CN116955357A - Object identification recognition method and device and computer equipment - Google Patents
Object identification recognition method and device and computer equipment Download PDFInfo
- Publication number
- CN116955357A CN116955357A CN202310904851.8A CN202310904851A CN116955357A CN 116955357 A CN116955357 A CN 116955357A CN 202310904851 A CN202310904851 A CN 202310904851A CN 116955357 A CN116955357 A CN 116955357A
- Authority
- CN
- China
- Prior art keywords
- identification
- identifier
- proxy
- data
- index
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 66
- 238000012216 screening Methods 0.000 claims abstract description 11
- 238000004590 computer program Methods 0.000 claims description 17
- 238000010586 diagram Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 5
- 239000003795 chemical substances by application Substances 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000007796 conventional method Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 229910021389 graphene Inorganic materials 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2457—Query processing with adaptation to user needs
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computational Linguistics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The application relates to an object identification recognition method, an object identification recognition device and computer equipment. The method comprises the following steps: obtaining object data from an object information server; screening out target objects with the same object identification in the object data; comparing whether the object data between the target objects with the same object identification are matched; and marking the target object as a proxy object and marking the object identification as a proxy identification when the comparison result comprises that the object data of the target object are not matched with each other. By adopting the method, the identification efficiency of the object identification can be improved.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and apparatus for identifying an object identifier, and a computer device.
Background
On some enterprise information query websites, related information of an enterprise can be queried, including enterprise names, contacts, contact phones, and the like. Some contact phones may not be actual contact, and may be proxy accounting numbers.
In the related art, the authenticity of the number can be verified by dialing a contact phone on a website, but the verification efficiency is low.
Disclosure of Invention
Based on this, it is necessary to provide a method for identifying an object identifier, which can generate a proxy identifier for the object identifier by acquiring all object data corresponding to the object identifier, and comparing the relevance between the object data.
In a first aspect, the present application provides a method for identifying an object identifier. The method comprises the following steps:
obtaining object data from an object information server;
screening out target objects with the same object identification in the object data;
comparing whether the object data between the target objects with the same object identification are matched;
and marking the target object as a proxy object and marking the object identification as a proxy identification when the comparison result comprises that the object data of the target object are not matched with each other.
In one embodiment, the method further comprises:
storing the proxy object and the proxy identifier;
and comparing the object identification to be queried with the proxy identification, and determining whether the object identification to be queried is the proxy identification.
In one embodiment, before comparing the object identifier to be queried with the proxy identifier, the method includes:
detecting the length and the type of the object identifier, wherein the length and the type of the object identifier correspond;
and outputting the object identifier as a qualified object identifier when the length of the object identifier accords with the length corresponding to the type.
In one embodiment, after the outputting the object identifier is a qualified object identifier, the method includes:
and formatting the qualified object identifier to obtain corresponding object data, wherein the formatting comprises extracting and removing interval words, deleting extension numbers and deleting special characters in the object identifier.
In one embodiment, the identification attribute information of the agent identification includes at least one of:
all object data corresponding to the object identification, information representing the object identification to be verified as proxy identification and information representing the object identification level.
In one embodiment, the method further comprises:
acquiring data structure information of the object identifier from the identifier attribute information;
and reading the data structure information to generate an index and index configuration, and creating a corresponding index in a search engine database according to the index and the index configuration so that a user inquires an object identification according to the index.
In a second aspect, the present application also provides an apparatus for identifying an object identifier, where the apparatus includes:
the acquisition module is used for acquiring the object data from the object information server;
the screening module is used for screening out target objects with the same object identification in the object data;
the comparison module is used for comparing whether the object data between the target objects with the same object identification are matched or not;
and the marking module is used for marking the target object as a proxy object and marking the object identifier as a proxy identifier when the comparison result comprises that the object data of the target objects are not matched with each other.
In one embodiment, the apparatus further comprises:
storing the proxy object and the proxy identifier;
and comparing the object identification to be queried with the proxy identification, and determining whether the object identification to be queried is the proxy identification.
In one embodiment, before comparing the object identifier to be queried with the proxy identifier, the method includes:
detecting the length and the type of the object identifier, wherein the length and the type of the object identifier correspond;
and outputting the object identifier as a qualified object identifier when the length of the object identifier accords with the length corresponding to the type.
In one embodiment, after the outputting the object identifier is a qualified object identifier, the method includes:
and formatting the qualified object identifier to obtain corresponding object data, wherein the formatting comprises extracting and removing interval words, deleting extension numbers and deleting special characters in the object identifier.
In one embodiment, the identification attribute information of the agent identification includes at least one of:
all object data corresponding to the object identification, information representing the object identification to be verified as proxy identification and information representing the object identification level.
In one embodiment, the apparatus further comprises:
acquiring data structure information of the object identifier from the identifier attribute information;
and reading the data structure information to generate an index and index configuration, and creating a corresponding index in a search engine database according to the index and the index configuration so that a user inquires an object identification according to the index.
The identification method of the object identifier at least comprises the following beneficial effects:
according to the embodiment scheme provided by the disclosure, the target objects with the same object identification can be obtained from the object data, whether the object data between the target objects with the same object identification are matched or not is compared, and if the object data between the target objects are not matched with each other, the object identification is marked as the proxy identification, so that the identification efficiency is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments or the conventional techniques of the present disclosure, the drawings required for the descriptions of the embodiments or the conventional techniques will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present disclosure, and other drawings may be obtained according to the drawings without inventive effort to those of ordinary skill in the art.
FIG. 1 is an application environment diagram of a method of identifying object identification in one embodiment;
FIG. 2 is a flow diagram of a method of identifying object identifiers in one embodiment;
FIG. 3 is a flow diagram of a method of identifying object identifiers in one embodiment;
FIG. 4 is a block diagram of an object identification recognition device in one embodiment;
FIG. 5 is a block diagram of an object identification recognition device in one embodiment;
FIG. 6 is an internal block diagram of a computer device in one embodiment;
fig. 7 is an internal structural diagram of a server in one embodiment.
Detailed Description
In order to enable those skilled in the art to better understand the technical solutions of the present disclosure, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the foregoing figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the disclosure described herein may be capable of operation in sequences other than those illustrated or described herein. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, it is not excluded that additional identical or equivalent elements may be present in a process, method, article, or apparatus that comprises a described element. For example, if first, second, etc. words are used to indicate a name, but not any particular order.
The embodiment of the disclosure provides an object identification recognition method, which can be applied to an application environment as shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The data storage system may store data that the server 104 needs to process. The data storage system may be integrated on the server 104 or may be located on a cloud or other network server. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices, and portable wearable devices, where the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart vehicle devices, and the like. The portable wearable device may be a smart watch, smart bracelet, headset, or the like. The server 104 may be implemented as a stand-alone server or as a server cluster of multiple servers.
In some embodiments of the present disclosure, as shown in fig. 2, a method for identifying an object identifier is provided, and the method is applied to the server in fig. 1 to process object data for example. It will be appreciated that the method may be applied to a server, and may also be applied to a system comprising a terminal and a server, and implemented by interaction of the terminal and the server. In a specific embodiment, the method may include the steps of:
s202: object data is acquired from an object information server.
The object information server may be a server for storing, querying and downloading object data, and if the object data is enterprise data, the object information server may be an industrial and commercial server. The object data may include the name of the user, stakeholders, legal persons, actual controlling persons, beneficiaries, object identifications, and so forth. The object identifier may be a contact way of the enterprise, where the contact way may include a phone, a mailbox, etc. of the enterprise, and typically, the phone of the enterprise is selected as the contact way.
The object identification may be associated with multiple enterprises, some of which may be established as branch offices, or the same contact may be established as multiple different offices, so that the object identification may correspond to multiple target objects. Proxy accounting refers to that a series of works such as accounting, tax return and the like of the enterprise are all entrusted to professional accounting companies, and proxy accounting numbers refer to real contact ways of the enterprise, and if a plurality of enterprises entrust the same accounting company to carry out accounting work, a plurality of identical object identifiers can exist.
If the object identifier corresponds to a target object, the object identifier may be directly marked as a correct identifier without verifying the object identifier.
S204: and screening out target objects with the same object identification in the object data.
Before screening the target object, operations such as data arrangement, format conversion and the like can be performed on the object identifiers, for example, all the object identifiers are converted into data with the same format, so that later-stage identifier checking work is facilitated, and the identification efficiency of the object identifiers is improved. And screening out target objects with the same object identification in the object data.
S206: and comparing whether the object data between the same target objects are matched or not according to the object identification.
If the object identifier is the correct contact way of the enterprise and the object identifier corresponds to a plurality of users, the same contact may establish a plurality of enterprises or a plurality of sub-companies of which a plurality of corresponding users are enterprises.
If the object identification is not the correct contact of the enterprise and the object identification corresponds to multiple users, it may be an identification record error or an identification of a billing company.
S208: and marking the target object as a proxy object and marking the object identification as a proxy identification when the comparison result comprises that the object data of the target object are not matched with each other.
In some embodiments of the present disclosure, the same object identifier corresponds to 20 target objects, and the legal person, stakeholder, actual controller, beneficiary, etc. in the object data are all different, the target object may be marked as a proxy object, and the object identifier may be marked as a proxy identifier.
In the identification method of the object identification, the target objects with the same object identification can be obtained from the object data, whether the object data among the target objects with the same object identification are matched or not is compared, and if the object data among the target objects are not matched with each other, the object identification is marked as the proxy identification, so that the identification efficiency is improved.
In some embodiments of the present disclosure, the method further comprises:
storing the proxy object and the proxy identifier;
and comparing the object identification to be queried with the proxy identification, and determining whether the object identification to be queried is the proxy identification.
The proxy object and the proxy identifier can be stored in a local server, the object identifier to be queried is obtained, and if the object identifier matched with the object identifier to be queried is queried, the object identifier to be queried is the proxy identifier.
In some embodiments of the disclosure, before comparing the object identifier to be queried with the proxy identifier, the method includes:
detecting the length and the type of the object identifier, wherein the length and the type of the object identifier correspond;
and outputting the object identifier as a qualified object identifier when the length of the object identifier accords with the length corresponding to the type.
The object identifier may be a contact way of the enterprise, and the contact way may include a telephone, a mailbox, etc. of the enterprise, and different types of contact ways have different lengths. For example, the length of the phone number is 11 bits, the number of characters in the mailbox is generally 20 characters, the type can be judged according to the length of the object identifier, the length corresponding to the type can be determined, and if the length of the object identifier accords with the length corresponding to the type, the object identifier is output as a qualified object identifier. When the length of the object identifier does not accord with the length corresponding to the type, the object identifier can be not verified any more, and the identification efficiency of the object identifier is improved.
In some embodiments of the present disclosure, after the outputting the object identification as a qualified object identification, the method includes:
and formatting the qualified object identifier to obtain corresponding object data, wherein the formatting comprises extracting and removing interval words, deleting extension numbers and deleting special characters in the object identifier.
If the length verification of the object identifier passes, the object identifier can be determined to be a qualified object identifier, and corresponding formatting processing is performed according to the type corresponding to the object identifier. For example, for a mobile phone number, an extension number, a region code, etc. may be deleted, and a step of checking whether an enterprise of the same mobile phone number is a plurality of subsidiaries in the later period is reduced; for the mailbox, special characters can be deleted, the number of checked characters is reduced, and the recognition efficiency of the object identifier is improved.
In some embodiments of the present disclosure, the identification attribute information of the agent identification includes at least one of:
all object data corresponding to the object identification, information representing the object identification to be verified as proxy identification and information representing the object identification level.
The user can acquire the enterprise number corresponding to the same object identifier by inquiring the identifier attribute information of the proxy identifier, and the proxy identifier prompts the user that the object identifier is an error identifier in a special marking mode. If the number of enterprises corresponding to the same object identifier is larger, the level of the proxy identifier is higher, so that the enterprises are prompted to modify the object identifier.
FIG. 3 is a flow diagram of a method of identifying object identifiers in one embodiment.
In some embodiments of the present disclosure, the method further comprises:
s302: acquiring data structure information of the object identifier from the identifier attribute information;
and reading the data structure information to generate an index and index configuration, and creating a corresponding index in a search engine database according to the index and the index configuration so that a user inquires an object identification according to the index.
The data structure information can be constructed according to the identification attribute information to generate corresponding indexes, the indexes can be keywords of the object data, the index configuration can comprise the object data, and the corresponding indexes are created in the search engine database, so that the user can conveniently inquire and use the index.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the disclosure also provides an object identification recognition device for implementing the above related object identification recognition method. The implementation scheme of the device for solving the problem is similar to the implementation scheme described in the above method, so the specific limitation in the embodiment of the device for identifying the object identifier provided below can be referred to the limitation of the method for identifying the object identifier hereinabove, and will not be repeated here.
The apparatus may comprise a system (including a distributed system), software (applications), modules, components, servers, clients, etc. that employ the methods described in the embodiments of the present specification in combination with the necessary apparatus to implement the hardware. Based on the same innovative concepts, embodiments of the present disclosure provide for devices in one or more embodiments as described in the following examples. Because the implementation scheme and the method for solving the problem by the device are similar, the implementation of the device in the embodiment of the present disclosure may refer to the implementation of the foregoing method, and the repetition is not repeated. As used below, the term "unit" or "module" may be a combination of software and/or hardware that implements the intended function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
In one embodiment, as shown in fig. 4, an object identification recognition apparatus 400 is provided, where the apparatus may be the aforementioned server, or a module, component, device, unit, etc. integrated with the server.
The apparatus 400 may include:
an acquisition module 402, configured to acquire object data from an object information server;
a screening module 404, configured to screen out target objects with the same object identifier in the object data;
a comparing module 406, configured to compare whether the object data between the target objects with the same object identifier matches;
and a marking module 408, configured to mark the target object as a proxy object, and the object identifier as a proxy identifier, when the comparison result includes that the object data of the target object do not match each other.
In one embodiment, the apparatus further comprises:
storing the proxy object and the proxy identifier;
and comparing the object identification to be queried with the proxy identification, and determining whether the object identification to be queried is the proxy identification.
In one embodiment, before comparing the object identifier to be queried with the proxy identifier, the method includes:
detecting the length and the type of the object identifier, wherein the length and the type of the object identifier correspond;
and outputting the object identifier as a qualified object identifier when the length of the object identifier accords with the length corresponding to the type.
In one embodiment, after the outputting the object identifier is a qualified object identifier, the method includes:
and formatting the qualified object identifier to obtain corresponding object data, wherein the formatting comprises extracting and removing interval words, deleting extension numbers and deleting special characters in the object identifier.
In one embodiment, the identification attribute information of the agent identification includes at least one of:
all object data corresponding to the object identification, information representing the object identification to be verified as proxy identification and information representing the object identification level.
Fig. 5 is a block diagram of an object identification recognition apparatus in one embodiment.
In one embodiment, the apparatus further comprises:
a query module 502, configured to obtain data structure information of an object identifier from the identifier attribute information;
and reading the data structure information to generate an index and index configuration, and creating a corresponding index in a search engine database according to the index and the index configuration so that a user inquires an object identification according to the index.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
The respective modules in the above-described identification means for object identification may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 6. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is for storing object identifications. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of identifying an object identification.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure of which may be as shown in fig. 7. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program, when executed by a processor, implements a method of identifying an object identification. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the structures shown in fig. 6 and 7 are merely block diagrams of partial structures related to the disclosed aspects and do not constitute a limitation of the computer device on which the disclosed aspects are applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, implements the method of any of the embodiments of the present disclosure.
In one embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the method described in any of the embodiments of the present disclosure.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided by the present disclosure may include at least one of non-volatile and volatile memory, among others. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided by the present disclosure may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors involved in the embodiments provided by the present disclosure may be general-purpose processors, central processing units, graphics processors, digital signal processors, programmable logic, quantum computing-based data processing logic, etc., without limitation thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples have expressed only a few embodiments of the present disclosure, which are described in more detail and detail, but are not to be construed as limiting the scope of the present disclosure. It should be noted that variations and modifications can be made by those skilled in the art without departing from the spirit of the disclosure, which are within the scope of the disclosure. Accordingly, the scope of the present disclosure should be determined from the following claims.
Claims (15)
1. A method of identifying an object identifier, the method comprising:
obtaining object data from an object information server;
screening out target objects with the same object identification in the object data;
comparing whether the object data between the target objects with the same object identification are matched;
and marking the target object as a proxy object and marking the object identification as a proxy identification when the comparison result comprises that the object data of the target object are not matched with each other.
2. The method according to claim 1, wherein the method further comprises:
storing the proxy object and the proxy identifier;
and comparing the object identification to be queried with the proxy identification, and determining whether the object identification to be queried is the proxy identification.
3. The method of claim 2, wherein prior to comparing the identification of the object to be queried with the identification of the agent, comprising:
detecting the length and the type of the object identifier, wherein the length and the type of the object identifier correspond;
and outputting the object identifier as a qualified object identifier when the length of the object identifier accords with the length corresponding to the type.
4. A method according to claim 3, wherein said outputting said object identification as a qualified object identification, after said outputting said object identification, comprises:
and formatting the qualified object identifier to obtain corresponding object data, wherein the formatting comprises extracting and removing interval words, deleting extension numbers and deleting special characters in the object identifier.
5. The method of claim 1, wherein the identification attribute information of the agent identification includes at least one of:
all object data corresponding to the object identification, information representing the object identification to be verified as proxy identification and information representing the object identification level.
6. The method of claim 5, wherein the method further comprises:
acquiring data structure information of the object identifier from the identifier attribute information;
and reading the data structure information to generate an index and index configuration, and creating a corresponding index in a search engine database according to the index and the index configuration so that a user inquires an object identification according to the index.
7. An apparatus for identifying an object, the apparatus comprising:
the acquisition module is used for acquiring the object data from the object information server;
the screening module is used for screening out target objects with the same object identification in the object data;
the comparison module is used for comparing whether the object data between the target objects with the same object identification are matched or not;
and the marking module is used for marking the target object as a proxy object and marking the object identifier as a proxy identifier when the comparison result comprises that the object data of the target objects are not matched with each other.
8. The apparatus of claim 7, wherein the apparatus further comprises:
storing the proxy object and the proxy identifier;
and comparing the object identification to be queried with the proxy identification, and determining whether the object identification to be queried is the proxy identification.
9. The apparatus of claim 8, wherein prior to comparing the identification of the object to be queried with the identification of the agent, comprising:
detecting the length and the type of the object identifier, wherein the length and the type of the object identifier correspond;
and outputting the object identifier as a qualified object identifier when the length of the object identifier accords with the length corresponding to the type.
10. The apparatus of claim 9, wherein said outputting said object identification as a qualified object identification, after said outputting said object identification, comprises:
and formatting the qualified object identifier to obtain corresponding object data, wherein the formatting comprises extracting and removing interval words, deleting extension numbers and deleting special characters in the object identifier.
11. The apparatus of claim 7, wherein the identification attribute information of the agent identification comprises at least one of:
all object data corresponding to the object identification, information representing the object identification to be verified as proxy identification and information representing the object identification level.
12. The apparatus of claim 11, wherein the apparatus further comprises:
the query module is used for acquiring the data structure information of the object identifier from the identifier attribute information;
and reading the data structure information to generate an index and index configuration, and creating a corresponding index in a search engine database according to the index and the index configuration so that a user inquires an object identification according to the index.
13. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
14. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
15. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310904851.8A CN116955357A (en) | 2023-07-21 | 2023-07-21 | Object identification recognition method and device and computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310904851.8A CN116955357A (en) | 2023-07-21 | 2023-07-21 | Object identification recognition method and device and computer equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116955357A true CN116955357A (en) | 2023-10-27 |
Family
ID=88450693
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310904851.8A Pending CN116955357A (en) | 2023-07-21 | 2023-07-21 | Object identification recognition method and device and computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116955357A (en) |
-
2023
- 2023-07-21 CN CN202310904851.8A patent/CN116955357A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110069449B (en) | File processing method, device, computer equipment and storage medium | |
CN107798038B (en) | Data response method and data response equipment | |
CN109064031B (en) | Project affiliate credit evaluation method based on block chain, block chain and storage medium | |
US8620946B2 (en) | Storage and searching of temporal entity information | |
CN110008743A (en) | Data attribute identification method, device and equipment in a kind of piece of chain type account book | |
CN114611481A (en) | Template configuration method and device, computer equipment and storage medium | |
CN108829753A (en) | A kind of information processing method and device | |
CN112597350B (en) | Parameter verification method, system and computer storage medium | |
CN110059088A (en) | Data attribute identification method, device and equipment in a kind of piece of chain type account book | |
CN111611230A (en) | Method and device for establishing main data system, computer equipment and storage medium | |
CN116955357A (en) | Object identification recognition method and device and computer equipment | |
CN115687560A (en) | Mass keyword searching method based on finite automaton | |
CN115495452A (en) | Data processing method, data processing device, computer equipment and storage medium | |
CN112487497A (en) | Method and device for managing off-link files based on intelligent contracts and electronic equipment | |
CN116303405B (en) | Data duplicate checking method and device and computer equipment | |
CN113722334B (en) | Data processing method, device, electronic equipment and medium | |
CN104156358A (en) | Method, device and system for reading tables of database in batches | |
CN112860755B (en) | Service identifier generation method, device, computer equipment and medium | |
CN117827799A (en) | Database establishment method and device, computer equipment and storage medium | |
CN117667999A (en) | Data pushing method, device, computer equipment and computer readable storage medium | |
CN116225830A (en) | Service operation log reporting method and device, computer equipment and storage medium | |
CN113961636A (en) | Object relation query method and device, computer equipment and storage medium | |
CN116962054A (en) | Data processing method, device, computer equipment and storage medium | |
CN115292182A (en) | Method for searching test data conforming to test case in service test scene | |
CN116860269A (en) | Method, apparatus, device, storage medium and program product for managing platform software |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |