CN117150094A - User information storage method, device, equipment and storage medium - Google Patents

User information storage method, device, equipment and storage medium Download PDF

Info

Publication number
CN117150094A
CN117150094A CN202311140397.XA CN202311140397A CN117150094A CN 117150094 A CN117150094 A CN 117150094A CN 202311140397 A CN202311140397 A CN 202311140397A CN 117150094 A CN117150094 A CN 117150094A
Authority
CN
China
Prior art keywords
user information
application system
target user
user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311140397.XA
Other languages
Chinese (zh)
Inventor
谭莹坤
申亚坤
周慧婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202311140397.XA priority Critical patent/CN117150094A/en
Publication of CN117150094A publication Critical patent/CN117150094A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/9032Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/9035Filtering based on additional data, e.g. user or group profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/9038Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method, a device, equipment and a storage medium for storing user information, which can be applied to the field of big data or the field of finance. The method comprises the following steps: acquiring a user information inquiry request sent by an application system, wherein the user information inquiry request comprises a user identifier and an application system identifier; inquiring corresponding user information from a user information base according to the user identification; screening the user information by using the application system identifier, and determining that the user information in the application system authority is target user information; and returning the target user information to the application system in the form of a user information form, and displaying the target user information in the application system. In the method, the user information is uniformly stored in the user information base, and when the application system needs to acquire the user information, the user information in the authority range of the application system is determined according to the user identification and the application system identification. Unified storage management of user information is achieved.

Description

User information storage method, device, equipment and storage medium
Technical Field
The present application relates to the field of big data or the field of financial technologies, and in particular, to a method, an apparatus, a device, and a storage medium for storing user information.
Background
Information storage is a social activity performed by humans to collect, process, and utilize information. It is the result and trend of the development of science and technology, the transition of social environment, and the progress of human ideas.
Users typically need to authorize the application system and fill in various personal information in the application system before using the various application systems, such as: name, phone, address, etc. User information is stored in each application system, and once the user information is carelessly revealed, serious consequences can be caused.
Disclosure of Invention
In view of this, the embodiments of the present application provide a method, an apparatus, a device, and a storage medium for storing user information, which aim to uniformly store user information, so as to avoid leakage of user information as much as possible.
In a first aspect, an embodiment of the present application provides a method for storing user information, where the method includes:
acquiring a user information inquiry request sent by an application system, wherein the user information inquiry request comprises a user identifier and an application system identifier;
inquiring corresponding user information from a user information base according to the user identification;
screening the user information by using the application system identifier, and determining that the user information in the application system authority is target user information;
and returning the target user information to the application system in the form of a user information form, and displaying the target user information in the application system.
Optionally, the returning the target user information to the application system in the form of a user information form includes:
decrypting the target user information to obtain target user plaintext information;
establishing a corresponding relation between the target user plaintext information and the user information form, and filling the target user plaintext information into a corresponding position of the user information form to obtain a target user information form;
and returning the target user information form to the application system.
Optionally, the returning the target user information form to the application system includes:
determining a communication channel corresponding to the application system;
and returning the target user information form to the application system through the communication channel.
Optionally, the method further comprises:
setting a time stamp for the user information form, wherein the time stamp is the display ending time of the user information form;
and stopping displaying the user information form when the time reaches the time stamp.
Optionally, the method further comprises:
when the target user information in the user information form is changed, returning the changed target user information to the user information base;
and integrating the changed target user information with the user information according to the user identification, and storing the integrated target user information and the user information in the user information base.
Optionally, the returning the changed target user information to the user information base includes:
encrypting the changed target user information according to encryption conditions to obtain target user ciphertext information;
and returning the target user ciphertext information to the user information base.
Optionally, the integrating the changed target user information with the user information according to the user identifier includes:
decrypting the target user ciphertext information to obtain the changed target user information;
determining a user identifier corresponding to the changed target user information;
and determining corresponding user information according to the user identification, and integrating the user information with the changed target user information.
In a second aspect, an embodiment of the present application provides a storage device for user information, where the device includes:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a user information inquiry request sent by an application system, and the user information inquiry request comprises a user identifier and an application system identifier;
the query module is used for querying corresponding user information from a user information base according to the user identification;
the screening module is used for screening the user information by utilizing the application system identifier and determining that the user information in the application system authority is target user information;
and the display module is used for returning the target user information to the application system in the form of a user information form and displaying the target user information in the application system.
Optionally, the display module is specifically configured to decrypt the target user information to obtain plaintext information of the target user;
establishing a corresponding relation between the target user plaintext information and the user information form, and filling the target user plaintext information into a corresponding position of the user information form to obtain a target user information form;
and returning the target user information form to the application system.
Optionally, the display module is specifically configured to determine a communication channel corresponding to the application system; and returning the target user information form to the application system through the communication channel.
Optionally, the display module is further configured to set a timestamp for the user information form, where the timestamp is a display end time of the user information form;
and stopping displaying the user information form when the time reaches the time stamp.
Optionally, the apparatus further comprises:
the changing module is used for returning the changed target user information to the user information base when the target user information in the user information form is changed;
and integrating the changed target user information with the user information according to the user identification, and storing the integrated target user information and the user information in the user information base.
Optionally, the modification module is specifically configured to encrypt the modified target user information according to an encryption condition to obtain target user ciphertext information;
and returning the target user ciphertext information to the user information base.
Optionally, the modification module is specifically configured to decrypt the target user ciphertext information to obtain modified target user information;
determining a user identifier corresponding to the changed target user information;
and determining corresponding user information according to the user identification, and integrating the user information with the changed target user information.
In a third aspect, an embodiment of the present application provides an apparatus, the apparatus including a memory for storing instructions or code, and a processor for executing the instructions or code to cause the apparatus to perform the method for storing user information according to any one of the first aspects.
In a fourth aspect, an embodiment of the present application provides a computer storage medium having code stored therein, where when the code is executed, an apparatus executing the code implements the method for storing user information according to any one of the first aspects.
The embodiment of the application provides a storage method, a device, equipment and a storage medium of user information. When the method is executed, firstly, a user information inquiry request sent by an application system is obtained; further, according to the user identification in the user information inquiry request, inquiring the user information corresponding to the user identification from a user information base; screening the user information according to the application system identification in the user information inquiry request, and determining the user information within the authority range of the application system; and finally, returning the user information obtained by screening to the application system in the form of a user form and displaying the user information. By the method, the user information of each user can be uniformly stored in the user information base, and the user information is canceled from being stored in the application program. When the application system needs to acquire the user information, the user information which is required to be positioned can be determined according to the user identification and the application system identification, and the user information is screened according to the application program identification, so that the user information in the authority range of the application system can be only sent to the application system. By the method, unified storage management is carried out on the user information, and the risk of user information leakage can be reduced to a certain extent.
Drawings
In order to more clearly illustrate this embodiment or the technical solutions of the prior art, the drawings that are required for the description of the embodiment or the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart of a method for storing user information according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a storage device for user information according to an embodiment of the present application.
Detailed Description
With the development of technology, the application systems of the terminals are becoming more and more abundant. Because the application systems are mutually independent, a user must log in according to the corresponding identity when using each application system, and for this purpose, the user needs to fill in personal information in each application system. This means that personal information of the user is stored in each application system independent of each other. When a certain application system is attacked to cause the personal information of a user to be revealed, the personal information in other application systems also belongs to a revealed state. This can reveal user privacy and even have more serious consequences.
Aiming at the technical problems, the embodiment of the application provides a method, a device, equipment and a storage medium for storing user information. When the method is executed, firstly, a user information inquiry request sent by an application system is obtained; further, according to the user identification in the user information inquiry request, inquiring the user information corresponding to the user identification from a user information base; screening the user information according to the application system identification in the user information inquiry request, and determining the user information within the authority range of the application system; and finally, returning the user information obtained by screening to the application system in the form of a user form and displaying the user information. By the method, the user information of each user can be uniformly stored in the user information base, and the user information is canceled from being stored in the application program. When the application system needs to acquire the user information, the user information which is required to be positioned can be determined according to the user identification and the application system identification, and the user information is screened according to the application program identification, so that the user information in the authority range of the application system can be only sent to the application system. By the method, unified storage management is carried out on the user information, and the risk of user information leakage can be reduced to a certain extent.
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
The method, the device, the equipment and the storage medium for storing the user information can be used in the financial field or other fields, for example, can be used in the application scene of storing the user information in the financial field. Other fields are any field other than the financial field, for example, the big data field. The foregoing is merely exemplary, and the application fields of the storage method, the device, the equipment and the storage medium for user information provided by the present application are not limited.
It should be apparent that the described embodiments of the application are only some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
As shown in fig. 1, fig. 1 is a flowchart of a method for storing user information according to an embodiment of the present application, where the method may be applied to a terminal. In this embodiment, for ease of understanding, the description is given in connection with a terminal device capable of installing an application program. Those skilled in the art will appreciate that the terminal device may include, but is not limited to, mobile terminal devices such as smartphones, smart wearable devices, tablet computers, personal digital assistants, electronic book readers, laptop and desktop computers, and the like. The method comprises the following steps:
s101: and acquiring a user information query request sent by the application system.
The user information query request includes a user identification and an application system identification. The user information and the user identifier are in one-to-one correspondence, the unique user information can be determined through the user identifier, and the information capable of uniquely identifying the identity attribute of the user can be used as the user identifier, including but not limited to an identity card number, a fingerprint, a pupil and the like. The application system identifier is used for indicating a unique application system, and the application system identifier can be preset when the application system is installed or can be generated later.
S102: and inquiring corresponding user information from a user information base according to the user identification.
After the user identifier is obtained, the user information corresponding to the user identifier can be queried from the user information base according to the corresponding relation between the user identifier and the user information.
The user information includes a plurality of information items such as personal information of the user, such as age, organization, home address, work, and the like. For some application systems, the user information is used to log in to the application system, or the application system needs to use the user information to implement certain functions or perform certain services, such as: deposit and withdrawal service, balance inquiry function, off-line website reservation, etc.
The user information base is used for storing the user information of each user, and the user information corresponding to the user identification can be inquired from the user information base through the user identification.
The user information base can be an information base pre-established by a server, and specifically, the server can acquire user information from each application system; and sorting, and integrating user information belonging to the unified user in different application systems.
In addition, when the user information of the new user is stored in the application system, the application system may transmit the user information of the new user to the server so as to store the user information of the new user in the user information base.
S103: and screening the user information by using the application system identifier, and determining the user information in the application system authority as target user information.
The application system identification can not only determine the corresponding application system, but also determine the authority range of the application system. In the user information base, the user information can be understood as full-scale information, and the authority ranges of different corresponding systems are different. For example, the application system a may obtain the identification card number and the mobile phone number of the user in the authority range, and the application system B may only obtain the mobile phone number of the user in the authority range. Therefore, the authority range of the application system is determined by using the application system identification, and the user information in the authority range of the application system is screened out from the user information to be the target user information. And the user information exceeding the authority range of the application system is prevented from being sent to the application system, so that the user information is prevented from being leaked.
S104: and returning the target user information to the application system in the form of a user information form, and displaying the target user information in the application system.
The user information form is a representation of user information. The user information form includes a plurality of information items corresponding to the information items in the target user information. By representing the target user information in the form of a user information form and sending the user information form to the application system. In an application system, user form information may be presented in a page for user confirmation.
In the embodiment of the present application, the returning the target user information form to the application system includes:
determining a communication channel corresponding to the application system;
and returning the target user information form to the application system through the communication channel.
In order to improve the safety in the data transmission process, a corresponding communication channel is set for each application system. When the target user information form is transmitted, a communication channel corresponding to the application system can be determined first, specifically, the communication channel corresponding to the application system can be determined through the application system identification, and then the target user information form is transmitted through the communication channel. The security of the user information is improved.
The embodiment of the application provides a storage method, a device, equipment and a storage medium of user information. When the method is executed, firstly, a user information inquiry request sent by an application system is obtained; further, according to the user identification in the user information inquiry request, inquiring the user information corresponding to the user identification from a user information base; screening the user information according to the application system identification in the user information inquiry request, and determining the user information within the authority range of the application system; and finally, returning the user information obtained by screening to the application system in the form of a user form and displaying the user information. By the method, the user information of each user can be uniformly stored in the user information base, and the user information is canceled from being stored in the application program. When the application system needs to acquire the user information, the user information which is required to be positioned can be determined according to the user identification and the application system identification, and the user information is screened according to the application program identification, so that the user information in the authority range of the application system can be only sent to the application system. By the method, unified storage management is carried out on the user information, and the risk of user information leakage can be reduced to a certain extent.
In the embodiment of the present application, the returning the target user information to the application system in the form of a user information form includes:
decrypting the target user information to obtain target user plaintext information;
establishing a corresponding relation between the target user plaintext information and the user information form, and filling the target user plaintext information into a corresponding position of the user information form to obtain a target user information form;
and returning the target user information form to the application system.
To improve the security of the user information storage, the user information in the user information base may be encrypted. Therefore, after the target user information is determined, decryption processing is further required to be performed on the target user information, so as to obtain the plaintext information of the target user. And then, according to the corresponding relation between the plaintext information of the target user and the user information form, the plaintext information of the target user is filled into the user information form to obtain the target user information form, wherein the corresponding relation can be specifically the corresponding relation of the information items. And finally, returning the target user information form to the application system and displaying the target user information form in the application system.
In an embodiment of the present application, the method further includes:
setting a time stamp for the user information form, wherein the time stamp is the display ending time of the user information form;
and stopping displaying the user information form when the time reaches the time stamp.
The time stamp can be understood as the valid time or the authorized time of the user information form, and when the time reaches the time stamp, the user information form needs to be stopped from being displayed. If the application system also needs to acquire the user information, steps S101-S104 need to be re-executed.
User information is not constant, for example: the user's phone number may be changed and the home address or work address may be changed. In order to improve the accuracy and the real-time performance of the user information in the user information base, the method further comprises the following steps:
when the target user information in the user information form is changed, returning the changed target user information to the user information base;
and integrating the changed target user information with the user information according to the user identification, and storing the integrated target user information and the user information in the user information base.
When the user information form is displayed to the user in the application system, the user checks the user information form according to the information of the user, and when the target user information in the user information form has a problem, the user can directly modify the target user information. When the target user information is changed, the application system can return the changed user information form to the user information base, or can return only the changed target user information to the user information base. In order to update the user information in the user information base.
In the embodiment of the present application, returning the changed target user information to the user information base includes:
encrypting the changed target user information according to encryption conditions to obtain target user ciphertext information;
and returning the target user ciphertext information to the user information base.
In the process of returning the changed target user information to the user information base, in order to improve the safety in the transmission process, the changed target user information can be encrypted according to encryption conditions, and target user ciphertext information obtained through encryption processing is returned to the user information base.
In the embodiment of the present application, the integrating the changed target user information with the user information according to the user identifier includes:
decrypting the target user ciphertext information to obtain the changed target user information;
determining a user identifier corresponding to the changed target user information;
and determining corresponding user information according to the user identification, and integrating the user information with the changed target user information.
After the target user ciphertext information is returned to the user information base, the target user ciphertext information needs to be decrypted; then, determining a user identifier corresponding to the changed target user information; and finally, inquiring the user from the user information base by using the user identification, and integrating to finish updating the user information base.
The above provides some specific implementation manners of the method for storing user information according to the embodiments of the present application, and based on this, the present application also provides a corresponding device. The apparatus provided by the embodiment of the present application will be described in terms of functional modularization.
Referring to the schematic structure of the storage device 200 of user information shown in fig. 2, the device 200 includes an acquisition module 210, a query module 220, a screening module 230, and a presentation module 240.
An obtaining module 210, configured to obtain a user information query request sent by an application system, where the user information query request includes a user identifier and an application system identifier;
a query module 220, configured to query corresponding user information from a user information base according to the user identifier;
the screening module 230 is configured to screen the user information by using the application system identifier, and determine that the user information in the application system authority is target user information;
and the display module 240 is configured to return the target user information to the application system in the form of a user information form, and display the target user information in the application system.
The embodiment of the application provides a storage device for user information. Firstly, acquiring a user information inquiry request sent by an application system; further, according to the user identification in the user information inquiry request, inquiring the user information corresponding to the user identification from a user information base; screening the user information according to the application system identification in the user information inquiry request, and determining the user information within the authority range of the application system; and finally, returning the user information obtained by screening to the application system in the form of a user form and displaying the user information. By the method, the user information of each user can be uniformly stored in the user information base, and the user information is canceled from being stored in the application program. When the application system needs to acquire the user information, the user information which is required to be positioned can be determined according to the user identification and the application system identification, and the user information is screened according to the application program identification, so that the user information in the authority range of the application system can be only sent to the application system. By the method, unified storage management is carried out on the user information, and the risk of user information leakage can be reduced to a certain extent.
In the embodiment of the present application, the display module 240 is specifically configured to decrypt the target user information to obtain plaintext information of the target user;
establishing a corresponding relation between the target user plaintext information and the user information form, and filling the target user plaintext information into a corresponding position of the user information form to obtain a target user information form;
and returning the target user information form to the application system.
In the embodiment of the present application, the display module 240 is specifically configured to determine a communication channel corresponding to the application system; and returning the target user information form to the application system through the communication channel.
In the embodiment of the present application, the display module 240 is further configured to set a timestamp for the user information form, where the timestamp is a display end time of the user information form;
and stopping displaying the user information form when the time reaches the time stamp.
In an embodiment of the present application, the apparatus further includes:
the changing module is used for returning the changed target user information to the user information base when the target user information in the user information form is changed;
and integrating the changed target user information with the user information according to the user identification, and storing the integrated target user information and the user information in the user information base.
In the embodiment of the application, the changing module is specifically configured to encrypt the changed target user information according to an encryption condition to obtain target user ciphertext information;
and returning the target user ciphertext information to the user information base.
In the embodiment of the application, the changing module is specifically configured to decrypt the target user ciphertext information to obtain changed target user information;
determining a user identifier corresponding to the changed target user information;
and determining corresponding user information according to the user identification, and integrating the user information with the changed target user information.
The embodiment of the application also provides corresponding equipment and a computer storage medium, which are used for realizing the scheme provided by the embodiment of the application.
The device comprises a memory and a processor, wherein the memory is used for storing instructions or codes, and the processor is used for executing the instructions or codes so as to enable the device to execute the user information storage method according to any embodiment of the application.
The computer storage medium stores codes, and when the codes are executed, the equipment for executing the codes realizes the storage method of the user information according to any embodiment of the application.
In the description of the embodiments of the present application, unless otherwise indicated, "/" means or, for example, a/B may represent a or B; "and/or" herein is merely an association relationship describing an association object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. In addition, in the description of the embodiments of the present application, "plurality" means two or more than two.
The "first" and "second" in the names of "first", "second" (where present) and the like in the embodiments of the present application are used for name identification only, and do not represent the first and second in sequence.
From the above description of embodiments, it will be apparent to those skilled in the art that all or part of the steps of the above described example methods may be implemented in software plus general hardware platforms. Based on such understanding, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a storage medium, such as a read-only memory (ROM)/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network communication device such as a router) to perform the method according to the embodiments or some parts of the embodiments of the present application.
The computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments for relevant points. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present application without undue burden.
The foregoing description of the exemplary embodiments of the application is merely illustrative of the application and is not intended to limit the scope of the application.

Claims (10)

1. A method for storing user information, comprising:
acquiring a user information inquiry request sent by an application system, wherein the user information inquiry request comprises a user identifier and an application system identifier;
inquiring corresponding user information from a user information base according to the user identification;
screening the user information by using the application system identifier, and determining that the user information in the application system authority is target user information;
and returning the target user information to the application system in the form of a user information form, and displaying the target user information in the application system.
2. The method of claim 1, wherein said returning the target user information to the application system in the form of a user information form comprises:
decrypting the target user information to obtain target user plaintext information;
establishing a corresponding relation between the target user plaintext information and the user information form, and filling the target user plaintext information into a corresponding position of the user information form to obtain a target user information form;
and returning the target user information form to the application system.
3. The method of claim 2, wherein the returning the target user information form to the application system comprises:
determining a communication channel corresponding to the application system;
and returning the target user information form to the application system through the communication channel.
4. The method according to claim 2, wherein the method further comprises:
setting a time stamp for the user information form, wherein the time stamp is the display ending time of the user information form;
and stopping displaying the user information form when the time reaches the time stamp.
5. The method according to any one of claims 1-4, further comprising:
when the target user information in the user information form is changed, returning the changed target user information to the user information base;
and integrating the changed target user information with the user information according to the user identification, and storing the integrated target user information and the user information in the user information base.
6. The method of claim 5, wherein the returning the changed target user information to the user information repository comprises:
encrypting the changed target user information according to encryption conditions to obtain target user ciphertext information;
and returning the target user ciphertext information to the user information base.
7. The method of claim 6, wherein integrating the modified target user information with the user information based on the user identification comprises:
decrypting the target user ciphertext information to obtain the changed target user information;
determining a user identifier corresponding to the changed target user information;
and determining corresponding user information according to the user identification, and integrating the user information with the changed target user information.
8. A storage device for user information, comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a user information inquiry request sent by an application system, and the user information inquiry request comprises a user identifier and an application system identifier;
the query module is used for querying corresponding user information from a user information base according to the user identification;
the screening module is used for screening the user information by utilizing the application system identifier and determining that the user information in the application system authority is target user information;
and the display module is used for returning the target user information to the application system in the form of a user information form and displaying the target user information in the application system.
9. A computer device, comprising: memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of storing user information according to any one of claims 1-7 when the computer program is executed.
10. A computer storage medium having instructions stored therein which, when run on a terminal device, cause the terminal device to perform the method of storing user information according to any one of claims 1-7.
CN202311140397.XA 2023-09-05 2023-09-05 User information storage method, device, equipment and storage medium Pending CN117150094A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311140397.XA CN117150094A (en) 2023-09-05 2023-09-05 User information storage method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311140397.XA CN117150094A (en) 2023-09-05 2023-09-05 User information storage method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117150094A true CN117150094A (en) 2023-12-01

Family

ID=88902275

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311140397.XA Pending CN117150094A (en) 2023-09-05 2023-09-05 User information storage method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117150094A (en)

Similar Documents

Publication Publication Date Title
US11520912B2 (en) Methods, media, apparatuses and computing devices of user data authorization based on blockchain
US8484480B2 (en) Transmitting information using virtual input layout
KR101418799B1 (en) System for providing mobile OTP service
US20220060514A1 (en) Data sharing
US8335925B2 (en) Method and arrangement for secure authentication
CN101627390B (en) Method for the secure storing of program state data in an electronic device
CN112039826B (en) Login method and device applied to applet end, electronic equipment and readable medium
US20140095878A1 (en) Key change management apparatus and key change management method
CN107015996A (en) A kind of resource access method, apparatus and system
CN107948170B (en) Interface request parameter encryption method, device, equipment and readable storage medium
CN110134930A (en) Electronic contract management method, device, computer equipment and storage medium
CN113486122A (en) Data sharing method and electronic equipment
CN110705985B (en) Method and apparatus for storing information
US10372710B2 (en) Using metadata to take action on an SMS message on a proprietary system
CN116028486A (en) Method and device for data storage and data query
KR20150049457A (en) Method and apparatus for managing authentication information
US20100222022A1 (en) Communication method, communication system and access method to service provider base
CN117150094A (en) User information storage method, device, equipment and storage medium
CN113434824B (en) Software service authorization management method, device, equipment and storage medium
CN114861144A (en) Data authority processing method based on block chain
CN115208630B (en) Block chain-based data acquisition method and system and block chain system
Seyler et al. SEMAFORE: Secure Mobile Field Diagnostics for Cyber-Physical Systems
CN111212062B (en) Information completion method and device, storage medium and electronic equipment
CN116842043A (en) Data query method, device, equipment and storage medium
CN116916257A (en) 5G message display method and device, 5G message system and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination