CN114547665A - User information management method, device, computer equipment and storage medium - Google Patents

User information management method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN114547665A
CN114547665A CN202011337576.9A CN202011337576A CN114547665A CN 114547665 A CN114547665 A CN 114547665A CN 202011337576 A CN202011337576 A CN 202011337576A CN 114547665 A CN114547665 A CN 114547665A
Authority
CN
China
Prior art keywords
user information
information
verification
user
privacy space
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011337576.9A
Other languages
Chinese (zh)
Inventor
程冉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202011337576.9A priority Critical patent/CN114547665A/en
Publication of CN114547665A publication Critical patent/CN114547665A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application relates to a user information management method, a user information management device, computer equipment and a storage medium. The method comprises the following steps: acquiring a user information acquisition request aiming at a target user object; determining the current functional state information of the privacy space corresponding to the target user object according to the user information acquisition request; when the functional state information represents that the privacy space is in an open state, a verification interface is displayed; and acquiring verification information through the verification interface, responding to the user information acquisition request after the verification information passes verification, and reading and outputting target user information from the privacy space. By adopting the method, the privacy and the safety of the user can be protected, and the efficiency of the application program for binding the user information can be improved.

Description

User information management method, device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for managing user information, a computer device, and a storage medium.
Background
With the development of computer technology, users can handle various transactions conveniently through application programs with various functions running on mobile terminals. For example, social contact is made online through a social application, shopping online through a shopping application, money transfer is made through a banking application, government affairs are transacted through a government affairs service application, etc.
Generally, when the application is used to transact a corresponding transaction, the application needs to bind user information in advance, such as identity information, address information, or bank card information of the bound user. Currently, a user usually stores own user information to a local mobile terminal in a form of characters or pictures, and when the user information is bound to an application program, the locally stored user information is manually acquired and then input into the application program to realize the binding with the application program.
However, the above manner of binding the user information by the application program is cumbersome to operate, which results in low efficiency of binding the user information by the application program.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a user information management method, apparatus, computer device and storage medium capable of improving efficiency of binding user information by an application program.
A method of user information management, the method comprising:
acquiring a user information acquisition request aiming at a target user object;
determining the current functional state information of the privacy space corresponding to the target user object according to the user information acquisition request;
when the functional state information represents that the privacy space is in an open state, a verification interface is displayed;
and acquiring verification information through the verification interface, responding to the user information acquisition request after the verification information passes verification, and reading and outputting target user information from the privacy space.
A user information management apparatus, characterized in that the apparatus comprises:
the request acquisition module is used for acquiring a user information acquisition request aiming at a target user object;
a function state information determining module, configured to determine, according to the user information acquisition request, current function state information of a privacy space corresponding to the target user object;
the verification interface display module is used for displaying a verification interface when the functional state information represents that the privacy space is in an open state;
and the information output module is used for acquiring verification information through the verification interface, responding to the user information acquisition request after the verification information passes verification, and reading and outputting target user information from the privacy space.
In one embodiment, the function status information determining module is further configured to: acquiring a state identifier corresponding to the target user object and stored by a server according to the user information acquisition request; and determining the current functional state information of the privacy space of the local terminal corresponding to the target user object based on the state identifier.
In one embodiment, the apparatus further comprises a privacy space management module to: entering a privacy space management page, wherein the privacy space management page displays the current functional state information of the privacy space; responding to a function state switching operation triggered by the privacy space management page, and switching the current function state of the privacy space; and correspondingly adjusting the current functional state information displayed by the privacy space management page based on the switched functional state.
In one embodiment, the apparatus further comprises a user information management module configured to: displaying a user information management interface; the user information management interface comprises a user information adding control and a user information reading control, the user information adding control is used for triggering addition of user information to the privacy space, and the user information reading control is used for triggering reading of the user information from the privacy space.
In one embodiment, the user information management module is further configured to: responding to the triggering operation of the user information adding control, and displaying a user information adding page; and acquiring the user information input on the user information adding page, and storing the user information to a privacy space corresponding to the target user object.
In one embodiment, the user information adding page shows at least one selectable user information type, and the user information management module is further configured to: responding to the selection operation of a target user information type in the user information types, and determining a target information acquisition mode corresponding to the target user information type; and sequentially collecting the user information belonging to the target user information type according to the target information collection mode.
In one embodiment, the information output module is further configured to: after the verification information passes verification, displaying a user information selection page; the user information selection page displays at least one selectable user information type; responding to a selection operation generated in the user information selection page, and determining a target user information type pointed by the selection operation; and responding to the user information acquisition request, reading target user information corresponding to the target user information type from the privacy space and outputting the target user information.
In one embodiment, the apparatus further comprises a verification setting module, the verification setting module is configured to: when the privacy space is started for the first time, a verification setting interface is displayed; acquiring verification setting information through the verification setting interface; responding to the triggered verification setting completion operation on the verification setting interface, and storing the verification setting information; and the stored verification setting information is used for verifying the acquired verification information.
A computer program comprising computer instructions stored in a computer readable storage medium, the computer instructions being read from the computer readable storage medium by a processor of a computer device, the processor executing the computer instructions, causing the computer device to perform the steps in the user information management method.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
acquiring a user information acquisition request aiming at a target user object;
determining the current functional state information of the privacy space corresponding to the target user object according to the user information acquisition request;
when the functional state information represents that the privacy space is in an open state, a verification interface is displayed;
and acquiring verification information through the verification interface, responding to the user information acquisition request after the verification information passes verification, and reading and outputting target user information from the privacy space.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
acquiring a user information acquisition request aiming at a target user object;
determining the current functional state information of the privacy space corresponding to the target user object according to the user information acquisition request;
when the functional state information represents that the privacy space is in an open state, a verification interface is displayed;
and acquiring verification information through the verification interface, responding to the user information acquisition request after the verification information passes verification, and reading and outputting target user information from the privacy space.
The user information management method, the device, the computer equipment and the storage medium uniformly store the user information of the target user object into the privacy space in advance, when the user information aiming at the target user object needs to be acquired, the current function state information of the privacy space corresponding to the target user object is determined according to the user information acquisition request, when the function state information represents that the privacy space is in an open state, the verification interface is displayed, the verification information is acquired through the displayed verification interface, after the verification information passes the verification, the target user information is read and output from the privacy space in response to the acquired user information acquisition request, when the user information is bound to the application program, the user information request is triggered through the application program, and the user information can be read and output from the privacy space based on the method to realize the binding of the user information, therefore, the efficiency of binding the user information by the application program is improved. In addition, the user information of the target user object is uniformly stored in the privacy space, and the target user information in the privacy space can be acquired only when the privacy space is in an open state and the verification information passes the verification, so that the safety of user information management of the target user object is improved.
Drawings
FIG. 1 is a diagram of an application environment of a user information management method in one embodiment;
FIG. 2 is a flowchart illustrating a method for managing user information according to an embodiment;
FIG. 3A is a schematic diagram of a private account login prompt interface, under an embodiment;
FIG. 3B is a schematic diagram of a privacy account login interface in one embodiment;
FIG. 4 is a diagram of an information collection interface presented by an application in one embodiment;
FIG. 5 is a schematic diagram of a verification interface in one embodiment;
FIG. 6 is a user information selection page in one embodiment;
FIG. 7 is a schematic diagram of a user information presentation interface in one embodiment;
FIG. 8 is a schematic diagram of a private space management interface in one embodiment;
FIG. 9 is a schematic diagram of a private space management interface in another embodiment;
FIG. 10 is a schematic diagram of a user information management interface in one embodiment;
FIG. 11 is a diagram of a first user information add sub-page in one embodiment;
FIG. 12 is a diagram illustrating a second user information add sub-page, under an embodiment;
FIG. 13 is a diagram illustrating an example sub-page of user information additions for account information types;
FIG. 14 is a diagram illustrating a user information add sub-page of address information types in one embodiment;
FIG. 15 is a schematic diagram of a face acquisition interface in one embodiment;
FIG. 16 is a schematic diagram of a face acquisition interface in another embodiment;
FIG. 17 is a schematic diagram of a verification information input interface in one embodiment;
FIG. 18 is a diagram of a verification setup prompt interface, according to an embodiment;
FIG. 19 is a schematic diagram of a verification setup interface in one embodiment;
FIG. 20 is a flowchart illustrating a user information management method according to another embodiment;
FIG. 21 is a flow diagram that illustrates the use of the privacy space function in one embodiment;
FIG. 22 is a schematic diagram of a process for adding user information to a privacy bag, under an embodiment;
FIG. 23 is a schematic flow diagram illustrating the use of user information in a privacy package in one embodiment;
FIG. 24 is a block diagram showing the construction of a user information management apparatus according to an embodiment;
FIG. 25 is a diagram showing an internal structure of a computer device in one embodiment;
fig. 26 is an internal structural view of a computer device in another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The user information management method provided by the application can be applied to the application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The user information management method provided by the embodiments of the present application may be cooperatively executed by the terminal 102 and the server 104, or may be executed by the terminal 102 or the server 104 alone. Taking the example of being executed independently on the terminal 102, the terminal 102 acquires a user information acquisition request for a target user object; determining the current functional state information of a privacy space corresponding to a target user object according to the user information acquisition request; when the functional state information represents that the privacy space is in an open state, displaying a verification interface; and acquiring verification information through the verification interface, responding to the user information acquisition request after the verification information passes the verification, and reading and outputting target user information from the privacy space. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 104 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as cloud services, a cloud database, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, a CDN, and big data and artificial intelligence platforms. The terminal may be, but is not limited to, a smart phone, a tablet computer, a laptop computer, a desktop computer, a smart speaker, a smart watch, and the like. The terminal and the server may be directly or indirectly connected through wired or wireless communication, and the application is not limited herein.
In an embodiment, as shown in fig. 2, a user information management method is provided, which is described by taking an example that the method is applied to a computer device (the computer device may specifically be a terminal or a server in fig. 1), and includes the following steps:
step S202, a user information acquisition request for the target user object is acquired.
The target user object may be a computer user or a natural person, and the user information obtaining request carries a user identifier of the target user object, so as to distinguish the target user object from other user objects. The user information obtaining request is used for obtaining user information of the target user object, and the user information may specifically include different types of information such as an identity information type, an account information type, an address information type, or a certificate information type. The user information belonging to the type of identity information may be certificate information, such as identification card information, passport information, or driver's license information, etc., which can prove the identity of the target user object. The user information belonging to the account information type may be account information, and specifically may be financial account information, mobile application account information, social forum account information, or the like. The address information may be address information related to the target user object, such as home address information, or company address information, etc. The user information belonging to the certificate information type may be certificate information capable of certifying the ability of the target user object, such as academic certificate information, or skill certificate information of different professional fields, or the like.
Specifically, a user triggers a user information acquisition operation through a terminal, the terminal generates a user information acquisition request in response to the user information acquisition operation, when the computer device is the terminal, the terminal directly acquires the generated user information acquisition request, when the computer device is the server, the terminal sends the generated user information acquisition request to the server, and the server receives the user information acquisition request sent by the terminal.
In one embodiment, the process of the terminal generating the user information acquisition request in response to the user information acquisition operation is that the terminal reads the user identifier of the target user object corresponding to the terminal in response to the user information acquisition operation, and generates the user information acquisition request carrying the user identifier of the target user object based on the user identifier. The user identifier of the target user object corresponding to the terminal is an account identifier of a privacy account corresponding to the target user object, the account identifier may be a user name or an account ID, and the privacy account may be a system user account logged in a current terminal system setting application or a user account currently logged in by a privacy application running on the terminal.
In one embodiment, step S202 specifically includes the following steps: displaying a private account login interface; obtaining login information of a target user object through a privacy account login interface; and after the login information is verified, generating a user information acquisition request aiming at the target user object.
The privacy account login interface is used for acquiring login information of a privacy space input by a user, the login information comprises an account identifier and a corresponding account password, the account password can be a character password or a biological characteristic password, and the biological characteristic password can be a fingerprint password, a face password or a voice password.
Specifically, if the account password is preset as the character password, the account input box and the character input box are directly displayed on the private account login interface, and after a user inputs an account identifier and an account password in the account input box and the character input box and triggers login operation, the terminal directly acquires the account identifier and the account password input by the user; if the account password is preset as the biological characteristic password, the biological characteristic acquisition control is displayed on the login interface of the privacy account, the terminal calls the corresponding biological characteristic acquisition device to acquire the biological characteristic information based on the trigger operation of the user on the biological characteristic acquisition control, and for example, when the biological characteristic password is the face password, the terminal starts the camera to acquire the face information of the user.
In one embodiment, before displaying the privacy account login interface, the computer device displays a privacy account login prompt interface, wherein login prompt information and a link address corresponding to the privacy account login interface are displayed in the privacy account login prompt interface, and the computer device enters the privacy account login interface in response to a link access operation triggered by the privacy account login prompt interface.
For example, fig. 3A is a schematic diagram of a privacy account login prompt interface in an embodiment, and fig. 3B is a schematic diagram of a privacy account login interface in an embodiment, where the privacy space login interface includes an account input box 302, a character input box 304, and a login control 306, a user triggers the login control 306 after inputting an account identifier and an account password through the account input box 302 and the character input box 304, the terminal obtains the account identifier and the account password input by the user in response to a triggering operation of the login control 306 by the user, and sends the obtained account identifier and the obtained account password to the server, the server verifies the account identifier and the account password, and returns a verification result to the terminal, and if the verification is passed, the terminal generates a user information obtaining request for a target user object.
In another embodiment, step S202 specifically includes the following steps: displaying an information acquisition page through an application program running on a terminal; and responding to the user information acquisition operation triggered by the information acquisition page, and generating a user information acquisition request aiming at the target user object.
The application program running on the terminal is an application program other than a system setting application or a privacy application, and specifically may be an application program that needs to bind user information, such as a bank application program that needs to bind bank account information of a target user object, a government affairs service application program that needs to bind identity information of the target user object, and a shopping application program that needs to bind payment account information and address information of a user. The information acquisition page is used for acquiring user information required to be bound by the application program, the information acquisition page is displayed with a user information acquisition control, and a user of the user information acquisition control triggers user information acquisition operation.
Specifically, when an application program running on a terminal needs to bind user information, an information acquisition interface is displayed through the application program running on the terminal, a user information acquisition control is displayed on the information acquisition interface, and after a user triggers the user information acquisition control, a user information acquisition request for a target user object is generated in response to the triggering operation of the user on the user information acquisition control.
For example, fig. 4 is a schematic diagram of an information acquisition interface displayed by an application program in an embodiment, where an input box 402 capable of directly inputting user information and a user information acquisition control 404 are displayed in the user information acquisition interface, the user information can be directly input through the input box 402, a user information acquisition operation can be triggered through the user information acquisition control 404, and a terminal generates a user information acquisition request for a target user object in response to a triggering operation of the user information acquisition control 404.
In one embodiment, the terminal responds to the user information acquisition operation triggered by the information acquisition page, and the generation of the user information acquisition request for the target user object comprises the following steps: the terminal responds to user information acquisition operation triggered on an information acquisition interface, determines a target user information type of target user information to be acquired by a displayed information acquisition page, and generates a user information acquisition request based on the user information type and a user identifier of a target user object, so that the user information acquisition request carrying the target user information type and the user identifier of the target user object is generated. Wherein the target user information type is used to obtain the target user information from the private space.
Specifically, the terminal may determine the target user information type of the target user information to be acquired based on the application program corresponding to the information acquisition interface, for example, if the application program corresponding to the information acquisition interface is a bank application program, the user information type of the target user information to be acquired is an account information type.
Step S204, according to the user information acquisition request, determining the current function state information of the privacy space corresponding to the target user object.
The user information obtaining request carries a user identifier of the target user object, or carries the user identifier of the target user object and the target user information type. The privacy space is used for storing user information of the target user object. The functional state information represents the current use state of the privacy space, when the functional state information represents that the privacy space is in an open state, the current use state of the privacy space is determined, pre-stored user information can be read from the privacy space, when the functional state information represents that the privacy space is in a closed state, the current use state of the privacy space is determined, and when the privacy space is in a non-use state, the user information cannot be read from the privacy space no matter whether the user information is stored in the privacy space or not. The privacy space can be local to the terminal or the server, and the privacy space state information can also be stored in the terminal or the server. It can be understood that when the privacy space is local to the terminal, the state information of the privacy space may be stored locally to the terminal or in the server, and when the privacy space is local to the server, the state information of the privacy space may also be stored locally to the terminal or in the server.
Specifically, when the state information of the privacy space is stored locally in the terminal and the computer device is the terminal, after the terminal acquires the user information acquisition request, the current function state information of the privacy space of the target user object is directly read locally from the terminal according to the user information acquisition request; when the state information of the privacy space is stored in the server and the computer equipment is the server, after the server acquires the user information acquisition request, searching the current function state information of the privacy space of the target user object according to the user identification carried in the user information acquisition request; when the state information of the privacy space is stored in the local terminal and the computer equipment is a server, the terminal directly reads the current function state information of the privacy space of a target user object from the local terminal according to the user information acquisition request after generating the user information acquisition request, and sends the current function state information of the privacy space and the user information acquisition request to the server; when the privacy space state information is stored in the server and the computer equipment is the terminal, the terminal generates a user information acquisition request and then sends the user information acquisition request to the server, the server searches the current function state information of the privacy space of a target user object based on a user identifier carried in the user information acquisition request and returns the searched function state information of the privacy space to the terminal, and therefore the terminal obtains the current function state information of the privacy space corresponding to the target user object.
In one embodiment, step S204 specifically includes the following steps: acquiring a state identifier corresponding to a target user object, which is stored by a server, according to a user information acquisition request; and determining the current functional state information of the privacy space local to the terminal corresponding to the target user object based on the state identifier.
The state identifier may be a character sequence with preset digits and is used to identify a current functional state of the privacy space of the target user object, and a corresponding relationship exists between the state identifier and the functional state information. The state identifier may include a state portion and a verification portion, where a character corresponding to the state portion is used to identify a current functional state of the privacy space of the target user object, a character corresponding to the verification portion is verification setting information preset by the user, and the verification setting information is used to verify verification information input by the user. For example, the status flags are "00-FFFF", "00-5897", and "11-5897", where "00" indicates that the privacy space is in the off state, "11" indicates that the privacy space is in the on state, "FFFF" indicates that the user does not set the verification setting information, and "5897" indicates the verification setting information set by the user.
Specifically, the computer device locally reads the stored state identifier corresponding to the user identifier or the terminal identifier from the server or the terminal according to the user identifier of the target user object in the acquired user information acquisition request, and determines the function state information corresponding to the state identifier based on the corresponding relationship between the state identifier locally stored by the server or the terminal and the function state information.
And step S206, when the functional state information represents that the privacy space is in the open state, displaying a verification interface.
The verification interface is used for acquiring verification information input by a user, the verification information is information input by the user and used for verifying user authority, and the user authority specifically refers to authority for acquiring user information of a target user object.
Specifically, when the functional state information represents that the privacy space is currently in an open state, the computer device directly generates a verification interface, and displays the generated verification interface through the terminal. When the functional state information represents that the privacy space is currently in a closed state, the privacy space management page is entered, and the privacy space management interface is used for managing the current functional state of the privacy space, for example, switching the current functional state of the privacy space from the closed state to an open state.
In one embodiment, the verification interface is matched with user verification setting information preset by a user, after the computer device determines that the privacy space is in the open state at present, the computer device acquires the user verification setting information preset by the user, generates a verification interface matched with the information type, and displays the generated verification interface through the terminal. Wherein, the user verification setting information can be character verification information, face verification information, voice verification information or fingerprint verification information, etc., a character information input box or an information acquisition control part is displayed in the verification interface matched with the user verification setting information, the information input box is used for inputting character verification information, the information acquisition control part is used for triggering verification information acquisition operation, the information input box can be a character input box, the information acquisition control part can be a face acquisition control part, a sound acquisition control part or a fingerprint acquisition control part, for example, the character information input box is displayed in the verification interface matched with the character verification information, the face collection control is displayed in the verification interface matched with the face verification information, the sound collection control is displayed in the verification interface matched with the sound verification information, and the fingerprint collection control is displayed in the verification interface matched with the fingerprint verification information.
For example, fig. 5 is a schematic diagram of a verification interface in an embodiment, a character information input box 502 and a confirmation control 504 are shown in the schematic diagram of the verification interface, after a user inputs character verification information through the character information input box 502, the confirmation control 504 is triggered to complete submission of the verification information, and the terminal obtains the character verification information input through the character information input box 502 based on a triggering operation of the user on the confirmation control 504, so as to verify the verification information.
And step S208, acquiring verification information through the verification interface, responding to the user information acquisition request after the verification information passes the verification, and reading and outputting the target user information from the privacy space.
The target user information is user information matched with the user information acquisition request in the user information stored in the privacy space, and may specifically be user information matched with the type of the target user information in the user information acquisition request.
Specifically, after the computer device obtains the verification information input by the user through the verification interface, the verification information input by the user is verified based on the pre-stored verification setting information, specifically, whether the verification information is matched with the verification setting information is judged, if so, the verification is determined to be passed, and if not, the verification is determined to be passed differently. When the verification information is character verification information, if the verification information is the same as the verification setting information, determining that the verification information is matched with the verification setting information; when the verification information is face verification information, voice verification information or fingerprint verification information, if the similarity between the verification information and the verification setting information is greater than a preset similarity threshold value, the verification information is determined to be matched with the verification setting information.
In one embodiment, after obtaining the acquired verification information, the computer device extracts verification setting information from the state identifier corresponding to the target user object stored in the server, and verifies the verification information based on the extracted verification setting information.
In one embodiment, the user information obtaining request may further carry a target user information type of the target user information, and after the verification information passes the verification, the computer device reads and outputs the target user information, which is consistent with the target user information type in the user information obtaining request, from the privacy space in response to the user information obtaining request.
In one embodiment, step S208 specifically includes the following steps: after the verification information passes the verification, displaying a user information selection page; responding to a selection operation generated in the user information selection page, and determining a target user information type pointed by the selection operation; and responding to the user information acquisition request, reading target user information corresponding to the target user information type from the privacy space and outputting the target user information.
The user information selection interface displays at least one selectable user information type, wherein the user information type comprises an identity information type, an account information type, an address information type, a certificate information type and the like.
Specifically, after the check information is checked and passed, the computer device determines a user information type which can be selected by a user based on user information stored in a privacy space, generates a user information selection page based on the determined user information type, displays the generated user information selection interface through a terminal, displays the user information type which can be selected by the user in the user information selection interface, and allows the user to select the displayed user information type in the user information selection interface.
For example, fig. 6 is a user information selection page in an embodiment, and fig. 7 is a schematic view of a user information presentation interface in an embodiment, where user information types presented in the user information selection interface in fig. 6 include an identity information type 602, an account information type 604, and an address information type 606, and a computer device determines a target user information type to which a selection operation is directed in response to a selection operation occurring in the user information selection page, and when the target user information type is the identity information type 602, reads identity information from a privacy space in response to a user information acquisition request, and presents the read identity information 702 in the schematic view of the user information presentation interface shown in fig. 7.
In one embodiment, if the acquired verification information fails to pass the verification, the computer device directly clears the user information in the privacy space of the target user object, so that lawless persons are prevented from trying other technical means to acquire the user information from the privacy space, and the security of user information management of the target user object is improved.
In the user information management method, the computer device uniformly stores the user information of the target user object into the privacy space in advance, determines the current function state information of the privacy space corresponding to the target user object according to the user information acquisition request when the user information of the target user object needs to be acquired, displays the check interface when the function state information indicates that the privacy space is in an open state, acquires the check information through the displayed check interface, reads and outputs the target user information from the privacy space in response to the acquired user information acquisition request after the check information passes the check, triggers the user information request through the application program when the user information is bound to the application program, and further reads and outputs the user information from the privacy space based on the method to realize the binding of the user information, therefore, the efficiency of binding the user information by the application program is improved. In addition, the user information of the target user object is uniformly stored in the privacy space, and the target user information in the privacy space can be acquired only when the privacy space is in an open state and the verification information passes the verification, so that the safety of user information management of the target user object is improved.
In one embodiment, the user information management method further includes the following steps: entering a privacy space management page, wherein the privacy space management page displays the current functional state information of the privacy space; responding to a function state switching operation triggered by a privacy space management page, and switching the current function state of a privacy space; and correspondingly adjusting the current functional state information displayed by the privacy space management page based on the switched functional state.
The privacy space management interface is configured to manage a functional state of the privacy space, and specifically, the management of the functional state of the privacy space may be switching of a current functional state of the privacy space, for example, if the current functional state of the privacy space is an off state, the functional state of the privacy space may be switched from the off state to an on state, and if the current functional state of the privacy space is an on state, the functional state of the privacy space may be switched from the on state to the off state.
Specifically, after determining the current functional state information of the privacy space corresponding to the target user object, the computer device enters a privacy space management interface, displays the current functional state information of the privacy space through the privacy space management page, simultaneously displays a state switching control in the privacy space management interface, responds to the triggering operation of the state switching control, switches the current functional state of the privacy space to obtain the current latest functional state of the privacy space, and correspondingly adjusts the current functional state information displayed by the privacy space management page based on the current latest functional state of the privacy space.
For example, fig. 8 is a schematic diagram of a privacy space management interface in an embodiment, where current functional state information 802 and a functional state switching control 804 of a privacy space are shown in the privacy space interface, and when the functional state switching control 804 is triggered, the current functional state of the privacy space is switched in response to a triggering operation on the state switching control 804, and the current functional state information and the display of the state switching control shown on a privacy space management page are correspondingly adjusted, so as to obtain the privacy space management interface in another embodiment shown in fig. 9, where the functional state information 902 and the functional state switching control 904 are adjusted results.
In one embodiment, if the privacy space management page shows that the current functional state information of the privacy space represents that the privacy space is in a closed state and the privacy space is not used, the computer device responds to a trigger operation of a state switching control in the privacy space management page, displays a verification setting interface, so that a user can set verification setting information of the privacy space on the verification setting interface, switches the current functional state of the privacy space to an open state after the verification setting information is set, and correspondingly adjusts the current functional state information shown by the privacy space management page based on the current latest functional state of the privacy space.
In the above embodiment, after entering the privacy space management page displaying the current functional state information of the privacy space, the computer device switches the current functional state of the privacy space in response to the functional state switching operation triggered by the privacy space management page, and performs corresponding adjustment on the current functional state information displayed by the privacy space management page based on the switched functional state, so that convenience in managing the privacy space can be improved.
In one embodiment, the user information management method further includes the following steps: displaying a user information management interface; the user information management interface is used for managing user information stored in the privacy space, the user information management can be used for checking the user information or adding new user information, the user information management interface comprises a user information adding control and a user information reading control, the user information adding control is used for triggering the addition of the user information to the privacy space, and the user information reading control is used for triggering the reading of the user information from the privacy space.
Specifically, when the computer device determines that the privacy space is in an open state, the computer device enters a user information management interface, a user information adding control and a user information reading control are displayed in the user information management interface, the step of adding the user information is performed when the user information adding control is triggered, the step of displaying the verification interface is performed when the user information reading control is triggered, and S208 is performed.
In one embodiment, the step of entering into adding user information when the user information adding control is triggered comprises: and when the user information adding control is triggered, displaying a verification interface, acquiring verification information through the verification interface, and entering a step of adding user information after the verification information passes verification.
For example, fig. 10 is a schematic diagram of an embodiment of a user information management interface, in which a user information adding control 1002 and a user information reading control 1004 are displayed, the step of adding user information is entered when the user information adding control 1002 is triggered, when the user information reading control 1004 is triggered, the verification interface shown in fig. 5 is presented, the verification information is acquired through the verification interface, and after the verification information passes the verification, the user information selection page shown in figure 6 is entered, and in response to a selection operation occurring in the user information selection page, determining a target user information type to which the selection operation is directed, when the target user information type is the identity information type 602, in response to the user information acquisition request, the identity information is read from the privacy space, and the read identity information 702 is shown in the user information presentation interface shown in fig. 7.
In one embodiment, the user information management method further includes the following steps: responding to the triggering operation of the user information adding control in the user information management interface, and displaying a user information adding page; and acquiring the user information input on the user information adding page, and storing the user information to the privacy space corresponding to the target user object.
In one embodiment, the user information adding page may further display at least one selectable user information type for selection by a user, and the computer device obtaining the user information input on the user information adding page includes: responding to the selection operation of the target user information type in the user information types, and determining a target information acquisition mode corresponding to the target user information type; and sequentially collecting the user information belonging to the target user information type according to the target information collection mode.
Each user information type corresponds to a respective information acquisition mode, each information acquisition mode corresponds to at least one user information adding sub-page matched with the user information type, and the user information adding sub-pages corresponding to different user information types are different.
Specifically, after determining a target information acquisition mode corresponding to a target user information type, the computer device determines at least one user information adding sub-page corresponding to the target information acquisition mode, sequentially displays the user information adding sub-pages according to a preset display sequence of the user information adding sub-pages, and respectively acquires different parts of user information to be added through the displayed user information adding sub-pages, thereby acquiring complete user information belonging to the target user information type.
For example, fig. 11 is a first user information adding sub-page corresponding to an identity information type in an embodiment, fig. 12 is a second user information adding sub-page corresponding to an identity information type in the embodiment, where the first user information adding sub-page and the second user information adding sub-page respectively display first prompt information 1102 and second prompt information 1202, the first prompt information 1102 is used to prompt a user to enter a first part of the identity information, and the second prompt information 1202 is used to prompt the user to enter a second part of the identity information; fig. 13 is a user information adding sub-page corresponding to the account information type in one embodiment, where third prompt information 1302 and fourth prompt information 1304 are displayed in the user information adding sub-page, where the third prompt information is used to prompt a user to enter account information, and the fourth prompt information is used to prompt the user to enter account information that only belongs to a target user object; fig. 14 is a user information adding sub-page corresponding to the address information type in one embodiment, in which fifth prompt information 1402 is displayed, and the fifth prompt information 1402 prompts the user to input various address information related to the address, including name, contact phone, detailed address, and the like.
In one embodiment, if the target user information type determined by the computer device is an account information type, the computer device detects whether identity information of a target user object is stored in a current privacy space, and if so, determines an account information acquisition mode corresponding to the account information type in response to an account information type selection operation, and acquires account information according to the account information acquisition mode.
In the embodiment, the computer device displays the user information management interface comprising the user information adding control and the user information reading control, and the user information is added into the privacy space and read from the privacy space through the user information adding control and the user information reading control, so that convenience in user information management in the privacy space is improved.
In one embodiment, after collecting the user information belonging to the target user information type, the computer device further needs to perform identity authentication on the user before saving the user information in the privacy space corresponding to the target user object, and after the identity authentication is passed, performs the step of saving the user information in the privacy space corresponding to the target user object.
Specifically, when the target user information type is the identity information type, after the computer equipment acquires the identity information, a face acquisition interface is displayed on the terminal to prompt a user to acquire face information, meanwhile, the face information of the user is acquired through an image acquisition device on the terminal, a certificate face image in the acquired identity information is compared with the acquired face information, after the comparison is passed, a comparison result is displayed through the face acquisition interface, and the identity information is stored in a privacy space corresponding to the target user object. When the target user information type is the account information type, after the computer equipment acquires the account information, verification information is sent to a verification account associated with the account information through a business server corresponding to the account information, a verification information input interface is displayed at the terminal, verification information input by a user is acquired through the verification input interface, and after the verification information input by the user is verified, the acquired account information is stored in a privacy space corresponding to the target user object.
For example, fig. 15 is a schematic diagram of a face collection interface in an embodiment, after acquiring identity information based on the user information adding sub-page shown in fig. 11 and 12, the computer device enters the face collection interface shown in fig. 15, prompts the user to collect the face information through prompt information 1502 in the face collection interface, compares a certificate face image in the acquired identity information with the acquired face information, enters the face collection interface shown in fig. 16 after the comparison is passed, displays a comparison result 1602, and stores the identity information in a privacy space corresponding to a target user object.
Fig. 17 is a schematic diagram of an authentication information input interface in an embodiment, after account information is collected by the computer device based on the user information add sub-page shown in fig. 13, authentication information is sent to an authentication account associated with the account information through a service server corresponding to the account information, meanwhile, the authentication information input interface shown in fig. 17 is displayed on the terminal, a user may input authentication information in an authentication information input box 1702 in the authentication information input interface, the computer device acquires the authentication information input by the user through the authentication input interface, and after the authentication information input by the user passes, stores the acquired account information in a privacy space corresponding to a target user object.
In the above embodiment, the computer device may ensure that the user information stored in the privacy space is accurate user information belonging to the target user object by performing identity authentication on the user, thereby avoiding inaccuracy of the user information in the privacy space due to addition misoperation.
In one embodiment, the user information management method further includes the following steps: when the privacy space is started for the first time, a verification setting interface is displayed; acquiring verification setting information through a verification setting interface; responding to a verification setting completion operation triggered on a verification setting interface, and storing verification setting information; the stored verification setting information is used for verifying the acquired verification information.
The verification setting interface is used for acquiring verification setting information input by a user, and the verification setting information can be set to be character verification information, face verification information, voice verification information or fingerprint verification information and the like.
Specifically, when the privacy space is started for the first time, the computer device acquires device information of the terminal, generates a check setting interface based on device capacity, displays a check setting type matched with the device information of the terminal in the check setting interface, determines a target check setting type pointed by a selection operation in response to the selection operation occurring in the check setting interface, acquires check setting information based on a check setting mode corresponding to the target check setting type, and stores the check setting information in response to a check setting completion operation.
For example, fig. 18 is a schematic diagram of a verification setting prompt interface in an embodiment, fig. 19 is a schematic diagram of a verification setting interface in an embodiment, when a privacy space is initially enabled, the verification setting prompt interface is displayed through a terminal, a computer device enters the verification setting interface shown in fig. 19 in response to a trigger operation of a setting button 1802 in the verification setting prompt interface, a user can set verification setting information through the verification setting interface, and the computer device stores the verification setting information in response to a verification setting completion operation triggered in the verification setting interface.
In the above embodiment, when the privacy space is initially enabled, the computer device acquires the verification setting information through the displayed verification setting interface, and completes the operation in response to the verification setting triggered on the verification setting interface, and stores the verification setting information, so that when the user information acquisition request is acquired, the acquired verification information can be verified based on the verification setting information, and the target user information is read from the privacy space and output after the verification information passes verification, and convenience in use of the user information is also ensured while the security of the user information is improved.
In an embodiment, as shown in fig. 20, a user information management method is further provided, which is described by taking an example that the method is applied to a computer device (the computer device may specifically be the terminal or the server in fig. 1), and includes the following steps:
step S2002, the information collection page is displayed by the application program running on the terminal.
Step S2014 is to generate a user information acquisition request for the target user object in response to the user information acquisition operation triggered on the information acquisition page.
And step S2006, displaying a privacy account login interface.
Step S2008, obtaining login information of the target user object through the private account login interface.
Step S2010, after the login information is verified, generates a user information acquisition request for the target user object.
Step S2012, a state identifier corresponding to the target user object stored in the server is obtained according to the user information obtaining request.
And step S2014, determining the current functional state information of the local privacy space of the terminal corresponding to the target user object based on the state identifier.
Step S2016, when the functional state information represents that the privacy space is in an open state, displaying a user information management interface; the user information management interface comprises a user information adding control and a user information reading control, the user information adding control is used for triggering addition of user information to the privacy space, and the user information reading control is used for triggering reading of the user information from the privacy space.
Step S2018, responding to the triggering operation of the user information adding control, and displaying a user information adding page; the user information adding page is displayed with at least one selectable user information type.
Step S2020, in response to the selection operation of the target user information type in the user information types, determines a target information acquisition mode corresponding to the target user information type.
Step S2022, sequentially collecting user information belonging to the type of the target user information according to the target information collection mode.
Step S2024, responding to the trigger operation of the user information reading control, and displaying a verification interface.
Step S2026, acquiring verification information through a verification interface, and displaying a user information selection page after the verification information passes verification; the user information selection page is presented with at least one selectable user information type.
Step S2028, in response to the selection operation occurring in the user information selection page, determines a target user information type to which the selection operation is directed.
In step S2030, in response to the user information acquisition request, target user information corresponding to the type of the target user information is read from the privacy space and output.
The application also provides an application scene, and the application scene applies the user information management method. Specifically, the application of the user information management method in the application scenario is as follows:
fig. 21 is a flowchart illustrating a procedure of using a privacy space function in an embodiment, referring to fig. 21, when a user enters a privacy space (also referred to as a privacy packet) through a computer device, the computer device determines whether the user enters for the first time, that is, whether the privacy packet service is started for the first time, performs check password setting if the privacy packet service is started for the first time, determines whether user information is already stored in a current privacy packet if the privacy packet service is not started for the first time, and enters a procedure of adding user information to the privacy packet if the user information is not stored in the current privacy packet, and enters a procedure of using the user information in the privacy packet if the user information is already stored in the current privacy packet.
FIG. 22 is a flow diagram illustrating the addition of user information to a privacy bag in one embodiment, where the computer device collects corresponding user information based on a type of information for a destination selected by the user. When the target user information type is identity, scanning the identity card to acquire identity information, acquiring face information of a user after the identity information is obtained, comparing the face based on the face information and a face image in the identity information, if the face comparison is passed, adding the acquired identity information to the privacy packet, and prompting that the addition is successful, and if the face comparison is failed, refusing to add the acquired identity information to the privacy packet, and prompting that the addition is failed.
Fig. 23 is a flow diagram of using user information in a privacy bag, in one embodiment, after a computer device obtains a user information acquisition request for an application, obtaining current function state information of the privacy packet stored in the server, determining whether the privacy packet function is on based on the function state information, the current privacy packet function being in an on state, displaying a verification interface, acquiring a verification password input by a user through the verification interface, if the current privacy packet function is in an unopened state or the verification password input by the user is wrong, and refusing to use the user information in the privacy packet, if the check password input by the user is correct, displaying a user information selection interface, acquiring the target user information type selected by the user on the user information selection interface, reading the target user information corresponding to the target user information type from the privacy space, and authorizing the user information to an application program requesting the user information for use.
It should be understood that although the steps in the flowcharts of fig. 2, 5, 20 to 23 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2, 5, 20 to 23 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the steps or stages is not necessarily sequential, but may be performed alternately or alternately with other steps or at least some of the other steps or stages.
In one embodiment, as shown in fig. 24, there is provided a user information management apparatus, which may be a part of a computer device using a software module or a hardware module, or a combination of the two, and specifically includes: a request obtaining module 2402, a function state information determining module 2404, a check interface displaying module 2406 and an information outputting module 2408, wherein:
a request obtaining module 2402, configured to obtain a user information obtaining request for the target user object.
A function status information determining module 2404, configured to determine, according to the user information obtaining request, current function status information of the privacy space corresponding to the target user object.
And a verification interface display module 2406, configured to display a verification interface when the functional state information represents that the privacy space is in an open state.
And the information output module 2408 is configured to acquire the verification information through the verification interface, and after the verification information passes the verification, respond to the user information acquisition request, read and output the target user information from the privacy space.
In one embodiment, the request acquisition module 2402 is further configured to: displaying a private account login interface; obtaining login information of a target user object through a privacy account login interface; and after the login information is verified, generating a user information acquisition request aiming at the target user object.
In one embodiment, the request acquisition module 2402 is further configured to: displaying an information acquisition page through an application program running on a terminal; and responding to the user information acquisition operation triggered by the information acquisition page, and generating a user information acquisition request aiming at the target user object.
In one embodiment, the function status information determining module 2404 is further configured to: acquiring a state identifier corresponding to a target user object, which is stored by a server, according to a user information acquisition request; and determining the current functional state information of the privacy space local to the terminal corresponding to the target user object based on the state identifier.
In one embodiment, information output module 2408 is further configured to: after the verification information passes the verification, displaying a user information selection page; the user information selection page displays at least one selectable user information type; responding to a selection operation generated in the user information selection page, and determining a target user information type pointed by the selection operation; and responding to the user information acquisition request, reading target user information corresponding to the target user information type from the privacy space and outputting the target user information.
In the above embodiment, by uniformly storing the user information of the target user object in the privacy space in advance, when the user information aiming at the target user object needs to be acquired, the current function state information of the privacy space corresponding to the target user object is determined according to the user information acquisition request, and when the functional state information represents that the privacy space is in an open state, the verification interface is displayed, the verification information is obtained through the displayed verification interface, after the verification information passes the verification, the target user information is read from the privacy space and output in response to the acquired user information acquisition request, when the user information is bound to the application program, the user information request is triggered through the application program, and then the user information can be read and output from the privacy space based on the method, so that the binding of the user information is realized, and the efficiency of the application program in binding the user information is improved. In addition, the user information of the target user object is uniformly stored in the privacy space, and the target user information in the privacy space can be acquired only when the privacy space is in an open state and the verification information passes the verification, so that the safety of user information management of the target user object is improved.
In one embodiment, the apparatus further comprises a privacy space management module to: entering a privacy space management page, wherein the privacy space management page displays the current functional state information of the privacy space; responding to a function state switching operation triggered by a privacy space management page, and switching the current function state of a privacy space; and correspondingly adjusting the current functional state information displayed by the privacy space management page based on the switched functional state.
In the above embodiment, after entering the privacy space management page displaying the current functional state information of the privacy space, the current functional state of the privacy space is switched in response to the functional state switching operation triggered by the privacy space management page, and the current functional state information displayed on the privacy space management page is correspondingly adjusted based on the switched functional state, so that convenience in managing the privacy space can be improved.
In one embodiment, the apparatus further comprises a user information management module to: displaying a user information management interface; the user information management interface comprises a user information adding control and a user information reading control, the user information adding control is used for triggering addition of user information to the privacy space, and the user information reading control is used for triggering reading of the user information from the privacy space.
In one embodiment, the user information management module is further configured to: responding to the triggering operation of the user information adding control, and displaying a user information adding page; and acquiring the user information input on the user information adding page, and storing the user information to the privacy space corresponding to the target user object.
In one embodiment, the user information adding page shows at least one selectable user information type, and the user information management module is further configured to: responding to the selection operation of the target user information type in the user information types, and determining a target information acquisition mode corresponding to the target user information type; and sequentially collecting the user information belonging to the target user information type according to the target information collection mode.
In the embodiment, the user information management interface comprising the user information adding control and the user information reading control is displayed, and the user information is added to the privacy space and read from the privacy space through the user information adding control and the user information reading control, so that the convenience of user information management in the privacy space is improved.
In one embodiment, the apparatus further comprises a verification setting module configured to: when the privacy space is started for the first time, a verification setting interface is displayed; acquiring verification setting information through a verification setting interface; responding to a verification setting completion operation triggered on a verification setting interface, and storing verification setting information; the stored verification setting information is used for verifying the acquired verification information.
In the above embodiment, when the privacy space is initially enabled, the verification setting information is acquired through the displayed verification setting interface, and the verification setting completion operation triggered on the verification setting interface is responded, and the verification setting information is stored, so that when the user information acquisition request is acquired, the acquired verification information is verified based on the verification setting information, and the target user information is read from the privacy space and output after the verification information passes verification, and the convenience in use of the user information is also ensured while the security of the user information is improved.
For the specific definition of the user information management apparatus, reference may be made to the above definition of the user information management method, which is not described herein again. Each module in the user information management apparatus may be wholly or partially implemented by software, hardware, or a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 25. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing user information data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of user information management.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 26. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a user information management method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the configurations shown in fig. 25 and 26 are merely block diagrams of some configurations relevant to the present disclosure, and do not constitute a limitation on the computing devices to which the present disclosure may be applied, and that a particular computing device may include more or less components than those shown, or combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is further provided, which includes a memory and a processor, the memory stores a computer program, and the processor implements the steps of the above method embodiments when executing the computer program.
In an embodiment, a computer-readable storage medium is provided, in which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
In one embodiment, a computer program product or computer program is provided that includes computer instructions stored in a computer-readable storage medium. The computer instructions are read by a processor of a computer device from a computer-readable storage medium, and the computer instructions are executed by the processor to cause the computer device to perform the steps in the above-mentioned method embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (15)

1. A method for managing user information, the method comprising:
acquiring a user information acquisition request aiming at a target user object;
determining the current functional state information of the privacy space corresponding to the target user object according to the user information acquisition request;
when the functional state information represents that the privacy space is in an open state, a verification interface is displayed;
and acquiring verification information through the verification interface, responding to the user information acquisition request after the verification information passes verification, and reading and outputting target user information from the privacy space.
2. The method according to claim 1, wherein the obtaining a user information obtaining request for a target user object comprises:
displaying a private account login interface;
obtaining login information of a target user object through the private account login interface;
and after the login information is verified, generating a user information acquisition request aiming at the target user object.
3. The method according to claim 1, wherein the obtaining of the user information obtaining request for the target user object comprises:
displaying an information acquisition page through an application program running on a terminal;
and responding to the user information acquisition operation triggered by the information acquisition page, and generating a user information acquisition request aiming at the target user object.
4. The method according to claim 1, wherein the determining, according to the user information obtaining request, current functional state information of a privacy space corresponding to the target user object includes:
acquiring a state identifier corresponding to the target user object, which is stored by a server, according to the user information acquisition request;
and determining the current functional state information of the privacy space of the local terminal corresponding to the target user object based on the state identifier.
5. The method of claim 1, further comprising:
entering a privacy space management page, wherein the current functional state information of the privacy space is displayed on the privacy space management page;
responding to a function state switching operation triggered by the privacy space management page, and switching the current function state of the privacy space;
and correspondingly adjusting the current functional state information displayed by the privacy space management page based on the switched functional state.
6. The method of claim 1, wherein after determining the current functional state information of the privacy space corresponding to the target user object, the method further comprises:
displaying a user information management interface; the user information management interface comprises a user information adding control and a user information reading control, the user information adding control is used for triggering addition of user information to the privacy space, and the user information reading control is used for triggering reading of the user information from the privacy space.
7. The method of claim 6, further comprising:
responding to the triggering operation of the user information adding control, and displaying a user information adding page;
and acquiring the user information input on the user information adding page, and storing the user information to a privacy space corresponding to the target user object.
8. The method of claim 7, wherein the user information adding page is displayed with at least one selectable user information type, and the obtaining the user information input on the user information adding page comprises:
responding to the selection operation of a target user information type in the user information types, and determining a target information acquisition mode corresponding to the target user information type;
and sequentially collecting the user information belonging to the target user information type according to the target information collection mode.
9. The method according to claim 1, wherein reading and outputting target user information from the privacy space in response to the user information obtaining request after the verification information is verified comprises:
after the verification information passes verification, displaying a user information selection page; the user information selection page displays at least one selectable user information type;
responding to a selection operation generated in the user information selection page, and determining a target user information type pointed by the selection operation;
and responding to the user information acquisition request, reading target user information corresponding to the target user information type from the privacy space and outputting the target user information.
10. The method according to any one of claims 1 to 9, further comprising:
when the privacy space is started for the first time, a verification setting interface is displayed;
acquiring verification setting information through the verification setting interface;
responding to the triggered verification setting completion operation on the verification setting interface, and storing the verification setting information; and the stored verification setting information is used for verifying the acquired verification information.
11. A user information management apparatus, characterized in that the apparatus comprises:
the request acquisition module is used for acquiring a user information acquisition request aiming at a target user object;
a function state information determining module, configured to determine, according to the user information acquisition request, current function state information of a privacy space corresponding to the target user object;
the verification interface display module is used for displaying a verification interface when the functional state information represents that the privacy space is in an open state;
and the information output module is used for acquiring verification information through the verification interface, responding to the user information acquisition request after the verification information passes verification, and reading and outputting target user information from the privacy space.
12. The apparatus of claim 11, wherein the request obtaining module is further configured to:
displaying a private account login interface;
obtaining login information of a target user object through the privacy account login interface;
and after the login information is verified, generating a user information acquisition request aiming at the target user object.
13. The apparatus of claim 11, wherein the request obtaining module is further configured to:
displaying an information acquisition page through an application program running on a terminal;
and responding to the user information acquisition operation triggered by the information acquisition page, and generating a user information acquisition request aiming at the target user object.
14. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor realizes the steps of the method of any one of claims 1 to 10 when executing the computer program.
15. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 10.
CN202011337576.9A 2020-11-25 2020-11-25 User information management method, device, computer equipment and storage medium Pending CN114547665A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011337576.9A CN114547665A (en) 2020-11-25 2020-11-25 User information management method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011337576.9A CN114547665A (en) 2020-11-25 2020-11-25 User information management method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114547665A true CN114547665A (en) 2022-05-27

Family

ID=81659828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011337576.9A Pending CN114547665A (en) 2020-11-25 2020-11-25 User information management method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114547665A (en)

Similar Documents

Publication Publication Date Title
CN107800672B (en) Information verification method, electronic equipment, server and information verification system
CN109086317B (en) Risk control method and related device
CN105868970B (en) authentication method and electronic equipment
CN110322317B (en) Transaction data processing method and device, electronic equipment and medium
WO2021249527A1 (en) Method and apparatus for implementing motopay, and electronic device
RU2725701C1 (en) Method and equipment for verification of safety based on biometric feature
CN108512660B (en) Virtual card verification method
CN108337251A (en) Bank card phone number changes implementation method, equipment, system and storage medium
CN113411284B (en) Account binding method, account binding device, computer equipment and storage medium
CN109413034B (en) Application program data display method and device, computer equipment and storage medium
CN105354459A (en) Information processing method and device and electronic equipment
US11989278B2 (en) Method and system for obtaining consent to perform an operation
CN114547665A (en) User information management method, device, computer equipment and storage medium
CN109165490A (en) A kind of data inputting method and device
CN106161365B (en) Data processing method and device and terminal
CN112785410A (en) Relying party risk adjustment indicator systems and methods
CN111209546A (en) Online multi-person identity authentication method, system and device and identity authentication equipment
CN114567451B (en) Identity verification method, identity verification device, computer equipment and storage medium
US11956244B2 (en) Method and system for initiating a transfer of resources
US11616778B2 (en) Biometric access to service providers
US11792200B2 (en) Method and system for remotely verifying identity prior to provisioning a data record for a service
US11645641B2 (en) Method and system for performing an operation
KR101073433B1 (en) IC card capable of controlling user centric configuration information, apparatus and method for information controlling of the same
CN117436888A (en) Payment service processing method, device, computer equipment and storage medium
CN117037295A (en) Identity authentication method, identity authentication device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40070429

Country of ref document: HK