CN116955357A - Object identification recognition method and device and computer equipment - Google Patents

Object identification recognition method and device and computer equipment Download PDF

Info

Publication number
CN116955357A
CN116955357A CN202310904851.8A CN202310904851A CN116955357A CN 116955357 A CN116955357 A CN 116955357A CN 202310904851 A CN202310904851 A CN 202310904851A CN 116955357 A CN116955357 A CN 116955357A
Authority
CN
China
Prior art keywords
identification
identifier
proxy
data
index
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310904851.8A
Other languages
Chinese (zh)
Inventor
王亮
王金虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qichacha Technology Co ltd
Original Assignee
Qichacha Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qichacha Technology Co ltd filed Critical Qichacha Technology Co ltd
Priority to CN202310904851.8A priority Critical patent/CN116955357A/en
Publication of CN116955357A publication Critical patent/CN116955357A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application relates to an object identification recognition method, an object identification recognition device and computer equipment. The method comprises the following steps: obtaining object data from an object information server; screening out target objects with the same object identification in the object data; comparing whether the object data between the target objects with the same object identification are matched; and marking the target object as a proxy object and marking the object identification as a proxy identification when the comparison result comprises that the object data of the target object are not matched with each other. By adopting the method, the identification efficiency of the object identification can be improved.

Description

Object identification recognition method and device and computer equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and apparatus for identifying an object identifier, and a computer device.
Background
On some enterprise information query websites, related information of an enterprise can be queried, including enterprise names, contacts, contact phones, and the like. Some contact phones may not be actual contact, and may be proxy accounting numbers.
In the related art, the authenticity of the number can be verified by dialing a contact phone on a website, but the verification efficiency is low.
Disclosure of Invention
Based on this, it is necessary to provide a method for identifying an object identifier, which can generate a proxy identifier for the object identifier by acquiring all object data corresponding to the object identifier, and comparing the relevance between the object data.
In a first aspect, the present application provides a method for identifying an object identifier. The method comprises the following steps:
obtaining object data from an object information server;
screening out target objects with the same object identification in the object data;
comparing whether the object data between the target objects with the same object identification are matched;
and marking the target object as a proxy object and marking the object identification as a proxy identification when the comparison result comprises that the object data of the target object are not matched with each other.
In one embodiment, the method further comprises:
storing the proxy object and the proxy identifier;
and comparing the object identification to be queried with the proxy identification, and determining whether the object identification to be queried is the proxy identification.
In one embodiment, before comparing the object identifier to be queried with the proxy identifier, the method includes:
detecting the length and the type of the object identifier, wherein the length and the type of the object identifier correspond;
and outputting the object identifier as a qualified object identifier when the length of the object identifier accords with the length corresponding to the type.
In one embodiment, after the outputting the object identifier is a qualified object identifier, the method includes:
and formatting the qualified object identifier to obtain corresponding object data, wherein the formatting comprises extracting and removing interval words, deleting extension numbers and deleting special characters in the object identifier.
In one embodiment, the identification attribute information of the agent identification includes at least one of:
all object data corresponding to the object identification, information representing the object identification to be verified as proxy identification and information representing the object identification level.
In one embodiment, the method further comprises:
acquiring data structure information of the object identifier from the identifier attribute information;
and reading the data structure information to generate an index and index configuration, and creating a corresponding index in a search engine database according to the index and the index configuration so that a user inquires an object identification according to the index.
In a second aspect, the present application also provides an apparatus for identifying an object identifier, where the apparatus includes:
the acquisition module is used for acquiring the object data from the object information server;
the screening module is used for screening out target objects with the same object identification in the object data;
the comparison module is used for comparing whether the object data between the target objects with the same object identification are matched or not;
and the marking module is used for marking the target object as a proxy object and marking the object identifier as a proxy identifier when the comparison result comprises that the object data of the target objects are not matched with each other.
In one embodiment, the apparatus further comprises:
storing the proxy object and the proxy identifier;
and comparing the object identification to be queried with the proxy identification, and determining whether the object identification to be queried is the proxy identification.
In one embodiment, before comparing the object identifier to be queried with the proxy identifier, the method includes:
detecting the length and the type of the object identifier, wherein the length and the type of the object identifier correspond;
and outputting the object identifier as a qualified object identifier when the length of the object identifier accords with the length corresponding to the type.
In one embodiment, after the outputting the object identifier is a qualified object identifier, the method includes:
and formatting the qualified object identifier to obtain corresponding object data, wherein the formatting comprises extracting and removing interval words, deleting extension numbers and deleting special characters in the object identifier.
In one embodiment, the identification attribute information of the agent identification includes at least one of:
all object data corresponding to the object identification, information representing the object identification to be verified as proxy identification and information representing the object identification level.
In one embodiment, the apparatus further comprises:
acquiring data structure information of the object identifier from the identifier attribute information;
and reading the data structure information to generate an index and index configuration, and creating a corresponding index in a search engine database according to the index and the index configuration so that a user inquires an object identification according to the index.
The identification method of the object identifier at least comprises the following beneficial effects:
according to the embodiment scheme provided by the disclosure, the target objects with the same object identification can be obtained from the object data, whether the object data between the target objects with the same object identification are matched or not is compared, and if the object data between the target objects are not matched with each other, the object identification is marked as the proxy identification, so that the identification efficiency is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments or the conventional techniques of the present disclosure, the drawings required for the descriptions of the embodiments or the conventional techniques will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present disclosure, and other drawings may be obtained according to the drawings without inventive effort to those of ordinary skill in the art.
FIG. 1 is an application environment diagram of a method of identifying object identification in one embodiment;
FIG. 2 is a flow diagram of a method of identifying object identifiers in one embodiment;
FIG. 3 is a flow diagram of a method of identifying object identifiers in one embodiment;
FIG. 4 is a block diagram of an object identification recognition device in one embodiment;
FIG. 5 is a block diagram of an object identification recognition device in one embodiment;
FIG. 6 is an internal block diagram of a computer device in one embodiment;
fig. 7 is an internal structural diagram of a server in one embodiment.
Detailed Description
In order to enable those skilled in the art to better understand the technical solutions of the present disclosure, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the foregoing figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the disclosure described herein may be capable of operation in sequences other than those illustrated or described herein. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, it is not excluded that additional identical or equivalent elements may be present in a process, method, article, or apparatus that comprises a described element. For example, if first, second, etc. words are used to indicate a name, but not any particular order.
The embodiment of the disclosure provides an object identification recognition method, which can be applied to an application environment as shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The data storage system may store data that the server 104 needs to process. The data storage system may be integrated on the server 104 or may be located on a cloud or other network server. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices, and portable wearable devices, where the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart vehicle devices, and the like. The portable wearable device may be a smart watch, smart bracelet, headset, or the like. The server 104 may be implemented as a stand-alone server or as a server cluster of multiple servers.
In some embodiments of the present disclosure, as shown in fig. 2, a method for identifying an object identifier is provided, and the method is applied to the server in fig. 1 to process object data for example. It will be appreciated that the method may be applied to a server, and may also be applied to a system comprising a terminal and a server, and implemented by interaction of the terminal and the server. In a specific embodiment, the method may include the steps of:
s202: object data is acquired from an object information server.
The object information server may be a server for storing, querying and downloading object data, and if the object data is enterprise data, the object information server may be an industrial and commercial server. The object data may include the name of the user, stakeholders, legal persons, actual controlling persons, beneficiaries, object identifications, and so forth. The object identifier may be a contact way of the enterprise, where the contact way may include a phone, a mailbox, etc. of the enterprise, and typically, the phone of the enterprise is selected as the contact way.
The object identification may be associated with multiple enterprises, some of which may be established as branch offices, or the same contact may be established as multiple different offices, so that the object identification may correspond to multiple target objects. Proxy accounting refers to that a series of works such as accounting, tax return and the like of the enterprise are all entrusted to professional accounting companies, and proxy accounting numbers refer to real contact ways of the enterprise, and if a plurality of enterprises entrust the same accounting company to carry out accounting work, a plurality of identical object identifiers can exist.
If the object identifier corresponds to a target object, the object identifier may be directly marked as a correct identifier without verifying the object identifier.
S204: and screening out target objects with the same object identification in the object data.
Before screening the target object, operations such as data arrangement, format conversion and the like can be performed on the object identifiers, for example, all the object identifiers are converted into data with the same format, so that later-stage identifier checking work is facilitated, and the identification efficiency of the object identifiers is improved. And screening out target objects with the same object identification in the object data.
S206: and comparing whether the object data between the same target objects are matched or not according to the object identification.
If the object identifier is the correct contact way of the enterprise and the object identifier corresponds to a plurality of users, the same contact may establish a plurality of enterprises or a plurality of sub-companies of which a plurality of corresponding users are enterprises.
If the object identification is not the correct contact of the enterprise and the object identification corresponds to multiple users, it may be an identification record error or an identification of a billing company.
S208: and marking the target object as a proxy object and marking the object identification as a proxy identification when the comparison result comprises that the object data of the target object are not matched with each other.
In some embodiments of the present disclosure, the same object identifier corresponds to 20 target objects, and the legal person, stakeholder, actual controller, beneficiary, etc. in the object data are all different, the target object may be marked as a proxy object, and the object identifier may be marked as a proxy identifier.
In the identification method of the object identification, the target objects with the same object identification can be obtained from the object data, whether the object data among the target objects with the same object identification are matched or not is compared, and if the object data among the target objects are not matched with each other, the object identification is marked as the proxy identification, so that the identification efficiency is improved.
In some embodiments of the present disclosure, the method further comprises:
storing the proxy object and the proxy identifier;
and comparing the object identification to be queried with the proxy identification, and determining whether the object identification to be queried is the proxy identification.
The proxy object and the proxy identifier can be stored in a local server, the object identifier to be queried is obtained, and if the object identifier matched with the object identifier to be queried is queried, the object identifier to be queried is the proxy identifier.
In some embodiments of the disclosure, before comparing the object identifier to be queried with the proxy identifier, the method includes:
detecting the length and the type of the object identifier, wherein the length and the type of the object identifier correspond;
and outputting the object identifier as a qualified object identifier when the length of the object identifier accords with the length corresponding to the type.
The object identifier may be a contact way of the enterprise, and the contact way may include a telephone, a mailbox, etc. of the enterprise, and different types of contact ways have different lengths. For example, the length of the phone number is 11 bits, the number of characters in the mailbox is generally 20 characters, the type can be judged according to the length of the object identifier, the length corresponding to the type can be determined, and if the length of the object identifier accords with the length corresponding to the type, the object identifier is output as a qualified object identifier. When the length of the object identifier does not accord with the length corresponding to the type, the object identifier can be not verified any more, and the identification efficiency of the object identifier is improved.
In some embodiments of the present disclosure, after the outputting the object identification as a qualified object identification, the method includes:
and formatting the qualified object identifier to obtain corresponding object data, wherein the formatting comprises extracting and removing interval words, deleting extension numbers and deleting special characters in the object identifier.
If the length verification of the object identifier passes, the object identifier can be determined to be a qualified object identifier, and corresponding formatting processing is performed according to the type corresponding to the object identifier. For example, for a mobile phone number, an extension number, a region code, etc. may be deleted, and a step of checking whether an enterprise of the same mobile phone number is a plurality of subsidiaries in the later period is reduced; for the mailbox, special characters can be deleted, the number of checked characters is reduced, and the recognition efficiency of the object identifier is improved.
In some embodiments of the present disclosure, the identification attribute information of the agent identification includes at least one of:
all object data corresponding to the object identification, information representing the object identification to be verified as proxy identification and information representing the object identification level.
The user can acquire the enterprise number corresponding to the same object identifier by inquiring the identifier attribute information of the proxy identifier, and the proxy identifier prompts the user that the object identifier is an error identifier in a special marking mode. If the number of enterprises corresponding to the same object identifier is larger, the level of the proxy identifier is higher, so that the enterprises are prompted to modify the object identifier.
FIG. 3 is a flow diagram of a method of identifying object identifiers in one embodiment.
In some embodiments of the present disclosure, the method further comprises:
s302: acquiring data structure information of the object identifier from the identifier attribute information;
and reading the data structure information to generate an index and index configuration, and creating a corresponding index in a search engine database according to the index and the index configuration so that a user inquires an object identification according to the index.
The data structure information can be constructed according to the identification attribute information to generate corresponding indexes, the indexes can be keywords of the object data, the index configuration can comprise the object data, and the corresponding indexes are created in the search engine database, so that the user can conveniently inquire and use the index.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the disclosure also provides an object identification recognition device for implementing the above related object identification recognition method. The implementation scheme of the device for solving the problem is similar to the implementation scheme described in the above method, so the specific limitation in the embodiment of the device for identifying the object identifier provided below can be referred to the limitation of the method for identifying the object identifier hereinabove, and will not be repeated here.
The apparatus may comprise a system (including a distributed system), software (applications), modules, components, servers, clients, etc. that employ the methods described in the embodiments of the present specification in combination with the necessary apparatus to implement the hardware. Based on the same innovative concepts, embodiments of the present disclosure provide for devices in one or more embodiments as described in the following examples. Because the implementation scheme and the method for solving the problem by the device are similar, the implementation of the device in the embodiment of the present disclosure may refer to the implementation of the foregoing method, and the repetition is not repeated. As used below, the term "unit" or "module" may be a combination of software and/or hardware that implements the intended function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
In one embodiment, as shown in fig. 4, an object identification recognition apparatus 400 is provided, where the apparatus may be the aforementioned server, or a module, component, device, unit, etc. integrated with the server.
The apparatus 400 may include:
an acquisition module 402, configured to acquire object data from an object information server;
a screening module 404, configured to screen out target objects with the same object identifier in the object data;
a comparing module 406, configured to compare whether the object data between the target objects with the same object identifier matches;
and a marking module 408, configured to mark the target object as a proxy object, and the object identifier as a proxy identifier, when the comparison result includes that the object data of the target object do not match each other.
In one embodiment, the apparatus further comprises:
storing the proxy object and the proxy identifier;
and comparing the object identification to be queried with the proxy identification, and determining whether the object identification to be queried is the proxy identification.
In one embodiment, before comparing the object identifier to be queried with the proxy identifier, the method includes:
detecting the length and the type of the object identifier, wherein the length and the type of the object identifier correspond;
and outputting the object identifier as a qualified object identifier when the length of the object identifier accords with the length corresponding to the type.
In one embodiment, after the outputting the object identifier is a qualified object identifier, the method includes:
and formatting the qualified object identifier to obtain corresponding object data, wherein the formatting comprises extracting and removing interval words, deleting extension numbers and deleting special characters in the object identifier.
In one embodiment, the identification attribute information of the agent identification includes at least one of:
all object data corresponding to the object identification, information representing the object identification to be verified as proxy identification and information representing the object identification level.
Fig. 5 is a block diagram of an object identification recognition apparatus in one embodiment.
In one embodiment, the apparatus further comprises:
a query module 502, configured to obtain data structure information of an object identifier from the identifier attribute information;
and reading the data structure information to generate an index and index configuration, and creating a corresponding index in a search engine database according to the index and the index configuration so that a user inquires an object identification according to the index.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
The respective modules in the above-described identification means for object identification may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 6. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is for storing object identifications. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of identifying an object identification.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure of which may be as shown in fig. 7. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program, when executed by a processor, implements a method of identifying an object identification. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the structures shown in fig. 6 and 7 are merely block diagrams of partial structures related to the disclosed aspects and do not constitute a limitation of the computer device on which the disclosed aspects are applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, implements the method of any of the embodiments of the present disclosure.
In one embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the method described in any of the embodiments of the present disclosure.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided by the present disclosure may include at least one of non-volatile and volatile memory, among others. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided by the present disclosure may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors involved in the embodiments provided by the present disclosure may be general-purpose processors, central processing units, graphics processors, digital signal processors, programmable logic, quantum computing-based data processing logic, etc., without limitation thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples have expressed only a few embodiments of the present disclosure, which are described in more detail and detail, but are not to be construed as limiting the scope of the present disclosure. It should be noted that variations and modifications can be made by those skilled in the art without departing from the spirit of the disclosure, which are within the scope of the disclosure. Accordingly, the scope of the present disclosure should be determined from the following claims.

Claims (15)

1. A method of identifying an object identifier, the method comprising:
obtaining object data from an object information server;
screening out target objects with the same object identification in the object data;
comparing whether the object data between the target objects with the same object identification are matched;
and marking the target object as a proxy object and marking the object identification as a proxy identification when the comparison result comprises that the object data of the target object are not matched with each other.
2. The method according to claim 1, wherein the method further comprises:
storing the proxy object and the proxy identifier;
and comparing the object identification to be queried with the proxy identification, and determining whether the object identification to be queried is the proxy identification.
3. The method of claim 2, wherein prior to comparing the identification of the object to be queried with the identification of the agent, comprising:
detecting the length and the type of the object identifier, wherein the length and the type of the object identifier correspond;
and outputting the object identifier as a qualified object identifier when the length of the object identifier accords with the length corresponding to the type.
4. A method according to claim 3, wherein said outputting said object identification as a qualified object identification, after said outputting said object identification, comprises:
and formatting the qualified object identifier to obtain corresponding object data, wherein the formatting comprises extracting and removing interval words, deleting extension numbers and deleting special characters in the object identifier.
5. The method of claim 1, wherein the identification attribute information of the agent identification includes at least one of:
all object data corresponding to the object identification, information representing the object identification to be verified as proxy identification and information representing the object identification level.
6. The method of claim 5, wherein the method further comprises:
acquiring data structure information of the object identifier from the identifier attribute information;
and reading the data structure information to generate an index and index configuration, and creating a corresponding index in a search engine database according to the index and the index configuration so that a user inquires an object identification according to the index.
7. An apparatus for identifying an object, the apparatus comprising:
the acquisition module is used for acquiring the object data from the object information server;
the screening module is used for screening out target objects with the same object identification in the object data;
the comparison module is used for comparing whether the object data between the target objects with the same object identification are matched or not;
and the marking module is used for marking the target object as a proxy object and marking the object identifier as a proxy identifier when the comparison result comprises that the object data of the target objects are not matched with each other.
8. The apparatus of claim 7, wherein the apparatus further comprises:
storing the proxy object and the proxy identifier;
and comparing the object identification to be queried with the proxy identification, and determining whether the object identification to be queried is the proxy identification.
9. The apparatus of claim 8, wherein prior to comparing the identification of the object to be queried with the identification of the agent, comprising:
detecting the length and the type of the object identifier, wherein the length and the type of the object identifier correspond;
and outputting the object identifier as a qualified object identifier when the length of the object identifier accords with the length corresponding to the type.
10. The apparatus of claim 9, wherein said outputting said object identification as a qualified object identification, after said outputting said object identification, comprises:
and formatting the qualified object identifier to obtain corresponding object data, wherein the formatting comprises extracting and removing interval words, deleting extension numbers and deleting special characters in the object identifier.
11. The apparatus of claim 7, wherein the identification attribute information of the agent identification comprises at least one of:
all object data corresponding to the object identification, information representing the object identification to be verified as proxy identification and information representing the object identification level.
12. The apparatus of claim 11, wherein the apparatus further comprises:
the query module is used for acquiring the data structure information of the object identifier from the identifier attribute information;
and reading the data structure information to generate an index and index configuration, and creating a corresponding index in a search engine database according to the index and the index configuration so that a user inquires an object identification according to the index.
13. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
14. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
15. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
CN202310904851.8A 2023-07-21 2023-07-21 Object identification recognition method and device and computer equipment Pending CN116955357A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310904851.8A CN116955357A (en) 2023-07-21 2023-07-21 Object identification recognition method and device and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310904851.8A CN116955357A (en) 2023-07-21 2023-07-21 Object identification recognition method and device and computer equipment

Publications (1)

Publication Number Publication Date
CN116955357A true CN116955357A (en) 2023-10-27

Family

ID=88450693

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310904851.8A Pending CN116955357A (en) 2023-07-21 2023-07-21 Object identification recognition method and device and computer equipment

Country Status (1)

Country Link
CN (1) CN116955357A (en)

Similar Documents

Publication Publication Date Title
CN110069449B (en) File processing method, device, computer equipment and storage medium
CN107798038B (en) Data response method and data response equipment
CN109064031B (en) Project affiliate credit evaluation method based on block chain, block chain and storage medium
US8620946B2 (en) Storage and searching of temporal entity information
CN110008743A (en) Data attribute identification method, device and equipment in a kind of piece of chain type account book
CN114611481A (en) Template configuration method and device, computer equipment and storage medium
CN108829753A (en) A kind of information processing method and device
CN112597350B (en) Parameter verification method, system and computer storage medium
CN110059088A (en) Data attribute identification method, device and equipment in a kind of piece of chain type account book
CN111611230A (en) Method and device for establishing main data system, computer equipment and storage medium
CN116955357A (en) Object identification recognition method and device and computer equipment
CN115687560A (en) Mass keyword searching method based on finite automaton
CN115495452A (en) Data processing method, data processing device, computer equipment and storage medium
CN112487497A (en) Method and device for managing off-link files based on intelligent contracts and electronic equipment
CN116303405B (en) Data duplicate checking method and device and computer equipment
CN113722334B (en) Data processing method, device, electronic equipment and medium
CN104156358A (en) Method, device and system for reading tables of database in batches
CN112860755B (en) Service identifier generation method, device, computer equipment and medium
CN117827799A (en) Database establishment method and device, computer equipment and storage medium
CN117667999A (en) Data pushing method, device, computer equipment and computer readable storage medium
CN116225830A (en) Service operation log reporting method and device, computer equipment and storage medium
CN113961636A (en) Object relation query method and device, computer equipment and storage medium
CN116962054A (en) Data processing method, device, computer equipment and storage medium
CN115292182A (en) Method for searching test data conforming to test case in service test scene
CN116860269A (en) Method, apparatus, device, storage medium and program product for managing platform software

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination