CN115512472A - Information matching method and device, electronic equipment and storage medium - Google Patents
Information matching method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN115512472A CN115512472A CN202211153724.0A CN202211153724A CN115512472A CN 115512472 A CN115512472 A CN 115512472A CN 202211153724 A CN202211153724 A CN 202211153724A CN 115512472 A CN115512472 A CN 115512472A
- Authority
- CN
- China
- Prior art keywords
- authentication information
- target
- information
- user
- historical
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses an information matching method, an information matching device, electronic equipment and a storage medium, wherein the method comprises the following steps: when detecting that target equipment exists in the target area, acquiring current authentication information corresponding to the user identification from the target equipment; calling target historical authentication information corresponding to the user identification from historical authentication information stored in a cloud server in advance based on the user identification; matching the target historical authentication information with the current authentication information to obtain a matching result; if the matching result is normal, sending a passing instruction to the target equipment to enable the user to pass normally; and if the matching result is abnormal, sending a pass prohibition instruction to the target equipment to prevent the user from passing. Based on the technical scheme, the historical authentication information is automatically called according to the user identification, the historical authentication information is matched with the current authentication information, the passing mode of the user is determined based on the matching result, and the information matching efficiency is improved.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to an information matching method and apparatus, an electronic device, and a storage medium.
Background
With the rapid development of computer technology, information can be matched through terminal equipment held by a user, and whether the user has permission to pass or not is determined according to a matching result.
However, the existing information verification method requires a user to input corresponding information by holding a terminal device, which often causes congestion of people when the user is unskilled in operation, and consumes a lot of time, thereby reducing the efficiency of information matching.
Disclosure of Invention
The invention provides an information matching method, an information matching device, electronic equipment and a storage medium, which can be used for automatically calling historical authentication information according to a user identifier, matching the historical authentication information with current authentication information, determining the passing mode of a user based on a matching result and improving the efficiency of information matching.
In a first aspect, the present invention provides an information matching method, including:
when target equipment is detected to exist in a target area, current authentication information corresponding to a user identifier is obtained from the target equipment;
calling target historical authentication information corresponding to the user identification from historical authentication information stored in a cloud server in advance based on the user identification;
matching the target historical authentication information with the current authentication information to obtain a matching result;
if the matching result is normal, sending a passing instruction to the target equipment to enable the user to pass normally;
and if the matching result is abnormal, sending a pass prohibition instruction to the target equipment to prevent the user from passing.
In a second aspect, an embodiment of the present invention further provides an information matching apparatus, where the apparatus includes:
the authentication information acquisition module is used for acquiring current authentication information corresponding to the user identification from the target equipment when the target equipment is detected to exist in the target area;
the historical authentication information calling module is used for calling target historical authentication information corresponding to the user identification from historical authentication information stored in a cloud server in advance based on the user identification;
a matching result obtaining module, configured to match the target historical authentication information with the current authentication information to obtain a matching result;
if the matching result is normal, sending a passing instruction to the target equipment to enable the user to pass normally;
and if the matching result is abnormal, sending a pass prohibition instruction to the target equipment to prevent the user from passing.
In a third aspect, an embodiment of the present invention further provides an electronic device, where the electronic device includes:
one or more processors; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor, the computer program being executed by the at least one processor to enable the at least one processor to implement the information matching method according to any of the embodiments of the present invention.
In a fourth aspect, the embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the information matching method according to any one of the embodiments of the present invention.
According to the technical scheme of the embodiment of the invention, when the target equipment is detected to exist in the target area, the current authentication information corresponding to the user identification is acquired from the target equipment, and then the target historical authentication information corresponding to the user identification is called from the historical authentication information pre-stored in the cloud server based on the user identification, and matching the target historical authentication information with the current authentication information to obtain a matching result, if the matching result is normal, sending a pass instruction to the target equipment to enable the user to pass normally, and if the matching result is abnormal, sending a pass prohibition instruction to the target equipment to prevent the user from passing. Based on the technical scheme, the historical authentication information is automatically called according to the user identification, the historical authentication information is matched with the current authentication information, the passing mode of the user is determined based on the matching result, and the information matching efficiency is improved.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present invention, nor do they necessarily limit the scope of the invention. Other features of the present invention will become apparent from the following description.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flow chart of an information matching method according to an embodiment of the present invention;
FIG. 2 is a flow chart of an information matching method provided by an embodiment of the invention;
FIG. 3 is a schematic diagram of information transmission provided by an embodiment of the present invention;
fig. 4 is a block diagram of an information matching apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It can be understood that, before the technical solutions disclosed in the embodiments of the present invention are used, the type, the use range, the use scene, etc. of the personal information related to the present invention should be informed to the user and authorized by the user in a proper manner according to relevant laws and regulations.
For example, in response to receiving an active request from a user, a prompt message is sent to the user to explicitly prompt the user that the requested operation to be performed would require the acquisition and use of personal information to the user. Therefore, the user can select whether to provide personal information to the software or hardware such as electronic equipment, application program, server or storage medium for executing the operation of the technical scheme of the invention according to the prompt information.
As an optional but non-limiting implementation manner, in response to receiving an active request from the user, the manner of sending the prompt information to the user may be, for example, a pop-up window, and the prompt information may be presented in a text manner in the pop-up window. In addition, a selection control for providing personal information to the electronic device by the user's selection of "agreeing" or "disagreeing" can be carried in the popup.
It is understood that the above notification and user authorization process is only illustrative and not limiting, and other ways of satisfying relevant laws and regulations may be applied to the implementation of the present disclosure.
It will be appreciated that the data involved in the subject technology, including but not limited to the data itself, the acquisition or use of the data, should comply with the requirements of the corresponding laws and regulations and related regulations.
Example one
Fig. 1 is a schematic flow chart of an information matching method according to an embodiment of the present invention, where the embodiment is applicable to a situation where historical authentication information is retrieved according to a user identifier, a matching result is determined based on the historical authentication information and current authentication information, and a passing mode is determined based on the matching result, the method may be executed by an information matching apparatus, the information matching apparatus may be implemented in a form of hardware and/or software, the apparatus may be configured in an electronic device, and the electronic device may be a PC terminal or a server terminal, or the like.
As shown in fig. 1, the method includes:
s110, when the target equipment is detected to exist in the target area, current authentication information corresponding to the user identification is obtained from the target equipment.
Wherein the target area may be an area that the authentication device can recognize. The target device may be understood as a terminal device held by a user, such as a mobile phone, a tablet computer, and the like. The user identification may be unique identification information of the user, such as user authentication information, or identity ID information, etc. The current authentication information may be understood as authentication information stored in the target device.
Specifically, the authentication device may be configured to detect whether the target device exists in the target area, and if the authentication device detects that the target device exists in the target area, obtain current authentication information corresponding to the user identifier from the target device. It can be understood that the authentication device may communicate with the target device to obtain current authentication information stored in the target device, where the authentication information may include data generated by a user behavior, for example, data generated by a behavior such as call data and a SIM card travel.
On the basis of the above technical solution, when it is detected that the target device exists in the target area, before the current authentication information corresponding to the user identifier is acquired from the target device, the method includes: and acquiring historical authentication information sent by target equipment in the current service area, and storing the historical authentication information to the cloud server.
The current service area may be a working area corresponding to a base station in the current area, and it can be understood that the authentication information of the user may be obtained when the target device communicates with the base station in order to update the authentication information in real time. The historical authentication information comprises user identification information, health code information and license plate information. The user identification information may be unique identification information of the user, such as ID information of the user, identification information generated by the user when the user registers an account, and the like, the health code information may be understood as health code status information of the user, such as color information of a health code, and the license plate information may be pass number information of the user. The cloud server may be a server deployed in the cloud for storing the authentication information and processing the authentication information.
Specifically, the base station detects all target devices in the current service area, acquires historical authentication information sent by the target devices when communicating with the target devices, uploads the historical authentication information to the cloud server, and stores the historical authentication information in the cloud server, so that the cloud server can process the historical authentication information. It should be noted that, when the terminal device communicates with the base station, the history authentication information may be uploaded and stored in the cloud server by adding a history authentication information uploading field in the uploading information of the terminal device.
On the basis of the above technical solution, the acquiring historical authentication information sent by a target device in a current service area and storing the historical authentication information in the cloud server includes: if the current information acquisition interval meets a preset time threshold, acquiring authentication information from the target equipment, and updating historical authentication information corresponding to the user identification, which is stored in the cloud server, based on the authentication information; and/or if the target equipment is detected to be switched to the current service area, acquiring authentication information from the target equipment, and updating historical authentication information which is stored in the cloud server and corresponds to the user identification on the basis of the authentication information.
The information acquisition interval may be understood as a time interval from a previous time of acquiring information to a current time. The preset time threshold may be a preset time length between two times of information acquisition, for example, in order to ensure that the user can acquire information in time, the preset time threshold may be set to 5s.
Specifically, if the time interval from the last time of information acquisition to the current time meets a preset time threshold, the authentication information sent by the target device may be acquired through the base station, the historical authentication information stored in the cloud server is updated according to the user identification information in the authentication information, or when it is detected that a new target device appears in the current server area, the new target device directly communicates with the new target device through the base station, the authentication information uploaded by the new target device is acquired, and the corresponding historical authentication information is updated based on the user identification information. It should be noted that, in order to ensure that a user uses a terminal device while the network is smooth, the base station may communicate with the terminal device at regular time, and receive information uploaded by the terminal device, for example, the base station may communicate with the terminal device at regular intervals of 5 seconds, or, if it is detected that a new terminal device is present in the current service area, the base station in the current service area directly communicates with the new terminal device, and acquires the uploaded authentication information, thereby ensuring timely update of the authentication information.
On the basis of the technical scheme, after acquiring historical authentication information sent by target equipment in a current service area and storing the historical authentication information in the cloud server, the method comprises the following steps: when risk prompt information is received, determining authentication information to be updated based on the risk prompt information and historical authentication information stored in a cloud server; updating the authentication information to be updated based on the risk prompt information, and sending danger prompt information to the target equipment according to the user identification corresponding to the authentication information to be updated.
The risk prompt information may be information for prompting a risk, and for example, the corresponding authentication information may be updated according to the risk prompt information. The risk prompt message includes a user identification and a risk level. The risk level may be understood as information for prompting the user to identify a risk level of the corresponding user, and the corresponding health code information may be modified based on the risk level. The authentication information to be updated may be the authentication information that needs to be updated and is determined according to the user identifier in the risk prompt information. The danger prompt message may be understood as a prompt message for the user to alert the user of the risk.
Specifically, when risk prompt information uploaded by a user is received, authentication information corresponding to the user identification and stored in the cloud server is determined according to the user identification contained in the risk prompt information and serves as authentication information to be updated, after the authentication information to be updated is determined, the authentication information to be updated is updated based on the risk prompt information, danger prompt information is sent to corresponding target equipment based on the user identification, and the current state of the user is warned based on the danger prompt information. It should be noted that the risk prompt information may be determined according to the current situation, and after the risk prompt information is determined, the authentication information stored in the cloud server may be updated based on the risk prompt information, so as to achieve an effect of updating the authentication information in real time.
On the basis of the above technical solution, when it is detected that the target device exists in the target area, acquiring the current authentication information corresponding to the user identifier from the target device includes: if the Bluetooth signal of the target equipment is detected to be in the target area, determining that the target equipment exists in the target area; when the target device is determined to exist in the target area, an authentication information calling instruction is sent to the target device, so that the target device sends current authentication information corresponding to the user identification based on the authentication information calling instruction.
The bluetooth signal may be a signal transmitted by a bluetooth module provided in the target device. The authentication information retrieval instruction may be understood as an instruction for retrieving authentication information from the target device.
Specifically, when it is detected that a bluetooth signal exists in the target area, it is determined that a corresponding target device exists in the target area, at this time, a corresponding information retrieval instruction is sent to the target device, and the target device sends corresponding authentication information based on the information retrieval instruction. It should be noted that, a matching module arranged in the merchant region may detect whether a bluetooth signal exists in the current target region, and if bluetooth information exists in the current target region, it is determined that target equipment exists and a user of the target equipment needs to enter a merchant corresponding to the current target region, and then a corresponding authentication information invoking instruction is sent to the target equipment. It should be noted that, a person skilled in the art may set a corresponding verification method according to a requirement, and the embodiment of the present invention does not specifically limit the verification method.
S120, target historical authentication information corresponding to the user identification is called from historical authentication information stored in a cloud server in advance based on the user identification.
The target historical authentication information may be historical authentication information matched with the user identification.
Specifically, after the user identifier is obtained, matching can be performed in the cloud server based on the user identifier, and because the user identifier is unique, only a unique matching result can be obtained and is used as the target history authentication information. It should be noted that, after the user identifier of the current user is obtained, corresponding target history authentication information may be directly obtained from the cloud server in a matching manner, or after the user identifiers sent by all target devices in the current target area are obtained, target history authentication information corresponding to all target devices may be obtained according to the user identifier information.
S130, matching the target historical authentication information with the current authentication information to obtain a matching result; if the matching result is normal, sending a passing instruction to the target equipment to enable the user to pass normally; and if the matching result is abnormal, sending a pass prohibition instruction to the target equipment to prevent the user from passing.
Wherein the matching result may be a result indicating whether the target historical authentication information matches the current authentication information. Normal may be understood as matching the target historical authentication information with the current authentication information, and correspondingly, abnormal may be understood as mismatching the target historical authentication information with the current authentication information. The pass instruction may be instruction information for instructing the user to pass quickly, and correspondingly, the no-pass instruction may be instruction information for preventing the user from passing.
Specifically, the target historical authentication information acquired from the cloud server is matched with the current authentication information acquired from the target device to obtain a matching result, if the matching result is normal, a pass instruction is sent to the target device to enable the user to pass quickly based on the pass instruction, if the matching result is abnormal, a pass prohibition instruction is sent to the target device, and the user is prompted to be prohibited from passing based on the instruction information.
On the basis of the above technical solution, the matching the target historical authentication information with the current authentication information to obtain a matching result includes: matching the target historical authentication information with the health code information in the current authentication information; if the target historical authentication information is not matched with the health code information in the current authentication information, determining that the matching result is abnormal; and if the target historical authentication information is matched with the health code information in the current authentication information, determining that the matching result is normal.
Specifically, after the target historical authentication information and the current authentication information are obtained, the health code information in the target historical authentication information and the health code information in the current authentication information can be extracted, the health code information in the target historical authentication information and the health code information in the current authentication information are matched, if the health code information is not matched, the matching result is determined to be abnormal, and if the health code information is matched, the matching result is determined to be normal. It should be noted that, the current authentication information stored in the terminal device of the user may not be updated in time, and therefore, a situation that the health code information is not matched may exist, and it should be noted that, after the target historical authentication information is matched with the health code of the current authentication information, the health code of the current authentication information may be matched with the preset health code information at the same time, if the health code of the current authentication information is not matched with the preset health code information, the matching result is still determined to be abnormal, and the preset health code information may be a green code.
On the basis of the above technical solution, after sending a no-pass command to the target device if the matching result is abnormal, the method includes: and generating corresponding alarm prompt information according to the user identification corresponding to the target equipment, and carrying out voice prompt on the alarm prompt information.
The alarm prompt message may be a message for instructing the matching device to perform voice prompt.
Specifically, based on the user identifier obtained from the target device, corresponding alarm prompt information is generated, and based on the alarm prompt information, the abnormal health code information of the user is prompted. For example, if the health code information of the user a does not match, that is, the health code information of the user is abnormal, an alarm prompt message corresponding to the user identifier is generated based on the user identifier, and a voice prompt is performed based on the alarm prompt message, where the voice prompt may be "user a health code is abnormal, please stop step".
According to the technical scheme, when the target device is detected to exist in the target area, the current authentication information corresponding to the user identification is obtained from the target device, the target historical authentication information corresponding to the user identification is called from the historical authentication information stored in the cloud server in advance based on the user identification, the target historical authentication information is matched with the current authentication information to obtain a matching result, if the matching result is normal, a passing instruction is sent to the target device to enable the user to pass normally, and if the matching result is abnormal, a passing prohibition instruction is sent to the target device to prevent the user from passing. Based on the technical scheme, the historical authentication information is automatically called according to the user identification, the historical authentication information is matched with the current authentication information, the passing mode of the user is determined based on the matching result, and the information matching efficiency is improved.
Example two
Fig. 2 is a flowchart of an information matching method according to an embodiment of the present invention. On the basis of the above embodiments, the present embodiment further optimizes the information matching method. The specific implementation manner can be referred to the technical scheme of the embodiment. The technical terms that are the same as or corresponding to the above embodiments are not repeated herein.
As shown in fig. 2, the method of the embodiment specifically includes:
acquiring historical authentication information: specifically, a field in the uploaded information of the mobile terminal may be added, and the field loads unique personal information such as the identity information, health code information, license plate information and the like bound to the mobile terminal user. Furthermore, when the mobile terminal and the base station perform timing communication, the information can be carried and transmitted to the base station, the base station interacts with the cloud server, the acquired authentication information is stored in the cloud server, or when the user leaves the service area of the current base station, the terminal device can interact with the next base station, when the next base station detects the terminal device of the user, the terminal device directly communicates with the terminal device, the authentication stored in the terminal device is acquired, real-time reporting of the authentication information is further realized, the cloud server can detect the authentication information of the user according to the risk prompt information, if the user information is abnormal, the user can receive a prompt, and meanwhile, the prompt information is forwarded to a corresponding community mechanism.
Acquiring current authentication information of a user: specifically, the bluetooth signal of the mobile terminal may be detected by matching the transpose, for example, a close-range accurate information positioning is performed by the bluetooth module and the user terminal, and if it is determined that the bluetooth signal is present in the target range, the current authentication information stored in the terminal device is acquired by the bluetooth module.
Acquiring target history authentication information: specifically, after the current authentication information stored in the terminal device is obtained, the corresponding target historical authentication information can be called from the cloud server based on the user identifier in the current authentication information.
Matching authentication information: specifically, after the current authentication information and the target history authentication information of the user are obtained, the current authentication information and the target history authentication information can be matched, if the matching result is normal, the user is indicated to pass quickly, and if the matching result is abnormal, the matching device can send out voice alarm information and trigger the terminal device to alarm.
On the basis of the above technical solutions, the technical solution of the present invention can be further explained with reference to fig. 3, as shown in fig. 3:
the base station communicates with the mobile phone at regular time, the mobile phone can automatically send the health condition of the user to the base station, the base station can transmit the health information of the user to the central equipment, and the central equipment issues the base station where the user stays for a long time and the base station where the user switches.
The synchronous device can be installed in each place needing monitoring, when a user switches a base station, user information is sent to the equipment, when the user enters the merchant, the installed synchronous equipment can be accurately positioned by a mobile phone, the position information of the user passing through the synchronous device is automatically reported, meanwhile, the synchronous device automatically checks health information through matching user id, and normal users can rapidly pass through the synchronous device. If the health state is abnormal, the feedback is sent back to the home and forwarded to the corresponding community by the base station, and the community personnel actively contact.
According to the technical scheme, when the target device is detected to exist in the target area, the current authentication information corresponding to the user identification is obtained from the target device, the target historical authentication information corresponding to the user identification is called from the historical authentication information stored in the cloud server in advance based on the user identification, the target historical authentication information is matched with the current authentication information to obtain a matching result, if the matching result is normal, a passing instruction is sent to the target device to enable the user to pass normally, and if the matching result is abnormal, a passing prohibition instruction is sent to the target device to prevent the user from passing. Based on the technical scheme, the historical authentication information is automatically called according to the user identification, the historical authentication information is matched with the current authentication information, the passing mode of the user is determined based on the matching result, and the information matching efficiency is improved.
EXAMPLE III
Fig. 4 is a block diagram of an information matching apparatus according to an embodiment of the present invention. The device comprises: an authentication information acquisition module 410, a history authentication information retrieval module 420 and a matching result acquisition module 430.
An authentication information obtaining module 410, configured to obtain current authentication information corresponding to a user identifier from a target device when it is detected that the target device exists in a target area;
a historical authentication information retrieving module 420, configured to retrieve, based on the user identifier, target historical authentication information corresponding to the user identifier from historical authentication information stored in a cloud server in advance;
a matching result obtaining module 430, configured to match the target historical authentication information with the current authentication information to obtain a matching result; if the matching result is normal, sending a passing instruction to the target equipment to enable the user to pass normally; and if the matching result is abnormal, sending a pass prohibition instruction to the target equipment to prevent the user from passing.
On the basis of the above technical solution, the apparatus further comprises:
the historical authentication information acquisition module is used for acquiring historical authentication information sent by target equipment in a current service area and storing the historical authentication information to the cloud server; the historical authentication information comprises user identification information, health code information and license plate information.
On the basis of the above technical solution, the history authentication information acquisition module includes:
the historical authentication information updating unit is used for acquiring authentication information from the target equipment if the current information acquisition interval meets a preset time threshold, and updating the historical authentication information which is stored in the cloud server and corresponds to the user identification based on the authentication information; and/or if the target equipment is detected to be switched to the current service area, acquiring authentication information from the target equipment, and updating historical authentication information which is stored in the cloud server and corresponds to the user identification based on the authentication information.
On the basis of the technical scheme, the historical authentication information acquisition module is further used for determining the authentication information to be updated based on the risk prompt information and the historical authentication information stored by the cloud server when the risk prompt information is received; the risk prompt message comprises a user identifier and a risk level; updating the authentication information to be updated based on the risk prompt information, and sending danger prompt information to the target equipment according to the user identification corresponding to the authentication information to be updated.
On the basis of the above technical solution, the authentication information acquisition module is further configured to determine that the target device exists in the target area if it is detected that the bluetooth signal of the target device is in the target area; when the target device is determined to exist in the target area, an authentication information calling instruction is sent to the target device, so that the target device sends current authentication information corresponding to the user identification based on the authentication information calling instruction.
On the basis of the technical scheme, the matching result acquisition module is specifically used for matching the target historical authentication information with the health code information in the current authentication information; if the target historical authentication information is not matched with the health code information in the current authentication information, determining that the matching result is abnormal; and if the target historical authentication information is matched with the health code information in the current authentication information, determining that the matching result is normal.
On the basis of the above technical solution, the matching result obtaining module includes:
and the voice prompt unit is used for generating corresponding alarm prompt information according to the user identification corresponding to the target equipment and carrying out voice prompt on the alarm prompt information.
According to the technical scheme, when the target device is detected to exist in the target area, the current authentication information corresponding to the user identification is obtained from the target device, the target historical authentication information corresponding to the user identification is called from the historical authentication information stored in the cloud server in advance based on the user identification, the target historical authentication information is matched with the current authentication information to obtain a matching result, if the matching result is normal, a passing instruction is sent to the target device to enable the user to pass normally, and if the matching result is abnormal, a passing prohibition instruction is sent to the target device to prevent the user from passing. Based on the technical scheme, the automatic calling of the historical authentication information according to the user identification is realized, the historical authentication information is matched with the current authentication information, the passing mode of the user is determined based on the matching result, and the information matching efficiency is improved.
The information matching device provided by the embodiment of the invention can execute the information matching method provided by any embodiment of the disclosure, and has corresponding functional modules and beneficial effects of the execution method.
It should be noted that, the units and modules included in the apparatus are merely divided according to functional logic, but are not limited to the above division as long as the corresponding functions can be implemented; in addition, specific names of the functional units are only used for distinguishing one functional unit from another, and are not used for limiting the protection scope of the embodiments of the present disclosure.
Example four
FIG. 5 illustrates a block diagram of an electronic device 10 that may be used to implement an embodiment of the invention. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital assistants, cellular phones, smart phones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 5, the electronic device 10 includes at least one processor 11, and a memory communicatively connected to the at least one processor 11, such as a Read Only Memory (ROM) 12, a Random Access Memory (RAM) 13, and the like, wherein the memory stores a computer program executable by the at least one processor, and the processor 11 may perform various suitable actions and processes according to the computer program stored in the Read Only Memory (ROM) 12 or the computer program loaded from the storage unit 18 into the Random Access Memory (RAM) 13. In the RAM 13, various programs and data necessary for the operation of the electronic apparatus 10 can also be stored. The processor 11, the ROM 12, and the RAM 13 are connected to each other via a bus 14. An input/output (I/O) interface 15 is also connected to bus 14.
A number of components in the electronic device 10 are connected to the I/O interface 15, including: an input unit 16 such as a keyboard, a mouse, or the like; an output unit 17 such as various types of displays, speakers, and the like; a storage unit 18 such as a magnetic disk, an optical disk, or the like; and a communication unit 19 such as a network card, modem, wireless communication transceiver, etc. The communication unit 19 allows the electronic device 10 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunication networks.
The processor 11 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 11 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, or the like. The processor 11 performs the various methods and processes described above, such as the information matching method.
In some embodiments, the information matching method may be implemented as a computer program tangibly embodied in a computer-readable storage medium, such as storage unit 18. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 10 via the ROM 12 and/or the communication unit 19. When the computer program is loaded into the RAM 13 and executed by the processor 11, one or more steps of the information matching method described above may be performed. Alternatively, in other embodiments, the processor 11 may be configured to perform the information matching method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Computer programs for implementing the methods of the present invention can be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be performed. A computer program can execute entirely on a machine, partly on a machine, as a stand-alone software package partly on a machine and partly on a remote machine or entirely on a remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. A computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical host and VPS service are overcome.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present invention may be executed in parallel, sequentially, or in different orders, and are not limited herein as long as the desired results of the technical solution of the present invention can be achieved.
The above-described embodiments should not be construed as limiting the scope of the invention. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. An information matching method, comprising:
when detecting that target equipment exists in a target area, acquiring current authentication information corresponding to a user identifier from the target equipment;
calling target historical authentication information corresponding to the user identification from historical authentication information stored in a cloud server in advance based on the user identification;
matching the target historical authentication information with the current authentication information to obtain a matching result;
if the matching result is normal, sending a passing instruction to the target equipment to enable the user to pass normally;
and if the matching result is abnormal, sending a pass prohibition instruction to the target equipment to prevent the user from passing.
2. The method according to claim 1, wherein before acquiring current authentication information corresponding to a user identifier from the target device when the target device is detected to be present in the target area, the method includes:
acquiring historical authentication information sent by target equipment in a current service area, and storing the historical authentication information to the cloud server; the historical authentication information comprises user identification information, health code information and license plate information.
3. The method of claim 2, wherein the obtaining historical authentication information sent by a target device in a current service area and storing the historical authentication information in the cloud server comprises:
if the current information acquisition interval meets a preset time threshold, acquiring authentication information from the target equipment, and updating historical authentication information corresponding to the user identification, which is stored in the cloud server, based on the authentication information; and/or the presence of a gas in the gas,
and if the target equipment is detected to be switched to the current service area, acquiring authentication information from the target equipment, and updating historical authentication information which is stored in the cloud server and corresponds to the user identification based on the authentication information.
4. The method of claim 2, after obtaining historical authentication information sent by a target device in a current service area and storing the historical authentication information in the cloud server, comprising:
when risk prompt information is received, determining authentication information to be updated based on the risk prompt information and historical authentication information stored in a cloud server; the risk prompt information comprises a user identifier and a risk level;
updating the authentication information to be updated based on the risk prompt information, and sending danger prompt information to the target equipment according to the user identification corresponding to the authentication information to be updated.
5. The method according to claim 1, wherein when detecting that a target device exists in a target area, acquiring current authentication information corresponding to a user identifier from the target device comprises:
if the Bluetooth signal of the target equipment is detected to be in the target area, determining that the target equipment exists in the target area;
when the target device is determined to exist in the target area, an authentication information calling instruction is sent to the target device, so that the target device sends current authentication information corresponding to the user identification based on the authentication information calling instruction.
6. The method of claim 1, wherein matching the target historical authentication information with the current authentication information to obtain a matching result comprises:
matching the target historical authentication information with the health code information in the current authentication information;
if the target historical authentication information is not matched with the health code information in the current authentication information, determining that the matching result is abnormal;
and if the target historical authentication information is matched with the health code information in the current authentication information, determining that the matching result is normal.
7. The method of claim 1, after sending a no pass command to the target device if the matching result is abnormal, the method comprises:
and generating corresponding alarm prompt information according to the user identification corresponding to the target equipment, and carrying out voice prompt on the alarm prompt information.
8. An information matching apparatus, comprising:
the authentication information acquisition module is used for acquiring current authentication information corresponding to the user identification from the target equipment when the target equipment is detected to exist in the target area;
the historical authentication information calling module is used for calling target historical authentication information corresponding to the user identification from historical authentication information stored in a cloud server in advance based on the user identification;
a matching result obtaining module, configured to match the target historical authentication information with the current authentication information to obtain a matching result;
if the matching result is normal, sending a passing instruction to the target equipment to enable the user to pass normally;
and if the matching result is abnormal, sending a pass prohibition instruction to the target equipment to prevent the user from passing.
9. An electronic device, characterized in that the electronic device comprises:
one or more processors; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to enable the at least one processor to perform the information matching method of any one of claims 1-7.
10. A computer-readable storage medium storing computer instructions for causing a processor to implement the information matching method of any one of claims 1 to 7 when executed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211153724.0A CN115512472B (en) | 2022-09-21 | 2022-09-21 | Information matching method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211153724.0A CN115512472B (en) | 2022-09-21 | 2022-09-21 | Information matching method and device, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115512472A true CN115512472A (en) | 2022-12-23 |
CN115512472B CN115512472B (en) | 2024-05-10 |
Family
ID=84506259
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211153724.0A Active CN115512472B (en) | 2022-09-21 | 2022-09-21 | Information matching method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115512472B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20130049016A (en) * | 2011-11-03 | 2013-05-13 | 주식회사 유니온커뮤니티 | Method for controlling entrance controller using mobile phone and the entrance controller |
CN104866753A (en) * | 2015-05-15 | 2015-08-26 | 金硕澳门离岸商业服务有限公司 | Method and control device for controlling an electronic device group |
US20180261027A1 (en) * | 2017-03-09 | 2018-09-13 | Toyota Jidosha Kabushiki Kaisha | Locking and unlocking system and key unit |
US10136318B1 (en) * | 2017-06-21 | 2018-11-20 | At&T Intellectual Property I, L.P. | Authentication device selection to facilitate authentication via an updateable subscriber identifier |
CN109544737A (en) * | 2018-11-01 | 2019-03-29 | 深圳市靓工创新应用科技有限公司 | User's passing method and system |
CN109858210A (en) * | 2019-01-07 | 2019-06-07 | 平安科技(深圳)有限公司 | Information Authentication method, apparatus, computer equipment and storage medium |
CN112511648A (en) * | 2020-12-16 | 2021-03-16 | 天博电子信息科技有限公司 | Intelligent information acquisition display device and system for epidemic situation prevention and control |
CN114444865A (en) * | 2021-12-24 | 2022-05-06 | 西安富立叶微电子有限责任公司 | Municipal Epidemic Prevention Management Device and Method |
CN114783553A (en) * | 2022-03-07 | 2022-07-22 | 中国电信集团工会上海市委员会 | A system and method for resumption of work and epidemic prevention using health code data combined with temperature measurement equipment |
CN114978749A (en) * | 2022-06-14 | 2022-08-30 | 中国电信股份有限公司 | Login authentication method and system, storage medium and electronic equipment |
CN114973472A (en) * | 2022-05-15 | 2022-08-30 | 中铁第四勘察设计院集团有限公司 | Passage detection method based on ticket inspection, security inspection and epidemic prevention integrated equipment |
-
2022
- 2022-09-21 CN CN202211153724.0A patent/CN115512472B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20130049016A (en) * | 2011-11-03 | 2013-05-13 | 주식회사 유니온커뮤니티 | Method for controlling entrance controller using mobile phone and the entrance controller |
CN104866753A (en) * | 2015-05-15 | 2015-08-26 | 金硕澳门离岸商业服务有限公司 | Method and control device for controlling an electronic device group |
US20180261027A1 (en) * | 2017-03-09 | 2018-09-13 | Toyota Jidosha Kabushiki Kaisha | Locking and unlocking system and key unit |
US10136318B1 (en) * | 2017-06-21 | 2018-11-20 | At&T Intellectual Property I, L.P. | Authentication device selection to facilitate authentication via an updateable subscriber identifier |
CN109544737A (en) * | 2018-11-01 | 2019-03-29 | 深圳市靓工创新应用科技有限公司 | User's passing method and system |
CN109858210A (en) * | 2019-01-07 | 2019-06-07 | 平安科技(深圳)有限公司 | Information Authentication method, apparatus, computer equipment and storage medium |
CN112511648A (en) * | 2020-12-16 | 2021-03-16 | 天博电子信息科技有限公司 | Intelligent information acquisition display device and system for epidemic situation prevention and control |
CN114444865A (en) * | 2021-12-24 | 2022-05-06 | 西安富立叶微电子有限责任公司 | Municipal Epidemic Prevention Management Device and Method |
CN114783553A (en) * | 2022-03-07 | 2022-07-22 | 中国电信集团工会上海市委员会 | A system and method for resumption of work and epidemic prevention using health code data combined with temperature measurement equipment |
CN114973472A (en) * | 2022-05-15 | 2022-08-30 | 中铁第四勘察设计院集团有限公司 | Passage detection method based on ticket inspection, security inspection and epidemic prevention integrated equipment |
CN114978749A (en) * | 2022-06-14 | 2022-08-30 | 中国电信股份有限公司 | Login authentication method and system, storage medium and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN115512472B (en) | 2024-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11799786B2 (en) | Device and method for disabling a WLAN hotspot based on data traffic value | |
KR101854576B1 (en) | Cloud management system based on chatbot and operating method thereof | |
US20200211557A1 (en) | Method and device for controlling terminal, and computer readable storage medium | |
CN113704063B (en) | Performance monitoring method, device, equipment and storage medium of cloud mobile phone | |
US20210035062A1 (en) | Information prompt | |
CN112911013B (en) | Cloud application processing method and device, computer equipment and storage medium | |
US20210160079A1 (en) | Wearable smart terminal, cloud server, memory device and friend addition method | |
CN109861856B (en) | Method and device for notifying system fault information, storage medium and computer equipment | |
US20130055271A1 (en) | Apparatus and method for controlling polling | |
CN112311824A (en) | Attendance information processing method and related device | |
CN114328132A (en) | Method, device, equipment and medium for monitoring state of external data source | |
CN112965799A (en) | Task state prompting method and device, electronic equipment and medium | |
CN113067769B (en) | Router restarting method, device, equipment and storage medium | |
CN112925623A (en) | Task processing method and device, electronic equipment and medium | |
CN115426287B (en) | System monitoring and optimizing method and device, electronic equipment and medium | |
CN113055523A (en) | Crank call interception method and device, electronic equipment and storage medium | |
CN107579990A (en) | Measure of managing contract and server | |
CN114844920A (en) | Internet of things equipment checking method and device, electronic equipment and storage medium | |
CN114401121A (en) | Application program login method and device, electronic equipment and readable storage medium | |
CN110119871B (en) | Information interaction platform and method | |
CN115512472B (en) | Information matching method and device, electronic equipment and storage medium | |
CN117252420A (en) | Job risk assessment method, device, equipment and storage medium | |
CN116450176A (en) | Version updating method and device, electronic equipment and storage medium | |
KR102464688B1 (en) | Method and apparatus for detrmining event level of monitoring result | |
CN116258439A (en) | Robot take-out distribution method and device, robot and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |