CN117272383A - Information processing method, information processing device, computer equipment and storage medium - Google Patents

Information processing method, information processing device, computer equipment and storage medium Download PDF

Info

Publication number
CN117272383A
CN117272383A CN202311277632.8A CN202311277632A CN117272383A CN 117272383 A CN117272383 A CN 117272383A CN 202311277632 A CN202311277632 A CN 202311277632A CN 117272383 A CN117272383 A CN 117272383A
Authority
CN
China
Prior art keywords
information
external access
access
target
access terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311277632.8A
Other languages
Chinese (zh)
Inventor
李伊雪
张奎奎
黎雨
陈思文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial Bank Co Ltd
Original Assignee
Industrial Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial Bank Co Ltd filed Critical Industrial Bank Co Ltd
Priority to CN202311277632.8A priority Critical patent/CN117272383A/en
Publication of CN117272383A publication Critical patent/CN117272383A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The present application relates to an information processing method, apparatus, computer device, storage medium, and computer program product. The method comprises the following steps: acquiring distance information between a first position and a second position, wherein the first position is the current position of an access terminal of an external access object in the external access process, and the second position is the access position of a target accessed object; determining the query authority of the information of the target accessed object according to the distance information, wherein the query authority comprises different authority level information, and the types of the information of the target accessed object corresponding to the different authority level information are different; and sending the information of the target accessed object to the access terminal according to the query authority and the information query request input by the external access object so that the access terminal displays the information of the target accessed object. By the method, the information of the accessed object can be protected, and the safety is improved.

Description

Information processing method, information processing device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technology, and in particular, to an information processing method, an apparatus, a computer device, a storage medium, and a computer program product.
Background
With the development of computer technology, more and more companies adopt computer technology to record and view information. In the existing external visit activities, an external visitor can check the information of the visited personnel by using a computer technology to determine the condition of the visited personnel.
In the related art, the external access object can check related information in the process of moving to the accessed object, the external access object can be in a noisy environment in the moving process, if the accessed object information is checked at the moment, the problem of data leakage is easy to occur, and potential safety hazards exist.
Disclosure of Invention
In view of the foregoing, it is desirable to provide an information processing method, apparatus, computer device, computer-readable storage medium, and computer program product that can improve security.
In a first aspect, the present application provides an information processing method. The information processing method comprises the following steps:
acquiring distance information between a first position and a second position, wherein the first position is the current position of an access terminal of an external access object in the external access process, and the second position is the access position of a target accessed object;
determining the query authority of the information of the target accessed object according to the distance information, wherein the query authority comprises different authority level information, and the types of the information of the target accessed object corresponding to the different authority level information are different;
And sending the information of the target accessed object to the access terminal according to the query authority and the information query request input by the external access object so that the access terminal displays the information of the target accessed object.
In one embodiment, before acquiring the distance information between the first location and the second location, the method further comprises: acquiring a plurality of position information of an access terminal of an external access object in an external access process; determining a moving track of the access terminal of the external access object in the external access process according to the plurality of position information of the access terminal of the external access object in the external access process; determining the movement trend of the access terminal of the external access object according to the movement track and the access position of at least one candidate accessed object; and determining a target accessed object from at least one candidate accessed object according to the moving trend of the access terminal of the external access object.
In one embodiment, determining the target accessed object from the at least one candidate accessed object according to the movement direction of the access terminal of the external access object includes: according to the moving trend of the access terminal of the external access object, determining a candidate accessed object, which is close to the access terminal of the external access object, from at least one candidate accessed object; and determining a target accessed object from the candidate accessed objects which are close to the access terminal of the external access object according to the access priority of the candidate accessed object.
In one embodiment, after sending the information of the target accessed object to the access terminal according to the information query authority of the external access object and the information query request input by the external access object, so that the access terminal displays the information of the target accessed object, the method further includes: if the moving direction is changed to be far away from the target accessed object, sending hiding instruction information to the access terminal, wherein the hiding instruction information is used for instructing to hide a display page of the target accessed object, and the display page is used for displaying information of the target accessed object.
In one embodiment, according to the query authority and the information query request input by the external access object, the method sends the information of the target accessed object to the access terminal, so that the access terminal displays the information of the target accessed object, includes: receiving an information inquiry request input by an external access object, wherein the information inquiry request comprises an identifier of the external access object; according to the identification of the external access object, carrying out primary verification on the query authority of the external access object; if the query authority of the external access object passes the primary verification, the information of the target accessed object is sent to the access terminal according to the query authority and the information query request input by the external access object, so that the access terminal displays the information of the target accessed object.
In one embodiment, according to the query authority and the information query request input by the external access object, the method sends the information of the target accessed object to the access terminal, so that the access terminal displays the information of the target accessed object, includes: according to the type and the query authority of the information of the target accessed object to be accessed contained in the information query request, carrying out secondary verification on the query authority of the external access object; and if the query authority of the external access object passes the secondary verification, sending the information of the target accessed object to the access terminal so that the access terminal displays the information of the target accessed object.
In a second aspect, the present application also provides an information processing apparatus. The device comprises:
the distance information acquisition module is used for acquiring distance information between a first position and a second position, wherein the first position is the current position of an access terminal of an external access object in the external access process, and the second position is the access position of a target accessed object;
the query permission determining module is used for determining the query permission of the information of the target accessed object according to the distance information, wherein the query permission comprises different permission grade information, and the types of the information of the target accessed object corresponding to the different permission grade information are different;
And the display module is used for sending the information of the target accessed object to the access terminal according to the query permission and the information query request input by the external access object so as to enable the access terminal to display the information of the target accessed object.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory and a processor, the memory stores a computer program, and the processor executes the computer program to realize the information processing method.
In a fourth aspect, the present application also provides a computer-readable storage medium. A computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described information processing method.
In a fifth aspect, the present application also provides a computer program product. Computer program product comprising a computer program which, when executed by a processor, implements the above-described information processing method.
According to the information processing method, the information processing device, the computer equipment, the storage medium and the computer program product, the distance information between the external access object and the target accessed object is determined by utilizing the current position of the access terminal of the external access object in the external access process and the access position of the target accessed object, the query right is determined according to the distance information, the query right comprises different right grade information, the right grade information corresponds to different types of information of the target accessed object, and when the information of the target accessed object is displayed according to the information query request, the display content of the target accessed object can be limited according to the query right, so that the safety of the information of the target accessed object is ensured.
Drawings
Fig. 1 is an application environment diagram of an information processing method according to an embodiment of the present application;
fig. 2 is a schematic flow chart of an information processing method provided in an embodiment of the present application;
FIG. 3 is a flowchart of another information processing method according to an embodiment of the present disclosure;
FIG. 4 is a flowchart of another information processing method according to an embodiment of the present disclosure;
FIG. 5 is a flowchart of another information processing method according to an embodiment of the present disclosure;
FIG. 6 is a block diagram showing the structure of an information processing apparatus in one embodiment;
fig. 7 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
The information processing method provided by the embodiment of the application can be applied to an application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The data storage system may store data that the server 104 needs to process. The data storage system may be integrated on the server 104 or may be located on a cloud or other network server. The server 104 obtains distance information between a first position and a second position, wherein the first position is the current position of an access terminal of an external access object in the external access process, the second position is the access position of a target accessed object, the query authority of the information of the target accessed object is determined according to the distance information, the query authority comprises different authority level information, the types of the information of the target accessed object corresponding to the different authority level information are different, and the information of the target accessed object is displayed on the terminal according to the query authority and an information query request input by the external access object. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices, and portable wearable devices, where the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart vehicle devices, and the like. The portable wearable device may be a smart watch, smart bracelet, headset, or the like. The server 104 may be implemented as a stand-alone server or as a server cluster of multiple servers.
In one embodiment, as shown in fig. 2, an information method is provided, and the method is applied to the server in fig. 1 for illustration, and includes the following steps:
step 202, obtaining distance information between a first location and a second location.
The first position is the current position of the access terminal of the external access object in the external access process. The out visit is a behavior of a credit agency to dispatch out an out visit object to a site where a target visited object is located for a field investigation in order to check the loan qualification of a customer and to understand the condition of the customer.
The access terminal is a terminal used by the external access object in the external access process, and can be used for inquiring and viewing the information of the accessed object, recording the external access process, uploading the external access data after the external access is finished, and the like.
In one embodiment, the access terminal has a positioning function, and the access terminal position is obtained through the positioning function of the access terminal, so that the obtained position of the access terminal can be used as the current position of the external access object. Optionally, the positioning function of the access terminal has a function of opening and closing, for example, the positioning function is opened in the external access process, so as to acquire the current position of the external access object in real time, and whether the external access object is performing external access is judged by the current position of the external access object, so that the external access behavior of the external access object is standardized. The positioning function can be closed after the external access process is finished, so that the privacy security of the external access object is protected.
In an alternative embodiment, the access terminal starts or closes the positioning function after receiving the instruction for starting or closing the positioning function, alternatively, the instruction for starting or closing may be sent by the external access terminal, for example, the external access object triggers the external access starting instruction or the external access ending instruction by using the access terminal, and the access terminal starts or closes the positioning function after detecting the external access starting instruction or the external access ending instruction. The command of opening or closing may also be sent to the external access terminal by the server, for example, the external access object triggers an external access opening command or an external access ending command by using the access terminal, the access terminal sends the external access opening command or the external access ending command to the server after detecting the external access opening command or the external access ending command, the server returns a command of opening or closing the positioning function to the access terminal after receiving the external access opening command or the external access ending command, and the access terminal realizes opening or closing of the positioning function after receiving the opening or closing the positioning function.
In an optional embodiment, the external access opening instruction or the external access ending instruction may be a trigger control for opening or ending the external access on the access terminal, where the external access object implements the trigger of opening or ending the external access through the trigger control, so as to generate the external access opening instruction or the external access ending instruction. In an alternative embodiment, the external access opening instruction or the external access ending instruction may also be implemented by using a voice control manner, for example, when the access terminal detects that there is voice information of "starting external access" or "ending external access", that is, generates the external access opening instruction or the external access ending instruction, where specific voice information is not limited, so long as the external access starting or the external access ending can be indicated.
In one embodiment, when the access terminal receives the access opening instruction, the audio system and/or the image system is forcedly invoked to record the external access process. In one embodiment, after the access terminal receives the external access ending instruction, the recorded content of the external access process can be uploaded to a server to realize storage for subsequent inquiry.
In one exemplary embodiment, the foreign objects are at least two. It can be understood that the external access object has the limit of identity authority, and can be used as the external access object through identity verification. In one embodiment, the authority responsible person of the external access organization may initiate an application of the identity authority of the external access object, and the credit organization performs approval on the received application of the identity authority of the external access object, and returns the result of the approval to the external access organization. Or the external access personnel can initiate the identity authority application, the credit agency performs approval on the received identity authority application of the external access object, and the auditing result is returned to the terminal corresponding to the external access object. Or the method can initiate an application of the identity authority by the external visiting personnel, the external visiting institution firstly carries out the verification of the identity authority to obtain a list of candidate external visiting personnel, then the verified list of candidate external visiting personnel is sent to the credit institution, the credit institution carries out approval on the received application of the identity authority of the candidate external visiting personnel, and the verification result is returned to the external visiting institution.
The second location is an access location of the target accessed object. Optionally, the second location may be address information filled in by the target accessed object when implementing the loan application, or may be determined by acquiring positioning information of the mobile terminal of the target accessed object.
The mobile terminal of the accessed object has a positioning function, the positioning function is utilized to acquire the position information of the mobile terminal of the accessed object, and the acquired position information of the mobile terminal of the accessed object is utilized as a second position. Optionally, the positioning function of the mobile terminal of the accessed object has a function of turning on and off, for example, the positioning function is turned on during the external access process to acquire the current position of the accessed object in real time, so as to determine whether the accessed object is moving towards the accessed object, so as to prevent the accessed object from deviating. The positioning function can be closed after the external access process is finished, so that the privacy security of the accessed object is protected.
In an alternative embodiment, the mobile terminal of the accessed object turns on or off the positioning function after receiving an instruction to turn on or off the positioning function. Optionally, the command for opening or closing may be sent by the external access terminal to the mobile terminal of the accessed object, for example, the external access object triggers an external access opening command or an external access ending command by using the access terminal, and after detecting the external access opening command or the external access ending command, the access terminal sends an opening or closing command to the mobile terminal of the accessed object, so as to enable the positioning function of the mobile terminal of the accessed object to be opened or closed. The opening or closing instruction may also be an instruction sent by the server to the mobile terminal of the accessed object, for example, the external access object triggers an external access opening instruction or an external access ending instruction by using the access terminal, the access terminal sends the external access opening instruction or the external access ending instruction to the server after detecting the external access opening instruction or the external access ending instruction, the server sends an instruction for opening or closing the positioning function to the mobile terminal of the accessed object after receiving the external access opening instruction or the external access ending instruction, and the mobile terminal of the accessed object realizes opening or closing the positioning function after receiving the opening or closing the positioning function.
Wherein the distance information is used for representing the distance situation between the first position and the second position. Optionally, a distance threshold is preset, and when the distance information is within the distance threshold, the distance information indicates that the first position and the second position are closer, and when the distance information is not within the distance threshold, the distance information indicates that the first position and the second position are farther. In one embodiment, the distance threshold is at least one.
In an alternative embodiment, the information processing method further comprises an acquisition step of a target accessed object, which can be determined by the candidate accessed object. Optionally, the number of the candidate accessed objects corresponding to the external access object may be one or more, and when the number of the candidate accessed objects is one, the candidate accessed object is the target accessed object. When the plurality of candidate accessed objects are provided, the target accessed object may be further determined from the candidate accessed objects, for example, the target accessed object may be determined according to a distance relationship between the candidate accessed objects and the access object, or the plurality of candidate accessed objects may be generated into a corresponding position point diagram, displayed on the access terminal of the access object, and the target accessed object may be determined according to the selection of the access object. Optionally, a route planning function is further provided, after the target accessed object is determined, a guiding route is generated according to the position information of the target accessed object and the position information of the access terminal of the external access object, and the external access object can move to the target accessed object according to the guiding route.
In one embodiment, the access terminal is provided with an external access program, and the external access object determines a corresponding target accessed object through the external access program. Alternatively, the out-call program may be a web page program, mobile phone software, or the like.
In an optional embodiment, the external access object has an external access account for logging in the external access program to determine the corresponding target accessed object, and the information of the target accessed object can be queried and checked after logging in the external access program. In an optional embodiment, after the external access object logs in the external access program by using the external access account, an interface of the external access program may be displayed on the access terminal, or a target accessed object list corresponding to the external access object may be displayed, and the external access object may view information of the target accessed object by clicking the target accessed object.
In one embodiment, the correspondence between the external access object and the target accessed object may be allocated by the server according to the region information, for example, the external access object and the candidate accessed object will be corresponding in the same region, or may be manually specified, for example, the external access organization administrator specifies the external access object and the corresponding candidate accessed object. In an alternative embodiment, the manager of the credit agency can also distribute the accessed object of the required external visit to the information and data processing system through the user information and external visit condition management system, and the manager of the external visit agency can correspondingly distribute the accessed object and the external visit object through the information and data processing system.
Optionally, the user information and external access condition management system is used by a credit agency and used for realizing identity authority verification of the external access object, external access task generation and the like. When receiving the request of the external visit personnel identity sent by the information, namely the data processing system, the method can acquire the external visit object identity from the received request of the external visit object identity and audit, and return the audit result to the information and the data processing system. In one embodiment, the user information and the external access condition management system may also receive and store the information and the external access process data returned by the data processing system after the external access is finished, so as to facilitate subsequent viewing. In an alternative embodiment, the manager of the credit agency that may use the user information and the interview situation management system may include a large authority user that may query all interview data and a small authority user that may customize regional dimension query data restrictions.
In one embodiment, the information and data processing system is used by the external access organization, and can be used for sending an application of the identity of the external access object to the user information and external access condition management system, and determining the external access object passing the application according to the user information, namely, the auditing result of the identity of the external access object returned by the external access condition management system. In an alternative embodiment, it may be used to force calls to the audio system and/or the image system of the data acquisition system during the out-call process to record the out-call process. In an exemplary embodiment, after using account login information and the data processing system, an administrator of the external access mechanism can check an external access task of the external access mechanism, and distribute the external access task to the external access object, and can set permission of the external access object to limit permission of the external access object to check information of the target accessed object. In one embodiment, the query and view instructions of the access terminal in the external access process can be received, and the information of the target accessed object corresponding to the query and view instructions is returned to the access terminal according to the query and view instructions, so that the access terminal displays the required information. In one embodiment, the information and data processing system may further transmit the data related to the external access process to the user information and processing condition management system for storage after the external access is completed, so as to facilitate subsequent viewing. And the audio system and/or the image system in the called data acquisition system can be released after the data related to the external access process is transmitted to the user and the processing condition management system until the external access process of the accessed object aiming at the next target is started.
In an alternative embodiment, the information processing method further includes a step of determining a target accessed object, wherein the step of determining the target accessed object includes: acquiring a plurality of position information of an access terminal of an external access object in an external access process; determining a moving track of the access terminal of the external access object in the external access process according to the plurality of position information of the access terminal of the external access object in the external access process; determining the movement trend of the access terminal of the external access object according to the movement track and the access position of at least one candidate accessed object; and determining a target accessed object from at least one candidate accessed object according to the moving trend of the access terminal of the external access object.
The moving track is used for representing the moving route of the external access object in the external access process.
The movement trend is used to characterize whether the foreign object is close to the candidate accessed object or far from the candidate accessed object.
It can be understood that the external access object is continuously moved in the external access process, so that the position of the external access object is continuously changed, and therefore, the movement track of the external access object can be determined according to the position information of the external access object to determine the movement trend of the external access object, and the target accessed object of the external access object is determined according to the movement trend.
In an alternative embodiment, a plurality of location information may be used to determine the movement direction of the foreign object, and the target accessed object may be determined from the candidate accessed objects according to the movement direction. Optionally, a preset time interval may be set, before the external access object does not definitely meet the target accessed object, a plurality of location information of the access terminal is acquired according to the preset time interval, and the acquired plurality of location information is used to determine the movement trend of the external access object. The method can also be that before the external access object is not clearly intersected with the target accessed object, real-time position information of an access terminal of the external access object is obtained in real time and recorded and stored, then the moving trend is determined according to the recorded and stored position information, for example, the position information of a certain moment is obtained, the position information of the previous moment and the position information of the next moment are obtained, and then the moving trend is determined according to the obtained three position information, for example, the distance between the external access object and a certain candidate accessed object is determined to be closer and closer according to the three position information, the moving trend of the external access object is indicated to be close to the candidate accessed object, and therefore the candidate accessed object can be set as the target accessed object. In one embodiment, the confirmation mode of the meeting of the external access object and the target accessed object may be that the external access object is confirmed through the external access terminal, for example, the external access terminal sets a confirmation meeting control, and the external access object is confirmed through the touch meeting control, or may be that control is realized by using voice information, for example, the meeting is indicated by receiving the voice information of "meeting", or may be determined according to the distance information between the external access person and the target accessed object, for example, when the distance between the external access person and the target accessed object is 1m, it may be indicated that the external access person and the target accessed object are met.
In an exemplary embodiment, when the number of the candidate accessed objects is multiple, the process of moving the external access object during external access cannot obviously determine which candidate accessed object to move to by using multiple pieces of position information of the external access object, at this time, a moving track can be determined according to the position information, and the target accessed object can be determined by using the moving track and combining the positions of the accessed objects. For example, assuming that there are a first candidate visited object, a second candidate visited object, and a third candidate visited object, in the moving process, the distance information between the first candidate visited object, the second candidate visited object, and the third candidate visited object is approximately the same, it is not clear whether the external visited object moves to the first candidate visited object, or moves to the second candidate visited object, or moves to the third candidate visited object, where the moving track may be determined by using the position of the external visited object, for example, the moving track is moving along street a, and street a is the distance position information leading to the first candidate visited object and the third candidate visited object, where the moving direction is determined by combining the distance position information of the first candidate visited object and the third candidate visited object, and the target visited object is determined by further combining the moving direction.
In an alternative embodiment, determining the target accessed object from the at least one candidate accessed object according to the movement trend of the access terminal of the external access object includes: according to the moving trend of the access terminal of the external access object, determining a candidate accessed object, which is close to the access terminal of the external access object, from at least one candidate accessed object; and determining a target accessed object from the candidate accessed objects which are close to the access terminal of the external access object according to the access priority of the candidate accessed object.
Wherein the access priority of the candidate accessed object is used to characterize the priority of the candidate accessed object. Optionally, the access priority includes, but is not limited to, high level, medium level, low level, and the like.
In one embodiment, the target accessed object may be determined according to the access priority of the candidate accessed objects, for example, when there are two candidate accessed objects, then the candidate accessed object with the higher access priority may be selected as the target accessed object. In an alternative embodiment, after the external access object logs into the external access program using the account, the candidate accessed objects may be displayed in order according to the access priority, for example, the access priority may be displayed in descending order from high to low. In one embodiment, the candidate accessed objects may also be comprehensively ordered according to the access priority and the location information of the candidate accessed objects, so as to facilitate the external access object to determine the access sequence, and determine the target accessed object according to the access sequence. For example, the candidate accessed object ranked forefront may be selected as the target accessed object.
In one embodiment, when a plurality of candidate accessed objects are determined according to the movement direction, the access priority of the candidate accessed objects may also be determined, and the target accessed object is determined according to the access priority, for example, the candidate accessed object with the highest priority is taken as the target accessed object.
Step 204, determining the query authority of the information of the target accessed object according to the distance information.
The inquiry authority is used for representing the authority of information which can be inquired by the external access object. Optionally, the query authority includes different authority level information, and the types of information of the target accessed objects corresponding to the different authority level information are different.
In an alternative embodiment, the information of the target accessed object includes, but is not limited to, basic information such as a name of the target accessed object, identity information, confidential information such as bank account information, and the like.
Alternatively, the information of the accessed object may be classified into different types according to the importance degree, and the different authority level information has the type of the information of the accessed object corresponding thereto. Alternatively, the information of the accessed object may include, but is not limited to, basic information, encrypted information, and the like.
In one embodiment, different levels may be set according to the distance information, the different levels having different rights level information. For example, if the distance information is within the first threshold, it indicates that the first location and the second location are closer, and the permission level information at this time may be considered as viewable encrypted information. For another example, setting the second threshold value, the distance information being outside the second threshold value, indicates that the first location and the second location are far, and may consider the authority level information at this time as viewable basic information. Wherein the first threshold is less than the second threshold.
In one embodiment, after determining the query authority according to the distance information, determining the authority level information according to the query authority, and after receiving a query instruction of the external access object for the information of the target accessed object returned by the external access terminal, returning the information of the target accessed object corresponding to the narrative instruction to the access terminal according to the query authority, so that the access terminal displays the received information of the target accessed object. Alternatively, the query instruction may be sent by the access terminal to the server, and the server obtains the information of the target accessed object according to the received query instruction and returns the information to the access terminal, so that the access terminal displays the returned information of the target accessed object. In one embodiment, when the query instruction is matched with the query authority, the information of the target accessed object corresponding to the narrative instruction is returned, and when the query instruction is not matched with the query authority, the information of the target accessed object matched with the query authority in the narrative instruction is returned only or the information of the target accessed object is not returned directly.
In one embodiment, after sending the information of the target accessed object to the access terminal according to the information inquiry authority and the information inquiry request input by the external access object, so that the access terminal displays the information of the target accessed object, the information processing method further comprises: and if the moving direction is changed to be far away from the target accessed object, sending hiding instruction information to the access terminal, wherein the hiding instruction information is used for instructing to hide the display page of the target accessed object.
The display page is used for displaying information of the target accessed object.
In one embodiment, when the moving direction is far away from the target accessed object, determining whether the access terminal of the external access object displays the information of the target accessed object according to the target accessed object, if not, not displaying the attribute information of the target accessed object on the access terminal, for example, when receiving an instruction for displaying the information of the target accessed object, not corresponding to the instruction. In one embodiment, if the moving direction is far away from the target accessed object, if the access terminal of the external access object displays the information of the target accessed object, the display page of the information of the target accessed object is hidden and is not displayed until the target accessed object is determined again, optionally, after the display page is hidden, if the target accessed object is selected again, when a display instruction is received, the information of the target accessed object is displayed in response to the instruction, and when the display instruction is not received, the information of the target accessed object is not displayed. In one embodiment, the information that the access terminal displays the target accessed object includes, but is not limited to, information that the terminal's interface front page displays the target accessed object and information that the terminal's back page displays the target accessed object.
Optionally, when it is determined that the external access object is far away from the target accessed object according to the moving trend, a plurality of position information of the external access person may be further acquired to update the moving trend, the target accessed object may be updated according to the updated moving trend, so as to further achieve acquisition of distance information according to the updated target accessed object, and permission level information is determined based on the acquired distance information.
And step 206, according to the inquiry authority and the information inquiry request input by the external access object, sending the information of the target accessed object to the access terminal so that the access terminal displays the information of the target accessed object.
The information inquiry request is a request of the external access object for inquiring the information of the target accessed object by utilizing the input of the external access terminal.
In one embodiment, a query information input box is provided, the input of the requirement of the query information is realized through the query information input box, and an information query request is generated according to the input content.
In an optional embodiment, a query information input template may be preset according to the information of the accessed object to be recorded in the external access process, and the query information input template is used to realize the generation of the query information request.
In an alternative embodiment, the information query request may be transmitted to the server by the access terminal, and the server obtains, according to the received information query request, relevant information of the target accessed object corresponding to the information query request, and returns the relevant information to the access terminal, where the access terminal displays the received relevant information of the target accessed object.
In one embodiment, according to the query authority and the information query request input by the external access object, the method sends the information of the target accessed object to the access terminal, so that the access terminal displays the information of the target accessed object, includes: receiving an information inquiry request input by an external access object, wherein the information inquiry request comprises an identifier of the external access object; according to the identification of the external access object, carrying out primary verification on the query authority of the external access object; if the query authority of the external access object passes the primary verification, the information of the target accessed object is sent to the access terminal according to the query authority and the information query request input by the external access object, so that the access terminal displays the information of the target accessed object.
Wherein the identification of the external access object is used for distinguishing different external access objects.
In an optional embodiment, the external access object is set and stored corresponding to the query authority, and after receiving the query request, the server may obtain the identifier of the external access object, and determine whether the query request accords with the query authority based on the corresponding relationship between the query external access object and the query authority of the identifier of the external access object, so as to determine whether the verification passes. Optionally, when the query request exceeds the query right, it is determined that the query request does not conform to the query right, and the verification is failed, at this time, the query request may be ignored, and a prompt that the query is not available may also be returned to the access terminal. In one embodiment, when the query request does not exceed the query right, the query request is considered to be in accordance with the query right, verification is passed, the server obtains information of the target accessed object corresponding to the query request according to the query request, the obtained information of the target accessed object is returned to the access terminal, and the access terminal displays the received information of the target accessed object.
In an alternative embodiment, if the query request includes a plurality of query terms, the query terms may be checked separately, and for the query terms that pass the check, information of the target accessed object corresponding to the query terms is returned, and for the query terms that fail the check, a prompt that the query is not possible is returned.
In an optional embodiment, according to the query authority and the information query request input by the external access object, information of the target accessed object is sent to the access terminal, so that the access terminal displays the information of the target accessed object, and the method further includes: according to the query authority and the type of the information of the target accessed object to be accessed contained in the information query request, carrying out secondary verification on the query authority of the external access object; and if the query authority of the external access object passes the secondary verification, sending the information of the target accessed object to the access terminal so that the access terminal displays the information of the target accessed object.
In an alternative embodiment, after the server obtains the information query request, the information of the target accessed object to be queried can be obtained according to the information query request, the information type is determined according to the information of the target accessed object to be queried, the query authority is checked through the information type, and when the check is not passed, the query request can be not responded, and feedback that the query cannot be performed can also be returned. When the verification passes, the information of the target accessed object corresponding to the query request can be returned to the access terminal, and the access terminal displays the received information of the target accessed object.
In one embodiment, a level may be set for the information type, and whether the query authority passes the verification may be determined according to the level of the information type and the query authority. For example, if the query authority is higher than the information type level, the verification is passed, and if the query authority is lower than the information type level, the verification is not passed.
In the information processing method, the current position of the access terminal of the external access object in the external access process and the access position of the target accessed object are utilized to determine the distance information between the external access object and the target accessed object, the query right is determined according to the distance information, different right grade information is included in the query right, the right grade information corresponds to different types of information of the target accessed object, and when the information of the target accessed object is displayed according to the information query request, the display content of the target accessed object can be limited according to the query right, so that the safety of the information of the target accessed object is ensured.
In one embodiment, as shown in FIG. 3, an information method is provided, comprising the steps of:
step 302, obtaining a plurality of position information of the access terminal of the external access object in the external access process.
Step 304, determining the moving track of the access terminal of the external access object in the external access process according to the plurality of position information of the access terminal of the external access object in the external access process.
The moving track is used for representing a moving route of the external access object in the external access process.
And step 306, determining the movement trend of the access terminal of the external access object according to the movement track and the access position of at least one candidate accessed object.
The movement trend is used for representing that the external access object is close to the candidate accessed object or far from the candidate accessed object.
And 308, determining a candidate accessed object, which is close to the access terminal of the external access object, from at least one candidate accessed object according to the movement trend of the access terminal of the external access object.
And 310, determining a target accessed object from the candidate accessed objects which are close to the access terminal of the external access object according to the access priority of the candidate accessed object.
Step 312, distance information between the first location and the second location is obtained.
The first position is the current position of the access terminal of the external access object in the external access process, and the second position is the access position of the target accessed object.
Step 314, determining the query authority of the information of the target accessed object according to the distance information.
The query authority comprises different authority level information, and the types of information of the target accessed objects corresponding to the different authority level information are different.
And step 316, according to the inquiry authority and the information inquiry request input by the external access object, the information of the target accessed object is sent to the access terminal, so that the access terminal displays the information of the target accessed object.
The access priority of the candidate accessed object is used to characterize the priority level of the candidate accessed object. Optionally, the access priority includes, but is not limited to, high level, medium level, low level, and the like.
In this embodiment, the movement track of the external access object in the external access process is determined by using a plurality of pieces of position information of the access terminal of the external access object in the external access process, the movement direction is determined by using the movement estimation and the access position of at least one candidate accessed object, the candidate accessed object, which is close to the access terminal of the external access object, is determined from at least one candidate accessed object by using the movement direction, the target accessed object is determined from the candidate accessed objects according to the candidate access priority, and the accuracy of determining the target accessed object can be improved by using the movement track, the movement direction and the position information of the candidate accessed object of the external access object.
In one embodiment, as shown in FIG. 4, an information method is provided, comprising the steps of:
Step 402, obtaining a plurality of position information of an access terminal of an external access object in an external access process.
Step 404, determining the moving track of the access terminal of the external access object in the external access process according to the plurality of position information of the access terminal of the external access object in the external access process.
The moving track is used for representing a moving route of the external access object in the external access process.
And step 406, determining the movement trend of the access terminal of the external access object according to the movement track and the access position of the target accessed object.
The movement trend is used for representing that the external access object is close to the target accessed object or far from the target accessed object.
And step 408, determining a target accessed object from at least one candidate accessed object according to the movement trend of the access terminal of the external access object.
In step 410, distance information between the first location and the second location is obtained.
The first position is the current position of the access terminal of the external access object in the external access process, and the second position is the access position of the target accessed object.
Step 412, determining the query authority of the information of the target accessed object according to the distance information.
The query authority comprises different authority level information, and the types of information of the target accessed objects corresponding to the different authority level information are different.
And step 414, according to the inquiry authority and the information inquiry request input by the external access object, sending the information of the target accessed object to the access terminal so that the access terminal displays the information of the target accessed object.
In step 416, if the movement direction is changed to be away from the target accessed object, the hidden instruction information is sent to the access terminal.
The hiding indication information is used for indicating to hide a display page of the target accessed object, and the display page is used for displaying information of the target accessed object.
In this embodiment, the display condition of the display page is adjusted by using the movement direction, and when the external access object is far away from the target accessed object, the information of the target accessed object can be hidden, so that the security of the information of the target accessed object can be improved.
In one embodiment, as shown in FIG. 5, an information method is provided, comprising the steps of:
step 502, distance information between a first location and a second location is obtained.
The first position is the current position of the access terminal of the external access object in the external access process, and the second position is the access position of the target accessed object.
Step 504, determining the query authority of the information of the target accessed object according to the distance information.
The query authority comprises different authority level information, and the types of information of the target accessed objects corresponding to the different authority level information are different.
Step 506, receiving the information query request input by the external access object.
The information inquiry request contains identification of the external access object.
The information inquiry request is a request of the external access object for inquiring the information of the target accessed object by utilizing the input of the external access terminal. The identification of the foreign object is used to distinguish between different foreign objects.
And step 508, performing primary verification on the query authority of the external access object according to the identification of the external access object.
Step 510, if the query authority of the external access object passes the primary verification, performing the secondary verification on the query authority of the external access object according to the query authority and the type of the information of the target accessed object to be accessed contained in the information query request.
And step 512, if the query authority of the external access object passes the secondary verification, sending the information of the target accessed object to the access terminal so that the access terminal displays the information of the target accessed object.
In this embodiment, the first verification of the query authority is implemented by using the identifier of the external access object, and based on the first verification, the second verification is implemented by using the type of the information of the target accessed object to be accessed contained in the information query request, and after the verification is passed, the information of the target accessed object is displayed on the access terminal, and through multiple verifications, the accuracy of the query authority can be ensured, so that the security of the information of the target accessed object is improved.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiments of the present application also provide an information processing apparatus for implementing the above-mentioned related information processing method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation of one or more embodiments of the information processing device provided below may refer to the limitation of the information processing method hereinabove, and will not be repeated herein.
In one embodiment, as shown in fig. 6, there is provided an information processing apparatus 600 including: a distance information acquisition module 602, a query authority determination module 604, and a display module 606, wherein:
the distance information obtaining module 602 is configured to obtain distance information between a first location and a second location, where the first location is a current location of an access terminal of the external access object in an external access process, and the second location is an access location of the target accessed object;
the query permission determining module 604 is configured to determine a query permission of information of the target accessed object according to the distance information, where the query permission includes different permission level information, and types of information of the target accessed object corresponding to the different permission level information are different;
and the display module 606 is configured to send information of the target accessed object to the access terminal according to the query permission and the information query request input by the external access object, so that the access terminal displays the information of the target accessed object.
In one embodiment, the information processing apparatus 600 further includes: the target accessed object determining module is also used for acquiring a plurality of position information of the access terminal of the external access object in the external access process; determining a moving track of the access terminal of the external access object in the external access process according to the plurality of position information of the access terminal of the external access object in the external access process; determining the movement trend of the access terminal of the external access object according to the movement track and the access position of at least one candidate accessed object; and determining a target accessed object from at least one candidate accessed object according to the moving trend of the access terminal of the external access object.
In one embodiment, the target accessed object determining module is further configured to determine, according to a movement trend of the access terminal of the external access object, a candidate accessed object that is close to the access terminal of the external access object from among the at least one candidate accessed object, and determine, according to an access priority of the candidate accessed object, the target accessed object from among the candidate accessed objects that are close to the access terminal of the external access object.
In one embodiment, the display module 606 is further configured to send, to the access terminal, hiding indication information if the movement direction changes to a direction away from the target accessed object, where the hiding indication information is used to indicate to hide a display page of the target accessed object, and the display page is used to display information of the target accessed object.
In one embodiment, the display module 606 is further configured to receive an information query request input by the external access object, where the information query request includes an identifier of the external access object; according to the identification of the external access object, carrying out primary verification on the query authority of the external access object; if the query authority of the external access object passes the primary verification, the information of the target accessed object is sent to the access terminal according to the query authority and the information query request input by the external access object, so that the access terminal displays the information of the target accessed object.
In one embodiment, the display module 606 is further configured to perform secondary verification on the query authority of the external access object according to the type and the query authority of the information of the target accessed object to be accessed included in the information query request; and if the query authority of the external access object passes the secondary verification, sending the information of the target accessed object to the access terminal so that the access terminal displays the information of the target accessed object.
Each of the modules in the above-described information processing apparatus may be implemented in whole or in part by software, hardware, and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 7. The computer device includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is for storing data. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement an information processing method.
It will be appreciated by those skilled in the art that the structure shown in fig. 7 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided that includes a memory having a computer program stored therein and a processor that when executing the computer program performs the steps of the following embodiments.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, implements the steps of the method embodiments described below.
In one embodiment, a computer program product is provided comprising a computer program which, when executed by a processor, implements the steps of the embodiments described below.
It should be noted that, the user information (including, but not limited to, user equipment information, user personal information, etc.) and the data (including, but not limited to, data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data are required to comply with the related laws and regulations and standards of the related countries and regions.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the various embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided herein may include at least one of relational databases and non-relational databases. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic units, quantum computing-based data processing logic units, etc., without being limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples represent only a few embodiments of the present application, which are described in more detail and are not thereby to be construed as limiting the scope of the present application. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application shall be subject to the appended claims.

Claims (10)

1. An information processing method, characterized in that the method comprises:
acquiring distance information between a first position and a second position, wherein the first position is the current position of an access terminal of an external access object in the external access process, and the second position is the access position of a target accessed object;
determining the query authority of the information of the target accessed object according to the distance information, wherein the query authority comprises different authority level information, and the types of the information of the target accessed object corresponding to the different authority level information are different;
And sending the information of the target accessed object to the access terminal according to the query permission and the information query request input by the external access object so as to enable the access terminal to display the information of the target accessed object.
2. The method of claim 1, wherein prior to the acquiring distance information between the first location and the second location, the method further comprises:
acquiring a plurality of position information of an access terminal of the external access object in the external access process;
determining a moving track of the access terminal of the external access object in the external access process according to the plurality of position information of the access terminal of the external access object in the external access process;
determining the movement trend of the access terminal of the external access object according to the movement track and the access position of at least one candidate accessed object;
and determining the target accessed object from the at least one candidate accessed object according to the movement trend of the access terminal of the external access object.
3. The method according to claim 2, wherein the determining the target accessed object from the at least one candidate accessed object according to the moving direction of the access terminal of the external access object includes:
According to the moving trend of the access terminal of the external access object, determining a candidate accessed object, which is close to the access terminal of the external access object, from the at least one candidate accessed object;
and determining the target accessed object from the candidate accessed objects which are close to the access terminal of the external access object according to the access priority of the candidate accessed object.
4. The method according to claim 2, wherein after the information of the target accessed object is transmitted to the access terminal according to the information inquiry right and the information inquiry request input by the external access object, so that the access terminal displays the information of the target accessed object, the method further comprises:
and if the moving direction is changed to be far away from the target accessed object, sending hiding indication information to the access terminal, wherein the hiding indication information is used for indicating to hide a display page of the target accessed object, and the display page is used for displaying information of the target accessed object.
5. The method according to claim 1, wherein the sending the information of the target accessed object to the access terminal according to the query right and the information query request input by the external access object, so that the access terminal displays the information of the target accessed object, includes:
Receiving an information inquiry request input by the external access object, wherein the information inquiry request comprises an identifier of the external access object;
according to the identification of the external access object, carrying out primary verification on the query authority of the external access object;
and if the inquiry authority of the external access object passes the primary verification, sending the information of the target accessed object to the access terminal according to the inquiry authority and the information inquiry request input by the external access object so as to enable the access terminal to display the information of the target accessed object.
6. The method of claim 5, wherein the sending the information of the target accessed object to the access terminal according to the query right and the information query request input by the external access object, so that the access terminal displays the information of the target accessed object, comprises:
according to the query authority and the type of the information of the target accessed object to be accessed contained in the information query request, carrying out secondary verification on the query authority of the external access object;
and if the query authority of the external access object passes the secondary verification, sending the information of the target accessed object to the access terminal so that the access terminal displays the information of the target accessed object.
7. An information processing apparatus, characterized in that the apparatus comprises:
the distance information acquisition module is used for acquiring distance information between a first position and a second position, wherein the first position is the current position of an access terminal of an external access object in the external access process, and the second position is the access position of a target accessed object;
the query permission determining module is used for determining the query permission of the information of the target accessed object according to the distance information, wherein the query permission comprises different permission grade information, and the types of the information of the target accessed object corresponding to the different permission grade information are different;
and the display module is used for sending the information of the target accessed object to the access terminal according to the query permission and the information query request input by the external access object so as to enable the access terminal to display the information of the target accessed object.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
CN202311277632.8A 2023-09-28 2023-09-28 Information processing method, information processing device, computer equipment and storage medium Pending CN117272383A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311277632.8A CN117272383A (en) 2023-09-28 2023-09-28 Information processing method, information processing device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311277632.8A CN117272383A (en) 2023-09-28 2023-09-28 Information processing method, information processing device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117272383A true CN117272383A (en) 2023-12-22

Family

ID=89221134

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311277632.8A Pending CN117272383A (en) 2023-09-28 2023-09-28 Information processing method, information processing device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117272383A (en)

Similar Documents

Publication Publication Date Title
US20220100736A1 (en) Real time visual validation of digital content using a distributed ledger
CN110009334B (en) Meckel tree construction and simple payment verification method and device
US20200396277A1 (en) Method and system for securely identifying users
US11232017B2 (en) System for refreshing and sanitizing testing data in a low-level environment
CN112907243B (en) Block chain transaction auditing method and device
WO2020207084A1 (en) Payment complaint method, device, server, and readable storage medium
CN109858273A (en) Obtaining product information method, apparatus, computer equipment and storage medium
CN111489155A (en) Data processing method and device and data processing device
US20210103993A1 (en) Inter-frame communication
JP2020187723A (en) Performing machine learning on distributed customer data while protecting privacy
CN110334398A (en) Information processing method, device, equipment and storage medium based on BIM model
CN110442654A (en) Promise breaking information query method, device, computer equipment and storage medium
CN115794289A (en) Application function display method, device, equipment, medium and program product
US20220028008A1 (en) Signals-based data syndication and collaboration
CN116756711A (en) Data processing method, device, equipment and medium
CN109087053B (en) Collaborative office processing method, device, equipment and medium based on association topological graph
CN117633837A (en) Data access processing method, device, system and storage medium
CN117473130A (en) Service processing method, device, equipment, medium and program product
US20230161954A1 (en) Methods and systems for populating application-specific information using overlay applications
CN117272383A (en) Information processing method, information processing device, computer equipment and storage medium
US20140223112A1 (en) System and method for managing data elements
CN113806373A (en) Data processing method and device, electronic equipment and storage medium
CN117421717B (en) Account authorization method, account authorization device, computer equipment and storage medium
US20220366169A1 (en) System and method for crowdsourcing a video summary for creating an enhanced video summary
CN113961766A (en) Data feature query method, device, equipment and medium based on federal learning

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination