[go: up one dir, main page]

CN114679317B - Data viewing method and device - Google Patents

Data viewing method and device Download PDF

Info

Publication number
CN114679317B
CN114679317B CN202210301189.2A CN202210301189A CN114679317B CN 114679317 B CN114679317 B CN 114679317B CN 202210301189 A CN202210301189 A CN 202210301189A CN 114679317 B CN114679317 B CN 114679317B
Authority
CN
China
Prior art keywords
data
user
trusted
terminal
trusted data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210301189.2A
Other languages
Chinese (zh)
Other versions
CN114679317A (en
Inventor
张腾
张凯尧
王甜
赵润娇
郭书源
侯恩训
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202210301189.2A priority Critical patent/CN114679317B/en
Publication of CN114679317A publication Critical patent/CN114679317A/en
Application granted granted Critical
Publication of CN114679317B publication Critical patent/CN114679317B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the specification provides a data viewing method and device, wherein the data viewing method comprises the following steps: receiving a viewing request for the trusted data of the second user in the trusted data item sent by a first terminal of the first user, and judging whether a viewing authorization record corresponding to the trusted data, which is authorized by the second user to the first user, exists in a database; if yes, calling a data interface to acquire data details of the trusted data according to the data identification of the trusted data; transmitting the data details to the first terminal; the trusted data is determined in a trusted manner by the project platform carrying the trusted data project, and a link that the second user authorizes the first user for the trusted data is added by judging whether a viewing authorization record corresponding to the trusted data, which is authorized by the second user to the first user, exists in the database, so that the security of the trusted data is improved, and the trust degree between the first user and the second user is further improved.

Description

Data viewing method and device
The application relates to a division application of application number 201911369433.3, application date 2019, 12 month and 26 days, and the name of the division application is data checking method and device.
Technical Field
The embodiment of the specification relates to the technical field of data processing, in particular to three data viewing methods. One or more embodiments of the present specification relate to three data viewing apparatuses, three computing devices, and three computer-readable storage media simultaneously.
Background
Along with the diversification of interaction modes, various interactions can be performed between people on line and off line, such as: when the interaction is carried out, however, mutual trust problems often exist among interaction objects, namely, doubts exist on data provided by the opposite sides, at present, mutual investigation of the interaction objects for the data lacks reliability guarantee, or the data for mutual investigation of the reliability is too single and cannot meet the mutual trust problem of diversified interaction among people, so that the reliability verification of the data through complicated processes by using various channels is unavoidable, and a faster or more reliable scheme needs to be provided.
Disclosure of Invention
In view of this, the present description embodiments provide three data viewing methods. One or more embodiments of the present specification are directed to three data viewing apparatuses, three computing devices, and three computer-readable storage media simultaneously, to address the technical deficiencies of the prior art.
According to a first aspect of embodiments of the present specification, there is provided a data viewing method, including:
Receiving a viewing request, sent by a first terminal of a first user, of trusted data of a second user in a trusted data item, wherein the viewing request carries a first user identifier of the first user and a second user identifier of the second user;
judging whether a viewing authorization record corresponding to the trusted data, which is authorized by the second user corresponding to the second user identifier to the first user corresponding to the first user identifier, exists in a database;
if not, sending an authorization request for authorizing the trusted data to the first user to a second terminal of the second user;
Receiving an authorization instruction submitted by the second terminal for the authorization request;
Generating the viewing authorization record according to the first user identifier, the second user identifier and the data identifier of the trusted data carried in the authorization instruction;
According to the data identification, a data interface is called to acquire the data details of the trusted data;
Transmitting the data details to the first terminal;
the trusted data is determined by a project platform carrying the trusted data project operation.
Optionally, if the judging result of the step of judging whether the second user corresponding to the second user identifier exists in the database and viewing the authorization record corresponding to the trusted data, the step of authorizing the first user corresponding to the first user identifier is yes, the following operation is executed:
According to the data identification, a data interface is called to acquire the data details of the trusted data;
and sending the data details to the first terminal.
Optionally, before the step of receiving the viewing request for the trusted data of the second user in the trusted data item, which is sent by the first terminal of the first user, the method further includes:
receiving an identification code generation instruction aiming at the trusted data, which is sent by the second terminal;
Encoding according to the data identifier carried in the identification code generation instruction and the second user identifier of the second user to generate an identification code aiming at the trusted data;
and sending the identification code to the second terminal.
Optionally, after the step of calling a data interface to obtain the data details of the trusted data according to the data identifier is performed, and before the step of sending the data details to the first terminal is performed, the method further includes:
carrying out shielding processing on preset fields in the data details;
Updating the data details through the shielded data details and the view time corresponding to the shielded data details.
Optionally, after the step of sending the data details to the first terminal is performed, the method further includes:
Under the condition that a viewing instruction of the first terminal for the data details is received, counting down the viewing time;
And when the checking time countdown is 0, sending a deleting instruction aiming at the data details to the first terminal.
Optionally, before the step of receiving the identification code generation instruction for the trusted data sent by the second terminal is performed, the method further includes:
Receiving the trusted data for the trusted data item uploaded by the second terminal;
obtaining comparison information corresponding to the trusted data;
carrying out credibility verification on the credible data in a mode of comparing the credible data with the comparison information to obtain a verification result of the credibility verification;
and sending the verification result to the second terminal.
Optionally, before the step of receiving the identification code generation instruction for the trusted data sent by the second terminal is performed, the method further includes:
Receiving a certificate picture aiming at the trusted data item and uploaded by the second terminal, and taking the certificate picture as the trusted data;
identifying the trusted data to obtain certificate information contained in the trusted data;
Obtaining comparison information corresponding to the certificate information;
Comparing the certificate information with the comparison information to obtain a comparison result;
determining a verification result of carrying out credibility verification on the credible data according to the comparison result;
and sending the verification result to the second terminal.
Optionally, after the step of calling a data interface to obtain the data details of the trusted data according to the data identifier is performed, and before the step of sending the data details to the first terminal is performed, the method further includes:
carrying out shielding processing on preset fields in the data details;
and updating the data details through the shielded data details and the comparison result.
Optionally, after the step of sending the data details to the first terminal is performed, the method further includes:
receiving a page switching instruction which is sent by the first terminal and aims at a page where the data details are located;
marking the viewing authority record as a failure state;
And sending a deleting instruction aiming at the data details to the first terminal.
Optionally, in the case that the verification result is not trusted, performing the following operations:
and deducting the credit points of the second user according to agreement clauses agreed in the project agreement.
Optionally, before the step of receiving the identification code generation instruction for the trusted data sent by the second terminal is performed, the method further includes:
receiving a joining request for joining the trusted data item sent by the first terminal or a second terminal of the second user;
transmitting an item protocol of the trusted data item to the first terminal or the second terminal based on the join request;
adding the first user or the second user into the trusted data item under the condition that an agreement instruction submitted by the first terminal or the second terminal for the item agreement is received;
and sending a joining notification of joining the trusted data item by the first user or the second user to the first terminal or the second terminal.
According to a second aspect of embodiments of the present specification, there is provided a data viewing apparatus comprising:
The receiving request module is configured to receive a viewing request for trusted data of a second user in a trusted data item, which is sent by a first terminal of a first user, wherein the viewing request carries a first user identifier of the first user and a second user identifier of the second user;
The judging module is configured to judge whether a viewing authorization record corresponding to the trusted data, which is authorized by the second user corresponding to the second user identifier to the first user corresponding to the first user identifier, exists in a database;
If not, operating a sending request module; the sending request module is configured to send an authorization request for authorizing the trusted data to the first user to the second terminal of the second user;
The receiving instruction module is configured to receive an authorization instruction submitted by the second terminal for the authorization request;
The generation record module is configured to generate the viewing authorization record according to the first user identifier, the second user identifier and the data identifier of the trusted data carried in the authorization instruction;
The acquisition module is configured to call a data interface to acquire data details of the trusted data according to the data identifier;
a transmitting module configured to transmit the data details to the first terminal;
the trusted data is determined by a project platform carrying the trusted data project operation.
According to a third aspect of embodiments of the present specification, there is provided another data viewing method comprising:
collecting an identification code of the trusted data aiming at the trusted data item, which is displayed by a second terminal of a second user;
Analyzing the identification code, and sending a viewing request for the trusted data to a server according to an analysis result;
And receiving the data details of the trusted data returned by the server.
Optionally, after the step of receiving the data details of the trusted data returned by the server side is executed, the method further includes:
Displaying the data details on a page;
sending a data detail checking instruction to the server;
And deleting the data details when a deleting instruction for the data details is received.
Optionally, after the step of receiving the data details of the trusted data returned by the server side is executed, the method further includes:
Displaying the data details on a page;
under the condition that a page switching instruction aiming at a page where the data details are located is received, sending the page switching instruction to the server;
And deleting the data details when a deleting instruction for the data details is received.
Optionally, before the step of collecting the identification code of the trusted data for the trusted data item, which is displayed by the second terminal of the second user, is performed, the method further includes:
Sending a joining request for applying to join the trusted data item to the server;
receiving a project protocol for the trusted data project returned by the server based on the joining request;
And under the condition that an agreement instruction is submitted to the server side aiming at the project agreement, receiving a joining notification returned by the server side for joining the first user into the trusted data project.
According to a fourth aspect of embodiments of the present specification, there is provided another data viewing apparatus comprising:
The acquisition module is configured to acquire an identification code of the trusted data aiming at the trusted data item, which is displayed by a second terminal of the second user;
The analysis module is configured to analyze the identification code and send a viewing request for the trusted data to a server according to an analysis result;
And the receiving detail module is configured to receive the data details of the trusted data returned by the server.
According to a fifth aspect of embodiments of the present specification, there is provided a third data viewing method comprising:
displaying an identification code for the trusted data in the trusted data item;
Receiving an authorization request which is sent by a server and used for authorizing the first user aiming at the trusted data;
and submitting an authorization instruction for the authorization request to the server.
Optionally, before the step of presenting the identification code of the trusted data in the trusted data item is performed, the method further includes:
Sending an identification code generation instruction aiming at the trusted data to the server;
And receiving the identification code for the trusted data returned by the server based on the identification code generation instruction.
Optionally, before the step of sending the identification code generation instruction for the trusted data to the server is performed, the method further includes:
uploading the trusted data for the trusted data item to the server;
And receiving a verification result returned by the server for carrying out the credibility verification on the credible data.
Optionally, before the step of sending the identification code generation instruction for the trusted data to the server is performed, the method further includes:
uploading a certificate picture aiming at the trusted data item to the server, and taking the certificate picture as the trusted data;
And receiving a verification result returned by the server for carrying out the credibility verification on the credible data.
Optionally, before the step of sending the identification code generation instruction for the trusted data to the server is performed, the method further includes:
Sending a joining request for applying to join the trusted data item to the server;
receiving a project protocol for the trusted data project returned by the server based on the joining request;
And under the condition that an agreement instruction is submitted to the server side aiming at the project agreement, receiving a joining notification returned by the server side for joining the second user into the trusted data project.
According to a sixth aspect of embodiments of the present specification, there is provided a third data viewing apparatus comprising:
The display module is configured to display the identification code of the trusted data in the trusted data item;
The receiving request module is configured to receive an authorization request which is sent by the server and used for authorizing the first user aiming at the trusted data;
and the submitting instruction module is configured to submit an authorization instruction for the authorization request to the server.
According to a seventh aspect of embodiments of the present specification, there is provided a computing device comprising:
a memory and a processor;
The memory is for storing computer-executable instructions, and the processor is for executing the computer-executable instructions:
Receiving a viewing request, sent by a first terminal of a first user, of trusted data of a second user in a trusted data item, wherein the viewing request carries a first user identifier of the first user and a second user identifier of the second user;
judging whether a viewing authorization record corresponding to the trusted data, which is authorized by the second user corresponding to the second user identifier to the first user corresponding to the first user identifier, exists in a database;
if not, sending an authorization request for authorizing the trusted data to the first user to a second terminal of the second user;
Receiving an authorization instruction submitted by the second terminal for the authorization request;
Generating the viewing authorization record according to the first user identifier, the second user identifier and the data identifier of the trusted data carried in the authorization instruction;
According to the data identification, a data interface is called to acquire the data details of the trusted data;
Transmitting the data details to the first terminal;
the trusted data is determined by a project platform carrying the trusted data project operation.
According to a eighth aspect of embodiments of the present specification, there is provided another computing device comprising:
a memory and a processor;
The memory is for storing computer-executable instructions, and the processor is for executing the computer-executable instructions:
collecting an identification code of the trusted data aiming at the trusted data item, which is displayed by a second terminal of a second user;
Analyzing the identification code, and sending a viewing request for the trusted data to a server according to an analysis result;
And receiving the data details of the trusted data returned by the server.
According to a ninth aspect of embodiments of the present specification, there is provided a third computing device comprising:
a memory and a processor;
The memory is for storing computer-executable instructions, and the processor is for executing the computer-executable instructions:
displaying an identification code for the trusted data in the trusted data item;
Receiving an authorization request which is sent by a server and used for authorizing the first user aiming at the trusted data;
and submitting an authorization instruction for the authorization request to the server.
According to a tenth aspect of the embodiments of the present description, there is provided a computer-readable storage medium storing computer-executable instructions which, when executed by a processor, implement the steps of the data viewing method.
According to an eleventh aspect of embodiments of the present specification, there is provided another computer readable storage medium storing computer executable instructions which when executed by a processor implement the steps of another said data viewing method.
According to a twelfth aspect of embodiments of the present description, there is provided a third computer-readable storage medium storing computer-executable instructions which, when executed by a processor, implement the steps of the third described data viewing method.
According to one method embodiment of the specification, an execution subject is a server, whether a corresponding checking authorization record exists or not is judged through a checking request of the trusted data of a second user in a trusted data item sent by a first terminal, and if not, an authorization request for authorizing the trusted data to the first user is sent to the second terminal of the second user; receiving an authorization instruction submitted by the second terminal for the authorization request; according to the first user identification, the second user identification and the data identification of the trusted data carried in the authorization instruction, the checking authorization record is generated, the data details of the trusted data are obtained and sent to the first terminal, and therefore under the condition that the corresponding checking authorization record does not exist, the second user is obtained to authorize the trusted data to the first user, the trusted data which is determined by the project platform carrying the trusted data project in a trusted mode is checked by the first user through the first terminal, the trust degree of the first user to the checked trusted data is increased, the security of the trusted data is improved, the trust degree between the first user and the second user is further improved, and the transaction or service efficiency between the first user and the second user is potentially promoted.
According to the embodiment of the method, the execution main body of the method is the first terminal, the identification code aiming at the trusted data and displayed by the second user is collected, the identification code is analyzed, the query request aiming at the trusted data is sent to the server according to the analysis result, and the data details aiming at the trusted data and returned by the server are received based on the query request, so that the collection and identification of the identification code aiming at the trusted data and displayed by the second user are realized, the trusted data is checked, the checking flow of the first user on the trusted data is simplified, the checking experience of the first user is improved, the credibility of the first user on the trusted data is increased through the trusted data items, and the popularization of the trusted data items is easier.
The third method is implemented by the second terminal, the execution subject of the third method is the second terminal, the identification code of the trusted data is displayed, the first user is used as a viewing entrance of the trusted data, and under the condition that a viewing authorization record corresponding to the trusted data for the first user does not exist in the server database, the server receives an authorization request for the trusted data for the first user, and submits an authorization instruction to the server based on the authorization request, so that corresponding authorization is applied to the second terminal in the viewing process of the trusted data by the first user, the flexibility and instantaneity of the authorization are improved, and the security of the trusted data is improved.
Drawings
FIG. 1 is a flow chart of a method of viewing data provided in one embodiment of the present description;
FIG. 2 is a process flow diagram of a data viewing method for document pictures according to one embodiment of the present disclosure;
FIG. 3 is a schematic diagram of a data viewing device according to one embodiment of the present disclosure;
FIG. 4 is a flow chart of another data viewing method provided by one embodiment of the present description;
FIG. 5 is a schematic diagram of another data viewing device according to one embodiment of the present disclosure;
FIG. 6 is a flow chart of a third data viewing method provided by one embodiment of the present disclosure;
FIG. 7 is a schematic diagram of a third data viewing device according to an embodiment of the present disclosure;
FIG. 8 is a block diagram of a computing device provided by one embodiment of the present description;
FIG. 9 is a block diagram of another computing device provided by one embodiment of the present description;
FIG. 10 is a block diagram of a third computing device provided in one embodiment of the present description.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present description. This description may be embodied in many other forms than described herein and similarly generalized by those skilled in the art to whom this disclosure pertains without departing from the spirit of the disclosure and, therefore, this disclosure is not limited by the specific implementations disclosed below.
The terminology used in the one or more embodiments of the specification is for the purpose of describing particular embodiments only and is not intended to be limiting of the one or more embodiments of the specification. As used in this specification, one or more embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present specification refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that, although the terms first, second, etc. may be used in one or more embodiments of this specification to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first may also be referred to as a second, and similarly, a second may also be referred to as a first, without departing from the scope of one or more embodiments of the present description. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "in response to a determination" depending on the context.
In this specification, three data viewing methods are provided, and one or more embodiments of this specification relate to three data viewing apparatuses, three computing devices, and three computer-readable storage media at the same time, one by one, as described in detail in the following embodiments.
An embodiment of a data viewing method provided in the present specification is as follows:
fig. 1 shows a flowchart of a data viewing method according to an embodiment of the present disclosure, including steps S102 to S114.
Step S102, receiving a viewing request for trusted data of a second user in a trusted data item, which is sent by a first terminal of a first user, wherein the viewing request carries a first user identifier of the first user and a second user identifier of the second user.
The execution main body of the method embodiment of the specification is a server, the execution main bodies of the other two method embodiments of the specification are a first terminal and a second terminal, and the specification realizes that a first user checks trusted data of a second user in a trusted data item through interaction between the server and the first terminal and between the server and the second terminal.
The first terminal and the second terminal can be electronic devices such as a smart phone, a notebook computer, a tablet computer and the like; the server may be a cloud server or a common server, which is not limited herein; the trusted data comprises personal information, certification information, certificate information and the like, wherein the personal information can be names, works, addresses and the like, the certification information can be birth certificates, departure certificates and the like, and the certificate information can be identity cards, passports, driving cards, house property cards, student cards and the like; the first user refers to a viewer looking up the trusted data; the second user is a provider of trusted data, namely a viewable party of the trusted data; the trusted data items are used for storing data uploaded by a user for viewing by others, carrying out trusted assurance on the data, and taking the data as trusted data for viewing by others based on authorization of the user.
In practice, to improve knowledge between interactive objects, or to improve the efficiency of transactions or services between interactive objects, it is often necessary for one or more of the interactive objects to provide trusted data for their identity or credentials for viewing by other interactive objects, for example: the user A is a first user, the user B is a second user, the user A wants to use the user B as a family education, the user B needs to check the academic certificate, and the user A sends a check request for the picture of the academic certificate of the user B to a server through the smart phone P1 of the user A so as to check the academic certificate of the user B; or the user C is a first user, the user D is a second user, the user C wants to purchase a house with the user D and needs to check the house property certificate of the user D, and the user C sends a check request for the house property certificate of the user D to the server through the smart phone P11 of the user C so as to check the house property certificate of the user D.
In the embodiment of the specification, after the first user (the checking party) and the second user (the checked party) are added into the trusted data item, the trusted data of the second user is trusted and confirmed through the item platform carrying the trusted data item to be checked by the first user, so that the trust degree of the first user on the data provided by the second user is increased, and the first user is prevented from carrying out trusted verification on the data through other ways.
In a specific implementation, before receiving a request for viewing trusted data in a trusted data item sent by a first terminal of a first user, the second user needs to specify trusted data that can be viewed by the second user to the first user in an identification code manner according to a negotiation result between the first user and the second user, so that not only is data privacy of the second user protected, but also a viewing flow of the first user for the trusted data is simplified, and in an alternative implementation provided in the embodiment of the present specification, before receiving a request for viewing the trusted data sent by the first terminal of the first user for the second user, the method further includes:
receiving an identification code generation instruction aiming at the trusted data, which is sent by the second terminal;
Encoding according to the data identifier carried in the identification code generation instruction and the second user identifier of the second user to generate an identification code aiming at the trusted data;
and sending the identification code to the second terminal.
Specifically, the identification code of the trusted data may be a bar code, a two-dimensional code, a three-dimensional code, or the like, which is not limited herein; the data identifier can be a unique character string identifier generated by a server for the trusted data, and the corresponding trusted data can be determined through the data identifier; the second user identifier is a unique identifier of the pointer to the second user, in addition, the first user identifier exists in the first user, and the user uniquely identifies the first user at the server side.
In practical application, in the process of encoding the data identifier of the trusted data carried in the identifier generation instruction sent by the second terminal and the second user identifier of the second user to generate the identifier of the trusted data, high-strength encryption can be adopted to hide the sensitive information of the second user, so that the sensitive information of the second user is protected, and the anti-counterfeiting performance of the identifier is improved. In addition, the effective time can be set for the identification code in the process of generating the identification code, so that the safety of the trusted data is further ensured.
For example, the user a needs to check the academic certificate of the user B, the user B sends an identification code generation instruction for the academic certificate to the server through the smart phone P2, the identification code generation instruction carries a certificate identifier N032 of the academic certificate of the user B and a second user identifier PE02 of the user B, the two-dimensional code for the academic certificate of the user B is generated by encoding according to the certificate identifier N032 and the second user identifier PE02, the two-dimensional code is sent to the smart phone P2, the user a identifies the two-dimensional code displayed by the user B through the smart phone P2 through the smart phone P1, and a check request for the academic certificate is sent to the server.
Before receiving an identification code generation instruction for trusted data sent by a second terminal, a service end needs to add a trusted data item to a first user and a second user, provide viewing of the trusted data based on the trusted data item, and restrict or protect the first user and the second user by using an item protocol in the trusted data item, so that on one hand, the credibility of the trusted data is increased, and on the other hand, the credibility between the first user and the second user is also increased.
Receiving a joining request for joining the trusted data item sent by the first terminal or a second terminal of the second user;
transmitting an item protocol of the trusted data item to the first terminal or the second terminal based on the join request;
adding the first user or the second user into the trusted data item under the condition that an agreement instruction submitted by the first terminal or the second terminal for the item agreement is received;
and sending a joining notification of joining the trusted data item by the first user or the second user to the first terminal or the second terminal.
Specifically, the project protocol may agree that the data uploaded by the user for the trusted data project is true, agree that the data uploaded for the trusted data is true, and agree that the user is punished, and in addition, agree that privacy protection and the like for the data uploaded by the user are also agreed, without limitation.
When the method is implemented, after receiving a request for adding a trusted data item sent by a first user through a first terminal or a second user through a second terminal, a server sends an item protocol of the trusted data item to the first terminal or the second terminal, if the first user or the second user agrees to an agreement item agreed in the item protocol after reading the item protocol, the server submits an agreement instruction to the item protocol, adds the first user or the second user to the trusted data item after receiving the agreement instruction, and sends an addition notification for adding the first user or the second user to the trusted data item to the first terminal or the second terminal;
if the first user or the second user does not agree with the agreement item agreed in the project agreement after reading the project agreement, the first user or the second user is not added into the trusted data item.
In practical application, besides the first user or the second user actively applies for adding the trusted data item, the trusted data item can send an invitation for adding the trusted data item to the screened user through a preset screening condition, and the like, which is not limited herein.
For example: the user A sends a joining request for joining the credit data item to the server through the smart phone P1, the server sends an item protocol of the trusted data item to the smart phone P1 after receiving the joining request sent by the smart phone P1, the user A submits an agreement instruction to the server through the smart phone P1 after reading the item protocol, and the server joins the user A into the trusted data item and sends a joining notification for joining the user A into the trusted data item to the smart phone P1 when receiving the agreement instruction.
In addition, before the server receives the identification code generation instruction for the trusted data sent by the second terminal, the second user is required to upload the trusted data which can be checked by the first user through the second terminal, and perform the credibility verification on the trusted data uploaded by the second user, so that the credibility of the trusted data uploaded by the second user is ensured, the credibility of the first user for the checked trusted data is also improved, in the first alternative implementation manner provided in the embodiment of the present specification, before the second terminal sends the identification code generation instruction corresponding to the identification code for the first user to check the trusted data, the second terminal is required to upload the trusted data to the server, and the following operations are performed:
Receiving the trusted data for the trusted data item uploaded by the second terminal;
obtaining comparison information corresponding to the trusted data;
carrying out credibility verification on the credible data in a mode of carrying out similarity comparison on the credible data and the comparison information, and obtaining a verification result of the credibility verification;
and sending the verification result to the second terminal.
Specifically, the credibility verification may be that the server is connected with an external channel to obtain information related to the credible data uploaded by the second user, and compare the information related to the credible data as comparison information with the credible data, and obtain a verification result of performing the credibility verification on the credible data according to the similarity of comparison, where in practical application, the credible data and the comparison information may be input into a model to perform similarity comparison.
For example, the user B uploads the address information add1 to the server through the smart phone P2, uses the address information add1 as trusted data in the trusted data item, after receiving the address information add1, the server obtains the comparison address information add2 of the user B through an external channel, inputs the address information add1 and the comparison address information add2 into a comparison model for comparison, obtains the similarity of the comparison of the two address information to be 70%, and the similarity of the comparison to be less than 90%, and can determine that the verification result of the trusted verification of the address information add1 is unreliable, and sends the verification result to the smart phone P2.
In addition, before the server receives the identification code generation instruction for the trusted data sent by the second terminal, and if the trusted data uploaded by the second user through the second terminal is a certificate picture, by performing the trusted verification on the certificate picture uploaded by the second user, the trusted performance of the certificate picture uploaded by the second user is guaranteed, the trusted performance of the first user for the checked certificate picture is also improved, and in the second optional implementation manner provided in the embodiment of the present specification, before the second terminal sends the identification code generation instruction for the first user to check the identification code corresponding to the trusted data, the second terminal is required to upload the trusted data to the server, and if the trusted data is the certificate picture, the following operations are performed:
Receiving a certificate picture aiming at the trusted data item and uploaded by the second terminal, and taking the certificate picture as the trusted data;
identifying the trusted data to obtain certificate information contained in the trusted data;
Obtaining comparison information corresponding to the certificate information;
Comparing the certificate information with the comparison information to obtain a comparison result;
determining a verification result of carrying out credibility verification on the credible data according to the comparison result;
and sending the verification result to the second terminal.
Specifically, the identification of the certificate picture may be performed by using OCR (Optical Character Recognition ) to identify the certificate picture, so as to obtain the certificate information contained in the certificate picture, for example, when the certificate picture is an academic certificate picture of the user B, the name of the user B may be obtained by identifying the academic certificate picture by using OCR: name1, graduation university: s1, certificate number N34234 and other information; the comparison information may be field information corresponding to a certificate field obtained from a certificate field in the certificate information through an external channel, for example, a comparison name of the user B is obtained: name1, comparison graduation university: s1, comparing the certificate numbers: n34234, the comparison result can be the comparison similarity of certificate information and comparison information, and in addition, the comparison information can also be a certificate picture obtained from a authority.
For example, the user B uploads the learning certificate picture to the server through the smart phone P2, uses the learning certificate picture as the trusted data in the trusted data item, and after receiving the learning certificate picture, the server performs OCR recognition on the learning certificate picture to obtain the name of the user B: name1, graduation university: s1, certificate information such as certificate number N34234 and the like is obtained through an external channel to obtain the comparison name of the user B: name1, comparison graduation university: s1, comparing the certificate numbers: n34234 and the like, obtaining the certificate information and comparing the certificate information with the comparison information, wherein the obtained comparison result is that the comparison similarity is 100%, the comparison similarity is more than 90%, the verification result of the credibility verification of the academic certificate picture can be determined to be credible, and the verification result is sent to the smart phone P2.
On the basis of performing the credibility verification on the credible data uploaded by the second terminal, there is a situation that a verification result of the credibility verification is not credible, in this case, the second user should be punished by deducting the credit points of the second user according to the credit points agreed in the project protocol of the credible data project, so as to avoid that the credibility of the credible data project by the first user is damaged because the second user uploads the non-credible data, and in an alternative implementation manner provided in the embodiment of the present specification, under the situation that the verification result is not credible, the following operations are performed:
and deducting the credit points of the second user according to agreement clauses agreed by the agreement in the trusted data item.
Specifically, the project agreement may be a project agreement signed by the user when joining the trusted data project, or may be a project agreement signed by the user before uploading the trusted data, which is not limited herein; the credit points refer to credit point values, and in practical application, the different credit points can also correspond to different credit levels.
In the implementation, when the verification result of the credibility verification of the credible data uploaded by the second user is unreliable, punishment is performed by deducting the credit points of the second user, and when the verification result is credible, the uploaded credible data is stored in the server.
Along the above example, in the case that the verification result of the trust verification of the address information add1 uploaded by the smart phone P2 for the user B is not trusted, the credit points of 5 points of the user B are deducted according to the agreement terms agreed by the agreement in the trusted data item.
Step S104, judging whether a checking authorization record corresponding to the trusted data, which is authorized by the second user corresponding to the second user identifier to the first user corresponding to the first user identifier, exists in a database.
Specifically, in the step S102, based on receiving a request for checking the trusted data of the second user, whether a check authorization record corresponding to the trusted data and authorized by the second user corresponding to the second user identifier to the first user corresponding to the first user identifier exists in the database is determined, if so, it is indicated that there is authorization of the second user to the first user for the trusted data, data details of the trusted data can be obtained based on the check authorization record, and the obtained data details are sent to the first terminal; if not, indicating that the authorization of the second user to the first user for the trusted data is absent, the second user needs to obtain the corresponding authorization first, and executing step S106 described below.
In specific implementation, the viewing authorization record may be composed of a first user identifier of the first user, a second user identifier of the second user, and a data identifier of the trusted data; the viewing authorization record corresponding to the trusted data may refer to a viewing authorization record for the trusted data, or may be a viewing authorization record containing the trusted data, that is, the viewing authorization record also contains other trusted data, which is not limited herein.
In an optional implementation manner provided in this embodiment of the present disclosure, if the determination result of the step of checking authorization record corresponding to the trusted data, which is authorized by the second user corresponding to the second user identifier to the first user corresponding to the first user identifier, is yes, the following operation is performed:
According to the data identification, a data interface is called to acquire the data details of the trusted data;
and sending the data details to the first terminal.
In practical application, the data details can be the trusted data itself, or can be correspondingly increased or decreased based on the trusted data, which is not limited herein.
In the above example, wherein the first user identification of the first user is: PE01, if the second user authorizes the first user to view the authorization record corresponding to the trusted data in the database, the judgment result is yes, namely, the second user has the authorization record in the database: the authorized party: PE02, authorized party: PE01, data identification: and N032, calling a data interface to acquire a corresponding learning certificate picture of the user B according to the data identifier N032, and transmitting the acquired learning certificate picture to the smart phone P1 of the user A.
In practical application, under the condition that a corresponding checking authorization record exists in the database, the server returns corresponding trusted data according to a checking request of the first user for the trusted data of the second user, and the security of the trusted data is further improved by adding a link that the second user authorizes the first user for the trusted data.
And step S106, an authorization request for authorizing the first user for the trusted data is sent to a second terminal of the second user.
Specifically, in step S104, on the basis that it is determined that the viewing authorization record for the trusted data to the first user does not exist in the database, the server side sends an authorization request for authorizing the trusted data to the first user to the second terminal of the second user.
In practical application, the second user may actively authorize the first user for the trusted data before the first user sends the request for viewing the trusted data, and if the second user does not authorize the first user for the trusted data in advance, the server may send an authorization request for authorizing the first user for the trusted data to the second terminal of the second user after receiving the request for viewing the trusted data by the first user, that is, request the second user to authorize the first user for the trusted data.
Step S108, receiving an authorization instruction submitted by the second terminal for the authorization request.
Specifically, in step S106, on the basis of sending an authorization request for the trusted data to the first user to the second terminal, the second terminal submits an authorization instruction to the server for the authorization request.
Specifically, the authorization instruction carries a first user identifier of the first user, a second user identifier of the second user and a data identifier of the trusted data.
In addition, if the second terminal actively sends the authorization instruction for the trusted data to the first user, the authorization instruction may be generated by selecting the trusted data required for the first user to view in the trusted data list, and then selecting the first user in the user list, or by selecting the first user in the user list, and then selecting the trusted data required for the first user to view in the trusted data list, and then generating the authorization instruction, which is not limited herein.
Step S110, generating the viewing authorization record according to the first user identifier, the second user identifier, and the data identifier of the trusted data carried in the authorization instruction.
Along the above example, the user a needs to check the learning certificate of the user B, but the database does not have an authorization instruction for the learning certificate to the user a, the server sends an authorization request for the learning certificate to the user a to the second terminal, the second terminal submits the authorization instruction for the authorization request, and under the condition that the server receives the authorization instruction, the server generates a check authorization record according to the identifications according to the first user identification PE01 of the user a, the second user identification PE02 of the user B and the certificate identification N032 of the learning certificate of the user B in the authorization instruction: the authorized party: PE02, authorized party: PE01, authorization data: and N032, storing the viewing authorization record in a database.
And step S112, calling a data interface to acquire the data details of the trusted data according to the data identifier.
In practical application, on the basis of obtaining the data details of the trusted data, the obtained data details can be subjected to shielding treatment or limitation of viewing time aiming at the data details, so that the trusted data is protected, and the safety of the trusted data is further improved.
Carrying out shielding processing on preset fields in the data details;
Updating the data details through the shielded data details and the view time corresponding to the shielded data details.
In practical application, the preset field may be sensitive information in data details, different preset fields may be set according to different trusted data, and the second user may perform personalized setting, or may be uniformly set by trusted data items, where the preset field is not limited, for example: under the condition that the data details are the pictures of the academic certificates, the certificate numbers are used as sensitive information for shielding treatment; specifically, the masking may be masking one or more characters in the preset field with an asterisk, or may be masking all the preset fields, which is not limited herein; the viewing time may be a limitation on the viewing time of the first user for viewing the data details, and if the viewing time is set to 10 seconds, it indicates that the first user can view the data details for 10 seconds.
Along the above example, for the acquired academic certificate picture of the user B, if the preset field is the certificate number, the certificate number in the academic certificate picture is used as sensitive information, the last 4 bits of the certificate information are shielded by an asterisk, and the data details are updated through the shielded academic certificate picture and the viewing time preset for the academic certificate picture for 10 seconds.
In the case that the certificate picture is taken as the trusted data in the step S102, and on the basis of obtaining the data details of the trusted data, the obtained data details can be further subjected to shielding processing, and the data details are updated through the shielded data details and the comparison result of the certificate information contained in the certificate picture, so that not only is the safety of the trusted data improved, but also the credibility of the trusted data is better known by the first user, in an alternative implementation manner provided in the embodiment of the present specification, the data details are sent to the first terminal, and the method includes:
carrying out shielding processing on preset fields in the data details;
and updating the data details through the shielded data details and the comparison result.
Specifically, the masking processing for the preset field in the data details is similar to the specific implementation manner of masking processing for the preset field in the data details in the above embodiment, and the specific implementation manner in the above embodiment is referred to, and will not be described herein.
Along the above example, for the acquired academic certificate picture of the user B, if the preset field is the certificate number, the last 4 bits of the certificate information are shielded by using the certificate number in the academic certificate picture as the sensitive information, and the comparison result is obtained by comparing the shielded academic certificate picture and the certificate information in the academic certificate picture with the comparison information: the similarity of the comparison is 100% updated data details.
And step S114, the data details are sent to the first terminal.
Specifically, on the basis of the data details of the trusted data obtained in step S112, the data details are sent to the first terminal, and the first terminal receives the data details sent by the server and checks the data details.
In the step S112, after updating the data details through the masked data details and the view time corresponding to the masked data details, and sending the updated data details to the first terminal, the first user controls the view time of the data details through the first terminal according to the preset view time, so as to avoid long-time storage of the data details in the first terminal, and cause leakage of trusted data of the user B, thereby improving the security of the trusted data.
Under the condition that a viewing instruction of the first terminal for the data details is received, counting down the viewing time;
And when the checking time countdown is 0, sending a deleting instruction aiming at the data details to the first terminal.
In practical application, after the server side sends the data to the first terminal in detail, the first terminal checks the data details and sends a check instruction for the data details to the server side, the server side counts down the check time after receiving the check instruction, and when the check time count down is0, a deletion instruction for the data details is sent to the first terminal.
In the implementation, in addition to the above embodiment, after the data details are sent to the first terminal, the count-down may be directly performed with respect to the viewing time, or the first terminal may count down with respect to the viewing time, and when the count-down of the viewing time is 0, the data details may be directly deleted.
Along with the above example, after the data details updated through the shielded learning certificate picture and the viewing time 10 seconds preset for the learning certificate picture are sent to the smart phone P1 of the user a, the user a views the data details through the smart phone P1 and sends a viewing instruction for the data details to the server, the server counts down the viewing time 10 seconds when receiving the viewing instruction for the data details of the smart phone P1, and sends a deleting instruction for the data details to the smart phone P1 when counting down to 0 when viewing, and after receiving the deleting instruction, the smart phone P1 deletes the data details on the smart phone P1.
In addition, in the step S112, after updating the data details through the masked data details and the comparison result and sending the updated data details to the first terminal, the first user checks the data details through the first terminal, and after the checking is completed, marks the checking authorization data of the trusted data to the first user as an invalid state, in this case, the checking can be performed only once for one authorization, so as to improve the security of the trusted data.
Receiving a page switching instruction which is sent by the first terminal and aims at a page where the data details are located;
marking the viewing authority record as a failure state;
And sending a deleting instruction aiming at the data details to the first terminal.
Along the above example, the comparison result is obtained by comparing the shielded academic certificate picture and the certificate information in the academic certificate picture with the comparison information: after the compared data details with the similarity of 100% are sent to the smart phone P1 of the user A, the user A checks the received data details through the smart phone P1, switches the page where the data details are located after checking is completed, sends the page switching instruction to the server, marks the checking authorization record of the trusted data to the user A as a failure state after the server receives the page switching instruction, and sends a deleting instruction of the data details to the smart phone P1, and the smart phone P1 deletes the data details on the smart phone P1 after receiving the deleting instruction.
The application of the data viewing method provided in the present specification to document pictures is taken as an example in the following description with reference to fig. 2, and the data viewing method is further described. Fig. 2 is a process flow chart of a data viewing method applied to a certificate picture according to an embodiment of the present disclosure, and specific steps include steps S202 to S242.
Step S202, receiving the learning certificate picture for the trusted data item uploaded by the user B through the smart phone P2.
Specifically, the learning certificate picture is uploaded to the server by the user B through the smart phone P2 for viewing by others.
Step S204, identifying the academic certificate picture to obtain certificate information contained in the academic certificate picture.
Step S206, obtaining comparison information related to the certificate information.
Step S208, comparing the certificate information with the comparison information to obtain a comparison result.
Step S210, determining a verification result of performing credibility verification on the academic certificate picture according to the comparison result.
Step S212, the verification result is sent to the smart phone P2.
Specifically, after the server side sends the verification result to the smart phone P2, the smart phone P2 receives the verification result returned by the server side for performing the credibility verification on the learning certificate picture.
Step S214, receiving a two-dimension code generation instruction for the learning certificate picture sent by the smart phone P2.
Step S216, encoding according to the certificate identification of the academic certificate picture and the second user identification of the user B carried in the identification code generation instruction to generate a two-dimensional code aiming at the academic certificate picture.
Step S218, the two-dimensional code is sent to the smart phone P2.
Specifically, the smart phone P2 displays a two-dimensional code for the academic certificate picture; the smart phone P1 collects the two-dimensional code displayed by the smart phone P2; and analyzing the two-dimensional code, and sending a viewing request for the learning certificate picture to the server according to the analysis result.
Step S220, a viewing request for the learning certificate picture of the user B in the trusted data item, which is sent by the user A through the smart phone P1, is received, wherein the viewing request carries a first user identification of the user A and a second user identification of the user B.
Step S222, determining whether there is a viewing authorization record corresponding to the learning certificate picture, which is authorized by the user B corresponding to the second user identifier to the user a corresponding to the first user identifier, in the database.
If yes, the following step S230 is executed;
if not, the following step S224 is executed.
Step S224, an authorization request for authorizing the user a with respect to the learning certificate picture is sent to the smart phone P2 of the user B.
In practical application, the smart phone P2 receives an authorization request sent by a server side and aiming at an academic certificate picture to the user A; and submitting an authorization instruction for the authorization request to the server.
In step S226, an authorization instruction for the authorization request submitted by the smart phone P2 is received.
Step S228, according to the first user identification, the second user identification and the certificate identification of the learning certificate picture carried in the authorization instruction, a checking authorization record is generated.
Step S230, calling a data interface to acquire certificate details of the academic certificate picture according to the certificate identification.
Step S232, shielding processing is conducted on preset fields in the certificate details.
Step S234, updating the certificate details through the shielded certificate details and the comparison result obtained by comparing the certificate information in the certificate picture with the comparison information.
Step S236, sending certificate details to the smart phone P1.
Specifically, after the server side sends the certificate details to the smart phone P1, the smart phone P1 receives the certificate details returned by the server side; displaying certificate details on the smart phone P1; after the user A finishes checking, page switching is carried out on the page where the certificate details are located through the smart phone P1, and a page switching instruction for the page where the certificate details are located is sent to the server.
Step S238, a page switching instruction sent by the smart phone P1 aiming at the page where the certificate details are located is received. Step S240, marks the viewing authority record as invalid.
Specifically, after the viewing authorization record is in the invalid state, the user a cannot view the certificate details again without obtaining the re-authorization of the user B to the user a for the certificate picture of the academic.
Step S242, a delete instruction for the certificate details is sent to the smartphone P1.
Specifically, after the server sends a certificate detail deleting instruction to the smart phone P1, the smart phone P1 deletes the certificate detail when receiving the certificate detail deleting instruction.
In summary, in an embodiment of the present disclosure, an execution subject of the method is a server, so that under the condition that there is no corresponding viewing authorization record, authorization of the trusted data to the first user is obtained from the second user, and trusted data that is determined by the project platform that carries the trusted data project is trusted, so that the first user views the trusted data through the first terminal, thereby increasing the trust degree of the first user on the viewed trusted data, improving the security of the trusted data, and further improving the trust degree between the first user and the second user, and thus potentially promoting the efficiency of transaction or service between the first user and the second user.
An embodiment of a data viewing device provided in the present specification is as follows:
Corresponding to the method embodiment, the present disclosure further provides an embodiment of a data viewing device, and fig. 3 shows a schematic structural diagram of the data viewing device provided in one embodiment of the present disclosure. As shown in fig. 3, the apparatus includes:
a receiving request module 302, configured to receive a viewing request for trusted data of a second user in a trusted data item sent by a first terminal of a first user, where the viewing request carries a first user identifier of the first user and a second user identifier of the second user;
A determining module 304, configured to determine whether a viewing authorization record corresponding to the trusted data, authorized by the second user corresponding to the second user identifier, to the first user corresponding to the first user identifier exists in a database;
if not, the sending request module 306 is operated; the sending request module 306 is configured to send an authorization request for authorizing the trusted data to the first user to the second terminal of the second user;
a receiving instruction module 308 configured to receive an authorization instruction submitted by the second terminal for the authorization request;
a generation record module 310 configured to generate the viewing authorization record according to the first user identifier, the second user identifier, and the data identifier of the trusted data carried in the authorization instruction;
An obtaining module 312, configured to invoke a data interface to obtain data details of the trusted data according to the data identifier;
a transmitting module 314 configured to transmit the data details to the first terminal;
the trusted data is determined by a project platform carrying the trusted data project operation.
Optionally, if the judgment result output by the judgment module 304 is yes, the following modules are operated:
the acquisition detail module is configured to call a data interface to acquire the data details of the trusted data according to the data identifier;
and the transmission detail module is configured to transmit the data details to the first terminal.
Optionally, the data viewing device further includes:
The receiving and generating instruction module is configured to receive an identification code generating instruction aiming at the trusted data, which is sent by the second terminal;
the identification code generation module is configured to code and generate an identification code aiming at the trusted data according to the data identification carried in the identification code generation instruction and the second user identification of the second user;
And the identification code sending module is configured to send the identification code to the second terminal.
Optionally, the data viewing device further comprises
The first shielding module is configured to perform shielding processing on preset fields in the data details;
The first data sending module is configured to update the data details through the shielded data details and the view time corresponding to the shielded data details.
Optionally, the data viewing device further includes:
The countdown module is configured to count down the view time under the condition that a view instruction of the first terminal for the data details is received;
and the first transmission deleting instruction module is configured to transmit a deleting instruction aiming at the data details to the first terminal when the viewing time countdown is 0.
Optionally, the data viewing device further includes:
a trusted data receiving module configured to receive the trusted data for the trusted data item uploaded by the second terminal;
The first acquisition comparison information module is configured to acquire comparison information corresponding to the trusted data;
the verification result obtaining module is configured to perform credibility verification on the credible data in a manner of comparing the credible data with the comparison information, so as to obtain a verification result of the credibility verification;
And the first verification result sending module is configured to send the verification result to the second terminal.
Optionally, the data viewing device further includes:
A certificate picture receiving module configured to receive a certificate picture for the trusted data item uploaded by the second terminal, and take the certificate picture as the trusted data;
the data identification module is configured to identify the trusted data and obtain certificate information contained in the trusted data;
The second acquisition comparison information module is configured to acquire comparison information corresponding to the certificate information;
the comparison result obtaining module is configured to compare the certificate information with the comparison information to obtain a comparison result;
the verification result determining module is configured to determine a verification result of performing credibility verification on the credible data according to the comparison result;
And the second verification result sending module is configured to send the verification result to the second terminal.
Optionally, the data viewing device further includes:
the first shielding module is configured to perform shielding processing on preset fields in the data details;
And the second data sending module is configured to update the data details through the shielded data details and the comparison result.
Optionally, the data viewing device further includes:
the switching instruction receiving module is configured to receive a page switching instruction which is sent by the first terminal and is aimed at a page where the data details are located;
a marking module configured to mark the viewing authority record as a disabled state;
And the second transmission deleting instruction module is configured to transmit a deleting instruction aiming at the data details to the first terminal.
Optionally, if the verification result is not trusted, the following modules are run:
And the credit deduction module is configured to deduct the credit of the second user according to agreement clauses agreed in the project agreement.
Optionally, the data viewing device further includes:
The receiving joining request module is configured to receive a joining request for joining the trusted data item sent by the first terminal or the second terminal of the second user;
A transmission project agreement module configured to transmit a project agreement of the trusted data project to the first terminal or the second terminal based on the join request;
a project joining module configured to join the first user or the second user in the trusted data project upon receiving an agreement instruction submitted by the first terminal or the second terminal for the project agreement;
and a sending joining notification module configured to send a joining notification of joining the trusted data item by the first user or the second user to the first terminal or the second terminal.
The above is an exemplary scheme of a data viewing apparatus of the present embodiment. It should be noted that, the technical solution of the data viewing device and the technical solution of the data viewing method belong to the same concept, and details of the technical solution of the data viewing device, which are not described in detail, can be referred to the description of the technical solution of the data viewing method.
The second embodiment of the method according to the present disclosure is a second embodiment of the method according to the present disclosure, and the second embodiment of the method according to the present disclosure includes a second terminal, and the second terminal is configured to perform the second processing according to the second embodiment of the method according to the present disclosure. Fig. 4 shows a flowchart of another data viewing method according to an embodiment of the present disclosure, including steps S402 to S406.
Step S402, collecting the identification code of the trusted data aiming at the trusted data item, which is displayed by the second terminal of the second user.
Specifically, the identification code of the trusted data can be a bar code, a two-dimensional code or a three-dimensional code, and the like, and in practical application, the second terminal displays the identification code of the trusted data to the first terminal, so that the identification code is used as a viewing inlet of the trusted data provided by the second user to the first user, and the viewing flow of the first user for the trusted data is simplified.
In practical application, the identification code displayed by the second terminal can be encrypted with high strength, so that the sensitive information of the second user is hidden, the sensitive information of the second user is protected, and the anti-counterfeiting performance of the identification code is improved. In addition, the effective time can be set for the identification code in the process of generating the identification code, so that the safety of the trusted data is further ensured.
In the implementation, since the trusted data is confirmed by the credibility of the project platform carrying the operation of the trusted data project, after the first user is used as the viewing party of the trusted data to join the trusted data project, the trusted data provided by other users in the trusted data project is viewed, and the user in the trusted data project is restrained and protected by the project protocol in the trusted data project, so that the credibility and the safety of the trusted data are improved.
Sending a joining request for applying to join the trusted data item to the server;
receiving a project protocol for the trusted data project returned by the server based on the joining request;
And under the condition that an agreement instruction is submitted to the server side aiming at the project agreement, receiving a joining notification returned by the server side for joining the first user into the trusted data project.
And step S404, analyzing the identification code, and sending a viewing request for the trusted data to a server according to the analysis result.
Specifically, the first terminal obtains a data identifier of the trusted data contained in the identifier and a second user identifier of the second user by analyzing the identifier of the trusted data provided by the second terminal, and sends a viewing request for the trusted data to the server based on the obtained data identifier and the second user identifier.
Step S406, receiving the data details of the trusted data returned by the server.
Specifically, after receiving the data details of the trusted data returned by the server, displaying the data details on a page of the first terminal, in order to further improve the security of the data details of the trusted data and avoid leakage of the trusted data, after the server checks the data details, the server restricts the display time of the data details on the first terminal according to a preset check time, and in an optional implementation provided in the embodiment of the present disclosure, the data protection is performed on the data details of the trusted data returned by the server at the first terminal, specifically by adopting the following manner:
Displaying the data details on a page;
sending a data detail checking instruction to the server;
And deleting the data details when a deleting instruction for the data details is received.
In practical application, the deleting data details may be deleting data, pages or websites of the data details, and the like, which is not limited herein.
In addition, after receiving the data details of the trusted data returned by the server, displaying the data details on the page, when the first user performs page switching on the page where the data details are located through the first terminal, indicating that the data details are completely checked, sending a page switching instruction to the server, and deleting the data details at the first terminal under the condition that a deleting instruction of the server is received, so that the security of the data details of the trusted data is improved.
Displaying the data details on a page;
under the condition that a page switching instruction aiming at a page where the data details are located is received, sending the page switching instruction to the server;
And deleting the data details when a deleting instruction for the data details is received.
In summary, in another embodiment of the present disclosure, the execution subject of the method is a first terminal, by collecting the identification code for the trusted data displayed by the second user, analyzing the identification code, sending a query request for the trusted data to the server according to the analysis result, and receiving the data details for the trusted data returned by the server based on the query request, thereby implementing collection and analysis of the identification code for the trusted data displayed by the second user, viewing the trusted data, simplifying the viewing process of the trusted data by the first user, improving the viewing experience of the first user, increasing the credibility of the trusted data by the first user through the trusted data item, and facilitating popularization of the trusted data item.
Another embodiment of the data viewing device provided in this specification is as follows:
corresponding to the above-mentioned another method embodiment, the present disclosure further provides another data viewing device embodiment, and fig. 5 shows a schematic structural diagram of another data viewing device provided in one embodiment of the present disclosure. As shown in fig. 5, the apparatus includes:
The collection module 502 is configured to collect an identification code of the trusted data for the trusted data item displayed by the second terminal of the second user;
a sending request module 504, configured to parse the identification code, and send a viewing request for the trusted data to a server according to the parsing result;
and the receiving detail module 506 is configured to receive the data details of the trusted data returned by the server.
Optionally, the data viewing device further includes:
the display module is configured to display the data details on a page;
The sending and viewing instruction module is configured to send a viewing instruction aiming at the data details to the server;
and the deleting detail module is configured to delete the data details when a deleting instruction for the data details is received.
Optionally, after the step of receiving the data details of the trusted data returned by the server side is executed, the method further includes:
Displaying the data details on a page;
under the condition that a page switching instruction aiming at a page where the data details are located is received, sending the page switching instruction to the server;
And deleting the data details when a deleting instruction for the data details is received.
Optionally, the data viewing device further includes:
the sending joining request module is configured to send a joining request for applying to join the trusted data item to the server;
The receiving project agreement module is configured to receive the project agreement for the trusted data project returned by the server based on the joining request;
and the receiving joining notification module is configured to receive a joining notification returned by the server to join the first user into the trusted data item under the condition that an agreement instruction is submitted to the server for the item protocol.
The above is another exemplary embodiment of the data viewing device of the present embodiment. It should be noted that, the technical solution of the data viewing device and the technical solution of the other data viewing method belong to the same concept, and details of the technical solution of the data viewing device, which are not described in detail, can be referred to the description of the technical solution of the other data viewing method.
The third data viewing method provided in the present disclosure corresponds to the two foregoing method embodiments, the execution main body of the present embodiment is a second terminal, and the execution main bodies of the two foregoing method embodiments are a server side and a first terminal, where the two embodiments cooperate with each other to complete that the first user views trusted data in the trusted data item by the second user through the first terminal, and when reading the present embodiment, the present embodiment may correspond to the foregoing method embodiment. Fig. 6 shows a flowchart of a third data viewing method according to an embodiment of the present disclosure, including steps S602 to S606.
Step S602, the identification code for the trusted data in the trusted data item is displayed.
In particular embodiments, the second terminal provides a viewing entry for the trusted data to the first user via the identification code.
In practical application, the identification code displayed by the second terminal can be encrypted with high strength, so that the sensitive information of the second user is hidden, the sensitive information of the second user is protected, and the anti-counterfeiting performance of the identification code is improved. In addition, the effective time can be set for the identification code in the process of generating the identification code, so that the safety of the trusted data is further ensured.
In the implementation, in order to provide a viewing inlet for the trusted data for the first terminal, the second terminal sends an identification code generation instruction for the trusted data to the server, and after the server generates the identification code for the trusted data of the second user, the identification code is returned to the second terminal so that the second user can display the identification code to the first user (viewing party), so that the autonomy of the second terminal for the trusted data which can be viewed by the first user is improved, the information of the second user can be hidden through the identification code, and the information security of the second user is improved. In a first optional implementation manner provided in the embodiments of the present disclosure, before the step of displaying the identification code of the trusted data in the trusted data item is performed, the method further includes:
Sending an identification code generation instruction aiming at the trusted data to the server;
And receiving the identification code for the trusted data returned by the server based on the identification code generation instruction.
In a specific implementation, before sending an identification code generation instruction for trusted data to a server, the second terminal needs to upload corresponding trusted data for a trusted data item to the server, and the server performs trusted verification on the trusted data, and the receiving server returns a verification result of the trusted verification to the second terminal, so that the trusted data is improved, and the uploading behavior of a second user for the trusted data is standardized.
Uploading the trusted data for the trusted data item to the server;
And receiving a verification result returned by the server for carrying out the credibility verification on the credible data.
In addition, before sending an identification code generation instruction for the trusted data to the server, when the trusted data uploaded by the second terminal to the server is a certificate picture, the receiving server returns a verification result of the trusted verification to the second terminal, so that the trusted data reliability is improved, and the uploading behavior of the second user for the trusted data is normalized.
Uploading a certificate picture aiming at the trusted data item to the server, and taking the certificate picture as the trusted data;
And receiving a verification result returned by the server for carrying out the credibility verification on the credible data.
In a specific implementation, the trusted data needs to be confirmed by the project platform running on the trusted data project, so that after the second user needs to join the trusted data project as the checked party of the trusted data, the trusted data is uploaded for the trusted data project, and the trusted data is subjected to the trusted constraint through the project protocol in the trusted data project, so that the uploading behavior of the second user for the trusted data is standardized, the trusted data reliability and the security are improved, and in an alternative implementation provided in the embodiment of the present specification, before the step of sending the identification code generation instruction for the trusted data to the server is executed, the method further comprises:
Sending a joining request for applying to join the trusted data item to the server;
receiving a project protocol for the trusted data project returned by the server based on the joining request;
And under the condition that an agreement instruction is submitted to the server side aiming at the project agreement, receiving a joining notification returned by the server side for joining the second user into the trusted data project.
Step S604, receiving an authorization request sent by the server for authorizing the first user with respect to the trusted data.
In practical application, if the first user needs to acquire the trusted data from the server side for viewing, the first user needs to be authorized for the trusted data, and under the condition that authorization exists, the first user is permitted to view the trusted data, so that the security of the trusted data is improved.
In the implementation, under the condition that the viewing authorization record of the trusted data to the first user does not exist in the server database, corresponding authorization is requested to the second user, and the security of the trusted data is further improved by adding a link that the second user authorizes the trusted data to the first user.
Step S606, submitting an authorization instruction for the authorization request to the server.
In a specific implementation, if the second user does not authorize the first user for the trusted data before providing a viewing entry for the first user, after receiving a viewing request from the first terminal of the first user, the server sends an authorization request for the trusted data to the first user to the second terminal, so that the authorization mode is more flexible, and the security of the trusted data is also increased.
Receiving an authorization request sent by the server for the trusted data to a first user;
and submitting an authorization instruction for the authorization request to the server.
In summary, the third method of the present disclosure is implemented by the second terminal, where the execution subject is the second terminal, displays the identification code of the trusted data, and is used as the viewing entry of the trusted data by the first user, and receives the authorization request sent by the server to the first user for the trusted data, and submits the authorization instruction to the server based on the authorization request when the viewing authorization record corresponding to the trusted data does not exist in the server database, thereby implementing that the corresponding authorization is applied to the second terminal in the viewing process of the trusted data by the first user, increasing the flexibility and instantaneity of the authorization, and improving the security of the trusted data.
The third data viewing device embodiment provided in this specification is as follows:
Corresponding to the third method embodiment, the present disclosure further provides an embodiment of a data viewing device, and fig. 7 shows a schematic structural diagram of the third data viewing device provided in one embodiment of the present disclosure. As shown in fig. 7, the apparatus includes:
A presentation module 702 configured to present an identification code for the trusted data in the trusted data item;
A receiving request module 704, configured to receive an authorization request sent by a server for authorizing the first user with respect to the trusted data;
A commit instruction module 706 configured to commit an authorization instruction for the authorization request to the server.
Optionally, the data viewing device further includes:
The sending instruction module is configured to send an identification code generation instruction aiming at the trusted data to the server;
And the receiving identification code module is configured to receive the identification code for the trusted data returned by the server based on the identification code generation instruction.
Optionally, the data viewing device further includes:
An upload data module configured to upload the trusted data for the trusted data item to the server;
The first receiving result module is configured to receive a verification result which is returned by the server and is used for verifying the credibility of the credible data.
Optionally, the data viewing device further includes:
The uploading picture module is configured to upload a certificate picture aiming at the trusted data item to the server, and the certificate picture is used as the trusted data;
The second receiving result module is configured to receive a verification result which is returned by the server and is used for verifying the credibility of the credible data.
Optionally, the data viewing device further includes:
the sending instruction module is configured to send an authorization instruction for the trusted data to a first user to the server;
and the receiving authorization notification module is configured to receive an authorization notification returned by the server side to the first user aiming at the trusted data.
Optionally, the data viewing device further includes:
the sending joining request module is configured to send a joining request for applying to join the trusted data item to the server;
the receiving protocol module is configured to receive a project protocol for the trusted data project returned by the server based on the joining request;
and the receiving joining notification module is configured to receive a joining notification returned by the server to join the second user into the trusted data item under the condition that an agreement instruction is submitted to the server for the item protocol.
The above is a schematic solution of the third data viewing device of this embodiment. It should be noted that, the technical solution of the data viewing device and the technical solution of the third data viewing method belong to the same concept, and details of the technical solution of the data viewing device, which are not described in detail, can be referred to the description of the technical solution of the third data viewing method.
An embodiment of a computing device provided in this specification is as follows:
Fig. 8 illustrates a block diagram of a computing device 800 provided in one embodiment of the present description. The components of computing device 800 include, but are not limited to, memory 810 and processor 820. Processor 820 is coupled to memory 810 through bus 830 and database 850 is used to hold data.
Computing device 800 also includes access device 840, access device 840 enabling computing device 800 to communicate via one or more networks 860. Examples of such networks include public switched telephone networks (PSTN, public Switched Telephone Network), local area networks (LAN, local Area Network), wide area networks (WAN, wide Area Network), personal area networks (PAN, personal Area Network), or combinations of communication networks such as the internet. The access device 840 may include one or more of any type of Network interface, wired or wireless, such as a Network interface card (NIC, network INTERFACE CARD), such as an IEEE802.11 wireless local area Network (WLAN, wireless Local Area Networks) wireless interface, a worldwide interoperability for microwave access (Wi-MAX, world Interoperability for Microwave Access) interface, an ethernet interface, a universal serial bus (USB, universal Serial Bus) interface, a cellular Network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the above-described components of computing device 800, as well as other components not shown in FIG. 8, may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device illustrated in FIG. 8 is for exemplary purposes only and is not intended to limit the scope of the present description. Those skilled in the art may add or replace other components as desired.
Computing device 800 may be any type of stationary or mobile computing device including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), mobile phone (e.g., smart phone), wearable computing device (e.g., smart watch, smart glasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 800 may also be a mobile or stationary server.
The present description provides a computing device comprising a memory 810, a processor 820, and computer instructions stored on the memory and executable on the processor, the processor 820 for executing computer executable instructions to:
Receiving a viewing request, sent by a first terminal of a first user, of trusted data of a second user in a trusted data item, wherein the viewing request carries a first user identifier of the first user and a second user identifier of the second user;
judging whether a viewing authorization record corresponding to the trusted data, which is authorized by the second user corresponding to the second user identifier to the first user corresponding to the first user identifier, exists in a database;
if not, sending an authorization request for authorizing the trusted data to the first user to a second terminal of the second user;
Receiving an authorization instruction submitted by the second terminal for the authorization request;
Generating the viewing authorization record according to the first user identifier, the second user identifier and the data identifier of the trusted data carried in the authorization instruction;
According to the data identification, a data interface is called to acquire the data details of the trusted data;
Transmitting the data details to the first terminal;
the trusted data is determined by a project platform carrying the trusted data project operation.
The foregoing is a schematic illustration of a computing device of this embodiment. It should be noted that, the technical solution of the computing device and the technical solution of the data viewing method belong to the same concept, and details of the technical solution of the computing device, which are not described in detail, can be referred to the description of the technical solution of the data viewing method.
Another computing device embodiment provided in this specification is as follows:
fig. 9 illustrates a block diagram of another computing device 900 provided by an embodiment of the present description. The components of computing device 900 include, but are not limited to, memory 910 and processor 920. Processor 920 is coupled to memory 910 via bus 930 with database 950 configured to hold data.
Computing device 900 also includes an access device 940, access device 940 enabling computing device 900 to communicate via one or more networks 960. Examples of such networks include public switched telephone networks (PSTN, public Switched Telephone Network), local area networks (LAN, local Area Network), wide area networks (WAN, wide Area Network), personal area networks (PAN, personal Area Network), or combinations of communication networks such as the internet. The access device 940 may include one or more of any type of Network interface, wired or wireless, such as a Network interface card (NIC, network INTERFACE CARD), such as an IEEE802.11 wireless local area Network (WLAN, wireless Local Area Networks) wireless interface, a worldwide interoperability for microwave access (Wi-MAX, world Interoperability for Microwave Access) interface, an ethernet interface, a universal serial bus (USB, universal Serial Bus) interface, a cellular Network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the above-described components of computing device 900 and other components not shown in FIG. 9 may also be connected to each other, for example, by a bus. It should be understood that the block diagram of the computing device illustrated in FIG. 9 is for exemplary purposes only and is not intended to limit the scope of the present description. Those skilled in the art may add or replace other components as desired.
Computing device 900 may be any type of stationary or mobile computing device including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), mobile phone (e.g., smart phone), wearable computing device (e.g., smart watch, smart glasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 900 may also be a mobile or stationary server.
The present description provides another computing device comprising a memory 910, a processor 920, and computer instructions stored on the memory and executable on the processor, the processor 920 configured to execute computer-executable instructions for:
collecting an identification code of the trusted data aiming at the trusted data item, which is displayed by a second terminal of a second user;
Analyzing the identification code, and sending a viewing request for the trusted data to a server according to an analysis result;
And receiving the data details of the trusted data returned by the server.
The foregoing is a schematic illustration of another computing device of this embodiment. It should be noted that, the technical solution of the computing device and the technical solution of the other data viewing method belong to the same concept, and details of the technical solution of the computing device, which are not described in detail, can be referred to the description of the technical solution of the other data viewing method.
A third computing device embodiment provided in this specification is as follows:
fig. 10 illustrates a block diagram of a third computing device 1000 provided in one embodiment of the present description. The components of the computing device 1000 include, but are not limited to, a memory 1010 and a processor 1020. Processor 1020 is coupled to memory 1010 via bus 1030 and database 1050 is used to store data.
Computing device 1000 also includes access device 1040, which access device 1040 enables computing device 1000 to communicate via one or more networks 1060. Examples of such networks include public switched telephone networks (PSTN, public Switched Telephone Network), local area networks (LAN, local Area Network), wide area networks (WAN, wide Area Network), personal area networks (PAN, personal Area Network), or combinations of communication networks such as the internet. The access device 1040 may include one or more of any type of Network interface, wired or wireless, such as a Network interface card (NIC, network INTERFACE CARD), such as an IEEE802.11 wireless local area Network (WLAN, wireless Local Area Networks) wireless interface, a worldwide interoperability for microwave access (Wi-MAX, world Interoperability for Microwave Access) interface, an ethernet interface, a universal serial bus (USB, universal Serial Bus) interface, a cellular Network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the above-described components of computing device 1000, as well as other components not shown in FIG. 10, may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device illustrated in FIG. 10 is for exemplary purposes only and is not intended to limit the scope of the present description. Those skilled in the art may add or replace other components as desired.
Computing device 1000 may be any type of stationary or mobile computing device including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), mobile phone (e.g., smart phone), wearable computing device (e.g., smart watch, smart glasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 1000 may also be a mobile or stationary server.
The present description provides a third computing device comprising a memory 1010, a processor 1020, and computer instructions stored on the memory and executable on the processor, the processor 1020 configured to execute computer executable instructions to:
displaying an identification code for the trusted data in the trusted data item;
Receiving an authorization request which is sent by a server and used for authorizing the first user aiming at the trusted data;
and submitting an authorization instruction for the authorization request to the server.
The foregoing is a schematic solution of the third computing device of this embodiment. It should be noted that, the technical solution of the computing device and the technical solution of the third data viewing method belong to the same concept, and details of the technical solution of the computing device, which are not described in detail, can be referred to the description of the technical solution of the third data viewing method.
An embodiment of a computer-readable storage medium provided in the present specification is as follows:
the present description provides a computer-readable storage medium storing computer instructions that, when executed by a processor, perform the steps of a data viewing method.
The above is an exemplary version of a computer-readable storage medium of the present embodiment. It should be noted that, the technical solution of the storage medium and the technical solution of the data viewing method belong to the same concept, and details of the technical solution of the storage medium, which are not described in detail, can be referred to the description of the technical solution of the data viewing method.
Another computer-readable storage medium embodiment provided in this specification is as follows:
The present description provides another computer-readable storage medium storing computer instructions that, when executed by a processor, perform the steps of another data viewing method.
The above is another exemplary scenario of the computer-readable storage medium of the present embodiment. It should be noted that, the technical solution of the storage medium and the technical solution of the other data viewing method belong to the same concept, and details of the technical solution of the storage medium, which are not described in detail, can be referred to the description of the technical solution of the other data viewing method.
A third computer-readable storage medium embodiment provided in the present specification is as follows:
The present description provides a third computer-readable storage medium storing computer instructions that, when executed by a processor, perform the steps of a third data viewing method.
The above is an exemplary version of the third computer-readable storage medium of this embodiment. It should be noted that, the technical solution of the storage medium and the technical solution of the third data viewing method belong to the same concept, and details of the technical solution of the storage medium, which are not described in detail, can be referred to the description of the technical solution of the third data viewing method.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The computer instructions include computer program code that may be in source code form, object code form, executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
It should be noted that, for simplicity of description, the foregoing method embodiments are all expressed as a series of combinations of actions, but it should be understood by those skilled in the art that the embodiments are not limited by the order of actions described, as some steps may be performed in other order or simultaneously according to the embodiments of the present disclosure. Further, those skilled in the art will appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily all required for the embodiments described in the specification.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to the related descriptions of other embodiments.
The preferred embodiments of the present specification disclosed above are merely used to help clarify the present specification. Alternative embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the teaching of the embodiments. The embodiments were chosen and described in order to best explain the principles of the embodiments and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. This specification is to be limited only by the claims and the full scope and equivalents thereof.

Claims (13)

1. A data viewing method, comprising:
Receiving a viewing request, sent by a first terminal of a first user, for trusted data of a second user in a trusted data item, wherein the viewing request carries a first user identification of the first user and a second user identification of the second user, the viewing request is sent by an identification code for acquiring and analyzing the trusted data for the first terminal, the identification code is used for the second user to specify the trusted data viewable by the first user, and the identification code is obtained by encoding based on the data identification of the trusted data and the second user identification;
Judging whether a viewing authorization record corresponding to the trusted data, which is authorized by the second user corresponding to the second user identification to the first user corresponding to the first user identification, exists in a database, wherein the viewing authorization record consists of the first user identification of the first user, the second user identification of the second user and the data identification of the trusted data;
If yes, calling a data interface to acquire the data details of the trusted data according to the data identification of the trusted data;
Transmitting the data details to the first terminal;
the trusted data is determined by a project platform carrying the trusted data project operation.
2. The data viewing method according to claim 1, wherein the step of receiving a viewing request for trusted data of the second user in the trusted data item, which is sent by the first terminal of the first user, is performed, further comprising:
Receiving an identification code generation instruction aiming at the trusted data, which is sent by a second terminal;
Encoding according to the data identifier carried in the identification code generation instruction and the second user identifier of the second user to generate an identification code aiming at the trusted data;
and sending the identification code to the second terminal.
3. The data viewing method according to claim 1, wherein after the step of calling a data interface to obtain the data details of the trusted data according to the data identifier of the trusted data is performed, and before the step of sending the data details to the first terminal is performed, the method further comprises:
carrying out shielding processing on preset fields in the data details;
Updating the data details through the shielded data details and the view time corresponding to the shielded data details.
4. A data viewing method according to claim 3, further comprising, after the step of sending the data details to the first terminal is performed:
Under the condition that a viewing instruction of the first terminal for the data details is received, counting down the viewing time;
And when the checking time countdown is 0, sending a deleting instruction aiming at the data details to the first terminal.
5. The data viewing method according to claim 2, wherein before the step of receiving the identification code generation instruction for the trusted data sent by the second terminal is performed, the method further comprises:
Receiving the trusted data for the trusted data item uploaded by the second terminal;
obtaining comparison information corresponding to the trusted data;
carrying out credibility verification on the credible data in a mode of comparing the credible data with the comparison information to obtain a verification result of the credibility verification;
and sending the verification result to the second terminal.
6. The data viewing method according to claim 2, wherein before the step of receiving the identification code generation instruction for the trusted data sent by the second terminal is performed, the method further comprises:
Receiving a certificate picture aiming at the trusted data item and uploaded by the second terminal, and taking the certificate picture as the trusted data;
identifying the trusted data to obtain certificate information contained in the trusted data;
Obtaining comparison information corresponding to the certificate information;
Comparing the certificate information with the comparison information to obtain a comparison result;
determining a verification result of carrying out credibility verification on the credible data according to the comparison result;
and sending the verification result to the second terminal.
7. The method for viewing data according to claim 6, wherein after the step of calling a data interface to obtain the data details of the trusted data according to the data identifier of the trusted data is performed, and before the step of sending the data details to the first terminal is performed, the method further comprises:
carrying out shielding processing on preset fields in the data details;
and updating the data details through the shielded data details and the comparison result.
8. The data viewing method of claim 7, further comprising, after the step of sending the data details to the first terminal is performed:
receiving a page switching instruction which is sent by the first terminal and aims at a page where the data details are located;
marking the viewing authority record as a failure state;
And sending a deleting instruction aiming at the data details to the first terminal.
9. The data viewing method according to claim 5 or 6, wherein in the case where the verification result is not trusted, the following operations are performed:
and deducting the credit points of the second user according to agreement clauses agreed in the project agreement.
10. The data viewing method according to claim 2, wherein before the step of receiving the identification code generation instruction for the trusted data sent by the second terminal is performed, the method further comprises:
receiving a joining request for joining the trusted data item sent by the first terminal or a second terminal of the second user;
transmitting an item protocol of the trusted data item to the first terminal or the second terminal based on the join request;
adding the first user or the second user into the trusted data item under the condition that an agreement instruction submitted by the first terminal or the second terminal for the item agreement is received;
and sending a joining notification of joining the trusted data item by the first user or the second user to the first terminal or the second terminal.
11. A data viewing device, comprising:
The receiving request module is configured to receive a viewing request, sent by a first terminal of a first user, for trusted data of a second user in a trusted data item, wherein the viewing request carries a first user identifier of the first user and a second user identifier of the second user, the viewing request is sent by an identification code for acquiring and analyzing the trusted data for the first terminal, the identification code is used for designating the trusted data viewable by the first user by the second user, and the identification code is obtained by encoding based on the data identifier of the trusted data and the second user identifier;
The judging module is configured to judge whether a viewing authorization record corresponding to the trusted data, which is authorized by the second user corresponding to the second user identifier to the first user corresponding to the first user identifier, exists in a database, wherein the viewing authorization record consists of the first user identifier of the first user, the second user identifier of the second user and the data identifier of the trusted data;
If yes, calling a data interface to acquire the data details of the trusted data according to the data identification of the trusted data;
a transmitting module configured to transmit the data details to the first terminal;
the trusted data is determined by a project platform carrying the trusted data project operation.
12. A computing device, comprising:
a memory and a processor;
The memory is for storing computer-executable instructions, and the processor is for executing the computer-executable instructions:
Receiving a viewing request, sent by a first terminal of a first user, for trusted data of a second user in a trusted data item, wherein the viewing request carries a first user identification of the first user and a second user identification of the second user, the viewing request is sent by an identification code for acquiring and analyzing the trusted data for the first terminal, the identification code is used for the second user to specify the trusted data viewable by the first user, and the identification code is obtained by encoding based on the data identification of the trusted data and the second user identification;
Judging whether a viewing authorization record corresponding to the trusted data, which is authorized by the second user corresponding to the second user identification to the first user corresponding to the first user identification, exists in a database, wherein the viewing authorization record consists of the first user identification of the first user, the second user identification of the second user and the data identification of the trusted data;
If yes, calling a data interface to acquire the data details of the trusted data according to the data identification of the trusted data;
Transmitting the data details to the first terminal;
the trusted data is determined by a project platform carrying the trusted data project operation.
13. A computer readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the data viewing method of any of claims 1 to 10.
CN202210301189.2A 2019-12-26 2019-12-26 Data viewing method and device Active CN114679317B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210301189.2A CN114679317B (en) 2019-12-26 2019-12-26 Data viewing method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911369433.3A CN111131263B (en) 2019-12-26 2019-12-26 Data viewing method and device
CN202210301189.2A CN114679317B (en) 2019-12-26 2019-12-26 Data viewing method and device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201911369433.3A Division CN111131263B (en) 2019-12-26 2019-12-26 Data viewing method and device

Publications (2)

Publication Number Publication Date
CN114679317A CN114679317A (en) 2022-06-28
CN114679317B true CN114679317B (en) 2024-07-05

Family

ID=70503376

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202210301189.2A Active CN114679317B (en) 2019-12-26 2019-12-26 Data viewing method and device
CN201911369433.3A Active CN111131263B (en) 2019-12-26 2019-12-26 Data viewing method and device

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201911369433.3A Active CN111131263B (en) 2019-12-26 2019-12-26 Data viewing method and device

Country Status (1)

Country Link
CN (2) CN114679317B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112163009A (en) * 2020-09-30 2021-01-01 平安普惠企业管理有限公司 User side data acquisition method and device, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109598663A (en) * 2018-11-16 2019-04-09 阿里巴巴集团控股有限公司 There is provided and obtain the method and device of secure identity information
CN110245505A (en) * 2019-05-20 2019-09-17 中国平安人寿保险股份有限公司 Data table access method, device, computer equipment and storage medium

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9922665D0 (en) * 1999-09-25 1999-11-24 Hewlett Packard Co A method of enforcing trusted functionality in a full function platform
CN101034984B (en) * 2006-09-22 2011-02-02 北京国政通科技有限公司 Establishing the true identify database of the user with the personal information submitted by the user
JP2008301463A (en) * 2007-06-04 2008-12-11 Hironori Sakamoto Electronic certificate communication system of completion qualification
GB2466810A (en) * 2009-01-08 2010-07-14 Visa Europe Ltd Processing payment authorisation requests
CN106060259B (en) * 2012-12-06 2020-02-11 北京三星通信技术研究有限公司 Method and device for authorization between user equipment
CN107194697B (en) * 2013-09-18 2019-10-25 腾讯科技(深圳)有限公司 The method and system of authorization are provided by mobile terminal
CN104270359B (en) * 2014-09-25 2018-04-17 同济大学 The authentic authentication system and method for network trading
CN104468531B (en) * 2014-11-18 2017-11-21 邱彼特 The authorization method of sensitive data, device and system
GB2548073A (en) * 2016-01-08 2017-09-13 Vst Entpr Ltd System, method and apparatus for data transmission
WO2018108035A1 (en) * 2016-12-13 2018-06-21 腾讯科技(深圳)有限公司 Information processing and virtual resource exchange method, apparatus, and device
US20180349990A1 (en) * 2017-06-06 2018-12-06 International Business Machines Corporation Point-of-sale system for real-time risk assessment, instant message-based collaborative guarantorship, and method for using the same
CN107623714B (en) * 2017-07-28 2018-08-03 平安科技(深圳)有限公司 Data sharing method, device and computer readable storage medium
CN107566422B (en) * 2017-10-30 2020-10-27 江西博瑞彤芸科技有限公司 Third-party user verification method
CN108881170A (en) * 2018-05-21 2018-11-23 阿里巴巴集团控股有限公司 A kind of data processing method, device, processing equipment and the system of authorization guidance
CN109559815A (en) * 2018-10-23 2019-04-02 平安医疗健康管理股份有限公司 A kind of information sharing method, device and relevant device
CN109934009B (en) * 2019-02-26 2023-02-21 广州城市规划技术开发服务部 Personal information data query interactive authorization method
CN110209984A (en) * 2019-05-31 2019-09-06 上海掌门科技有限公司 Information interacting method, electronic equipment and computer-readable medium
CN110490725A (en) * 2019-07-10 2019-11-22 阿里巴巴集团控股有限公司 Method for processing business and device
CN110555023B (en) * 2019-07-31 2023-03-28 创新先进技术有限公司 Data storage method and device based on credit contract

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109598663A (en) * 2018-11-16 2019-04-09 阿里巴巴集团控股有限公司 There is provided and obtain the method and device of secure identity information
CN110245505A (en) * 2019-05-20 2019-09-17 中国平安人寿保险股份有限公司 Data table access method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN114679317A (en) 2022-06-28
CN111131263A (en) 2020-05-08
CN111131263B (en) 2022-02-01

Similar Documents

Publication Publication Date Title
CN110493007B (en) Block chain based information verification method, device, equipment and storage medium
US10454906B1 (en) Systems and methods for encryption and authentication
CN110879903A (en) Evidence storage method, evidence verification method, evidence storage device, evidence verification device, evidence storage equipment and evidence verification medium
CN110555029A (en) ticket management method and device based on block chain and storage medium
Ali et al. A secure and efficient multi-factor authentication algorithm for mobile money applications
CN113132362B (en) Trusted authorization method, trusted authorization device, electronic equipment and storage medium
CN103020746A (en) Method and system for online automatic checking of network user identity of enterprise
US20170337387A1 (en) Method, apparatus, and computer-readable medium for data exchange
US20210044558A1 (en) Methods and systems for email verification
CN112669000A (en) Government affair item processing method and device, electronic equipment and storage medium
US20120117386A1 (en) Methods for Identifying the Guarantor of an Application
CN113553302A (en) Credit report acquisition method, system, equipment and storage medium
CN114679317B (en) Data viewing method and device
CN117408646B (en) Electronic signature signing method, electronic signature signing device, electronic equipment and computer readable medium
Barros et al. Forensic analysis of the bumble dating app for android
CN111367993A (en) Data service method and device based on end-to-end
CN105868308A (en) File viewing two-dimensional code and file viewing method and system
CN116110159B (en) User authentication method, device and medium based on CFCA authentication standard
Khanesha et al. Mobile augmented integrated framework for citizen centric E-governance services-MAIFCCES
CN117708778A (en) File processing method, device, equipment and medium
US11748515B2 (en) System and method for secure linking of anonymized data
US20230418794A1 (en) Data processing method, and non-transitory medium and electronic device
CN113111283B (en) Forensic server, forensic server method, storage medium, and program product
CN115730324A (en) Business system access method and device, storage medium and electronic equipment
CN111027935A (en) Electronic visa application method and device based on credit

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant