CN117150094A - User information storage method, device, equipment and storage medium - Google Patents
User information storage method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN117150094A CN117150094A CN202311140397.XA CN202311140397A CN117150094A CN 117150094 A CN117150094 A CN 117150094A CN 202311140397 A CN202311140397 A CN 202311140397A CN 117150094 A CN117150094 A CN 117150094A
- Authority
- CN
- China
- Prior art keywords
- user information
- application system
- target user
- user
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000012216 screening Methods 0.000 claims abstract description 18
- 238000004891 communication Methods 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 6
- 238000004590 computer program Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 210000001747 pupil Anatomy 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/903—Querying
- G06F16/9032—Query formulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/903—Querying
- G06F16/90335—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/903—Querying
- G06F16/9035—Filtering based on additional data, e.g. user or group profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/903—Querying
- G06F16/9038—Presentation of query results
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a method, a device, equipment and a storage medium for storing user information, which can be applied to the field of big data or the field of finance. The method comprises the following steps: acquiring a user information inquiry request sent by an application system, wherein the user information inquiry request comprises a user identifier and an application system identifier; inquiring corresponding user information from a user information base according to the user identification; screening the user information by using the application system identifier, and determining that the user information in the application system authority is target user information; and returning the target user information to the application system in the form of a user information form, and displaying the target user information in the application system. In the method, the user information is uniformly stored in the user information base, and when the application system needs to acquire the user information, the user information in the authority range of the application system is determined according to the user identification and the application system identification. Unified storage management of user information is achieved.
Description
Technical Field
The present application relates to the field of big data or the field of financial technologies, and in particular, to a method, an apparatus, a device, and a storage medium for storing user information.
Background
Information storage is a social activity performed by humans to collect, process, and utilize information. It is the result and trend of the development of science and technology, the transition of social environment, and the progress of human ideas.
Users typically need to authorize the application system and fill in various personal information in the application system before using the various application systems, such as: name, phone, address, etc. User information is stored in each application system, and once the user information is carelessly revealed, serious consequences can be caused.
Disclosure of Invention
In view of this, the embodiments of the present application provide a method, an apparatus, a device, and a storage medium for storing user information, which aim to uniformly store user information, so as to avoid leakage of user information as much as possible.
In a first aspect, an embodiment of the present application provides a method for storing user information, where the method includes:
acquiring a user information inquiry request sent by an application system, wherein the user information inquiry request comprises a user identifier and an application system identifier;
inquiring corresponding user information from a user information base according to the user identification;
screening the user information by using the application system identifier, and determining that the user information in the application system authority is target user information;
and returning the target user information to the application system in the form of a user information form, and displaying the target user information in the application system.
Optionally, the returning the target user information to the application system in the form of a user information form includes:
decrypting the target user information to obtain target user plaintext information;
establishing a corresponding relation between the target user plaintext information and the user information form, and filling the target user plaintext information into a corresponding position of the user information form to obtain a target user information form;
and returning the target user information form to the application system.
Optionally, the returning the target user information form to the application system includes:
determining a communication channel corresponding to the application system;
and returning the target user information form to the application system through the communication channel.
Optionally, the method further comprises:
setting a time stamp for the user information form, wherein the time stamp is the display ending time of the user information form;
and stopping displaying the user information form when the time reaches the time stamp.
Optionally, the method further comprises:
when the target user information in the user information form is changed, returning the changed target user information to the user information base;
and integrating the changed target user information with the user information according to the user identification, and storing the integrated target user information and the user information in the user information base.
Optionally, the returning the changed target user information to the user information base includes:
encrypting the changed target user information according to encryption conditions to obtain target user ciphertext information;
and returning the target user ciphertext information to the user information base.
Optionally, the integrating the changed target user information with the user information according to the user identifier includes:
decrypting the target user ciphertext information to obtain the changed target user information;
determining a user identifier corresponding to the changed target user information;
and determining corresponding user information according to the user identification, and integrating the user information with the changed target user information.
In a second aspect, an embodiment of the present application provides a storage device for user information, where the device includes:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a user information inquiry request sent by an application system, and the user information inquiry request comprises a user identifier and an application system identifier;
the query module is used for querying corresponding user information from a user information base according to the user identification;
the screening module is used for screening the user information by utilizing the application system identifier and determining that the user information in the application system authority is target user information;
and the display module is used for returning the target user information to the application system in the form of a user information form and displaying the target user information in the application system.
Optionally, the display module is specifically configured to decrypt the target user information to obtain plaintext information of the target user;
establishing a corresponding relation between the target user plaintext information and the user information form, and filling the target user plaintext information into a corresponding position of the user information form to obtain a target user information form;
and returning the target user information form to the application system.
Optionally, the display module is specifically configured to determine a communication channel corresponding to the application system; and returning the target user information form to the application system through the communication channel.
Optionally, the display module is further configured to set a timestamp for the user information form, where the timestamp is a display end time of the user information form;
and stopping displaying the user information form when the time reaches the time stamp.
Optionally, the apparatus further comprises:
the changing module is used for returning the changed target user information to the user information base when the target user information in the user information form is changed;
and integrating the changed target user information with the user information according to the user identification, and storing the integrated target user information and the user information in the user information base.
Optionally, the modification module is specifically configured to encrypt the modified target user information according to an encryption condition to obtain target user ciphertext information;
and returning the target user ciphertext information to the user information base.
Optionally, the modification module is specifically configured to decrypt the target user ciphertext information to obtain modified target user information;
determining a user identifier corresponding to the changed target user information;
and determining corresponding user information according to the user identification, and integrating the user information with the changed target user information.
In a third aspect, an embodiment of the present application provides an apparatus, the apparatus including a memory for storing instructions or code, and a processor for executing the instructions or code to cause the apparatus to perform the method for storing user information according to any one of the first aspects.
In a fourth aspect, an embodiment of the present application provides a computer storage medium having code stored therein, where when the code is executed, an apparatus executing the code implements the method for storing user information according to any one of the first aspects.
The embodiment of the application provides a storage method, a device, equipment and a storage medium of user information. When the method is executed, firstly, a user information inquiry request sent by an application system is obtained; further, according to the user identification in the user information inquiry request, inquiring the user information corresponding to the user identification from a user information base; screening the user information according to the application system identification in the user information inquiry request, and determining the user information within the authority range of the application system; and finally, returning the user information obtained by screening to the application system in the form of a user form and displaying the user information. By the method, the user information of each user can be uniformly stored in the user information base, and the user information is canceled from being stored in the application program. When the application system needs to acquire the user information, the user information which is required to be positioned can be determined according to the user identification and the application system identification, and the user information is screened according to the application program identification, so that the user information in the authority range of the application system can be only sent to the application system. By the method, unified storage management is carried out on the user information, and the risk of user information leakage can be reduced to a certain extent.
Drawings
In order to more clearly illustrate this embodiment or the technical solutions of the prior art, the drawings that are required for the description of the embodiment or the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart of a method for storing user information according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a storage device for user information according to an embodiment of the present application.
Detailed Description
With the development of technology, the application systems of the terminals are becoming more and more abundant. Because the application systems are mutually independent, a user must log in according to the corresponding identity when using each application system, and for this purpose, the user needs to fill in personal information in each application system. This means that personal information of the user is stored in each application system independent of each other. When a certain application system is attacked to cause the personal information of a user to be revealed, the personal information in other application systems also belongs to a revealed state. This can reveal user privacy and even have more serious consequences.
Aiming at the technical problems, the embodiment of the application provides a method, a device, equipment and a storage medium for storing user information. When the method is executed, firstly, a user information inquiry request sent by an application system is obtained; further, according to the user identification in the user information inquiry request, inquiring the user information corresponding to the user identification from a user information base; screening the user information according to the application system identification in the user information inquiry request, and determining the user information within the authority range of the application system; and finally, returning the user information obtained by screening to the application system in the form of a user form and displaying the user information. By the method, the user information of each user can be uniformly stored in the user information base, and the user information is canceled from being stored in the application program. When the application system needs to acquire the user information, the user information which is required to be positioned can be determined according to the user identification and the application system identification, and the user information is screened according to the application program identification, so that the user information in the authority range of the application system can be only sent to the application system. By the method, unified storage management is carried out on the user information, and the risk of user information leakage can be reduced to a certain extent.
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
The method, the device, the equipment and the storage medium for storing the user information can be used in the financial field or other fields, for example, can be used in the application scene of storing the user information in the financial field. Other fields are any field other than the financial field, for example, the big data field. The foregoing is merely exemplary, and the application fields of the storage method, the device, the equipment and the storage medium for user information provided by the present application are not limited.
It should be apparent that the described embodiments of the application are only some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
As shown in fig. 1, fig. 1 is a flowchart of a method for storing user information according to an embodiment of the present application, where the method may be applied to a terminal. In this embodiment, for ease of understanding, the description is given in connection with a terminal device capable of installing an application program. Those skilled in the art will appreciate that the terminal device may include, but is not limited to, mobile terminal devices such as smartphones, smart wearable devices, tablet computers, personal digital assistants, electronic book readers, laptop and desktop computers, and the like. The method comprises the following steps:
s101: and acquiring a user information query request sent by the application system.
The user information query request includes a user identification and an application system identification. The user information and the user identifier are in one-to-one correspondence, the unique user information can be determined through the user identifier, and the information capable of uniquely identifying the identity attribute of the user can be used as the user identifier, including but not limited to an identity card number, a fingerprint, a pupil and the like. The application system identifier is used for indicating a unique application system, and the application system identifier can be preset when the application system is installed or can be generated later.
S102: and inquiring corresponding user information from a user information base according to the user identification.
After the user identifier is obtained, the user information corresponding to the user identifier can be queried from the user information base according to the corresponding relation between the user identifier and the user information.
The user information includes a plurality of information items such as personal information of the user, such as age, organization, home address, work, and the like. For some application systems, the user information is used to log in to the application system, or the application system needs to use the user information to implement certain functions or perform certain services, such as: deposit and withdrawal service, balance inquiry function, off-line website reservation, etc.
The user information base is used for storing the user information of each user, and the user information corresponding to the user identification can be inquired from the user information base through the user identification.
The user information base can be an information base pre-established by a server, and specifically, the server can acquire user information from each application system; and sorting, and integrating user information belonging to the unified user in different application systems.
In addition, when the user information of the new user is stored in the application system, the application system may transmit the user information of the new user to the server so as to store the user information of the new user in the user information base.
S103: and screening the user information by using the application system identifier, and determining the user information in the application system authority as target user information.
The application system identification can not only determine the corresponding application system, but also determine the authority range of the application system. In the user information base, the user information can be understood as full-scale information, and the authority ranges of different corresponding systems are different. For example, the application system a may obtain the identification card number and the mobile phone number of the user in the authority range, and the application system B may only obtain the mobile phone number of the user in the authority range. Therefore, the authority range of the application system is determined by using the application system identification, and the user information in the authority range of the application system is screened out from the user information to be the target user information. And the user information exceeding the authority range of the application system is prevented from being sent to the application system, so that the user information is prevented from being leaked.
S104: and returning the target user information to the application system in the form of a user information form, and displaying the target user information in the application system.
The user information form is a representation of user information. The user information form includes a plurality of information items corresponding to the information items in the target user information. By representing the target user information in the form of a user information form and sending the user information form to the application system. In an application system, user form information may be presented in a page for user confirmation.
In the embodiment of the present application, the returning the target user information form to the application system includes:
determining a communication channel corresponding to the application system;
and returning the target user information form to the application system through the communication channel.
In order to improve the safety in the data transmission process, a corresponding communication channel is set for each application system. When the target user information form is transmitted, a communication channel corresponding to the application system can be determined first, specifically, the communication channel corresponding to the application system can be determined through the application system identification, and then the target user information form is transmitted through the communication channel. The security of the user information is improved.
The embodiment of the application provides a storage method, a device, equipment and a storage medium of user information. When the method is executed, firstly, a user information inquiry request sent by an application system is obtained; further, according to the user identification in the user information inquiry request, inquiring the user information corresponding to the user identification from a user information base; screening the user information according to the application system identification in the user information inquiry request, and determining the user information within the authority range of the application system; and finally, returning the user information obtained by screening to the application system in the form of a user form and displaying the user information. By the method, the user information of each user can be uniformly stored in the user information base, and the user information is canceled from being stored in the application program. When the application system needs to acquire the user information, the user information which is required to be positioned can be determined according to the user identification and the application system identification, and the user information is screened according to the application program identification, so that the user information in the authority range of the application system can be only sent to the application system. By the method, unified storage management is carried out on the user information, and the risk of user information leakage can be reduced to a certain extent.
In the embodiment of the present application, the returning the target user information to the application system in the form of a user information form includes:
decrypting the target user information to obtain target user plaintext information;
establishing a corresponding relation between the target user plaintext information and the user information form, and filling the target user plaintext information into a corresponding position of the user information form to obtain a target user information form;
and returning the target user information form to the application system.
To improve the security of the user information storage, the user information in the user information base may be encrypted. Therefore, after the target user information is determined, decryption processing is further required to be performed on the target user information, so as to obtain the plaintext information of the target user. And then, according to the corresponding relation between the plaintext information of the target user and the user information form, the plaintext information of the target user is filled into the user information form to obtain the target user information form, wherein the corresponding relation can be specifically the corresponding relation of the information items. And finally, returning the target user information form to the application system and displaying the target user information form in the application system.
In an embodiment of the present application, the method further includes:
setting a time stamp for the user information form, wherein the time stamp is the display ending time of the user information form;
and stopping displaying the user information form when the time reaches the time stamp.
The time stamp can be understood as the valid time or the authorized time of the user information form, and when the time reaches the time stamp, the user information form needs to be stopped from being displayed. If the application system also needs to acquire the user information, steps S101-S104 need to be re-executed.
User information is not constant, for example: the user's phone number may be changed and the home address or work address may be changed. In order to improve the accuracy and the real-time performance of the user information in the user information base, the method further comprises the following steps:
when the target user information in the user information form is changed, returning the changed target user information to the user information base;
and integrating the changed target user information with the user information according to the user identification, and storing the integrated target user information and the user information in the user information base.
When the user information form is displayed to the user in the application system, the user checks the user information form according to the information of the user, and when the target user information in the user information form has a problem, the user can directly modify the target user information. When the target user information is changed, the application system can return the changed user information form to the user information base, or can return only the changed target user information to the user information base. In order to update the user information in the user information base.
In the embodiment of the present application, returning the changed target user information to the user information base includes:
encrypting the changed target user information according to encryption conditions to obtain target user ciphertext information;
and returning the target user ciphertext information to the user information base.
In the process of returning the changed target user information to the user information base, in order to improve the safety in the transmission process, the changed target user information can be encrypted according to encryption conditions, and target user ciphertext information obtained through encryption processing is returned to the user information base.
In the embodiment of the present application, the integrating the changed target user information with the user information according to the user identifier includes:
decrypting the target user ciphertext information to obtain the changed target user information;
determining a user identifier corresponding to the changed target user information;
and determining corresponding user information according to the user identification, and integrating the user information with the changed target user information.
After the target user ciphertext information is returned to the user information base, the target user ciphertext information needs to be decrypted; then, determining a user identifier corresponding to the changed target user information; and finally, inquiring the user from the user information base by using the user identification, and integrating to finish updating the user information base.
The above provides some specific implementation manners of the method for storing user information according to the embodiments of the present application, and based on this, the present application also provides a corresponding device. The apparatus provided by the embodiment of the present application will be described in terms of functional modularization.
Referring to the schematic structure of the storage device 200 of user information shown in fig. 2, the device 200 includes an acquisition module 210, a query module 220, a screening module 230, and a presentation module 240.
An obtaining module 210, configured to obtain a user information query request sent by an application system, where the user information query request includes a user identifier and an application system identifier;
a query module 220, configured to query corresponding user information from a user information base according to the user identifier;
the screening module 230 is configured to screen the user information by using the application system identifier, and determine that the user information in the application system authority is target user information;
and the display module 240 is configured to return the target user information to the application system in the form of a user information form, and display the target user information in the application system.
The embodiment of the application provides a storage device for user information. Firstly, acquiring a user information inquiry request sent by an application system; further, according to the user identification in the user information inquiry request, inquiring the user information corresponding to the user identification from a user information base; screening the user information according to the application system identification in the user information inquiry request, and determining the user information within the authority range of the application system; and finally, returning the user information obtained by screening to the application system in the form of a user form and displaying the user information. By the method, the user information of each user can be uniformly stored in the user information base, and the user information is canceled from being stored in the application program. When the application system needs to acquire the user information, the user information which is required to be positioned can be determined according to the user identification and the application system identification, and the user information is screened according to the application program identification, so that the user information in the authority range of the application system can be only sent to the application system. By the method, unified storage management is carried out on the user information, and the risk of user information leakage can be reduced to a certain extent.
In the embodiment of the present application, the display module 240 is specifically configured to decrypt the target user information to obtain plaintext information of the target user;
establishing a corresponding relation between the target user plaintext information and the user information form, and filling the target user plaintext information into a corresponding position of the user information form to obtain a target user information form;
and returning the target user information form to the application system.
In the embodiment of the present application, the display module 240 is specifically configured to determine a communication channel corresponding to the application system; and returning the target user information form to the application system through the communication channel.
In the embodiment of the present application, the display module 240 is further configured to set a timestamp for the user information form, where the timestamp is a display end time of the user information form;
and stopping displaying the user information form when the time reaches the time stamp.
In an embodiment of the present application, the apparatus further includes:
the changing module is used for returning the changed target user information to the user information base when the target user information in the user information form is changed;
and integrating the changed target user information with the user information according to the user identification, and storing the integrated target user information and the user information in the user information base.
In the embodiment of the application, the changing module is specifically configured to encrypt the changed target user information according to an encryption condition to obtain target user ciphertext information;
and returning the target user ciphertext information to the user information base.
In the embodiment of the application, the changing module is specifically configured to decrypt the target user ciphertext information to obtain changed target user information;
determining a user identifier corresponding to the changed target user information;
and determining corresponding user information according to the user identification, and integrating the user information with the changed target user information.
The embodiment of the application also provides corresponding equipment and a computer storage medium, which are used for realizing the scheme provided by the embodiment of the application.
The device comprises a memory and a processor, wherein the memory is used for storing instructions or codes, and the processor is used for executing the instructions or codes so as to enable the device to execute the user information storage method according to any embodiment of the application.
The computer storage medium stores codes, and when the codes are executed, the equipment for executing the codes realizes the storage method of the user information according to any embodiment of the application.
In the description of the embodiments of the present application, unless otherwise indicated, "/" means or, for example, a/B may represent a or B; "and/or" herein is merely an association relationship describing an association object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. In addition, in the description of the embodiments of the present application, "plurality" means two or more than two.
The "first" and "second" in the names of "first", "second" (where present) and the like in the embodiments of the present application are used for name identification only, and do not represent the first and second in sequence.
From the above description of embodiments, it will be apparent to those skilled in the art that all or part of the steps of the above described example methods may be implemented in software plus general hardware platforms. Based on such understanding, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a storage medium, such as a read-only memory (ROM)/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network communication device such as a router) to perform the method according to the embodiments or some parts of the embodiments of the present application.
The computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments for relevant points. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present application without undue burden.
The foregoing description of the exemplary embodiments of the application is merely illustrative of the application and is not intended to limit the scope of the application.
Claims (10)
1. A method for storing user information, comprising:
acquiring a user information inquiry request sent by an application system, wherein the user information inquiry request comprises a user identifier and an application system identifier;
inquiring corresponding user information from a user information base according to the user identification;
screening the user information by using the application system identifier, and determining that the user information in the application system authority is target user information;
and returning the target user information to the application system in the form of a user information form, and displaying the target user information in the application system.
2. The method of claim 1, wherein said returning the target user information to the application system in the form of a user information form comprises:
decrypting the target user information to obtain target user plaintext information;
establishing a corresponding relation between the target user plaintext information and the user information form, and filling the target user plaintext information into a corresponding position of the user information form to obtain a target user information form;
and returning the target user information form to the application system.
3. The method of claim 2, wherein the returning the target user information form to the application system comprises:
determining a communication channel corresponding to the application system;
and returning the target user information form to the application system through the communication channel.
4. The method according to claim 2, wherein the method further comprises:
setting a time stamp for the user information form, wherein the time stamp is the display ending time of the user information form;
and stopping displaying the user information form when the time reaches the time stamp.
5. The method according to any one of claims 1-4, further comprising:
when the target user information in the user information form is changed, returning the changed target user information to the user information base;
and integrating the changed target user information with the user information according to the user identification, and storing the integrated target user information and the user information in the user information base.
6. The method of claim 5, wherein the returning the changed target user information to the user information repository comprises:
encrypting the changed target user information according to encryption conditions to obtain target user ciphertext information;
and returning the target user ciphertext information to the user information base.
7. The method of claim 6, wherein integrating the modified target user information with the user information based on the user identification comprises:
decrypting the target user ciphertext information to obtain the changed target user information;
determining a user identifier corresponding to the changed target user information;
and determining corresponding user information according to the user identification, and integrating the user information with the changed target user information.
8. A storage device for user information, comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a user information inquiry request sent by an application system, and the user information inquiry request comprises a user identifier and an application system identifier;
the query module is used for querying corresponding user information from a user information base according to the user identification;
the screening module is used for screening the user information by utilizing the application system identifier and determining that the user information in the application system authority is target user information;
and the display module is used for returning the target user information to the application system in the form of a user information form and displaying the target user information in the application system.
9. A computer device, comprising: memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of storing user information according to any one of claims 1-7 when the computer program is executed.
10. A computer storage medium having instructions stored therein which, when run on a terminal device, cause the terminal device to perform the method of storing user information according to any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311140397.XA CN117150094A (en) | 2023-09-05 | 2023-09-05 | User information storage method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311140397.XA CN117150094A (en) | 2023-09-05 | 2023-09-05 | User information storage method, device, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117150094A true CN117150094A (en) | 2023-12-01 |
Family
ID=88902275
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311140397.XA Pending CN117150094A (en) | 2023-09-05 | 2023-09-05 | User information storage method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117150094A (en) |
-
2023
- 2023-09-05 CN CN202311140397.XA patent/CN117150094A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11520912B2 (en) | Methods, media, apparatuses and computing devices of user data authorization based on blockchain | |
US8484480B2 (en) | Transmitting information using virtual input layout | |
KR101418799B1 (en) | System for providing mobile OTP service | |
US20220060514A1 (en) | Data sharing | |
US8335925B2 (en) | Method and arrangement for secure authentication | |
CN101627390B (en) | Method for the secure storing of program state data in an electronic device | |
CN112039826B (en) | Login method and device applied to applet end, electronic equipment and readable medium | |
US20140095878A1 (en) | Key change management apparatus and key change management method | |
CN107015996A (en) | A kind of resource access method, apparatus and system | |
CN107948170B (en) | Interface request parameter encryption method, device, equipment and readable storage medium | |
CN110134930A (en) | Electronic contract management method, device, computer equipment and storage medium | |
CN113486122A (en) | Data sharing method and electronic equipment | |
CN110705985B (en) | Method and apparatus for storing information | |
US10372710B2 (en) | Using metadata to take action on an SMS message on a proprietary system | |
CN116028486A (en) | Method and device for data storage and data query | |
KR20150049457A (en) | Method and apparatus for managing authentication information | |
US20100222022A1 (en) | Communication method, communication system and access method to service provider base | |
CN117150094A (en) | User information storage method, device, equipment and storage medium | |
CN113434824B (en) | Software service authorization management method, device, equipment and storage medium | |
CN114861144A (en) | Data authority processing method based on block chain | |
CN115208630B (en) | Block chain-based data acquisition method and system and block chain system | |
Seyler et al. | SEMAFORE: Secure Mobile Field Diagnostics for Cyber-Physical Systems | |
CN111212062B (en) | Information completion method and device, storage medium and electronic equipment | |
CN116842043A (en) | Data query method, device, equipment and storage medium | |
CN116916257A (en) | 5G message display method and device, 5G message system and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |