CN115880826A - Park access method and system based on access data - Google Patents

Park access method and system based on access data Download PDF

Info

Publication number
CN115880826A
CN115880826A CN202310148197.2A CN202310148197A CN115880826A CN 115880826 A CN115880826 A CN 115880826A CN 202310148197 A CN202310148197 A CN 202310148197A CN 115880826 A CN115880826 A CN 115880826A
Authority
CN
China
Prior art keywords
character
visitor
data
information
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310148197.2A
Other languages
Chinese (zh)
Other versions
CN115880826B (en
Inventor
陈毅帆
尹政皓
孙二军
黄英邦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cotell Intelligent Technology Shenzhen Co ltd
Original Assignee
Cotell Intelligent Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cotell Intelligent Technology Shenzhen Co ltd filed Critical Cotell Intelligent Technology Shenzhen Co ltd
Priority to CN202310148197.2A priority Critical patent/CN115880826B/en
Publication of CN115880826A publication Critical patent/CN115880826A/en
Application granted granted Critical
Publication of CN115880826B publication Critical patent/CN115880826B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Character Discrimination (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention provides a park access method and a system based on access data, which comprises the following steps: receiving characteristic information input by a visitor on an access terminal; the characteristic information comprises face characteristic information of the visitor and character information randomly input by the visitor; detecting whether matched target face feature information exists in a database or not based on the face feature information; obtaining historical visitor data of visitors, and performing desensitization treatment to obtain desensitization access data; pushing the password to an access terminal for the visitor to confirm or modify, and generating a corresponding pass code based on the text information; and storing the visitor data, the face feature information and the pass code in a database in an associated manner, and sending the pass code to the visitor. According to the invention, based on the face feature information and the pass code, access management of visitors can be realized, manual guard of entrance guard is not needed, and labor is saved; meanwhile, the complicated operation of inputting information by the visitor can be avoided.

Description

Park access method and system based on access data
Technical Field
The invention relates to the technical field of data processing, in particular to a park access method and system based on access data.
Background
Along with the rapid development of social economy, the mobility of the people who come and go in communities and parks is increased day by day, the difficulty is increased for the management of the communities and parks, and the potential safety hazard is increased.
In the prior art, a large number of communities and parks adopt traditional paper registration as a main way for visitor management, and management is mainly performed manually, so that manpower is wasted, contradiction conflict is easy to generate, registration is missed, and potential safety hazards exist; meanwhile, when the visitor inputs visitor data, the input operation is complicated, and much time is needed.
Disclosure of Invention
The invention mainly aims to provide a park access method and a system based on access data, aiming at overcoming the defects of manpower waste in the current park access management and complex input information.
In order to achieve the aim, the invention provides a park access method based on access data, which comprises the following steps:
receiving characteristic information input by a visitor on an access terminal; the feature information comprises face feature information of the visitor and character information randomly input by the visitor;
detecting whether matched target face feature information exists in a database or not based on the face feature information; if yes, detecting the time difference between the valid period of the target face feature information in the database and the current time;
detecting whether the time difference is smaller than a preset time length or not; if the number of the visitors is smaller than the preset number, obtaining historical visitor data of the visitors, and performing desensitization treatment on the historical visitor data to obtain desensitization access data; desensitizing only private data in historical visitor data in the desensitized visitor data;
pushing the desensitized visitor data to the access terminal for confirmation or modification by the visitor for the visitor to enter visitor data; after the desensitized visitor data is pushed to the access terminal, the desensitized visitor data is automatically decrypted into visitor data;
after receiving visitor data confirmed or modified by the visitor, generating a corresponding pass code based on the text information;
storing the visitor data, the face feature information and a pass code in a database in an associated manner, and sending the pass code to the visitor; the face feature information and the pass code are used for verifying when the visitor accesses the park area.
Further, after the desensitized visitor data is pushed to the access terminal, the desensitized visitor data is automatically decrypted into visitor data, which includes:
after the desensitized visitor data is pushed to the access terminal, acquiring identification information of the access terminal;
performing hash calculation on the identification information to obtain a corresponding identification hash value;
and judging whether a hash value identical to the identification hash value exists in the database or not, and if so, controlling the access terminal to automatically decrypt desensitized visitor data to obtain the visitor data.
Further, after the step of storing the visitor data in a database in association with the face feature information and a pass code and sending the pass code to the visitor, the method includes:
when the visitor visits a garden, acquiring the face image information of the visitor based on a camera on a garden access control;
verifying whether the face image information is matched with face feature information stored in a database;
if the visitor is matched with the park, releasing to allow the visitor to enter the park;
if not, prompting the visitor to input a pass code; if the correct pass code input by the visitor is received, passing the visitor to allow the visitor to enter the park; if the correct pass code input by the visitor is not received, the visitor is prohibited from passing.
Further, the step of generating a corresponding pass code based on the text information includes:
acquiring characteristic information of the character information, wherein the characteristic information comprises pinyin characteristics, stroke characteristics and component characteristics of the character information; wherein, the character information is a single Chinese character;
generating a corresponding first character by adopting a first generation rule based on the pinyin characteristics;
generating a corresponding second character by adopting a second generation rule based on the stroke characteristics;
generating a corresponding third character by adopting a third generation rule based on the radical characteristics;
randomly generating a non-repeated fourth character, wherein the fourth character is generated only once in a preset period;
determining a corresponding character combination rule based on the radical characteristics; wherein, the database stores the corresponding relation between the character combination rules and the radical characteristics;
and combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain a combined character serving as the pass code.
Further, the pinyin features comprise initial characteristics, final characteristics and tone characteristics; the step of generating a corresponding first character based on the pinyin characteristics by using a first generation rule includes:
mapping the initial consonant characteristics into a first number based on a first mapping table;
mapping the characteristics of the vowels into second numbers based on a second mapping table;
mapping the tone features to third numbers based on a third mapping table;
sequentially connecting the first digit, the second digit and the third digit in series to obtain a serial number; judging whether the number of the numbers in the serial numbers is greater than a threshold value; if the number is larger than the first number, carrying out binary conversion on the serial numbers by adopting a 32-binary coding table, and taking the converted character as the first character; wherein, the 32-system coding table is obtained by arranging based on the initial consonant characteristics.
Further, the arrangement of the 32-ary encoding table includes:
acquiring a standard 32-system coding table; the standard 32-system code table is a code table preset in a park;
acquiring characters in the initial characteristics as initial characters;
deleting all the code symbols corresponding to the initial characters in the standard 32-system code table to obtain a plurality of vacant positions; and all the code symbols behind the gap in the standard 32-ary coding table are shifted forward to fill the gap; and filling the initial consonant characters in a vacant space left at the end of the standard 32-system coding table to obtain the arranged 32-system coding table.
Further, the step of generating a corresponding first character based on the pinyin features by using a first generation rule includes:
mapping each character in the pinyin features to a corresponding number based on a fourth mapping table;
sequentially connecting the mapped numbers in series according to the sequence corresponding to the pinyin characteristics to obtain serial numbers; judging whether the number of the numbers in the serial numbers is greater than a threshold value; if the number is larger than the first number, carrying out binary conversion on the serial numbers by adopting a 32-binary coding table, and taking the converted character as the first character; wherein, the 32-system coding table is obtained by arranging based on the pinyin characteristics.
Further, the step of generating a corresponding second character by using a second generation rule based on the stroke feature includes:
taking the number of strokes in the stroke feature as the second character;
based on the radical characteristics, generating a corresponding third character by adopting a third generation rule, wherein the step comprises the following steps of:
and searching the number corresponding to the radical feature as the third character based on the radical feature and the corresponding relation between the radical feature and the number stored in the database.
Further, after the step of determining the corresponding character combination rule based on the radical feature, the method further includes:
based on the phonetic features of the character information, searching a corresponding first Chinese character set in a Chinese character dictionary library; wherein, the Chinese characters in the first Chinese character set have the same pinyin characteristics;
detecting whether the number of the Chinese characters in the first Chinese character set is only one; if only one Chinese character exists in the first Chinese character set, executing the determined character combination rule to combine the first character, the second character, the third character and the fourth character to obtain a combined character as the pass code;
if the number of the Chinese characters in the first Chinese character set is more than one, searching a corresponding second Chinese character set in the first Chinese character set based on the stroke characteristics of the character information; wherein the Chinese characters in the second Chinese character set have the same stroke characteristics;
detecting whether the number of the Chinese characters in the second Chinese character set is only one; if only one Chinese character exists in the second Chinese character set, executing the determined character combination rule to combine the first character, the second character, the third character and the fourth character to obtain a combined character as the pass code;
if the number of the Chinese characters in the second Chinese character set is more than one, searching a corresponding third Chinese character set in the second Chinese character set based on the radical characteristics of the character information; the Chinese characters in the third Chinese character set have the same radical characteristics;
detecting whether the number of the Chinese characters in the third Chinese character set is only one; if only one Chinese character exists in the third Chinese character set, executing a step of combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain a combined character as the pass code;
if the number of the Chinese characters in the third Chinese character set is not more than one, randomly generating a non-repeated fifth character, and only generating the fifth character once in a preset period; and combining the first character, the second character, the third character, the fourth character and the fifth character based on the determined character combination rule to obtain a combined character as the pass code.
The invention also provides a park access system based on access data, which comprises:
the first receiving unit is used for receiving the characteristic information input by the visitor on the access terminal; the feature information comprises face feature information of the visitor and character information randomly input by the visitor;
the matching unit is used for detecting whether matched target face feature information exists in a database or not based on the face feature information; if yes, detecting the time difference between the valid period of the target face feature information in the database and the current time;
a desensitizing unit for detecting whether the time difference is less than a preset time length; if the number of the visitors is smaller than the preset number, obtaining historical visitor data of the visitors, and performing desensitization treatment on the historical visitor data to obtain desensitization access data; desensitizing only private data in historical visitor data in the desensitized visitor data;
the push unit is used for pushing the desensitized visitor data to the access terminal for the visitor to confirm or modify so that the visitor can input visitor data; after the desensitization visitor data are pushed to the access terminal, the desensitization visitor data are automatically decrypted into visitor data;
the second receiving unit is used for generating a corresponding pass code based on the text information after receiving the visitor data confirmed or modified by the visitor;
the storage unit is used for storing the visitor data, the face feature information and the pass code in a database in an associated mode and sending the pass code to the visitor; the face feature information and the pass code are used for verifying when the visitor accesses the park area.
Further, after the desensitization visitor data is pushed to the access terminal, the desensitization visitor data is automatically decrypted into visitor data, including:
after the desensitized visitor data is pushed to the access terminal, acquiring identification information of the access terminal;
performing hash calculation on the identification information to obtain a corresponding identification hash value;
and judging whether a hash value identical to the identification hash value exists in the database or not, and if so, controlling the access terminal to automatically decrypt desensitized visitor data to obtain the visitor data.
The invention also provides a computer device comprising a memory and a processor, wherein the memory stores a computer program, and the processor implements the steps of any one of the above methods when executing the computer program.
The invention also provides a computer-readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, carries out the steps of the method of any of the above.
The invention provides a park access method and a system based on access data, comprising the following steps: receiving characteristic information input by a visitor on an access terminal; the feature information comprises face feature information of the visitor and character information randomly input by the visitor; detecting whether matched target face feature information exists in a database or not based on the face feature information; if yes, detecting the time difference between the valid period of the target face feature information in the database and the current time; detecting whether the time difference is smaller than a preset time length or not; if the number of the visitor is smaller than the preset number, obtaining historical visitor data of the visitor, and carrying out desensitization processing on the historical visitor data to obtain desensitization access data; desensitizing only private data in historical visitor data in the desensitized visitor data; pushing the desensitized visitor data to the access terminal for confirmation or modification by the visitor for the visitor to enter visitor data; after the desensitization visitor data are pushed to the access terminal, the desensitization visitor data are automatically decrypted into visitor data; after receiving visitor data confirmed or modified by the visitor, generating a corresponding pass code based on the text information; storing the visitor data, the face feature information and a pass code in a database in an associated manner, and sending the pass code to the visitor; the face feature information and the pass code are used for verifying when the visitor accesses the park area. According to the invention, based on the face feature information and the pass code, access management of visitors can be realized, manual guard of entrance guard is not needed, and labor is saved; meanwhile, the complicated operation of inputting information by the visitor can be avoided.
Drawings
FIG. 1 is a schematic diagram illustrating the steps of a park access method based on access data according to an embodiment of the present invention;
FIG. 2 is a block diagram of a campus access system based on access data according to an embodiment of the present invention;
fig. 3 is a block diagram schematically illustrating the structure of a computer apparatus according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, an embodiment of the present invention provides a campus access method based on access data, including the following steps:
step S1, receiving characteristic information input by a visitor on an access terminal; the feature information comprises face feature information of the visitor and character information randomly input by the visitor;
s2, detecting whether matched target face feature information exists in a database or not based on the face feature information; if yes, detecting the time difference between the valid period of the target face feature information in the database and the current time;
s3, detecting whether the time difference is smaller than a preset time length or not; if the number of the visitors is smaller than the preset number, obtaining historical visitor data of the visitors, and performing desensitization treatment on the historical visitor data to obtain desensitization access data; desensitizing only private data in historical visitor data in the desensitized visitor data;
s4, the desensitized visitor data is pushed to the access terminal for the visitor to confirm or modify so that the visitor can input visitor data; after the desensitization visitor data are pushed to the access terminal, the desensitization visitor data are automatically decrypted into visitor data;
s5, after receiving the visitor data confirmed or modified by the visitor, generating a corresponding pass code based on the text information;
s6, storing the visitor data, the face feature information and a pass code in a database in an associated manner, and sending the pass code to the visitor; the face feature information and the pass code are used for verifying when the visitor accesses the park area.
In this embodiment, the above scheme is applied to application management in which a visitor accesses a campus before entering the campus. Specifically, as described in step S1, the visitor may send an access request for accessing the campus at the access terminal, and input feature information, where the feature information includes face feature information and text information randomly input by the visitor, the face feature information is used for face recognition when the visitor accesses the campus to pass through the access control, and the text information randomly input by the visitor is used for generating a corresponding passcode as described in step S5; the pass code is used for inputting the pass code to pass through the entrance guard when the visitor cannot use the face feature information to pass through the entrance guard, namely, the face feature information and the pass code can be used for verifying when the visitor accesses the garden area.
As described in the above steps S2-S3, based on the face feature information, detecting whether there is matched target face feature information in the database; if the target face characteristic information exists in the database, the fact that the visitor has visited the campus once is indicated, and at the moment, only the time difference between the valid period of the target face characteristic information in the database and the current time needs to be detected; the validity period of the target face feature information is usually only a few hours. Detecting whether the time difference is smaller than a preset time length or not; if the number of the visitor data is less than the preset number, the visitor is indicated to visit the park recently, so that the visitor can input data conveniently, historical visitor data of the visitor can be obtained at the moment, and desensitization treatment needs to be carried out on the historical visitor data to obtain desensitization access data in order to prevent the historical visitor data from being leaked in the transmission process; desensitizing only private data in historical visitor data in the desensitized visitor data; as described in step S4 above, the desensitized guest data is pushed to the access terminal for confirmation or modification by the guest for the guest to enter guest data; after the desensitization visitor data are pushed to the access terminal, the desensitization visitor data are automatically decrypted into visitor data; at the moment, if the visitor accesses the enterprise accessed historically, the visitor data does not need to be input manually; if the visitor accesses the enterprise which is not accessed historically, the enterprise can be modified manually; in this embodiment, the input operation of the visitor is simplified.
In an embodiment, the desensitization guest data is automatically decrypted into guest data after being pushed to the access terminal, including:
after the desensitized visitor data is pushed to the access terminal, acquiring identification information of the access terminal;
performing hash calculation on the identification information to obtain a corresponding identification hash value;
and judging whether a hash value identical to the identification hash value exists in the database or not, and if so, controlling the access terminal to automatically decrypt desensitized visitor data to obtain the visitor data.
In the embodiment, after desensitized visitor data is pushed to the access terminal, decryption processing is automatically performed, so that the visitor data is prevented from being leaked in the transmission process, and meanwhile, the operation of visitors can be reduced.
In an embodiment, after step S6 of storing the visitor data in a database in association with the facial feature information and a pass code, and sending the pass code to the visitor, the method includes:
s7, when the visitor visits a garden, acquiring the face image information of the visitor based on a camera on a garden access control;
s8, verifying whether the face image information is matched with face feature information stored in a database;
step S9a, if the visitor is matched with the park, the visitor is released to enter the park;
s9b, if not, prompting the visitor to input a pass code; if the correct pass code input by the visitor is received, passing the visitor to allow the visitor to enter the park; if the correct pass code input by the visitor is not received, the visitor is prohibited from passing.
In the embodiment, the condition that the face recognition system of the entrance guard possibly goes down or is inaccurately recognized is considered, so that the influence on the passage of visitors is avoided; the determination of whether to permit the pass can be made based on the pass code. The pass code is generated according to the character negotiation input by the visitor, and only the visitor and the park management terminal know the pass code, so that the leakage is not worried about. In other embodiments, if the pass still fails, the corresponding Chinese character can be input, and whether the Chinese character is a Chinese character input by the visitor in advance is judged, if so, the Chinese character is released, and if not, the Chinese character is forbidden to be released.
In this embodiment, a specific scheme for generating a pass code is provided, and specifically, the step S5 of generating a corresponding pass code based on the text information includes:
step S51, acquiring characteristic information of the character information, wherein the characteristic information comprises pinyin characteristics, stroke characteristics and component characteristics of the character information; wherein, the character information is a single Chinese character; for example, chinese characters input by the visitor are: if the character is "visited", the corresponding pinyin feature is "fang", the stroke feature is "06", the component feature is "turbine", and the component is a common component in a multi-character system. People are used to refer to the upper, lower, left and right parts of Chinese characters as components. Generally, the above is called "header", e.g. "+", in the form of a Chinese character, a cursive header; the bottom is called as a dish in a basin, and the dish is called as a dish sub-bottom; the left side is called the side, such as the character radicals in the iron characters, called the side of the pyramid; the right side is called as the 'side', such as the 'bucket' in the material word, and the side is called as the 'bucket'; the outer name of the box is 'frame', such as 'Jiong' in the Chinese character 'gang', the box is called the same-word box, and some components are changed in shape at different positions, the terms are different, for example, the Chinese character 'ren' in the 'Hui' word is called herringbone head, and the Chinese character 'Xian' word is called solitary man. The above-mentioned radical characteristics express the structural characteristics of the above-mentioned Chinese characters. It can be understood that if the above-mentioned Chinese characters are polyphonic characters, the commonly used pronunciation can be taken, or any one pronunciation can be taken.
S52, generating a corresponding first character by adopting a first generation rule based on the pinyin characteristics;
step S53, based on the stroke characteristics, generating a corresponding second character by adopting a second generation rule;
step S54, generating a corresponding third character by adopting a third generation rule based on the radical characteristics; in this embodiment, the database stores the first generation rule, the second generation rule, and the third generation rule, and generates corresponding characters by using corresponding rules for the pinyin features, the stroke features, and the radical features; so that the subsequently generated pass code combines the multi-dimensional characteristics of the Chinese characters, and the marking property is enhanced. In one embodiment, the characters are numbers.
Step S55, randomly generating a non-repeated fourth character, wherein the fourth character is generated only once in a preset period; since different visitors may input the same characters, in order to distinguish the visitors, a non-repetitive fourth character is also required to be generated, and the character is generated only once in a preset period, and the fourth character is usually a number. For example, the number may be generated only once per working day, and not regenerated on the current day.
Step S56, determining a corresponding character combination rule based on the radical characteristics; wherein, the database stores the corresponding relation between the character combination rules and the radical characteristics; different character combination rules are adopted corresponding to different radical characteristics, and the character combination rules can be the sequence of character combination, such as third character-first character-second character-fourth character, or fourth character-third character-first character-second character. Different character combination rules are adopted corresponding to the radical features, so that the difference of the radical features is conveniently embodied, and the radical features are conveniently reversely deduced according to the character combination rules.
And S57, combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain a combined character as the pass code. And combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain the pass code used as the entrance guard pass verification.
In one embodiment, the pinyin features include initial characteristics, final characteristics, and tone characteristics; the step S52 of generating a corresponding first character based on the pinyin feature by using a first generation rule includes:
mapping the initial feature into a first number based on a first mapping table; in the first mapping table, each initial corresponds to a number; the number is at most two digits;
mapping the characteristics of the vowels into second numbers based on a second mapping table; in the second mapping table, each vowel corresponds to a number; the number is at most two digits;
mapping the tone features to third numbers based on a third mapping table; in the third mapping table, each tone corresponds to a number, and the number is a digit;
sequentially connecting the first digit, the second digit and the third digit in series to obtain a serial number; judging whether the number of the numbers in the serial numbers is greater than a threshold value; if the number is larger than the first number, carrying out binary conversion on the serial numbers by adopting a 32-binary coding table, and taking the converted character as the first character; wherein, the 32-system coding table is arranged based on the initial consonant characteristics. In order to avoid overlong subsequently obtained passcodes, the length of the first character is not suitable to be overlong, and is usually not greater than four digits (the threshold value is 4), and if the number in the serial numbers is not greater than 4, the serial numbers can be directly used as the first character; if the number is more than 4, a 32-system coding table can be adopted to carry out system conversion on the serial numbers, and the character obtained by conversion is used as the first character; since the above-mentioned digits are decimal digits, the digit length can be significantly reduced after 32-ary encoding thereof. It can be understood that, after the 32-ary encoding is performed, whether the number of characters in the converted characters is greater than the threshold value may be detected again, and if so, characters with more than threshold values at the tail of the converted characters may be removed.
In this embodiment, a specific scheme for arranging a coding table is provided, where an arrangement manner of the 32-ary coding table includes:
acquiring a standard 32-system coding table; the standard 32-system coding table is a coding table preset in a campus;
the standard 32-ary encoding table is shown in table 1 below:
Figure SMS_1
acquiring characters in the initial characteristics as initial characters; for example, if the initial character is "sh", the initial character is s, h;
deleting all the code symbols corresponding to the initial characters in the standard 32-system code table to obtain a plurality of vacant positions; and all the code symbols behind the gap in the standard 32-ary coding table are shifted forward to fill the gap; and filling the initial consonant characters in a vacant space left at the end of the standard 32-system coding table to obtain the arranged 32-system coding table.
For example, when the initial character is s, h, the corresponding sequence is 18, 7, and after all the code symbols corresponding to the initial character in the standard 32-ary code table are deleted, the empty slots corresponding to the sequence numbers 18, 7 are obtained, at this time, all the code symbols after the sequence number 7 are translated forward, and the last two empty slots are left to be filled in the s, h, so as to obtain a rearranged 32-ary code table, as shown in table 2 below:
Figure SMS_2
the rearranged 32-system coding table is different from the standard 32-system coding table, partial coding values are changed, the serial numbers are subjected to system conversion based on the rearranged 32-system coding table, the conversion result can be changed, and the 32-system coding table is unique after being rearranged and has the correlation with the consonant characters, so that the rearranged 32-system coding table can be obtained in the same way.
In an embodiment, the step of generating a corresponding first character based on the pinyin feature by using a first generation rule includes:
mapping each character in the pinyin features to a corresponding number based on a fourth mapping table; in the fourth mapping table, each character corresponds to a number.
Sequentially connecting the mapped numbers in series according to the sequence corresponding to the pinyin characteristics to obtain serial numbers; judging whether the number of the numbers in the serial numbers is greater than a threshold value; if the number is larger than the first number, carrying out binary conversion on the serial numbers by adopting a 32-binary coding table, and taking the converted character as the first character; wherein, the 32-system coding table is obtained by arranging based on the pinyin characteristics. The encoding method of the 32-ary encoding table refers to the above-mentioned embodiments, and is not described herein again.
In another embodiment, the step of generating a corresponding second character by using a second generation rule based on the stroke feature includes:
taking the number of strokes in the stroke feature as the second character; if the stroke number is 8, the second character is 08.
Based on the radical characteristics, generating a corresponding third character by adopting a third generation rule, wherein the step comprises the following steps of:
and searching the number corresponding to the radical feature as the third character based on the radical feature and the corresponding relation between the radical feature and the number stored in the database. If the database stores the correspondence between various radical characteristics and numbers, the third character can be obtained based on the radical characteristics.
In another embodiment, in order to avoid that the same pass code is produced by the chinese characters having the same pinyin feature, stroke feature and radical feature, the method further includes, after the step of determining the corresponding character combination rule based on the radical feature:
based on the phonetic features of the character information, searching a corresponding first Chinese character set in a Chinese character dictionary library; wherein, the Chinese characters in the first Chinese character set have the same pinyin characteristics;
detecting whether the number of the Chinese characters in the first Chinese character set is only one; if only one Chinese character exists in the first Chinese character set, executing the determined character combination rule to combine the first character, the second character, the third character and the fourth character to obtain a combined character as the pass code;
if the number of the Chinese characters in the first Chinese character set is more than one, searching a corresponding second Chinese character set in the first Chinese character set based on the stroke characteristics of the character information; wherein the Chinese characters in the second Chinese character set have the same stroke characteristics;
detecting whether the number of the Chinese characters in the second Chinese character set is only one; if only one Chinese character exists in the second Chinese character set, executing the determined character combination rule to combine the first character, the second character, the third character and the fourth character to obtain a combined character as the pass code;
if the number of the Chinese characters in the second Chinese character set is more than one, searching a corresponding third Chinese character set in the second Chinese character set based on the radical characteristics of the character information; the Chinese characters in the third Chinese character set have the same radical characteristics;
detecting whether the number of the Chinese characters in the third Chinese character set is only one; if only one Chinese character exists in the third Chinese character set, executing the determined character combination rule to combine the first character, the second character, the third character and the fourth character to obtain a combined character as the pass code;
if the number of the Chinese characters in the third Chinese character set is not more than one, randomly generating a non-repeated fifth character, and only generating the fifth character once in a preset period; and combining the first character, the second character, the third character, the fourth character and the fifth character based on the determined character combination rule to obtain a combined character as the pass code.
In an embodiment, the step S5 of generating the corresponding pass code based on the text information includes:
acquiring characteristic information of character information, wherein the characteristic information comprises pinyin characteristics, stroke characteristics and component characteristics of the character information; wherein, the character information is a single Chinese character;
inputting the pinyin characteristics, stroke characteristics and component characteristics of the character information into a classification model for classification to obtain a classification result; the classification model is a deep learning model obtained by training a large amount of training data in advance;
obtaining a target generation rule corresponding to the classification result of the text information according to the mapping relation between the classification result stored in the database and the generation rule;
and processing the character information based on the target generation rule to obtain a corresponding pass code.
In the embodiment, a deep learning model is adopted to classify the character information, and the classification is based on the pinyin characteristics, the stroke characteristics and the component characteristics of the character information; because different Chinese characters have different complexity, different pinyin and different strokes, different processing is required for the Chinese characters of different categories. In this embodiment, different classification results correspond to different generation rules, and the generation rules are used for processing the text information to obtain corresponding pass codes.
Referring to fig. 2, an embodiment of the present invention further provides a campus access system based on access data, including:
the first receiving unit is used for receiving the characteristic information input by the visitor on the access terminal; the feature information comprises face feature information of the visitor and character information randomly input by the visitor;
the matching unit is used for detecting whether matched target face feature information exists in a database or not based on the face feature information; if yes, detecting the time difference between the valid period of the target face feature information in the database and the current time;
a desensitizing unit for detecting whether the time difference is less than a preset time length; if the number of the visitors is smaller than the preset number, obtaining historical visitor data of the visitors, and performing desensitization treatment on the historical visitor data to obtain desensitization access data; desensitizing only private data in historical visitor data in the desensitized visitor data;
the push unit is used for pushing the desensitization visitor data to the access terminal for the visitor to confirm or modify, so that the visitor can input visitor data; after the desensitization visitor data are pushed to the access terminal, the desensitization visitor data are automatically decrypted into visitor data;
the second receiving unit is used for generating a corresponding pass code based on the text information after receiving the visitor data confirmed or modified by the visitor;
the storage unit is used for storing the visitor data, the face feature information and the pass code in a database in an associated mode and sending the pass code to the visitor; the face feature information and the pass code are used for verifying when the visitor accesses the park area.
In an embodiment, the method for automatically decrypting desensitized guest data into guest data after the desensitized guest data is pushed to the access terminal includes:
after the desensitized visitor data is pushed to the access terminal, acquiring identification information of the access terminal;
performing hash calculation on the identification information to obtain a corresponding identification hash value;
and judging whether a hash value identical to the identification hash value exists in the database or not, and if so, controlling the access terminal to automatically decrypt desensitized visitor data to obtain the visitor data.
In this embodiment, please refer to the above method embodiment for specific implementation of each unit in the above campus access system embodiment based on access data, which is not described herein again.
Referring to fig. 3, an embodiment of the present invention further provides a computer device, where the computer device may be a server, and an internal structure of the computer device may be as shown in fig. 3. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer designed processor is used to provide computational and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operating system and the computer program to run on the non-volatile storage medium. The database of the computer device is used for storing face feature information and the like. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a campus access method based on access data.
It will be understood by those skilled in the art that the structure shown in fig. 3 is only a block diagram of a portion of the structure associated with the inventive arrangements, and does not constitute a limitation on the computer apparatus to which the inventive arrangements are applied.
An embodiment of the present invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a campus access method based on access data. It is to be understood that the computer readable storage medium in this embodiment may be a volatile readable storage medium or a non-volatile readable storage medium.
In summary, the park access method and system based on access data provided in the embodiments of the present invention include: receiving characteristic information input by a visitor on an access terminal; the feature information comprises face feature information of the visitor and character information randomly input by the visitor; detecting whether matched target face feature information exists in a database or not based on the face feature information; if yes, detecting the time difference between the valid period of the target face feature information in the database and the current time; detecting whether the time difference is smaller than a preset time length or not; if the number of the visitors is smaller than the preset number, obtaining historical visitor data of the visitors, and performing desensitization treatment on the historical visitor data to obtain desensitization access data; desensitizing only private data in historical visitor data in the desensitized visitor data; pushing the desensitized visitor data to the access terminal for confirmation or modification by the visitor for the visitor to enter visitor data; after the desensitization visitor data are pushed to the access terminal, the desensitization visitor data are automatically decrypted into visitor data; after receiving visitor data confirmed or modified by the visitor, generating a corresponding pass code based on the text information; storing the visitor data, the face feature information and a pass code in a database in an associated manner, and sending the pass code to the visitor; the face feature information and the pass code are used for verifying when the visitor accesses the park area. According to the invention, based on the face feature information and the pass code, access management of visitors can be realized, manual guard of entrance guard is not needed, and labor is saved; meanwhile, the complicated operation of inputting information by the visitor can be avoided.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, databases, or other media provided herein or used in embodiments of the present invention may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (SSRDRAM), enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct bused dynamic RAM (DRDRAM), and bused dynamic RAM (RDRAM).
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, apparatus, article, or method that comprises the element.
The above description is only for the preferred embodiment of the present invention and is not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A park access method based on access data is characterized by comprising the following steps:
receiving characteristic information input by a visitor on an access terminal; the feature information comprises face feature information of the visitor and character information randomly input by the visitor;
detecting whether matched target face feature information exists in a database or not based on the face feature information; if yes, detecting the time difference between the valid period of the target face feature information in the database and the current time;
detecting whether the time difference is smaller than a preset time length or not; if the number of the visitor is smaller than the preset number, obtaining historical visitor data of the visitor, and carrying out desensitization processing on the historical visitor data to obtain desensitization access data; desensitizing only private data in historical visitor data in the desensitized visitor data;
pushing the desensitized visitor data to the access terminal for confirmation or modification by the visitor for the visitor to enter visitor data; after the desensitized visitor data is pushed to the access terminal, the desensitized visitor data is automatically decrypted into visitor data;
after receiving visitor data confirmed or modified by the visitor, generating a corresponding pass code based on the text information;
storing the visitor data, the face feature information and a pass code in a database in an associated manner, and sending the pass code to the visitor; the face feature information and the pass code are used for verifying when the visitor accesses the park area.
2. The campus access method based on access data of claim 1, wherein the desensitization guest data is automatically decrypted into guest data after being pushed to the access terminal, comprising:
after the desensitized visitor data is pushed to the access terminal, acquiring identification information of the access terminal;
performing hash calculation on the identification information to obtain a corresponding identification hash value;
and judging whether a hash value identical to the identification hash value exists in the database or not, and if so, controlling the access terminal to automatically decrypt desensitized visitor data to obtain the visitor data.
3. The campus access method based on access data of claim 1, wherein the step of generating the corresponding pass code based on the text information comprises:
acquiring characteristic information of the character information, wherein the characteristic information comprises pinyin characteristics, stroke characteristics and component characteristics of the character information; wherein, the character information is a single Chinese character;
generating a corresponding first character by adopting a first generation rule based on the pinyin characteristics;
generating a corresponding second character by adopting a second generation rule based on the stroke characteristics;
generating a corresponding third character by adopting a third generation rule based on the radical characteristics;
randomly generating a non-repeated fourth character, wherein the fourth character is generated only once in a preset period;
determining a corresponding character combination rule based on the radical features; wherein, the database stores the corresponding relation between the character combination rules and the radical characteristics;
and combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain a combined character which is used as the pass code.
4. The park access method based on access data of claim 3, wherein the pinyin features include an initial feature, a final feature and an intonation feature; the step of generating the corresponding first character based on the pinyin characteristics by adopting a first generation rule comprises the following steps:
mapping the initial feature into a first number based on a first mapping table;
mapping the characteristics of the vowels into second numbers based on a second mapping table;
mapping the tone features to third numbers based on a third mapping table;
sequentially connecting the first number, the second number and the third number in series to obtain a serial number; judging whether the number of the numbers in the serial numbers is greater than a threshold value; if the number is larger than the first number, carrying out binary conversion on the serial numbers by adopting a 32-binary coding table, and taking the converted character as the first character; wherein, the 32-system coding table is arranged based on the initial consonant characteristics.
5. The park access method based on access data of claim 4, wherein the arrangement of the 32-ary coding table comprises:
acquiring a standard 32-system coding table; the standard 32-system code table is a code table preset in a park;
acquiring characters in the initial characteristics as initial characters;
deleting all the code symbols corresponding to the initial characters in the standard 32-system code table to obtain a plurality of vacant positions; and all the code symbols behind the gap in the standard 32-ary coding table are shifted forward to fill the gap; and filling the initial consonant characters in a vacant space left at the end of the standard 32-system coding table to obtain the arranged 32-system coding table.
6. The park access method based on access data of claim 3, wherein the step of generating a corresponding first character based on the Pinyin feature using a first generation rule comprises:
mapping each character in the pinyin features to a corresponding number based on a fourth mapping table;
sequentially connecting the mapped numbers in series according to the sequence corresponding to the pinyin characteristics to obtain serial numbers; judging whether the number of the numbers in the serial numbers is larger than a threshold value; if the number is larger than the first number, carrying out binary conversion on the serial numbers by adopting a 32-binary coding table, and taking the converted character as the first character; wherein, the 32-system coding table is obtained by arranging based on the pinyin characteristics.
7. The campus access method based on access data of claim 3, wherein the step of generating a corresponding second character based on the stroke feature by using a second generation rule comprises:
taking the number of strokes in the stroke feature as the second character;
based on the radical characteristics, generating a corresponding third character by adopting a third generation rule, wherein the step comprises the following steps of:
and searching the number corresponding to the radical feature as the third character based on the radical feature and the corresponding relation between the radical feature and the number stored in the database.
8. The park access method based on access data of claim 3, wherein after the step of determining the corresponding character combination rule based on the radical feature, further comprising:
based on the phonetic features of the character information, searching a corresponding first Chinese character set in a Chinese character dictionary library; wherein, the Chinese characters in the first Chinese character set have the same pinyin characteristics;
detecting whether the number of the Chinese characters in the first Chinese character set is only one; if only one Chinese character exists in the first Chinese character set, executing a step of combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain a combined character as the pass code;
if the number of the Chinese characters in the first Chinese character set is more than one, searching a corresponding second Chinese character set in the first Chinese character set based on the stroke characteristics of the character information; wherein the Chinese characters in the second Chinese character set have the same stroke characteristics;
detecting whether the number of the Chinese characters in the second Chinese character set is only one; if only one Chinese character exists in the second Chinese character set, executing the determined character combination rule to combine the first character, the second character, the third character and the fourth character to obtain a combined character as the pass code;
if the number of the Chinese characters in the second Chinese character set is more than one, searching a corresponding third Chinese character set in the second Chinese character set based on the character component characteristics of the character information; the Chinese characters in the third Chinese character set have the same radical characteristics;
detecting whether the number of the Chinese characters in the third Chinese character set is only one; if only one Chinese character exists in the third Chinese character set, executing a step of combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain a combined character as the pass code;
if the number of the Chinese characters in the third Chinese character set is not more than one, randomly generating a non-repeated fifth character, and only generating the fifth character once in a preset period; and combining the first character, the second character, the third character, the fourth character and the fifth character based on the determined character combination rule to obtain a combined character as the pass code.
9. A campus access system based on access data, comprising:
the first receiving unit is used for receiving the characteristic information input by the visitor on the access terminal; the feature information comprises face feature information of the visitor and character information randomly input by the visitor;
the matching unit is used for detecting whether matched target face feature information exists in a database or not based on the face feature information; if yes, detecting the time difference between the valid period of the target face feature information in the database and the current time;
the desensitization unit is used for detecting whether the time difference is less than a preset time length or not; if the number of the visitors is smaller than the preset number, obtaining historical visitor data of the visitors, and performing desensitization treatment on the historical visitor data to obtain desensitization access data; desensitizing only private data in historical visitor data in the desensitized visitor data;
the push unit is used for pushing the desensitization visitor data to the access terminal for the visitor to confirm or modify, so that the visitor can input visitor data; after the desensitization visitor data are pushed to the access terminal, the desensitization visitor data are automatically decrypted into visitor data;
the second receiving unit is used for generating a corresponding pass code based on the text information after receiving the visitor data confirmed or modified by the visitor;
the storage unit is used for storing the visitor data, the face feature information and the pass code in a database in an associated mode and sending the pass code to the visitor; the face feature information and the pass code are used for verifying when the visitor accesses the park area.
10. The campus access system based on access data of claim 9, wherein the desensitized guest data is automatically decrypted into guest data after being pushed to the access terminal, comprising:
after the desensitized visitor data is pushed to the access terminal, acquiring identification information of the access terminal;
performing hash calculation on the identification information to obtain a corresponding identification hash value;
and judging whether a hash value identical to the identification hash value exists in the database or not, and if so, controlling the access terminal to automatically decrypt desensitized visitor data to obtain the visitor data.
CN202310148197.2A 2023-02-22 2023-02-22 Park access method and system based on access data Active CN115880826B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310148197.2A CN115880826B (en) 2023-02-22 2023-02-22 Park access method and system based on access data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310148197.2A CN115880826B (en) 2023-02-22 2023-02-22 Park access method and system based on access data

Publications (2)

Publication Number Publication Date
CN115880826A true CN115880826A (en) 2023-03-31
CN115880826B CN115880826B (en) 2023-05-05

Family

ID=85761468

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310148197.2A Active CN115880826B (en) 2023-02-22 2023-02-22 Park access method and system based on access data

Country Status (1)

Country Link
CN (1) CN115880826B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116132527A (en) * 2023-04-13 2023-05-16 深圳柯赛标识智能科技有限公司 System and method for managing indication board and data processing server
CN116303163A (en) * 2023-05-24 2023-06-23 深圳市乐升半导体有限公司 SPI Flash access method and system of graphics controller
CN116487050A (en) * 2023-06-21 2023-07-25 深圳市万佳安智能科技有限公司 Human health monitoring method, device and computer equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040108136A (en) * 2003-06-16 2004-12-23 삼성전자주식회사 Method for restricting read/write operation of mobile phone in info-mobile system
CN103778380A (en) * 2013-12-31 2014-05-07 网秦(北京)科技有限公司 Data desensitization method and device and data anti-desensitization method and device
CN108512807A (en) * 2017-02-24 2018-09-07 中国移动通信集团公司 Data desensitization method and data in a kind of data transmission desensitize server
CN111639360A (en) * 2020-04-29 2020-09-08 深圳壹账通智能科技有限公司 Intelligent data desensitization method and device, computer equipment and storage medium
CN112765596A (en) * 2021-01-22 2021-05-07 朱捷 Information data verification method and system based on mathematical permutation combination and operation
WO2021190017A1 (en) * 2020-03-25 2021-09-30 支付宝(杭州)信息技术有限公司 Private data access method and apparatus, and electronic device
CN113920631A (en) * 2021-09-26 2022-01-11 中通服和信科技有限公司 Visitor authorization system and management method for data center park access management
CN114639188A (en) * 2022-03-15 2022-06-17 云屏数字科技(云南)有限公司 Visitor access control system based on WeChat and visitor door opening method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040108136A (en) * 2003-06-16 2004-12-23 삼성전자주식회사 Method for restricting read/write operation of mobile phone in info-mobile system
CN103778380A (en) * 2013-12-31 2014-05-07 网秦(北京)科技有限公司 Data desensitization method and device and data anti-desensitization method and device
CN108512807A (en) * 2017-02-24 2018-09-07 中国移动通信集团公司 Data desensitization method and data in a kind of data transmission desensitize server
WO2021190017A1 (en) * 2020-03-25 2021-09-30 支付宝(杭州)信息技术有限公司 Private data access method and apparatus, and electronic device
CN111639360A (en) * 2020-04-29 2020-09-08 深圳壹账通智能科技有限公司 Intelligent data desensitization method and device, computer equipment and storage medium
CN112765596A (en) * 2021-01-22 2021-05-07 朱捷 Information data verification method and system based on mathematical permutation combination and operation
CN113920631A (en) * 2021-09-26 2022-01-11 中通服和信科技有限公司 Visitor authorization system and management method for data center park access management
CN114639188A (en) * 2022-03-15 2022-06-17 云屏数字科技(云南)有限公司 Visitor access control system based on WeChat and visitor door opening method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116132527A (en) * 2023-04-13 2023-05-16 深圳柯赛标识智能科技有限公司 System and method for managing indication board and data processing server
CN116303163A (en) * 2023-05-24 2023-06-23 深圳市乐升半导体有限公司 SPI Flash access method and system of graphics controller
CN116303163B (en) * 2023-05-24 2023-08-01 深圳市乐升半导体有限公司 SPI Flash access method and system of graphics controller
CN116487050A (en) * 2023-06-21 2023-07-25 深圳市万佳安智能科技有限公司 Human health monitoring method, device and computer equipment
CN116487050B (en) * 2023-06-21 2023-12-22 深圳市万佳安智能科技有限公司 Human health monitoring method, device and computer equipment

Also Published As

Publication number Publication date
CN115880826B (en) 2023-05-05

Similar Documents

Publication Publication Date Title
CN115880826A (en) Park access method and system based on access data
WO2021139283A1 (en) Knowledge graph question-answer method and apparatus based on deep learning technology, and device
KR102248242B1 (en) Identity authentication method and device
CN110534113B (en) Audio data desensitization method, device, equipment and storage medium
JP6567040B2 (en) Voiceprint login method and device based on artificial intelligence
CN111247581B (en) Multi-language text voice synthesizing method, device, equipment and storage medium
CN109033150B (en) Sensitive word verification method, device, computer equipment and storage medium
CN109766072B (en) Information verification input method and device, computer equipment and storage medium
CN112256825A (en) Medical field multi-turn dialogue intelligent question-answering method and device and computer equipment
CN112287080B (en) Method and device for rewriting problem statement, computer device and storage medium
CN107357824B (en) Information processing method, service platform and computer storage medium
CN112380240A (en) Data query method, device and equipment based on semantic recognition and storage medium
CN113408278B (en) Intention recognition method, device, equipment and storage medium
CN111680480A (en) Template-based job approval method and device, computer equipment and storage medium
CN115081440B (en) Method, device and equipment for recognizing variant words in text and extracting original sensitive words
CN111223476A (en) Method and device for extracting voice feature vector, computer equipment and storage medium
CN113435196A (en) Intention recognition method, device, equipment and storage medium
CN113469708B (en) Product anti-counterfeiting processing method and device, computer equipment and storage medium
CN112951215B (en) Voice intelligent customer service answering method and device and computer equipment
CN116627272B (en) Touch control method and device and computer equipment
CN113255343A (en) Semantic identification method and device for label data, computer equipment and storage medium
CN112231556A (en) User image drawing method, device, equipment and medium based on conversation scene
CN113065360B (en) Word semantic model construction method and device, computer equipment and storage medium
CN115268799B (en) Storage method and device based on cloud service
CN110852098A (en) Data correction method, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant