WO2021208939A1 - 人员信息存储、验证方法、系统及存储介质 - Google Patents

人员信息存储、验证方法、系统及存储介质 Download PDF

Info

Publication number
WO2021208939A1
WO2021208939A1 PCT/CN2021/087125 CN2021087125W WO2021208939A1 WO 2021208939 A1 WO2021208939 A1 WO 2021208939A1 CN 2021087125 W CN2021087125 W CN 2021087125W WO 2021208939 A1 WO2021208939 A1 WO 2021208939A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
person
personnel
identification
basic
Prior art date
Application number
PCT/CN2021/087125
Other languages
English (en)
French (fr)
Inventor
姜南
Original Assignee
京东数科海益信息科技有限公司
京东数字科技控股股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京东数科海益信息科技有限公司, 京东数字科技控股股份有限公司 filed Critical 京东数科海益信息科技有限公司
Publication of WO2021208939A1 publication Critical patent/WO2021208939A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Definitions

  • the present disclosure relates to the field of computer technology, and more specifically to personnel information storage and verification methods, systems, and storage media.
  • the present disclosure relates to a method for verifying personnel information, and the method includes:
  • the basic information of the registered personnel, the identification characteristics of the personnel information, and the identification information are stored in the local database, where the identification information is used as the identification information for subsequent access to the blockchain by the local database.
  • the basic information includes the identity information and physical characteristic information of the registered person.
  • the personal information identification features include: public key, private key, and signature information
  • the basic information is preprocessed to obtain the personal information identification features corresponding to the registrant including:
  • the local database and the blockchain when the application scenario is to store the service evaluation information of the registrant, the local database and the blockchain also store the service order information of the registrant and the corresponding service order. Clear text of service evaluation.
  • the method when the application scenario is to store the background investigation information of the registrant, the basic information is preprocessed, and before the identification feature of the person information corresponding to the registrant is obtained, the method further includes:
  • the basic information is preprocessed to obtain the personnel information characteristics corresponding to the registered personnel; and the background investigation results are stored in the local database and the blockchain.
  • the background investigation results are the basis of the background investigation system. Information obtained after investigation.
  • the physical feature information includes facial features and/or fingerprint features.
  • the present disclosure relates to a method for verifying personnel information, and the method includes:
  • the identification information retrieve the identification characteristics of the second person's information from the blockchain
  • the second person information identification feature is a person information identification feature generated based on the preset basic information of the legal person.
  • the basic information of the inspected person includes at least identity information and physical characteristic information.
  • the personal information identification features include: public key, private key, and signature information; among them, the public key and the private key are generated based on the basic information, and the signature information is the signature information generated based on the private key and the basic information.
  • the identification feature includes a first person information identification feature and a second person information identification feature.
  • the first person information identification feature and the second person information identification feature are compared to obtain the comparison result, including:
  • the public key in the first person information identification feature is used to verify the signature information in the second person information identification feature ;as well as
  • the verification is successful, it is determined that the inspected person is a predetermined legal person; otherwise, it is verified that the inspected person is not a predetermined legal person.
  • the physical feature information includes facial features and/or fingerprint features.
  • the local database and the blockchain when the application scenario is to verify the service evaluation information of the inspected person, the local database and the blockchain also store the service order information and the service evaluation plaintext corresponding to each service order .
  • the present disclosure relates to a personnel information storage system, which includes:
  • At least one processor and memory wherein
  • the processor is used to execute the personnel information storage program stored in the memory to implement any personnel information storage method in the present disclosure.
  • the present disclosure relates to a personnel information verification system, which includes:
  • At least one processor and memory wherein
  • the processor is used to execute the personnel information verification program stored in the memory to implement any personnel information verification method in the present disclosure.
  • the present disclosure relates to a computer storage medium that stores one or more programs, and the one or more programs can be executed by any personnel information storage system in the present disclosure to realize any personnel information in the present disclosure. Storage method.
  • the present disclosure relates to a computer storage medium.
  • the computer storage medium stores one or more programs.
  • One or more programs can be executed by any personnel information verification system in the present disclosure to realize any personnel information in the present disclosure. Authentication method.
  • the public information storage method of the registered personnel obtains the basic information of the registered personnel, pre-processes the basic information, and obtains the identification characteristics of the personnel information corresponding to the registered personnel. Send basic information and personnel information identification features to the blockchain. Then, the identification information corresponding to the identification feature of the personnel information fed back by the blockchain is received, and the basic information of the registered personnel, the identification feature of the personnel information, and the identification information are stored in the local database.
  • the identification information serves as the identification information for subsequent access to the blockchain by the local database, which is also the "passport" for accessing the blockchain.
  • the above information is stored in the local database for the convenience of subsequent use, and the blockchain has the characteristic of immutability.
  • storing the basic information of the registrant and the identification characteristics of the personnel information on the blockchain is to prevent criminals from tampering with the information of the registrant.
  • make a pre-guarantee That is, it can be determined whether the personnel information of a certain person is legal or not, and the personnel information in the local database can be compared with the information stored in the blockchain to verify whether the person is a registered legal person.
  • criminals are prevented from pretending to be registered personnel to perform illegal activities, and it is also convenient for subsequent users to know the identity information of service personnel in a timely manner, and the risk level of threats to their personal safety and property safety is reduced.
  • FIG. 1 shows a schematic flowchart of a method for storing personnel information according to an embodiment of the present disclosure
  • FIG. 2 shows a block diagram of the personnel information storage process provided by the present disclosure
  • FIG. 3 shows a schematic flowchart of a method for verifying personnel information provided by an embodiment of the present disclosure
  • Fig. 4 shows a schematic flow chart of a method for selecting personnel employment provided by the present disclosure
  • FIG. 5 shows a schematic structural diagram of a personnel information storage device provided by an embodiment of the present disclosure
  • FIG. 6 shows a schematic structural diagram of a personnel information verification device provided by an embodiment of the present disclosure
  • FIG. 7 shows a schematic structural diagram of a personnel information storage system provided by an embodiment of the present disclosure.
  • FIG. 8 shows a schematic structural diagram of a system for verifying personnel information provided by an embodiment of the present disclosure.
  • FIG. 1 shows a schematic flowchart of a method for storing personnel information provided by an embodiment of the present disclosure, and the method includes:
  • the basic information of the registrant includes identity information and physical characteristic information.
  • the identity information may include personal identity information such as an ID number
  • the physical characteristic information may include fingerprint characteristic information, or facial characteristic information, and so on.
  • the service personnel register an account, it is better to include the mobile phone number information in the basic information, so that the mobile phone number can be retrieved later when the account or password is forgotten.
  • the physical feature information may include facial features and/or fingerprint features.
  • the personal information identification features include: public key, private key, and signature information. For different application scenarios, there may be certain differences in the signature information in the obtained personnel information identification features.
  • the application scenario can be storing the legal identity information of the registrant, or storing the service evaluation information of the registrant, or storing the background investigation information of the registrant, etc.
  • the basic information is preprocessed to obtain the identification characteristics of the personnel information corresponding to the registered personnel, including:
  • basic information and personal information identification features are sent to the blockchain, which is mainly to prevent subsequent tampering of registered personnel's information. It is also based on the fact that the blockchain has the advantage of not being tampered with, so the basic information and the identification characteristics of personnel information are sent to the blockchain.
  • the blockchain will store the basic information and the identification characteristics of the personnel information sent by the personnel information storage system.
  • This identification information serves as the identification information for subsequent access to the blockchain by the local database, which is also the "passport" for subsequent access to the blockchain.
  • the identification information may be a transaction ID.
  • the personnel information storage system also needs to store the relevant information of the registered personnel in a local database for subsequent use. Therefore, the basic information of the registered personnel, the identification characteristics of the personnel information, and the identification information are stored in the local database.
  • the local database and the blockchain when the application scenario is to store the service evaluation information of the registrant, the local database and the blockchain also store the service order information of the registrant and the corresponding service order. Clear text of service evaluation.
  • the method when the application scenario is to store the background check information of the registrant, before executing 120, the method further includes:
  • the ellipse algorithm can be used to generate public and private keys corresponding to physical characteristics. For example, if the physical feature is a face feature, then the public key and private key corresponding to the face feature are generated. If the physical feature is a fingerprint feature, then the public key and private key corresponding to the fingerprint feature are generated. Then, generate signature information based on the private key. Finally, the system will store all the information including the public key, private key, signature information, and basic information in the local database. At the same time, the private key, signature information, and basic information will be sent to the blockchain for storage. Its purpose is mainly to ensure that the data is not tampered with. At this time, after receiving the information, the blockchain will feed back an identification information to the personnel information verification system, and the personnel information verification system will store it in the local database. The storage location is the first storage unit of the local database.
  • the service company may also want to investigate the background information of the service personnel. Then, after obtaining the basic information of the service personnel, the basic information of the service personnel will be sent to the background investigation of the service personnel. Service agency.
  • the background check service agency will conduct a background check based on the basic information of the service personnel provided by the personnel information verification system, and give the background check results.
  • the background check results include, for example, qualified and unqualified.
  • the specific measurement standards are given by the background check company. , Is not the focus of the study in this embodiment, so it will not be described here too much.
  • the background investigation result of the inspected person given by the background investigation service agency is qualified, then the public key and private key are generated according to the basic information of the inspected person. Then, use the private key to generate signature information.
  • the basic information, background investigation results, public key, private key, and signature information are stored in the local database, and the basic information, private key, background investigation results, and signature information are sent to the blockchain.
  • the blockchain will also feed back an identification information to the personnel information storage system, and the personnel information storage system will store the identification information in the local database.
  • the identification information in the first example is defined as the first identification information; the identification information in this example is defined as the second identification information.
  • all the information in this example is stored in the second storage unit of the local database. If the background check result is unqualified, the registration failure will be directly reported, and the reason for the registration failure will be reported to the personnel information system.
  • the identification information is used to establish the only "bridge" between the corresponding storage unit of the local database and the blockchain. If there is no identification information, the data corresponding to the identification information cannot be retrieved from the blockchain.
  • the personnel information storage system needs to obtain all service orders and service evaluation information of the service personnel in the service organization where they have worked. Including reviews, likes and other information. You need to establish a communication connection with other service organizations. All service organizations synchronize service order information and service evaluation information corresponding to all service personnel contained in themselves to the personnel information storage system.
  • the personnel information storage system generates public and private keys based on the basic information of each service personnel. Generate signature information based on the private key. Then, the basic information, the public key, the private key, the signature information, and the service order information and service order evaluation information corresponding to the service personnel are stored in the third storage unit of the database. And send basic information, private key, new signature, service order information corresponding to service personnel, service order evaluation information, etc. to the blockchain.
  • the blockchain will feed back the third identification information to the personnel information storage system, and the personnel information storage system will store it in the third storage unit.
  • the identification information may be a transaction ID.
  • the personnel information storage method obtains the basic information of the registrant, preprocesses the basic information, and obtains the identification characteristics of the personnel information corresponding to the registrant. Send basic information and personnel information identification features to the blockchain. Then, the identification information corresponding to the identification feature of the personnel information fed back by the blockchain is received, and the basic information of the registered personnel, the identification feature of the personnel information, and the identification information are stored in the local database.
  • the identification information serves as the identification information for subsequent access to the blockchain by the local database, which is also the "passport" for accessing the blockchain.
  • the above information is stored in the local database for the convenience of subsequent use, and the blockchain has the characteristic of immutability.
  • storing the basic information of the registrant and the identification characteristics of the personnel information on the blockchain is to prevent criminals from tampering with the information of the registrant.
  • make a pre-guarantee That is, it can be determined whether the personnel information of a certain person is legal, and the personnel information in the local database can be compared with the information stored in the blockchain to verify whether the person is a registered legal person.
  • criminals are prevented from pretending to be registered personnel to perform illegal activities, and it is also convenient for subsequent users to know the identity information of service personnel in a timely manner, and the risk level of threats to their personal safety and property safety is reduced.
  • FIG. 3 shows a flowchart of the personnel information verification method provided by the embodiment of the present disclosure.
  • the identification information retrieve the identification feature of the second person's information from the blockchain
  • the basic information of the inspected person may include the identity information and physical characteristic information of the inspected person.
  • the specific identity information and physical feature information are all described in the previous embodiment, which will not be described too much.
  • the first person information identification feature here includes the public key, private key, and signature information that have been stored in the local database.
  • the specific storage unit of the local database from which the first person information identification feature is obtained will vary according to specific application scenarios. For details, please refer to the previous embodiment, which will not be described here.
  • the application scenario can be to verify the legality of the inspected person's identity, verify the service evaluation information of the inspected person, or to investigate the background information of the inspected person.
  • the identification characteristics of the personnel information include: public key, private key, and signature information ; Among them, the public key and the private key are generated according to the basic information, and the signature information is generated according to the private key.
  • the identification information at this time is similar to the first identification information to the third identification information introduced in the previous embodiment.
  • the first identification information corresponds to the application scenario of the identity legality verification of the inspected person
  • the second identification information corresponds to It is the application scenario of the qualification verification of the background information of the inspected person
  • the third identification information corresponds to the application scenario of the service evaluation information verification of the inspected person.
  • the personal information identification feature includes the first personal information identification feature and the second personal information identification feature.
  • the first person’s information identification feature is stored in the local database, it is easy to be tampered with, or deleted, etc., or some criminals imposter pre-set legal persons and obtain pre-set legal ones. After the personnel information of the personnel, replace the preset personnel to perform illegal activities in the name of work. In order to avoid these situations, it is necessary to retrieve the identification characteristics of the second person's information from the blockchain. That is, according to the identification information, the second person information identification feature is obtained from the blockchain.
  • the second person information identification feature mentioned here is the person information identification feature that the personnel information storage system stores the registered person's personal information identification feature in the local database, and then sends it to the blockchain for storage. That is, the identification characteristics of the personnel information generated and stored in the blockchain based on the preset basic information of the legal personnel.
  • comparing whether the first person information identification feature and the second person information identification feature are the same person information identification feature may include taking the public key in the first person information identification feature and the second person information identification feature Compare the public keys in. If they are inconsistent, the information of the inspected person is abnormal, and the inspected person is not a predetermined legal person. If the public keys are consistent, the public key in the local database is used to verify the signature information in the second person information identification feature. If the verification fails, it is still considered that the information of the inspected person is abnormal, and the inspected person is not a predetermined legal person. On the contrary, if the verification is successful, the information of the inspected person is considered normal, and the inspected person is determined to be a predetermined legal person.
  • the local database and the blockchain when the application scenario is to verify the service evaluation information of the inspected person, the local database and the blockchain also store the service order information and the service evaluation plaintext corresponding to each service order .
  • This information is stored mainly for the employer to use the service evaluation information as a reference when selecting service personnel in the future, that is, the method to be introduced in the next embodiment. For details, refer to the next embodiment, which will not be introduced here.
  • the personnel information verification method obtains the basic information of the inspected person, and then retrieves the first personnel information identification feature and identification information corresponding to the basic information from the local database according to the basic information.
  • the identification information is the communication identification between the local database and the external database.
  • the identification feature of the second person information can be retrieved from the blockchain according to the identification information.
  • it is verified whether the inspected person is a preset legal person. In this way, it is convenient for the user to immediately obtain the basic information of the service personnel after placing an order, and finally verify whether the worker who is about to come to the door is a predetermined legal person based on the basic information.
  • FIG. 4 shows a schematic flow chart of a method for selecting a person's employment according to an embodiment of the present disclosure. As shown in FIG. 4, the method includes:
  • the method of the previous embodiment is used to verify the background information of the service personnel to determine whether the background information of the service personnel is qualified;
  • the personnel identity information, background investigation information, service evaluation information, and service order information corresponding to the service evaluation information are fed back to the employer's terminal device together so that the employer can determine whether to hire service personnel.
  • the acquisition methods may include but are not limited to the following methods:
  • the first is that the employer clicks the View Delivery Person Information button on the service order; the system directly retrieves the basic information of the service person from the local database.
  • the second type is when the delivery personnel visit the service, the employer collects the physical characteristics of the service personnel through the camera of the terminal device, such as collecting facial characteristics, uploading to the personnel information verification system, and performing face verification through the personnel information verification system; or through device fingerprint recognition The device collects fingerprints and uploads them to the personnel information verification system, and performs fingerprint verification through the personnel information verification system. Refer to the previous embodiment for the specific verification process.
  • the personnel information verification system introduced in the previous embodiment can synchronize service order information and service evaluation information corresponding to service personnel of all service organizations. Therefore, after confirming that the background information of the service personnel is qualified, the service evaluation information of the service personnel in all service organizations that have served can be obtained. Then proceed to the next step.
  • personnel identity information, background investigation information, service order information, and service evaluation information are all personnel information, and the service order information and service order information sent to the employer’s terminal are verified when the information is valid.
  • Service evaluation information, and this information can be obtained from a local database or a blockchain.
  • the identification information when verifying whether the identity information of the service personnel is a valid identity, is the first identification information; the first identification information is that the local processor stores the personnel information identification characteristics of the registered service personnel in the area After the block chain, the first identification information sent by the block chain to the local processor, the first identification information and the personnel information identification characteristics of the registered service personnel are stored in the first storage location of the local database;
  • the identification information is the second identification information;
  • the second identification information is that after the local processor stores the personnel information identification characteristics of the registered service personnel on the blockchain, the area The second identification information sent by the block chain to the local processor, the second identification information, the identification characteristics of the personnel information of the registered service personnel, and the background information survey results are all stored in the second storage location of the local database;
  • the identification information is the third identification information;
  • the third identification information is that after the local processor stores the personnel information identification characteristics of the registered service personnel on the blockchain, the block The third identification information sent by the chain to the local processor, the third identification information, the identification characteristics of the personnel information of the registered service personnel, and all service orders and service evaluation information of the service personnel in all service organizations that have served are stored in The third storage location of the local database.
  • the abnormal result and the reason for the abnormality will also be sent to the employer's terminal device. That is, when the identity of the service personnel is verified, the background information of the service personnel, and the service information of the service personnel in all service organizations that have been served by the service personnel are invalid, the verification is stopped, and the verification failure result and failure of the employer terminal device are fed back. reason. So that employers can take appropriate measures in time.
  • the basic information of the service personnel is first obtained, and then whether the personnel information of the service personnel is valid or not is verified. If it is a valid identity, it can be determined whether the background information of the service personnel is qualified. If qualified, verify whether the service evaluation information is valid. Only when all the above conditions are verified and valid, will the service evaluation information and the service order information corresponding to the service evaluation information be sent to the employer’s terminal device together, so that the employer can confirm based on the information. Whether to continue to hire the service personnel to provide on-site service.
  • FIG. 5 shows a person information storage device provided by an embodiment of the present disclosure.
  • the device includes: an acquiring unit 501, a processing unit 502, a sending unit 503, and a receiving unit 504.
  • the obtaining unit 501 is used to obtain basic information of the registered person
  • the processing unit 502 is configured to preprocess the basic information and obtain the identification characteristics of the personnel information corresponding to the registered personnel;
  • the sending unit 503 is used to send basic information and personal information identification features to the blockchain;
  • the receiving unit 504 is configured to receive identification information corresponding to the identification characteristics of the personnel information fed back by the blockchain;
  • the processing unit 502 is further configured to store the basic information of the registered personnel, the identification characteristics of the personnel information, and the identification information in a local database, where the identification information is used as the identification information for subsequent access to the blockchain by the local database.
  • the basic information includes the identity information and physical characteristic information of the registered person.
  • the personal information identification features include: public key, private key, and signature information, and the processing unit 502 is used to generate the public key and the private key according to the physical feature information; and
  • the local database and the blockchain when the application scenario is to store the service evaluation information of the registrant, the local database and the blockchain also store the service order information of the registrant and the corresponding service order. Clear text of service evaluation.
  • the receiving unit 504 when the application scenario is to store the background investigation information of the registrant, the receiving unit 504 is also used to obtain the background investigation result of the registrant;
  • the processing unit 502 is also used to determine whether the background investigation result is qualified. Only when it is determined that the background investigation results are qualified, the basic information will be preprocessed to obtain the personnel information characteristics corresponding to the registered personnel.
  • both the local database and the blockchain also store the background investigation results, where the background investigation results are the investigation results obtained after the background investigation system investigates the basic information.
  • the personnel information storage device obtains the basic information of the registered personnel, preprocesses the basic information, and obtains the personnel information identification characteristics corresponding to the registered personnel. Send basic information and personnel information identification features to the blockchain. Then, the identification information corresponding to the identification feature of the personnel information fed back by the blockchain is received, and the basic information of the registered personnel, the identification feature of the personnel information, and the identification information are stored in the local database.
  • the identification information serves as the identification information for subsequent access to the blockchain by the local database, which is also the "passport" for accessing the blockchain. The above information is stored in the local database for the convenience of subsequent use, and the blockchain has the characteristic of immutability.
  • storing the basic information of the registrant and the identification characteristics of the personnel information on the blockchain is to prevent criminals from tampering with the information of the registrant.
  • make a pre-guarantee That is, it can be determined whether the personnel information of a certain person is legal or not, and the personnel information in the local database can be compared with the information stored in the blockchain to verify whether the person is a registered legal person.
  • criminals are prevented from pretending to be registered personnel to perform illegal activities, and it is also convenient for subsequent users to know the identity information of service personnel in a timely manner, and the risk level of threats to their personal safety and property safety is reduced.
  • FIG. 6 shows an apparatus for verifying personnel information provided by an embodiment of the present disclosure.
  • the apparatus includes: an acquisition unit 601, an retrieval unit 602, and a processing unit 603. in:
  • the obtaining unit 601 is used to obtain basic information of the inspected person
  • the retrieval unit 602 is configured to retrieve the identification feature and identification information of the first person information corresponding to the basic information from the local database according to the basic information, and the identification information is used as the identification information for subsequent access to the blockchain by the local database;
  • the identification information retrieve the identification characteristics of the second person's information from the blockchain.
  • the processing unit 603 compares the first person information identification feature with the second person information identification feature to obtain a comparison result
  • the basic information of the inspected person includes at least identity information and physical characteristic information.
  • the personal information identification features include: public key, private key, and signature information;
  • the public key is the public key generated according to the basic information
  • the signature information is the signature information generated according to the private key
  • the private key is the private key generated according to the basic information.
  • the processing unit 603 is configured to compare the public key in the first person information identification feature with the public key in the second person information identification feature;
  • the public key in the first person information identification feature is used to verify the signature information in the second person information identification feature ;as well as
  • the verification is successful, it is determined that the inspected person is a predetermined legal person; otherwise, it is verified that the inspected person is not a predetermined legal person.
  • the physical characteristic information includes facial characteristics and/or fingerprint characteristics.
  • the second person information identification feature is the person information identification feature that the local processor stores the registered person's personal information identification feature in the local database, and then sends it to the blockchain for storage.
  • the local database and the blockchain when the application scenario is to verify the service evaluation information of the inspected person, also store the service order information and the service evaluation plaintext corresponding to each service order .
  • the functions performed by each functional component in the personnel information verification apparatus provided in this embodiment have been described in detail in the embodiment corresponding to FIG. 3, and therefore will not be repeated here.
  • the personnel information verification device obtains the basic information of the inspected person, and then retrieves the first personnel information identification feature and identification information corresponding to the basic information from the local database according to the basic information.
  • the identification information is the communication identification between the local database and the external database.
  • the identification feature of the second person information can be retrieved from the blockchain according to the identification information.
  • it is verified whether the inspected person is a preset legal person. In this way, it is convenient for the user to immediately obtain the basic information of the service personnel after placing an order, and finally verify whether the worker who is about to come to the door is a predetermined legal person based on the basic information.
  • FIG. 7 shows a schematic structural diagram of a personnel information storage system provided by an embodiment of the present disclosure.
  • the personnel information storage system 700 shown in FIG. 7 includes: at least one processor 701, a memory 702, at least one network interface 703, and other user interfaces 704 .
  • Personnel Information Storage The various components in the personnel information storage system 700 are coupled together through the bus system 705. It can be understood that the bus system 705 is used to implement connection and communication between these components.
  • the bus system 705 also includes a power bus, a control bus, and a status signal bus. However, for the sake of clear description, various buses are marked as the bus system 705 in FIG. 5.
  • the user interface 704 may include a display, a keyboard, or a pointing device (for example, a mouse, a trackball (trackball), a touch panel, or a touch screen, etc.).
  • a pointing device for example, a mouse, a trackball (trackball), a touch panel, or a touch screen, etc.
  • the memory 702 in the embodiment of the present disclosure may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
  • RAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • DDRSDRAM Double Data Rate Synchronous Dynamic Random Access Memory
  • Enhanced SDRAM, ESDRAM Synchronous Link Dynamic Random Access Memory
  • Synch link DRAM SLDRAM
  • DRRAM Direct Rambus RAM
  • the memory 702 described herein is intended to include, but is not limited to, these and any other suitable types of memory.
  • the memory 702 stores the following elements, executable units or data structures, or their subsets, or their extended sets: operating system 7021 and application programs 7022.
  • the operating system 7021 includes various system programs, such as a framework layer, a core library layer, a driver layer, etc., for implementing various basic services and processing hardware-based tasks.
  • the application program 7022 includes various application programs, such as a media player (Media Player), a browser (Browser), etc., which are used to implement various application services.
  • a program for implementing the method of the embodiments of the present disclosure may be included in the application program 7022.
  • the processor 701 by calling the program or instruction stored in the memory 702, which may be a program or instruction stored in the application program 7022, the processor 701 is configured to execute the methods provided in each method embodiment, for example, including:
  • the basic information of the registered personnel, the identification characteristics of the personnel information, and the identification information are stored in a local database, where the identification information is used as the identification information for subsequent access to the blockchain by the local database.
  • the basic information includes the identity information and physical characteristic information of the registered person.
  • the public key and the private key are generated based on the physical characteristic information; the signature information is generated based on the private key.
  • the local database and the blockchain when the application scenario is to store the service evaluation information of the registrant, the local database and the blockchain also store the service order information of the registrant and the corresponding service order. Clear text of service evaluation.
  • the application scenario when the application scenario is to store the background check information of the registrant, the basic information is preprocessed, and the background check result of the registrant is obtained before obtaining the identification characteristics of the person information corresponding to the registrant;
  • the basic information is preprocessed to obtain the personnel information characteristics corresponding to the registered personnel; and the background investigation results are stored in the local database and the blockchain.
  • the background investigation results are the basis of the background investigation system. Information obtained after investigation.
  • the methods disclosed in the foregoing embodiments of the present disclosure may be applied to the processor 701 or implemented by the processor 701.
  • the processor 701 may be an integrated circuit chip with signal processing capability. In the implementation process, the steps of the foregoing method can be completed by an integrated logic circuit of hardware in the processor 701 or instructions in the form of software.
  • the aforementioned processor 701 may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC application specific integrated circuit
  • FPGA Field Programmable Gate Array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present disclosure can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the method disclosed in combination with the embodiments of the present disclosure may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software units in the decoding processor.
  • the software unit may be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory 702, and the processor 701 reads the information in the memory 702, and completes the above method in combination with its hardware.
  • the embodiments described herein can be implemented by hardware, software, firmware, middleware, microcode, or a combination thereof.
  • the processing unit can be implemented in one or more application specific integrated circuits (ASICs), digital signal processors (Digital Signal Processing, DSP), digital signal processing devices (DSPDevice, DSPD), programmable logic Device (Programmable Logic Device, PLD), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), general-purpose processors, controllers, microcontrollers, microprocessors, other electronic units used to perform the functions of the present disclosure, or In its combination.
  • ASICs application specific integrated circuits
  • DSP digital signal processors
  • DSPDevice digital signal processing devices
  • PLD programmable logic Device
  • FPGA Field-Programmable Gate Array
  • general-purpose processors controllers, microcontrollers, microprocessors, other electronic units used to perform the functions of the present disclosure, or In its combination.
  • the technology of this article can be realized by a unit that performs the functions of this article.
  • the software codes can be stored in the memory and executed by the processor.
  • the memory can be implemented in the processor or external to the processor.
  • the personnel information storage system provided in this embodiment may be the personnel information storage system as shown in FIG. 7, and the personnel information storage method shown in FIG. 1 may be executed, thereby realizing the technical effects of the personnel information storage method shown in FIG. , Please refer to the related description in Fig. 1 for concise description and will not be repeated here.
  • FIG. 8 shows a schematic structural diagram of a personnel information verification system provided by an embodiment of the present disclosure.
  • the personnel information verification system 800 shown in FIG. 8 includes: at least one processor 801, a memory 802, at least one network interface 803, and other user interfaces 804 .
  • Personnel Information Verification The various components in the personnel information verification system 800 are coupled together through the bus system 805. It can be understood that the bus system 805 is used to implement connection and communication between these components.
  • the bus system 805 also includes a power bus, a control bus, and a status signal bus. However, for the sake of clear description, various buses are marked as the bus system 805 in Fig. 5.
  • the user interface 804 may include a display, a keyboard, or a pointing device (for example, a mouse, a trackball (trackball), a touch panel, or a touch screen, etc.).
  • a pointing device for example, a mouse, a trackball (trackball), a touch panel, or a touch screen, etc.
  • the memory 802 in the embodiment of the present disclosure may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
  • RAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • DDRSDRAM Double Data Rate Synchronous Dynamic Random Access Memory
  • Enhanced SDRAM, ESDRAM Synchronous Link Dynamic Random Access Memory
  • Synch link DRAM SLDRAM
  • DRRAM Direct Rambus RAM
  • the memory 802 stores the following elements, executable units or data structures, or a subset of them, or an extended set of them: operating system 8021 and application programs 8022.
  • the operating system 8021 includes various system programs, such as a framework layer, a core library layer, a driver layer, etc., for implementing various basic services and processing hardware-based tasks.
  • the application program 8022 includes various application programs, such as a media player (Media Player), a browser (Browser), etc., which are used to implement various application services.
  • the program for implementing the method of the embodiments of the present disclosure may be included in the application 8022.
  • the processor 801 by calling the program or instruction stored in the memory 802, which may be the program or instruction stored in the application program 8022, the processor 801 is configured to execute the methods provided by the method embodiments, for example, including:
  • the first person information identification feature and identification information corresponding to the basic information are retrieved from the local database, and the identification information is used as the identification information for subsequent access to the blockchain by the local database;
  • the identification information retrieve the identification characteristics of the second person's information from the blockchain
  • the basic information of the inspected person includes at least identity information and physical characteristic information.
  • the personal information identification features include: public key, private key, and signature information;
  • the public key is the public key generated according to the basic information
  • the signature information is the signature information generated according to the private key
  • the private key is the private key generated according to the basic information.
  • the public key in the first personal information identification feature is compared with the public key in the second personal information identification feature
  • the public key in the first person information identification feature is used to verify the signature information in the second person information identification feature ;as well as
  • the verification is successful, it is determined that the inspected person is a predetermined legal person; otherwise, it is verified that the inspected person is not a predetermined legal person.
  • the physical feature information includes facial features and/or fingerprint features.
  • the second person information identification feature is the person information identification feature that the local processor stores the registered person's personal information identification feature in the local database, and then sends it to the blockchain for storage.
  • the local database and the blockchain when the application scenario is to verify the service evaluation information of the inspected person, the local database and the blockchain also store the service order information and the service evaluation plaintext corresponding to each service order .
  • the methods disclosed in the foregoing embodiments of the present disclosure may be applied to the processor 801 or implemented by the processor 801.
  • the processor 801 may be an integrated circuit chip with signal processing capabilities. In the implementation process, the steps of the foregoing method can be completed by an integrated logic circuit of hardware in the processor 801 or instructions in the form of software.
  • the aforementioned processor 801 may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC application specific integrated circuit
  • FPGA Field Programmable Gate Array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present disclosure can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the method disclosed in combination with the embodiments of the present disclosure may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software units in the decoding processor.
  • the software unit may be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory 802, and the processor 801 reads the information in the memory 802, and completes the above method in combination with its hardware.
  • the embodiments described herein can be implemented by hardware, software, firmware, middleware, microcode, or a combination thereof.
  • the processing unit can be implemented in one or more application specific integrated circuits (ASICs), digital signal processors (Digital Signal Processing, DSP), digital signal processing devices (DSPDevice, DSPD), programmable logic Device (Programmable Logic Device, PLD), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), general-purpose processors, controllers, microcontrollers, microprocessors, other electronic units used to perform the functions of the present disclosure, or In its combination.
  • ASICs application specific integrated circuits
  • DSP digital signal processors
  • DSPDevice digital signal processing devices
  • PLD programmable logic Device
  • FPGA Field-Programmable Gate Array
  • general-purpose processors controllers, microcontrollers, microprocessors, other electronic units used to perform the functions of the present disclosure, or In its combination.
  • the technology of this article can be realized by a unit that performs the functions of this article.
  • the software codes can be stored in the memory and executed by the processor.
  • the memory can be implemented in the processor or external to the processor.
  • the personnel information verification system provided in this embodiment may be the personnel information verification system shown in FIG. 8, and the personnel information verification method shown in FIG. 3 may be executed, thereby realizing the technical effects of the personnel information storage method shown in FIG. 3 , Please refer to the related description in Figure 3, which is a concise description and will not be repeated here.
  • the embodiment of the present disclosure also provides a storage medium (computer-readable storage medium).
  • the storage medium here stores one or more programs.
  • the storage medium may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, hard disk, or solid-state hard disk; and the memory may also include the above-mentioned types of memory. The combination.
  • the processor is used to execute the personnel information storage program stored in the memory to implement the following personnel information storage method executed on the side of the personnel information storage system:
  • the basic information of the registered personnel, the identification characteristics of the personnel information, and the identification information are stored in a local database, where the identification information is used as the identification information for subsequent access to the blockchain by the local database.
  • the basic information includes the identity information and physical characteristic information of the registered person.
  • the personnel information identification features include: public key, private key, and signature information, and when the application scenario is to store the legal identity information of the registrant, or to store the service evaluation information of the registrant, Generate a public key and a private key according to the physical characteristic information; and generate signature information according to the private key.
  • the personal information identification feature includes: public key, private key, and signature information, and when the application scenario is to store the background check information of the registrant, the public key and the private key are generated according to the physical feature information; and
  • the signature information is generated.
  • the local database and the blockchain when the application scenario is to store the service evaluation information of the registrant, the local database and the blockchain also store the service order information of the registrant and the corresponding service order. Clear text of service evaluation.
  • the application scenario when the application scenario is to store the background check information of the registrant, the basic information is preprocessed, and the background check result of the registrant is obtained before obtaining the identification characteristics of the person information corresponding to the registrant;
  • the basic information is preprocessed to obtain the personnel information characteristics corresponding to the registered personnel; and the background investigation results are stored in the local database and the blockchain.
  • the background investigation results are the basis of the background investigation system. Information obtained after investigation.
  • the embodiment of the present disclosure also provides a storage medium (computer-readable storage medium).
  • the storage medium here stores one or more programs.
  • the storage medium may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, hard disk, or solid-state hard disk; and the memory may also include the above-mentioned types of memory.
  • volatile memory such as random access memory
  • non-volatile memory such as read-only memory, flash memory, hard disk, or solid-state hard disk
  • the memory may also include the above-mentioned types of memory. The combination.
  • the processor is used to execute the personnel information verification program stored in the memory to implement the following personnel information verification method executed on the side of the personnel information verification system:
  • the first person information identification feature and identification information corresponding to the basic information are retrieved from the local database, and the identification information is used as the identification information for subsequent access to the blockchain by the local database;
  • the identification information retrieve the identification characteristics of the second person's information from the blockchain
  • the basic information of the inspected person includes at least identity information and physical characteristic information.
  • the personal information identification features include: public key, private key, and signature information;
  • the public key is the public key generated according to the basic information
  • the signature information is the signature information generated according to the private key
  • the private key is the private key generated according to the basic information.
  • the personal information identification features include: public key, private key, and signature information;
  • the public key is a public key generated based on basic information
  • the signature information is a signature information generated based on a private key and background investigation results.
  • the private key is a private key generated based on basic information
  • the personal information identification features include first person information.
  • the identification feature and the identification feature of the second person information, the background investigation result is the investigation result obtained after the background investigation system investigates the basic information.
  • the public key in the first personal information identification feature is compared with the public key in the second personal information identification feature
  • the public key in the first person information identification feature is used to verify the signature information in the second person information identification feature ;as well as
  • the verification is successful, it is determined that the inspected person is a predetermined legal person; otherwise, it is verified that the inspected person is not a predetermined legal person.
  • the physical feature information includes facial features and/or fingerprint features.
  • the second personal information identification feature is the personal information identification feature that the local processor stores the registered person's personal information identification feature in the local database, and then sends it to the blockchain for storage.
  • the local database and the blockchain when the application scenario is to verify the service evaluation information of the inspected person, the local database and the blockchain also store the service order information and the service evaluation plaintext corresponding to each service order .
  • the steps of the method or algorithm described in combination with the embodiments disclosed herein can be implemented by hardware, a software module executed by a processor, or a combination of the two.
  • the software module can be placed in random access memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disks, removable disks, CD-ROMs, or all areas in the technical field. Any other known storage media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

一种人员信息存储、验证方法、系统及存储介质,该方法包括:获取注册人员的基础信息;对基础信息进行预处理,获取与注册人员对应的人员信息识别特征;将基础信息和人员信息识别特征发送至区块链;接收区块链反馈的与人员信息识别特征对应的标识信息;以及将注册人员的基础信息、人员信息识别特征以及标识信息存储至本地数据库。

Description

人员信息存储、验证方法、系统及存储介质
相关申请的引用
本公开要求于2020年4月16日向中华人民共和国国家知识产权局提交的申请号为202010303626.5、发明名称为“人员信息存储、验证方法、系统及存储介质”的发明专利申请的全部权益,并通过引用的方式将其全部内容并入本文。
领域
本公开涉及计算机技术领域,更具体地涉及人员信息存储、验证方法、系统及存储介质。
背景
近年来,随着人们生活水平的日渐提高,上门服务行业也随之兴起。上门服务给人们的生活带来越来越多的便利,但是也存在一定的弊端。行业的兴起必然雇佣更多的服务人员,然而相关的招聘公司对于人员管理并不符合相应规定。为了节省成本,公司录入员工时并不清楚员工的人员信息是否有效。用户通过网上APP预定相关服务后,由于无法了解配送人员的身份信息,或多或少都会存在威胁客户的人身和财产安全等的风险。
概述
一方面,本公开涉及人员信息验证方法,该方法包括:
获取注册人员的基础信息;
对基础信息进行预处理,获取与注册人员对应的人员信息识别特征;
将基础信息和人员信息识别特征发送至区块链;
接收区块链反馈的与人员信息识别特征对应的标识信息;以及
将注册人员的基础信息、人员信息识别特征以及标识信息存 储本地数据库,其中,标识信息作为本地数据库后续访问区块链的身份识别信息。
在某些实施方案中,基础信息包括注册人员的身份信息和身体特征信息。
在某些实施方案中,人员信息识别特征包括:公钥、私钥以及签名信息,并且对基础信息进行预处理,获取与注册人员对应的人员信息识别特征包括:
根据身体特征信息生成公钥和私钥;以及
根据私钥生成签名信息。
在某些实施方案中,当应用场景为对注册人员的服务评价信息进行存储时,本地数据库和区块链中,均还存储有与注册人员的服务订单信息以及与每一份服务订单对应的服务评价明文。
在某些实施方案中,当应用场景为对注册人员的背景调查信息进行存储时,对基础信息进行预处理,获取与注册人员对应的人员信息识别特征之前,方法还包括:
获取注册人员的背景调查结果;以及
当背景调查结果合格时,对基础信息进行预处理,获取与注册人员对应的人员信息特征;且本地数据库和区块链中,均存储背景调查结果,其中,背景调查结果为背景调查系统对基础信息进行调查后获取的调查结果。
在某些实施方案中,身体特征信息包括人脸特征和/或指纹特征。
另一方面,本公开涉及人员信息验证方法,该方法包括:
获取被查验人员的基础信息;
根据基础信息从本地数据库中调取与基础信息对应的第一人员信息识别特征和标识信息;
根据标识信息,从区块链调取第二人员信息识别特征;
将第一人员信息识别特征和第二人员信息识别特征进行比对,获取比对结果;以及
根据比对结果,验证被查验人员是否为预设定的合法人员, 其中,第二人员信息识别特征为根据预设定的合法人员的基础信息生成的人员信息识别特征。
在某些实施方案中,被查验人员的基础信息至少包括身份信息和身体特征信息。
在某些实施方案中,人员信息识别特征包括:公钥、私钥和签名信息;其中,公钥和私钥根据基础信息生成,签名信息为根据私钥和基础信息生成的签名信息,人员信息识别特征包括第一人员信息识别特征和第二人员信息识别特征。
在某些实施方案中,将第一人员信息识别特征和第二人员信息识别特征进行比对,获取比对结果,包括:
将第一人员信息识别特征中的公钥和第二人员信息识别特征中的公钥进行比对;
当确定第一人员信息识别特征中的公钥和第二人员信息识别特征中的公钥一致时,利用第一人员信息识别特征中的公钥对第二人员信息识别特征中的签名信息进行验证;以及
如果验证成功,则确定被查验人员为预设定的合法人员;否则,验证被查验人员并非为预设定的合法人员。
在某些实施方案中,身体特征信息包括人脸特征和/或指纹特征。
在某些实施方案中,当应用场景为对被查验人员的服务评价信息进行验证时,本地数据库和区块链中,均还存储有服务订单信息以及与每一份服务订单对应的服务评价明文。
又一方面,本公开涉及人员信息存储系统,该系统包括:
至少一个处理器和存储器;其中
处理器用于执行存储器中存储的人员信息存储程序,以实现本公开中任一人员信息存储方法。
再一方面,本公开涉及人员信息验证系统,该系统包括:
至少一个处理器和存储器;其中
处理器用于执行存储器中存储的人员信息验证程序,以实现本公开中任一人员信息验证方法。
另一方面,本公开涉及计算机存储介质,该计算机存储介质存储有一个或者多个程序,一个或者多个程序可被本公开中任一人员信息存储系统执行,以实现本公开中任一人员信息存储方法。
又一方面,本公开涉及计算机存储介质,该计算机存储介质存储有一个或者多个程序,一个或者多个程序可被本公开中任一人员信息验证系统执行,以实现本公开中任一人员信息验证方法。
公开的人员信息存储方法,获取注册人员的基础信息,对基础信息进行预处理,获取与注册人员对应的人员信息识别特征。将基础信息和人员信息识别特征发送至区块链。然后接收区块链反馈的与人员信息识别特征对应的标识信息,将注册人员的基础信息、人员信息识别特征和标识信息存储至本地数据库。标识信息作为本地数据库后续访问区块链的身份识别信息,也即是访问区块链的“通行证”。将上述信息存储至本地数据库则是为了方便后续使用,而区块链存在不可篡改的特性。因此,将注册人员的基础信息、人员信息识别特征等存储在区块链,是为了防止不法分子对注册人员的信息进行篡改。为后续如果需要验证某一个服务人员的人员信息是否合法做好前期保证。即,后续可以判定某一个人员的人员信息是否合法,可以拿本地数据库的人员信息和区块链存储的信息进行比对,验证该人员是否是已经注册过的合法人员。通过该种方式,防止不法分子冒充注册人员执行不法勾当,也方便后续用户及时了解服务人员的身份信息,降低对自身人身安全和财产安全构成威胁的风险等级。
附图的简要说明
图1示出了本公开一实施例提供的人员信息存储方法流程示意图;
图2示出了本公开提供的人员信息存储流程框图;
图3示出了本公开一实施例提供的人员信息验证方法流程示意图;
图4示出了本公开提供的人员雇佣选择方法流程示意图;
图5示出了本公开一实施例提供的人员信息存储装置结构示意图;
图6示出了本公开一实施例提供的人员信息验证装置结构示意图;
图7示出了本公开一实施例提供的人员信息存储系统结构示意图;以及
图8示出了本公开一实施例提供人员信息验证系统结构示意图。
详述
为使本公开实施例的目的、技术方案和优点更加清楚,下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。
为便于对本公开实施例的理解,下面将结合附图以具体实施例做进一步的解释说明,实施例并不构成对本公开实施例的限定。
在介绍本公开实施例的方法之前,首先介绍一下本实施例的应用场景。应用环境例如可以是家政服务公司、快递公司或者是其他服务行业的公司等等。这些应用场景在招聘服务人员之前,势必要录入服务人员的信息。以备后续不时之需。因此,本公开实施例提供了人员信息存储方法。参见图1所示,图1示出了本公开实施例提供的人员信息存储方法流程示意图,该方法包括:
110,获取注册人员的基础信息;
120,对基础信息进行预处理,获取与注册人员对应的人员信息识别特征;
130,将基础信息和人员信息识别特征发送至区块链;
140,接收区块链反馈的与人员信息识别特征对应的标识信息;以及
150,将注册人员的基础信息、人员信息识别特征以及标识信息存储本地数据库。
在关于110的某些实施方案中,注册人员的基础信息包括身份信息和身体特征信息。
其中,身份信息可以包括个人身份信息例如身份证号码,身体特征信息例如包括指纹特征信息,或者人脸特征信息等等。当然,如果服务人员注册账号的话,基础信息中最好还要包括手机号码信息,用以方便后续对忘记账号或者忘记密码时可以通过手机号码进行找回。在某些实施方案中,身体特征信息可以包括人脸特征和/或指纹特征等。
在关于120的某些实施方案中,人员信息识别特征包括:公钥、私钥以及签名信息。对于不同的应用场景,获取的人员信息识别特征中的签名信息可能存在一定的差异。
应用场景可以为对注册人员的合法身份信息进行存储,或者是对注册人员的服务评价信息进行存储,又或者是对注册人员背景调查信息进行存储等。
在某些实施方案中,对基础信息进行预处理,获取与注册人员对应的人员信息识别特征,包括:
根据身体特征信息生成公钥和私钥;以及
根据私钥生成签名信息。
在关于130的某些实施方案中,将基础信息和人员信息识别特征发送至区块链,其主要为了防止注册人员的信息后续被篡改。也是基于区块链具有不可篡改的优点,因此将基础信息和人员信息识别特征发送至区块链。
在关于140的某些实施方案中,区块链在接收到人员信息存储系统发送的基础信息和人员信息识别特征后,将会对这些内容进行存储。
然后反馈给人员信息存储系统一个标识信息。该标识信息作为本地数据库后续访问区块链的身份识别信息,也即是后续访问区块链的“通行证”。
在某些实施方案中,标识信息可以是交易ID。
在关于150的某些实施方案中,人员信息存储系统也需要将注册人员的相关信息存储至本地数据库,方便后续使用。因此,会将注册人员的基础信息、人员信息识别特征以及标识信息存储本地数据库。
在某些实施方案中,当应用场景为对注册人员的服务评价信息进行存储时,本地数据库和区块链中,均还存储有与注册人员的服务订单信息以及与每一份服务订单对应的服务评价明文。
在某些实施方案中,当应用场景为对注册人员的背景调查信息进行存储时,在执行120之前,该方法还包括:
获取注册人员的背景调查结果。
只有确定背景调查结果合格时,才会执行120;并且本地数据库和区块链中,均存储该背景调查结果,其中,背景调查结果为背景调查系统对基础信息进行调查后获取的调查结果。
当验证背景调查结果不合格时,将会停止操作。直接反馈系统,说明注册失败,并反馈注册失败的原因。
下面,将以具体的例子进行说明上述方法的详细执行过程。例如某公司招聘服务人员,则需要通过自身的系统首先执行如下操作,参见图2所示,图2示出了人员信息存储过程的流程框图。
首先让服务人员进行个人基础信息注册,或者说是采集服务人员的个人基础信息。具体的过程已经在上文做了详细描述。
接下来,为验证注册人员填写的身份信息格式是否符合预设定的格式。确定符合格式后,人员信息验证系统会对基础信息进行处理。
例如,根据身体特征生成公钥和私钥。其中,可以采用椭圆算法生成与身体特征对应的公钥和私钥。比如,身体特征为人脸特征,那么生成的就是与人脸特征对应的公钥和私钥。如果身体特征为指纹特征,那么生成的就是与指纹特征对应的公钥和私钥。然后,根据私钥生成签名信息。最后,系统会将公钥、私钥、签名信息以及基础信息等全部信息存储至本地数据库。同时,也会 将私钥、签名信息以及基础信息发送至区块链进行存储。其目的主要是为了保证数据的不被篡改性。此时,区块链在接收到这些信息后,会反馈一个标识信息至人员信息验证系统,由人员信息验证系统存储至本地数据库。存储位置为本地数据库的第一存储单元。
在一例子中,获取服务人员的基础信息后,可能服务公司还希望对服务人员的背景信息进行调查,那么,获取服务人员的基础信息之后,会将服务人员的基础信息发送至从事人员背景调查的服务机构。背景调查服务机构会根据人员信息验证系统提供的服务人员的基础信息进行背景调查,并给出背景调查结果,背景调查结果例如包括合格和不合格两种,具体的衡量标准由背景调查公司给出,并非本实施例所要研究的重点,因此这里不再过多说明。例如背景调查服务机构给出的被查验人员的背景调查结果为合格,那么则根据被查验人员的基础信息生成公钥和私钥。然后,利用私钥生成签名信息。在此之后,将基础信息、背景调查结果、公钥、私钥以及签名信息等存储到本地数据库,并将基础信息、私钥、背景调查结果以及签名信息发送至区块链。区块链同样会反馈一个标识信息至人员信息存储系统,人员信息存储系统将标识信息存储至本地数据库。为了与上一例子中的标识信息做区别,第一个例子中的标识信息定义为第一标识信息;本例子中的标识信息定义为第二标识信息。而且,本例子中的所有信息存储在本地数据库的第二存储单元。如果背景调查结果不合格,则直接反馈注册失败,并将注册失败原因反馈至人员信息系统。
标识信息就是用来建立本地数据库相应存储单元和区块链之间的唯一“桥梁”。如果没有标识信息就无法从区块链调取与标识信息对应的数据。
例如,没有第一标识信息,那么第一个例子中存储在区块链中的所有数据将无法获取。同样的道理,没有第二标识信息,本例子中存储在区块链中的所有数据同样无法获取。
在另一例子中,如果人员信息存储系统需要获取服务人员的 在自己工作过的服务机构中的所有服务订单及服务评价信息。包括评价、点赞等信息。则需要与其他服务机构之间建立通信连接。所有服务机构将自身包含的所有服务人员对应的服务订单信息、服务评价信息等均同步到人员信息存储系统。人员信息存储系统会根据每一个服务人员的基础信息生成公钥和私钥。根据私钥生成签名信息。然后,将基础信息、公钥、私钥、签名信息和与该服务人员对应的服务订单信息、服务订单评价信息等一同存储至数据库的第三存储单元。并将基础信息、私钥、签名新以及服务人员对应的服务订单信息、服务订单评价信息等发送至区块链。区块链将会反馈第三标识信息至人员信息存储系统,并由人员信息存储系统存储至第三存储单元。在某些实施方案中标识信息可以为交易ID。
本公开实施例提供的人员信息存储方法,获取注册人员的基础信息,对基础信息进行预处理,获取与注册人员对应的人员信息识别特征。将基础信息和人员信息识别特征发送至区块链。然后接收区块链反馈的与人员信息识别特征对应的标识信息,将注册人员的基础信息、人员信息识别特征和标识信息存储至本地数据库。标识信息作为本地数据库后续访问区块链的身份识别信息,也即是访问区块链的“通行证”。将上述信息存储至本地数据库则是为了方便后续使用,而区块链存在不可篡改的特性。因此,将注册人员的基础信息、人员信息识别特征等存储在区块链,是为了防止不法分子对注册人员的信息进行篡改。为后续如果需要验证某一个服务人员的人员信息是否合法做好前期保证。即,后续可以判定某一个人员的人员信息是否合法,可以拿本地数据库的人员信息和区块链存储的信息进行比对,验证该人员是否是已经注册过的合法人员。通过该种方式,防止不法分子冒充注册人员执行不法勾当,也方便后续用户及时了解服务人员的身份信息,降低对自身人身安全和财产安全构成威胁的风险等级。
在执行上述过程的基础上,下面则介绍本公开一实施例提供的人员信息验证方法,如图3所示,图3示出了本公开实施例提 供的人员信息验证方法的流程图,该方法包括:
310,获取被查验人员的基础信息;
320,根据基础信息从本地数据库中调取与基础信息对应的第一人员信息识别特征和标识信息;
330,根据标识信息,从区块链调取第二人员信息识别特征;
340,将第一人员信息识别特征和第二人员信息识别特征进行比对,获取比对结果;以及
350,根据比对结果,验证被查验人员是否为预设定的合法人员。
在关于310的某些实施方案中,被查验人员的基础信息可以包括被查验人员的身份信息和身体特征信息。具体的身份信息和身体特征信息均在上一实施例中做了描述,这不再过多说明。
在某些实施方案中,在上文中已经给出了前期做人员信息存储的工作。这里的第一人员信息识别特征,包括已经存储在本地数据库的公钥、私钥和签名信息。具体的从本地数据库的哪个存储单元获取第一人员信息识别特征,会根据具体应用场景不同而有所区别。具体参见上一实施例,这里不做过多说明。
应用场景可以为对被查验人员的身份合法性验证、被查验人员的服务评价信息进行验证,或者是对被查验人员的背景信息进行调查,人员信息识别特征包括:公钥、私钥和签名信息;其中,公钥和私钥根据基础信息生成,签名信息根据私钥生成。此时的标识信息,类似于上一实施例所介绍的第一标识信息至第三标识信息,第一标识信息对应的是被查验人员的身份合法性验证的应用场景,第二标识信息对应的是被查验人员的背景信息合格性验证的应用场景,第三标识信息对应的是被查验人员的服务评价信息验证的应用场景。
上述两种情况中,人员信息识别特征均包括第一人员信息识别特征和第二人员信息识别特征。
在某些实施方案中,由于第一人员信息识别特征存储至本地数据库,很容易被人篡改,或者是删除等,又或者有些不法分子 冒名顶替预设定的合法人员,获取预设定的合法人员的人员信息后,顶替预设定人员以工作名义执行非法活动。为避免这些情况发生,所以才需要从区块链调取第二人员信息识别特征。也即是,根据标识信息,从区块链获取第二人员信息识别特征。这里所说的第二人员信息识别特征就是人员信息存储系统将已注册人员的人员信息识别特征存储至本地数据库后,又发送至区块链进行存储的人员信息识别特征。也即是根据预设定的合法人员的基础信息生成并存储至区块链的人员信息识别特征。
在某些实施方案中,比较第一人员信息识别特征和第二人员信息识别特征是否为同一人员信息识别特征,可以包括,拿第一人员信息识别特征中的公钥和第二人员信息识别特征中的公钥进行比对,如果不一致,说明被查验人员的信息异常,被查验人员并非为预设定的合法人员。如果公钥一致,则拿本地数据库中的公钥再去对第二人员信息识别特征中的签名信息进行验证。如果验证失败,依然认为被查验人员的信息异常,被查验人员并非为预设定的合法人员。相反,如果验证成功,则认为被查验人员的信息正常,确定被查验人员为预设定的合法人员。
在某些实施方案中,当应用场景为对被查验人员的服务评价信息进行验证时,本地数据库和区块链中,均还存储有服务订单信息以及与每一份服务订单对应的服务评价明文。
存储这个信息,主要是为了雇主后续在选择服务人员时,也可以将服务评价信息作为参考,进行选择,也即是下一实施例所要介绍的方法。具体参见下一实施例,这里不做过多介绍。
本公开实施例提供的人员信息验证方法,获取被查验人员的基础信息,然后根据基础信息从本地数据库中调取与基础信息对应的第一人员信息识别特征和标识信息。标识信息为本地数据库和外界数据库之间的通信标识。可以根据标识信息,从区块链中调取第二人员信息识别特征。最终,根据第一人员信息识别特征和第二人员信息识别特征的比对结果,来验证被查验人员是否为预设定的合法人员。通过该种方式,可以方便用户在下单后,立 即获取服务人员的基础信息,并根据基础信息最终验证即将上门服务的工作人员是否为预设定的合法人员。尽量避免不法分子冒充服务人员进行诈骗、实时犯罪的情况发生;以及通过该种方式,方便雇主更加了解服务人员的过往,增加雇主对服务人员选择的主动性,由此降低威胁客户的人身和财产安全等的风险。
在上一实施例基础上,图4示出了本公开实施例提供的人员雇佣选择方法流程示意图,如图4所示,该方法包括:
410,获取服务人员的基础信息;
420,采用上一实时例的方法验证服务人员的身份信息进行验证,确定服务人员的身份信息是否合法;
430,当确定服务人员的身份信息合法时,采用上一实施例的方法对服务人员的背景信息进行验证,确定服务人员的背景信息是否合格;
440,当对服务人员的背景信息验证合格后,获取服务人员在已供职过的所有服务机构中的服务评价信息;
450,采用上一实施例中的方法对服务评价信息进行验证;以及
460,当验证服务评价信息有效时,将人员身份信息、背景调查信息、服务评价信息,以及与服务评价信息对应的服务订单信息共同反馈至雇主终端设备,以便雇主确定是否雇佣服务人员。
在关于410的某些实施方案中,获取方式可以包括但不限于如下几种方式:
第一种,雇主在服务单上点击查看配送人员信息按钮;系统直接从本地数据库调取服务人员的基础信息。第二种,配送人员上门服务时,雇主通过终端设备摄像头采集服务人员的身体特征,例如采集人脸特征,上传至人员信息验证系统,通过人员信息验证系统进行人脸验证;或者通过设备指纹识别器采集指纹上传至人员信息验证系统,通过人员信息验证系统进行指纹验证。具体验证过程参见上一实施例。
在关于440的某些实施方案中,可以从如上一实施例中介绍 的人员信息验证系统中由于同步了所有服务机构的服务人员对应的服务订单信息和服务评价信息等。所以,在确定服务人员的背景信息验证合格后,就可以获取服务人员在已供职过的所有服务机构中的服务评价信息。然后执行下一步骤。
在关于460的某些实施方案中,人员身份信息、背景调查信息、服务订单信息以及服务评价信息等均属于人员信息,且在验证这些信息有效的情况下,向雇主终端发送的服务订单信息和服务评价信息,而这些信息可以从本地数据库获取,也可以区块链获取。
在某些实施方案中,当验证服务人员的身份信息是否为有效身份时,标识信息为第一标识信息;第一标识信息为本地处理器将已注册的服务人员的人员信息识别特征存储至区块链后,区块链向本地处理器发送的第一标识信息,第一标识信息和已注册的服务人员的人员信息识别特征存储在本地数据库的第一存储位置;
或者,当验证服务人员的背景信息是否为有效身份时,标识信息为第二标识信息;第二标识信息为本地处理器将已注册的服务人员的人员信息识别特征存储至区块链后,区块链向本地处理器发送的第二标识信息,第二标识信息、已注册的服务人员的人员信息识别特征,以及背景信息调查结果均存储在本地数据库的第二存储位置;
或者,当验证服务人员的服务评价信息是否有效时,标识信息为第三标识信息;第三标识信息为本地处理器将已注册的服务人员的人员信息识别特征存储至区块链后,区块链向本地处理器发送的第三标识信息,第三标识信息、已注册的服务人员的人员信息识别特征,以及服务人员在已供职过的所有服务机构中的全部服务订单、服务评价信息存储在本地数据库的第三存储位置。
还需要说明的是,如果在上述任一个环节,验证服务人员的人员信息存在异常,也同样会将异常结果和异常原因发送至雇主终端设备。也即是,当验证服务人员的身份、服务人员进行背景信息以及服务人员在已供职过的所有服务机构中的服务信息中任 一项无效时,停止验证,反馈雇主终端设备验证失败结果和失败原因。以便雇主及时采取相应的措施。
本公开实施例提供的人员雇佣选择的方法,首先获取服务人员的基础信息,然后验证服务人员的人员信息是否有效。如果是有效身份,那么可以确定服务人员的背景信息是否为合格。如果合格,再验证服务评价信息是否有效。只有上述这几款条件全部验证完成,且在均为有效的情况下,才会将服务评价信息以及与服务评价信息对应的服务订单信息共同发送至雇主终端设备,进而方便雇主根据这些信息确认,是否继续雇佣该服务人员上门服务。通过该种方式,可以方便用户在下单后,立即获取服务人员的基础信息,并根据基础信息最终验证即将上门服务的工作人员是否为预设定的合法人员。尽量避免不法分子冒充服务人员进行诈骗、实时犯罪的情况发生;以及通过该种方式,方便雇主更加了解服务人员的过往,增加雇主对服务人员选择的主动性,由此降低威胁客户的人身和财产安全等的风险。
图5示出了本公开实施例提供的人员信息存储装置,该装置包括:获取单元501、处理单元502、发送单元503以及接收单元504。
获取单元501,用于获取注册人员的基础信息;
处理单元502,用于对基础信息进行预处理,获取与注册人员对应的人员信息识别特征;
发送单元503,用于将基础信息和人员信息识别特征发送至区块链;
接收单元504,用于接收区块链反馈的与人员信息识别特征对应的标识信息;以及
处理单元502还用于,将注册人员的基础信息、人员信息识别特征以及标识信息存储本地数据库,其中,标识信息作为本地数据库后续访问区块链的身份识别信息。
在某些实施方案中,基础信息包括注册人员的身份信息和身体特征信息。
在某些实施方案中,人员信息识别特征包括:公钥、私钥以及签名信息,并且处理单元502用于根据身体特征信息生成公钥和私钥;以及
根据私钥生成签名信息。
在某些实施方案中,当应用场景为对注册人员的服务评价信息进行存储时,本地数据库和区块链中,均还存储有与注册人员的服务订单信息以及与每一份服务订单对应的服务评价明文。
在某些实施方案中,当应用场景为对注册人员的背景调查信息进行存储时,接收单元504还用于,获取注册人员的背景调查结果;并且
处理单元502还用于,确定背景调查结果是否合格。只有在确定背景调查结果合格时,才会对基础信息进行预处理,获取与注册人员对应的人员信息特征。
而且,本地数据库和区块链中,均还存储背景调查结果,其中,背景调查结果为背景调查系统对基础信息进行调查后获取的调查结果。
本实施例提供的人员信息存储装置中各功能部件所执行的功能均已在图1对应的实施例中做了详细介绍,因此这里不再赘述。
本公开实施例提供的人员信息存储装置,获取注册人员的基础信息,对基础信息进行预处理,获取与注册人员对应的人员信息识别特征。将基础信息和人员信息识别特征发送至区块链。然后接收区块链反馈的与人员信息识别特征对应的标识信息,将注册人员的基础信息、人员信息识别特征和标识信息存储至本地数据库。标识信息作为本地数据库后续访问区块链的身份识别信息,也即是访问区块链的“通行证”。将上述信息存储至本地数据库则是为了方便后续使用,而区块链存在不可篡改的特性。因此,将注册人员的基础信息、人员信息识别特征等存储在区块链,是为了防止不法分子对注册人员的信息进行篡改。为后续如果需要验证某一个服务人员的人员信息是否合法做好前期保证。即,后续可以判定某一个人员的人员信息是否合法,可以拿本地数据库 的人员信息和区块链存储的信息进行比对,验证该人员是否是已经注册过的合法人员。通过该种方式,防止不法分子冒充注册人员执行不法勾当,也方便后续用户及时了解服务人员的身份信息,降低对自身人身安全和财产安全构成威胁的风险等级。
图6示出了本公开实施例提供的人员信息验证装置,该装置包括:获取单元601、调取单元602以及处理单元603。其中:
获取单元601,用于获取被查验人员的基础信息;
调取单元602,用于根据基础信息从本地数据库中调取与基础信息对应的第一人员信息识别特征和标识信息,标识信息作为本地数据库后续访问区块链的身份识别信息;和
根据标识信息,从区块链调取第二人员信息识别特征;以及
处理单元603,将第一人员信息识别特征和第二人员信息识别特征进行比对,获取比对结果;和
根据比对结果,验证被查验人员是否为预设定的合法人员。
在某些实施方案中,被查验人员的基础信息至少包括身份信息和身体特征信息。
在某些实施方案中,人员信息识别特征包括:公钥、私钥和签名信息;
其中,公钥为根据基础信息生成的公钥,签名信息为根据私钥生成的签名信息,其中,私钥为根据基础信息生成的私钥,人员信息识别特征包括第一人员信息识别特征和第二人员信息识别特征。
在某些实施方案中,处理单元603用于,将第一人员信息识别特征中的公钥和第二人员信息识别特征中的公钥进行比对;
当确定第一人员信息识别特征中的公钥和第二人员信息识别特征中的公钥一致时,利用第一人员信息识别特征中的公钥对第二人员信息识别特征中的签名信息进行验证;以及
如果验证成功,则确定被查验人员为预设定的合法人员;否则,验证被查验人员并非为预设定的合法人员。
在某些实施方案中,身体特征信息包括人脸特征和/或指纹特 征。
在某些实施方案中,第二人员信息识别特征为本地处理器将已注册人员的人员信息识别特征存储至本地数据库后,又发送至区块链进行存储的人员信息识别特征。
在某些实施方案中,当应用场景为对被查验人员的服务评价信息进行验证时,本地数据库和区块链中,均还存储有服务订单信息以及与每一份服务订单对应的服务评价明文。本实施例提供的人员信息验证装置中各功能部件所执行的功能均已在图3对应的实施例中做了详细介绍,因此这里不再赘述。
本公开实施例提供的人员信息验证装置,获取被查验人员的基础信息,然后根据基础信息从本地数据库中调取与基础信息对应的第一人员信息识别特征和标识信息。标识信息为本地数据库和外界数据库之间的通信标识。可以根据标识信息,从区块链中调取第二人员信息识别特征。最终,根据第一人员信息识别特征和第二人员信息识别特征的比对结果,来验证被查验人员是否为预设定的合法人员。通过该种方式,可以方便用户在下单后,立即获取服务人员的基础信息,并根据基础信息最终验证即将上门服务的工作人员是否为预设定的合法人员。尽量避免不法分子冒充服务人员进行诈骗、实时犯罪的情况发生;以及通过该种方式,方便雇主更加了解服务人员的过往,增加雇主对服务人员选择的主动性,由此降低威胁客户的人身和财产安全等的风险。
图7示出了本公开实施例提供的人员信息存储系统的结构示意图,图7所示的人员信息存储系统700包括:至少一个处理器701、存储器702、至少一个网络接口703和其他用户接口704。人员信息存储人员信息存储系统700中的各个组件通过总线系统705耦合在一起。可理解,总线系统705用于实现这些组件之间的连接通信。总线系统705除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图5中将各种总线都标为总线系统705。
其中,用户接口704可以包括显示器、键盘或者点击设备(例 如,鼠标,轨迹球(trackball)、触感板或者触摸屏等。
可以理解,本公开实施例中的存储器702可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本文描述的存储器702旨在包括但不限于这些和任意其它适合类型的存储器。
在某些实施方案中,存储器702存储了如下的元素,可执行单元或者数据结构,或者他们的子集,或者他们的扩展集:操作系统7021和应用程序7022。
其中,操作系统7021,包含各种系统程序,例如框架层、核心库层、驱动层等,用于实现各种基础业务以及处理基于硬件的任务。应用程序7022,包含各种应用程序,例如媒体播放器(Media Player)、浏览器(Browser)等,用于实现各种应用业务。实现本公开实施例方法的程序可以包含在应用程序7022中。
在本公开实施例中,通过调用存储器702存储的程序或指令,其中,可以是应用程序7022中存储的程序或指令,处理器701用于执行各方法实施例所提供的方法,例如包括:
获取注册人员的基础信息;
对基础信息进行预处理,获取与注册人员对应的人员信息识 别特征;
将基础信息和人员信息识别特征发送至区块链;
接收区块链反馈的与人员信息识别特征对应的标识信息;以及
将注册人员的基础信息、人员信息识别特征以及标识信息存储本地数据库,其中,标识信息作为本地数据库后续访问区块链的身份识别信息。
在某些实施方案中,基础信息包括注册人员的身份信息和身体特征信息。
在某些实施方案中,根据身体特征信息生成公钥和私钥;根据私钥生成签名信息。
在某些实施方案中,当应用场景为对注册人员的服务评价信息进行存储时,本地数据库和区块链中,均还存储有与注册人员的服务订单信息以及与每一份服务订单对应的服务评价明文。
在某些实施方案中,当应用场景为对注册人员的背景调查信息进行存储时,对基础信息进行预处理,获取与注册人员对应的人员信息识别特征之前,获取注册人员的背景调查结果;以及
当背景调查结果合格时,对基础信息进行预处理,获取与注册人员对应的人员信息特征;且本地数据库和区块链中,均存储背景调查结果,其中,背景调查结果为背景调查系统对基础信息进行调查后获取的调查结果。
上述本公开实施例揭示的方法可以应用于处理器701中,或者由处理器701实现。处理器701可能是集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器701中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器701可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本公开实施例中的公开的各方法、 步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本公开实施例所公开的方法可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件单元组合执行完成。软件单元可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器702,处理器701读取存储器702中的信息,结合其硬件完成上述方法。
可以理解的是,本文描述的这些实施例可以用硬件、软件、固件、中间件、微码或其组合来实现。对于硬件实现,处理单元可以实现在一个或多个专用集成电路(Application Specific Integrated Circuits,ASIC)、数字信号处理器(Digital Signal Processing,DSP)、数字信号处理设备(DSPDevice,DSPD)、可编程逻辑设备(Programmable Logic Device,PLD)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、通用处理器、控制器、微控制器、微处理器、用于执行本公开功能的其它电子单元或其组合中。
对于软件实现,可通过执行本文功能的单元来实现本文的技术。软件代码可存储在存储器中并通过处理器执行。存储器可以在处理器中或在处理器外部实现。
本实施例提供的人员信息存储系统可以是如图7中所示的人员信息存储系统,可执行如图1中所示的人员信息存储方法,进而实现图1所示人员信息存方法的技术效果,请参照图1相关描述,为简洁描述,在此不作赘述。
图8示出了本公开实施例提供的人员信息验证系统的结构示意图,图8所示的人员信息验证系统800包括:至少一个处理器801、存储器802、至少一个网络接口803和其他用户接口804。人员信息验证人员信息验证系统800中的各个组件通过总线系统805耦合在一起。可理解,总线系统805用于实现这些组件之间的连接通信。总线系统805除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图5中将 各种总线都标为总线系统805。
其中,用户接口804可以包括显示器、键盘或者点击设备(例如,鼠标,轨迹球(trackball)、触感板或者触摸屏等。
可以理解,本公开实施例中的存储器802可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本文描述的存储器802旨在包括但不限于这些和任意其它适合类型的存储器。
在某些实施方案中,存储器802存储了如下的元素,可执行单元或者数据结构,或者他们的子集,或者他们的扩展集:操作系统8021和应用程序8022。
其中,操作系统8021,包含各种系统程序,例如框架层、核心库层、驱动层等,用于实现各种基础业务以及处理基于硬件的任务。应用程序8022,包含各种应用程序,例如媒体播放器(Media Player)、浏览器(Browser)等,用于实现各种应用业务。实现本公开实施例方法的程序可以包含在应用程序8022中。
在本公开实施例中,通过调用存储器802存储的程序或指令,其中,可以是应用程序8022中存储的程序或指令,处理器801用于执行各方法实施例所提供的方法,例如包括:
获取被查验人员的基础信息;
根据基础信息从本地数据库中调取与基础信息对应的第一人员信息识别特征和标识信息,标识信息作为本地数据库后续访问区块链的身份识别信息;
根据标识信息,从区块链调取第二人员信息识别特征;
将第一人员信息识别特征和第二人员信息识别特征进行比对,获取比对结果;以及
根据比对结果,验证被查验人员是否为预设定的合法人员。
在某些实施方案中,被查验人员的基础信息至少包括身份信息和身体特征信息。
在某些实施方案中,人员信息识别特征包括:公钥、私钥和签名信息;
其中,公钥为根据基础信息生成的公钥,签名信息为根据私钥生成的签名信息,其中,私钥为根据基础信息生成的私钥,人员信息识别特征包括第一人员信息识别特征和第二人员信息识别特征。
在某些实施方案中,将第一人员信息识别特征中的公钥和第二人员信息识别特征中的公钥进行比对;
当确定第一人员信息识别特征中的公钥和第二人员信息识别特征中的公钥一致时,利用第一人员信息识别特征中的公钥对第二人员信息识别特征中的签名信息进行验证;以及
如果验证成功,则确定被查验人员为预设定的合法人员;否则,验证被查验人员并非为预设定的合法人员。
在某些实施方案中,身体特征信息包括人脸特征和/或指纹特征。
在某些实施方案中,第二人员信息识别特征为本地处理器将已注册人员的人员信息识别特征存储至本地数据库后,又发送至区块链进行存储的人员信息识别特征。
在某些实施方案中,当应用场景为对被查验人员的服务评价信息进行验证时,本地数据库和区块链中,均还存储有服务订单 信息以及与每一份服务订单对应的服务评价明文。
上述本公开实施例揭示的方法可以应用于处理器801中,或者由处理器801实现。处理器801可能是集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器801中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器801可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本公开实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本公开实施例所公开的方法可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件单元组合执行完成。软件单元可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器802,处理器801读取存储器802中的信息,结合其硬件完成上述方法。
可以理解的是,本文描述的这些实施例可以用硬件、软件、固件、中间件、微码或其组合来实现。对于硬件实现,处理单元可以实现在一个或多个专用集成电路(Application Specific Integrated Circuits,ASIC)、数字信号处理器(Digital Signal Processing,DSP)、数字信号处理设备(DSPDevice,DSPD)、可编程逻辑设备(Programmable Logic Device,PLD)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、通用处理器、控制器、微控制器、微处理器、用于执行本公开功能的其它电子单元或其组合中。
对于软件实现,可通过执行本文功能的单元来实现本文的技术。软件代码可存储在存储器中并通过处理器执行。存储器可以在处理器中或在处理器外部实现。
本实施例提供的人员信息验证系统可以是如图8中所示的人 员信息验证系统,可执行如图3中所示的人员信息验证方法,进而实现图3所示人员信息存方法的技术效果,请参照图3相关描述,为简洁描述,在此不作赘述。
本公开实施例还提供了存储介质(计算机可读存储介质)。这里的存储介质存储有一个或者多个程序。其中,存储介质可以包括易失性存储器,例如随机存取存储器;存储器也可以包括非易失性存储器,例如只读存储器、快闪存储器、硬盘或固态硬盘;以及存储器还可以包括上述种类的存储器的组合。
当存储介质中一个或者多个程序可被一个或者多个处理器执行,以实现上述在人员信息存储系统侧执行的人员信息存储方法。
处理器用于执行存储器中存储的人员信息存储程序,以实现以下在人员信息存储系统侧执行的人员信息存储方法:
获取注册人员的基础信息;
对基础信息进行预处理,获取与注册人员对应的人员信息识别特征;
将基础信息和人员信息识别特征发送至区块链;
接收区块链反馈的与人员信息识别特征对应的标识信息;以及
将注册人员的基础信息、人员信息识别特征以及标识信息存储本地数据库,其中,标识信息作为本地数据库后续访问区块链的身份识别信息。
在某些实施方案中,基础信息包括注册人员的身份信息和身体特征信息。
在某些实施方案中,人员信息识别特征包括:公钥、私钥以及签名信息,并且当应用场景为对注册人员的合法身份信息进行存储,或者是对注册人员的服务评价信息进行存储时,根据身体特征信息生成公钥和私钥;以及根据私钥生成签名信息。
在某些实施方案中,人员信息识别特征包括:公钥、私钥以及签名信息,并且当应用场景为对注册人员背景调查信息进行存储时,根据身体特征信息生成公钥和私钥;以及
根据私钥,生成签名信息。
在某些实施方案中,当应用场景为对注册人员的服务评价信息进行存储时,本地数据库和区块链中,均还存储有与注册人员的服务订单信息以及与每一份服务订单对应的服务评价明文。
在某些实施方案中,当应用场景为对注册人员的背景调查信息进行存储时,对基础信息进行预处理,获取与注册人员对应的人员信息识别特征之前,获取注册人员的背景调查结果;以及
当背景调查结果合格时,对基础信息进行预处理,获取与注册人员对应的人员信息特征;且本地数据库和区块链中,均存储背景调查结果,其中,背景调查结果为背景调查系统对基础信息进行调查后获取的调查结果。
本公开实施例还提供了存储介质(计算机可读存储介质)。这里的存储介质存储有一个或者多个程序。其中,存储介质可以包括易失性存储器,例如随机存取存储器;存储器也可以包括非易失性存储器,例如只读存储器、快闪存储器、硬盘或固态硬盘;并且存储器还可以包括上述种类的存储器的组合。
当存储介质中一个或者多个程序可被一个或者多个处理器执行,以实现上述在人员信息验证系统侧执行的人员信息验证方法。
处理器用于执行存储器中存储的人员信息验证程序,以实现以下在人员信息验证系统侧执行的人员信息验证方法:
获取被查验人员的基础信息;
根据基础信息从本地数据库中调取与基础信息对应的第一人员信息识别特征和标识信息,标识信息作为本地数据库后续访问区块链的身份识别信息;
根据标识信息,从区块链调取第二人员信息识别特征;
将第一人员信息识别特征和第二人员信息识别特征进行比对,获取比对结果;以及
根据比对结果,验证被查验人员是否为预设定的合法人员。
在某些实施方案中,被查验人员的基础信息至少包括身份信息和身体特征信息。
在某些实施方案中,当应用场景为对被查验人员的身份合法性验证或者是服务评价信息验证时,人员信息识别特征包括:公钥、私钥和签名信息;
其中,公钥为根据基础信息生成的公钥,签名信息为根据私钥生成的签名信息,其中,私钥为根据基础信息生成的私钥,人员信息识别特征包括第一人员信息识别特征和第二人员信息识别特征。
在某些实施方案中,当应用场景为对被查验人员的背景信息合法性验证时,人员信息识别特征包括:公钥、私钥和签名信息;
其中,公钥为根据基础信息生成的公钥,签名信息为根据私钥和背景调查结果生成的签名信息,其中,私钥为根据基础信息生成的私钥,人员信息识别特征包括第一人员信息识别特征和第二人员信息识别特征,背景调查结果为背景调查系统对基础信息进行调查后获取的调查结果。
在某些实施方案中,将第一人员信息识别特征中的公钥和第二人员信息识别特征中的公钥进行比对;
当确定第一人员信息识别特征中的公钥和第二人员信息识别特征中的公钥一致时,利用第一人员信息识别特征中的公钥对第二人员信息识别特征中的签名信息进行验证;以及
如果验证成功,则确定被查验人员为预设定的合法人员;否则,验证被查验人员并非为预设定的合法人员。
在某些实施方案中,身体特征信息包括人脸特征和/或指纹特征。
在某些实施方案中,第二人员信息识别特征为本地处理器将已注册人员的人员信息识别特征存储至本地数据库后,又发送至区块链进行存储的人员信息识别特征。
在某些实施方案中,当应用场景为对被查验人员的服务评价信息进行验证时,本地数据库和区块链中,均还存储有服务订单信息以及与每一份服务订单对应的服务评价明文。
专业人员应该还可以进一步意识到,结合本文中所公开的实 施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本公开的范围。
结合本文中所公开的实施例描述的方法或算法的步骤可以用硬件、处理器执行的软件模块,或者二者的结合来实施。软件模块可以置于随机存储器(RAM)、内存、只读存储器(ROM)、电可编程ROM、电可擦除可编程ROM、寄存器、硬盘、可移动磁盘、CD-ROM、或技术领域内所公知的任意其它形式的存储介质中。
以上的具体实施方式,对本公开的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上仅为本公开的具体实施方式而已,并不用于限定本公开的保护范围,凡在本公开的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本公开的保护范围之内。

Claims (14)

  1. 人员信息存储方法,其包括:
    获取注册人员的基础信息;
    对所述基础信息进行预处理,获取与所述注册人员对应的人员信息识别特征;
    将所述基础信息和所述人员信息识别特征发送至区块链;
    接收所述区块链反馈的与所述人员信息识别特征对应的标识信息;以及
    将所述注册人员的基础信息、所述人员信息识别特征以及所述标识信息存储本地数据库,其中,所述标识信息作为所述本地数据库后续访问所述区块链的身份识别信息。
  2. 如权利要求1所述的方法,其中,所述基础信息包括所述注册人员的身份信息和身体特征信息。
  3. 如权利要求2所述的方法,其中,所述人员信息识别特征包括:公钥、私钥以及签名信息,并且所述对所述基础信息进行预处理,获取与所述注册人员对应的人员信息识别特征包括:
    根据所述身体特征信息生成公钥和私钥;以及
    根据所述私钥生成所述签名信息。
  4. 如权利要求3所述的方法,其中,当应用场景为对所述注册人员的服务评价信息进行存储时,所述本地数据库和所述区块链中,均还存储有与所述注册人员的服务订单信息以及与每一份服务订单对应的服务评价明文。
  5. 如权利要求3所述的方法,其中,当应用场景为对所述注册人员的背景调查信息进行存储时,所述对所述基础信息进行预处理,获取与所述注册人员对应的人员信息识别特征之前,所述方法还包括:
    获取所述注册人员的背景调查结果;以及
    当所述背景调查结果合格时,对所述基础信息进行预处理,获取与所述注册人员对应的人员信息特征;且所述本地数据库和所述区块链中,均存储所述背景调查结果,其中,所述背景调查结果为背景调查系统对所述基础信息进行调查后获取的调查结果。
  6. 人员信息验证方法,其包括:
    获取被查验人员的基础信息;
    根据所述基础信息从本地数据库中调取与所述基础信息对应的第一人员信息识别特征和标识信息;
    根据所述标识信息,从区块链调取第二人员信息识别特征;
    将所述第一人员信息识别特征和所述第二人员信息识别特征进行比对,获取比对结果;以及
    根据所述比对结果,验证所述被查验人员是否为预设定的合法人员,其中,所述第二人员信息识别特征为根据所述预设定的合法人员的基础信息生成的人员信息识别特征。
  7. 如权利要求6所述的方法,其中,所述被查验人员的基础信息至少包括身份信息和身体特征信息。
  8. 如权利要求7所述的方法,其中,所述人员信息识别特征包括:公钥、私钥和签名信息;其中,所述公钥和私钥根据所述基础信息生成,所述签名信息为根据所述私钥生成的签名信息,所述人员信息识别特征包括第一人员信息识别特征和所述第二人员信息识别特征。
  9. 如权利要求8所述的方法,其中,所述将所述第一人员信息识别特征和所述第二人员信息识别特征进行比对,获取比对结果包括:
    将所述第一人员信息识别特征中的公钥和所述第二人员信息 识别特征中的公钥进行比对;
    当确定所述第一人员信息识别特征中的公钥和所述第二人员信息识别特征中的公钥一致时,利用所述第一人员信息识别特征中的公钥对所述第二人员信息识别特征中的签名信息进行验证;以及
    如果验证成功,则确定所述被查验人员为预设定的合法人员;否则,验证所述被查验人员并非为预设定的合法人员。
  10. 如权利要求8或9所述的方法,其中,当应用场景为对所述被查验人员的服务评价信息验证时,所述本地数据库和所述区块链中,均还存储有服务订单信息以及与每一份服务订单对应的服务评价明文。
  11. 人员信息存储系统,其包括:至少一个处理器和存储器;其中,所述处理器用于执行所述存储器中存储的人员信息存储程序,以实现权利要求1至5中任一项所述的人员信息存储方法。
  12. 人员信息验证系统,其包括:至少一个处理器和存储器;其中,所述处理器用于执行所述存储器中存储的人员信息存储程序,以实现权利要求6至10中任一项所述的人员信息验证方法。
  13. 计算机存储介质,其存储有一个或者多个程序,所述一个或者多个程序可被权利要求11所述的人员信息存储系统执行,以实现权利要求1至5中任一项所述的人员信息验证方法。
  14. 计算机存储介质,其存储有一个或者多个程序,所述一个或者多个程序可被权利要求12所述的人员信息验证系统执行,以实现权利要求6至10中任一项所述的人员信息验证方法。
PCT/CN2021/087125 2020-04-16 2021-04-14 人员信息存储、验证方法、系统及存储介质 WO2021208939A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010303626.5 2020-04-16
CN202010303626.5A CN111541671A (zh) 2020-04-16 2020-04-16 人员信息存储、验证方法、系统及存储介质

Publications (1)

Publication Number Publication Date
WO2021208939A1 true WO2021208939A1 (zh) 2021-10-21

Family

ID=71978765

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/087125 WO2021208939A1 (zh) 2020-04-16 2021-04-14 人员信息存储、验证方法、系统及存储介质

Country Status (2)

Country Link
CN (1) CN111541671A (zh)
WO (1) WO2021208939A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111541671A (zh) * 2020-04-16 2020-08-14 北京海益同展信息科技有限公司 人员信息存储、验证方法、系统及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107274136A (zh) * 2017-07-11 2017-10-20 西安工业大学 一种产品溯源信息保护方法
CN108846289A (zh) * 2018-06-08 2018-11-20 北京京东尚科信息技术有限公司 选举信息处理方法和处理系统及选举系统和存储介质
US20190324958A1 (en) * 2018-04-24 2019-10-24 Duvon Corporation Autonomous exchange via entrusted ledger immutable distributed database
CN110932859A (zh) * 2018-09-20 2020-03-27 北大方正集团有限公司 用户信息的处理方法、装置、设备及可读存储介质
CN111541671A (zh) * 2020-04-16 2020-08-14 北京海益同展信息科技有限公司 人员信息存储、验证方法、系统及存储介质

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107579817A (zh) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 基于区块链的用户身份验证方法、装置及系统
CN108055258B (zh) * 2017-12-08 2021-02-05 苏州朗润创新知识产权运营有限公司 一种身份数据管理方法、系统和计算机可读存储介质
CN108809953B (zh) * 2018-05-22 2020-09-01 飞天诚信科技股份有限公司 一种基于区块链的匿名身份认证的方法及装置
CN109256195A (zh) * 2018-08-30 2019-01-22 中链科技有限公司 基于区块链的医疗资源数据处理方法及装置
CN109983466B (zh) * 2018-09-27 2023-03-03 区链通网络有限公司 一种基于区块链的账户管理系统以及管理方法、存储介质
CN109639632B (zh) * 2018-11-02 2021-06-22 远光软件股份有限公司 基于区块链的用户信息管理方法、电子设备及存储介质
CN109710823A (zh) * 2018-11-02 2019-05-03 远光软件股份有限公司 基于区块链的档案管理方法、档案管理网络及电子设备
CN109889479B (zh) * 2018-12-21 2022-07-26 中积教育科技有限公司 基于区块链的用户身份存证、验证方法及装置及查证系统
CN109754509A (zh) * 2019-01-08 2019-05-14 浙江汉默生链商科技有限公司 人员进出封闭区域的安全验证方法、装置和系统
CN110555029B (zh) * 2019-09-06 2024-05-14 腾讯科技(深圳)有限公司 基于区块链的票务管理方法、装置及存储介质
CN110942224B (zh) * 2019-10-17 2022-05-24 江苏荣泽信息科技股份有限公司 一种基于区块链的门店固定资产管理系统
CN110910020A (zh) * 2019-11-26 2020-03-24 山东爱城市网信息技术有限公司 一种基于区块链的物业报修进度查询方法及设备、介质
CN110990893A (zh) * 2019-11-29 2020-04-10 山东爱城市网信息技术有限公司 一种基于区块链的家政服务体系管理方法及设备、介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107274136A (zh) * 2017-07-11 2017-10-20 西安工业大学 一种产品溯源信息保护方法
US20190324958A1 (en) * 2018-04-24 2019-10-24 Duvon Corporation Autonomous exchange via entrusted ledger immutable distributed database
CN108846289A (zh) * 2018-06-08 2018-11-20 北京京东尚科信息技术有限公司 选举信息处理方法和处理系统及选举系统和存储介质
CN110932859A (zh) * 2018-09-20 2020-03-27 北大方正集团有限公司 用户信息的处理方法、装置、设备及可读存储介质
CN111541671A (zh) * 2020-04-16 2020-08-14 北京海益同展信息科技有限公司 人员信息存储、验证方法、系统及存储介质

Also Published As

Publication number Publication date
CN111541671A (zh) 2020-08-14

Similar Documents

Publication Publication Date Title
US11288677B1 (en) Adjustment of knowledge-based authentication
US11276131B2 (en) Property management system utilizing a blockchain network
US9641528B2 (en) Systems and methods for multi-stage identity authentication
US7725732B1 (en) Object authentication system
US7779457B2 (en) Identity verification system
US20160371438A1 (en) System and method for biometric-based authentication of a user for a secure event carried out via a portable electronic device
US20180197145A1 (en) Multi-stage service record collection and access
US20040243518A1 (en) Individual identity authentication system
US20050216953A1 (en) System and method for verification of identity
US20080184351A1 (en) System and method for authenticating a person's identity using a trusted entity
US20060018520A1 (en) Biometric-supported name-based criminal history background checks
US20170270629A1 (en) Taxpayer identity determination through external verfication
US8074878B1 (en) System and method of pre-approving applicants for visa processing using an emerging country's international travel approval control card
KR102589662B1 (ko) 인프라 자산 취약점 자동 진단을 통한 컴플라이언스 관리 시스템 및 그 방법
US20180365786A1 (en) System and Method for Verification of a Trust Status
WO2021208939A1 (zh) 人员信息存储、验证方法、系统及存储介质
US20080285814A1 (en) Independent third party real time identity and age verification process employing biometric technology
US10210684B2 (en) System and method for identity verification in a detention environment
CA3147624A1 (en) Identity verification and service provision platform and method
US12052239B2 (en) Systems and methods for authenticating of personal communications cross reference to related applications
US20070067330A1 (en) Security method for verifying and tracking service personnel
US10003464B1 (en) Biometric identification system and associated methods
WO2009114191A1 (en) Citizenship fraud targeting system
US20200126094A1 (en) Medical research fraud detection system and software
US20200387586A1 (en) Novel and innovative means of providing a versatile and extensible data collection mechanism capable of being easily and securely deployed on most any website, mobile device, or other internet application to leverage cloud-based resources to quantitatively and qualitatively improve the identity verification of individuals

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21789150

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21789150

Country of ref document: EP

Kind code of ref document: A1