CN114386097A - User information management method based on cloud architecture and related equipment - Google Patents

User information management method based on cloud architecture and related equipment Download PDF

Info

Publication number
CN114386097A
CN114386097A CN202111660317.4A CN202111660317A CN114386097A CN 114386097 A CN114386097 A CN 114386097A CN 202111660317 A CN202111660317 A CN 202111660317A CN 114386097 A CN114386097 A CN 114386097A
Authority
CN
China
Prior art keywords
information
target client
registration
check
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111660317.4A
Other languages
Chinese (zh)
Other versions
CN114386097B (en
Inventor
梁丹
李爵麟
刘远利
王磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Aisino Aerospace Information Co ltd
Sichuan Aisino Co ltd
Original Assignee
Sichuan Aisino Aerospace Information Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Aisino Aerospace Information Co ltd filed Critical Sichuan Aisino Aerospace Information Co ltd
Priority to CN202111660317.4A priority Critical patent/CN114386097B/en
Publication of CN114386097A publication Critical patent/CN114386097A/en
Application granted granted Critical
Publication of CN114386097B publication Critical patent/CN114386097B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/12Hotels or restaurants

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Primary Health Care (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Medical Informatics (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the application provides a user information management method based on a cloud architecture and related equipment, and can solve the problem that a special intelligent terminal and an application program in the industry cannot be maintained or replaced in time after a fault occurs, and the normal working process of an industry user using the customized special intelligent terminal is greatly influenced. The method comprises the following steps: detecting state information of conventional check-in registration equipment; when the state information indicates that the conventional check-in registration equipment is in a fault state, the target client sends a check-in registration link; and acquiring personal registration information which is input by the target client based on the check-in registration link.

Description

User information management method based on cloud architecture and related equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a user information management method and related device based on a cloud architecture.
Background
The intelligent terminal plays an important role in various industries. The development and application of industry-based special intelligent terminals and application programs are also becoming more and more extensive. But, due to high price of customization, few users can prepare standby machines. Therefore, the special intelligent terminal cannot be maintained or replaced in time under the condition of failure, and the normal working process of the industry users using the customized special intelligent terminals is greatly influenced.
Disclosure of Invention
The embodiment of the application provides a user information management method based on a cloud architecture and related equipment, and the method and the equipment can solve the problems that a special intelligent terminal and an application program in the industry cannot be maintained or replaced in time after a fault occurs, and the normal working process of an industry user using the customized special intelligent terminal is greatly influenced.
A first aspect of an embodiment of the present application provides a user information management method based on a cloud architecture, including:
detecting state information of conventional check-in registration equipment;
when the state information indicates that the conventional check-in registration equipment is in a fault state, the target client sends a check-in registration link;
and acquiring personal registration information which is input by the target client based on the check-in registration link.
Optionally, the method further includes:
acquiring the position information of the intelligent terminal where the target client is located, which is reported by the target client based on the check-in registration link;
acquiring target hotel information matched with the position information;
associating the target hotel information to the personal registration information.
Optionally, the method further includes:
acquiring user information of a user to which the intelligent terminal belongs based on the identification information of the intelligent terminal;
and generating alarm information under the condition that the user information is not matched with the personal registration information input by the target client based on the check-in registration link.
Optionally, the method further includes:
and sending the alarm information to an administrator terminal to which the target hotel information belongs.
Optionally, the method further comprises:
under the condition that the target client is detected to be in an information input state, starting a front-facing imaging device of a terminal to which the target client belongs to obtain the current distance between the terminal and the face of a user;
determining that the current input state is a privacy risk input state under the condition that the current distance exceeds a preset distance range of the habit distance of the user;
and displaying the content input to the target client after carrying out privacy processing on the content based on the privacy risk input state, and sending the content before privacy processing to a target receiving end.
Optionally, the user habit distance is a habit distance of a user to which the target client belongs or habit distances of all users recorded by the cloud.
Optionally, the privacy processing the content input to the target client based on the privacy risk input state includes:
performing type analysis on the content input to the target client based on the privacy risk input state;
and under the condition that the type of the content of the target client is a preset type, carrying out blurring or character occupation display only or preset identification substitution processing on the content of the target client, then displaying the content, and sending the content before privacy processing to a target receiving end.
A second aspect of the embodiments of the present application provides a user information management apparatus based on a cloud architecture, including:
a detection unit for detecting status information of a conventional check-in registration apparatus;
a sending unit, configured to send a check-in registration link by a target client when the state information indicates that the conventional check-in registration device is in a failure state;
and the acquisition unit is used for acquiring the personal registration information which is input by the target client based on the check-in registration link.
A third aspect of the embodiments of the present application provides an electronic device, which includes a memory and a processor, where the processor is configured to implement the steps of the cloud-based user information management method when executing a computer program stored in the memory.
A fourth aspect of the present embodiment provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the cloud-based user information management method described above.
In summary, the cloud-architecture-based user information management method provided by the embodiment of the present application detects the state information of the conventional check-in registration device; when the state information indicates that the conventional check-in registration equipment is in a fault state, the target client sends a check-in registration link; and acquiring personal registration information which is input by the target client based on the check-in registration link. In the hospitality industry, check-in guests are often required. Generally, a special conventional check-in registration device is provided in a hotel, a server can monitor the state information of the conventional check-in registration device, and can send a check-in registration link to a target client of a guest when the conventional check-in registration device is in a failure state and the guest needs to register information. Therefore, the guest can use the existing intelligent terminal to complete the input of personal information for check-in and registration. The problem of special intelligent terminal and the application program of trade can not in time maintain or change after breaking down, cause very big influence to the normal working process of the trade user who uses these special intelligent terminal of customization is solved.
Accordingly, the cloud-architecture-based user information management apparatus, the electronic device, and the computer-readable storage medium provided by the embodiments of the present invention also have the above technical effects.
Drawings
Fig. 1 is a schematic flowchart of a possible user information management method based on a cloud architecture according to an embodiment of the present disclosure;
fig. 2 is a schematic structural block diagram of a possible user information management apparatus based on a cloud architecture according to an embodiment of the present application;
fig. 3 is a schematic hardware structure diagram of a possible user information management apparatus based on a cloud architecture according to an embodiment of the present disclosure;
fig. 4 is a schematic structural block diagram of a possible electronic device provided in an embodiment of the present application;
fig. 5 is a schematic structural block diagram of a possible computer-readable storage medium provided in an embodiment of the present application.
Detailed Description
The embodiment of the application provides a user information management method based on a cloud architecture and related equipment, and the method and the equipment can solve the problems that a special intelligent terminal and an application program in the industry cannot be maintained or replaced in time after a fault occurs, and the normal working process of an industry user using the customized special intelligent terminal is greatly influenced.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments.
Referring to fig. 1, a flowchart of a user information management method based on a cloud architecture provided in an embodiment of the present application may specifically include: S110-S130.
S110, detecting the state information of the conventional check-in registration equipment;
for example, the conventional check-in device may be a check-in device which is fixedly installed in the hotel and can interact with the server, and is specially used for information check-in of clients in the hotel.
For example, the server may periodically check the status information of the regular check-in registration device, such as communication status, feedback status, and other possible fault statuses of the regular check-in registration device.
For example, the server may start to detect the status information of the regular check-in registration device upon receiving a request message sent by the administrator terminal.
S120, when the state information indicates that the conventional check-in registration equipment is in a fault state, the target client sends a check-in registration link;
in some examples, the target client may send the entered personal registration information to the server via the check-in registration link described above.
S130, acquiring personal registration information which is input by the target client based on the check-in registration link.
According to the user information management method based on the cloud architecture, the state information of conventional check-in and registration equipment is detected; when the state information indicates that the conventional check-in registration equipment is in a fault state, the target client sends a check-in registration link; and acquiring personal registration information which is input by the target client based on the check-in registration link. In the hospitality industry, check-in guests are often required. Generally, a special conventional check-in registration device is provided in a hotel, a server can monitor the state information of the conventional check-in registration device, and can send a check-in registration link to a target client of a guest when the conventional check-in registration device is in a failure state and the guest needs to register information. Therefore, the guest can use the existing intelligent terminal to complete the input of personal information for check-in and registration. The problem that the special intelligent terminals and application programs in the industry cannot be maintained or replaced in time after faults occur, and the normal working process of industry users using the customized special intelligent terminals is greatly influenced is solved
According to some embodiments, further comprising:
acquiring the position information of the intelligent terminal where the target client is located, which is reported by the target client based on the check-in registration link;
acquiring target hotel information matched with the position information;
associating the target hotel information to the personal registration information.
In some examples, after the target client establishes communication with the server through the check-in registration link, the server may obtain location information of the intelligent terminal where the target client is located. Then, the corresponding hotel can be searched in the cloud according to the position information to serve as the target hotel. And associating the target hotel information to the personal registration information. Therefore, steps and time for filling in target hotel information by a user can be saved, and user experience and check-in efficiency are improved.
According to some embodiments, further comprising:
acquiring user information of a user to which the intelligent terminal belongs based on the identification information of the intelligent terminal;
and generating alarm information under the condition that the user information is not matched with the personal registration information input by the target client based on the check-in registration link.
In some examples, if it is clear that the hotel is checked in by falsely using the identity information of another person, after the check-in information is filled in, the user information of the user to which the intelligent terminal belongs and the personal registration information input by the target client based on the check-in registration link can be obtained by comparing the identification information of the intelligent terminal, and if the information is not matched, the warning information is generated. The identification information may be identification information such as a phone number bound to the user, and then the user information of the user to which the intelligent terminal belongs may be obtained through the identification information.
According to some embodiments, further comprising:
and sending the alarm information to an administrator terminal to which the target hotel information belongs.
For example, the warning information may be sent to an administrator terminal to which the target hotel information belongs, for example, to a terminal used by a hotel administrator, and the warning information may be sent through a network or through a telephone number, which is not limited herein.
It should be noted that the intelligent terminal is a type of embedded computer system device, so the architecture framework of the intelligent terminal is consistent with the architecture of the embedded system, and meanwhile, the intelligent terminal is used as an application direction of the embedded system, and the application scene setting is relatively clear, so that the architecture of the intelligent terminal is more clear than that of a common embedded system, has finer granularity, and has certain characteristics. People learn and live through intelligent terminal, and have become more dependent on intelligent terminal, but intelligent terminal has certain privacy exposure risk in daily use, causes the hidden danger to user's privacy security.
In order to solve the above problem, in some examples, the above user information management method based on a cloud architecture further includes:
under the condition that a target client is detected to be in an information input state, starting a front-facing imaging device of a terminal to which the target client belongs to obtain the current distance between the terminal and the face of a user;
illustratively, the terminal may be a smart terminal with a display panel, such as a mobile phone and a tablet computer.
Determining that the current input state is a privacy risk input state under the condition that the current distance exceeds a preset distance range of the habit distance of the user;
for example, a user may have a normal use distance when using a smart terminal with a display panel, such as a mobile phone or a tablet computer. This usage distance is more consistent with the usage habits of the user. The preset distance range may be determined according to the conventional use distance described above.
For example, in a case that a user finds that there is a privacy exposure risk currently, the current distance between the terminal and the face of the user is usually adjusted manually, for example, the screen is lifted to be close to the face of the user, so as to avoid the viewing of people around the screen, or the screen is lowered or kept away from other shelters, so that the screen can be seen while ensuring that the line of sight of the user can be seen, so as to avoid the situation that other people around the user can also see the screen, so that privacy is revealed. Therefore, whether the current input state is the privacy risk input state can be judged according to whether the current distance exceeds the preset distance range of the habit distance of the user. The privacy risk input state described above may be understood as an input state in which there is a privacy exposure risk.
And displaying the content input to the target client after carrying out privacy processing on the content based on the privacy risk input state, and sending the content before privacy processing to a target receiving end.
Illustratively, desensitization processing can be performed on content input and displayed in the intelligent terminal, so that privacy disclosure is avoided, and on the other hand, the content input by a user is normally sent to a corresponding target receiving terminal, so that the situation that the target receiving terminal cannot normally receive information content which should be sent due to privacy protection is avoided.
According to the user information management method based on the cloud architecture, under the condition that a target client is detected to be in an information input state, a front-facing imaging device of a terminal to which the target client belongs is started to obtain the current distance between the terminal and the face of a user; determining that the current input state is a privacy risk input state under the condition that the current distance exceeds a preset distance range of the habit distance of the user; and displaying the content input to the target client after carrying out privacy processing on the content based on the privacy risk input state, and sending the content before privacy processing to a target receiving end. Due to the fact that the preset distance range is set according to the historical data or the big data, under the condition that the current distance between the terminal and the face of the user is too far or too close, whether the user finds that privacy exposure risks exist currently or not is predicted, and the current distance between the terminal and the face of the user is adjusted manually. Under the condition that a user is predicted to be far away from or close to the face of the user due to privacy exposure risks, desensitization treatment can be carried out on content input and displayed in the intelligent terminal, privacy disclosure is avoided, on the other hand, the content input by the user normally occurs to a corresponding target receiving end, and the situation that the target receiving end cannot normally receive information content which is supposed to be sent due to privacy protection is avoided.
According to some embodiments, the user habit distance is a habit distance of a user to which the target client belongs or habit distances of all users recorded by the cloud.
According to some embodiments, the privacy processing of the content input to the target client based on the privacy risk input state comprises:
performing type analysis on the content input to the target client based on the privacy risk input state;
and under the condition that the type of the content of the target client is a preset type, carrying out blurring or character occupation display only or preset identification substitution processing on the content of the target client, then displaying the content, and sending the content before privacy processing to a target receiving end.
The above describes the cloud-architecture-based user information management method in the embodiment of the present application, and the following describes the cloud-architecture-based user information management apparatus in the embodiment of the present application.
Referring to fig. 2, an embodiment of a cloud-based user information management apparatus is described in the embodiment of the present application, and may include:
a detection unit 201 for detecting status information of a regular check-in registration apparatus;
202, a sending unit, configured to, in a case where the state information indicates that the conventional check-in registration device is in a failure state, send a check-in registration link by a target client;
and the acquisition unit 203 is used for acquiring the personal registration information which is input by the target client based on the check-in registration link.
According to the cloud-based user information management apparatus provided in the above embodiment, by detecting the state information of the conventional check-in registration device; when the state information indicates that the conventional check-in registration equipment is in a fault state, the target client sends a check-in registration link; and acquiring personal registration information which is input by the target client based on the check-in registration link. In the hospitality industry, check-in guests are often required. Generally, a special conventional check-in registration device is provided in a hotel, a server can monitor the state information of the conventional check-in registration device, and can send a check-in registration link to a target client of a guest when the conventional check-in registration device is in a failure state and the guest needs to register information. Therefore, the guest can use the existing intelligent terminal to complete the input of personal information for check-in and registration. The problem of special intelligent terminal and the application program of trade can not in time maintain or change after breaking down, cause very big influence to the normal working process of the trade user who uses these special intelligent terminal of customization is solved.
Fig. 2 above describes the cloud infrastructure-based user information management apparatus in the embodiment of the present application from the perspective of a modular functional entity, and the following describes the system resource management apparatus in the embodiment of the present application in detail from the perspective of hardware processing, referring to fig. 3, an embodiment of a cloud infrastructure-based user information management apparatus 300 in the embodiment of the present application includes:
an input device 301, an output device 302, a processor 303 and a memory 304, wherein the number of the processor 303 may be one or more, and one processor 303 is taken as an example in fig. 3. In some embodiments of the present application, the input device 301, the output device 302, the processor 303 and the memory 304 may be connected by a bus or other means, wherein fig. 3 illustrates the connection by the bus.
Wherein, by calling the operation instruction stored in the memory 304, the processor 303 is configured to perform the following steps:
detecting state information of conventional check-in registration equipment;
when the state information indicates that the conventional check-in registration equipment is in a fault state, the target client sends a check-in registration link;
and acquiring personal registration information which is input by the target client based on the check-in registration link.
Optionally, the method further includes:
acquiring the position information of the intelligent terminal where the target client is located, which is reported by the target client based on the check-in registration link;
acquiring target hotel information matched with the position information;
associating the target hotel information to the personal registration information.
Optionally, the method further includes:
acquiring user information of a user to which the intelligent terminal belongs based on the identification information of the intelligent terminal;
and generating alarm information under the condition that the user information is not matched with the personal registration information input by the target client based on the check-in registration link.
Optionally, the method further includes:
and sending the alarm information to an administrator terminal to which the target hotel information belongs.
Optionally, the method further comprises:
under the condition that the target client is detected to be in an information input state, starting a front-facing imaging device of a terminal to which the target client belongs to obtain the current distance between the terminal and the face of a user;
determining that the current input state is a privacy risk input state under the condition that the current distance exceeds a preset distance range of the habit distance of the user;
and displaying the content input to the target client after carrying out privacy processing on the content based on the privacy risk input state, and sending the content before privacy processing to a target receiving end.
Optionally, the user habit distance is a habit distance of a user to which the target client belongs or habit distances of all users recorded by the cloud.
Optionally, the privacy processing the content input to the target client based on the privacy risk input state includes:
performing type analysis on the content input to the target client based on the privacy risk input state;
and under the condition that the type of the content of the target client is a preset type, carrying out blurring or character occupation display only or preset identification substitution processing on the content of the target client, then displaying the content, and sending the content before privacy processing to a target receiving end.
The processor 303 is also configured to perform any of the methods in the corresponding embodiments of fig. 1 by calling the operation instructions stored in the memory 304.
Referring to fig. 4, fig. 4 is a schematic view of an embodiment of an electronic device according to an embodiment of the present disclosure.
As shown in fig. 4, an electronic device 400 according to an embodiment of the present application includes a memory 410, a processor 420, and a computer program 411 stored in the memory 420 and running on the processor 420, where the processor 420 executes the computer program 411 to implement the following steps:
detecting state information of conventional check-in registration equipment;
when the state information indicates that the conventional check-in registration equipment is in a fault state, the target client sends a check-in registration link;
and acquiring personal registration information which is input by the target client based on the check-in registration link.
Optionally, the method further includes:
acquiring the position information of the intelligent terminal where the target client is located, which is reported by the target client based on the check-in registration link;
acquiring target hotel information matched with the position information;
associating the target hotel information to the personal registration information.
Optionally, the method further includes:
acquiring user information of a user to which the intelligent terminal belongs based on the identification information of the intelligent terminal;
and generating alarm information under the condition that the user information is not matched with the personal registration information input by the target client based on the check-in registration link.
Optionally, the method further includes:
and sending the alarm information to an administrator terminal to which the target hotel information belongs.
Optionally, the method further comprises:
under the condition that the target client is detected to be in an information input state, starting a front-facing imaging device of a terminal to which the target client belongs to obtain the current distance between the terminal and the face of a user;
determining that the current input state is a privacy risk input state under the condition that the current distance exceeds a preset distance range of the habit distance of the user;
and displaying the content input to the target client after carrying out privacy processing on the content based on the privacy risk input state, and sending the content before privacy processing to a target receiving end.
Optionally, the user habit distance is a habit distance of a user to which the target client belongs or habit distances of all users recorded by the cloud.
Optionally, the privacy processing the content input to the target client based on the privacy risk input state includes:
performing type analysis on the content input to the target client based on the privacy risk input state;
and under the condition that the type of the content of the target client is a preset type, carrying out blurring or character occupation display only or preset identification substitution processing on the content of the target client, then displaying the content, and sending the content before privacy processing to a target receiving end.
In a specific implementation, when the processor 420 executes the computer program 411, any of the embodiments corresponding to fig. 1 may be implemented.
Since the electronic device described in this embodiment is a device used for implementing a user information management apparatus based on a cloud architecture in this embodiment, based on the method described in this embodiment, a person skilled in the art can understand a specific implementation manner of the electronic device of this embodiment and various variations thereof, so that how to implement the method in this embodiment by the electronic device is not described in detail herein, and as long as the person skilled in the art implements the device used for implementing the method in this embodiment, the device falls within the scope of protection intended by this application.
Referring to fig. 5, fig. 5 is a schematic diagram illustrating an embodiment of a computer-readable storage medium according to the present application.
As shown in fig. 5, the present embodiment provides a computer-readable storage medium 500 having a computer program 511 stored thereon, the computer program 511 implementing the following steps when executed by a processor:
detecting state information of conventional check-in registration equipment;
when the state information indicates that the conventional check-in registration equipment is in a fault state, the target client sends a check-in registration link;
and acquiring personal registration information which is input by the target client based on the check-in registration link.
Optionally, the method further includes:
acquiring the position information of the intelligent terminal where the target client is located, which is reported by the target client based on the check-in registration link;
acquiring target hotel information matched with the position information;
associating the target hotel information to the personal registration information.
Optionally, the method further includes:
acquiring user information of a user to which the intelligent terminal belongs based on the identification information of the intelligent terminal;
and generating alarm information under the condition that the user information is not matched with the personal registration information input by the target client based on the check-in registration link.
Optionally, the method further includes:
and sending the alarm information to an administrator terminal to which the target hotel information belongs.
Optionally, the method further comprises:
under the condition that the target client is detected to be in an information input state, starting a front-facing imaging device of a terminal to which the target client belongs to obtain the current distance between the terminal and the face of a user;
determining that the current input state is a privacy risk input state under the condition that the current distance exceeds a preset distance range of the habit distance of the user;
and displaying the content input to the target client after carrying out privacy processing on the content based on the privacy risk input state, and sending the content before privacy processing to a target receiving end.
Optionally, the user habit distance is a habit distance of a user to which the target client belongs or habit distances of all users recorded by the cloud.
Optionally, the privacy processing the content input to the target client based on the privacy risk input state includes:
performing type analysis on the content input to the target client based on the privacy risk input state;
and under the condition that the type of the content of the target client is a preset type, carrying out blurring or character occupation display only or preset identification substitution processing on the content of the target client, then displaying the content, and sending the content before privacy processing to a target receiving end.
In a specific implementation, the computer program 511 may implement any of the embodiments corresponding to fig. 1 when executed by a processor.
It should be noted that, in the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to relevant descriptions of other embodiments for parts that are not described in detail in a certain embodiment.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
An embodiment of the present application further provides a computer program product, where the computer program product includes computer software instructions, and when the computer software instructions are run on a processing device, the processing device is caused to execute a flow in the cloud-architecture-based user information management method in the embodiment corresponding to fig. 1.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. A user information management method based on a cloud architecture is characterized by comprising the following steps:
detecting state information of conventional check-in registration equipment;
when the state information indicates that the conventional check-in registration equipment is in a fault state, the target client sends a check-in registration link;
and acquiring personal registration information which is input by the target client based on the check-in registration link.
2. The method of claim 1, further comprising:
acquiring the position information of the intelligent terminal where the target client is located, which is reported by the target client based on the check-in registration link;
acquiring target hotel information matched with the position information;
associating the target hotel information to the personal registration information.
3. The method of claim 2, further comprising:
acquiring user information of a user to which the intelligent terminal belongs based on the identification information of the intelligent terminal;
and generating alarm information under the condition that the user information is not matched with the personal registration information input by the target client based on the check-in registration link.
4. The method of claim 3, further comprising:
and sending the alarm information to an administrator terminal to which the target hotel information belongs.
5. The method of claim 1, further comprising:
under the condition that the target client is detected to be in an information input state, starting a front-facing imaging device of a terminal to which the target client belongs to obtain the current distance between the terminal and the face of a user;
determining that the current input state is a privacy risk input state under the condition that the current distance exceeds a preset distance range of the habit distance of the user;
and displaying the content input to the target client after carrying out privacy processing on the content based on the privacy risk input state, and sending the content before privacy processing to a target receiving end.
6. The method according to claim 5, wherein the user habit distance is a habit distance of a user to which the target client belongs or habit distances of all users recorded in a cloud.
7. The method of claim 5, wherein the privacy processing of the content input to the target client based on the privacy risk input state comprises:
performing type analysis on the content input to the target client based on the privacy risk input state;
and under the condition that the type of the content of the target client is a preset type, carrying out blurring or character occupation display only or preset identification substitution processing on the content of the target client, then displaying the content, and sending the content before privacy processing to a target receiving end.
8. A user information management apparatus based on a cloud architecture, comprising:
a detection unit for detecting status information of a conventional check-in registration apparatus;
a sending unit, configured to send a check-in registration link by a target client when the state information indicates that the conventional check-in registration device is in a failure state;
and the acquisition unit is used for acquiring the personal registration information which is input by the target client based on the check-in registration link.
9. An electronic device comprising a memory, a processor, wherein the processor is configured to implement the steps of the cloud infrastructure-based user information management method according to any one of claims 1 to 7 when executing a computer program stored in the memory.
10. A computer-readable storage medium having stored thereon a computer program, characterized in that: the computer program when executed by a processor implements the steps of the cloud infrastructure based user information management method of any of claims 1 to 7.
CN202111660317.4A 2021-12-30 2021-12-30 User information management method based on cloud architecture and related equipment Active CN114386097B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111660317.4A CN114386097B (en) 2021-12-30 2021-12-30 User information management method based on cloud architecture and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111660317.4A CN114386097B (en) 2021-12-30 2021-12-30 User information management method based on cloud architecture and related equipment

Publications (2)

Publication Number Publication Date
CN114386097A true CN114386097A (en) 2022-04-22
CN114386097B CN114386097B (en) 2023-05-02

Family

ID=81199268

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111660317.4A Active CN114386097B (en) 2021-12-30 2021-12-30 User information management method based on cloud architecture and related equipment

Country Status (1)

Country Link
CN (1) CN114386097B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104284360A (en) * 2014-10-21 2015-01-14 中国联合网络通信集团有限公司 P-CSCF fault processing method and system
CN106156925A (en) * 2015-04-13 2016-11-23 上海易逸信息技术有限公司 Reception counter of hotel cloud intelligent service system
CN109165756A (en) * 2018-07-02 2019-01-08 浙江深大智能科技有限公司 Intelligent hotel IOT control system
CN110110557A (en) * 2019-04-02 2019-08-09 努比亚技术有限公司 A kind of method, apparatus and computer readable storage medium of anti-screen message leakage

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104284360A (en) * 2014-10-21 2015-01-14 中国联合网络通信集团有限公司 P-CSCF fault processing method and system
CN106156925A (en) * 2015-04-13 2016-11-23 上海易逸信息技术有限公司 Reception counter of hotel cloud intelligent service system
CN109165756A (en) * 2018-07-02 2019-01-08 浙江深大智能科技有限公司 Intelligent hotel IOT control system
CN110110557A (en) * 2019-04-02 2019-08-09 努比亚技术有限公司 A kind of method, apparatus and computer readable storage medium of anti-screen message leakage

Also Published As

Publication number Publication date
CN114386097B (en) 2023-05-02

Similar Documents

Publication Publication Date Title
US10404642B2 (en) Message notification method, system, and device for a communication account
US11349767B2 (en) Device and method for disabling a WLAN hotspot based on data traffic value
CN106161060B (en) Data monitoring method and device
US20130186956A1 (en) Acquiring information dynamically regarding a hardware component in the cloud computing system while on the floor of the data center
CN111343424B (en) Monitoring system and method for online bid evaluation
CN108830093B (en) Management method of terminal equipment operation authority, server and terminal equipment
CN109041267B (en) Network connection fault processing method and device and electronic equipment
CN109343944B (en) Data processing method and device for eSIM card, terminal and storage medium
CN109495350B (en) Office data checking method, office data checking device and storage medium
CN105634882B (en) Network access equipment sharing method, device and system
CN104184730B (en) Access processing method and device, electronic equipment
CN105074678B (en) Information terminal, access system, information processing method and program
CN107346197B (en) Information display method and device
CN114386097B (en) User information management method based on cloud architecture and related equipment
CN108920328B (en) Method and device for discovering terminal application change
CN106376096B (en) Wireless network connection method and equipment thereof
CN105516394B (en) Dns address management method and terminal
CN111400549B (en) User portrait processing method and system
CN110753034B (en) Authority management method and related device
CN106878982B (en) Data dialing method and system
US11106527B2 (en) Hardware error corrections based on policies
CN112711517A (en) Server performance monitoring method and device, storage medium and terminal
CN106713058B (en) Test method, device and system based on cloud card resources
CN111736859A (en) Version updating method of operating system, server and terminal
CN107395673B (en) User risk notification method and system and storage device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231219

Address after: 610096 No. 1, floor 1, building 1, No. 4, Keyuan Third Road, high tech Zone, Chengdu, Sichuan

Patentee after: SICHUAN AISINO Co.,Ltd.

Patentee after: SICHUAN AISINO AEROSPACE INFORMATION Co.,Ltd.

Address before: 610095 No. 17, floor 6, building 3, No. 66, Tianfu 4th Street, Chengdu hi tech Zone, China (Sichuan) pilot Free Trade Zone, Chengdu, Sichuan

Patentee before: SICHUAN AISINO AEROSPACE INFORMATION Co.,Ltd.

TR01 Transfer of patent right