CN117437639A - Identity information processing method, system, device, equipment and storage medium - Google Patents

Identity information processing method, system, device, equipment and storage medium Download PDF

Info

Publication number
CN117437639A
CN117437639A CN202311458912.9A CN202311458912A CN117437639A CN 117437639 A CN117437639 A CN 117437639A CN 202311458912 A CN202311458912 A CN 202311458912A CN 117437639 A CN117437639 A CN 117437639A
Authority
CN
China
Prior art keywords
information
certificate
template
algorithm
field
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311458912.9A
Other languages
Chinese (zh)
Inventor
蒋自豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202311458912.9A priority Critical patent/CN117437639A/en
Publication of CN117437639A publication Critical patent/CN117437639A/en
Pending legal-status Critical Current

Links

Abstract

One or more embodiments of the present disclosure provide an identity information processing method, an identity information processing apparatus, an identity information management system, a computer device, and a storage medium, where corresponding template information may be configured in advance for each document type. Based on the above, when the system receives the certificate picture uploaded by the user side, the corresponding template information can be obtained from the pre-configured template information, the certificate picture is identified and checked based on the template information, whether the certificate picture accords with the template information is determined, and the user is informed to upload the correct certificate picture again under the condition that the certificate picture does not accord with the template information.

Description

Identity information processing method, system, device, equipment and storage medium
Technical Field
One or more embodiments of the present disclosure relate to the field of computer technology, and in particular, to a method, a system, an apparatus, a device, and a storage medium for processing identity information.
Background
With the continuous development of computer technology, software products are already applied to the aspects of clothing, food, living and running of people, and in order to ensure the rights and interests of users and the safety of network information, many software products need real names of users to use. In a real world environment, the identity of a user may be demonstrated by different types of credentials information, such as an identity card, passport, home book, house property card, residence card, etc.
Thus, for software products having a large population of users to use, there is a need to be able to efficiently and conveniently manage different users and different types of credential information for each user.
Disclosure of Invention
In order to efficiently and conveniently manage different types of certificate information, one or more embodiments of the present specification provide an identity information processing method, system, apparatus, device, and storage medium.
In a first aspect, one or more embodiments of the present disclosure provide an identity information processing method, including: receiving a certificate picture uploaded by a user side, and determining a first certificate type corresponding to the certificate picture; acquiring first template information from a plurality of preset template information, wherein the first template information comprises a first certificate template corresponding to the first certificate type, and a first check rule and a first algorithm type corresponding to the first certificate template; identifying the certificate information in the certificate picture by using a first identification algorithm corresponding to the first algorithm type; checking whether the certificate information accords with the first certificate template according to the first checking rule; and under the condition that the certificate information accords with the first certificate template, carrying out association storage on the certificate information and the certificate picture.
In a possible implementation manner, before receiving the certificate picture uploaded by the user side, the method further includes: configuring second template information; the second template information is any one of the plurality of template information; the configuring the second template information includes: in response to a selection operation from among a plurality of credential types, obtaining a selected second credential type, the second credential type being any of the plurality of credential types; displaying a configuration page corresponding to the second certificate type, wherein the configuration page comprises a plurality of configuration items; responding to the editing operation of each configuration item, and acquiring configuration item information input by editing; and generating second template information corresponding to the second certificate type according to all the configuration item information.
In a possible implementation manner, the plurality of configuration items include an algorithm type configuration item and a plurality of field configuration items, each field configuration item is used for configuring one information field and corresponding attribute information in the certificate template, and the attribute information includes the necessity, type and format of each information field; responding to the editing operation of each configuration item, acquiring configuration item information input by editing, wherein the configuration item information comprises: responding to a selection operation executed on each field configuration item, and acquiring a plurality of information fields corresponding to the selected field configuration items; acquiring attribute information of editing input in response to an editing operation performed on the selected plurality of field configuration items; in response to a selection operation performed on the algorithm type configuration item, a selected second algorithm identification is obtained, the second algorithm identification being indicative of a second recognition algorithm.
In a possible implementation manner, generating second template information corresponding to the second certificate type according to all the configuration item information includes: generating a second certificate template corresponding to the second certificate type according to the information fields; establishing a corresponding relation between the second certificate template and the second algorithm identifier; establishing a corresponding relation between each information field and the attribute information according to the information field corresponding to each field configuration item and the configured attribute information; and generating a second check rule corresponding to the second certificate template according to the attribute information corresponding to all the information fields.
In a possible implementation manner, the plurality of configuration items further includes an index dimension configuration item, and the method further includes: and responding to the selection operation executed on the index dimension configuration item, and acquiring at least one information field selected from the plurality of information fields as an index field corresponding to the second certificate template.
In a possible implementation manner, the plurality of configuration items further includes an analysis dimension configuration item, and the method further includes: and responding to the selection operation executed on the analysis dimension configuration item, and acquiring at least one information field selected from the plurality of information fields as an analysis field corresponding to the second certificate template.
In a possible implementation manner, identifying the certificate information in the certificate picture by using a first identification algorithm corresponding to the first algorithm type includes: determining a corresponding first algorithm identifier according to the first algorithm type; determining a first algorithm interface corresponding to the first algorithm identifier, wherein the first algorithm interface is used for executing a first identification algorithm indicated by the first algorithm identifier; and taking the certificate picture as an interface parameter and accessing the first algorithm interface to be used for executing the first identification algorithm to identify the certificate information in the certificate picture.
In a possible implementation manner, determining a first algorithm interface corresponding to the first algorithm identifier includes: and loading a prestored application program interface, and determining a first algorithm interface corresponding to the first algorithm identifier from the application program interfaces.
In a possible implementation manner, determining a first algorithm interface corresponding to the first algorithm identifier includes: and sending the first algorithm identification to a third party platform to obtain a first algorithm interface provided by the third party platform according to the first algorithm identification.
In a possible implementation manner, verifying whether the certificate information matches the first certificate template according to the first verification rule includes: and according to the information fields contained in the first certificate template and the first verification rule, verifying each information item and the attribute thereof in the certificate information to determine whether the certificate information accords with the first certificate template.
In a possible implementation manner, the plurality of configuration items further include an anti-counterfeiting verification identifier for indicating whether to perform anti-counterfeiting verification on the certificate template; in the case that the first template information includes the anti-counterfeit verification mark, the method further includes: and according to the anti-counterfeiting verification mark, under the condition that the anti-counterfeiting verification is required, the authenticity of the certificate picture is identified by utilizing an anti-counterfeiting identification algorithm.
In a possible implementation manner, in a case that the certificate information is identified as being wrong according to any one of the first identification algorithm, the first verification rule or the anti-counterfeiting identification algorithm, the method further includes: and returning prompt information to the user side so as to prompt the user to re-upload the certificate picture with the correct format.
In a possible implementation manner, the association storage of the certificate information and the certificate picture includes: encrypting the certificate picture, and storing the encrypted certificate picture to a designated storage position in a magnetic disk; and carrying out association storage on the certificate information and the storage address corresponding to the appointed storage position.
In a possible implementation manner, the multiple information fields of the second certificate template further include a designated information field, and an encryption attribute corresponding to the designated information field is used for indicating whether encryption processing is performed on the designated information field; and under the condition that the encryption attribute corresponding to the appointed information field of the first certificate template indicates that encryption is needed, performing associated storage on the certificate information and a storage address corresponding to the appointed storage position, wherein the method comprises the following steps: according to a preset encryption algorithm and the appointed information field of the first certificate template, encrypting an information item corresponding to the appointed information field of the first certificate template in the certificate information; and carrying out association storage on the encrypted certificate information and the storage address corresponding to the appointed storage position.
In a possible implementation manner, the method further includes: determining index information items corresponding to the index fields in the certificate information according to the index fields in the first certificate template; and establishing an inverted index corresponding relation between the index information item and the certificate information dictionary, so as to be used for inquiring the certificate information from different dimensions.
In a possible implementation manner, the method further includes: determining analysis information items corresponding to the analysis fields in the certificate information according to the analysis fields in the first certificate model; and generating an analysis report corresponding to the certificate information according to the analysis information item, so as to analyze the certificate information from different dimensions.
In a second aspect, one or more embodiments of the present specification provide an identity information management system, comprising: the configuration module is used for configuring template information corresponding to different certificate types, wherein the template information comprises a certificate template corresponding to each certificate type, a verification rule corresponding to the certificate template and an algorithm type; the verification rule is generated according to attribute information of a plurality of information fields in the certificate template, and the algorithm type is represented by a corresponding algorithm identifier; the processing module is used for receiving the certificate picture uploaded by the user side and determining a corresponding first certificate type; acquiring first template information corresponding to the first certificate type from a plurality of preset template information, and determining a first certificate template included in the first template information and a first verification rule and a first algorithm type corresponding to the first certificate template; identifying the certificate information in the certificate picture by using a first identification algorithm corresponding to the first algorithm type; checking whether the certificate information accords with the first certificate template according to the first check rule; and under the condition that the certificate information and the certificate picture are determined to be matched, carrying out association storage.
In a possible implementation manner, the configuration module is further configured to configure an index field corresponding to the certificate template from different index dimensions, and/or configure an analysis field corresponding to the certificate template from different analysis dimensions.
In a possible implementation manner, the processing module is further configured to: according to the index field in the first certificate template, determining an index information item corresponding to the index field in the certificate information, and establishing an inverted index corresponding relation between the index information item and a certificate information dictionary; and/or determining analysis information items corresponding to the analysis fields in the certificate information according to the analysis fields in the first certificate model, and generating a corresponding analysis report according to the analysis information items.
In a possible implementation manner, the system further comprises a query module, wherein the query module is used for receiving a query request sent by a user side for the certificate information, and the query request comprises index dimension information and/or analysis dimension information; determining a corresponding search field in the certificate information according to the index dimension information, and inquiring the certificate information according to the search field; and/or determining the corresponding analysis field in the certificate information according to the analysis dimension information, and inquiring the analysis report corresponding to the certificate information according to the analysis field.
In a third aspect, one or more embodiments of the present specification provide an identity information processing apparatus, including: the receiving module is used for receiving the certificate picture uploaded by the user side and determining a first certificate type corresponding to the certificate picture; the acquisition module is used for acquiring first template information from a plurality of preset template information, wherein the first template information comprises a first certificate template corresponding to the first certificate type, and a first check rule and a first algorithm type corresponding to the first certificate template; the identification module is used for identifying the certificate information in the certificate picture by utilizing a first identification algorithm corresponding to the first algorithm type; the verification module is used for verifying whether the certificate information accords with the first certificate template according to the first verification rule; and the storage module is used for carrying out association storage on the certificate information and the certificate picture under the condition that the certificate information accords with the first certificate template.
In a fourth aspect, one or more embodiments of the present description also provide an electronic device including a memory and a processor; the memory is used for storing a computer program product; the processor is configured to execute a computer program product stored in the memory, and when the computer program product is executed, implement the identity information processing method of the first aspect.
In a fifth aspect, one or more embodiments of the present specification further provide a computer readable storage medium storing computer program instructions that, when executed, implement the identity information processing method of the first aspect.
In summary, the identity information processing method, the identity information processing apparatus, the identity information management system, the computer device and the storage medium provided in one or more embodiments of the present disclosure may implement configuring, in advance, corresponding template information for each document type, where the template information includes at least a document template corresponding to each document type and an algorithm type and a verification rule required for identifying the document information corresponding to each document type. Based on the above, when the system receives the certificate picture uploaded by the user side, the system can acquire the corresponding template information from the preset template information according to the type of the certificate picture, and based on the acquired algorithm type and the verification rule, identify and verify the certificate picture uploaded by the user side, and further determine whether the certificate information corresponding to the certificate picture uploaded by the user side accords with the corresponding certificate template or not, so as to inform the user to upload the correct certificate picture again under the condition of determining the discrepancy. By the method, for the use scene of adding the new certificate types, unified processing of the certificate information corresponding to different certificate types can be realized only by executing simple configuration operation by a system administrator, and targeted coding operation is not needed, so that development workload is reduced, and work efficiency is improved.
Moreover, the identity information management system provided by one or more embodiments of the present specification is further provided with a search dimension, and a system administrator can specify a search field corresponding to the search dimension for each certificate type. Based on this, the system can build an inverted index for the search field corresponding to each type of credential information, and when a request for querying the credential information according to the search field is received, the credential information can be retrieved from the corresponding dimension. Accordingly, the identity information management system provided in one or more embodiments of the present disclosure further provides a configuration function of an analysis dimension, and a system administrator may specify an analysis field corresponding to the analysis dimension for each certificate type. Based on the analysis report can be generated by the system from the dimension corresponding to the analysis field aiming at each certificate information, and when a request for inquiring the analysis report according to the analysis field is received, the corresponding analysis report can be inquired from the corresponding dimension for use by a request terminal. In this way, credential information can be obtained from different dimensions to provide job support upstream and downstream of the system.
Drawings
In order to more clearly illustrate the technical solution of one or more embodiments of the present description, the drawings that are required for use in the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of one or more embodiments of the present description, and that other drawings may be obtained according to these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1a is a schematic diagram illustrating an identity information management system according to one or more embodiments of the present disclosure;
FIG. 1b is a stylized diagram of one configuration module 101 provided in one or more embodiments of the present disclosure;
FIG. 1c is a style sheet corresponding to a configuration page for configuring attribute information for an information field according to one or more embodiments of the present disclosure;
FIG. 1d is a stylistic diagram corresponding to a configuration page for configuring an algorithm type for a document template according to one or more embodiments of the present disclosure;
FIG. 1e is a schematic diagram illustrating an alternative identity information management system according to one or more embodiments of the present disclosure;
FIG. 2 is a schematic diagram corresponding to an interaction process between a client and an identity information management system according to one or more embodiments of the present disclosure;
FIG. 3 is a flow diagram of a method of identity information processing provided in one or more embodiments of the present disclosure;
FIG. 4a is a block diagram illustrating an identity information processing arrangement according to one or more embodiments of the present disclosure;
FIG. 4b is a block diagram illustrating another identity information processing arrangement in accordance with one or more embodiments of the present disclosure;
FIG. 4c is a block diagram illustrating another identity information processing arrangement in accordance with one or more embodiments of the present disclosure;
Fig. 5 is a block diagram of an electronic device according to one or more embodiments of the present disclosure.
Detailed Description
One or more embodiments of the present specification are described in further detail below with reference to the drawings and examples. Features and advantages of one or more embodiments of the present description will become apparent from the description.
The word "exemplary" is used herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments. Although various aspects of the embodiments are illustrated in the accompanying drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
In addition, the technical features mentioned in the different implementations of one or more embodiments of the present specification described below may be combined with each other as long as they do not conflict with each other.
In order to facilitate understanding, an application scenario of the technical solution provided in one or more embodiments of the present disclosure is first described below.
With the development of internet technology, internet products have penetrated into every corner of life of users, and for internet manufacturers, when developing a product, the diversity of functions of the product is often emphasized to meet the use requirement of users for unnecessary applications. However, for a good internet product, the user population is very huge, and in the face of such a huge number of users, real-name use of the users is usually required to ensure use safety, which involves the problem that the users provide personal or enterprise identity information to the manufacturer. Therefore, in order to ensure the information security of the user, the manufacturer needs to consider how to manage the huge user group information in addition to the function of the product itself, and especially needs to provide a safe and reliable management system for the identity information related to the user privacy.
However, in an actual usage scenario, the user may be required to provide different types of identity information, for example, an identity card, a passport, a social security card, a home book, a real estate certificate, a driving license, a graduation, a academic license, a student license, and the like, if each type of identity information is added to the system, a corresponding identification and management function is developed in a targeted manner, which will increase a small workload for a developer and be disadvantageous for unified management of the identity information.
To this end, one or more embodiments of the present specification provide an identity information management system, an identity information processing method, an identity information processing apparatus, an electronic device, and a computer storage medium. In the identity information management system, a template information configuration function is provided, and a system administrator can configure corresponding template information for different certificate types, wherein the template information corresponding to each certificate type comprises a certificate template corresponding to the certificate type, and an algorithm type and a verification rule for identifying the certificate picture, so that the certificate picture is identified and processed according to each configured template information.
In the embodiment of the specification, when a user performs real-name authentication or other identity information processing operations in the process of using an internet product, a document picture can be uploaded to an identity information management system through a user side, optionally, the user side can display a document type selection page, and the user can select a document type corresponding to the document picture uploaded at this time from the document type selection page when uploading the document picture. For example, if the user uploads an identification card picture, the corresponding certificate type may be selected as "identification card", and for example, if the user uploads a graduation card picture, the corresponding certificate type may be selected as "graduation card". Based on the above, when the identity information management system receives the certificate picture uploaded by the user side, the template information corresponding to the certificate type can be determined from the pre-configured template information, and then the certificate picture uploaded by the user is automatically identified and processed according to the determined template information. Therefore, for the application scene requiring to add the new type identity information, a system administrator can provide a basis for the subsequent identification and management processes only by executing simple configuration operation, and no targeted coding operation is needed, so that the development workload is reduced, and the work efficiency is improved.
One or more embodiments of the present specification provide an identity information management system, an identity information processing method, an identity information processing apparatus, an electronic device, and a specific function of a computer storage medium with reference to the accompanying drawings.
Fig. 1a is a schematic structural diagram of an identity information management system according to an embodiment of the present disclosure, and as shown in fig. 1a, an identity information management system 100 includes a configuration module 101 and a processing module 102. In this embodiment, the configuration module 101 is configured to configure template information corresponding to different certificate types, where each type of template information corresponding to a certificate type includes a certificate template corresponding to the certificate type, a verification rule corresponding to the certificate template, and an algorithm type, where the verification rule is generated according to attribute information of a plurality of information fields in the certificate template, and the algorithm type is represented by a corresponding algorithm identifier. The processing module 102 is configured to receive a certificate picture uploaded by a user side and determine a corresponding first certificate type; acquiring first template information corresponding to a first certificate type from a plurality of preset template information, and determining the first certificate template included in the first template information and a first verification rule and a first algorithm type corresponding to the first certificate template; identifying certificate information in the certificate picture by using a first identification algorithm corresponding to the first algorithm type; and checking whether the certificate information accords with the first certificate template according to the first check rule, and storing the certificate information and the certificate picture in a correlated mode under the condition that the certificate information accords with the first certificate template.
In this embodiment, without limiting the specific style of the configuration module 101, optionally, as shown in fig. 1b, the configuration module 101 may be provided with a first configuration page 11, which includes a configuration item for selecting a credential type, where a corresponding credential type list may be displayed when a system administrator triggers the configuration item, and the system administrator may select a required second credential type from the credential type list according to a use requirement of an internet product in an application scenario, so as to configure corresponding template information for the second credential type, where the second credential type is any one of multiple credential types. Based on this, in response to a selection operation from among a plurality of certificate types by the system administrator, the system can acquire the selected two certificate types, and further, present the second configuration page 12 corresponding to the second certificate type, optionally, the second configuration page 12 includes a plurality of configuration items for configuring the certificate content, and the system administrator can perform editing on the plurality of configuration items. Based on this, the system can acquire the configuration item information of the edit input in response to the edit operation for each configuration item to generate second template information corresponding to the second certificate type from all the configuration item information.
In this embodiment, the specific types of the plurality of configuration items included in the second configuration page 12 are not limited, and optionally include, but are not limited to, an algorithm type configuration item for configuring an identification algorithm required to identify the credential information, and a plurality of field configuration items for configuring a plurality of information fields in the credential template and corresponding attribute information thereof. Alternatively, the system administrator may select a field configuration item corresponding to each information field from a plurality of field configuration items based on the information field contained in the selected credential type. Based on this, the system, in response to performing the selection operation on each field configuration item, can obtain a plurality of information fields corresponding to the selected field configuration item for generating a credential template containing the plurality of information fields.
For example, if the certificate type selected by the system administrator is an identification card type, a field configuration item for configuring contents such as a name, an attribute, a type of residence, a date of birth, an address of a residence, an identification number, a certificate photograph, a validity period, an issuing mechanism, and the like may be selected from a plurality of field configuration items, and based on this, the system may acquire information fields such as a name, an attribute, a type of residence, a date of birth, an address of a residence, an identification number, a certificate photograph, a validity period, an issuing mechanism, and the like in response to performing a selection operation on the above field configuration item. For another example, if the certificate type selected by the system administrator is a passport, a field configuration item for configuring contents such as a name, an attribute, a date of birth, a birth address, a date of issuance, a validity period, a place of issuance, and an issuing authority may be selected from a plurality of field configuration items, and based on this, the system may acquire information fields such as a name, an attribute, a date of birth, a birth address, a date of issuance, a validity period, a place of issuance, and an issuing authority in response to performing a selection operation on the field configuration item.
It should be noted that, for the second configuration page 12, other optional field configuration items may be included in addition to the field configuration items corresponding to the necessary information fields of each certificate type. Based on this, the system administrator can select the optional field configuration item for each credential type according to specific application requirements for generating a credential template containing optional information fields after performing subsequent operations. For example, for the identity card type, the corresponding field configuration item may include, in addition to the field configuration item corresponding to the necessary field information in the above example, an optional field configuration item for identifying whether the identity card type is a first-generation identity card or a second-generation identity card; for another example, for the passport type, the corresponding field configuration item may include a field configuration item for identifying whether the passport is an old version or a new version, in addition to the field configuration item corresponding to the necessary field information in the above example. Of course, the specific content of the optional field configuration item corresponding to each certificate type for configuration is not limited, and may be determined according to actual requirements.
Further, for each field configuration item that has been selected, the attribute information of its corresponding information field may be configured, optionally, as shown in fig. 1c, any field configuration item is triggered, and a corresponding third configuration page 13 may be displayed, where attribute information corresponding to the triggered field configuration item is included, optionally, the configurable attribute information of each field configuration item includes, but is not limited to, the necessity, type, and format of the corresponding information field. For example, for the "certificate number" in the identity card type, the corresponding necessity is that it is a filling item, the corresponding type is a character string type, the corresponding format is composed of a 17-bit digital body code and a 1-bit check code, wherein the first 6 bits are region codes, the 7 th to 14 th digits represent the year, month and day, the last 3 digits are sequential codes, the last 1 digit is a check code, and the type of the check code can be a number or letter. Based on this, the system administrator can execute editing operations corresponding to the necessity, type, and format thereof for the field configuration item corresponding to the information field of "certificate number". Further, in response to executing the attribute information editing operation on each field configuration item, the system may acquire attribute information input by editing, so as to generate a verification rule corresponding to the second certificate type according to attribute information corresponding to all the information fields, and further verify whether content of certificate information corresponding to the certificate picture uploaded by the user terminal accords with the second certificate template corresponding to the second certificate type according to the verification rule.
Accordingly, for the identification algorithm required to identify the certificate picture, the system administrator may configure by triggering an algorithm type configuration item. In the embodiment of the present disclosure, the specific manner of configuring the identification algorithm is not limited, optionally, as shown in fig. 1d, in the case that the system administrator triggers the algorithm type configuration item, a corresponding algorithm type list may be displayed, and optionally, the algorithm type list includes multiple algorithm identifiers indicating different types of identification algorithms. Based on this, the system administrator can select a second algorithm identification from the list of algorithm types that is adapted to the second credential type for a selection operation performed on the algorithm type configuration item. Further, in response to the selection operation performed on the algorithm configuration item, the system may acquire a selected second algorithm identifier, so as to be used for identifying the certificate information of the certificate picture by using a second identification algorithm indicated by the second algorithm identifier in the case that the system receives the certificate picture uploaded by the user terminal and determines that the type of the certificate picture is the second certificate type.
Based on the above, the system administrator, in the case of performing the above configuration operation and determining through the configuration module 101, can generate second template information corresponding to the second certificate type from all the configuration item information. Optionally, a second certificate template corresponding to the second certificate type may be generated according to the multiple information fields, a corresponding relation between the second certificate template and the second algorithm identifier is established, a corresponding relation between each information field and the attribute information is established according to the information field corresponding to each field configuration item and the configured attribute information, further, a second verification rule corresponding to the second certificate template is generated according to the attribute information corresponding to all the information fields, and the second certificate template, the second algorithm identifier and the second verification rule are jointly used as template information corresponding to the second certificate type.
It should be noted that, the specific format corresponding to the generated second check rule is not limited in this embodiment, and may alternatively be any one of a lightweight data exchange format (JavaScript Object Notation, JSON), or an extensible markup language (Extensible Markup Language, XML) format, a lightweight text format (Yet Another Markup Language, YAML), a simple table format data format (common-Separated Values, CSV), and other formats (for example, binary format), which may be flexibly selected according to specific application requirements.
Based on the foregoing, in the case that the system administrator configures corresponding template information for various certificate types, when receiving a certificate picture of a first certificate type uploaded by the user side, the processing module 102 may acquire the corresponding first template information according to the first certificate type, and determine, from the first template information, a first algorithm identifier corresponding to the first algorithm type, where the first algorithm type is an algorithm type corresponding to an identification algorithm specified by the system administrator when configuring the template information of the first certificate type, where the first certificate type is indicated by the first algorithm identifier, and may determine, according to the first algorithm identifier, a first algorithm interface corresponding to the first algorithm identifier. The specific manner of determining the first algorithm interface is not limited, and the determining manner may be different according to the different storage manners of the first algorithm interface. In an alternative way, the application program interface (Application Programming Interface, API) to which the first algorithm interface belongs may be stored locally to the system, in which case the first algorithm interface is determined in such a way that: and loading a prestored application program interface, and determining a first algorithm interface corresponding to the first algorithm identification from the application program interfaces. In another alternative, the application program interface to which the first algorithm interface belongs may be stored on a third party platform, and the system may be in network communication with the third party platform, in which case the first algorithm interface is determined in such a way that: and sending the first algorithm identification to the third party platform to acquire a first algorithm interface provided by the third party platform according to the first algorithm identification.
In any way, determining the first algorithm interface in this embodiment refers to determining an access path of the first algorithm interface. Based on this, when the access path of the first algorithm interface is determined, the first algorithm interface can be accessed according to the access path, and the certificate picture is transferred to the first algorithm interface as an interface parameter, so that the first algorithm interface can be used for identifying the certificate information in the certificate picture.
In the embodiment of the present disclosure, the specific manner of identifying the certificate picture by the first algorithm interface is not limited, and the corresponding first identification algorithm is different according to the different types of the first certificates, so that the manner in which the first algorithm interface performs the first identification algorithm to identify the certificate picture is also different. For example, for the account book, the certificate information contained therein is text, and therefore, only text recognition is required for the document picture of the account book type. Based on the above, in the case that the first certificate type is a plain text type, the first algorithm interface performs the first recognition algorithm to recognize the certificate picture in a plain text recognition manner. For another example, in the case of a passport, since the document information included therein includes not only text but also a document photograph of the user, it is necessary to recognize the text of the passport-type document photograph and also recognize the face of the passport-type document photograph. Based on the above, in the case that the first certificate type is text+photo type, the first algorithm interface performs the first recognition algorithm to recognize the certificate picture in a text recognition+face recognition manner. It should be noted that, regarding the specific type corresponding to each type of recognition algorithm, the embodiment is not limited, and may be determined according to specific requirements, for example, an optical character recognition (Optical Character Recognition, OCR) algorithm may be used to perform text and image recognition on the certificate picture.
Optionally, during the identification process of the document picture, if the identification of the document information corresponding to the document picture is wrong, the processing module 102 may also return the corresponding prompt information to the user side to prompt the user to upload the document picture again. For example, for the certificate type with the validity limit, if the validity period corresponding to the currently uploaded certificate picture is identified to be expired, a prompt message similar to "the certificate is expired" can be prompted to the user side so as to allow the user to upload the certificate picture meeting the validity requirement again. For another example, for each information field in the certificate picture, if it is identified that the certificate template format does not correspond to the corresponding certificate template format, a prompt message similar to "certificate content format error" may be prompted to the user side, so that the user may reproduce the certificate picture with the correct uploading format.
Further, in the case that the identification of the certificate picture passes by using the first algorithm interface, the processing module 102 may further verify each information item and the attribute thereof in the certificate information corresponding to the certificate picture according to the information field and the first verification rule included in the first certificate template, so as to determine whether the certificate information accords with the first certificate template. Optionally, determining the corresponding information field of each information item in the certificate information corresponding to the certificate picture in the first certificate template; further, determining the necessity, type and format of each information field in the first certificate template according to the first rule information; further, determining whether the necessity, type and format of each information item in the certificate information corresponding to the certificate picture are consistent with those of the corresponding information field in the first certificate; if so, determining whether the certificate information corresponding to the certificate picture is consistent with the first certificate template, otherwise, determining that the certificate information is inconsistent with the first certificate template.
For example, the type of the certificate selected when the user uploads the certificate picture is the identity card type, in the certificate template corresponding to the identity card type, the information field of the "certificate number" is a filling item and meets the requirement of a preset format, and if the content of the information item of the "certificate number" identified in the certificate picture uploaded by the user is not matched with the attribute information of the information field corresponding to the "certificate number" in the first verification rule, the certificate information corresponding to the uploaded certificate picture is determined to be inconsistent with the first template.
In an alternative embodiment of the present specification, the plurality of configuration items included in the second configuration page 12 may further include an anti-counterfeit verification identifier (not shown in the drawing) for indicating whether to perform anti-counterfeit verification on the certificate template, where the system administrator configures the anti-counterfeit verification identifier for the certificate template and indicates that anti-counterfeit verification is required, the anti-counterfeit verification may be performed on the certificate picture corresponding to the certificate type. Based on this, when determining that the first template information includes the anti-counterfeit verification identifier, the processing module 102 may further identify the authenticity of the certificate picture by using the anti-counterfeit identification algorithm according to the anti-counterfeit verification identifier corresponding to the first certificate template, and determine whether the certificate picture is subjected to image processing such as synthesis and modification, so as to ensure the authenticity of the identified certificate information.
It should be noted that, regarding the specific type corresponding to the anti-counterfeit identification algorithm, the embodiment is not limited, and may be determined according to specific requirements. Further, for the way of configuring the anti-counterfeit recognition algorithm and the process of verifying the document image by using the anti-counterfeit recognition algorithm, the embodiment is not limited, and the foregoing process of configuring the first recognition algorithm for the first document template and accessing the first recognition algorithm may be referred to, which is not described herein.
Correspondingly, in the process of verifying the certificate information corresponding to the certificate picture according to the first verification rule or the anti-counterfeiting recognition algorithm, if the certificate information is determined to be inconsistent with the first certificate template or the certificate picture is verified to be subjected to image processing, the processing module 102 returns corresponding prompt information to the user side so as to prompt the user to upload the certificate picture with the correct format again. For example, if the content of the information item corresponding to the "certificate number" in the certificate picture uploaded by the user is verified to be not matched with the attribute information of the information field corresponding to the "certificate number" in the first verification rule according to the first verification rule, a prompt message similar to "certificate number format error" is returned to the user side so as to allow the user to upload the certificate picture with the correct format again. For another example, if the anti-counterfeit recognition algorithm is used to recognize that the certificate picture is subjected to image processing, a prompt message similar to "please upload a real certificate picture" is returned to the user side, so that the user can upload the certificate picture which is not subjected to image processing again, and the like.
Based on the above, the identified certificate information and the certificate picture can be stored in a correlated manner under the condition that the certificate picture and the corresponding certificate information are checked. In the embodiment of the present disclosure, the image information is encrypted by default, based on which the certificate image may be encrypted, and then the encrypted certificate image is saved to a designated storage location in the disk, and then the identified certificate information and the storage address corresponding to the designated storage location are stored in association. Optionally, the image information stored in the magnetic disk after encryption processing is a binary file, and the encryption algorithm used in the encryption processing is not limited in the embodiment of the present invention, so long as the algorithm capable of encrypting the time image is applicable to the embodiment, the specific algorithm type can be determined according to the actual requirement.
Further alternatively, for a plurality of information fields in the certificate template, the system administrator may set one or more of the information fields as specified information fields when performing the configuration operation, wherein an attribute message set as the specified information fields includes an encryption attribute (not shown in the drawing) for indicating whether or not to perform encryption processing on the specified information fields. Based on this, when determining that the plurality of information fields of the first certificate template include the specified information field and the corresponding encryption attribute indicates that encryption is required, when performing association storage on the certificate picture uploaded by the user and the corresponding certificate information thereof, the processing module 102 may further perform encryption processing on the information item corresponding to the specified information field of the first certificate template in the certificate information according to the preset encryption algorithm and the specified information field of the first certificate template, and further, when storing the picture in the specified storage position in the disk, perform association storage on the encrypted certificate information and the storage address corresponding to the specified storage position.
It should be noted that the embodiment of the present disclosure is not limited to the specific type of the specified information field in each certificate template, and alternatively, may be a certificate number capable of uniquely identifying the certificate information, for example, a student certificate number, a graduation certificate number, and the like, and may also be other information related to the privacy of the user, for example, a birth address, an address of a real estate, a user name, a birth date, and the like, which may be specifically determined according to practical application requirements.
Accordingly, the specific type of the preset encryption algorithm is not limited, and the preset encryption algorithm used for encrypting the specified information fields of different types may be the same or different and may be determined according to specific requirements. Furthermore, the setting mode of the preset encryption algorithm is not limited, the preset encryption algorithm can be directly preset in the system, the corresponding preset encryption algorithm can be configured for each certificate template in a configuration mode, and the process of configuring the first recognition algorithm and accessing the first recognition algorithm for the first certificate template can be referred to for the configuration mode and the process of encrypting the information item in the certificate picture by using the preset encryption algorithm, which are not described herein.
In addition to the configuration module 101 and the processing module 102, as shown in fig. 1e, the identity information management system provided in the embodiment of the present disclosure may further include a query module 103, configured to receive a query request sent by a user terminal for credential information, where the query request includes index dimension information and/or analysis dimension information. In this embodiment, the search dimension information includes at least one information field in the certificate information to be queried, based on which, in the case that the search dimension information is included in the query request, the query module 103 may determine a corresponding search field in the certificate information according to the index dimension information, and query the corresponding certificate information according to the search field. Accordingly, the analysis dimension information includes at least one column identifier in the analysis report corresponding to the credential information, wherein the at least one column identifier of the analysis report corresponds to at least one information field in the credential information. Based on this, in the case that the analysis dimension information is included in the query request, the query module 103 may determine a corresponding analysis field in the certificate information according to the analysis dimension information, and query an analysis report corresponding to the certificate information according to the analysis field. Furthermore, the query module 103 may provide the queried certificate information and/or analysis report to the user side for subsequent processing by the user side.
Based on the foregoing, for each document template, the configuration module 101 is further configured to configure an index field corresponding to the document template from a different index dimension and/or configure an analysis field corresponding to the document template from a different analysis dimension. In this embodiment, the specific manner of configuring the index field and the analysis field is not limited, and taking the second certificate template as an example, in an optional manner, when a system administrator performs the configuration operation, the index field and/or the analysis field corresponding to the second certificate template may be directly set by editing the attribute information of the information field according to the manner of configuring the specified information field in the foregoing embodiment, and the specific process is not repeated. In another alternative, the plurality of configuration items included in the second configuration page 12 may further include an index dimension configuration item and an analysis dimension configuration item (not shown in the drawing), based on which, when performing the configuration operation, the system administrator may perform a selection operation on the index dimension configuration item and/or the analysis dimension configuration item corresponding to the second certificate template to configure the index field and/or the analysis field corresponding to the second certificate template.
Further optionally, the processing module 102 may present a list of information fields corresponding to the second certificate template for the system administrator to select at least one information field from in response to the selection of the index dimension configuration item, and may use the selected at least one information field as the index field corresponding to the second certificate template in response to the selection of the at least one information field. Accordingly, in a manner that the analysis field is configured for the analysis dimension configuration item to perform the selection operation, the processing module 102 may present a list of information fields corresponding to the second certificate template for the system administrator to select at least one information field therefrom in response to the selection of the analysis dimension configuration item, and may use the selected at least one information field as the analysis field corresponding to the second certificate template in response to the selection of the at least one information field.
Based on this, when the processing module 102 receives the certificate picture uploaded by the user side and determines that the corresponding first certificate template includes the index field and/or the analysis field, if the identification and verification are performed and passed in the manner in the foregoing embodiment, and the certificate picture and the corresponding certificate information are associated and stored, the index information item of the corresponding index field in the certificate information may be determined according to the index field in the first certificate template, so as to establish the inverted index correspondence between the index information item and the certificate information dictionary, so as to be used for querying the certificate information according to the index field later. And/or determining analysis information items corresponding to analysis fields in the certificate information according to the analysis fields in the first certificate model, and further generating a corresponding analysis report according to the analysis information items, so as to obtain the analysis report corresponding to the certificate information according to the analysis fields, and analyzing the certificate information from different dimensions, wherein the analysis information items are column identifiers in the analysis report.
It should be noted that, the index field and the analysis field in this embodiment may be the specific information field in the above example, or may not be the specific information field, which is not limited herein, and the specific page style of configuring the specific information field and its attribute information, configuring the index field and the analysis field may refer to the page style and the configuration process of fig. 1b to 1d, and are not illustrated.
It should be further noted that the page style and the configuration process in fig. 1 b-1 d are only exemplary, and are not limited to this in practical application, and any specific page style and configuration process of the configuration module 101 may be suitable for the present specification as long as the functions corresponding to one or more embodiments of the present specification can be implemented, and may be specifically and flexibly adjusted according to the actual use requirement.
In one or more embodiments of the present disclosure, the specific time for creating the inverted index and generating the analysis report is not limited, and the process for creating the inverted index and generating the analysis report may be triggered during the process of saving the certificate information and the certificate picture, or the process for creating the inverted index and generating the analysis report may be triggered according to specific requirements after saving the certificate information and the certificate picture. For example, a timing trigger mechanism can be adopted to periodically establish an inverted index corresponding to the certificate information and generate an analysis report. For the flow of generating the analysis report, the flow of generating the analysis report can also be triggered when the system server receives the query request, and the flow can be specifically determined according to actual requirements.
It should be further noted that, in one or more embodiments of the present disclosure, the specific content of the certificate information retrieved according to the retrieval field and the specific content of the analysis report generated according to the analysis field are not limited, and the content of the two may be determined according to the requirement corresponding to the actual usage scenario, which is not described in detail herein.
Based on the above system structure and the functions of each module, the overall workflow of the identity information management system provided in the embodiment of the present specification will be exemplarily described below with reference to the accompanying drawings.
Fig. 2 is a schematic diagram corresponding to an interaction process between a user side and an identity information management system provided in this embodiment of the present disclosure, as shown in fig. 2 (1), before the system is put into use, a system administrator may configure corresponding template information for different certificate types in a configuration module of the system according to specific application requirements. In this example, it is assumed that the system administrator packages the certificate templates, the algorithm types, the verification rules, the specified information fields, the index fields, and the analysis fields in the template information configured for each certificate type. Based on this, in a case where the user is required to provide credential information to the system server, as shown in (2) of fig. 2, the user can upload a credential picture at the user side and specify a first credential type to which the credential picture corresponds.
Further, as shown in (3) and (4) in fig. 2, when the system server receives the certificate picture uploaded by the user side, the system server may acquire first template information corresponding to the first certificate type from a plurality of template information configured in advance by the system administrator, determine a corresponding first recognition algorithm according to the first algorithm type in the first template information, and recognize the certificate picture uploaded by the user side by using the first recognition algorithm to determine whether the certificate information corresponding to the certificate picture is correct. Based on this, if it is recognized that there is an error message in the certificate information corresponding to the certificate picture, as shown in (5) in fig. 2, the system server may send a prompt message to the user terminal to prompt the user to re-upload the certificate picture with correct content.
Further, in the case that the identification of the certificate picture passes, as shown in (6) in fig. 2, the system server may further perform format verification on the certificate information according to the verification rule in the first template information, so as to determine whether the format of the certificate information matches with the first certificate template in the first certificate information. Accordingly, if it is verified that the format of the certificate information does not match the first certificate template, as shown in (7) in fig. 2, the system server may send a prompt message to the user end to prompt the user to re-upload the certificate picture with the correct format. Further, in the case that the verification passes, as shown in (8) in fig. 2, the system server may further encrypt the certificate picture, store the encrypted certificate picture in the disk, determine a designated information field configured by the system administrator for the first certificate template according to the first template information, encrypt an information item corresponding to the designated information field in the certificate information, and store the certificate information after the identification, verification, and encryption in association with a storage address of the certificate picture.
Optionally, when the system server stores the certificate information and the certificate picture, as shown in (9) in fig. 2, an index information field configured by the system administrator for the first certificate template may be further determined according to the first template information, so as to determine an index information item corresponding to the index information field in the certificate information, and further establish an inverted index correspondence between the index information item and the certificate information dictionary, so as to be used for retrieving the certificate information from different dimensions. Accordingly, as shown in fig. 2, the system server may further determine, according to the first template information, an analysis information field configured by the system administrator for the first certificate template, so as to determine an analysis information item corresponding to the analysis information field in the certificate information, and further generate an analysis report corresponding to the certificate information according to the analysis information item, so as to be used for analyzing the certificate information from different dimensions, where the analysis information item is a column identifier in the analysis report.
Based on this, as in FIG. 2As shown, in the case of a request for credential information retrieval or analysis, a query may be sent to the system serverRequest, and specify retrieve dimension information or analyze dimension information in the query request. Further, as in FIG. 2 +.>The system server can inquire the certificate information according to the index dimension information indicated in the request information or inquire the corresponding analysis report according to the analysis dimension information indicated in the request information, and returns the inquired certificate information or analysis report to the request end so that the request end can view the certificate information from different dimensions.
It should be noted that, the request end in this example may be a user terminal, or may be another functional module of the system, or another third party platform, which is not limited herein.
The identity information management system provided by one or more embodiments of the present disclosure configures corresponding template information for each document type in advance, where the template information includes at least a document template corresponding to each document type and an algorithm type and a verification rule required for identifying the document information corresponding to each document type. Based on the above, when the system receives the certificate picture uploaded by the user side, the system can acquire the corresponding template information from the preset template information according to the type of the certificate picture, and based on the acquired algorithm type and the verification rule, identify and verify the certificate picture uploaded by the user side, and further determine whether the certificate information corresponding to the certificate picture uploaded by the user side accords with the corresponding certificate template or not, so as to inform the user to upload the correct certificate picture again under the condition of determining the discrepancy. By the method, for the use scene of adding the new certificate types, unified processing of the certificate information corresponding to different certificate types can be realized only by executing simple configuration operation by a system administrator, and targeted coding operation is not needed, so that development workload is reduced, and work efficiency is improved.
Moreover, the identity information management system provided by one or more embodiments of the present specification is further provided with a search dimension, and a system administrator can specify a search field corresponding to the search dimension for each certificate type. Based on this, the system can build an inverted index for the search field corresponding to each type of credential information, and when a request for querying the credential information according to the search field is received, the credential information can be retrieved from the corresponding dimension. Accordingly, the identity information management system provided in one or more embodiments of the present disclosure further provides a configuration function of an analysis dimension, and a system administrator may specify an analysis field corresponding to the analysis dimension for each certificate type. Based on the analysis report can be generated by the system from the dimension corresponding to the analysis field aiming at each certificate information, and when a request for inquiring the analysis report according to the analysis field is received, the corresponding analysis report can be inquired from the corresponding dimension for use by a request terminal. In this way, credential information can be obtained from different dimensions to provide job support upstream and downstream of the system.
Based on the system structure and the functions, the embodiment of the present disclosure further provides an identity information processing method, and fig. 3 is a flowchart of the identity information processing method provided in the embodiment of the present disclosure, where, as shown in fig. 3, the method includes:
S102, receiving a certificate picture uploaded by a user side, and determining a first certificate type corresponding to the certificate picture;
s104, acquiring first template information from a plurality of preset template information, wherein the first template information comprises a first certificate template corresponding to a first certificate type, and a first check rule and a first algorithm type corresponding to the first certificate template;
s106, identifying the certificate information in the certificate picture by using a first identification algorithm corresponding to the first algorithm type;
s108, checking whether the certificate information accords with the first certificate template according to the first check rule;
and S110, under the condition that the certificate information accords with the first certificate template, storing the certificate information and the certificate picture in an associated mode.
In a possible implementation manner, before receiving the certificate picture uploaded by the user side, the method further comprises the step of setting second template information; the second template information is any one of a plurality of template information; wherein configuring the second template information includes: acquiring a selected second certificate type in response to a selection operation from the plurality of certificate types, the second certificate type being any one of the plurality of certificate types; displaying a configuration page corresponding to the second certificate type, wherein the configuration page comprises a plurality of configuration items; responding to the editing operation of each configuration item, and acquiring configuration item information input by editing; and generating second template information corresponding to the second certificate type according to all the configuration item information.
In a possible implementation manner, the plurality of configuration items include an algorithm type configuration item and a plurality of field configuration items, each field configuration item is used for configuring one information field and corresponding attribute information in the certificate template, wherein the attribute information includes the necessity, type and format of each information field; responding to the editing operation of each configuration item, acquiring configuration item information input by editing, wherein the configuration item information comprises: responding to a selection operation executed on each field configuration item, and acquiring a plurality of information fields corresponding to the selected field configuration items; acquiring attribute information of editing input in response to an editing operation performed on the selected plurality of field configuration items; in response to a selection operation performed on the algorithm type configuration item, a selected second algorithm identification is obtained, the second algorithm identification being indicative of a second recognition algorithm.
In a possible implementation manner, generating second template information corresponding to the second certificate type according to all the configuration item information includes: generating a second certificate template corresponding to the second certificate type according to the plurality of information fields; establishing a corresponding relation between the second certificate template and the second algorithm identifier; establishing a corresponding relation between each information field and the attribute information according to the information field corresponding to each field configuration item and the configured attribute information; and generating a second check rule corresponding to the second certificate template according to the attribute information corresponding to all the information fields.
In a possible implementation, the plurality of configuration items further includes an index dimension configuration item, and the method further includes: and responding to the selection operation executed on the index dimension configuration item, and acquiring at least one information field selected from the plurality of information fields as an index field corresponding to the second certificate template.
In a possible implementation, the plurality of configuration items further includes analyzing the dimension configuration items, and the method further includes: and responding to the selection operation executed by the analysis dimension configuration item, and acquiring at least one information field selected from the plurality of information fields as an analysis field corresponding to the second certificate template.
In a possible implementation manner, identifying the certificate information in the certificate picture by using a first identification algorithm corresponding to the first algorithm type includes: determining a corresponding first algorithm identification according to the first algorithm type; determining a first algorithm interface corresponding to the first algorithm identifier, wherein the first algorithm interface is used for executing a first identification algorithm indicated by the first algorithm identifier; the certificate picture is used as an interface parameter and a first algorithm interface is accessed for executing a first identification algorithm to identify certificate information in the certificate picture.
In a possible implementation manner, determining a first algorithm interface corresponding to the first algorithm identifier includes: and loading a prestored application program interface, and determining a first algorithm interface corresponding to the first algorithm identification from the application program interfaces.
In a possible implementation manner, determining a first algorithm interface corresponding to the first algorithm identifier includes: and sending the first algorithm identification to the third party platform to acquire a first algorithm interface provided by the third party platform according to the first algorithm identification.
In one possible implementation, verifying whether the credential information matches the first credential template according to a first verification rule includes: and according to the information field and the first verification rule contained in the first certificate template, verifying each information item and the attribute thereof in the certificate information to determine whether the certificate information accords with the first certificate template.
In a possible implementation manner, the plurality of configuration items further comprise an anti-counterfeiting verification identifier for indicating whether to perform anti-counterfeiting verification on the certificate template; in the case that the first template information includes the anti-counterfeit verification mark, the method further includes: and according to the anti-counterfeiting verification mark, under the condition that the anti-counterfeiting verification is required, the authenticity of the certificate picture is identified by utilizing an anti-counterfeiting identification algorithm.
In a possible implementation manner, in a case that a certificate information error is identified according to any one of the first identification algorithm, the first verification rule or the anti-counterfeiting identification algorithm, the method further includes: and returning prompt information to the user side so as to prompt the user to re-upload the certificate picture with the correct format.
In a possible implementation manner, the association storage of the certificate information and the certificate picture includes: encrypting the certificate picture, and storing the encrypted certificate picture to a designated storage position in a magnetic disk; and carrying out association storage on the certificate information and the storage address corresponding to the designated storage position.
In a possible implementation manner, the multiple information fields of the second certificate template further include a designated information field, and an encryption attribute corresponding to the designated information field is used for indicating whether encryption processing is performed on the designated information field; under the condition that the encryption attribute corresponding to the appointed information field of the first certificate template indicates that encryption is needed, carrying out associated storage on the certificate information and the storage address corresponding to the appointed storage position, wherein the method comprises the following steps: according to a preset encryption algorithm and a specified information field of the first certificate template, encrypting an information item corresponding to the specified information field of the first certificate template in the certificate information; and carrying out association storage on the encrypted certificate information and a storage address corresponding to the appointed storage position.
In a possible implementation manner, the method further includes: determining index information items corresponding to the index fields in the certificate information according to the index fields in the first certificate template; and establishing an inverted index corresponding relation between the index information item and the certificate information dictionary for inquiring the certificate information from different dimensions.
In a possible implementation manner, the method further includes: determining analysis information items corresponding to analysis fields in the certificate information according to the analysis fields in the first certificate model; and generating an analysis report corresponding to the certificate information according to the analysis information item, so as to be used for analyzing the certificate information from different dimensions.
Referring to fig. 4a, fig. 4a is a schematic structural diagram of an identity information processing device according to one or more embodiments of the present disclosure, where, as shown in fig. 4a, the device includes: a receiving module 401, an acquiring module 402, an identifying module 403, a checking module 404 and a storing module 405; wherein:
the receiving module 401 is configured to receive a certificate picture uploaded by a user side, and determine a first certificate type corresponding to the certificate picture;
the obtaining module 402 is configured to obtain first template information from a plurality of types of template information configured in advance, where the first template information includes a first certificate template corresponding to a first certificate type, and a first verification rule and a first algorithm type corresponding to the first certificate template;
the identification module 403 is configured to identify the certificate information in the certificate picture by using a first identification algorithm corresponding to the first algorithm type;
the verification module 404 is configured to verify whether the certificate information matches the first certificate template according to the first verification rule;
The storage module 405 is configured to store the certificate information and the certificate picture in association in a case where the certificate information matches the first certificate template.
Fig. 4b is a schematic structural diagram of another identity information processing apparatus according to one or more embodiments of the present disclosure, where, as shown in fig. 4b, the apparatus further includes a configuration module 406, and in one possible implementation, before the receiving module 401 receives the certificate picture uploaded by the user side, the configuration module 406 is further configured to set second template information; wherein the second template information is any one of a plurality of template information; wherein, when configuring the second template information, the configuration module 406 is configured to: acquiring a selected second certificate type in response to a selection operation from the plurality of certificate types, the second certificate type being any one of the plurality of certificate types; displaying a configuration page corresponding to the second certificate type, wherein the configuration page comprises a plurality of configuration items; responding to the editing operation of each configuration item, and acquiring configuration item information input by editing; and generating second template information corresponding to the second certificate type according to all the configuration item information.
In a possible implementation manner, the plurality of configuration items include an algorithm type configuration item and a plurality of field configuration items, each field configuration item is used for configuring one information field and corresponding attribute information in the certificate template, wherein the attribute information includes the necessity, type and format of each information field; the configuration module 406, when acquiring configuration item information input by editing in response to an editing operation for each configuration item, is configured to: responding to a selection operation executed on each field configuration item, and acquiring a plurality of information fields corresponding to the selected field configuration items; acquiring attribute information of editing input in response to an editing operation performed on the selected plurality of field configuration items; in response to a selection operation performed on the algorithm type configuration item, a selected second algorithm identification is obtained, the second algorithm identification being indicative of a second recognition algorithm.
In a possible implementation manner, the configuration module 406 is configured to, when generating the second template information corresponding to the second certificate type according to all the configuration item information: generating a second certificate template corresponding to the second certificate type according to the plurality of information fields; establishing a corresponding relation between the second certificate template and the second algorithm identifier; establishing a corresponding relation between each information field and the attribute information according to the information field corresponding to each field configuration item and the configured attribute information; and generating a second check rule corresponding to the second certificate template according to the attribute information corresponding to all the information fields.
In a possible implementation, the plurality of configuration items further includes an index dimension configuration item, and the configuration module 406 is further configured to: and responding to the selection operation executed on the index dimension configuration item, and acquiring at least one information field selected from the plurality of information fields as an index field corresponding to the second certificate template.
In a possible implementation, the plurality of configuration items further includes an analysis dimension configuration item, and the configuration module 406 is further configured to: and responding to the selection operation executed by the analysis dimension configuration item, and acquiring at least one information field selected from the plurality of information fields as an analysis field corresponding to the second certificate template.
In a possible implementation manner, the identification module 403 is configured to, when identifying the certificate information in the certificate picture by using a first identification algorithm corresponding to the first algorithm type: determining a corresponding first algorithm identification according to the first algorithm type; determining a first algorithm interface corresponding to the first algorithm identifier, wherein the first algorithm interface is used for executing a first identification algorithm indicated by the first algorithm identifier; the certificate picture is used as an interface parameter and a first algorithm interface is accessed for executing a first identification algorithm to identify certificate information in the certificate picture.
In a possible implementation manner, the identification module 403 is configured, when determining the first algorithm interface corresponding to the first algorithm identifier, to: and loading a prestored application program interface, and determining a first algorithm interface corresponding to the first algorithm identification from the application program interfaces.
In a possible implementation manner, the identification module 403 is configured, when determining the first algorithm interface corresponding to the first algorithm identifier, to: and sending the first algorithm identification to the third party platform to acquire a first algorithm interface provided by the third party platform according to the first algorithm identification.
In one possible implementation, the verification module 404 is configured to, when verifying, according to the first verification rule, whether the credential information matches the first credential template: and according to the information field and the first verification rule contained in the first certificate template, verifying each information item and the attribute thereof in the certificate information to determine whether the certificate information accords with the first certificate template.
In a possible implementation manner, the plurality of configuration items further comprise an anti-counterfeiting verification identifier for indicating whether to perform anti-counterfeiting verification on the certificate template; in the case that the first template information includes the anti-counterfeit verification mark, the verification module 404 is further configured to: and according to the anti-counterfeiting verification mark, under the condition that the anti-counterfeiting verification is required, the authenticity of the certificate picture is identified by utilizing an anti-counterfeiting identification algorithm.
Fig. 4c is a schematic structural diagram of another identity information processing apparatus according to one or more embodiments of the present disclosure, where, as shown in fig. 4c, the apparatus further includes an output module 407, and in a possible implementation manner, in a case that a certificate information error is identified according to any one of the first identification algorithm, the first verification rule, or the anti-counterfeit identification algorithm, the output module 407 is further configured to: and returning prompt information to the user side so as to prompt the user to re-upload the certificate picture with the correct format.
In a possible implementation manner, the storage module 405 is configured to, when storing the certificate information and the certificate picture in association with each other: encrypting the certificate picture, and storing the encrypted certificate picture to a designated storage position in a magnetic disk; and carrying out association storage on the certificate information and the storage address corresponding to the designated storage position.
In a possible implementation manner, the multiple information fields of the second certificate template further include a designated information field, and an encryption attribute corresponding to the designated information field is used for indicating whether encryption processing is performed on the designated information field; in the case where the encryption attribute corresponding to the specified information field of the first certificate template indicates that encryption is required, the storage module 405 is configured to, when storing the certificate information in association with the storage address corresponding to the specified storage location: according to a preset encryption algorithm and a specified information field of the first certificate template, encrypting an information item corresponding to the specified information field of the first certificate template in the certificate information; and carrying out association storage on the encrypted certificate information and a storage address corresponding to the appointed storage position.
In a possible implementation, the storage module 405 is further configured to: determining index information items corresponding to the index fields in the certificate information according to the index fields in the first certificate template; and establishing an inverted index corresponding relation between the index information item and the certificate information dictionary for inquiring the certificate information from different dimensions.
In a possible implementation, the storage module 405 is further configured to: determining analysis information items corresponding to analysis fields in the certificate information according to the analysis fields in the first certificate model; and generating an analysis report corresponding to the certificate information according to the analysis information item, so as to be used for analyzing the certificate information from different dimensions.
Referring to fig. 5, fig. 5 is a block diagram of an electronic device according to one or more embodiments of the present disclosure. As shown in fig. 5, the electronic device 500 may include a processor 501 and a memory 502; memory 502 may be coupled to processor 501. Notably, this fig. 5 is exemplary; other types of structures may also be used in addition to or in place of the structures to implement telecommunications functions or other functions.
In a possible implementation, the functionality of the identity information processing means 400 may be integrated into the processor 501. Wherein the processor 501 may be configured to:
receiving a certificate picture uploaded by a user side, and determining a first certificate type corresponding to the certificate picture;
acquiring first template information from a plurality of preset template information, wherein the first template information comprises a first certificate template corresponding to a first certificate type, and a first check rule and a first algorithm type corresponding to the first certificate template;
identifying certificate information in the certificate picture by using a first identification algorithm corresponding to the first algorithm type;
checking whether the certificate information accords with the first certificate template according to a first check rule;
And under the condition that the certificate information accords with the first certificate template, storing the certificate information and the certificate picture in an associated mode.
In another possible implementation, the identity information processing apparatus 400 may be configured separately from the processor 501, for example, the identity information processing apparatus 400 may be configured as a chip connected to the processor 501, and the identity information processing is implemented by control of the processor 501.
Furthermore, in some alternative implementations, the electronic device 500 may further include: communication module, input unit, audio processor, display, power etc.. It is noted that the electronic device 500 need not include all of the components shown in fig. 5; in addition, the electronic device 500 may further include components not shown in fig. 5, to which reference is made to the prior art.
In some alternative implementations, the processor 501, also sometimes referred to as a controller or operational control, may include a microprocessor or other processor device and/or logic device, with the processor 501 receiving inputs and controlling the operation of the various components of the electronic device 500.
The memory 502 may be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information related to the identity information processing apparatus 400 described above may be stored, and a program for executing the related information may be stored. And the processor 501 can execute the program stored in the memory 502 to realize information storage or processing, etc.
The input unit may provide input to the processor 501. The input unit is for example a key or a touch input device. The power source may be used to provide power to the electronic device 500. The display can be used for displaying display objects such as images and characters. The display may be, for example, but not limited to, an LCD display.
The memory 502 may be a solid state memory such as Read Only Memory (ROM), random Access Memory (RAM), SIM card, and the like. But also a memory which holds information even when powered down, can be selectively erased and provided with further data, an example of which is sometimes referred to as EPROM or the like. Memory 502 may also be some other type of device. Memory 502 includes a buffer memory (sometimes referred to as a buffer). The memory 502 may include an application/function storage for storing application programs and function programs or a flow chart for executing operations of the electronic device 500 by the processor 501.
Memory 502 may also include a data store for storing data, such as contacts, digital data, pictures, sounds, and/or any other data used by an electronic device. The driver store of memory 502 may include various drivers for the computer device for communication functions and/or for performing other functions of the computer device (e.g., messaging applications, address book applications, etc.).
The communication module is a transmitter/receiver that transmits and receives signals via an antenna. A communication module (transmitter/receiver) is coupled to the processor 501 to provide input signals and receive output signals, as may be the case with conventional mobile communication terminals.
Based on different communication technologies, a plurality of communication modules, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, etc., may be provided in the same computer device. The communication module (transmitter/receiver) is also coupled to the speaker and microphone via the audio processor to provide audio output via the speaker and to receive audio input from the microphone to implement the usual telecommunications functions. The audio processor may include any suitable buffers, decoders, amplifiers and so forth. In addition, an audio processor is coupled to the processor 501 such that sound can be recorded locally through a microphone and sound stored locally can be played through a speaker.
One or more embodiments of the present specification further provide a computer-readable storage medium capable of implementing all steps in the identity information processing method in the above embodiments, the computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements all steps in the identity information processing method in the above embodiments, for example, the processor implements the following steps when executing the computer program:
Receiving a certificate picture uploaded by a user side, and determining a first certificate type corresponding to the certificate picture;
acquiring first template information from a plurality of preset template information, wherein the first template information comprises a first certificate template corresponding to a first certificate type, and a first check rule and a first algorithm type corresponding to the first certificate template;
identifying certificate information in the certificate picture by using a first identification algorithm corresponding to the first algorithm type;
checking whether the certificate information accords with the first certificate template according to a first check rule;
and under the condition that the certificate information accords with the first certificate template, storing the certificate information and the certificate picture in an associated mode. Although one or more embodiments of the present description provide method operational steps as described in the embodiments or flowcharts, more or fewer operational steps may be included based on conventional or non-inventive labor. The order of steps recited in the embodiments is merely one way of performing the order of steps and does not represent a unique order of execution. When implemented by an actual device or client product, the instructions may be executed sequentially or in parallel (e.g., in a parallel processor or multi-threaded processing environment) as shown in the embodiments or figures.
It will be appreciated by those skilled in the art that embodiments of the present description may be provided as a method, apparatus (system) or computer program product. Accordingly, the present specification embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Moreover, one or more embodiments of the present description can take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
One or more embodiments of the present specification are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to one or more embodiments of the specification. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for apparatus and system embodiments, the description is relatively simple, as it is substantially similar to method embodiments, with reference to the description of method embodiments in part.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. The specific meaning of the terms in one or more embodiments of the present specification may be understood by those of ordinary skill in the art in view of the specific circumstances.
It should be noted that, without conflict, one or more embodiments and features of the embodiments may be combined with each other. The one or more embodiments of the present specification are not limited to any single aspect, nor to any single embodiment, nor to any combination and/or permutation of these aspects and/or embodiments. Moreover, each aspect and/or embodiment of one or more embodiments of the present description may be utilized alone or in combination with one or more other aspects and/or embodiments.
Finally, it should be noted that: the above embodiments are merely for illustrating the technical solution of one or more embodiments of the present disclosure, and are not limiting thereof; while one or more embodiments of the present disclosure have been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will appreciate that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the corresponding embodiments from the scope of the one or more embodiments of the present disclosure, which are intended to be covered by the claims and the scope of the present disclosure.
The foregoing description of one or more embodiments of the present specification has been presented in conjunction with alternative embodiments, but such embodiments are merely exemplary and serve only as illustrations. On the basis of the above, various substitutions and improvements can be made on one or more embodiments of the present specification, and all of them fall within the protection scope of one or more embodiments of the present specification.

Claims (23)

1. An identity information processing method, comprising:
Receiving a certificate picture uploaded by a user side, and determining a first certificate type corresponding to the certificate picture;
acquiring first template information from a plurality of preset template information, wherein the first template information comprises a first certificate template corresponding to the first certificate type, and a first check rule and a first algorithm type corresponding to the first certificate template;
identifying the certificate information in the certificate picture by using a first identification algorithm corresponding to the first algorithm type;
checking whether the certificate information accords with the first certificate template according to the first checking rule; and
and under the condition that the certificate information accords with the first certificate template, storing the certificate information and the certificate picture in an associated mode.
2. The method of claim 1, further comprising, prior to receiving the certificate picture uploaded by the user terminal: configuring second template information; the second template information is any one of the plurality of template information;
the configuring the second template information includes:
in response to a selection operation from among a plurality of credential types, obtaining a selected second credential type, the second credential type being any of the plurality of credential types;
Displaying a configuration page corresponding to the second certificate type, wherein the configuration page comprises a plurality of configuration items;
responding to the editing operation of each configuration item, and acquiring configuration item information input by editing;
and generating second template information corresponding to the second certificate type according to all the configuration item information.
3. The method of claim 2, wherein the plurality of configuration items includes an algorithm type configuration item and a plurality of field configuration items, each field configuration item for configuring one information field in the credential template and its corresponding attribute information, the attribute information including a necessity, a type, and a format of each information field;
responding to the editing operation of each configuration item, acquiring configuration item information input by editing, wherein the configuration item information comprises:
responding to a selection operation executed on each field configuration item, and acquiring a plurality of information fields corresponding to the selected field configuration items;
acquiring attribute information of editing input in response to an editing operation performed on the selected plurality of field configuration items;
in response to a selection operation performed on the algorithm type configuration item, a selected second algorithm identification is obtained, the second algorithm identification being indicative of a second recognition algorithm.
4. A method according to claim 3, wherein generating second template information corresponding to the second document type from all configuration item information comprises:
generating a second certificate template corresponding to the second certificate type according to the information fields;
establishing a corresponding relation between the second certificate template and the second algorithm identifier;
establishing a corresponding relation between each information field and the attribute information according to the information field corresponding to each field configuration item and the configured attribute information; and
and generating a second check rule corresponding to the second certificate template according to the attribute information corresponding to all the information fields.
5. The method of claim 4, wherein the plurality of configuration items further comprises an index dimension configuration item, the method further comprising:
and responding to the selection operation executed on the index dimension configuration item, and acquiring at least one information field selected from the plurality of information fields as an index field corresponding to the second certificate template.
6. The method of claim 5, wherein the plurality of configuration items further comprises an analysis dimension configuration item, the method further comprising:
And responding to the selection operation executed on the analysis dimension configuration item, and acquiring at least one information field selected from the plurality of information fields as an analysis field corresponding to the second certificate template.
7. The method of claim 6, wherein identifying the credential information in the credential picture using a first identification algorithm corresponding to the first algorithm type comprises:
determining a corresponding first algorithm identifier according to the first algorithm type;
determining a first algorithm interface corresponding to the first algorithm identifier, wherein the first algorithm interface is used for executing a first identification algorithm indicated by the first algorithm identifier;
and taking the certificate picture as an interface parameter and accessing the first algorithm interface to be used for executing the first identification algorithm to identify the certificate information in the certificate picture.
8. The method of claim 7, wherein determining a first algorithm interface corresponding to the first algorithm identification comprises:
and loading a prestored application program interface, and determining a first algorithm interface corresponding to the first algorithm identifier from the application program interfaces.
9. The method of claim 7, wherein determining a first algorithm interface corresponding to the first algorithm identification comprises:
And sending the first algorithm identification to a third party platform to obtain a first algorithm interface provided by the third party platform according to the first algorithm identification.
10. The method of claim 8 or 9, wherein verifying that the credential information matches the first credential template according to the first verification rule comprises:
and according to the information fields contained in the first certificate template and the first verification rule, verifying each information item and the attribute thereof in the certificate information to determine whether the certificate information accords with the first certificate template.
11. The method of claim 10, wherein the plurality of configuration items further comprise a tamper-proof verification indicator for indicating whether the document template is tamper-proof verified;
in the case that the first template information includes the anti-counterfeit verification mark, the method further includes:
and according to the anti-counterfeiting verification mark, under the condition that the anti-counterfeiting verification is required, the authenticity of the certificate picture is identified by utilizing an anti-counterfeiting identification algorithm.
12. The method of claim 11, wherein in the event that the credential information is identified as erroneous in accordance with any of the first identification algorithm, the first verification rule, or the anti-counterfeit identification algorithm, the method further comprises:
And returning prompt information to the user side so as to prompt the user to re-upload the certificate picture with the correct format.
13. The method of claim 12, wherein storing the credential information in association with the credential picture comprises:
encrypting the certificate picture, and storing the encrypted certificate picture to a designated storage position in a magnetic disk;
and carrying out association storage on the certificate information and the storage address corresponding to the appointed storage position.
14. The method of claim 13, wherein the plurality of information fields of the second certificate template further includes a specified information field, and an encryption attribute corresponding to the specified information field is used to indicate whether to encrypt the specified information field;
and under the condition that the encryption attribute corresponding to the appointed information field of the first certificate template indicates that encryption is needed, performing associated storage on the certificate information and a storage address corresponding to the appointed storage position, wherein the method comprises the following steps:
according to a preset encryption algorithm and the appointed information field of the first certificate template, encrypting an information item corresponding to the appointed information field of the first certificate template in the certificate information;
And carrying out association storage on the encrypted certificate information and the storage address corresponding to the appointed storage position.
15. The method as recited in claim 14, further comprising:
determining index information items corresponding to the index fields in the certificate information according to the index fields in the first certificate template;
and establishing an inverted index corresponding relation between the index information item and the certificate information dictionary, so as to be used for inquiring the certificate information from different dimensions.
16. The method as recited in claim 15, further comprising:
determining analysis information items corresponding to the analysis fields in the certificate information according to the analysis fields in the first certificate model;
and generating an analysis report corresponding to the certificate information according to the analysis information item, so as to analyze the certificate information from different dimensions.
17. An identity information management system, comprising:
the configuration module is used for configuring template information corresponding to different certificate types, wherein the template information comprises a certificate template corresponding to each certificate type, a verification rule corresponding to the certificate template and an algorithm type; the verification rule is generated according to attribute information of a plurality of information fields in the certificate template, and the algorithm type is represented by a corresponding algorithm identifier;
The processing module is used for receiving the certificate picture uploaded by the user side and determining a corresponding first certificate type; acquiring first template information corresponding to the first certificate type from a plurality of preset template information, and determining a first certificate template included in the first template information and a first verification rule and a first algorithm type corresponding to the first certificate template; identifying the certificate information in the certificate picture by using a first identification algorithm corresponding to the first algorithm type; checking whether the certificate information accords with the first certificate template according to the first check rule; and under the condition that the certificate information and the certificate picture are determined to be matched, carrying out association storage.
18. The system of claim 17, wherein the configuration module is further configured to configure the index field corresponding to the credential template from different index dimensions and/or configure the analysis field corresponding to the credential template from different analysis dimensions.
19. The system of claim 18, wherein the processing module is further configured to: according to the index field in the first certificate template, determining an index information item corresponding to the index field in the certificate information, and establishing an inverted index corresponding relation between the index information item and a certificate information dictionary; and/or determining analysis information items corresponding to the analysis fields in the certificate information according to the analysis fields in the first certificate model, and generating a corresponding analysis report according to the analysis information items.
20. The system of claim 19, further comprising a query module configured to receive a query request sent by a user terminal for the credential information, the query request including index dimension information and/or analysis dimension information;
determining a corresponding search field in the certificate information according to the index dimension information, and inquiring the certificate information according to the search field; and/or determining the corresponding analysis field in the certificate information according to the analysis dimension information, and inquiring the analysis report corresponding to the certificate information according to the analysis field.
21. An identity information processing device, comprising:
the receiving module is used for receiving the certificate picture uploaded by the user side and determining a first certificate type corresponding to the certificate picture;
the acquisition module is used for acquiring first template information from a plurality of preset template information, wherein the first template information comprises a first certificate template corresponding to the first certificate type, and a first check rule and a first algorithm type corresponding to the first certificate template;
the identification module is used for identifying the certificate information in the certificate picture by utilizing a first identification algorithm corresponding to the first algorithm type;
The verification module is used for verifying whether the certificate information accords with the first certificate template according to the first verification rule;
and the storage module is used for carrying out association storage on the certificate information and the certificate picture under the condition that the certificate information accords with the first certificate template.
22. An electronic device, the electronic device comprising:
a memory for storing a computer program product;
a processor for executing a computer program product stored in the memory, which, when executed, implements the method of any of the preceding claims 1-16.
23. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon computer program instructions which, when executed, implement the method of any of the preceding claims 1-16.
CN202311458912.9A 2023-11-03 2023-11-03 Identity information processing method, system, device, equipment and storage medium Pending CN117437639A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311458912.9A CN117437639A (en) 2023-11-03 2023-11-03 Identity information processing method, system, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311458912.9A CN117437639A (en) 2023-11-03 2023-11-03 Identity information processing method, system, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117437639A true CN117437639A (en) 2024-01-23

Family

ID=89545865

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311458912.9A Pending CN117437639A (en) 2023-11-03 2023-11-03 Identity information processing method, system, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117437639A (en)

Similar Documents

Publication Publication Date Title
US11281805B2 (en) Distributed blockchain-based method for saving the location of a file
JP4999751B2 (en) Data sharing techniques
US10402784B2 (en) Dynamic notary system
US10602202B1 (en) System and techniques for digital data lineage verification
CN109784922B (en) Electronic contract signing method, electronic contract signing device, computer equipment and storage medium
US20190340369A1 (en) System and method for securing electronic document execution and authentication
EP3694175A1 (en) System and method for delegating authority through coupled devices
CA2428665A1 (en) Web-based method and system for applying a legally enforceable signature on an electronic document
SG189360A1 (en) System and method for verifying authenticity of documents
CN107741935B (en) Data importing method and data importing device
US20160337358A1 (en) Method for encoding an access to a computer resource
US20190097811A1 (en) Open, secure electronic signature system and associated method
CN101964710B (en) Digital signature and signature authenticating method
CN111541549B (en) Block chain based information transfer method, device, equipment and storage medium
CN106330812A (en) File security identification method and device
WO2020201368A1 (en) System and method for providing aggregated credentials with assurance levels
CN109544265B (en) Electronic lock information processing method, electronic device and storage medium
CN109427027A (en) Folder processing method, device, system, pocessor and storage media
US9697350B1 (en) Electronic signing of content
EP4040720B1 (en) Secure identity card using unclonable functions
CN111931214A (en) Data processing method, device, server and storage medium
CN111464652A (en) Bank safe deposit box service providing method and device
CN117437639A (en) Identity information processing method, system, device, equipment and storage medium
JP2007011560A (en) Document data management system
KR101295168B1 (en) Method and apparatus for digital signature in electronic registration on property

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination