CN112487982A - Merchant information auditing method, system and storage medium - Google Patents

Merchant information auditing method, system and storage medium Download PDF

Info

Publication number
CN112487982A
CN112487982A CN202011377254.7A CN202011377254A CN112487982A CN 112487982 A CN112487982 A CN 112487982A CN 202011377254 A CN202011377254 A CN 202011377254A CN 112487982 A CN112487982 A CN 112487982A
Authority
CN
China
Prior art keywords
information
merchant
auditing
merchant information
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011377254.7A
Other languages
Chinese (zh)
Inventor
刘颖麒
冯义天
朱晴蔚
赵钦云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ibeacon Technology Co ltd
Original Assignee
Ibeacon Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ibeacon Technology Co ltd filed Critical Ibeacon Technology Co ltd
Priority to CN202011377254.7A priority Critical patent/CN112487982A/en
Publication of CN112487982A publication Critical patent/CN112487982A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/40Document-oriented image-based pattern recognition
    • G06V30/41Analysis of document content
    • G06V30/412Layout analysis of documents structured with printed lines or input boxes, e.g. business forms or tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/40Document-oriented image-based pattern recognition
    • G06V30/41Analysis of document content
    • G06V30/418Document matching, e.g. of document images
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions

Abstract

The application discloses a method, a system and a storage medium for auditing merchant information, wherein the method comprises the following steps: acquiring merchant information, and executing the identification operation of the content in the merchant information to obtain identification information; when the certificate information corresponding to the merchant information is determined to be not overdue based on the identification information, executing comparison operation of the identification information and target identification information; and if the identification information is successfully compared with the target identification information, determining that the merchant information passes the verification. The technical problems of high error rate and low auditing efficiency caused by manual auditing operation are solved, the merchant information is verified, the operation for the user is ensured, the fraudulent behavior is avoided, and the auditing efficiency and accuracy are improved by content identification of the merchant information.

Description

Merchant information auditing method, system and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, a system, and a storage medium for auditing merchant information.
Background
The traditional business enters the file, generally adopt the mode of the manual verification, the verifier needs to check the information one by one, and log on websites such as the national enterprise credit information public system to verify the information, and the picture data such as the identification ID card, the business license, the bank card, etc. need to obtain the key information by naked eyes, to guarantee the authenticity and accuracy of the business submitting data. As the types of the merchants are various and the data are complicated, the problems of high error rate and low auditing efficiency can occur through manual comparison operation.
Disclosure of Invention
The embodiment of the application provides a merchant information auditing method, a merchant information auditing system and a storage medium, and aims to solve the problems of high error rate and low auditing efficiency caused by manual auditing operation.
In order to achieve the above object, an aspect of the present application provides a method for auditing merchant information, where the method for auditing merchant information includes the following steps:
acquiring merchant information, and executing the identification operation of the content in the merchant information to obtain identification information;
when the certificate information corresponding to the merchant information is determined to be not overdue based on the identification information, executing comparison operation of the identification information and target identification information;
and if the identification information is successfully compared with the target identification information, determining that the merchant information passes the verification.
Optionally, the step of performing an operation of identifying content in the merchant information to obtain identification information includes:
executing character recognition operation and face recognition operation of the merchant information;
and respectively acquiring character identification information and picture identification information corresponding to the merchant information according to the character identification operation and the face identification operation.
Optionally, before the step of obtaining the merchant information and obtaining the identification information by performing the identification operation of the content in the merchant information, the method includes:
acquiring a merchant type, and executing auditing operation of the merchant information according to the merchant type;
if the merchant type is personal, judging whether the bank card corresponding to the person is authenticated successfully;
and when the bank card is successfully authenticated, executing the identification operation of the content in the merchant information to obtain identification information.
Optionally, after the step of obtaining the merchant type and performing the auditing operation of the merchant information according to the merchant type, the method further includes:
if the merchant type is an enterprise, determining an account type corresponding to the enterprise;
and executing the verification operation of the merchant information according to the account type.
Optionally, the step of performing an auditing operation of the merchant information according to the account type includes:
if the account type is a company account, judging whether the second legal person element corresponding to the company account is authenticated successfully;
when the second element authentication of the legal person is determined to be successful, judging whether the industrial and commercial authentication is successful;
and when the business authentication is determined to be successful, executing the identification operation of the content in the business information to obtain identification information.
Optionally, the step of performing an auditing operation of the merchant information according to the account type further includes:
if the account type is a personal account, judging whether the corporate settlement corresponding to the personal account is successful or not;
judging whether the industrial and commercial authentication is successful or not when the successful settlement of the legal person and the successful authentication of the bank card corresponding to the personal account are determined;
and when the business authentication is determined to be successful, executing the identification operation of the content in the business information to obtain the identification information.
Optionally, after the step of obtaining the merchant type and performing the auditing operation of the merchant information according to the merchant type, the method further includes:
and if the merchant type is an individual industrial merchant, executing a step of judging whether the legal settlement corresponding to the individual account is successful or not.
Optionally, before the step of obtaining the merchant information and obtaining the identification information by performing the identification operation of the content in the merchant information, the method further includes:
judging whether a user corresponding to the merchant information is a blacklist user or not, and judging whether the merchant information is complete or not when the user is determined to be a non-blacklist user;
and when the merchant information is determined to be complete, executing the auditing operation of the merchant information.
In addition, in order to achieve the above object, another aspect of the present application further provides an auditing system for merchant information, where the system includes:
the acquisition module is used for acquiring merchant information and executing the identification operation of the content in the merchant information to obtain identification information;
the processing module is used for executing comparison operation of the identification information and target identification information when determining that certificate information corresponding to the merchant information is not overdue based on the identification information;
and the auditing module is used for determining that the merchant information passes the auditing if the identification information is successfully compared with the target identification information.
In addition, to achieve the above object, another aspect of the present application further provides a computer storage medium, where a computer program is stored, and the computer program, when executed by a processor, implements the steps of the merchant information auditing method as described above.
In the embodiment of the application, merchant information is obtained, and the identification operation of the content in the merchant information is executed to obtain identification information; when the certificate information corresponding to the merchant information is determined to be not overdue based on the identification information, executing comparison operation of the identification information and target identification information; and if the identification information is successfully compared with the target identification information, determining that the merchant information passes the verification. The technical problems of high error rate and low auditing efficiency caused by manual auditing operation are solved, the merchant information is verified, the operation for the user is ensured, the fraudulent behavior is avoided, and the auditing efficiency and accuracy are improved by content identification of the merchant information.
Drawings
Fig. 1 is a schematic terminal structure diagram of a hardware operating environment according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a first embodiment of an auditing method for merchant information according to the present application;
fig. 3 is a schematic flowchart of a second embodiment of a method for auditing merchant information according to the present application;
fig. 4 is a schematic flowchart of a third embodiment of an auditing method for merchant information according to the present application;
fig. 5 is a schematic flowchart of a fourth embodiment of an auditing method for merchant information according to the present application;
fig. 6 is a schematic flow chart illustrating that identification information is obtained by performing an identification operation on content in merchant information in the auditing method for merchant information according to the present application;
fig. 7 is a schematic flowchart of the operation of performing the merchant information audit according to the account type in the merchant information audit method according to the present application;
fig. 8 is a schematic flowchart of another operation for performing the merchant information audit according to the account type in the merchant information audit method according to the present application;
fig. 9 is a schematic flow chart of the method for auditing merchant information according to the present application after the steps of obtaining a merchant type and performing an auditing operation of the merchant information according to the merchant type.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The main solution of the embodiment of the application is as follows: acquiring merchant information, and executing the identification operation of the content in the merchant information to obtain identification information; when the certificate information corresponding to the merchant information is determined to be not overdue based on the identification information, executing comparison operation of the identification information and target identification information; and if the identification information is successfully compared with the target identification information, determining that the merchant information passes the verification.
The traditional business enters the file generally by adopting a manual checking mode, the auditor needs to check the information one by one, and logs in a website such as a national enterprise credit information public system and the like to check the information, and key information needs to be obtained by naked eyes aiming at picture data such as an identification card, a business license, a bank card and the like, so that the authenticity and the accuracy of the data submitted by the business are ensured. As the types of the merchants are various and the data are complicated, the problems of high error rate and low auditing efficiency can occur through manual comparison operation. The identity of the user is verified through an AI face recognition technology, operation is guaranteed to be executed for the user, fraudulent behaviors are avoided, meanwhile, image recognition is conducted through OCR (optical character recognition), key information in various images is captured, and the key information is compared with merchant information submitted by the user, so that the accuracy of the information is guaranteed, and the efficiency and the accuracy of auditing are improved.
As shown in fig. 1, fig. 1 is a schematic terminal structure diagram of a hardware operating environment according to an embodiment of the present application.
As shown in fig. 1, the terminal may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Optionally, the terminal may further include a camera, a Radio Frequency (RF) circuit, a sensor, a remote controller, an audio circuit, a WiFi module, a detector, and the like. Of course, the terminal may also be configured with other sensors such as a gyroscope, a barometer, a hygrometer and a temperature sensor, which are not described herein again.
Those skilled in the art will appreciate that the terminal structure shown in fig. 1 does not constitute a limitation of the terminal device and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer-readable storage medium, may include therein an operating system, a network communication module, a user interface module, and an auditing program for merchant information.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a backend server and performing data communication with the backend server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be configured to invoke an auditing procedure for the merchant information stored in the memory 1005 and perform the following operations:
acquiring merchant information, and executing the identification operation of the content in the merchant information to obtain identification information;
when the certificate information corresponding to the merchant information is determined to be not overdue based on the identification information, executing comparison operation of the identification information and target identification information;
and if the identification information is successfully compared with the target identification information, determining that the merchant information passes the verification.
Referring to fig. 2, fig. 2 is a schematic flowchart of a first embodiment of an auditing method for merchant information according to the present application, where the auditing method for merchant information includes:
step S10, acquiring merchant information, and executing the identification operation of the content in the merchant information to obtain identification information;
with the continuous development of mobile internet technology, various application platforms providing services for merchants are in endless, for example, a take-out platform providing take-out services for merchants, a payment platform providing payment services for merchants, and the like are currently on the market. In order to prevent the unqualified merchants from being added into the application platform and cause adverse social influence on the application platform, the application platforms generally examine the merchants to be added, and only the merchants passing the examination can be added into the application platform.
In this embodiment, the merchant information includes, but is not limited to: the system comprises the following steps of industrial and commercial registration information, corporate credit information, tax record information and the like, wherein the industrial and commercial registration information comprises at least one of name information, address information, important person information, account information, operating range information and the like, and further comprises corporate identity card photos or business license photos and the like. Furthermore, the merchant information may be obtained from a plurality of different data sources, for example, the merchant registration information of the merchant stored in the server of the office, the legal credit information of the merchant stored in the server of the bank, the tax record information of the merchant stored in the server of the tax administration, and so on.
When the merchant information is obtained, auditing operation needs to be performed on the merchant information, and the main purpose of the auditing operation is to verify whether the merchant information submitted by a merchant is wrong, true and reliable. The verification operation mainly identifies the content in the merchant information, the verified content is different based on the difference of merchant types, and when the merchant type is personal, the verified content mainly comprises: bank card, ID card and authentication of three/four elements; when the merchant type is an individual industrial merchant, the audited content mainly comprises: whether the settlement of the legal person is successful, whether the authentication of the legal person with three/four elements, a bank card, an identity card, a business license and the authentication of a business are successful, and the like; when the merchant type is an enterprise, an account type corresponding to the enterprise needs to be further determined, and when the account type is a company account, the audited content mainly includes: whether the second element of the legal person authenticates, whether the industry and commerce are successfully authenticated, a business license, an identity card and the like; when the account type is a personal account, the audited content mainly comprises: whether the settlement of the legal person is successful, whether the authentication of the legal person with three/four elements is successful, whether the bank card, the identity card, the business license and the industry and commerce are successfully authenticated and the like. Further, the content recognition mainly includes recognition of text and pictures, for example, in recognition of identity cards and business licenses, characters, numbers, symbols and the like on the identity cards and the business licenses, and user head portraits in electronic photos on the identity cards and the business licenses. Further, referring to fig. 6, the step of performing the operation of identifying the content in the merchant information to obtain the identification information includes:
step S101, executing character recognition operation and face recognition operation of the merchant information;
and step S102, respectively acquiring character recognition information and picture recognition information corresponding to the merchant information according to the character recognition operation and the face recognition operation.
In this embodiment, when the merchant information is checked, the Character Recognition and face Recognition operation of the merchant information is mainly performed, where the Character Recognition operation mainly uses an OCR (Optical Character Recognition), which is an automatic Character input method, and obtains Character image information on paper by Optical input methods such as scanning and shooting, and analyzes Character morphological features by using various pattern Recognition algorithms to convert bills, newspapers, books, documents, and other printed matters into image information, and then converts the image information into a usable computer input technology by using the Character Recognition technology. The method can be applied to the fields of inputting and processing of bank bills, a large amount of text data, file files and documentaries, and is suitable for automatic scanning identification and long-term storage of a large amount of bill forms in the industries of banks, tax administration and the like. The face recognition operation mainly adopts an AI face recognition technology, the AI face recognition technology is based on the face characteristics of people, obtains the position and the size of the face and the position information of each main facial organ, further extracts the identity characteristics contained in each face according to the information, and compares the identity characteristics with the known face, thereby recognizing the identity of each face.
When an auditing instruction of merchant information is received, an auditing system automatically identifies the content of the merchant information by characters and picture content, for example, the currently identified merchant information is an identity card, wherein the identity card information comprises the information of name, gender, ethnicity, age, certificate number, certificate issuing unit, electronic photo, communication address and the like of a certificate holder, and the character information is identified by OCR and is output and stored; meanwhile, the AI face recognition technology is used for recognizing the characteristic parts of the face, such as the eyes, the nose, the mouth, the ears, the face shape, the eyebrows and the like on the electronic photo; the method comprises the steps of face recognition, face image preprocessing and face image feature extraction, wherein the face detection is to accurately calibrate the position and the size of a face before acquisition so as to form a face image and detect useful information of the face image, such as the shape outline and the position relation of a face organ; or, the position and the size of the face are accurately calibrated for the face image formed after the acquisition, and useful information of the face image is detected.
It should be noted that, in order to meet the requirement of auditing different merchant information, the OCR may identify various types of merchant information, such as different categories, contents, languages, styles, input formats, and so on, where the categories may include certificates, characters, and so on, the contents may include news information, laws and regulations, the languages may include simplified characters, traditional characters, english, and so on, the styles may include electronic texts, handwritten texts, horizontal texts, vertical texts, and so on, and the input formats may include a PDF format, a PNG picture format, a JPG picture format, and so on.
Step S20, when the certificate information corresponding to the merchant information is determined to be not overdue based on the identification information, the comparison operation of the identification information and the target identification information is executed;
in this embodiment, the document information includes information such as an identification card and a bank card, obtains character information recognized by OCR, and determines whether the information such as the identification card and the bank card is expired based on the character information, for example: the identification information of the user identity card is acquired currently, the identification information comprises an effective date on the back of the identity card, whether the identity card is overdue can be judged through the effective date, and if the currently acquired effective date is 8/1/2020 and the currently auditing time is 6/1/2020, the identity card is not overdue. If the OCR identifies a plurality of certificates, the detection condition of the certificates is not satisfied as long as one certificate information is detected to be expired.
When the certificate information identified by the OCR meets the detection condition of the certificate, further executing the comparison operation of the current identification information and the merchant information submitted by the merchant, wherein the comparison operation is mainly used for comparing whether the identified character information and the picture information are consistent with the submitted merchant information. In one embodiment, when comparing whether the electronic photograph of the certificate is the merchant, the main operations are as follows: acquiring information of a certificate, wherein the information comprises a certificate photo, and extracting first characteristic data which is helpful for identifying a human face according to the shape outline of human face organs on the certificate photo; the face of the certificate holder of the submitted merchant information is collected through camera equipment, a face image is obtained, second feature data which are beneficial to face recognition are extracted according to the shape contour of a face organ on the face image, and the first feature data are compared with the second feature data. When the identified text information is compared to be consistent with the submitted merchant information, the main operation is as follows: acquiring character information in an OCR recognition result; and further matching the information text information with correct text information in the submitted merchant information line by line.
Step S30, if the identification information is successfully compared with the target identification information, it is determined that the merchant information passes the audit.
In this embodiment, if the identification information is successfully compared with the target identification information, it is determined that the merchant information passes the audit, in an embodiment, a comparison similarity obtained by matching the first feature data and the second feature data of the face recognition is obtained, and if the comparison similarity is higher than a comparison threshold (for example, 80%), it is determined that the certificate belongs to the bearer. And further acquiring the number of characters which fail to be matched in each line in the character information in the OCR recognition result, judging whether the comparison is successful according to the total number of characters in each line of the correct character information and the number of characters which fail to be matched, and if the ratio of the number of characters which fail to be matched to the total number of characters in each line of the correct character information is smaller than a preset value (such as 1 percent), judging that the comparison is successful. And when the character information in the recognized merchant information and the face information in the picture are consistent with the submitted merchant information, the auditing system judges that the merchant information passes the auditing. And if any one of the parameters is not qualified in the auditing process, switching to manual auditing.
Optionally, for some special and exception handling, the review is performed manually, for example: and (3) manually auditing (policy requirement) merchants in the newly-added Xinjiang area, namely that the last states of the Xinjiang area in the system are all unverified, but the authentication results are recorded, and the auditing records are to be remarked to the merchants in the Xinjiang area.
In the embodiment, the AI face recognition technology is used for verifying the identity of the user and verifying whether the user operates by the user, so that the user is helped to avoid fraudulent behaviors and the benefit of the user is guaranteed; meanwhile, the OCR recognition technology is adopted to recognize the pictures, the key information in various pictures is captured, and then the key information is compared with the data submitted by the merchant, so that the auditing efficiency and accuracy are improved; further, for merchants identified by the system, manual work can also carry out secondary troubleshooting, so that the error rate is reduced to the minimum.
In an embodiment, referring to fig. 3, before the step of obtaining merchant information and obtaining identification information by performing an identification operation of content in the merchant information, the step includes:
step S11, acquiring a merchant type, and executing the auditing operation of the merchant information according to the merchant type;
step S12, if the merchant type is personal, judging whether the bank card corresponding to the personal is authenticated successfully;
step S13, when it is determined that the bank card is authenticated successfully, executing an operation of identifying the content in the merchant information to obtain identification information.
In this embodiment, after entering the system for auditing merchant information, risk detection is performed on the WeChat and Payment treasured of the merchant to determine whether the merchant is a risk merchant, where the risk merchant is a merchant that is not owed on the Payment treasured or WeChat, is pulled into a loss list by a bank, and is listed as a risk merchant. When the WeChat and the Payment treasures are detected and determined not to be risk merchants, further acquiring merchant types, wherein the merchant types comprise individuals, enterprises and individual industrial merchants, and the auditing information and the auditing process are different based on different merchant types.
If the merchant type is personal, judging whether the bank card corresponding to the person is authenticated successfully, wherein the bank card authentication is performed by: the verification service formed by the bank card number, the name, the identification card number and the bank reserved mobile phone number mainly comprises the following steps: the method comprises two-factor authentication of the bank card, three-factor authentication of the bank card and four-factor authentication of the bank card. The authentication mainly comprises verifying the correctness of the card number, the name, the mobile phone number and the identity card number, and judging whether the card state is normal or not, wherein if the verification is successful, the fact that the information of the user is real and effective is shown, and the risk is smaller; if the verification is not successful, the information is wrong, and partial risks can be filtered in the prior period. And whether the bank card of the user really exists, whether the state is normal, whether the information is correct and the like can be verified. When the authentication of the bank card is successful, the information of the bank card and the identity card of the merchant is identified through an OCR (optical character recognition) technology and a face recognition technology, when the identity card is determined to be not overdue, the comparison operation of the identification information and the submitted merchant information is further executed, and if the comparison is successful, the merchant information is determined to pass the verification.
In addition, when the authentication of the bank card fails, authentication and authentication are required to be carried out on the three elements of the bank card and the four elements of the bank card, and if the authentication is successful, the information of the bank card and the identity card of the merchant is identified through an OCR (optical character recognition) technology and a face recognition technology; and if the authentication fails, switching to manual examination. The bank card authentication fails for a plurality of reasons, for example, merchant information reserved by a merchant on the internet bank is inconsistent with account information filled in the website account opening process; for example, if the bank card of the merchant is in the 'bank communication' mode (such as a Pufa card), the bank communication function must be activated.
In the embodiment, the information of the bank card and the identity card of the merchant is identified through the authentication of the information of the merchant identity card and the OCR (optical character recognition) technology and the face recognition technology, so that the accuracy of the information of the merchant is ensured, and the auditing efficiency is improved.
In an embodiment, referring to fig. 4, after the step of obtaining the merchant type and performing the auditing operation of the merchant information according to the merchant type, the method further includes:
step S14, if the merchant type is an enterprise, determining an account type corresponding to the enterprise;
and step S15, executing the auditing operation of the merchant information according to the account type.
In this embodiment, if the merchant type is an enterprise, determining an account type corresponding to the enterprise, where the account type includes: and the company account and the individual account further execute the auditing operation of different merchant information according to the account types. Based on the difference of the account types, the auditing contents of the merchant information are also different, so, referring to fig. 7, the step of performing the auditing operation of the merchant information according to the account types includes:
step S150, if the account type is a company account, whether the second legal factor corresponding to the company account is authenticated successfully is judged;
step S151, when the second element of the legal person is successfully authenticated, judging whether the business authentication is successful;
step S152, when it is determined that the business authentication is successful, executing an operation of identifying the content in the business information to obtain identification information.
In this embodiment, if the account type is a company account, it is determined whether authentication of a second element of a legal person corresponding to the company account is successful, where the authentication of the second element of the legal person refers to verification of a name and an identification number of a merchant, and when the name and the identification number of the merchant are correct, it is further determined whether authentication of a business is successful, and when the authentication of a business is successful, name information of the merchant fed back by the business office is obtained, where the successful authentication of a business refers to a case that the business has been filed in the business office, has been legally registered, and can be queried in the business office. Comparing the name information of the merchant fed back by the business bureau with the name information on the merchant identity card, identifying the business license and the identity card information of the merchant by an OCR (optical character recognition) technology and a face recognition technology when the compared name information is consistent, further executing the comparison operation of the identification information and the submitted merchant information when the identity card is determined to be unexpired, and determining that the merchant information passes the verification if the comparison is successful. Optionally, when the business-industry authentication is unsuccessful, or the compared name information is inconsistent, the certificate information is overdue, and the identification information is inconsistent with the submitted business information, if one of the compared name information, the certificate information and the identification information does not meet the preset condition, the manual audit is carried out. Further, if the account type is a personal account, referring to fig. 8, the step of performing an audit operation of the merchant information according to the account type further includes:
step S153, if the account type is a personal account, judging whether the corporate settlement corresponding to the personal account is successful;
step S154, when the successful settlement of the legal person and the successful authentication of the bank card corresponding to the personal account are determined, whether the industrial and commercial authentication is successful is judged;
step S155, when it is determined that the business authentication is successful, executing an operation of identifying content in the business information to obtain identification information.
In this embodiment, if the account type is a personal account, it is determined whether the corporate settlement corresponding to the personal account is successful, where the corporate settlement refers to opening a fund clearing and delivery account by a security management organization in the form of a corporate name centralized in a security registration and settlement organization, and the clearing and delivery of the security transactions of the security business department to which the corporate account belongs are handled through the account. When the settlement of the legal person is determined to be successful, further executing bank card authentication operation corresponding to the personal account, and if the bank card authentication is successful, continuing to execute industrial and commercial authentication; and if the authentication of the bank card is unsuccessful, performing the authentication of three/four elements of a legal person, wherein the three elements of the legal person refer to the name, the identity card number and the bank card, and the four elements of the legal person refer to the name, the identity card number, the bank card and the mobile phone reserved number. If the ID of the agent is a white list, three elements of the legal person are verified; if the ID of the agent is the blacklist, the four elements of the legal person are verified, and if the authentication of the three/four elements of the legal person fails for the first time, the refusal is carried out, and if the authentication fails after the information is submitted for the second time, manual verification is carried out. And when the industrial and commercial bureau is determined to be successfully authenticated, acquiring the name information of the commercial tenant fed back by the industrial and commercial bureau, comparing the name information of the commercial tenant fed back by the industrial and commercial bureau with the name information on the commercial tenant identity card, identifying the information of a business license, a bank card and the identity card of the commercial tenant through an OCR (optical character recognition) technology and a face recognition technology when the compared name information is consistent, further executing the comparison operation of the identification information and the submitted commercial tenant information when the identity card is determined to be unexpired, and if the comparison is successful, determining that the commercial tenant information passes the audit. If one item does not meet the preset condition in the verification operation, the operation is transferred to manual examination.
If the bank card authentication is successful, judging whether the second element of the legal person is authenticated successfully; if the authentication of the bank card is unsuccessful, whether the three elements of the legal person are authenticated successfully is judged. When the authentication of the second element of the legal person is successful, further judging whether the industrial and commercial authentication is successful, and if the industrial and commercial authentication is successful, switching to manual audit; and if the industrial and commercial authentication is unsuccessful, carrying out industrial and commercial authentication.
Further, when the merchant type is an individual industrial merchant, the auditing step executed by the merchant is consistent with the step of executing the auditing operation of the merchant information according to the merchant type, with reference to fig. 9, the method further includes:
step S16, if the merchant type is an individual industrial merchant, executing a step of determining whether the corporate settlement corresponding to the personal account is successful.
When the merchant type is an individual industrial merchant, the steps of the merchant information auditing and the content of the auditing are consistent with those when the account type is an individual account, and are not repeated herein.
In this embodiment, in the process of merchant information auditing, multiple items of content need to be judged, and when one item of content does not meet the preset condition, manual auditing is performed, so that the accuracy and fairness of auditing are ensured; meanwhile, information such as business licenses, bank cards and identity cards of merchants is recognized by adopting an OCR recognition technology and a face recognition technology, so that the efficiency and accuracy of verification are improved.
In an embodiment, referring to fig. 5, before the step of obtaining merchant information and obtaining identification information by performing an identification operation of content in the merchant information, the method further includes:
step S17, judging whether the user corresponding to the merchant information is a blacklist user, and judging whether the merchant information is complete when the user is determined to be a non-blacklist user;
and step S18, when it is determined that the merchant information is complete, performing an auditing operation of the merchant information.
In this embodiment, when acquiring the information of the merchant, the open-source distributed search engine is further used to quickly search related information in the system to acquire blacklist merchant information recorded in the system, and perform a comparison operation between the merchant information and the blacklist merchant information to determine whether a user corresponding to the merchant information is a blacklist user. When the merchant is determined to be a non-blacklist user based on the comparison operation result, further judging whether the merchant information is complete; and when the merchant is determined to be the blacklist user based on the comparison operation result, returning failure reason information. And judging whether the merchant information is complete or not by judging the type of the applied product, the type of the merchant, the type of the settlement account and the settlement mode. When the merchant information is determined to be complete, entering an auditing system to execute automatic auditing operation; and when the merchant information is determined to be incomplete, the system does not carry out auditing operation and displays the state of the data to be perfected.
When the system passes the verification, the merchant executes configuration limit level, merchant rate information, merchant transaction and settlement state and the like, the type of the merchant is further judged, and when the type of the merchant is an enterprise or an individual industrial merchant, whether the merchant accords with China UnionPay reporting conditions is judged; and when the merchant type is an individual, the Chinese Unionpay is not reported. If the type of the merchant is that the enterprise or the individual industrial merchant meets the Unionpay provision condition, a cupsID and a corresponding record are generated, the cupsID is an account number of the China Unionpay payment clearing system, the merchant information is further imported into the China Unionpay, and the 'merchant Unionpay state' and other merchant information are updated according to result information fed back by the China Unionpay.
In this embodiment, all the merchant information and the blacklist information are stored and maintained, and then the related information is quickly searched by the open-source distributed search engine, so that the efficiency can be guaranteed to be high on the premise of ensuring that the merchant risk coefficient is low.
In addition, the present application further provides a system for auditing merchant information, where the system includes:
the acquisition module is used for acquiring merchant information and executing the identification operation of the content in the merchant information to obtain identification information;
the processing module is used for executing comparison operation of the identification information and target identification information when determining that certificate information corresponding to the merchant information is not overdue based on the identification information;
and the auditing module is used for determining that the merchant information passes the auditing if the identification information is successfully compared with the target identification information.
Further, the acquisition module comprises an identification unit and an acquisition unit;
the identification unit is used for executing character identification operation and face identification operation of the merchant information;
and the acquisition unit is used for respectively acquiring character identification information and picture identification information corresponding to the merchant information according to the character identification operation and the face identification operation.
Further, the acquisition module further comprises a judgment unit and an execution unit;
the acquisition unit is further configured to acquire a merchant type and perform an auditing operation of the merchant information according to the merchant type;
the judging unit is used for judging whether the bank card corresponding to the person is authenticated successfully or not if the merchant type is personal;
and the execution unit is used for executing the step of identifying the content in the merchant information to obtain the identification information when the bank card is determined to be successfully authenticated.
Further, the determining unit is further configured to determine an account type corresponding to the enterprise if the merchant type is an enterprise;
the execution unit is further configured to execute an auditing operation of the merchant information according to the account type.
Further, the judging unit is further configured to judge whether authentication of a second legal person element corresponding to the company account is successful if the account type is a company account;
the judging unit is further used for judging whether the industrial and commercial authentication is successful or not when the second legal factor authentication is determined to be successful;
the execution unit is further used for acquiring name information of the user fed back after the industrial and commercial authentication is successful, and executing comparison operation between the name information and target name information;
the execution unit is further configured to execute the step of obtaining the identification information by performing the identification operation of the content in the merchant information when it is determined that the name information is successfully compared with the target name information.
Further, the determining unit is further configured to determine whether the corporate settlement corresponding to the personal account is successful if the account type is the personal account;
the judging unit is further used for judging whether the industrial and commercial authentication is successful or not when the fact that the corporate settlement is successful and the bank card corresponding to the personal account is authenticated is determined to be successful;
the execution unit is further configured to execute the step of obtaining the identification information by performing the identification operation of the content in the merchant information when it is determined that the merchant authentication is successful.
Further, the determining unit is further configured to execute the step of determining whether the corporate settlement corresponding to the personal account is successful or not if the merchant type is an individual industrial merchant.
Further, the determining unit is further configured to determine whether a user corresponding to the merchant information is a blacklist user, and determine whether the merchant information is complete when it is determined that the user is a non-blacklist user;
the execution unit is further configured to execute an audit operation of the merchant information when it is determined that the merchant information is complete.
The implementation of the functions of each module of the above-mentioned merchant information auditing system is similar to the process in the above-mentioned method embodiment, and is not described in detail here.
In addition, the present application also provides a computer storage medium, where a computer program is stored on the computer storage medium, and when being executed by a processor, the computer program implements the steps of the method for auditing merchant information as described above.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that in the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The application can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
While alternative embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following appended claims be interpreted as including alternative embodiments and all such alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. A merchant information auditing method is characterized by comprising the following steps:
acquiring merchant information, and executing the identification operation of the content in the merchant information to obtain identification information;
when the certificate information corresponding to the merchant information is determined to be not overdue based on the identification information, executing comparison operation of the identification information and target identification information;
and if the identification information is successfully compared with the target identification information, determining that the merchant information passes the verification.
2. The merchant information auditing method according to claim 1, wherein the step of performing the operation of identifying the content in the merchant information to obtain the identification information includes:
executing character recognition operation and face recognition operation of the merchant information;
and respectively acquiring character identification information and picture identification information corresponding to the merchant information according to the character identification operation and the face identification operation.
3. The method for auditing merchant information according to claim 1, wherein before the step of obtaining merchant information and obtaining identification information by performing an operation of identifying content in the merchant information, the method comprises:
acquiring a merchant type, and executing auditing operation of the merchant information according to the merchant type;
if the merchant type is personal, judging whether the bank card corresponding to the person is authenticated successfully;
and when the bank card is successfully authenticated, executing the identification operation of the content in the merchant information to obtain identification information.
4. The method for auditing merchant information according to claim 3, wherein after the step of obtaining the merchant type and performing the auditing operation for the merchant information according to the merchant type, the method further comprises:
if the merchant type is an enterprise, determining an account type corresponding to the enterprise;
and executing the verification operation of the merchant information according to the account type.
5. The method for auditing merchant information according to claim 4, wherein the step of performing the auditing operation for the merchant information according to the account type includes:
if the account type is a company account, judging whether the second legal person element corresponding to the company account is authenticated successfully;
when the second element authentication of the legal person is determined to be successful, judging whether the industrial and commercial authentication is successful;
and when the business authentication is determined to be successful, executing the identification operation of the content in the business information to obtain identification information.
6. The method for auditing merchant information according to claim 4, wherein the step of performing the auditing operation for the merchant information according to the account type further includes:
if the account type is a personal account, judging whether the corporate settlement corresponding to the personal account is successful or not;
judging whether the industrial and commercial authentication is successful or not when the successful settlement of the legal person and the successful authentication of the bank card corresponding to the personal account are determined;
and when the business authentication is determined to be successful, executing the identification operation of the content in the business information to obtain the identification information.
7. The method for auditing merchant information according to claim 3, wherein after the step of obtaining the merchant type and performing the auditing operation for the merchant information according to the merchant type, the method further comprises:
and if the merchant type is an individual industrial merchant, executing a step of judging whether the legal settlement corresponding to the individual account is successful or not.
8. The merchant information auditing method according to any one of claims 1 to 7, before the step of obtaining merchant information and obtaining identification information by performing an identification operation of content in the merchant information, further comprising:
judging whether a user corresponding to the merchant information is a blacklist user or not, and judging whether the merchant information is complete or not when the user is determined to be a non-blacklist user;
and when the merchant information is determined to be complete, executing the auditing operation of the merchant information.
9. An auditing system for merchant information, the system comprising:
the acquisition module is used for acquiring merchant information and executing the identification operation of the content in the merchant information to obtain identification information;
the processing module is used for executing comparison operation of the identification information and target identification information when determining that certificate information corresponding to the merchant information is not overdue based on the identification information;
and the auditing module is used for determining that the merchant information passes the auditing if the identification information is successfully compared with the target identification information.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 8.
CN202011377254.7A 2020-11-30 2020-11-30 Merchant information auditing method, system and storage medium Pending CN112487982A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011377254.7A CN112487982A (en) 2020-11-30 2020-11-30 Merchant information auditing method, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011377254.7A CN112487982A (en) 2020-11-30 2020-11-30 Merchant information auditing method, system and storage medium

Publications (1)

Publication Number Publication Date
CN112487982A true CN112487982A (en) 2021-03-12

Family

ID=74937836

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011377254.7A Pending CN112487982A (en) 2020-11-30 2020-11-30 Merchant information auditing method, system and storage medium

Country Status (1)

Country Link
CN (1) CN112487982A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113362211A (en) * 2021-08-10 2021-09-07 云账户技术(天津)有限公司 Method and device for changing operation range
CN113869871A (en) * 2021-10-11 2021-12-31 国网青海省电力公司信息通信公司 Method, device and equipment for auditing electric power ticket
CN114693260A (en) * 2022-03-24 2022-07-01 北京病媒生物工程研究院(普通合伙) Enterprise qualification determination system for vector biological control industry

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140201081A1 (en) * 2012-09-12 2014-07-17 Zukunftware, Llc Presenting a document to a remote user to obtain authorization from the user
CN107835173A (en) * 2017-11-07 2018-03-23 上海壹账通金融科技有限公司 A kind of teleaction service handles method, storage medium and server
CN107872444A (en) * 2016-09-28 2018-04-03 阿里巴巴集团控股有限公司 The identity verification authentication method and system of the network user
CN109214914A (en) * 2018-08-24 2019-01-15 厦门集微科技有限公司 A kind of loan information checking method and device based on communication open platform
CN109377240A (en) * 2018-08-21 2019-02-22 中国平安人寿保险股份有限公司 Trade company's management method, device, computer equipment and storage medium neural network based
CN109389457A (en) * 2018-08-20 2019-02-26 深圳壹账通智能科技有限公司 Method of network entry, device, equipment and the readable storage medium storing program for executing of application gathering permission
CN109727042A (en) * 2018-09-06 2019-05-07 天翼电子商务有限公司 A kind of system and method for fast development trade company
CN110009297A (en) * 2019-03-06 2019-07-12 阿里巴巴集团控股有限公司 A kind of fiduciary qualification signal auditing method, device and equipment
CN110287971A (en) * 2019-05-22 2019-09-27 平安银行股份有限公司 Data verification method, device, computer equipment and storage medium
CN110443607A (en) * 2019-07-31 2019-11-12 中国工商银行股份有限公司 To creation method, method of commerce and the device of public digital cash wallet
CN111144416A (en) * 2019-12-25 2020-05-12 中国联合网络通信集团有限公司 Information processing method and device
CN111507688A (en) * 2020-04-21 2020-08-07 高峰 Method and system for electronic cluster registration of economic operator of Internet platform
CN111985936A (en) * 2020-08-17 2020-11-24 支付宝(杭州)信息技术有限公司 Method, device and equipment for checking merchant certificate information

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140201081A1 (en) * 2012-09-12 2014-07-17 Zukunftware, Llc Presenting a document to a remote user to obtain authorization from the user
CN107872444A (en) * 2016-09-28 2018-04-03 阿里巴巴集团控股有限公司 The identity verification authentication method and system of the network user
CN107835173A (en) * 2017-11-07 2018-03-23 上海壹账通金融科技有限公司 A kind of teleaction service handles method, storage medium and server
CN109389457A (en) * 2018-08-20 2019-02-26 深圳壹账通智能科技有限公司 Method of network entry, device, equipment and the readable storage medium storing program for executing of application gathering permission
CN109377240A (en) * 2018-08-21 2019-02-22 中国平安人寿保险股份有限公司 Trade company's management method, device, computer equipment and storage medium neural network based
CN109214914A (en) * 2018-08-24 2019-01-15 厦门集微科技有限公司 A kind of loan information checking method and device based on communication open platform
CN109727042A (en) * 2018-09-06 2019-05-07 天翼电子商务有限公司 A kind of system and method for fast development trade company
CN110009297A (en) * 2019-03-06 2019-07-12 阿里巴巴集团控股有限公司 A kind of fiduciary qualification signal auditing method, device and equipment
CN110287971A (en) * 2019-05-22 2019-09-27 平安银行股份有限公司 Data verification method, device, computer equipment and storage medium
CN110443607A (en) * 2019-07-31 2019-11-12 中国工商银行股份有限公司 To creation method, method of commerce and the device of public digital cash wallet
CN111144416A (en) * 2019-12-25 2020-05-12 中国联合网络通信集团有限公司 Information processing method and device
CN111507688A (en) * 2020-04-21 2020-08-07 高峰 Method and system for electronic cluster registration of economic operator of Internet platform
CN111985936A (en) * 2020-08-17 2020-11-24 支付宝(杭州)信息技术有限公司 Method, device and equipment for checking merchant certificate information

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SHUBIN CAI ET AL.: "Bank Card and ID Card Number Recognition in Android Financial APP", 《SMART COMPUTING AND COMMUNICATION 》, vol. 10135, 13 January 2017 (2017-01-13), pages 205 - 213, XP047376970, DOI: 10.1007/978-3-319-52015-5_21 *
阚绍庭: "基于iOS平台小额贷款惠分期App研究与实现", 《中国优秀硕士学位论文全文数据库(信息科技辑)》, no. 12, 15 December 2018 (2018-12-15), pages 138 - 571 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113362211A (en) * 2021-08-10 2021-09-07 云账户技术(天津)有限公司 Method and device for changing operation range
CN113869871A (en) * 2021-10-11 2021-12-31 国网青海省电力公司信息通信公司 Method, device and equipment for auditing electric power ticket
CN113869871B (en) * 2021-10-11 2024-04-19 国网青海省电力公司信息通信公司 Method, device and equipment for checking power ticket
CN114693260A (en) * 2022-03-24 2022-07-01 北京病媒生物工程研究院(普通合伙) Enterprise qualification determination system for vector biological control industry

Similar Documents

Publication Publication Date Title
US20210124919A1 (en) System and Methods for Authentication of Documents
US9836726B2 (en) Internet payment system using credit card imaging
US7558418B2 (en) Real time image quality analysis and verification
US8284985B2 (en) Interactive device for processing documents
US11824851B2 (en) Identification document database
CN112487982A (en) Merchant information auditing method, system and storage medium
WO2021042747A1 (en) Invoice picture recognition and verification method and system, device, and readable storage medium
WO2021259096A1 (en) Identity authentication method, apparatus, electronic device, and storage medium
US20200143377A1 (en) Systems and methods for user identity authentication
US11488419B2 (en) Identity and liveness verification
US20220277066A1 (en) Identity authentication and processing
CN114358798A (en) Method, device and system for enterprise information authentication based on picture identification
US20140279642A1 (en) Systems and methods for enrollment and identity management using mobile imaging
US20220076008A1 (en) Systems and methods for enrollment and identity management using mobile imaging
CN111754245B (en) Method, device and equipment for authenticating business scene
TWM568448U (en) Intelligent audit system
CN117036073B (en) Invoice auditing and automatic reimbursement system based on Internet
US20240144713A1 (en) Methods and systems for determining the authenticity of an identity document
CN113449673A (en) Certificate identification and verification method and device
CN116882928A (en) Commercial tenant subscription qualification auditing method and device and electronic equipment
CN117670451A (en) Purchasing settlement method, device, equipment and storage medium based on bill
CN112348714A (en) Evidence chain construction method, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination