CN116962054A - Data processing method, device, computer equipment and storage medium - Google Patents

Data processing method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN116962054A
CN116962054A CN202310943086.0A CN202310943086A CN116962054A CN 116962054 A CN116962054 A CN 116962054A CN 202310943086 A CN202310943086 A CN 202310943086A CN 116962054 A CN116962054 A CN 116962054A
Authority
CN
China
Prior art keywords
user
information
certificate
name
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310943086.0A
Other languages
Chinese (zh)
Inventor
陈伟伟
胡高翔
郭胜男
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qichacha Technology Co ltd
Original Assignee
Qichacha Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qichacha Technology Co ltd filed Critical Qichacha Technology Co ltd
Priority to CN202310943086.0A priority Critical patent/CN116962054A/en
Publication of CN116962054A publication Critical patent/CN116962054A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present application relates to a data processing method, apparatus, computer device, storage medium and computer program product. The method comprises the following steps: acquiring the name, identity information and certificate information of a first user; generating a user identifier of the first user according to the acquired first user information; acquiring the name of the second user, the identity information and the certificate information of the second user from part of the information of the second user; matching the acquired second user information with the acquired first user information; and under the condition that the second user information is matched with the first user information, indicating that the second user and the first user are the same user, and updating part of information of the second user to the user identification of the first user. By adopting the method, the unique user can be determined according to incomplete information of the user, and the relationship between the user and the information associated with the user is established.

Description

Data processing method, device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technology, and in particular, to a data processing method, apparatus, computer device, storage medium, and computer program product.
Background
With the development of computer technology, an identification technology appears, and user identification can identify user identity through a mapping relationship between user information and user names.
In the current identity recognition method, identity information is adopted to determine the identity of a user, or user behavior information, such as a computer network protocol (Internet Protocol, IP) address, a data fragment (COOKIE) stored in a browser end at a server end, and the like, is adopted to determine the identity of the user when a webpage is browsed.
However, in the current identification method, there must be complete user information and a mapping relationship between the complete user information and the user, and the user identity cannot be identified according to the user fragment information, so that there is a barrier to establishing the association between the user information.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a data processing method, apparatus, computer device, computer-readable storage medium, and computer program product that can improve information utilization efficiency.
In a first aspect, the present application provides a data processing method. The method comprises the following steps:
acquiring the name, identity information and certificate information of a first user, wherein the identity information and the certificate information are incomplete information;
Generating a user identification of the first user according to the name, the identity information and the certificate information of the first user;
acquiring partial information of a second user, and acquiring the name of the second user, the identity information and the certificate information of the second user from the partial information of the second user;
comparing the name of the second user with the name of the first user, and matching the identity information and the certificate information of the second user with the identity information and the certificate information of the first user;
and under the condition that the name of the second user is the same as the name of the first user and the identity information and the certificate information of the second user are matched with the identity information and the certificate information of the first user, the second user and the first user are indicated to be the same user, and part of information of the second user is updated to the user identification of the first user.
In one embodiment, generating the user identification of the first user according to the name, the identity information and the certificate information of the first user includes:
and generating a user identification of the first user according to the name, the identity information and the certificate information of the first user under the condition that the visible information of the identity information of the first user is larger than or equal to a first threshold value and the visible information of the certificate information of the first user is larger than or equal to a second threshold value.
In one embodiment, matching the identity information and the credential information of the second user with the identity information and the credential information of the first user includes:
extracting the identity information of the first user and the characteristic data in the certificate information and the corresponding position information of the characteristic data; extracting the identity information of the second user, the characteristic data in the certificate information and the corresponding position information of the characteristic data;
matching the characteristic data in the identity information of the second user and the corresponding position information of the characteristic data with the characteristic data in the identity information of the first user and the position information corresponding to the characteristic data; and matching the feature data in the certificate information of the second user and the position information corresponding to the feature data with the feature data in the certificate information of the first user and the position information corresponding to the feature data.
In one embodiment, updating the partial information of the second user to the user identification of the first user includes:
under the condition that the visible information of the identity information of the second user is larger than that of the first user, updating the identity information of the first user by adopting the visible information of the identity information of the second user;
Under the condition that the certificate information of the second user is the same as the certificate information of the first user and the visible information of the certificate information of the second user is larger than the visible information of the certificate information of the first user, updating the certificate information corresponding to the first user by adopting the certificate information of the second user;
and under the condition that the certificate information of the second user is different from the certificate information of the first user, updating the different certificate information corresponding to the second user to the user identification of the first user.
In one embodiment, the partial information of the second user includes behavior information and a corresponding timestamp; updating the partial information of the second user to the user identification of the first user comprises the following steps:
and arranging the behavior information of the second user according to the corresponding time stamp sequence, and updating the behavior information of the second user to the user identification of the first user according to the time stamp sequence.
In one embodiment, after acquiring the first user name, the identity information and the certificate information, the method further includes:
and summarizing the name, the identity information and the certificate information of the first user, and removing the completely repeated information.
In a second aspect, the application further provides a data processing device. The device comprises:
The first acquisition module is used for acquiring the name, the identity information and the certificate information of the first user, wherein the identity information and the certificate information are incomplete information;
the identification generation module is used for generating a user identification of the first user according to the name, the identity information and the certificate information of the first user;
the second acquisition module is used for acquiring partial information of the second user, and acquiring the name of the second user, the identity information and the certificate information of the second user from the partial information of the second user;
the information matching module is used for comparing the name of the second user with the name of the first user, and matching the identity information and the certificate information of the second user with the identity information and the certificate information of the first user;
and the information updating module is used for indicating that the second user and the first user are the same user and updating part of information of the second user under the user identification of the first user under the condition that the name of the second user is the same as the name of the first user and the identity information and the certificate information of the second user are matched with the identity information and the certificate information of the first user.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory storing a computer program and a processor which when executing the computer program performs the steps of:
Acquiring the name, identity information and certificate information of a first user, wherein the identity information and the certificate information are incomplete information;
generating a user identification of the first user according to the name, the identity information and the certificate information of the first user;
acquiring partial information of a second user, and acquiring the name of the second user, the identity information and the certificate information of the second user from the partial information of the second user;
comparing the name of the second user with the name of the first user, and matching the identity information and the certificate information of the second user with the identity information and the certificate information of the first user;
and under the condition that the name of the second user is the same as the name of the first user and the identity information and the certificate information of the second user are matched with the identity information and the certificate information of the first user, the second user and the first user are indicated to be the same user, and part of information of the second user is updated to the user identification of the first user.
In a fourth aspect, the present application also provides a computer-readable storage medium. The computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
acquiring the name, identity information and certificate information of a first user, wherein the identity information and the certificate information are incomplete information;
Generating a user identification of the first user according to the name, the identity information and the certificate information of the first user;
acquiring partial information of a second user, and acquiring the name of the second user, the identity information and the certificate information of the second user from the partial information of the second user;
comparing the name of the second user with the name of the first user, and matching the identity information and the certificate information of the second user with the identity information and the certificate information of the first user;
and under the condition that the name of the second user is the same as the name of the first user and the identity information and the certificate information of the second user are matched with the identity information and the certificate information of the first user, the second user and the first user are indicated to be the same user, and part of information of the second user is updated to the user identification of the first user.
In a fifth aspect, the present application also provides a computer program product. The computer program product comprises a computer program which, when executed by a processor, implements the steps of:
acquiring the name, identity information and certificate information of a first user, wherein the identity information and the certificate information are incomplete information;
generating a user identification of the first user according to the name, the identity information and the certificate information of the first user;
Acquiring partial information of a second user, and acquiring the name of the second user, the identity information and the certificate information of the second user from the partial information of the second user;
comparing the name of the second user with the name of the first user, and matching the identity information and the certificate information of the second user with the identity information and the certificate information of the first user;
and under the condition that the name of the second user is the same as the name of the first user and the identity information and the certificate information of the second user are matched with the identity information and the certificate information of the first user, the second user and the first user are indicated to be the same user, and part of information of the second user is updated to the user identification of the first user.
The data processing method, the data processing device, the computer equipment, the storage medium and the computer program product firstly determine the identity of a first user and generate a user identifier by acquiring the name, the incomplete identity information and the incomplete certificate information of the first user; determining the uniqueness of the first user; secondly, acquiring partial information of the second user, and acquiring the name of the second user, the identity information and the certificate information of the second user from the partial information of the second user; comparing the name of the second user with the name of the first user again, and matching the identity information and the certificate information of the second user with the identity information and the certificate information of the first user; and finally, under the condition that the name of the second user is the same as the name of the first user, and the identity information and the certificate information of the second user are matched with those of the first user, indicating that the second user and the first user are the same user, and updating part of information of the second user under the user identification of the first user. The method can determine the unique user according to incomplete information of the user, and establish the relationship between the user and the information associated with the user after determining the unique user.
Drawings
FIG. 1 is a diagram of an application environment for a data processing method in one embodiment;
FIG. 2 is a flow diagram of a data processing method in one embodiment;
FIG. 3 is a flow chart of matching second user information with first user information in one embodiment;
FIG. 4 is a flow chart of updating partial information of a second user to a user identifier of a first user in one embodiment;
FIG. 5 is a block diagram of a data processing apparatus in one embodiment;
fig. 6 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The data processing method provided by the embodiment of the application can be applied to an application environment shown in figure 1. Wherein the terminal 102 communicates with the server 104 via a network. The data storage system may store data that the server 104 needs to process. The data storage system may be integrated on the server 104 or may be located on a cloud or other network server. The server 104 acquires the name, identity information and certificate information of the first user, wherein the identity information and the certificate information are incomplete information; generating a user identification of the first user according to the name, the identity information and the certificate information of the first user; acquiring partial information of a second user, and acquiring the name of the second user, the identity information and the certificate information of the second user from the partial information of the second user; comparing the name of the second user with the name of the first user, and matching the identity information and the certificate information of the second user with the identity information and the certificate information of the first user; and under the condition that the name of the second user is the same as the name of the first user and the identity information and the certificate information of the second user are matched with the identity information and the certificate information of the first user, the second user and the first user are indicated to be the same user, and part of information of the second user is updated to the user identification of the first user. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices, and portable wearable devices, where the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart vehicle devices, and the like. The portable wearable device may be a smart watch, smart bracelet, headset, or the like. The server 104 may be implemented as a stand-alone server or as a server cluster of multiple servers.
In one embodiment, as shown in fig. 2, a data processing method is provided, and the method is applied to the processor in fig. 1 for illustration, and includes the following steps S202 to S210:
step S202, acquiring the name, identity information and certificate information of the first user, wherein the identity information and the certificate information are incomplete information.
The identity information refers to information for identifying the identity of the user, such as an identity card number, a passport, a driving license, a school number and the like; the certificate information includes certificate name, certificate number, time of acquisition, etc., as well as other information that can prove the identity of the user, such as identification card number, graduation universities, etc. The identity information and the certificate information are incomplete information, and the identity information and the certificate information have visible information and hidden invisible information.
Alternatively, the processor may periodically obtain the name, identity information and credential information of the first user from different data sources or from the same data source based on the timed task.
Optionally, the processor may directly obtain the name, identity information and certificate information of the first user from the data source, or may obtain the name, identity information and certificate information of the first user from the data source; indirect acquisition refers to acquiring information related and not related to identity information and certificate information from a data source, and analyzing the generated identity information or certificate information, such as the identity information or the certificate information calculated through a learning model.
Step S204, a user identification of the first user is generated according to the name, the identity information and the certificate information of the first user.
The user identifier is an identifier defined by the user according to the needs and is generally used for naming variables, functions, arrays and the like. The user identifier refers to information capable of representing the uniqueness of a user, the user identifier can be a section of user identity identifier, if the section of user identity identifier cannot represent a user uniquely, other identification information can be added on the basis of the user identity identifier, and the final aim is to enable one piece of user identity information to represent only one user. The user identifier may be a temporary user identifier or a permanent user identifier.
Optionally, the processor establishes a mapping relationship among the name of the first user, the incomplete identity information and the incomplete certificate information according to the obtained name, the incomplete identity information and the incomplete certificate information of the first user, determines the identity of the first user, and generates a user identifier for marking the user so as to identify the user.
Step S206, obtaining the partial information of the second user, and obtaining the name of the second user, the identity information of the second user and the certificate information from the partial information of the second user.
The part of information comprises the name of the second user, the identity information and the certificate information of the second user and other information.
Alternatively, the processor may periodically obtain information containing the second user name, identity information, and credential information from the same or different data sources.
Optionally, the processor may directly obtain the name, identity information and certificate information of the second user from the data source, or may obtain the name, identity information and certificate information of the first user from the middle of the data source; indirect acquisition refers to acquiring information related and not related to identity information and certificate information from a data source, and analyzing the generated identity information or certificate information, such as the identity information or the certificate information calculated through a learning model.
Step S208, the name of the second user is compared with the name of the first user, and the identity information and the certificate information of the second user are matched with the identity information and the certificate information of the first user.
The matching refers to a process of comparing the character strings of the identity information and the certificate information and positions corresponding to the character strings. The character string includes numerals, letters, symbols, characters, and the like.
Optionally, the processor compares the acquired name of the second user with the name of the first user, and matches the identity information and the certificate information of the second user with the identity information and the certificate information of the first user; the order of comparison of the name of the second user with the name of the first user, the identity information of the second user with the identity information of the first user, and the certificate information of the second user with the certificate information of the first user is not limited.
Step S210, when the name of the second user is the same as the name of the first user and the identity information and the certificate information of the second user are matched with those of the first user, the second user and the first user are indicated to be the same user, and part of information of the second user is updated under the user identification of the first user.
Wherein the second user's name being the same as the first user's name means that each character string constituting the second user and the first user is the same; the matching of the identity information and the certificate information of the second user with the identity information and the certificate information of the first user may be that the identity information and the certificate information of the second user are completely matched with the identity information and the certificate information of the first user, or may be that the identity information and the certificate information of the second user are partially matched with the identity information and the certificate information of the first user; partial matching means that the identity information and the credential information of the second user meet a preset confidence threshold, which is set based on the probability that the identity information and the credential information of the second user are identical to the identity information and the credential information of the first user.
Optionally, when the name of the second user is the same as the name of the first user and the identity information and the certificate information of the second user are completely matched with the identity information and the certificate information of the first user, the processor indicates that the second user and the first user are the same user, and updates part of information carried by the second user to the user identifier of the first user, that is, the name, the identity information and the certificate information of the second user are spliced with part of information of the first user to form an information record of the same user.
Optionally, when the name of the second user is the same as the name of the first user and the identity information and the certificate information of the second user reach a confidence threshold set based on the probability that the identity information and the certificate information of the second user are the same as the identity information and the certificate information of the first user, that is, the condition that the identity information and the certificate information of the second user are partially matched with the identity information and the certificate information of the first user is met, the processor indicates that the second user and the first user are the same user, and updates part of information carried by the second user to the user identifier of the first user, that is, the name, the identity information and the certificate information of the second user and part of information of the first user are spliced to form an information record of the same user.
In the data processing method, firstly, the identity of a first user is determined and a user identifier is generated by acquiring the name, incomplete identity information and incomplete certificate information of the first user, so that the uniqueness of the first user is determined; secondly, acquiring partial information of the second user, and acquiring the name of the second user, the identity information and the certificate information of the second user from the partial information of the second user; comparing the name of the second user with the name of the first user again, and matching the identity information and the certificate information of the second user with the identity information and the certificate information of the first user; and finally, under the condition that the name of the second user is the same as the name of the first user, and the identity information and the certificate information of the second user are matched with those of the first user, indicating that the second user and the first user are the same user, and updating part of information of the second user under the user identification of the first user. The method can determine the unique user according to incomplete information of the user, and establish the relationship between the user and the information associated with the user after determining the unique user.
In one embodiment, generating the user identification of the first user from the name, identity information, and credential information of the first user includes:
And generating a user identification of the first user according to the name, the identity information and the certificate information of the first user under the condition that the visible information of the identity information of the first user is larger than or equal to a first threshold value and the visible information of the certificate information of the first user is larger than or equal to a second threshold value.
Wherein the first threshold value refers to a threshold value set based on the visible information of the identity information, and the second threshold value refers to a threshold value set based on the visible information of the certificate information.
Optionally, when the visible information of the identity information of the first user is greater than or equal to the first threshold, if the visible information of the identity card number of the first user is visible in the first 6 bits and the last 4 bits, the middle field of the identity card number is a hidden field, and the first threshold is set to the first 6 bits and the last 4 bits, the identity information of the first user is considered to be greater than or equal to the first threshold; and when the visible information of the certificate information of the first user is larger than or equal to a second threshold value, if the front 4 bits and the rear 4 bits of the first-level constructor qualification certificate are visible, the second threshold value is set to be the front 3 bits and the rear 3 bits, and the processor generates a user identifier of the first user according to the name, the identity number and the certificate number of the first user. Wherein the first threshold and the second threshold are adjustable.
In this embodiment, the unique first user can be determined by the identity information and the certificate information, which reach a certain number of bits based on the name and the visible information of the first user.
In one embodiment, as shown in fig. 3, matching the identity information and the credential information of the second user with the identity information and the credential information of the first user includes:
step S302, extracting the identity information of the first user, the characteristic data in the certificate information and the corresponding position information of the characteristic data; and extracting the identity information of the second user, the characteristic data in the certificate information and the corresponding position information of the characteristic data.
Wherein the feature is an independently observable attribute or characteristic of the observed object; the feature data refers to data carrying at least one independently observable attribute or feature tag, such as the identification number in the identity information, the number in the student card is the feature data.
Optionally, the processor extracts the identity information of the first user, the feature data in the certificate information and the position information corresponding to the feature data from the information carriers such as pictures, voices, documents and tables, for example, extracts an identification card number from the identification card picture as the feature data, extracts the position of each position of visible information of the identification card number, and for example, acquires a number from the student card picture as the feature data, and extracts the position of each position of visible information of the number. And simultaneously extracting the identity information of the second user, the characteristic data in the certificate information and the position information corresponding to the characteristic data by adopting the same extraction method.
Step S304, matching the characteristic data in the identity information of the second user and the corresponding position information of the characteristic data with the characteristic data in the identity information of the first user and the position information corresponding to the characteristic data; and matching the feature data in the certificate information of the second user and the position information corresponding to the feature data with the feature data in the certificate information of the first user and the position information corresponding to the feature data.
Optionally, the processor matches the feature data in the identity information of the second user and the corresponding position information of the feature data with the feature data in the identity information of the first user and the position information corresponding to the feature data; and if the visible information and the corresponding relation of the identification card number of the second user are matched with the visible information and the corresponding relation of the identification card number of the first user.
Optionally, the processor matches the feature data in the certificate information of the second user and the location information corresponding to the feature data with the feature data in the certificate information of the first user and the location information corresponding to the feature data. And matching the visible information of the certificate number and the corresponding relation of the second user with the visible information of the certificate number and the corresponding relation of the first user.
Optionally, the processor matches the feature data in the identity information of the second user and the corresponding position information of the feature data with the feature data in the identity information of the first user and the position information corresponding to the feature data; the feature data in the certificate information of the second user and the position information corresponding to the feature data are matched with the feature data in the certificate information of the first user and the position information corresponding to the feature data, and the feature data and the position information corresponding to the feature data can be executed simultaneously or in sequence.
In this embodiment, by matching the identity information and the certificate information of the second user with the identity information and the certificate information of the first user, it can be determined whether the second user and the first user are the same user through the matching result.
In one embodiment, as shown in fig. 4, updating the partial information of the second user to the user identifier of the first user includes:
step S402, in the case that the visible information of the identity information of the second user is larger than the visible information of the identity information of the first user, the visible information of the identity information of the second user is used for updating the identity information of the first user.
Optionally, the number of visible digits of the identification card number of the second user is the first 6 digits and the last 6 digits, and the number of visible digits of the identification card number of the first user is the first 6 digits and the last 4 digits, and at this time, the identification card number of the first user in the first 6 digits and the last 4 digits is updated to the first 6 digits and the last 6 digits of the identification card number of the second user.
In step S404, when the certificate information of the second user is the same as the certificate information of the first user, and the visible information of the certificate information of the second user is greater than the visible information of the certificate information of the first user, the certificate information corresponding to the first user is updated by using the certificate information of the second user.
Alternatively, the number of visible bits of the certificate number of the second user is the first 5 bits and the last 5 bits, and the number of visible bits of the certificate number of the first user is the first 4 bits and the last 4 bits, and at this time, the certificate numbers of the first 4 bits and the last 4 bits are updated to the first 5 bits and the last 5 bits of the certificate number of the second user.
In step S406, in the case that the certificate information of the second user is different from the certificate information of the first user, the different certificate information corresponding to the second user is updated to the user identifier of the first user.
Optionally, the certificate information of the second user is a primary constructor certificate, and the certificate information of the first user is a secondary constructor certificate, and the primary constructor certificate needs to be updated into the information of the first user.
In this embodiment, the information of the same user can be aggregated by updating part of the information of the second user to the name of the first user.
In one embodiment, the partial information of the second user includes behavior information and a corresponding timestamp; updating the partial information of the second user to the user identification of the first user comprises the following steps:
and arranging the behavior information of the second user according to the corresponding time stamp sequence, and updating the behavior information of the second user to the user identification of the first user according to the time stamp sequence.
The behavior information is certain information transmitted through behaviors, the behavior information is characterized by behavior data, and the behavior data are data generated when an individual interacts with a platform, such as Zhang san at company A or Lisi at school B. A timestamp is a sequence of characters or coded information that identifies when a particular event has occurred, typically giving a date and time, sometimes to the nearest fraction of a second.
Optionally, the behavior information of the second user is ordered according to the corresponding time stamp, for example, in 2013, the second user is in school a, in 2017, the second user is in school B, in 2018, the second user is in company a, in 2023, the behavior information of the second user is spliced with the name, identity information and certificate information of the first user, and is updated into a record.
Optionally, the name, identity information, certificate information a and the month of 2017 of the first user acquired from the data source a are the name, identity information, certificate information a and the month of 2017 of the job-seeking company a, and the part of the information of the second user, including the name, the identity information, the certificate information a and the month of 2018 of the job-seeking company B, acquired from the data source B is updated to the name of the first user, that is, the information of the second user and the information of the first user are spliced into a record, so as to obtain the name, the identity information, the certificate information a and the month of 2017 of the job-seeking company a and the month of 2018 of the job-seeking company B, thereby obtaining the optional track change information of the name of the first user.
In the above embodiment, the identity information, the certificate information a and the certificate information B of the third party are obtained from the data source C, the name information, the identity information and the certificate information a of the second party are matched with the name information, the identity information and the certificate information a of the first party, when the information of the second party matches the information of the first party, the identity information, the certificate information a and the certificate information B of the third party are updated to the name information of the first party, so as to form records of the name information, the identity information, the certificate information a, the certificate information B, the job company a of a month in 2017 and the job company B of a month in 2018, and the obtained time in the certificate information is checked and compared with the timestamp information corresponding to the behavior information. Assuming that the certification time of the certificate information a is 2016 years, the information obtained at this time is: zhang III, identity information, certificate information B, and records of company A and company B with certificate information A in month 2017 and company B with certificate information A in month 2018.
In this embodiment, the change track of the user can be obtained by updating the user behavior information.
In one embodiment, after acquiring the first user name, identity information, and credential information, further comprising:
and summarizing the name, the identity information and the certificate information of the first user, and removing the completely repeated information.
Optionally, acquiring the name, identity information and certificate information of the first user, wherein the identity information comprises information such as the name, the certificate number for proving identity, and the like, such as an identity card number and a school number; the certificate information comprises information such as names, certificate numbers, graduation institutions and the like, the acquired information is summarized, and completely repeated information is removed, if the names appear in the identity information and the certificate information, only one name is reserved.
In this embodiment, by performing deduplication on the first user related information, data redundancy in the data processing process can be reduced.
The name of the third user, the identity information comprising the name, the visible identification card number of the first 6 bits and the last 4 bits, and the certificate information A comprising the name of the certificate holder, the time of obtaining the certificate, the visible first 4 bits and the last 4 bits of the certificate number are obtained from the data source A.
Summarizing the information of the first user, removing completely repeated information such as names, and obtaining the first user name, the first 6 and the last 4 visible identification card numbers, and the certificate information A containing the evidence obtaining time and the first 4 and the last 4 visible identification card numbers.
Assume that the first threshold is set to the first 6 bits and the last 4 bits; the second threshold is set to the first 4 bits and the last 4 bits, and the settings of the first threshold and the second threshold can be changed. The visible information of the identity information of the first user Zhang Sanis equal to a first threshold value, the visible information of the certificate information of the first user is equal to a second threshold value, and at the moment, the unique ID of the first user Zhang Sanis generated according to the incomplete identity information and the certificate information.
And acquiring partial information of the second user from the data source B, and acquiring the name of the second user, the identity information and the certificate information of the second user from the partial information of the second user.
Comparing the name of the third user with the name of the third user, and extracting the identification card number and the corresponding position information of the third user, and the identification card number and the corresponding position information of the third user; matching the identity card number and the corresponding position information of the first user with the identity card number and the corresponding position information of the second user, and matching the certificate number and the corresponding position information of the first user with the certificate number and the corresponding position information of the second user.
Under the condition that the name of the second user Zhang is the same as that of the first user Zhang, the identity card number and the corresponding position information of the second user are matched with those of the first user, and the certificate number and the corresponding position information of the second user are matched with those of the first user, the second user Zhang is the same as that of the first user Zhang, and under the condition that the visible information (front 6 bits and rear 6 bits) of the identity card of the second user is larger than that of the first user, the identity card number of the first user Zhang is updated by adopting the visible information (front 6 bits and rear 6 bits) of the identity card number of the second user Zhang.
In the case where the second user's third certificate information a is identical to the first user's third certificate information a, and the visible information (the first 5 bits and the last 5 bits) of the second user's certificate information is larger than the visible information (the first 4 bits and the last 4 bits) of the first user's certificate information, the certificate number (the first 5 bits and the last 5 bits) of the first user's third certificate information a is updated with the certificate number (the first 4 bits and the last 4 bits) of the second user's third certificate information a.
The partial information of the second user Zhang three includes behavior information such as job-B and corresponding timestamp 2018 and job-A and corresponding timestamp 2017; arranging the behavior information of the second user on the third party according to the time sequence to obtain 2017 on the A company and 2018 on the B company, and updating the ordered behavior information under the representation of the first user on the third party to obtain on the third party, an identity card number (the front 6 bits and the rear 6 bits), a certificate number (the front 5 bits and the rear 5 bits) of the certificate information A and 2017 on the A company and 2018 on the B company, so that the track of the third party is changed into the A company to the B company. If the certificate A has been acquired earlier than 2017, it is known that 2017 takes part in company A with certificate A and 2018 takes part in company B with certificate A.
Or under the condition that the certificate information B of the second user and the certificate information A of the first user are different, updating the different certificate information B corresponding to the second user to the user identification of the first user to obtain the certificate, the identification card number (the front 6 bit and the rear 6 bit), the certificate number (the front 5 bit and the rear 5 bit) of the certificate information A, the certificate information B and the 2017 job of the company A and the 2018 job of the company B, and therefore the track of the second user to the third user can be changed into the company A to the company B. If the certificate a has a certificate acquisition time earlier than 2017, the certificate a has a certificate acquisition time in 2018 for a month, and it can be known that the certificate a is carried by the certificate a in 2017 and the certificate a and the certificate B are carried by the certificate B in 2018.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a data processing device for realizing the above related data processing method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation of one or more embodiments of the data processing device provided below may refer to the limitation of the data processing method hereinabove, and will not be repeated herein.
In one embodiment, as shown in FIG. 5, there is provided a data processing apparatus comprising: a first acquisition module 501, an identification generation module 502, a second acquisition module 503, an information matching module 504, and an information updating module 505, wherein:
the first obtaining module 501 is configured to obtain a name, identity information, and certificate information of a first user, where the identity information and the certificate information are incomplete information.
The identifier generating module 502 is configured to generate a user identifier of the first user according to the name, identity information and certificate information of the first user.
A second obtaining module 503, configured to obtain partial information of a second user, and obtain a name of the second user, identity information of the second user, and certificate information from the partial information of the second user.
An information matching module 504, configured to compare the name of the second user with the name of the first user, and match the identity information and the credential information of the second user with the identity information and the credential information of the first user.
The information updating module 505 is configured to indicate that the second user is the same user as the first user, and update part of information of the second user to a user identifier of the first user when the name of the second user is the same as the name of the first user and the identity information and the credential information of the second user are matched with the identity information and the credential information of the first user.
In one embodiment, the identity generation module 502 includes:
and the threshold comparison unit is used for generating a user identifier of the first user according to the name, the identity information and the certificate information of the first user under the condition that the visible information of the identity information of the first user is larger than a first threshold value and the visible information of the certificate information of the first user is larger than a second threshold value.
In one embodiment, the information matching module 504 includes:
an information extraction unit for extracting the identity information of the first user, the feature data in the certificate information and the corresponding position information of the feature data; and extracting the identity information of the second user, the characteristic data in the certificate information and the corresponding position information of the characteristic data.
The information matching unit is used for matching the characteristic data in the identity information of the second user and the corresponding position information of the characteristic data with the characteristic data in the identity information of the first user and the position information corresponding to the characteristic data; and matching the feature data in the certificate information of the second user and the position information corresponding to the feature data with the feature data in the certificate information of the first user and the position information corresponding to the feature data.
In one embodiment, the information update module 505 includes:
the information updating unit is used for updating the identity information of the first user by adopting the visible information of the identity information of the second user under the condition that the visible information of the identity information of the second user is larger than the visible information of the identity information of the first user; under the condition that the certificate information of the second user is the same as the certificate information of the first user and the visible information of the certificate information of the second user is larger than the visible information of the certificate information of the first user, updating the certificate information corresponding to the first user by adopting the certificate information of the second user; and under the condition that the certificate information of the second user is different from the certificate information of the first user, updating the different certificate information corresponding to the second user to the user identification of the first user.
In one embodiment, the partial information of the second user includes behavior information and a corresponding timestamp, and the information update module 505 further includes:
the ordering updating unit is used for ordering the behavior information of the second user according to the corresponding time stamp sequence and updating the behavior information of the second user to the user identification of the first user according to the time stamp sequence.
In one embodiment, the data processing apparatus further includes:
and the summarizing and de-duplication module is used for summarizing the name, the identity information and the certificate information of the first user and removing the completely repeated information.
Each of the modules in the above-described data processing apparatus may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 6. The computer device includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is for storing first user information and second user information related data. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a data processing method.
It will be appreciated by those skilled in the art that the structure shown in FIG. 6 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of:
acquiring the name, identity information and certificate information of a first user, wherein the identity information and the certificate information are incomplete information;
generating a user identification of the first user according to the name, the identity information and the certificate information of the first user;
acquiring partial information of a second user, and acquiring the name of the second user, the identity information and the certificate information of the second user from the partial information of the second user;
comparing the name of the second user with the name of the first user, and matching the identity information and the certificate information of the second user with the identity information and the certificate information of the first user;
And under the condition that the name of the second user is the same as the name of the first user and the identity information and the certificate information of the second user are matched with the identity information and the certificate information of the first user, the second user and the first user are indicated to be the same user, and part of information of the second user is updated to the user identification of the first user.
In one embodiment, the processor when executing the computer program further performs the steps of:
and generating a user identification of the first user according to the name, the identity information and the certificate information of the first user under the condition that the visible information of the identity information of the first user is larger than a first threshold value and the visible information of the certificate information of the first user is larger than a second threshold value.
In one embodiment, the processor when executing the computer program further performs the steps of:
extracting the identity information of the first user and the characteristic data in the certificate information and the corresponding position information of the characteristic data; extracting the identity information of the second user, the characteristic data in the certificate information and the corresponding position information of the characteristic data; matching the characteristic data in the identity information of the second user and the corresponding position information of the characteristic data with the characteristic data in the identity information of the first user and the position information corresponding to the characteristic data; and matching the feature data in the certificate information of the second user and the position information corresponding to the feature data with the feature data in the certificate information of the first user and the position information corresponding to the feature data.
In one embodiment, the processor when executing the computer program further performs the steps of:
under the condition that the visible information of the identity information of the second user is larger than that of the first user, updating the identity information of the first user by adopting the visible information of the identity information of the second user; under the condition that the certificate information of the second user is the same as the certificate information of the first user and the visible information of the certificate information of the second user is larger than the visible information of the certificate information of the first user, updating the certificate information corresponding to the first user by adopting the certificate information of the second user; and under the condition that the certificate information of the second user is different from the certificate information of the first user, updating the different certificate information corresponding to the second user to the user identification of the first user.
In one embodiment, the processor when executing the computer program further performs the steps of:
and arranging the behavior information of the second user according to the corresponding time stamp sequence, and updating the behavior information of the second user to the user identification of the first user according to the time stamp sequence.
In one embodiment, the processor when executing the computer program further performs the steps of:
And summarizing the name, the identity information and the certificate information of the first user, and removing the completely repeated information.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
acquiring the name, identity information and certificate information of a first user, wherein the identity information and the certificate information are incomplete information;
generating a user identification of the first user according to the name, the identity information and the certificate information of the first user;
acquiring partial information of a second user, and acquiring the name of the second user, the identity information and the certificate information of the second user from the partial information of the second user;
comparing the name of the second user with the name of the first user, and matching the identity information and the certificate information of the second user with the identity information and the certificate information of the first user;
and under the condition that the name of the second user is the same as the name of the first user and the identity information and the certificate information of the second user are matched with the identity information and the certificate information of the first user, the second user and the first user are indicated to be the same user, and part of information of the second user is updated to the user identification of the first user.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and generating a user identification of the first user according to the name, the identity information and the certificate information of the first user under the condition that the visible information of the identity information of the first user is larger than a first threshold value and the visible information of the certificate information of the first user is larger than a second threshold value.
In one embodiment, the computer program when executed by the processor further performs the steps of:
extracting the identity information of the first user and the characteristic data in the certificate information and the corresponding position information of the characteristic data; extracting the identity information of the second user, the characteristic data in the certificate information and the corresponding position information of the characteristic data; matching the characteristic data in the identity information of the second user and the corresponding position information of the characteristic data with the characteristic data in the identity information of the first user and the position information corresponding to the characteristic data; and matching the feature data in the certificate information of the second user and the position information corresponding to the feature data with the feature data in the certificate information of the first user and the position information corresponding to the feature data.
In one embodiment, the computer program when executed by the processor further performs the steps of:
Under the condition that the visible information of the identity information of the second user is larger than that of the first user, updating the identity information of the first user by adopting the visible information of the identity information of the second user; under the condition that the certificate information of the second user is the same as the certificate information of the first user and the visible information of the certificate information of the second user is larger than the visible information of the certificate information of the first user, updating the certificate information corresponding to the first user by adopting the certificate information of the second user; and under the condition that the certificate information of the second user is different from the certificate information of the first user, updating the different certificate information corresponding to the second user to the user identification of the first user.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and arranging the behavior information of the second user according to the corresponding time stamp sequence, and updating the behavior information of the second user to the user identification of the first user according to the time stamp sequence.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and summarizing the name, the identity information and the certificate information of the first user, and removing the completely repeated information.
In one embodiment, a computer program product is provided comprising a computer program which, when executed by a processor, performs the steps of:
acquiring the name, identity information and certificate information of a first user, wherein the identity information and the certificate information are incomplete information;
generating a user identification of the first user according to the name, the identity information and the certificate information of the first user;
acquiring partial information of a second user, and acquiring the name of the second user, the identity information and the certificate information of the second user from the partial information of the second user;
comparing the name of the second user with the name of the first user, and matching the identity information and the certificate information of the second user with the identity information and the certificate information of the first user;
and under the condition that the name of the second user is the same as the name of the first user and the identity information and the certificate information of the second user are matched with the identity information and the certificate information of the first user, the second user and the first user are indicated to be the same user, and part of information of the second user is updated to the user identification of the first user.
In one embodiment, the computer program when executed by the processor further performs the steps of:
And generating a user identification of the first user according to the name, the identity information and the certificate information of the first user under the condition that the visible information of the identity information of the first user is larger than a first threshold value and the visible information of the certificate information of the first user is larger than a second threshold value.
In one embodiment, the computer program when executed by the processor further performs the steps of:
extracting the identity information of the first user and the characteristic data in the certificate information and the corresponding position information of the characteristic data; extracting the identity information of the second user, the characteristic data in the certificate information and the corresponding position information of the characteristic data; matching the characteristic data in the identity information of the second user and the corresponding position information of the characteristic data with the characteristic data in the identity information of the first user and the position information corresponding to the characteristic data; and matching the feature data in the certificate information of the second user and the position information corresponding to the feature data with the feature data in the certificate information of the first user and the position information corresponding to the feature data.
In one embodiment, the computer program when executed by the processor further performs the steps of:
under the condition that the visible information of the identity information of the second user is larger than that of the first user, updating the identity information of the first user by adopting the visible information of the identity information of the second user; under the condition that the certificate information of the second user is the same as the certificate information of the first user and the visible information of the certificate information of the second user is larger than the visible information of the certificate information of the first user, updating the certificate information corresponding to the first user by adopting the certificate information of the second user; and under the condition that the certificate information of the second user is different from the certificate information of the first user, updating the different certificate information corresponding to the second user to the user identification of the first user.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and arranging the behavior information of the second user according to the corresponding time stamp sequence, and updating the behavior information of the second user to the user identification of the first user according to the time stamp sequence.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and summarizing the name, the identity information and the certificate information of the first user, and removing the completely repeated information.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data need to comply with the related laws and regulations and standards of the related country and region.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (10)

1. A method of data processing, the method comprising:
acquiring the name, identity information and certificate information of a first user, wherein the identity information and the certificate information are incomplete information;
generating a user identification of the first user according to the name, the identity information and the certificate information of the first user;
acquiring partial information of a second user, and acquiring the name of the second user, the identity information and the certificate information of the second user from the partial information of the second user;
Comparing the name of the second user with the name of the first user, and matching the identity information and the certificate information of the second user with the identity information and the certificate information of the first user;
and under the condition that the name of the second user is the same as the name of the first user and the identity information and the certificate information of the second user are matched with the identity information and the certificate information of the first user, indicating that the second user and the first user are the same user, and updating part of information of the second user under the user identification of the first user.
2. The method of claim 1, wherein the generating the user identification of the first user from the name, identity information, and credential information of the first user comprises:
and generating a user identification of the first user according to the name, the identity information and the certificate information of the first user under the condition that the visible information of the identity information of the first user is larger than or equal to a first threshold value and the visible information of the certificate information of the first user is larger than or equal to a second threshold value.
3. The method of claim 1, wherein said matching the identity information and credential information of the second user with the identity information and credential information of the first user comprises:
Extracting characteristic data in the identity information and the certificate information of the first user and position information corresponding to the characteristic data; extracting characteristic data in the identity information and the certificate information of the second user and position information corresponding to the characteristic data;
matching the characteristic data in the identity information of the second user and the corresponding position information of the characteristic data with the characteristic data in the identity information of the first user and the position information corresponding to the characteristic data; and matching the characteristic data and the position information corresponding to the characteristic data in the certificate information of the second user with the characteristic data and the position information corresponding to the characteristic data in the certificate information of the first user.
4. The method of claim 1, wherein the updating the partial information of the second user to the user identification of the first user comprises:
updating the identity information of the first user by adopting the visible information of the identity information of the second user under the condition that the visible information of the identity information of the second user is larger than the visible information of the identity information of the first user;
when the certificate information of the second user is the same as the certificate information of the first user and the visible information of the certificate information of the second user is larger than the visible information of the certificate information of the first user, updating the certificate information corresponding to the first user by adopting the certificate information of the second user;
And updating different certificate information corresponding to the second user under the user identification of the first user under the condition that the certificate information of the second user is different from the certificate information of the first user.
5. The method of claim 1, wherein the partial information of the second user includes behavior information and a corresponding timestamp; the updating the partial information of the second user to the user identification of the first user comprises the following steps:
and arranging the behavior information of the second user according to the corresponding time stamp sequence, and updating the behavior information of the second user to the user identification of the first user according to the time stamp sequence.
6. The method of claim 1, further comprising, after the obtaining the first user name, identity information, and credential information:
and summarizing the name, the identity information and the certificate information of the first user, and removing the completely repeated information.
7. A data processing apparatus, the apparatus comprising:
the first acquisition module is used for acquiring the name, the identity information and the certificate information of the first user, wherein the identity information and the certificate information are incomplete information;
The identification generation module is used for generating a user identification of the first user according to the name, the identity information and the certificate information of the first user;
the second acquisition module is used for acquiring partial information of a second user, and acquiring the name of the second user, the identity information and the certificate information of the second user from the partial information of the second user;
the information matching module is used for comparing the name of the second user with the name of the first user and matching the identity information and the certificate information of the second user with the identity information and the certificate information of the first user;
and the information updating module is used for indicating that the second user and the first user are the same user when the name of the second user is the same as the name of the first user and the identity information and the certificate information of the second user are matched with the identity information and the certificate information of the first user, and updating part of information of the second user under the user identification of the first user.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
CN202310943086.0A 2023-07-28 2023-07-28 Data processing method, device, computer equipment and storage medium Pending CN116962054A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310943086.0A CN116962054A (en) 2023-07-28 2023-07-28 Data processing method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310943086.0A CN116962054A (en) 2023-07-28 2023-07-28 Data processing method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116962054A true CN116962054A (en) 2023-10-27

Family

ID=88461593

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310943086.0A Pending CN116962054A (en) 2023-07-28 2023-07-28 Data processing method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116962054A (en)

Similar Documents

Publication Publication Date Title
AU2015347304B2 (en) Testing insecure computing environments using random data sets generated from characterizations of real data sets
CN115544183A (en) Data visualization method and device, computer equipment and storage medium
CN113553458A (en) Data export method and device in graph database
CN110209780A (en) A kind of question template generation method, device, server and storage medium
CN116962054A (en) Data processing method, device, computer equipment and storage medium
CN110851446B (en) Data table generation method and device, computer equipment and storage medium
US20200401569A1 (en) System and method for data reconciliation
CN107078998A (en) Information object system
CN114880328A (en) Shop data processing method and device, computer equipment and storage medium
CN113961636A (en) Object relation query method and device, computer equipment and storage medium
CN117725077A (en) Identification search method, apparatus, computer device, storage medium, and program product
CN117874786A (en) Chip data encryption method, decryption method, device and computer equipment
CN117076476A (en) Object information processing method, device, computer equipment and storage medium
CN116069991A (en) Server data acquisition method, device, computer equipment and storage medium
CN117610815A (en) Resource quota data processing method, device, computer equipment and storage medium
CN116910115A (en) Group query method, device, computer equipment and storage medium
CN115329034A (en) User information identification method and device, computer equipment and storage medium
CN116955357A (en) Object identification recognition method and device and computer equipment
CN116610703A (en) Data query method, device, computer equipment and storage medium
CN116827630A (en) Searchable encryption method, device, equipment and storage medium for card service information
CN114090588A (en) Block chain presence verification method and device, computer equipment and storage medium
CN117216164A (en) Financial data synchronous processing method, apparatus, device, medium and program product
CN117632009A (en) Data storage method and device based on business application and computer equipment
CN117725931A (en) Company name recognition method and system
CN118035423A (en) Information query method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination