the second users, respectively utilizing the target algorithm to perform data processing on the request identifier and the second identifier to obtain the number to be identified.
In a possible implementation manner, after the verifying the user information fed back by the part or all of the second users, the method further includes:
and sending first prompt information to the first user and/or the second user under the condition that the user information fed back by the second user is determined not to pass verification, wherein the first prompt information is used for prompting that the user information of the second user is incorrect.
In a possible implementation manner, after the sending, to the first user, the shared information corresponding to each of the second users, the method further includes:
receiving a submission request of the first user, wherein the submission request is used for requesting to stop collecting the user information of the at least one second user;
determining whether the gathering of the user information of the at least one second user is completed;
and sending second prompt information to the first user under the condition that the user information of the at least one second user is not collected, wherein the second prompt information is used for prompting that the user information is not collected completely.
In a possible implementation manner, after the sending the target user information to the first user, the method further includes:
and updating a target page to which the sharing information corresponding to the second user points aiming at the second user corresponding to at least one piece of user information which passes the verification, wherein the updated target page is used for displaying the abstract of the user information of the second user.
In a second aspect, an embodiment of the present application provides a user information gathering device, including:
a first receiving unit, configured to receive an information collection request of a first user, where the information collection request is used to request collection of user information of at least one second user;
the first generating unit is used for generating corresponding sharing information for each second user, the sharing information is used for providing an entrance for the second user to enter a target webpage, and the target webpage is used for collecting user information of the second user;
the first sending unit is used for sending sharing information corresponding to each second user to the first user, and the sharing information is used for being sent to the second user by the first user;
a second receiving unit, configured to receive user information fed back by some or all of the at least one second user through the target webpage;
the verification unit is used for verifying the user information fed back by part or all of the second users;
an information obtaining unit for obtaining target user information based on at least one user information passing the verification;
and the second sending unit is used for sending the target user information to the first user.
In one possible design, the apparatus further includes:
a second generating unit, configured to generate, based on the information collection request, corresponding target numbers for the second users, respectively, where the target numbers are used to indicate uniqueness of the collection request of the first user for the user information of the second users;
the device further comprises:
a third generating unit, configured to generate, based on the user information fed back by the part or all of the second users, a corresponding to-be-identified number for each of the part or all of the second users, where the to-be-identified number is used to verify validity of the received user information;
the verification unit is specifically configured to:
and determining that the user information of the second user corresponding to the number to be identified passes the verification under the condition that the target number matched with the number to be identified exists in at least one target number corresponding to the at least one second user.
In a possible design, the information gathering request carries a request identifier and first identifiers of the second users, and the second generating unit is specifically configured to:
and for each second user, respectively performing data processing on the request identifier and the first identifier of the second user by using a target algorithm to obtain the target number, wherein the data processing comprises one or more items of splicing processing, mapping processing, encryption processing and logic operation.
In a possible design, the user information fed back by each of the partial or all second users includes a second identifier, and the third generating unit is specifically configured to:
and aiming at each second user in the part or all of the second users, respectively utilizing the target algorithm to perform data processing on the request identifier and the second identifier to obtain the number to be identified.
In one possible design, the apparatus further includes:
the first prompting unit is used for sending first prompting information to the first user and/or the second user under the condition that the user information fed back by the second user is determined not to pass verification, and the first prompting information is used for prompting that the user information of the second user is incorrect.
In one possible design, the apparatus further includes:
a third receiving unit, configured to receive a submission request of the first user, where the submission request is used to request to stop collecting user information of the at least one second user;
a determining unit for determining whether the gathering of the user information of the at least one second user is completed;
and the second prompting unit is used for sending second prompting information to the first user under the condition that the user information of the at least one second user is not collected completely, wherein the second prompting information is used for prompting that the user information is not collected completely.
In one possible design, the apparatus further includes:
the updating unit is used for updating a target page to which the sharing information corresponding to a second user is directed aiming at the second user corresponding to at least one piece of user information passing the verification, and the updated target page is used for displaying the abstract of the user information of the second user.
In a third aspect, an embodiment of the present application provides an electronic device, where the electronic device includes a processor, a memory, and a communication interface, where the processor, the memory, and the communication interface are connected to each other, where the communication interface is used to receive and send data, the memory is used to store program codes, and the processor is used to call the program codes to execute the method according to the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, which stores a computer program, where the computer program is executed by a processor to implement the method of the first aspect.
In the embodiment of the application, an information collection request of a first user for at least one second user is received, corresponding sharing information is generated for each second user respectively, and the sharing information is sent to the first user, so that after the first user sends the sharing information to the corresponding second user, the second user enters a target webpage through the sharing information to fill in user information and sends the user information to a user information collection device. The user information collection device receives user information fed back by part or all of at least one second user, verifies the user information, and sends the target user information to the first user based on at least one verified user. The first user does not need to collect and fill in the information of the second user by himself, and the error probability is reduced. And the first user does not need to fill in information of other users item by item any more, and the information filling can be completed by all the second users in parallel by sharing the information, so that the information collecting efficiency is improved. Furthermore, the user information fed back by the second user is received and then verified, so that the reliability and the validity of the collected user information can be ensured. Therefore, the information collection efficiency can be improved under the condition of ensuring the reliability of information collection.
Drawings
For the purpose of illustrating embodiments of the present application or technical solutions in the prior art, the drawings that are needed in the description of the embodiments or prior art will be briefly described below.
Fig. 1 is a schematic flowchart of a method for collecting user information according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of another method for collecting user information according to an embodiment of the present disclosure;
fig. 3 is a schematic view of an application scenario of a method for collecting user information according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a user information gathering device according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
The terminology used in the following embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the present application. As used in the specification of the present application and the appended claims, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
In this application, "at least one" means one or more, "a plurality" means two or more, "at least two" means two or three and three or more, "and/or" for describing an association relationship of associated objects, which means that there may be three relationships, for example, "a and/or B" may mean: only A, only B and both A and B are present, wherein A and B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one item(s) below" or similar expressions refer to any combination of these items. For example, at least one (one) of a, b, or c, may represent: a, b, c, "a and b," a and c, "" b and c, "or" a and b and c.
In order to describe the scheme of the present application more clearly, some drawings related to the present application are further described below.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating a method for collecting user information according to an embodiment of the present disclosure. As shown in fig. 1, the method may include the following steps 101-105.
Step 101, receiving an information collection request of a first user, wherein the information collection request is used for requesting to collect user information of at least one second user.
In the embodiment of the application, the first user needs to collect the user information of at least one second user, and if the user information of the at least one second user is collected one by the first user and then is filled in one by one, errors are easy to occur, long time is spent, and the efficiency is low. Therefore, the user information collecting method can be adopted, the user information collecting device is used for collecting information, after the information collecting request of the first user is received, the subsequent steps 102-105 are executed in response to the information collecting request, and the information of the second user is collected and then sent to the first user, so that the first user can obtain the collected information without collecting and filling information one by one, and the information collecting efficiency is improved. It can be understood that, in the present application, the first user and the second user both actually perform corresponding operations through their respective user terminals, and communicate and transmit data with the user information collecting device. Specifically, the user information collection device may be a server or the like, for example, in a loan scene, the first user and the second user may communicate and fill in information by using loan APPs on respective terminals, the loan APPs send operation instructions and related information of the first user and the second user to the server corresponding to the loan APPs, and the server responds to operations of the first user and the second user to realize information collection. In this embodiment, the second user is a user in the social relationship network of the first user, and the relationship type between the two users may be a parent-child relationship, a couple relationship, a brother relationship, a friend relationship, and the like. The first user and the second user may communicate with each other through a communication mode on a line, for example, the first user and the second user may communicate with each other through social tools such as WeChat and short message, or communicate with each other through social modules of financial APP and office APP, and the like, which is not limited in the present application.
And 102, respectively generating corresponding sharing information for each second user, wherein the sharing information is used for providing an entrance for the second user to enter a target webpage, and the target webpage is used for collecting user information of the second user.
In the embodiment of the application, the user information collection device responds to an information collection request of a first user, exclusive and unique shared information is generated for each second user, the shared information points to a target webpage, the second user can enter the target webpage through the shared information, namely the second user is linked to the target webpage through the shared information to fill in own user information, and therefore the first user can acquire the user information of each second user in at least one second user by means of the shared information. Understandably, the sharing information can be in the forms of web page links, two-dimensional codes, small programs and the like.
Step 103, sending sharing information respectively corresponding to each second user to the first user, where the sharing information is used for being sent to the second user by the first user.
In the embodiment of the application, after the sharing information corresponding to each second user is generated, the user information collection device sends the sharing information to the first user, so that the first user can send the sharing information to the corresponding second user, and further the user information of the second user is collected. That is, after the user information collection device sends the shared information to the first user, the shared information may be further sent to the corresponding second user by the first user. Specifically, the first user may send the shared information to the second user through any one of the communication manners mentioned in step 101.
And 104, receiving user information fed back by part or all of the at least one second user through the target webpage, verifying the user information fed back by the part or all of the second users, and obtaining target user information based on at least one user information passing verification.
In the embodiment of the application, after the first user sends the shared information to the corresponding second user, the second user can enter the target webpage through the shared information to complete information filling and submission, and the submission operation actually refers to feeding back the user information filled in the target webpage to the user information collecting device. It is understood that the submitting operation may be replaced by a saving operation of the second user, a sending operation of the second user, an automatic saving operation of the target web page, or the like, and is not limited to a specific operation as long as the operation realizes feedback of information filled in the target web page by the second user to the user information collecting device. Therefore, the user information collecting device may perform the next processing after receiving the user information fed back by some or all of the at least one second user. Specifically, the user information fed back by part or all of the second users is verified to verify the validity and accuracy of the collected user information. Further, target user information is obtained based on the at least one user information passing the verification. If the at least one piece of user information includes only one piece of user information, the user information may be directly used as the target user information, and step 105 is performed on the target user information. If the at least one piece of user information comprises the user information of two or more second users, the at least one piece of user information passing the verification can be combined to obtain the target user information, so that the user information required to be collected by the first user is centralized, and the first user can conveniently check and process the user information. Illustratively, the at least one user information may be arranged and stored, for example, the combination process may be implemented by randomly arranging, arranging in the order of passing the verification, or arranging in the correspondence relationship between the second user and the user information passing the verification in the information collection request of the first user.
Step 105, sending the target user information to the first user.
In the embodiment of the application, the user information collecting device sends the target user information to the user after obtaining the target user information, so that the user can conveniently confirm whether information collection is finished and check and process the collected user information.
In the embodiment of the application, an information collection request of a first user for at least one second user is received, corresponding sharing information is generated for each second user respectively, and the sharing information is sent to the first user, so that after the first user sends the sharing information to the corresponding second user, the second user enters a target webpage through the sharing information to fill in user information and sends the user information to a user information collection device. The user information collection device receives user information fed back by part or all of at least one second user, verifies the user information, and sends the target user information to the first user after obtaining the target user information based on at least one user information passing the verification. The first user does not need to collect and fill in the information of the second user by himself, and the error probability is reduced. And the first user does not need to fill in information of other users item by item any more, and the information filling can be completed by all the second users in parallel by sharing the information, so that the information collecting efficiency is improved. Furthermore, the user information fed back by the second user is received and then verified, so that the reliability and the validity of the collected user information can be ensured. Therefore, the information collection efficiency can be improved under the condition of ensuring the reliability of information collection.
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating another method for collecting user information according to an embodiment of the present disclosure. As shown in fig. 2, the method may include the following steps 201-208:
step 201, receiving an information collection request of a first user, the information collection request being used for requesting to collect user information of at least one second user.
Step 202, respectively generating corresponding sharing information for each second user, where the sharing information is used to provide an entry for the second user to enter a target webpage, and the target webpage is used to collect user information of the second user.
Step 203, based on the information collection request, generating a corresponding target number for each second user, where the target number is used to represent the uniqueness of the collection request of the first user for the user information of the second user.
In one embodiment, the information gathering request carries a request identifier and the first identifier of each of the second users. The first identifier of the second user may be identification information such as a name of the second user, and the request identifier may be a request number corresponding to the information collection request. Further, the corresponding sharing information generated for each second user may carry the request identifier, so that the user information fed back by the second user can be verified subsequently. And the target number corresponding to each second user is unique, so that the target number can be used as a standard for subsequent verification.
The process of generating the target number may specifically include the following steps: and for each second user, respectively performing data processing on the request identifier and the first identifier of the second user by using a target algorithm to obtain the target number, wherein the data processing comprises one or more items of splicing processing, mapping processing, encryption processing and logic operation. The target algorithm may include one or more algorithms, and specifically, an appropriate target algorithm may be selected as needed to generate the target number, which is not limited in this application. For example, a preset function (such as a Hash function) may be used to map the first identifier of the second user into a character string, and then the character string and the request identifier are spliced, and the result obtained by splicing is used as the target number; for another example, the first identifier of the second user and the request identifier may be subjected to a logical operation, such as an exclusive or operation, and then encrypted to obtain the target number. Optionally, the target number may be generated by using the user identifier of the first user, for example, the user identifier of the first user, the first identifier of the second user, and the request identifier are subjected to data processing by using a target algorithm to obtain the target number. The unique target number is generated by utilizing various information, so that the subsequently collected user information is conveniently verified, and the legality and reliability of the collected user information can be ensured.
Step 204, sending sharing information respectively corresponding to each second user to the first user, wherein the sharing information is used for being sent to the second user by the first user.
Step 205, receiving user information fed back by some or all of the at least one second user through the target webpage.
In one embodiment, a second user enters a target webpage through corresponding shared information to complete information filling, and the information is sent to a user information collection device, and the shared information carries a request identifier of the information collection request, so that the user information collection device receives the request identifier of the information collection request when receiving user information fed back by the second user, and through the request identifier, the user information collection device can determine that the received user information is collected for which information collection request of which user, that is, through the request identifier, the information collection request corresponding to the received user information can be determined first.
And step 206, respectively generating a corresponding number to be identified for each second user in the part or all of the second users based on the user information fed back by the part or all of the second users, wherein the number to be identified is used for verifying the validity of the received user information.
In one embodiment, the user information fed back by each of some or all of the second users includes a second identifier, and the second identifier represents the same type of user identification information as the first identifier, for example, if the first identifier represents the name of the user, then the second identifier also represents the name of the user. The second identifier specifically represents identification information of a user associated with the user information fed back by the second user. Generally, if the user information fed back by the second user (user a) is the user information of user B, the second identifier is the identifier information of user B, and if the user information fed back by the second user (user a) is the user information of user a, the second identifier is the identifier information of user a.
The process of generating the to-be-identified number corresponding to the second user may include the following steps: and aiming at each second user in the part or all of the second users, respectively utilizing the target algorithm to perform data processing on the request identifier and the second identifier to obtain the number to be identified. Specifically, the user information collecting device receives user information fed back by the second user, and generates a number to be identified by using the target algorithm for generating the target number after receiving a request identifier carried by the shared information corresponding to the second user, so that the data processing performed on the request identifier and the second identifier also includes one or more items of splicing processing, mapping processing, encryption processing, and logical operation. Optionally, the user information fed back by the second user further includes a user identifier of the first user, and if the generation process of the target number utilizes the user identifier of the first user, the to-be-identified number is correspondingly generated by utilizing the user identifier of the first user. The corresponding number to be identified is generated by utilizing various information, and the subsequently collected user information is verified according to the number to be identified, so that the legality and reliability of the collected user information can be ensured.
Understandably, the user information fed back by the second user also comprises user characteristic information which is actually the user information that needs to be collected by the first user, and the second identification is mainly used for validity verification of the user information. The user characteristic information may include work information, income information, address information, etc. of the user, and the present application is not limited.
And step 207, verifying the user information fed back by the part or all of the second users, and obtaining target user information based on at least one user information passing verification.
Specifically, in the process of verifying the user information, when a target number matching the to-be-identified number exists in at least one target number corresponding to the at least one second user, it is determined that the user information of the second user corresponding to the to-be-identified number passes verification. That is, if it is determined that the number to be identified matches one target number, it may be considered that the user information fed back by the second user corresponding to the number to be identified is the user information of the second user that the first user needs to search, that is, the validity and reliability of the user information are confirmed, and the user information may be sent to the first user.
Optionally, when it is determined that the user information fed back by the second user fails to be verified, first prompt information is sent to the first user and/or the second user, where the first prompt information is used to prompt that the user information of the second user is incorrect. Therefore, after the user information fed back by the second user is determined not to be the user information which needs to be searched by the first user, the second user and the first user can be prompted, the user is reminded to fill in the information again in time, time waste is avoided, and therefore information collection efficiency is improved.
Step 208, sending the target user information to the first user.
Optionally, after the target user information is sent to the first user, a target page to which the sharing information corresponding to the second user is directed may be updated for a second user corresponding to at least one piece of user information that passes the verification, where the updated target page is used to display an abstract of the user information of the second user. Therefore, the second user can be prevented from repeatedly filling information and influencing the information collection efficiency.
In one embodiment, after the steps 201 to 204 are performed, the following steps may be further included: receiving a submission request of the first user, wherein the submission request is used for requesting to stop collecting the user information of the at least one second user;
determining whether the gathering of the user information of the at least one second user is completed;
and sending second prompt information to the first user under the condition that the user information of the at least one second user is not collected, wherein the second prompt information is used for prompting that the user information is not collected completely. Understandably, the second prompt information can be brief prompt information for prompting that the user information required to be collected by the first user is not completely collected, or detailed prompt information for prompting that the first user information is not completely collected and showing the first identification of the second user which is not completely collected, so that the first user can be timely reminded, incomplete information collection caused by misoperation of the first user is avoided, and the information collection efficiency is improved.
In the embodiment of the application, the information collection request of the first user for at least one second user is received, the corresponding shared information is respectively generated for each second user, the shared information is sent to the first user, and the target number of each second user is generated based on the information collection request. Receiving user information fed back by part or all of at least one second user, generating a corresponding number to be identified based on the user information fed back by the second user, verifying the user information according to whether the number to be identified is matched with a target number, and combining at least one user information passing the verification and then sending the combined user information to the first user. According to the method and the device, the reliability of the user information is verified according to the target number and the number to be identified, and information is collected item by item and is converted into parallel collection through information sharing, so that the information collection efficiency can be improved under the condition that the reliability of information collection is guaranteed.
The following describes a process for implementing the user information gathering method of the present application, taking a specific application scenario as an example.
As shown in fig. 3, the application scenario is a loan scenario, and a user may fill out a loan order on a loan APP on a terminal, the loan order requiring user information of the user itself (borrower) and other related users (guarantors, lenders, etc.). Thus, in steps 201-208, the first user may be a borrower and the second user may be a borrower, a insurer, etc. of the loan order. The first identifier of the second user may include information such as a name of the second user, a type of relationship between the second user and the first user, and the like. The relationship type between the second user and the first user may include a social relationship type between the second user and the first user, or may include an identity of the second user in the loan order, such as a borrower or a securiter. And the request identification of the first user's information gathering request may be the order number of the loan order. When the first user sends an information collection request to the user information collection device, the information collection request may carry an order number of the loan order and a first identifier of each of the at least one second user.
The user information collection device generates corresponding sharing information for each second user, and generates a corresponding target number for each second user based on the order number and the first identification of the second user. The sharing information can carry the order number of the loan order, so that the target number and the sharing information are unique, when the loan orders are different or the second user is different, the target numbers are different, and the sharing information is different. The user information collection device sends the sharing information to the first user and stores the target number. The first user further can send the shared information to a corresponding second user, so that the second user enters a target webpage through the shared information, fills in user information, and feeds back the filled information to the user information collecting device. The user information collecting device receives user information fed back by a second user through sharing information, wherein the user information comprises a second identification, namely the name of the user, the relationship type between the user and the first user and the like, and in addition, the user information also comprises user characteristic information such as work information, income information and the like. And generating a number to be identified based on the second identifier and the order number carried by the sharing information. And determining whether the user information passes the verification according to whether a target number matched with the number to be identified exists. And obtaining target user information based on at least one user passing the verification and sending the target user information to the first user, namely automatically filling the user information passing the verification into a filling area of the user information of the corresponding second user in the loan order, and displaying the user information.
Optionally, in the case that it is determined that the user information fed back by the second user fails to be verified, a prompt message, such as "incorrect borrower/guarantor, please refill", is sent to the first user and/or the second user. Optionally, after sending the sharing information to the first user, determining a submission status corresponding to the user information of each second user that needs to be collected in the loan order, if the user information fed back by the second user is received, determining that the user information fed back by the second user passes verification, automatically updating the submission status to a submitted status, and if the user information fed back by the second user is not received or the user information fed back by the second user fails verification, maintaining the submission status to be a default non-submission status. Further, if the submission status is determined to be the submitted status, and the user information fed back by the second user is still received again, a prompt message, such as "borrower/guarantor completed information filling, no repeated submission", may be sent to the first user and/or the second user. In addition, if the first user (i.e. the borrower) submits the main flow of the order, i.e. sends a submission request for stopping collecting the user information of the second user, the user information collecting device determines whether the user information of all the second users is completely collected according to whether the user information of the second users (a borrower and a guarantor) and the submission state corresponding to the user information of each second user need to be collected in the loan order, and if the user information is not completely collected, only sends prompt information to the first user or to the first user and the second user, such as "the current order borrower and the guarantor are not completely filled". That is, the user information collection apparatus may transmit the respective prompt information to the first user and the second user as the case may be.
In a possible case, before receiving the user information submitted by the second user, a deletion operation instruction of the first user for the shared information corresponding to the second user is received, and the stored target number is correspondingly deleted, so that the first user does not need to collect the user information of the second user. In this way, for the subsequently received user information fed back by the second user, the generated number to be identified cannot be matched with the target number of any second user, so that the user information fed back by the second user is determined not to pass verification, and the user information is not filled in a loan order. Therefore, the first user can flexibly add or delete the related user information according to the requirement, and the information collection can be rapidly and reliably completed.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a user information gathering device according to an embodiment of the present disclosure. As shown in fig. 4, the user information gathering means may include:
a first receiving unit 10, configured to receive an information collection request of a first user, where the information collection request is used to request to collect user information of at least one second user;
the first generating unit 11 is configured to generate corresponding shared information for each second user, where the shared information is used to provide an entry for the second user to enter a target webpage, and the target webpage is used to collect user information of the second user;
a first sending unit 12, configured to send, to the first user, shared information corresponding to each of the second users, where the shared information is used by the first user to send to the second user;
a second receiving unit 13, configured to receive user information fed back by some or all of the at least one second user through the target webpage;
the verification unit 14 is used for verifying the user information fed back by the part or all of the second users;
an information obtaining unit 15 for obtaining target user information based on the at least one user information that passes the verification;
a second sending unit 16, configured to send the target user information to the first user.
In one possible design, the apparatus further includes:
a second generating unit, configured to generate, based on the information collection request, corresponding target numbers for the second users, respectively, where the target numbers are used to indicate uniqueness of the collection request of the first user for the user information of the second users;
the device further comprises:
a third generating unit, configured to generate, based on the user information fed back by the part or all of the second users, a corresponding to-be-identified number for each of the part or all of the second users, where the to-be-identified number is used to verify validity of the received user information;
the verification unit 14 is specifically configured to:
and determining that the user information of the second user corresponding to the number to be identified passes the verification under the condition that the target number matched with the number to be identified exists in at least one target number corresponding to the at least one second user.
In a possible design, the information gathering request carries a request identifier and first identifiers of the second users, and the second generating unit is specifically configured to:
and for each second user, respectively performing data processing on the request identifier and the first identifier of the second user by using a target algorithm to obtain the target number, wherein the data processing comprises one or more items of splicing processing, mapping processing, encryption processing and logic operation.
In a possible design, the user information fed back by each of the partial or all second users includes a second identifier, and the third generating unit is specifically configured to:
and aiming at each second user in the part or all of the second users, respectively utilizing the target algorithm to perform data processing on the request identifier and the second identifier to obtain the number to be identified.
In one possible design, the apparatus further includes:
the first prompting unit is used for sending first prompting information to the first user and/or the second user under the condition that the user information fed back by the second user is determined not to pass verification, and the first prompting information is used for prompting that the user information of the second user is incorrect.
In one possible design, the apparatus further includes:
a third receiving unit, configured to receive a submission request of the first user, where the submission request is used to request to stop collecting user information of the at least one second user;
a determining unit for determining whether the gathering of the user information of the at least one second user is completed;
and the second prompting unit is used for sending second prompting information to the first user under the condition that the user information of the at least one second user is not collected completely, wherein the second prompting information is used for prompting that the user information is not collected completely.
In one possible design, the apparatus further includes:
the updating unit is used for updating a target page to which the sharing information corresponding to a second user is directed aiming at the second user corresponding to at least one piece of user information passing the verification, and the updated target page is used for displaying the abstract of the user information of the second user.
For a specific description of the embodiment of the apparatus shown in fig. 4, reference may be made to the specific description of the method embodiment shown in fig. 1 and fig. 2, which is not repeated herein.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure, and as shown in fig. 5, the electronic device 1000 may include: at least one processor 1001, such as a CPU, at least one communication interface 1003, memory 1004, at least one communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The communication interface 1003 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1004 may be a high-speed RAM memory or a non-volatile memory (e.g., at least one disk memory). The memory 1004 may optionally be at least one storage device located remotely from the processor 1001. As shown in fig. 5, memory 1004, which is a type of computer storage medium, may include an operating system, a network communication module, and program instructions.
In the electronic device 1000 shown in fig. 5, the processor 1001 may be configured to load program instructions stored in the memory 1004 and specifically perform the following operations:
receiving an information collection request of a first user, wherein the information collection request is used for requesting to collect user information of at least one second user;
respectively generating corresponding sharing information for each second user, wherein the sharing information is used for providing an entrance for the second user to enter a target webpage, and the target webpage is used for collecting user information of the second user;
sending sharing information corresponding to each second user to the first user, wherein the sharing information is used for being sent to the second user by the first user;
receiving user information fed back by part or all of the at least one second user through the target webpage, verifying the user information fed back by the part or all of the second users, and obtaining target user information based on at least one user information passing verification;
and sending the target user information to the first user.
It should be noted that, for a specific implementation process, reference may be made to specific descriptions of the method embodiments shown in fig. 1 and fig. 2, which are not described herein again.
An embodiment of the present application further provides a computer storage medium, where the computer storage medium may store a plurality of instructions, where the instructions are suitable for being loaded by a processor and executing the method steps in the embodiments shown in fig. 1 or fig. 2, and a specific execution process may refer to specific descriptions of the embodiments shown in fig. 1 and fig. 2, which are not described herein again.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and includes processes of the embodiments of the methods described above when the computer program is executed. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.

Claims (10)

1. A method for gathering user information, comprising:
receiving an information collection request of a first user, wherein the information collection request is used for requesting to collect user information of at least one second user;
respectively generating corresponding sharing information for each second user, wherein the sharing information is used for providing an entrance for the second user to enter a target webpage, and the target webpage is used for collecting user information of the second user;
sending sharing information corresponding to each second user to the first user, wherein the sharing information is used for being sent to the second user by the first user;
receiving user information fed back by part or all of the at least one second user through the target webpage, verifying the user information fed back by the part or all of the second users, and obtaining target user information based on at least one user information passing verification;
and sending the target user information to the first user.
2. The method of claim 1, wherein after generating the corresponding shared information for each of the second users, further comprising:
respectively generating corresponding target numbers for the second users based on the information collection requests, wherein the target numbers are used for representing the uniqueness of the first users on the collection requests of the user information of the second users;
after receiving the user information fed back by some or all of the at least one second user through the target webpage, the method further includes:
respectively generating a corresponding number to be identified for each second user in the part or all of the second users based on the user information fed back by the part or all of the second users, wherein the number to be identified is used for verifying the legality of the received user information;
the verifying the user information fed back by the part or all of the second users comprises:
and determining that the user information of the second user corresponding to the number to be identified passes the verification under the condition that the target number matched with the number to be identified exists in at least one target number corresponding to the at least one second user.
3. The method as claimed in claim 2, wherein the information gathering request carries a request identifier and a first identifier of each of the second users, and the generating a corresponding object number for each of the second users based on the information gathering request comprises:
and for each second user, respectively performing data processing on the request identifier and the first identifier of the second user by using a target algorithm to obtain the target number, wherein the data processing comprises one or more items of splicing processing, mapping processing, encryption processing and logic operation.
4. The method according to claim 3, wherein the user information fed back by each of the partial or all second users includes a second identifier, and the generating a corresponding number to be identified for each of the partial or all second users based on the user information fed back by the partial or all second users comprises:
and aiming at each second user in the part or all of the second users, respectively utilizing the target algorithm to perform data processing on the request identifier and the second identifier to obtain the number to be identified.
5. The method according to any one of claims 1-4, wherein after verifying the user information fed back by the part or all of the second users, further comprising:
and sending first prompt information to the first user and/or the second user under the condition that the user information fed back by the second user is determined not to pass verification, wherein the first prompt information is used for prompting that the user information of the second user is incorrect.
6. The method according to claim 5, wherein after the sending the sharing information corresponding to each of the second users to the first user, the method further comprises:
receiving a submission request of the first user, wherein the submission request is used for requesting to stop collecting the user information of the at least one second user;
determining whether the gathering of the user information of the at least one second user is completed;
and sending second prompt information to the first user under the condition that the user information of the at least one second user is not collected, wherein the second prompt information is used for prompting that the user information is not collected completely.
7. The method of claim 5, wherein after sending the target user information to the first user, further comprising:
and updating a target page to which the sharing information corresponding to the second user points aiming at the second user corresponding to at least one piece of user information which passes the verification, wherein the updated target page is used for displaying the abstract of the user information of the second user.
8. A user information gathering apparatus, comprising:
a first receiving unit, configured to receive an information collection request of a first user, where the information collection request is used to request collection of user information of at least one second user;
the first generating unit is used for generating corresponding sharing information for each second user, the sharing information is used for providing an entrance for the second user to enter a target webpage, and the target webpage is used for collecting user information of the second user;
the first sending unit is used for sending sharing information corresponding to each second user to the first user, and the sharing information is used for being sent to the second user by the first user;
a second receiving unit, configured to receive user information fed back by some or all of the at least one second user through the target webpage;
the verification unit is used for verifying the user information fed back by part or all of the second users;
an information obtaining unit for obtaining target user information based on at least one user information passing the verification;
and the second sending unit is used for sending the target user information to the first user.
9. An electronic device comprising a processor, a memory, and a communication interface, the processor, the memory, and the communication interface being interconnected, wherein the communication interface is configured to receive and transmit data, the memory is configured to store program code, and the processor is configured to invoke the program code to perform the method of any of claims 1-7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which is executed by a processor to implement the method of any one of claims 1-7.
CN202111359440.2A 2021-11-17 2021-11-17 Method, device, equipment and storage medium for collecting user information Pending CN114065006A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111359440.2A CN114065006A (en) 2021-11-17 2021-11-17 Method, device, equipment and storage medium for collecting user information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111359440.2A CN114065006A (en) 2021-11-17 2021-11-17 Method, device, equipment and storage medium for collecting user information

Publications (1)

Publication Number Publication Date
CN114065006A true CN114065006A (en) 2022-02-18

Family

ID=80272977

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111359440.2A Pending CN114065006A (en) 2021-11-17 2021-11-17 Method, device, equipment and storage medium for collecting user information

Country Status (1)

Country Link
CN (1) CN114065006A (en)

Similar Documents

Publication Publication Date Title
CN108764239B (en) Invoice verification method and device, computer equipment and storage medium
US10911455B2 (en) Using third party information to improve predictive strength for authentications
CN110852816B (en) Block chain based automatic invoicing method, terminal equipment and storage medium
CN111163182A (en) Block chain-based device registration method and apparatus, electronic device, and storage medium
CN111382164B (en) Service processing method based on block chain network
CN110473104B (en) Transaction processing method and related equipment
CN110599346A (en) Block chain information acquisition method and related equipment
CN110599174A (en) Block chain information processing method and related equipment
CN110555769A (en) Block chain transaction data processing method and device, computer equipment and storage medium
CN107133233B (en) Processing method and device for configuration data query
CN110458184B (en) Optical character recognition assistance method, device, computer equipment and storage medium
CN112907244B (en) Block chain-based data processing method, device, equipment and readable storage medium
CN112613877A (en) Intelligent contract triggering method and device applied to block chain network and related equipment
CN111177121A (en) Order data feedback method and device, computer equipment and storage medium
CN110955724A (en) Data processing method and device based on block chain, node equipment and storage medium
CN111489100A (en) Order creating method, device, equipment and medium based on big data
CN111241563A (en) Configuration method, device, server and storage medium of authority information
CN110598479B (en) Data processing method, device and computer readable storage medium
CN112596919A (en) Model calling method, device, equipment and storage medium
CN112181836A (en) Test case generation method, system, device and storage medium
CN111553655A (en) Method and system for showing handling history
CN114065006A (en) Method, device, equipment and storage medium for collecting user information
CN111666132B (en) Distributed transaction implementation method, device, computer system and readable storage medium
CN114422586A (en) Event notification method and device, computer equipment and storage medium
CN107704557B (en) Processing method and device for operating mutually exclusive data, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination