[go: up one dir, main page]

TWI697860B - Information sharing method, device and electronic equipment - Google Patents

Information sharing method, device and electronic equipment Download PDF

Info

Publication number
TWI697860B
TWI697860B TW107144998A TW107144998A TWI697860B TW I697860 B TWI697860 B TW I697860B TW 107144998 A TW107144998 A TW 107144998A TW 107144998 A TW107144998 A TW 107144998A TW I697860 B TWI697860 B TW I697860B
Authority
TW
Taiwan
Prior art keywords
user
information
shared
biometric image
biometric
Prior art date
Application number
TW107144998A
Other languages
Chinese (zh)
Other versions
TW201933233A (en
Inventor
冶秀剛
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW201933233A publication Critical patent/TW201933233A/en
Application granted granted Critical
Publication of TWI697860B publication Critical patent/TWI697860B/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0623Electronic shopping [e-shopping] by investigating goods or services
    • G06Q30/0625Electronic shopping [e-shopping] by investigating goods or services by formulating product or service queries, e.g. using keywords or predefined options
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Medical Informatics (AREA)
  • Game Theory and Decision Science (AREA)
  • Databases & Information Systems (AREA)
  • Technology Law (AREA)
  • Collating Specific Patterns (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本發明實施例公開一種資訊分享方法、裝置和電子設備,該方法包括:在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像;將所述第一生物特徵圖像與所述第二用戶的生物特徵模板進行匹配;基於匹配結果,確定是否向所述第一用戶展示所述第二用戶的待分享資訊。The embodiment of the present invention discloses an information sharing method, device and electronic equipment. The method includes: acquiring a first biometric image of a second user when a first user successfully logs in to a service platform; and combining the first biometric image Matching with the biometric template of the second user; based on the matching result, determining whether to show the second user's information to be shared to the first user.

Description

資訊分享方法、裝置和電子設備Information sharing method, device and electronic equipment

本發明涉及資訊技術領域,更具體地涉及資訊分享方法、裝置和電子設備。The present invention relates to the field of information technology, and more specifically to information sharing methods, devices and electronic equipment.

在日常生活中,人們通常希望能夠分享他人的資訊。例如,如果一個用戶在藉由一個交易平臺購買保險產品時,希望能夠參考其他人的選擇,這個用戶需要瞭解其他人購買的保險產品的類型,即需要分享其他人的保單。但保單通常涉及個人隱私,考慮到資訊的隱私性和安全性問題,保單的持有人可能只希望將保單分享給自己熟悉的人,但目前沒有合適的方法,能夠在保護資訊的隱私性和安全性的情況下,實現資訊的分享。 因此,需求一種資訊分享的方法,來克服上述技術問題。In daily life, people usually want to be able to share information about others. For example, if a user wants to refer to other people's choices when purchasing insurance products through a trading platform, the user needs to understand the types of insurance products purchased by other people, that is, they need to share other people's insurance policies. However, insurance policies usually involve personal privacy. Taking into account the privacy and security of information, policy holders may only want to share the policy with people they are familiar with. However, there is currently no suitable method to protect the privacy and security of information. In the case of security, information sharing is realized. Therefore, a method of information sharing is required to overcome the above technical problems.

本發明的目的在於提供一種資訊分享方法、裝置和電子設備,能夠實現在保護資訊的隱私性和安全性的情況下,實現資訊的分享。 為解決上述技術問題,本發明實施例是這樣實現的: 第一方面,提供了一種資訊分享的方法,包括: 在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像; 將所述第一生物特徵圖像與所述第二用戶的生物特徵模板進行匹配; 基於匹配結果,確定是否向所述第一用戶展示所述第二用戶的待分享資訊。 第二方面,提供一種資訊分享裝置,包括: 獲取單元,在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像; 匹配單元,將所述第一生物特徵圖像與所述第二用戶的生物特徵模板進行匹配; 處理單元,基於匹配結果,確定是否向所述第一用戶展示所述第二用戶的待分享資訊。 第三方面,提供一種電子設備,包括: 處理器;以及 被安排成儲存電腦可執行指令的記憶體,所述可執行指令在被執行時使用所述處理器執行以下操作: 在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像; 將所述第一生物特徵圖像與所述第二用戶的生物特徵模板進行匹配; 基於匹配結果,確定是否向所述第一用戶展示所述第二用戶的待分享資訊。 第四方面,提供一種電腦可讀媒體,所述電腦可讀媒體儲存一個或多個程式,所述一個或多個程式當被包括多個應用程式的電子設備執行時,使得所述電子設備執行以下操作: 在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像; 將所述第一生物特徵圖像與所述第二用戶的生物特徵模板進行匹配; 基於匹配結果,確定是否向所述第一用戶展示所述第二用戶的待分享資訊。 由以上本發明實施例提供的技術方案可見,本發明實施例在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像,並將第一生物特徵圖像與第二用戶的生物特徵模板進行匹配,根據匹配的結果,確定是否向第一用戶展示第二用戶的待分享資訊。通常在第一用戶成功登入服務平臺時,需要第二用戶同意才能獲取到第二用戶的生物特徵圖像,即只能將第二用戶的待分享資訊分享給第二用戶希望分享到的用戶,因此能夠保護第二用戶的資訊的隱私性。並且基於第二用戶的生物特徵圖像的匹配校驗結果確定是否向第一用戶展示第二用戶的分享資訊,能夠保證第二用戶的資訊的安全性。The purpose of the present invention is to provide an information sharing method, device and electronic equipment, which can realize information sharing while protecting the privacy and security of the information. To solve the above technical problems, the embodiments of the present invention are implemented as follows: The first aspect provides a method of information sharing, including: When the first user successfully logs in to the service platform, obtain the first biometric image of the second user; Matching the first biometric image with the biometric template of the second user; Based on the matching result, it is determined whether to show the information to be shared of the second user to the first user. In the second aspect, an information sharing device is provided, including: The acquiring unit acquires the first biometric image of the second user when the first user successfully logs in to the service platform; A matching unit for matching the first biometric image with the biometric template of the second user; The processing unit determines whether to show the information to be shared of the second user to the first user based on the matching result. In a third aspect, an electronic device is provided, including: Processor; and A memory arranged to store computer-executable instructions that, when executed, use the processor to perform the following operations: When the first user successfully logs in to the service platform, obtain the first biometric image of the second user; Matching the first biometric image with the biometric template of the second user; Based on the matching result, it is determined whether to show the information to be shared of the second user to the first user. In a fourth aspect, a computer-readable medium is provided. The computer-readable medium stores one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to execute The following operations: When the first user successfully logs in to the service platform, obtain the first biometric image of the second user; Matching the first biometric image with the biometric template of the second user; Based on the matching result, it is determined whether to show the information to be shared of the second user to the first user. It can be seen from the technical solutions provided by the above embodiments of the present invention that when the first user successfully logs into the service platform, the embodiment of the present invention obtains the first biometric image of the second user, and compares the first biometric image with the second user. According to the matching result, determine whether to show the second user’s information to be shared to the first user. Generally, when the first user successfully logs in to the service platform, the second user’s consent is required to obtain the second user’s biometric image, that is, only the second user’s to-be-shared information can be shared with the users that the second user wants to share. Therefore, the privacy of the second user's information can be protected. Furthermore, it is determined whether to show the shared information of the second user to the first user based on the matching verification result of the biometric image of the second user, which can ensure the security of the information of the second user.

為了使本技術領域的人員更好地理解本發明中的技術方案,下面將結合本發明實施例中的圖式,對本發明實施例中的技術方案進行清楚、完整地描述,顯然,所描述的實施例僅僅是本發明一部分實施例,而不是全部的實施例。基於本發明中的實施例,本領域具有通常知識者在沒有作出創造性勞動前提下所獲得的所有其他實施例,都應當屬於本發明保護的範圍。 圖1是根據本發明的一個實施例的資訊分享方法的流程圖。圖1的方法由資訊分享裝置執行。應理解,本發明實施例的方案可適用於保單相關的資訊的分享。當然也不排除將本發明實施例的方法應用於其他資訊的分享,例如用戶購買的商品相關的資訊的分享。 如圖1所示出的,在S102處,在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像。 可以理解的是,在S102處的服務平臺可以是能夠為用戶提供服務的任何一個平臺,服務平臺的形式可以是應用程式(Application,APP),APP可以安裝在終端設備上,終端設備例如可以是智慧型手機、電腦等。 可選地,在一些實施例中,第一用戶藉由密碼、指紋認證或者簡訊認證等方式登入服務平臺。以第一用戶藉由密碼登入為例,在第一用戶在服務平臺的登入介面輸入密碼之後,服務平臺驗證第一用戶輸入的密碼是否與第一用戶在該服務平臺註冊時輸入的密碼是否一致。如果一致,則認為第一用戶成功登入服務平臺,如果不一致,則認為第一用戶登入失敗。或者以第一用戶藉由指紋認證登入為例,在第一用戶在服務平臺的登入介面輸入指紋資訊之後,服務平臺驗證第一用戶在登入介面輸入的指紋資訊是否與第一用戶在該服務平臺註冊時錄入的指紋資訊一致。如果一致,則認為第一用戶成功登入服務平臺,如果不一致,則認為第一用戶登入失敗。 進一步地,可以根據第一用戶登入服務平臺時所使用的終端設備的ID確定登入服務平臺的是第一用戶,或者可以根據第一用戶登入服務平臺時所使用的服務賬號確定登入服務平臺的時第一用戶。 可選地,在一些實施例中,在服務平臺上提供可供用戶選擇是否需要分享其他人資訊的選項,如果第一用戶選擇該選項,則提示第一用戶進一步選擇需要分享哪個用戶的資訊,如果第一用戶選擇需要分享第二用戶的資訊,則提示第一用戶需要對第二用戶進行驗證,此時可以讓第一用戶選擇對第二用戶進行驗證的方式,如果選擇藉由生物特徵圖像匹配認證的方式對第二用戶進行認證,則提示第一用戶輸入第二用戶的生物特徵圖像。通常這種情況下,第一用戶需要獲得第二用戶的同意,才能使得服務平臺獲取到第二用戶的生物特徵圖像。例如,第一用戶和第二用戶面對面的場景下,第一用戶征得第二用戶的同意之後,第二用戶進行生物特徵圖像的輸入。由此,可以避免在第二用戶不同意的情況下,將第二用戶的資訊分享給第一用戶,保護第二用戶的資訊的隱私性。 可選地,作為一個例子,在S102處獲取到的第二用戶的第一生物特徵圖像為第二用戶的面部圖像。或者在S102處獲取到的第二用戶的第一生物特徵圖像為第二用戶的指紋圖像。 需要說明的是,在S102處的第二用戶的第一生物特徵圖像可以是直接採集到的第二用戶的生物特徵的圖像,也可以是對採集到的第二用戶的生物特徵的圖形進行處理後得到的圖像,上述的處理例如可以是去雜訊處理。 在S104處,將所述第一生物特徵圖像與所述第二用戶的生物特徵模板進行匹配。 需要說明的是,第二用戶的生物特徵模板是第二用戶事先留存或註冊的生物特徵圖像。 可選地,在一些實施例中,第二用戶的生物特徵模板是在第二用戶之前登入該服務平臺且進行身份認證時留存的生物特徵圖像。並且,可以理解的是,第二用戶的生物特徵模板是可以更新的。例如,每次在第二用戶登入該服務平臺且進行身份認證時,如果身份認證通過,則將第二用戶在此次身份認證過程中輸入的生物特徵圖像作為第二用戶的生物特徵模板。也就是說,可以用認證通過時輸入的生物特徵圖像替換生物特徵模板。由此,可以使得生物特徵模板最大程度反映第二用戶的最新生物特徵,提高對惡意攻擊的防控性能。 在S106處,基於匹配結果,確定是否向所述第一用戶展示所述第二用戶的待分享資訊。 可選地,在一些實施例中,如果匹配成功,則向第一用戶展示所述第二用戶的待分享資訊。即如果匹配通過,將第二用戶的待分享資訊分享給第一用戶。如果匹配失敗,則確定不向第一用戶展示所述第二用戶的待分享資訊。由此,能夠保證第二用戶的資訊的安全性。 在本發明實施例中,可選地,在第一用戶成功登入服務平臺之前,圖1所示的方法還包括:確定所述第二用戶的待分享資訊。 可選地,作為一個例子,可以將在系統中儲存的第二用戶相關的所有資訊確定為第二用戶的待分享資訊。 可選地,作為另一個例子,確定第二用戶的待分享資訊包括:接收第二用戶輸入的選擇指令,將根據所述選擇指令從所述第二用戶相關的資訊中選擇出的資訊,確定為所述待分享資訊。也就是說,系統中儲存有多個與第二用戶相關的資訊,可以根據第二用戶自己的選擇確定第二用戶希望分享給其他用戶的資訊。 進一步地,在一些實施例中,在根據第二用戶自己的選擇確定第二用戶希望分享給其他用戶的資訊之後,可以判斷第二用戶希望分享給其他用戶的資訊中是否有涉及第二用戶的隱私的資訊,如果有則對第二用戶希望分享給其他用戶的資訊進行進一步處理。例如,可以抹除第二用戶希望分享給其他用戶的資訊中涉及第二用戶的隱私的資訊,或者對第二用戶希望分享給其他用戶的資訊中涉及第二用戶的隱私的資訊進行打碼。 可選地,在一些實施例中,所述接收所述第二用戶輸入的選擇指令,包括:在確定所述第二用戶為合法用戶時,接收所述第二用戶輸入的選擇指令。 具體地,在一些實施例中,在確定所述第二用戶為合法用戶之前,圖1所示的方法還包括:獲取所述第二用戶的第二生物特徵圖像;基於所述第二生物特徵圖像上承載的資訊與身份證資訊源中的資訊進行匹配的結果,確定所述第二用戶是否為合法用戶,其中,所述身份證資訊源中包括合法用戶的身份證資訊,所述身份證資訊中包括生物特徵資訊。 換句換說,可以藉由獲取第二用戶的第二生物特徵圖像,並將獲取到的第二生物特徵圖像上承載的資訊與身份證資訊源中的資訊進行匹配,根據匹配的結果確定第二用戶是否為合法用戶。在這裡,身份證資訊源中的資訊可以是從公安網上獲取到的身份證資訊。 舉例來說,第二用戶的第二生物特徵圖像為第二用戶的面部圖像,則將第二用戶的面部圖像與身份證資訊源中的身份證上的頭像資訊進行匹配,如果匹配成功,則認為第二用戶為合法用戶,否則認為第二用戶為非法用戶。或者,第二用戶的生物特徵圖像為第二用戶的指紋圖像,則將第二用戶的指紋圖像與身份證資訊源中的身份正上的指紋資訊進行匹配,如果匹配成功,則認為第二用戶為合法用戶,否則認為第二用戶為非法用戶。 進一步地,在一些實施例中,圖1所示的方法還包括:在第二生物特徵圖像上承載的資訊與身份證資訊源中的資訊匹配成功時,保存所述第二生物特徵圖像;將所述第二生物特徵圖像確定為所述第二用戶的生物特徵模板。也就是說,如果驗證第二用戶為合法用戶,則將此次驗證過程中獲取到的第二用戶的生物特徵圖像儲存下來,作為第二用戶的生物特徵模板,用於後續其他人需要分享第二用戶的待分享資訊時進行匹配驗證的模板。 具體地,在一些實施例中,第二用戶的待分享資訊為與第二用戶的保單相關的資訊,則所述確定所述第二用戶的待分享資訊,包括:確定所述第二用戶的保單中的待分享保單;將所述待分享保單中涉及所述第二用戶的隱私資訊之外的資訊確定為所述待分享資訊。例如,第二用戶有5份保單,但第二用戶只希望將其中3份保單相關的資訊分享給其他用戶,則根據用戶的選擇確定這3份保單,並進一步將這3份保單進行處理,提取其中與第二用戶的隱私無關的資訊,將提取到的資訊確定為第二用戶的待分享資訊。在這裡,對這3份保單進行處理的過程也可以稱為脫敏處理,與第二用戶的隱私無關的資訊例如可以包括保單所涉及的保險產品、保額或保險產品的具體套餐等資訊。 在本發明實施例中,可選地,在向第一用戶展示所述第二用戶的待分享資訊之後,圖1所示的方法還包括:接收所述第一用戶基於所述待分享資訊輸入的購買指令,所述購買指令用於購買第二用戶的保單所涉及的保險產品;基於所述購買指令,產生所述第一用戶的保單。 也就是說,在向第一用戶展示第二用戶的待分享資訊之後,第一用戶就能查閱第二用戶分享的與第二用戶的保單相關的資訊,如果第一用戶查閱到第二用戶的保單涉及的保險產品中有自己滿意的保險產品,則可以直接進入產品詳情,然後購買此保險產品,由此產生關聯購買,提高保險產品的銷售量和銷售速度。 圖2是根據本發明的一個具體實施例的資訊分享方法的流程圖。圖2的方法由資訊分享裝置執行。 如圖2所示出的,在S202處,採集用戶A的面部特徵圖像,並進行認證。 具體地,在S202中,用戶A在刷臉時,採集用戶A的面部特徵圖像,然後將獲取到的面部特徵圖像與公安網身份證資訊進行比對,如果比對通過則認為用戶A認證通過,將獲取到的用戶A的面部特徵圖像儲存下來。 在S204處,確定用戶A認證通過時,根據用戶A的選擇,確定用戶A希望分享的保單。 在S206處,對用戶A希望分享的保單進行脫敏處理,得到脫敏後的保單。 具體地,在S206處,對用戶A希望分享的保單進行脫敏處理可以是抹除保單中涉及用戶A的隱私的資訊,只保留不涉及用戶A的隱私的資訊。或者可以對保單中涉及用戶A的隱私的資訊進行打碼。這裡涉及用戶A的隱私的資訊例如可以包括用戶A的身份證資訊、用戶A的家庭住址資訊等。不涉及用戶A的隱私的資訊例如可以包括保單所涉及的保險產品、保額或保險產品的套餐等資訊。 在S208處,在用戶B登入服務平臺後,再次採集用戶A的面部特徵圖像,並進行匹配認證。 或者可以理解為,在S208處,用戶B需要刷用戶A的臉進行認證。 可選地,在S208處,用戶B藉由密碼、指紋認證或者簡訊認證等方式登入服務平臺。以用戶B藉由密碼登入為例,在用戶B在服務平臺的登入介面輸入密碼之後,服務平臺驗證用戶B輸入的密碼是否與用戶B在該服務平臺註冊時輸入的密碼是否一致。如果一致,則允許用戶B登入服務平臺,如果不一致,則拒絕用戶B登入服務平臺。或者以用戶B藉由指紋認證登入為例,在用戶B在服務平臺的登入介面輸入指紋資訊之後,服務平臺驗證用戶B在登入介面輸入的指紋資訊是否與用戶B在該服務平臺註冊時錄入的指紋資訊一致。如果一致,則允許用戶B登入服務平臺,如果不一致,則拒絕用戶B登入服務平臺。 具體地,在S208處的匹配認指的是將在S208處採集到的用戶A的面部特徵圖像與在S202處儲存的用戶A的面部特徵圖像進行比對。 在S210處,如果匹配認證成功,則向用戶A展示脫敏後的保單。 在S212處,基於用戶B的購買指令產生用戶B的保單。 可以理解的是,在向用戶A展示脫敏後的保單之後,用戶A就能查閱這些脫敏後的保單涉及的保險產品,如果有滿意的保險產品可以直接進行購買,由此產生關聯購買。 需要說明的是,雖然圖2所示的方法以保單為例進行描述,但本發明實施例中的待分享資訊並不限於與保單相關的資訊。且在圖2所示的方法中以刷臉認證為例進行描述,但本發明實施例中的認證方式並不限於此,例如還可以是刷指紋認證。 以上結合圖1和圖2詳細描述了根據本發明實施例的資訊分享方法。下面將結合圖3詳細描述根據本發明實施例的電子設備。參考圖3,在硬體層面,電子設備包括處理器,可選地,包括內部匯流排、網路介面、記憶體。其中,記憶體可能包含記憶體,例如高速隨機存取記憶體(Random-Access Memory,RAM),也可能還包括非易失性記憶體(non-volatile memory),例如至少1個磁碟記憶體等。當然,該電子設備還可能包括其他業務所需要的硬體。 處理器、網路介面和記憶體可以藉由內部匯流排相互連接,該內部匯流排可以是工業標準架構(Industry Standard Architecture,ISA)匯流排、週邊組件互連(Peripheral Component Interconnect,PCI)匯流排或延伸工業標準架構(Extended Industry Standard Architecture,EISA)匯流排等。所述匯流排可以分為位址匯流排、資料匯流排、控制匯流排等。為便於表示,圖3中僅用一個雙向箭頭表示,但並不表示僅有一根匯流排或一種類型的匯流排。 記憶體,用於存放程式。具體地,程式可以包括程式碼,所述程式碼包括電腦操作指令。記憶體可以包括記憶體和非易失性記憶體,並向處理器提供指令和資料。 處理器從非易失性記憶體中讀取對應的電腦程式到記憶體中然後運行,在邏輯層面上形成資訊分享裝置。處理器,執行記憶體所存放的程式,並具體用於執行以下操作: 在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像; 將所述第一生物特徵圖像與所述第二用戶的生物特徵模板進行匹配; 基於匹配結果,確定是否向所述第一用戶展示所述第二用戶的待分享資訊。 上述如本發明圖1和圖2所示實施例揭示的資訊分享裝置執行的方法可以應用於處理器中,或者由處理器實現。處理器可能是一種集成電路晶片,具有信號的處理能力。在實現過程中,上述方法的各步驟可以藉由處理器中的硬體的集成邏輯電路或者軟體形式的指令完成。上述的處理器可以是通用處理器,包括中央處理器(Central Processing Unit,CPU)、網路處理器(Network Processor,NP)等;還可以是數位信號處理器(Digital Signal Processor,DSP)、專用集成電路(Application Specific Integrated Circuit,ASIC)、現場可程式閘陣列(Field-Programmable Gate Array,FPGA)或者其他可程式化邏輯裝置、分立閘或者電晶體邏輯裝置、分立硬體組件。可以實現或者執行本發明實施例中的公開的各方法、步驟及邏輯方塊圖。通用處理器可以是微處理器或者該處理器也可以是任何常規的處理器等。結合本發明實施例所公開的方法的步驟可以直接體現為硬體譯碼處理器執行完成,或者用譯碼處理器中的硬體及軟體模組組合執行完成。軟體模組可以位於隨機記憶體,快閃記憶體、唯讀記憶體,可程式化唯讀記憶體或者電可擦寫可程式化記憶體、寄存器等本領域成熟的儲存媒體中。該儲存媒體位於記憶體,處理器讀取記憶體中的資訊,結合其硬體完成上述方法的步驟。 該電子設備還可執行圖2的方法,並實現資訊分享裝置在圖2所示實施例的功能,本發明實施例在此不再贅述。 當然,除了軟體實現方式之外,本發明的電子設備並不排除其他實現方式,比如邏輯裝置抑或軟硬體結合的方式等等,也就是說以下處理流程的執行主體並不限定於各個邏輯單元,也可以是硬體或邏輯裝置。 本發明實施例還提出了一種電腦可讀儲存媒體,該電腦可讀儲存媒體儲存一個或多個程式,該一個或多個程式包括指令,該指令當被包括多個應用程式的電子設備執行時,能夠使該電子設備執行圖1和圖2所示實施例的方法,並具體用於執行以下方法: 在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像; 將所述第一生物特徵圖像與所述第二用戶的生物特徵模板進行匹配; 基於匹配結果,確定是否向所述第一用戶展示所述第二用戶的待分享資訊。 圖4是本發明的一個實施例的資訊分享裝置的結構示意圖。請參考圖4,在一種軟體實施方式中,資訊分享裝置400可包括:獲取單元401、匹配單元402和處理單元403,其中, 獲取單元401,在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像; 匹配單元402,將所述第一生物特徵圖像與所述第二用戶的生物特徵模板進行匹配; 處理單元403,基於匹配結果,確定是否向所述第一用戶展示所述第二用戶的待分享資訊。 根據本發明實施例資訊分享裝置,能夠在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像,並將第一生物特徵圖像與第二用戶的生物特徵模板進行匹配,根據匹配的結果,確定是否向第一用戶展示第二用戶的待分享資訊。通常在第一用戶成功登入服務平臺時,需要第二用戶同意才能獲取到第二用戶的生物特徵圖像,即只能將第二用戶的待分享資訊分享給第二用戶希望分享到的用戶,因此能夠保護第二用戶的資訊的隱私性。並且基於第二用戶的生物特徵圖像的匹配校驗結果確定是否向第一用戶展示第二用戶的分享資訊,能夠保證第二用戶的資訊的安全性。 可選地,作為一個實施例,在第一用戶成功登入服務平臺之前,所述處理單元403: 確定所述第二用戶的待分享資訊。 可選地,作為一個實施例,所述處理單元403: 接收所述第二用戶輸入的選擇指令; 將根據所述選擇指令從所述第二用戶相關的資訊中選擇出的資訊,確定為所述待分享資訊。 可選地,作為一個實施例,所述處理單元403: 在確定所述第二用戶為合法用戶時,接收所述第二用戶輸入的選擇指令。 可選地,作為一個實施例,在所述處理單元403確定所述第二用戶為合法用戶之前,所述獲取單元401:獲取所述第二用戶的第二生物特徵圖像; 所述處理單元403: 基於所述第二生物特徵圖像上承載的資訊與身份證資訊源中的資訊進行匹配的結果,確定所述第二用戶是否為合法用戶,其中,所述身份證資訊源中包括合法用戶的身份證資訊,所述身份證資訊中包括生物特徵資訊。 可選地,作為一個實施例,所述處理單元403: 在第二生物特徵圖像上承載的資訊與身份證資訊源中的資訊匹配成功時,保存所述第二生物特徵圖像; 將所述第二生物特徵圖像確定為所述第二用戶的生物特徵模板。 可選地,作為一個實施例,所述待分享資訊為與第二用戶的保單相關的資訊; 其中,處理單元403: 確定所述第二用戶的保單中的待分享保單; 將所述待分享保單中涉及所述第二用戶的隱私資訊之外的資訊確定為所述待分享資訊。 可選地,作為一個實施例,所述處理單元403: 在匹配成功時,向所述第一用戶展示所述第二用戶的待分享資訊。 可選地,作為一個實施例,在向第一用戶展示所述第二用戶的待分享資訊之後,所述處理單元403: 接收所述第一用戶基於所述待分享資訊輸入的購買指令,所述購買指令用於購買第二用戶的保單所涉及的保險產品; 基於所述購買指令,產生所述第一用戶的保單。 資訊分享裝置400還可執行圖1和圖2所示實施例的方法,並實現資訊分享裝置在圖1和圖2所示實施例的功能,本發明實施例在此不再贅述。 總之,以上所述僅為本發明的較佳實施例而已,並非用於限定本發明的保護範圍。凡在本發明的精神和原則之內,所作的任何修改、等同替換、改進等,均應包含在本發明的保護範圍之內。 上述實施例闡明的系統、裝置、模組或單元,具體可以由電腦晶片或實體實現,或者由具有某種功能的產品來實現。一種典型的實現設備為電腦。具體的,電腦例如可以為個人電腦、筆記型電腦、蜂窩電話、相機電話、智慧型電話、個人數位助理、媒體播放器、導航設備、電子郵件設備、遊戲控制台、平板電腦、可穿戴設備或者這些設備中的任何設備的組合。 電腦可讀媒體包括永久性和非永久性、可移動和非可移動媒體可以由任何方法或技術來實現資訊儲存。資訊可以是電腦可讀指令、資料結構、程式的模組或其他資料。電腦的儲存媒體的例子包括,但不限於相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可抹除可程式化唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟(CD-ROM)、數位化多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁磁碟儲存或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的資訊。按照本文中的界定,電腦可讀媒體不包括暫存電腦可讀媒體(transitory media),如調變的資料信號和載波。 還需要說明的是,術語“包括”、“包含”或者其任何其他變體意在涵蓋非排他性的包含,從而使得包括一系列要素的過程、方法、商品或者設備不僅包括那些要素,而且還包括沒有明確列出的其他要素,或者是還包括為這種過程、方法、商品或者設備所固有的要素。在沒有更多限制的情況下,由語句“包括一個……”限定的要素,並不排除在包括所述要素的過程、方法、商品或者設備中還存在另外的相同要素。 本說明書中的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於系統實施例而言,由於其基本相似於方法實施例,所以描述的比較簡單,相關之處參見方法實施例的部分說明即可。In order to enable those skilled in the art to better understand the technical solutions in the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by a person with ordinary knowledge in the field without creative work shall fall within the protection scope of the present invention. FIG. 1 is a flowchart of an information sharing method according to an embodiment of the invention. The method in FIG. 1 is executed by the information sharing device. It should be understood that the solution of the embodiment of the present invention is applicable to the sharing of information related to insurance policies. Of course, it is not ruled out that the method of the embodiment of the present invention is applied to the sharing of other information, such as the sharing of information related to products purchased by users. As shown in FIG. 1, at S102, when the first user successfully logs in to the service platform, the first biometric image of the second user is acquired. It is understandable that the service platform at S102 can be any platform that can provide services to users. The service platform can be in the form of an application (Application, APP). The APP can be installed on a terminal device. The terminal device can be, for example, Smart phones, computers, etc. Optionally, in some embodiments, the first user logs in to the service platform by means of password, fingerprint authentication, or SMS authentication. Taking the first user to log in with a password as an example, after the first user enters the password on the login interface of the service platform, the service platform verifies whether the password entered by the first user is consistent with the password entered by the first user when registering on the service platform . If they are consistent, it is considered that the first user successfully logged in to the service platform; if they are not consistent, it is considered that the first user failed to log in. Or take the first user to log in by fingerprint authentication as an example. After the first user inputs fingerprint information on the login interface of the service platform, the service platform verifies whether the fingerprint information entered by the first user on the login interface is the same as that of the first user on the service platform The fingerprint information entered during registration is the same. If they are consistent, it is considered that the first user successfully logged in to the service platform; if they are not consistent, it is considered that the first user failed to log in. Further, the ID of the terminal device used by the first user to log in to the service platform can be determined to be the first user who logs in to the service platform, or the time to log in to the service platform can be determined according to the service account used by the first user to log in to the service platform The first user. Optionally, in some embodiments, an option is provided on the service platform for the user to choose whether to share other people’s information. If the first user selects this option, the first user is prompted to further select which user’s information needs to be shared. If the first user chooses to share the information of the second user, the first user is prompted to verify the second user. At this time, the first user can choose the method of verifying the second user. If you choose to use the biometric map If the second user is authenticated in a matching authentication manner, the first user is prompted to input the biometric image of the second user. Generally, in this case, the first user needs to obtain the consent of the second user to enable the service platform to obtain the biometric image of the second user. For example, in a scenario where the first user and the second user face each other, after the first user obtains the consent of the second user, the second user inputs the biometric image. As a result, it can be avoided that the second user's information is shared with the first user without the second user's consent, and the privacy of the second user's information can be protected. Optionally, as an example, the first biometric image of the second user acquired in S102 is a facial image of the second user. Or the first biometric image of the second user acquired at S102 is the fingerprint image of the second user. It should be noted that the first biometric image of the second user at S102 may be a directly collected image of the biometric characteristics of the second user, or it may be a graphic image of the biometric characteristics of the second user collected. For the image obtained after processing, the aforementioned processing may be, for example, denoising processing. At S104, the first biometric image is matched with the biometric template of the second user. It should be noted that the biometric template of the second user is a biometric image saved or registered by the second user in advance. Optionally, in some embodiments, the biometric template of the second user is a biometric image saved when the second user logs into the service platform and performs identity authentication. And, it can be understood that the biometric template of the second user can be updated. For example, every time the second user logs in to the service platform and performs identity authentication, if the identity authentication is passed, the biometric image input by the second user during this identity authentication process is used as the second user's biometric template. In other words, the biometric template can be replaced with the biometric image input when the authentication is passed. In this way, the biometric template can reflect the latest biometrics of the second user to the greatest extent and improve the prevention and control performance of malicious attacks. At S106, based on the matching result, it is determined whether to show the information to be shared of the second user to the first user. Optionally, in some embodiments, if the matching is successful, the information to be shared of the second user is shown to the first user. That is, if the match is passed, the information to be shared of the second user is shared with the first user. If the matching fails, it is determined not to show the information to be shared of the second user to the first user. Thus, the security of the information of the second user can be guaranteed. In the embodiment of the present invention, optionally, before the first user successfully logs in to the service platform, the method shown in FIG. 1 further includes: determining the information to be shared of the second user. Optionally, as an example, all information related to the second user stored in the system may be determined as the information to be shared of the second user. Optionally, as another example, determining the information to be shared by the second user includes: receiving a selection instruction input by the second user, and determining information selected from the information related to the second user according to the selection instruction Is the information to be shared. In other words, there are multiple information related to the second user stored in the system, and the information that the second user wants to share with other users can be determined according to the second user's own choice. Further, in some embodiments, after the information that the second user wants to share with other users is determined according to the second user's own choice, it can be determined whether the information that the second user wants to share with other users involves the second user. For private information, if there is any information, the information that the second user wants to share with other users is further processed. For example, it is possible to erase information related to the privacy of the second user among the information that the second user wants to share with other users, or to code information related to the privacy of the second user among the information that the second user wants to share with other users. Optionally, in some embodiments, the receiving the selection instruction input by the second user includes: receiving the selection instruction input by the second user when it is determined that the second user is a legitimate user. Specifically, in some embodiments, before determining that the second user is a legitimate user, the method shown in FIG. 1 further includes: acquiring a second biometric image of the second user; As a result of matching the information carried on the characteristic image with the information in the ID card information source, it is determined whether the second user is a legal user, wherein the ID card information source includes the ID card information of the legal user, and The ID card information includes biometric information. In other words, by acquiring the second biometric image of the second user, and matching the information carried on the acquired second biometric image with the information in the ID card information source, according to the matching result Determine whether the second user is a legitimate user. Here, the information in the ID card information source can be ID card information obtained from the public security website. For example, if the second biometric image of the second user is the facial image of the second user, the facial image of the second user is matched with the avatar information on the ID card in the ID information source. If successful, the second user is considered to be a legitimate user, otherwise the second user is considered to be an illegal user. Or, if the biometric image of the second user is the fingerprint image of the second user, the fingerprint image of the second user is matched with the fingerprint information on the identity of the ID card information source. If the matching is successful, it is considered The second user is a legitimate user, otherwise the second user is considered an illegal user. Further, in some embodiments, the method shown in FIG. 1 further includes: when the information carried on the second biometric image is successfully matched with the information in the ID card information source, saving the second biometric image ; Determine the second biometric image as a biometric template of the second user. In other words, if the second user is verified as a legitimate user, the biometric image of the second user obtained during the verification process will be stored as the second user's biometric template for subsequent sharing by others The template for matching and verifying the information to be shared by the second user. Specifically, in some embodiments, the information to be shared of the second user is information related to the insurance policy of the second user, and the determining the information to be shared of the second user includes: determining the information of the second user The policy to be shared in the insurance policy; the information other than the privacy information related to the second user in the policy to be shared is determined as the information to be shared. For example, if the second user has 5 insurance policies, but the second user only wants to share information related to 3 insurance policies to other users, the 3 insurance policies are determined according to the user's choice, and these 3 insurance policies are further processed. Extract the information irrelevant to the privacy of the second user, and determine the extracted information as the information to be shared by the second user. Here, the process of processing these three insurance policies can also be referred to as desensitization processing, and the information irrelevant to the privacy of the second user may include, for example, information such as insurance products involved in the insurance policies, insured amounts, or specific packages of insurance products. In the embodiment of the present invention, optionally, after displaying the information to be shared of the second user to the first user, the method shown in FIG. 1 further includes: receiving input from the first user based on the information to be shared The purchase instruction is used to purchase the insurance product involved in the insurance policy of the second user; based on the purchase instruction, the insurance policy of the first user is generated. In other words, after showing the second user’s information to be shared to the first user, the first user can view the information related to the second user’s insurance policy shared by the second user. If there is a satisfactory insurance product among the insurance products involved in the policy, you can directly enter the product details and then purchase the insurance product, which will generate related purchases and increase the sales volume and sales speed of insurance products. FIG. 2 is a flowchart of an information sharing method according to a specific embodiment of the present invention. The method in Figure 2 is executed by the information sharing device. As shown in FIG. 2, at S202, a facial feature image of user A is collected, and authentication is performed. Specifically, in S202, when user A is brushing his face, user A’s facial feature image is collected, and then the obtained facial feature image is compared with the ID card information of the public security network. If the comparison passes, user A is considered After the authentication is passed, the acquired facial feature image of user A is stored. At S204, when it is determined that the user A has passed the authentication, according to the selection of the user A, the insurance policy that the user A wants to share is determined. At S206, desensitize the policy that user A wants to share, and obtain the desensitized policy. Specifically, at S206, desensitizing the policy that user A wants to share may be to erase information related to user A's privacy in the policy, and only retain information that does not involve user A's privacy. Or, the information related to user A's privacy in the insurance policy can be coded. The information related to user A's privacy may include, for example, user A's ID card information, user A's home address information, and so on. The information that does not involve the privacy of user A may include, for example, information related to insurance products, insured amounts, or packages of insurance products involved in the policy. At S208, after user B logs into the service platform, the facial feature image of user A is collected again, and matching authentication is performed. Or it can be understood that, at S208, user B needs to swipe the face of user A for authentication. Optionally, at S208, user B logs in to the service platform by means of password, fingerprint authentication or SMS authentication. Taking user B logging in with a password as an example, after user B enters the password on the login interface of the service platform, the service platform verifies whether the password entered by user B is consistent with the password entered by user B when registering on the service platform. If they are consistent, user B is allowed to log in to the service platform; if they are not consistent, user B is denied to log in to the service platform. Or take user B’s fingerprint authentication login as an example. After user B enters fingerprint information on the login interface of the service platform, the service platform verifies whether the fingerprint information entered by user B on the login interface is the same as that entered by user B when registering on the service platform The fingerprint information is consistent. If they are consistent, user B is allowed to log in to the service platform; if they are not consistent, user B is denied to log in to the service platform. Specifically, the matching recognition at S208 refers to comparing the facial feature image of user A collected at S208 with the facial feature image of user A stored at S202. At S210, if the matching authentication is successful, the desensitized insurance policy is shown to user A. At S212, a policy of user B is generated based on the purchase instruction of user B. It is understandable that after showing the desensitized insurance policy to user A, user A can check the insurance products involved in the desensitized insurance policy, and if there is a satisfactory insurance product, he can directly purchase the insurance product, thereby resulting in a related purchase. It should be noted that although the method shown in FIG. 2 is described using an insurance policy as an example, the information to be shared in the embodiment of the present invention is not limited to information related to the insurance policy. In the method shown in FIG. 2, the face-swiping authentication is taken as an example for description, but the authentication method in the embodiment of the present invention is not limited to this, for example, fingerprint authentication may also be used. The information sharing method according to the embodiment of the present invention is described in detail above with reference to FIGS. 1 and 2. The electronic device according to the embodiment of the present invention will be described in detail below with reference to FIG. 3. Referring to FIG. 3, at the hardware level, the electronic device includes a processor, optionally, an internal bus, a network interface, and a memory. Among them, the memory may include memory, such as high-speed random-access memory (Random-Access Memory, RAM), and may also include non-volatile memory, such as at least one magnetic disk memory. Wait. Of course, the electronic equipment may also include hardware required by other businesses. The processor, network interface, and memory can be connected to each other by an internal bus, which can be an Industry Standard Architecture (ISA) bus or a Peripheral Component Interconnect (PCI) bus Or extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, etc. The bus can be divided into address bus, data bus, control bus, etc. For ease of presentation, only one double-headed arrow is used to indicate in FIG. 3, but it does not mean that there is only one bus or one type of bus. Memory, used to store programs. Specifically, the program may include program code, and the program code includes computer operation instructions. The memory may include memory and non-volatile memory, and provide instructions and data to the processor. The processor reads the corresponding computer program from the non-volatile memory to the memory and then runs, forming an information sharing device on a logical level. The processor executes the programs stored in the memory, and is specifically used to perform the following operations: When the first user successfully logs in to the service platform, obtain the first biometric image of the second user; Matching the first biometric image with the biometric template of the second user; Based on the matching result, it is determined whether to show the information to be shared of the second user to the first user. The method executed by the information sharing device disclosed in the embodiment shown in FIG. 1 and FIG. 2 of the present invention may be applied to or implemented by a processor. The processor may be an integrated circuit chip with signal processing capabilities. In the implementation process, the steps of the above method can be completed by hardware integrated logic circuits in the processor or instructions in the form of software. The aforementioned processor may be a general-purpose processor, including a central processing unit (CPU), a network processor (Network Processor, NP), etc.; it may also be a digital signal processor (DSP), a dedicated Integrated circuit (Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components. The methods, steps, and logic block diagrams disclosed in the embodiments of the present invention can be implemented or executed. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like. The steps of the method disclosed in combination with the embodiments of the present invention can be directly embodied as executed by a hardware decoding processor, or executed by a combination of hardware and software modules in the decoding processor. The software module can be located in random memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers, and other mature storage media in the field. The storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware. The electronic device can also execute the method in FIG. 2 and realize the functions of the embodiment of the information sharing device shown in FIG. 2, and the details of the embodiment of the present invention are not repeated here. Of course, in addition to the software implementation, the electronic device of the present invention does not exclude other implementations, such as logic devices or a combination of software and hardware, etc., which means that the execution body of the following processing flow is not limited to each logic unit , It can also be a hardware or logic device. An embodiment of the present invention also provides a computer-readable storage medium, the computer-readable storage medium stores one or more programs, the one or more programs include instructions, when the instructions are executed by an electronic device that includes multiple application programs , The electronic device can be used to execute the method of the embodiment shown in FIG. 1 and FIG. 2, and is specifically used to execute the following method: When the first user successfully logs in to the service platform, obtain the first biometric image of the second user; Matching the first biometric image with the biometric template of the second user; Based on the matching result, it is determined whether to show the information to be shared of the second user to the first user. FIG. 4 is a schematic structural diagram of an information sharing device according to an embodiment of the present invention. Referring to FIG. 4, in a software implementation manner, the information sharing device 400 may include: an acquisition unit 401, a matching unit 402, and a processing unit 403, wherein, The acquiring unit 401, when the first user successfully logs in to the service platform, acquires the first biometric image of the second user; A matching unit 402, which matches the first biometric image with the biometric template of the second user; The processing unit 403 determines whether to show the information to be shared of the second user to the first user based on the matching result. According to the information sharing device of the embodiment of the present invention, when the first user successfully logs into the service platform, the first biometric image of the second user can be obtained, and the first biometric image can be matched with the biometric template of the second user , According to the matching result, determine whether to show the second user's information to be shared to the first user. Generally, when the first user successfully logs in to the service platform, the second user’s consent is required to obtain the second user’s biometric image, that is, only the second user’s to-be-shared information can be shared with the users that the second user wants to share. Therefore, the privacy of the second user's information can be protected. Furthermore, it is determined whether to show the shared information of the second user to the first user based on the matching verification result of the biometric image of the second user, which can ensure the security of the information of the second user. Optionally, as an embodiment, before the first user successfully logs in to the service platform, the processing unit 403: Determine the information to be shared of the second user. Optionally, as an embodiment, the processing unit 403: Receiving a selection instruction input by the second user; The information selected from the information related to the second user according to the selection instruction is determined as the information to be shared. Optionally, as an embodiment, the processing unit 403: When it is determined that the second user is a legitimate user, receiving a selection instruction input by the second user. Optionally, as an embodiment, before the processing unit 403 determines that the second user is a legitimate user, the acquisition unit 401: acquires a second biometric image of the second user; The processing unit 403: Based on the result of matching the information carried on the second biometric image with the information in the ID card information source, it is determined whether the second user is a legal user, wherein the ID card information source includes the legal user’s ID card information, the ID card information includes biometric information. Optionally, as an embodiment, the processing unit 403: Save the second biometric image when the information carried on the second biometric image matches the information in the ID card information source successfully; The second biometric image is determined as the biometric template of the second user. Optionally, as an embodiment, the information to be shared is information related to the insurance policy of the second user; Among them, the processing unit 403: Determine the policy to be shared in the policy of the second user; The information other than the privacy information related to the second user in the policy to be shared is determined as the information to be shared. Optionally, as an embodiment, the processing unit 403: When the matching is successful, the information to be shared of the second user is displayed to the first user. Optionally, as an embodiment, after displaying the to-be-shared information of the second user to the first user, the processing unit 403: Receiving a purchase instruction input by the first user based on the information to be shared, the purchase instruction being used to purchase insurance products related to the insurance policy of the second user; Based on the purchase instruction, an insurance policy for the first user is generated. The information sharing device 400 can also execute the method of the embodiment shown in FIG. 1 and FIG. 2 and realize the functions of the information sharing device in the embodiment shown in FIG. 1 and FIG. 2, which will not be repeated here. In short, the above descriptions are only preferred embodiments of the present invention, and are not intended to limit the protection scope of the present invention. Any modification, equivalent replacement, improvement, etc., made within the spirit and principle of the present invention shall be included in the protection scope of the present invention. The systems, devices, modules, or units explained in the above embodiments may be implemented by computer chips or entities, or implemented by products with certain functions. A typical implementation device is a computer. Specifically, the computer may be, for example, a personal computer, a notebook computer, a cell phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or Any combination of these devices. Computer-readable media includes permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology. Information can be computer-readable instructions, data structures, program modules, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), and other types of random access memory (RAM) , Read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, read-only disc (CD-ROM), digital versatile disc (DVD) ) Or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices or any other non-transmission media that can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves. It should also be noted that the terms "including", "including" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, commodity or equipment including a series of elements not only includes those elements, but also includes Other elements that are not explicitly listed, or also include elements inherent to such processes, methods, commodities, or equipment. If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other identical elements in the process, method, commodity, or equipment that includes the element. The various embodiments in this specification are described in a progressive manner, and the same or similar parts between the various embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the part of the description of the method embodiment.

S102~S106‧‧‧步驟 S202~S212‧‧‧步驟 400‧‧‧資訊分享裝置 401‧‧‧獲取單元 402‧‧‧匹配單元 403‧‧‧處理單元S102~S106‧‧‧Step S202~S212‧‧‧Step 400‧‧‧Information Sharing Device 401‧‧‧Acquisition Unit 402‧‧‧Matching unit 403‧‧‧Processing unit

為了更清楚地說明本發明實施例或現有技術中的技術方案,下面將對實施例或現有技術描述中所需要使用的圖式作簡單地介紹,顯而易見地,下面描述中的圖式僅僅是本發明中記載的一些實施例,對於本領域具有通常知識者來講,在不付出創造性勞動性的前提下,還可以根據這些圖式獲得其他的圖式。 圖1是根據本發明的一個實施例的資訊分享方法的示意性流程圖。 圖2是根據本發明的一個具體實施例的資訊分享方法的示意性流程圖。 圖3是根據本發明實施例的電子設備的結構方塊圖。 圖4是根據本發明實施例的資訊分享裝置的結構示意圖。In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the drawings in the following description are merely the present For some of the embodiments described in the invention, for those with ordinary knowledge in the field, other schemas can be obtained based on these schemas without creative labor. Fig. 1 is a schematic flowchart of an information sharing method according to an embodiment of the present invention. Fig. 2 is a schematic flowchart of an information sharing method according to a specific embodiment of the present invention. Fig. 3 is a block diagram of the structure of an electronic device according to an embodiment of the present invention. FIG. 4 is a schematic structural diagram of an information sharing device according to an embodiment of the invention.

Claims (11)

一種資訊分享方法,包括:在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像;將該第一生物特徵圖像與該第二用戶的生物特徵模板進行匹配;基於匹配結果,確定是否向該第一用戶展示該第二用戶的待分享資訊,其中,該待分享資訊為與該第二用戶的保單相關的資訊,並且,該待分享資訊已經過抹除隱私資訊或對隱私資訊進行打碼的脫敏處理。 An information sharing method includes: acquiring a first biometric image of a second user when a first user successfully logs in to a service platform; matching the first biometric image with a biometric template of the second user; based on According to the matching result, it is determined whether to show the information to be shared of the second user to the first user, where the information to be shared is information related to the insurance policy of the second user, and the information to be shared has been erased private information Or desensitize the coding of private information. 根據申請專利範圍第1項所述的方法,在第一用戶成功登入服務平臺之前,還包括:確定該第二用戶的待分享資訊。 According to the method described in item 1 of the scope of patent application, before the first user successfully logs in to the service platform, the method further includes: determining the information to be shared of the second user. 根據申請專利範圍第2項所述的方法,該確定該第二用戶的待分享資訊,包括:接收該第二用戶輸入的選擇指令;將根據該選擇指令從該第二用戶相關的資訊中選擇出的資訊,確定為該待分享資訊。 According to the method described in item 2 of the scope of patent application, the determining the information to be shared of the second user includes: receiving a selection instruction input by the second user; selecting information related to the second user according to the selection instruction The information released is determined to be the information to be shared. 根據申請專利範圍第3項所述的方法,該接收該第二 用戶輸入的選擇指令,包括:在確定該第二用戶為合法用戶時,接收該第二用戶輸入的選擇指令。 According to the method described in item 3 of the scope of patent application, the second The selection instruction input by the user includes: receiving the selection instruction input by the second user when it is determined that the second user is a legitimate user. 根據申請專利範圍第4項所述的方法,在確定該第二用戶為合法用戶之前,還包括:獲取該第二用戶的第二生物特徵圖像;基於該第二生物特徵圖像上承載的資訊與身份證資訊源中的資訊進行匹配的結果,確定該第二用戶是否為合法用戶,其中,該身份證資訊源中包括合法用戶的身份證資訊,該身份證資訊中包括生物特徵資訊。 According to the method described in item 4 of the scope of patent application, before determining that the second user is a legitimate user, the method further includes: acquiring a second biometric image of the second user; The result of matching the information with the information in the ID card information source determines whether the second user is a legal user, wherein the ID card information source includes the ID card information of the legal user, and the ID card information includes biometric information. 根據申請專利範圍第5項所述的方法,還包括:在第二生物特徵圖像上承載的資訊與身份證資訊源中的資訊匹配成功時,保存該第二生物特徵圖像;將該第二生物特徵圖像確定為該第二用戶的生物特徵模板。 According to the method described in item 5 of the scope of patent application, it further includes: saving the second biometric image when the information carried on the second biometric image matches the information in the ID card information source; The second biometric image is determined as the biometric template of the second user. 根據申請專利範圍第1項所述的方法,還包括:在匹配成功時,向該第一用戶展示該第二用戶的待分享資訊。 The method according to item 1 of the scope of patent application further includes: when the matching is successful, displaying the information to be shared of the second user to the first user. 根據申請專利範圍第7項所述的方法,在向第一用戶 展示該第二用戶的待分享資訊之後,還包括:接收該第一用戶基於該待分享資訊輸入的購買指令,該購買指令用於購買第二用戶的保單所涉及的保險產品;基於該購買指令,產生該第一用戶的保單。 According to the method described in item 7 of the scope of patent application, the first user After displaying the information to be shared of the second user, it further includes: receiving a purchase instruction input by the first user based on the information to be shared, the purchase instruction being used to purchase insurance products related to the insurance policy of the second user; based on the purchase instruction , Generate the insurance policy for the first user. 一種資訊分享裝置,包括:獲取單元,在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像;匹配單元,將該第一生物特徵圖像與該第二用戶的生物特徵模板進行匹配;處理單元,基於匹配結果,確定是否向該第一用戶展示該第二用戶的待分享資訊,其中,該待分享資訊為與該第二用戶的保單相關的資訊,並且,該待分享資訊已經過抹除隱私資訊或對隱私資訊進行打碼的脫敏處理。 An information sharing device includes: an obtaining unit, which obtains a first biometric image of a second user when the first user successfully logs in to a service platform; and a matching unit, which compares the first biometric image with the biometric of the second user The feature template is matched; the processing unit, based on the matching result, determines whether to display the information to be shared of the second user to the first user, where the information to be shared is information related to the insurance policy of the second user, and the The information to be shared has been desensitized by erasing or coding the private information. 一種電子設備,包括:處理器;以及被安排成儲存電腦可執行指令的記憶體,該可執行指令在被執行時使用該處理器執行以下操作:在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像;將該第一生物特徵圖像與該第二用戶的生物特徵模板進行匹配; 基於匹配結果,確定是否向該第一用戶展示該第二用戶的待分享資訊,其中,該待分享資訊為與該第二用戶的保單相關的資訊,並且,該待分享資訊已經過抹除隱私資訊或對隱私資訊進行打碼的脫敏處理。 An electronic device comprising: a processor; and a memory arranged to store a computer executable instruction. When the executable instruction is executed, the processor is used to perform the following operations: when a first user successfully logs in to a service platform, obtain a first user 2. The first biometric image of the user; matching the first biometric image with the biometric template of the second user; Based on the matching result, it is determined whether to show the information to be shared of the second user to the first user, where the information to be shared is information related to the insurance policy of the second user, and the information to be shared has been erased for privacy Information or desensitization processing for coding private information. 一種電腦可讀媒體,該電腦可讀媒體儲存一個或多個程式,該一個或多個程式當被包括多個應用程式的電子設備執行時,使得該電子設備執行以下操作:在第一用戶成功登入服務平臺時,獲取第二用戶的第一生物特徵圖像;將該第一生物特徵圖像與該第二用戶的生物特徵模板進行匹配;基於匹配結果,確定是否向該第一用戶展示該第二用戶的待分享資訊,其中,該待分享資訊為與第二用戶的保單相關的資訊,並且,該待分享資訊已經過抹除隱私資訊或對隱私資訊進行打碼的脫敏處理。 A computer-readable medium that stores one or more programs. When the one or more programs are executed by an electronic device including a plurality of application programs, the electronic device performs the following operations: When logging in to the service platform, acquire the first biometric image of the second user; match the first biometric image with the biometric template of the second user; based on the matching result, determine whether to show the first user The information to be shared of the second user, where the information to be shared is information related to the insurance policy of the second user, and the information to be shared has been desensitized by erasing or coding the privacy information.
TW107144998A 2018-01-25 2018-12-13 Information sharing method, device and electronic equipment TWI697860B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
??201810071589.2 2018-01-25
CN201810071589.2A CN108460263A (en) 2018-01-25 2018-01-25 Information sharing method, device and electronic equipment
CN201810071589.2 2018-01-25

Publications (2)

Publication Number Publication Date
TW201933233A TW201933233A (en) 2019-08-16
TWI697860B true TWI697860B (en) 2020-07-01

Family

ID=63238986

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107144998A TWI697860B (en) 2018-01-25 2018-12-13 Information sharing method, device and electronic equipment

Country Status (3)

Country Link
CN (1) CN108460263A (en)
TW (1) TWI697860B (en)
WO (1) WO2019144806A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108460263A (en) * 2018-01-25 2018-08-28 阿里巴巴集团控股有限公司 Information sharing method, device and electronic equipment
CN110046313B (en) * 2019-02-19 2023-09-22 创新先进技术有限公司 Information sharing methods, clients and servers
CN110070448B (en) * 2019-03-08 2023-10-03 创新先进技术有限公司 An electronic insurance policy processing method and server
CN114048505B (en) * 2021-11-15 2025-05-02 中国平安人寿保险股份有限公司 Information processing method, device, equipment and storage medium based on multiple terminals

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103379098A (en) * 2012-04-19 2013-10-30 华为技术有限公司 Content sharing method, device and network system thereof
CN105940423A (en) * 2014-01-31 2016-09-14 苹果公司 Use of biometric images for authorization

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020174345A1 (en) * 2001-05-17 2002-11-21 Patel Pankaj B. Remote authenticating biometric apparatus and method for networks and the like
CN105025043B (en) * 2014-04-17 2019-06-04 腾讯科技(深圳)有限公司 Information sharing method, apparatus and system
CN108460263A (en) * 2018-01-25 2018-08-28 阿里巴巴集团控股有限公司 Information sharing method, device and electronic equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103379098A (en) * 2012-04-19 2013-10-30 华为技术有限公司 Content sharing method, device and network system thereof
CN105940423A (en) * 2014-01-31 2016-09-14 苹果公司 Use of biometric images for authorization

Also Published As

Publication number Publication date
TW201933233A (en) 2019-08-16
CN108460263A (en) 2018-08-28
WO2019144806A1 (en) 2019-08-01

Similar Documents

Publication Publication Date Title
US12406038B1 (en) Systems and methods for location-binding authentication
TWI686757B (en) Resource transfer method, fund payment method, device and electronic equipment
US9489503B2 (en) Behavioral stochastic authentication (BSA)
TWI697860B (en) Information sharing method, device and electronic equipment
US10325088B2 (en) Method and system for information authentication
WO2021068636A1 (en) Block chain-based creation method, apparatus, device and system for verifiable claim
US20200293638A1 (en) Modifying application function based on login attempt confidence score
AU2013206619B2 (en) Methods and systems for improving the accuracy performance of authentication systems
US20230410087A1 (en) System and method of operating a secure contactless transaction
CN107818301B (en) Method, apparatus and electronic device for updating a biometric template
ES2802924T3 (en) Method and system for the authentication of a service
US20090328137A1 (en) Method for protecting data in mashup websites
US11232182B2 (en) Open data biometric identity validation
US12052573B2 (en) Systems and methods for mitigating fraud based on geofencing
CN111915317B (en) A payment processing method, device and system
CN108280144A (en) Information display method, device and electronic device
CN110365626B (en) User login security authentication method for anti-collision library, terminal equipment and storage medium
CN113497807A (en) Method and device for detecting user login risk and computer readable storage medium
CN116614805A (en) A cross-device input method, system and related device for short message verification code
CN111400690A (en) Biological verification method and device
KR102102179B1 (en) Embedded system, authentication system comprising the same, method of authenticating the system
CN109067715B (en) Verification method and device
CN111209552A (en) Identity authentication method and device based on user behaviors
US20110264900A1 (en) Method and arrangement for configuring electronic devices
US20140215592A1 (en) Method, apparatus and system for user authentication