為了使本技術領域的人員更好地理解本發明中的技術方案,下面將結合本發明實施例中的圖式,對本發明實施例中的技術方案進行清楚、完整地描述,顯然,所描述的實施例僅僅是本發明一部分實施例,而不是全部的實施例。基於本發明中的實施例,本領域具有通常知識者在沒有作出創造性勞動前提下所獲得的所有其他實施例,都應當屬於本發明保護的範圍。
圖1是根據本發明的一個實施例的資訊分享方法的流程圖。圖1的方法由資訊分享裝置執行。應理解,本發明實施例的方案可適用於保單相關的資訊的分享。當然也不排除將本發明實施例的方法應用於其他資訊的分享,例如用戶購買的商品相關的資訊的分享。
如圖1所示出的,在S102處,在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像。
可以理解的是,在S102處的服務平臺可以是能夠為用戶提供服務的任何一個平臺,服務平臺的形式可以是應用程式(Application,APP),APP可以安裝在終端設備上,終端設備例如可以是智慧型手機、電腦等。
可選地,在一些實施例中,第一用戶藉由密碼、指紋認證或者簡訊認證等方式登入服務平臺。以第一用戶藉由密碼登入為例,在第一用戶在服務平臺的登入介面輸入密碼之後,服務平臺驗證第一用戶輸入的密碼是否與第一用戶在該服務平臺註冊時輸入的密碼是否一致。如果一致,則認為第一用戶成功登入服務平臺,如果不一致,則認為第一用戶登入失敗。或者以第一用戶藉由指紋認證登入為例,在第一用戶在服務平臺的登入介面輸入指紋資訊之後,服務平臺驗證第一用戶在登入介面輸入的指紋資訊是否與第一用戶在該服務平臺註冊時錄入的指紋資訊一致。如果一致,則認為第一用戶成功登入服務平臺,如果不一致,則認為第一用戶登入失敗。
進一步地,可以根據第一用戶登入服務平臺時所使用的終端設備的ID確定登入服務平臺的是第一用戶,或者可以根據第一用戶登入服務平臺時所使用的服務賬號確定登入服務平臺的時第一用戶。
可選地,在一些實施例中,在服務平臺上提供可供用戶選擇是否需要分享其他人資訊的選項,如果第一用戶選擇該選項,則提示第一用戶進一步選擇需要分享哪個用戶的資訊,如果第一用戶選擇需要分享第二用戶的資訊,則提示第一用戶需要對第二用戶進行驗證,此時可以讓第一用戶選擇對第二用戶進行驗證的方式,如果選擇藉由生物特徵圖像匹配認證的方式對第二用戶進行認證,則提示第一用戶輸入第二用戶的生物特徵圖像。通常這種情況下,第一用戶需要獲得第二用戶的同意,才能使得服務平臺獲取到第二用戶的生物特徵圖像。例如,第一用戶和第二用戶面對面的場景下,第一用戶征得第二用戶的同意之後,第二用戶進行生物特徵圖像的輸入。由此,可以避免在第二用戶不同意的情況下,將第二用戶的資訊分享給第一用戶,保護第二用戶的資訊的隱私性。
可選地,作為一個例子,在S102處獲取到的第二用戶的第一生物特徵圖像為第二用戶的面部圖像。或者在S102處獲取到的第二用戶的第一生物特徵圖像為第二用戶的指紋圖像。
需要說明的是,在S102處的第二用戶的第一生物特徵圖像可以是直接採集到的第二用戶的生物特徵的圖像,也可以是對採集到的第二用戶的生物特徵的圖形進行處理後得到的圖像,上述的處理例如可以是去雜訊處理。
在S104處,將所述第一生物特徵圖像與所述第二用戶的生物特徵模板進行匹配。
需要說明的是,第二用戶的生物特徵模板是第二用戶事先留存或註冊的生物特徵圖像。
可選地,在一些實施例中,第二用戶的生物特徵模板是在第二用戶之前登入該服務平臺且進行身份認證時留存的生物特徵圖像。並且,可以理解的是,第二用戶的生物特徵模板是可以更新的。例如,每次在第二用戶登入該服務平臺且進行身份認證時,如果身份認證通過,則將第二用戶在此次身份認證過程中輸入的生物特徵圖像作為第二用戶的生物特徵模板。也就是說,可以用認證通過時輸入的生物特徵圖像替換生物特徵模板。由此,可以使得生物特徵模板最大程度反映第二用戶的最新生物特徵,提高對惡意攻擊的防控性能。
在S106處,基於匹配結果,確定是否向所述第一用戶展示所述第二用戶的待分享資訊。
可選地,在一些實施例中,如果匹配成功,則向第一用戶展示所述第二用戶的待分享資訊。即如果匹配通過,將第二用戶的待分享資訊分享給第一用戶。如果匹配失敗,則確定不向第一用戶展示所述第二用戶的待分享資訊。由此,能夠保證第二用戶的資訊的安全性。
在本發明實施例中,可選地,在第一用戶成功登入服務平臺之前,圖1所示的方法還包括:確定所述第二用戶的待分享資訊。
可選地,作為一個例子,可以將在系統中儲存的第二用戶相關的所有資訊確定為第二用戶的待分享資訊。
可選地,作為另一個例子,確定第二用戶的待分享資訊包括:接收第二用戶輸入的選擇指令,將根據所述選擇指令從所述第二用戶相關的資訊中選擇出的資訊,確定為所述待分享資訊。也就是說,系統中儲存有多個與第二用戶相關的資訊,可以根據第二用戶自己的選擇確定第二用戶希望分享給其他用戶的資訊。
進一步地,在一些實施例中,在根據第二用戶自己的選擇確定第二用戶希望分享給其他用戶的資訊之後,可以判斷第二用戶希望分享給其他用戶的資訊中是否有涉及第二用戶的隱私的資訊,如果有則對第二用戶希望分享給其他用戶的資訊進行進一步處理。例如,可以抹除第二用戶希望分享給其他用戶的資訊中涉及第二用戶的隱私的資訊,或者對第二用戶希望分享給其他用戶的資訊中涉及第二用戶的隱私的資訊進行打碼。
可選地,在一些實施例中,所述接收所述第二用戶輸入的選擇指令,包括:在確定所述第二用戶為合法用戶時,接收所述第二用戶輸入的選擇指令。
具體地,在一些實施例中,在確定所述第二用戶為合法用戶之前,圖1所示的方法還包括:獲取所述第二用戶的第二生物特徵圖像;基於所述第二生物特徵圖像上承載的資訊與身份證資訊源中的資訊進行匹配的結果,確定所述第二用戶是否為合法用戶,其中,所述身份證資訊源中包括合法用戶的身份證資訊,所述身份證資訊中包括生物特徵資訊。
換句換說,可以藉由獲取第二用戶的第二生物特徵圖像,並將獲取到的第二生物特徵圖像上承載的資訊與身份證資訊源中的資訊進行匹配,根據匹配的結果確定第二用戶是否為合法用戶。在這裡,身份證資訊源中的資訊可以是從公安網上獲取到的身份證資訊。
舉例來說,第二用戶的第二生物特徵圖像為第二用戶的面部圖像,則將第二用戶的面部圖像與身份證資訊源中的身份證上的頭像資訊進行匹配,如果匹配成功,則認為第二用戶為合法用戶,否則認為第二用戶為非法用戶。或者,第二用戶的生物特徵圖像為第二用戶的指紋圖像,則將第二用戶的指紋圖像與身份證資訊源中的身份正上的指紋資訊進行匹配,如果匹配成功,則認為第二用戶為合法用戶,否則認為第二用戶為非法用戶。
進一步地,在一些實施例中,圖1所示的方法還包括:在第二生物特徵圖像上承載的資訊與身份證資訊源中的資訊匹配成功時,保存所述第二生物特徵圖像;將所述第二生物特徵圖像確定為所述第二用戶的生物特徵模板。也就是說,如果驗證第二用戶為合法用戶,則將此次驗證過程中獲取到的第二用戶的生物特徵圖像儲存下來,作為第二用戶的生物特徵模板,用於後續其他人需要分享第二用戶的待分享資訊時進行匹配驗證的模板。
具體地,在一些實施例中,第二用戶的待分享資訊為與第二用戶的保單相關的資訊,則所述確定所述第二用戶的待分享資訊,包括:確定所述第二用戶的保單中的待分享保單;將所述待分享保單中涉及所述第二用戶的隱私資訊之外的資訊確定為所述待分享資訊。例如,第二用戶有5份保單,但第二用戶只希望將其中3份保單相關的資訊分享給其他用戶,則根據用戶的選擇確定這3份保單,並進一步將這3份保單進行處理,提取其中與第二用戶的隱私無關的資訊,將提取到的資訊確定為第二用戶的待分享資訊。在這裡,對這3份保單進行處理的過程也可以稱為脫敏處理,與第二用戶的隱私無關的資訊例如可以包括保單所涉及的保險產品、保額或保險產品的具體套餐等資訊。
在本發明實施例中,可選地,在向第一用戶展示所述第二用戶的待分享資訊之後,圖1所示的方法還包括:接收所述第一用戶基於所述待分享資訊輸入的購買指令,所述購買指令用於購買第二用戶的保單所涉及的保險產品;基於所述購買指令,產生所述第一用戶的保單。
也就是說,在向第一用戶展示第二用戶的待分享資訊之後,第一用戶就能查閱第二用戶分享的與第二用戶的保單相關的資訊,如果第一用戶查閱到第二用戶的保單涉及的保險產品中有自己滿意的保險產品,則可以直接進入產品詳情,然後購買此保險產品,由此產生關聯購買,提高保險產品的銷售量和銷售速度。
圖2是根據本發明的一個具體實施例的資訊分享方法的流程圖。圖2的方法由資訊分享裝置執行。
如圖2所示出的,在S202處,採集用戶A的面部特徵圖像,並進行認證。
具體地,在S202中,用戶A在刷臉時,採集用戶A的面部特徵圖像,然後將獲取到的面部特徵圖像與公安網身份證資訊進行比對,如果比對通過則認為用戶A認證通過,將獲取到的用戶A的面部特徵圖像儲存下來。
在S204處,確定用戶A認證通過時,根據用戶A的選擇,確定用戶A希望分享的保單。
在S206處,對用戶A希望分享的保單進行脫敏處理,得到脫敏後的保單。
具體地,在S206處,對用戶A希望分享的保單進行脫敏處理可以是抹除保單中涉及用戶A的隱私的資訊,只保留不涉及用戶A的隱私的資訊。或者可以對保單中涉及用戶A的隱私的資訊進行打碼。這裡涉及用戶A的隱私的資訊例如可以包括用戶A的身份證資訊、用戶A的家庭住址資訊等。不涉及用戶A的隱私的資訊例如可以包括保單所涉及的保險產品、保額或保險產品的套餐等資訊。
在S208處,在用戶B登入服務平臺後,再次採集用戶A的面部特徵圖像,並進行匹配認證。
或者可以理解為,在S208處,用戶B需要刷用戶A的臉進行認證。
可選地,在S208處,用戶B藉由密碼、指紋認證或者簡訊認證等方式登入服務平臺。以用戶B藉由密碼登入為例,在用戶B在服務平臺的登入介面輸入密碼之後,服務平臺驗證用戶B輸入的密碼是否與用戶B在該服務平臺註冊時輸入的密碼是否一致。如果一致,則允許用戶B登入服務平臺,如果不一致,則拒絕用戶B登入服務平臺。或者以用戶B藉由指紋認證登入為例,在用戶B在服務平臺的登入介面輸入指紋資訊之後,服務平臺驗證用戶B在登入介面輸入的指紋資訊是否與用戶B在該服務平臺註冊時錄入的指紋資訊一致。如果一致,則允許用戶B登入服務平臺,如果不一致,則拒絕用戶B登入服務平臺。
具體地,在S208處的匹配認指的是將在S208處採集到的用戶A的面部特徵圖像與在S202處儲存的用戶A的面部特徵圖像進行比對。
在S210處,如果匹配認證成功,則向用戶A展示脫敏後的保單。
在S212處,基於用戶B的購買指令產生用戶B的保單。
可以理解的是,在向用戶A展示脫敏後的保單之後,用戶A就能查閱這些脫敏後的保單涉及的保險產品,如果有滿意的保險產品可以直接進行購買,由此產生關聯購買。
需要說明的是,雖然圖2所示的方法以保單為例進行描述,但本發明實施例中的待分享資訊並不限於與保單相關的資訊。且在圖2所示的方法中以刷臉認證為例進行描述,但本發明實施例中的認證方式並不限於此,例如還可以是刷指紋認證。
以上結合圖1和圖2詳細描述了根據本發明實施例的資訊分享方法。下面將結合圖3詳細描述根據本發明實施例的電子設備。參考圖3,在硬體層面,電子設備包括處理器,可選地,包括內部匯流排、網路介面、記憶體。其中,記憶體可能包含記憶體,例如高速隨機存取記憶體(Random-Access Memory,RAM),也可能還包括非易失性記憶體(non-volatile memory),例如至少1個磁碟記憶體等。當然,該電子設備還可能包括其他業務所需要的硬體。
處理器、網路介面和記憶體可以藉由內部匯流排相互連接,該內部匯流排可以是工業標準架構(Industry Standard Architecture,ISA)匯流排、週邊組件互連(Peripheral Component Interconnect,PCI)匯流排或延伸工業標準架構(Extended Industry Standard Architecture,EISA)匯流排等。所述匯流排可以分為位址匯流排、資料匯流排、控制匯流排等。為便於表示,圖3中僅用一個雙向箭頭表示,但並不表示僅有一根匯流排或一種類型的匯流排。
記憶體,用於存放程式。具體地,程式可以包括程式碼,所述程式碼包括電腦操作指令。記憶體可以包括記憶體和非易失性記憶體,並向處理器提供指令和資料。
處理器從非易失性記憶體中讀取對應的電腦程式到記憶體中然後運行,在邏輯層面上形成資訊分享裝置。處理器,執行記憶體所存放的程式,並具體用於執行以下操作:
在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像;
將所述第一生物特徵圖像與所述第二用戶的生物特徵模板進行匹配;
基於匹配結果,確定是否向所述第一用戶展示所述第二用戶的待分享資訊。
上述如本發明圖1和圖2所示實施例揭示的資訊分享裝置執行的方法可以應用於處理器中,或者由處理器實現。處理器可能是一種集成電路晶片,具有信號的處理能力。在實現過程中,上述方法的各步驟可以藉由處理器中的硬體的集成邏輯電路或者軟體形式的指令完成。上述的處理器可以是通用處理器,包括中央處理器(Central Processing Unit,CPU)、網路處理器(Network Processor,NP)等;還可以是數位信號處理器(Digital Signal Processor,DSP)、專用集成電路(Application Specific Integrated Circuit,ASIC)、現場可程式閘陣列(Field-Programmable Gate Array,FPGA)或者其他可程式化邏輯裝置、分立閘或者電晶體邏輯裝置、分立硬體組件。可以實現或者執行本發明實施例中的公開的各方法、步驟及邏輯方塊圖。通用處理器可以是微處理器或者該處理器也可以是任何常規的處理器等。結合本發明實施例所公開的方法的步驟可以直接體現為硬體譯碼處理器執行完成,或者用譯碼處理器中的硬體及軟體模組組合執行完成。軟體模組可以位於隨機記憶體,快閃記憶體、唯讀記憶體,可程式化唯讀記憶體或者電可擦寫可程式化記憶體、寄存器等本領域成熟的儲存媒體中。該儲存媒體位於記憶體,處理器讀取記憶體中的資訊,結合其硬體完成上述方法的步驟。
該電子設備還可執行圖2的方法,並實現資訊分享裝置在圖2所示實施例的功能,本發明實施例在此不再贅述。
當然,除了軟體實現方式之外,本發明的電子設備並不排除其他實現方式,比如邏輯裝置抑或軟硬體結合的方式等等,也就是說以下處理流程的執行主體並不限定於各個邏輯單元,也可以是硬體或邏輯裝置。
本發明實施例還提出了一種電腦可讀儲存媒體,該電腦可讀儲存媒體儲存一個或多個程式,該一個或多個程式包括指令,該指令當被包括多個應用程式的電子設備執行時,能夠使該電子設備執行圖1和圖2所示實施例的方法,並具體用於執行以下方法:
在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像;
將所述第一生物特徵圖像與所述第二用戶的生物特徵模板進行匹配;
基於匹配結果,確定是否向所述第一用戶展示所述第二用戶的待分享資訊。
圖4是本發明的一個實施例的資訊分享裝置的結構示意圖。請參考圖4,在一種軟體實施方式中,資訊分享裝置400可包括:獲取單元401、匹配單元402和處理單元403,其中,
獲取單元401,在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像;
匹配單元402,將所述第一生物特徵圖像與所述第二用戶的生物特徵模板進行匹配;
處理單元403,基於匹配結果,確定是否向所述第一用戶展示所述第二用戶的待分享資訊。
根據本發明實施例資訊分享裝置,能夠在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像,並將第一生物特徵圖像與第二用戶的生物特徵模板進行匹配,根據匹配的結果,確定是否向第一用戶展示第二用戶的待分享資訊。通常在第一用戶成功登入服務平臺時,需要第二用戶同意才能獲取到第二用戶的生物特徵圖像,即只能將第二用戶的待分享資訊分享給第二用戶希望分享到的用戶,因此能夠保護第二用戶的資訊的隱私性。並且基於第二用戶的生物特徵圖像的匹配校驗結果確定是否向第一用戶展示第二用戶的分享資訊,能夠保證第二用戶的資訊的安全性。
可選地,作為一個實施例,在第一用戶成功登入服務平臺之前,所述處理單元403:
確定所述第二用戶的待分享資訊。
可選地,作為一個實施例,所述處理單元403:
接收所述第二用戶輸入的選擇指令;
將根據所述選擇指令從所述第二用戶相關的資訊中選擇出的資訊,確定為所述待分享資訊。
可選地,作為一個實施例,所述處理單元403:
在確定所述第二用戶為合法用戶時,接收所述第二用戶輸入的選擇指令。
可選地,作為一個實施例,在所述處理單元403確定所述第二用戶為合法用戶之前,所述獲取單元401:獲取所述第二用戶的第二生物特徵圖像;
所述處理單元403:
基於所述第二生物特徵圖像上承載的資訊與身份證資訊源中的資訊進行匹配的結果,確定所述第二用戶是否為合法用戶,其中,所述身份證資訊源中包括合法用戶的身份證資訊,所述身份證資訊中包括生物特徵資訊。
可選地,作為一個實施例,所述處理單元403:
在第二生物特徵圖像上承載的資訊與身份證資訊源中的資訊匹配成功時,保存所述第二生物特徵圖像;
將所述第二生物特徵圖像確定為所述第二用戶的生物特徵模板。
可選地,作為一個實施例,所述待分享資訊為與第二用戶的保單相關的資訊;
其中,處理單元403:
確定所述第二用戶的保單中的待分享保單;
將所述待分享保單中涉及所述第二用戶的隱私資訊之外的資訊確定為所述待分享資訊。
可選地,作為一個實施例,所述處理單元403:
在匹配成功時,向所述第一用戶展示所述第二用戶的待分享資訊。
可選地,作為一個實施例,在向第一用戶展示所述第二用戶的待分享資訊之後,所述處理單元403:
接收所述第一用戶基於所述待分享資訊輸入的購買指令,所述購買指令用於購買第二用戶的保單所涉及的保險產品;
基於所述購買指令,產生所述第一用戶的保單。
資訊分享裝置400還可執行圖1和圖2所示實施例的方法,並實現資訊分享裝置在圖1和圖2所示實施例的功能,本發明實施例在此不再贅述。
總之,以上所述僅為本發明的較佳實施例而已,並非用於限定本發明的保護範圍。凡在本發明的精神和原則之內,所作的任何修改、等同替換、改進等,均應包含在本發明的保護範圍之內。
上述實施例闡明的系統、裝置、模組或單元,具體可以由電腦晶片或實體實現,或者由具有某種功能的產品來實現。一種典型的實現設備為電腦。具體的,電腦例如可以為個人電腦、筆記型電腦、蜂窩電話、相機電話、智慧型電話、個人數位助理、媒體播放器、導航設備、電子郵件設備、遊戲控制台、平板電腦、可穿戴設備或者這些設備中的任何設備的組合。
電腦可讀媒體包括永久性和非永久性、可移動和非可移動媒體可以由任何方法或技術來實現資訊儲存。資訊可以是電腦可讀指令、資料結構、程式的模組或其他資料。電腦的儲存媒體的例子包括,但不限於相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可抹除可程式化唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟(CD-ROM)、數位化多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁磁碟儲存或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的資訊。按照本文中的界定,電腦可讀媒體不包括暫存電腦可讀媒體(transitory media),如調變的資料信號和載波。
還需要說明的是,術語“包括”、“包含”或者其任何其他變體意在涵蓋非排他性的包含,從而使得包括一系列要素的過程、方法、商品或者設備不僅包括那些要素,而且還包括沒有明確列出的其他要素,或者是還包括為這種過程、方法、商品或者設備所固有的要素。在沒有更多限制的情況下,由語句“包括一個……”限定的要素,並不排除在包括所述要素的過程、方法、商品或者設備中還存在另外的相同要素。
本說明書中的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於系統實施例而言,由於其基本相似於方法實施例,所以描述的比較簡單,相關之處參見方法實施例的部分說明即可。In order to enable those skilled in the art to better understand the technical solutions in the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by a person with ordinary knowledge in the field without creative work shall fall within the protection scope of the present invention.
FIG. 1 is a flowchart of an information sharing method according to an embodiment of the invention. The method in FIG. 1 is executed by the information sharing device. It should be understood that the solution of the embodiment of the present invention is applicable to the sharing of information related to insurance policies. Of course, it is not ruled out that the method of the embodiment of the present invention is applied to the sharing of other information, such as the sharing of information related to products purchased by users.
As shown in FIG. 1, at S102, when the first user successfully logs in to the service platform, the first biometric image of the second user is acquired.
It is understandable that the service platform at S102 can be any platform that can provide services to users. The service platform can be in the form of an application (Application, APP). The APP can be installed on a terminal device. The terminal device can be, for example, Smart phones, computers, etc.
Optionally, in some embodiments, the first user logs in to the service platform by means of password, fingerprint authentication, or SMS authentication. Taking the first user to log in with a password as an example, after the first user enters the password on the login interface of the service platform, the service platform verifies whether the password entered by the first user is consistent with the password entered by the first user when registering on the service platform . If they are consistent, it is considered that the first user successfully logged in to the service platform; if they are not consistent, it is considered that the first user failed to log in. Or take the first user to log in by fingerprint authentication as an example. After the first user inputs fingerprint information on the login interface of the service platform, the service platform verifies whether the fingerprint information entered by the first user on the login interface is the same as that of the first user on the service platform The fingerprint information entered during registration is the same. If they are consistent, it is considered that the first user successfully logged in to the service platform; if they are not consistent, it is considered that the first user failed to log in.
Further, the ID of the terminal device used by the first user to log in to the service platform can be determined to be the first user who logs in to the service platform, or the time to log in to the service platform can be determined according to the service account used by the first user to log in to the service platform The first user.
Optionally, in some embodiments, an option is provided on the service platform for the user to choose whether to share other people’s information. If the first user selects this option, the first user is prompted to further select which user’s information needs to be shared. If the first user chooses to share the information of the second user, the first user is prompted to verify the second user. At this time, the first user can choose the method of verifying the second user. If you choose to use the biometric map If the second user is authenticated in a matching authentication manner, the first user is prompted to input the biometric image of the second user. Generally, in this case, the first user needs to obtain the consent of the second user to enable the service platform to obtain the biometric image of the second user. For example, in a scenario where the first user and the second user face each other, after the first user obtains the consent of the second user, the second user inputs the biometric image. As a result, it can be avoided that the second user's information is shared with the first user without the second user's consent, and the privacy of the second user's information can be protected.
Optionally, as an example, the first biometric image of the second user acquired in S102 is a facial image of the second user. Or the first biometric image of the second user acquired at S102 is the fingerprint image of the second user.
It should be noted that the first biometric image of the second user at S102 may be a directly collected image of the biometric characteristics of the second user, or it may be a graphic image of the biometric characteristics of the second user collected. For the image obtained after processing, the aforementioned processing may be, for example, denoising processing.
At S104, the first biometric image is matched with the biometric template of the second user.
It should be noted that the biometric template of the second user is a biometric image saved or registered by the second user in advance.
Optionally, in some embodiments, the biometric template of the second user is a biometric image saved when the second user logs into the service platform and performs identity authentication. And, it can be understood that the biometric template of the second user can be updated. For example, every time the second user logs in to the service platform and performs identity authentication, if the identity authentication is passed, the biometric image input by the second user during this identity authentication process is used as the second user's biometric template. In other words, the biometric template can be replaced with the biometric image input when the authentication is passed. In this way, the biometric template can reflect the latest biometrics of the second user to the greatest extent and improve the prevention and control performance of malicious attacks.
At S106, based on the matching result, it is determined whether to show the information to be shared of the second user to the first user.
Optionally, in some embodiments, if the matching is successful, the information to be shared of the second user is shown to the first user. That is, if the match is passed, the information to be shared of the second user is shared with the first user. If the matching fails, it is determined not to show the information to be shared of the second user to the first user. Thus, the security of the information of the second user can be guaranteed.
In the embodiment of the present invention, optionally, before the first user successfully logs in to the service platform, the method shown in FIG. 1 further includes: determining the information to be shared of the second user.
Optionally, as an example, all information related to the second user stored in the system may be determined as the information to be shared of the second user.
Optionally, as another example, determining the information to be shared by the second user includes: receiving a selection instruction input by the second user, and determining information selected from the information related to the second user according to the selection instruction Is the information to be shared. In other words, there are multiple information related to the second user stored in the system, and the information that the second user wants to share with other users can be determined according to the second user's own choice.
Further, in some embodiments, after the information that the second user wants to share with other users is determined according to the second user's own choice, it can be determined whether the information that the second user wants to share with other users involves the second user. For private information, if there is any information, the information that the second user wants to share with other users is further processed. For example, it is possible to erase information related to the privacy of the second user among the information that the second user wants to share with other users, or to code information related to the privacy of the second user among the information that the second user wants to share with other users.
Optionally, in some embodiments, the receiving the selection instruction input by the second user includes: receiving the selection instruction input by the second user when it is determined that the second user is a legitimate user.
Specifically, in some embodiments, before determining that the second user is a legitimate user, the method shown in FIG. 1 further includes: acquiring a second biometric image of the second user; As a result of matching the information carried on the characteristic image with the information in the ID card information source, it is determined whether the second user is a legal user, wherein the ID card information source includes the ID card information of the legal user, and The ID card information includes biometric information.
In other words, by acquiring the second biometric image of the second user, and matching the information carried on the acquired second biometric image with the information in the ID card information source, according to the matching result Determine whether the second user is a legitimate user. Here, the information in the ID card information source can be ID card information obtained from the public security website.
For example, if the second biometric image of the second user is the facial image of the second user, the facial image of the second user is matched with the avatar information on the ID card in the ID information source. If successful, the second user is considered to be a legitimate user, otherwise the second user is considered to be an illegal user. Or, if the biometric image of the second user is the fingerprint image of the second user, the fingerprint image of the second user is matched with the fingerprint information on the identity of the ID card information source. If the matching is successful, it is considered The second user is a legitimate user, otherwise the second user is considered an illegal user.
Further, in some embodiments, the method shown in FIG. 1 further includes: when the information carried on the second biometric image is successfully matched with the information in the ID card information source, saving the second biometric image ; Determine the second biometric image as a biometric template of the second user. In other words, if the second user is verified as a legitimate user, the biometric image of the second user obtained during the verification process will be stored as the second user's biometric template for subsequent sharing by others The template for matching and verifying the information to be shared by the second user.
Specifically, in some embodiments, the information to be shared of the second user is information related to the insurance policy of the second user, and the determining the information to be shared of the second user includes: determining the information of the second user The policy to be shared in the insurance policy; the information other than the privacy information related to the second user in the policy to be shared is determined as the information to be shared. For example, if the second user has 5 insurance policies, but the second user only wants to share information related to 3 insurance policies to other users, the 3 insurance policies are determined according to the user's choice, and these 3 insurance policies are further processed. Extract the information irrelevant to the privacy of the second user, and determine the extracted information as the information to be shared by the second user. Here, the process of processing these three insurance policies can also be referred to as desensitization processing, and the information irrelevant to the privacy of the second user may include, for example, information such as insurance products involved in the insurance policies, insured amounts, or specific packages of insurance products.
In the embodiment of the present invention, optionally, after displaying the information to be shared of the second user to the first user, the method shown in FIG. 1 further includes: receiving input from the first user based on the information to be shared The purchase instruction is used to purchase the insurance product involved in the insurance policy of the second user; based on the purchase instruction, the insurance policy of the first user is generated.
In other words, after showing the second user’s information to be shared to the first user, the first user can view the information related to the second user’s insurance policy shared by the second user. If there is a satisfactory insurance product among the insurance products involved in the policy, you can directly enter the product details and then purchase the insurance product, which will generate related purchases and increase the sales volume and sales speed of insurance products.
FIG. 2 is a flowchart of an information sharing method according to a specific embodiment of the present invention. The method in Figure 2 is executed by the information sharing device.
As shown in FIG. 2, at S202, a facial feature image of user A is collected, and authentication is performed.
Specifically, in S202, when user A is brushing his face, user A’s facial feature image is collected, and then the obtained facial feature image is compared with the ID card information of the public security network. If the comparison passes, user A is considered After the authentication is passed, the acquired facial feature image of user A is stored.
At S204, when it is determined that the user A has passed the authentication, according to the selection of the user A, the insurance policy that the user A wants to share is determined.
At S206, desensitize the policy that user A wants to share, and obtain the desensitized policy.
Specifically, at S206, desensitizing the policy that user A wants to share may be to erase information related to user A's privacy in the policy, and only retain information that does not involve user A's privacy. Or, the information related to user A's privacy in the insurance policy can be coded. The information related to user A's privacy may include, for example, user A's ID card information, user A's home address information, and so on. The information that does not involve the privacy of user A may include, for example, information related to insurance products, insured amounts, or packages of insurance products involved in the policy.
At S208, after user B logs into the service platform, the facial feature image of user A is collected again, and matching authentication is performed.
Or it can be understood that, at S208, user B needs to swipe the face of user A for authentication.
Optionally, at S208, user B logs in to the service platform by means of password, fingerprint authentication or SMS authentication. Taking user B logging in with a password as an example, after user B enters the password on the login interface of the service platform, the service platform verifies whether the password entered by user B is consistent with the password entered by user B when registering on the service platform. If they are consistent, user B is allowed to log in to the service platform; if they are not consistent, user B is denied to log in to the service platform. Or take user B’s fingerprint authentication login as an example. After user B enters fingerprint information on the login interface of the service platform, the service platform verifies whether the fingerprint information entered by user B on the login interface is the same as that entered by user B when registering on the service platform The fingerprint information is consistent. If they are consistent, user B is allowed to log in to the service platform; if they are not consistent, user B is denied to log in to the service platform.
Specifically, the matching recognition at S208 refers to comparing the facial feature image of user A collected at S208 with the facial feature image of user A stored at S202.
At S210, if the matching authentication is successful, the desensitized insurance policy is shown to user A.
At S212, a policy of user B is generated based on the purchase instruction of user B.
It is understandable that after showing the desensitized insurance policy to user A, user A can check the insurance products involved in the desensitized insurance policy, and if there is a satisfactory insurance product, he can directly purchase the insurance product, thereby resulting in a related purchase.
It should be noted that although the method shown in FIG. 2 is described using an insurance policy as an example, the information to be shared in the embodiment of the present invention is not limited to information related to the insurance policy. In the method shown in FIG. 2, the face-swiping authentication is taken as an example for description, but the authentication method in the embodiment of the present invention is not limited to this, for example, fingerprint authentication may also be used.
The information sharing method according to the embodiment of the present invention is described in detail above with reference to FIGS. 1 and 2. The electronic device according to the embodiment of the present invention will be described in detail below with reference to FIG. 3. Referring to FIG. 3, at the hardware level, the electronic device includes a processor, optionally, an internal bus, a network interface, and a memory. Among them, the memory may include memory, such as high-speed random-access memory (Random-Access Memory, RAM), and may also include non-volatile memory, such as at least one magnetic disk memory. Wait. Of course, the electronic equipment may also include hardware required by other businesses.
The processor, network interface, and memory can be connected to each other by an internal bus, which can be an Industry Standard Architecture (ISA) bus or a Peripheral Component Interconnect (PCI) bus Or extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, etc. The bus can be divided into address bus, data bus, control bus, etc. For ease of presentation, only one double-headed arrow is used to indicate in FIG. 3, but it does not mean that there is only one bus or one type of bus.
Memory, used to store programs. Specifically, the program may include program code, and the program code includes computer operation instructions. The memory may include memory and non-volatile memory, and provide instructions and data to the processor.
The processor reads the corresponding computer program from the non-volatile memory to the memory and then runs, forming an information sharing device on a logical level. The processor executes the programs stored in the memory, and is specifically used to perform the following operations:
When the first user successfully logs in to the service platform, obtain the first biometric image of the second user;
Matching the first biometric image with the biometric template of the second user;
Based on the matching result, it is determined whether to show the information to be shared of the second user to the first user.
The method executed by the information sharing device disclosed in the embodiment shown in FIG. 1 and FIG. 2 of the present invention may be applied to or implemented by a processor. The processor may be an integrated circuit chip with signal processing capabilities. In the implementation process, the steps of the above method can be completed by hardware integrated logic circuits in the processor or instructions in the form of software. The aforementioned processor may be a general-purpose processor, including a central processing unit (CPU), a network processor (Network Processor, NP), etc.; it may also be a digital signal processor (DSP), a dedicated Integrated circuit (Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components. The methods, steps, and logic block diagrams disclosed in the embodiments of the present invention can be implemented or executed. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like. The steps of the method disclosed in combination with the embodiments of the present invention can be directly embodied as executed by a hardware decoding processor, or executed by a combination of hardware and software modules in the decoding processor. The software module can be located in random memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers, and other mature storage media in the field. The storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
The electronic device can also execute the method in FIG. 2 and realize the functions of the embodiment of the information sharing device shown in FIG. 2, and the details of the embodiment of the present invention are not repeated here.
Of course, in addition to the software implementation, the electronic device of the present invention does not exclude other implementations, such as logic devices or a combination of software and hardware, etc., which means that the execution body of the following processing flow is not limited to each logic unit , It can also be a hardware or logic device.
An embodiment of the present invention also provides a computer-readable storage medium, the computer-readable storage medium stores one or more programs, the one or more programs include instructions, when the instructions are executed by an electronic device that includes multiple application programs , The electronic device can be used to execute the method of the embodiment shown in FIG. 1 and FIG. 2, and is specifically used to execute the following method:
When the first user successfully logs in to the service platform, obtain the first biometric image of the second user;
Matching the first biometric image with the biometric template of the second user;
Based on the matching result, it is determined whether to show the information to be shared of the second user to the first user.
FIG. 4 is a schematic structural diagram of an information sharing device according to an embodiment of the present invention. Referring to FIG. 4, in a software implementation manner, the information sharing device 400 may include: an acquisition unit 401, a matching unit 402, and a processing unit 403, wherein,
The acquiring unit 401, when the first user successfully logs in to the service platform, acquires the first biometric image of the second user;
A matching unit 402, which matches the first biometric image with the biometric template of the second user;
The processing unit 403 determines whether to show the information to be shared of the second user to the first user based on the matching result.
According to the information sharing device of the embodiment of the present invention, when the first user successfully logs into the service platform, the first biometric image of the second user can be obtained, and the first biometric image can be matched with the biometric template of the second user , According to the matching result, determine whether to show the second user's information to be shared to the first user. Generally, when the first user successfully logs in to the service platform, the second user’s consent is required to obtain the second user’s biometric image, that is, only the second user’s to-be-shared information can be shared with the users that the second user wants to share. Therefore, the privacy of the second user's information can be protected. Furthermore, it is determined whether to show the shared information of the second user to the first user based on the matching verification result of the biometric image of the second user, which can ensure the security of the information of the second user.
Optionally, as an embodiment, before the first user successfully logs in to the service platform, the processing unit 403:
Determine the information to be shared of the second user.
Optionally, as an embodiment, the processing unit 403:
Receiving a selection instruction input by the second user;
The information selected from the information related to the second user according to the selection instruction is determined as the information to be shared.
Optionally, as an embodiment, the processing unit 403:
When it is determined that the second user is a legitimate user, receiving a selection instruction input by the second user.
Optionally, as an embodiment, before the processing unit 403 determines that the second user is a legitimate user, the acquisition unit 401: acquires a second biometric image of the second user;
The processing unit 403:
Based on the result of matching the information carried on the second biometric image with the information in the ID card information source, it is determined whether the second user is a legal user, wherein the ID card information source includes the legal user’s ID card information, the ID card information includes biometric information.
Optionally, as an embodiment, the processing unit 403:
Save the second biometric image when the information carried on the second biometric image matches the information in the ID card information source successfully;
The second biometric image is determined as the biometric template of the second user.
Optionally, as an embodiment, the information to be shared is information related to the insurance policy of the second user;
Among them, the processing unit 403:
Determine the policy to be shared in the policy of the second user;
The information other than the privacy information related to the second user in the policy to be shared is determined as the information to be shared.
Optionally, as an embodiment, the processing unit 403:
When the matching is successful, the information to be shared of the second user is displayed to the first user.
Optionally, as an embodiment, after displaying the to-be-shared information of the second user to the first user, the processing unit 403:
Receiving a purchase instruction input by the first user based on the information to be shared, the purchase instruction being used to purchase insurance products related to the insurance policy of the second user;
Based on the purchase instruction, an insurance policy for the first user is generated.
The information sharing device 400 can also execute the method of the embodiment shown in FIG. 1 and FIG. 2 and realize the functions of the information sharing device in the embodiment shown in FIG. 1 and FIG. 2, which will not be repeated here.
In short, the above descriptions are only preferred embodiments of the present invention, and are not intended to limit the protection scope of the present invention. Any modification, equivalent replacement, improvement, etc., made within the spirit and principle of the present invention shall be included in the protection scope of the present invention.
The systems, devices, modules, or units explained in the above embodiments may be implemented by computer chips or entities, or implemented by products with certain functions. A typical implementation device is a computer. Specifically, the computer may be, for example, a personal computer, a notebook computer, a cell phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or Any combination of these devices.
Computer-readable media includes permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology. Information can be computer-readable instructions, data structures, program modules, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), and other types of random access memory (RAM) , Read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, read-only disc (CD-ROM), digital versatile disc (DVD) ) Or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices or any other non-transmission media that can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
It should also be noted that the terms "including", "including" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, commodity or equipment including a series of elements not only includes those elements, but also includes Other elements that are not explicitly listed, or also include elements inherent to such processes, methods, commodities, or equipment. If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other identical elements in the process, method, commodity, or equipment that includes the element.
The various embodiments in this specification are described in a progressive manner, and the same or similar parts between the various embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the part of the description of the method embodiment.