CN117315839A - Real-time early warning method, system, medium and processor based on suspicious coin track - Google Patents

Real-time early warning method, system, medium and processor based on suspicious coin track Download PDF

Info

Publication number
CN117315839A
CN117315839A CN202311265509.4A CN202311265509A CN117315839A CN 117315839 A CN117315839 A CN 117315839A CN 202311265509 A CN202311265509 A CN 202311265509A CN 117315839 A CN117315839 A CN 117315839A
Authority
CN
China
Prior art keywords
coin
suspicious
track
diffusion
historical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311265509.4A
Other languages
Chinese (zh)
Inventor
李军林
郝灵
吴迪
吴渊
李眉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
CCB Finetech Co Ltd
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN202311265509.4A priority Critical patent/CN117315839A/en
Publication of CN117315839A publication Critical patent/CN117315839A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D11/00Devices accepting coins; Devices accepting, dispensing, sorting or counting valuable papers
    • G07D11/20Controlling or monitoring the operation of devices; Data handling
    • G07D11/30Tracking or tracing valuable papers or cassettes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9537Spatial or temporal dependent retrieval, e.g. spatiotemporal queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D11/00Devices accepting coins; Devices accepting, dispensing, sorting or counting valuable papers
    • G07D11/20Controlling or monitoring the operation of devices; Data handling
    • G07D11/32Record keeping
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/16Testing the dimensions
    • G07D7/164Thickness

Landscapes

  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Toxicology (AREA)
  • Accounting & Taxation (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the application provides a real-time early warning method, a system, a medium and a processor based on suspicious coin tracks, and belongs to the technical field of finance. The method comprises the following steps: acquiring historical data of suspicious coin triggering early warning and position data of corresponding banking outlets; drawing a history diffusion track of the suspicious currency according to the history data and the position data of the banking outlets; determining a predicted diffusion track according to the historical diffusion track; determining banking outlets within the range of the predicted diffusion track according to the predicted diffusion track; the current suspicious coin information is added into the sensitive coin information and is issued to a cashier of the determined banking website, so that the acquired coin information is compared with the sensitive coin information in real time through the cashier, and an alarm is given when the existence of the coin information matched with the sensitive coin information is determined. The method can predict the net points to which the suspicious coins are spread next, and the net points are distributed and controlled in advance at the corresponding bank net points, and cashier machines of the net points acquire the coin information and compare the coin information with the sensitive coin information in real time, so that real-time alarm is realized.

Description

Real-time early warning method, system, medium and processor based on suspicious coin track
Technical Field
The application relates to the technical field of finance, in particular to a real-time early warning method based on suspicious coin tracks, a real-time early warning system based on suspicious coin tracks, a processor, a machine-readable storage medium and a computer program product.
Background
The suspicious coin screening and matching mechanism is one of the important means for banking industry to quickly match and identify suspicious coins. The cashier equipment matches the crown word number transferred by the current node with the existing suspicious coin database of the system. If the number of the counterfeit notes in the market is reduced, the suspected notes are screened, and meanwhile, the circulation track inquiry can be carried out on the notes with the key crown numbers, so that the currency circulation safety is ensured. In addition, the circulation track of the appointed crown word number can be tracked (for example, a batch of crown word numbers relate to criminal cases, and the circulation track needs to be monitored, and once the equipment is matched with the related suspicious coin information, early warning is carried out, and related personnel carry out the next processing flow, such as feedback to a supervision department or linkage to a supervision system).
Wherein the suspected coin database is divided into a plurality of scenes, a counterfeit coin blacklist and a suspected coin.
The sources of the blacklist library are divided into two types, one is a blacklist issued by a supervision organization, and the other is a blacklist with crown numbers which is arranged by counterfeit coins collected by network points.
The suspected coin is a list of crown numbers issued by the system in a specific scenario for the purpose of monitoring the crown number information within the batch with emphasis. Different usage rules may be formulated according to different scenarios. For example, aiming at the back money laundering scene, after the suspicious money bank is issued, a corresponding processing flow is formulated, the personnel receiving the early warning information carries out the next processing, and whether the information is directly fed back to the supervision department is confirmed. For example, aiming at a cash theft scene, after a suspicious coin bank is issued, a corresponding processing flow is designated, if the equipment is matched with corresponding data, early warning is carried out, and related personnel carry out next processing to confirm whether feedback to related institutions is carried out.
Along with the continuous increase of the quantity of net points, machines and equipment and circulation currencies, how to timely and accurately match the suspicious currencies under the condition that the suspicious currencies are continuously increased, and meeting the supervision requirements of related institutions becomes an urgent problem to be solved. The current proposal adopts a cashier to upload the acquired crown word number data to an acquisition manager, and then the acquisition manager uploads the file to a banking system, and the acquisition manager integrates a blacklist library issued by the current pedestrian and a blacklist library collected by a business (non-real-time update), because the local comparison function is adopted, the acquisition manager can finish suspicious coin early warning within 1 minute. But still cannot meet the real-time early warning of pedestrian requirements when the traffic is large.
Disclosure of Invention
The embodiment of the application aims to provide a real-time early warning method, a system, a medium and a processor based on suspicious coin tracks.
In order to achieve the above objective, a first aspect of the present application provides a real-time early warning method based on a suspicious coin track, which is applied to a cloud server, and the real-time early warning method based on the suspicious coin track includes:
acquiring historical data of suspicious coin triggering early warning and position data of corresponding banking outlets;
drawing a history diffusion track of the suspicious currency according to the history data and the position data of the banking outlets;
determining a predicted diffusion track according to the historical diffusion track;
determining banking outlets within the range of the predicted diffusion track according to the predicted diffusion track;
The current suspicious coin information is added into the sensitive coin information and is issued to a cashier of the determined banking website, so that the acquired coin information is compared with the sensitive coin information in real time through the cashier, and an alarm is given when the existence of the coin information matched with the sensitive coin information is determined.
According to the technical means, the predicted diffusion track of the suspicious coin is determined according to the historical data of the suspicious coin triggering alarm and the position data of the corresponding bank website, the website to which the suspicious coin is diffused next is predicted according to the predicted diffusion track, the current suspicious coin information is added into the sensitive coin information and is issued to the corresponding bank website, the control is carried out in advance, and the corresponding bank website cashier machine obtains the coin information and compares the coin information with the sensitive coin information in real time, so that the real-time alarm is realized.
In the embodiment of the application, the drawing of the historical diffusion track of the suspicious currency according to the historical data and the position data of the banking website comprises the following steps:
drawing a track center point by taking the position of a banking website which first discovers suspicious coins in the historical data as a center position;
and taking the preset time period as an interval, connecting the positions of the banking outlets which are newly added in the same preset time period and found to correspond to the suspicious coins and have the distance smaller than the preset distance with the central point, and drawing to form a history diffusion track.
According to the technical means, the position data of the bank network is used as the abscissa and the ordinate, the preset time period is used as the segmentation of different track ring layers, and the historical data of the suspicious coin triggering alarm is drawn into the historical diffusion track.
In an embodiment of the present application, determining a predicted diffusion track from a historical diffusion track includes:
and drawing and forming a predicted diffusion track on the periphery of the historical diffusion track according to the development trend of the last preset time period in the historical diffusion track.
According to the technical means, the formed predicted diffusion track characterizes the possible range of the next time of the corresponding suspicious coin, and provides a data basis for advanced control.
In the embodiment of the application, determining the banking website within the predicted diffusion track range according to the predicted diffusion track includes:
projecting the banking outlets into a position coordinate system where the predicted diffusion track is located according to the position data of the banking outlets;
and determining the banking outlets corresponding to the projection points in the predicted diffusion track range as the banking outlets in the predicted diffusion track range.
According to the technical means, the net points where the suspicious coins can be spread in the next step are determined from the bank net points, so that the suspicious coins can be conveniently distributed and controlled in the corresponding net points in advance.
In this embodiment of the present application, the method for real-time early warning based on suspicious coin trajectories further includes:
center range data for suspected coin findings is determined from a plurality of discrete historical diffusion tracks of contemporaneous time.
According to the technical means, the central range of suspicious coin discovery is determined and obtained, and the data can be used as an auxiliary basis for relevant departments, so that the source of the crown word number can be quickly searched, and the trend of continuous diffusion is cut off.
The second aspect of the application provides a real-time early warning system based on suspicious coin tracks, which comprises a cloud server and a cashier machine;
the cloud server is provided with:
the data acquisition unit is used for acquiring historical data of suspicious coin triggering early warning and position data of banking outlets;
the historical diffusion track drawing unit is used for drawing the historical diffusion track of the suspicious currency according to the historical data and the position data of the banking website;
a predicted diffusion track determining unit configured to determine a predicted diffusion track from the historical diffusion track;
the banking website determining unit is used for determining banking website within the range of the predicted diffusion track according to the predicted diffusion track;
the sensitive coin information issuing unit is used for adding the current suspicious coin information into the sensitive coin information and issuing the current suspicious coin information to the determined cashier at the bank website;
The cashier arrangement has:
the comparison unit is used for comparing the acquired coin information with the sensitive coin information in real time;
and the alarm unit is used for alarming when the coin information matched with the sensitive coin information is determined.
According to the technical means, the predicted diffusion track of the suspicious coin is determined according to the historical data of the suspicious coin triggering alarm and the position data of the corresponding bank website, the website to which the suspicious coin is diffused next is predicted according to the predicted diffusion track, the current suspicious coin information is added into the sensitive coin information and is issued to the corresponding bank website, the control is carried out in advance, and the corresponding bank website cashier machine obtains the coin information and compares the coin information with the sensitive coin information in real time, so that the real-time alarm is realized.
In an embodiment of the present application, the history diffusion trajectory drawing unit includes:
the center drawing module is used for drawing a track center point by taking the position data of the bank network point of the suspicious currency found for the first time in the history data as a center position;
and the historical diffusion track drawing module is used for taking a preset time period as an interval, connecting the positions of the bank network points, which are more newly added in the same preset time period and are less than the preset distance from the center point, of the bank network points of which the corresponding suspicious coins are found, and drawing to form the historical diffusion track.
According to the technical means, the position data of the bank network is used as the abscissa and the ordinate, the preset time period is used as the segmentation of different track ring layers, and the historical data of the suspicious coin triggering alarm is drawn into the historical diffusion track.
In an embodiment of the present application, the predicted diffusion trajectory determination unit includes:
the predicted diffusion track drawing module is used for drawing and forming a predicted diffusion track on the periphery of the historical diffusion track according to the development trend of the last preset time period in the historical diffusion track.
According to the technical means, the formed predicted diffusion track characterizes the possible range of the next time of the corresponding suspicious coin, and provides a data basis for advanced control.
In an embodiment of the present application, the banking outlet determining unit includes:
the website projection module is used for projecting the website of the bank into a position coordinate system where the predicted diffusion track is located according to the position data of the website of the bank;
and the net point determining module is used for determining the bank net point corresponding to the projection point positioned in the predicted diffusion track range as the bank net point in the predicted diffusion track range.
According to the technical means, the net points where the suspicious coins can be spread in the next step are determined from the bank net points, so that the suspicious coins can be conveniently distributed and controlled in the corresponding net points in advance.
In this embodiment of the present application, the real-time early warning system based on suspicious coin trajectories further includes:
and the center range data determining unit is arranged on the cloud server and is used for determining center range data of suspicious coin discovery according to the contemporaneous multiple discrete historical diffusion tracks.
According to the technical means, the central range of suspicious coin discovery is determined and obtained, and the data can be used as an auxiliary basis for relevant departments, so that the source of the crown word number can be quickly searched, and the trend of continuous diffusion is cut off.
A third aspect of the present application provides a processor configured to perform the method of real-time early warning based on suspicious coin trajectories.
A fourth aspect of the present application provides a machine-readable storage medium having instructions stored thereon that, when executed by a processor, cause the processor to be configured to perform the method of real-time forewarning based on suspected coin trajectories.
A fifth aspect of the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the method of real-time early warning based on suspicious coin trajectories.
Through the technical scheme, the storage space of the cashier equipment is utilized to store the sensitive coin information containing the predicted suspicious coin information, so that the cashier can compare with the sensitive coin information in real time after acquiring the coin information, real-time alarm is realized, the predicted suspicious coin information can be used for distributing and controlling suspicious coins in advance, and compared with the existing comparison method of the acquisition manager, the comparison time is shortened.
Additional features and advantages of embodiments of the present application will be set forth in the detailed description that follows.
Drawings
The accompanying drawings are included to provide a further understanding of embodiments of the present application and are incorporated in and constitute a part of this specification, illustrate embodiments of the present application and together with the description serve to explain, without limitation, the embodiments of the present application. In the drawings:
FIG. 1 schematically illustrates an application environment of a real-time early warning method based on suspicious coin trajectories according to an embodiment of the present application;
FIG. 2 schematically illustrates a flow chart of a real-time early warning method based on suspicious coin trajectories according to an embodiment of the present application;
FIG. 3 schematically illustrates a schematic diagram of determining a predicted diffusion trajectory based on a real-time early warning method of suspected coin trajectories according to an embodiment of the present application;
FIG. 4 schematically illustrates a central scope diagram for determining suspected coin findings based on a real-time pre-warning method of suspected coin trajectories according to embodiments of the present application;
FIG. 5 schematically illustrates a block diagram of a real-time early warning system based on suspected coin trajectories according to an embodiment of the present application.
Description of the reference numerals
1-track center point, 2-first layer historical diffusion track, 3-second layer historical diffusion track, 4-predicted diffusion track and 5-center range.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it should be understood that the specific implementations described herein are only for illustrating and explaining the embodiments of the present application, and are not intended to limit the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present application based on the embodiments herein.
It should be noted that, in the embodiment of the present application, directional indications (such as up, down, left, right, front, and rear … …) are referred to, and the directional indications are merely used to explain the relative positional relationship, movement conditions, and the like between the components in a specific posture (as shown in the drawings), and if the specific posture is changed, the directional indications are correspondingly changed.
In addition, if there is a description of "first", "second", etc. in the embodiments of the present application, the description of "first", "second", etc. is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be regarded as not exist and not within the protection scope of the present application.
Term interpretation:
crown word number: generally referred to as the banknote crown number. The serial number of the banknote and the digital number are used to record the banknote issuing sequence, such as FA00008888, the serial number of the banknote being unique.
FSN file: namely, the crown word number file of the bank is mainly applied to the uploading stage, the management stage and the application stage of the financial equipment.
Feature library file: the characteristic information of the paper currency is saved, including but not limited to gram weight, key anti-counterfeiting mark information, ink thickness and color information.
A cashier machine: the cash of the paper currency is checked, the authenticity of the paper currency is identified, and the current cashier can identify the crown word number of the paper currency. The common cashier is a banknote counter, and the bank is provided with a banknote counter, a sorter, a foreign currency discriminator and the like.
Crown word number acquisition manager: and collecting, comparing and uploading the paper money crown number information transferred to the current machine node to generate the fsn file.
Counterfeit money blacklist library: and (3) crown word number blacklist data issued by the person and crown word number blacklist data recorded by counterfeit money collection.
The real-time early warning method based on the suspicious coin track can be applied to an application environment shown in figure 1. The cashier machine communicates with the collection management machine through a network, and the collection management machine communicates with the cloud server through the network. The cloud server is stored with a full-volume real-time blacklist library, and the acquisition management machine is stored with a full-volume quasi-real-time blacklist library issued at regular time through the cloud server. The cashier machine can only store about 500 counterfeit coins/suspicious coin crown numbers due to the small storage space, so that the key crown numbers issued by the cloud server can be stored. In order to realize advanced distribution control, the cloud server draws a history diffusion track of the suspicious currency according to history data of the suspicious currency triggering early warning and position data of corresponding banking network points, determines a predicted diffusion track according to the history diffusion track, and determines the banking network points within the range of the predicted diffusion track according to the predicted diffusion track; adding the current suspicious coin information into the sensitive coin information, and issuing to a cashier of the determined banking website; the cashier compares the acquired coin information with the sensitive coin information in real time, and alarms when the coin information matched with the sensitive coin information is determined to exist. The real-time performance of the alarm is improved. The collection manager and the cloud server can be realized by independent servers or a server cluster formed by a plurality of servers.
Fig. 2 schematically shows a flow chart of a real-time early warning method based on suspicious coin trajectories according to an embodiment of the present application. As shown in fig. 2, in an embodiment of the present application, a real-time early warning method based on a suspected coin track is provided, and this embodiment is mainly illustrated by applying the method to the environment shown in fig. 1, where the real-time early warning method based on a suspected coin track includes:
s1: and acquiring historical data of suspicious coin triggering early warning and position data of corresponding banking outlets.
The data generated by cashier machines, collection management machines and the like in work can be stored so as to trace and manage, and the data comprise historical data of suspicious coin triggering early warning and position data of corresponding banking outlets. In some embodiments, the history data of the suspicious coin triggering early warning and the position data of the corresponding banking website are stored in a mixed mode with the normal data, in this case, the history data of the corresponding time period is required to be obtained from the database, and then the history data of the suspicious coin triggering early warning and the position data of the corresponding banking website are screened out. The screening can be performed by means of keywords and the like. In other embodiments, the history data of the suspected coin triggering early warning and the position data of the corresponding banking website are stored separately, and in this case, only the history warning data of the corresponding crown word number or time period and the position data of the corresponding banking website need to be obtained from the database.
S2: and drawing a historical diffusion track of the suspicious currency according to the historical data and the position data of the banking outlets.
In the embodiment of the application, the drawing of the historical diffusion track of the suspicious currency according to the historical data and the position data of the banking website comprises the following steps:
drawing a track center point by taking the position of a banking website which first discovers suspicious coins in the historical data as a center position;
and taking a preset time period as an interval, connecting lines are formed between the newly added banking sites which find the corresponding suspicious coins in the same preset time period and the banking sites which are less than the preset distance from the central point, a history diffusion track is drawn, the drawn history diffusion track is shown in fig. 3, the position data of the banking sites which find the suspicious coins for the first time is the track central point 1, the position data of the banking sites which find the corresponding suspicious coins in the first preset time period are drawn into a first layer of history diffusion track 2, and the position data of the banking sites which are less than the preset distance from the central point are drawn into a second layer of history diffusion track 3.
In practice, there may be a situation that the suspicious coins are scattered at discrete multiple points, if two or more points appear suspicious coins at the same time and the distance between every two points is greater than the first preset distance, each point is considered as a discrete point, each point is respectively used as a center point of a central drawing track, and the bank points which are newly added and found to correspond to the suspicious coins are used as the scattering points of the corresponding center points; if suspicious coins appear in two or more net points at the same time and the distance between every two net points is smaller than a second preset distance, the corresponding net points are used as centers to draw a track center circle layer, and the newly added bank net points which are found to correspond to the suspicious coins are used as diffusion points of the corresponding center points, wherein the distance between each bank net point and each center point is smaller than the second preset distance. If the bank network points which are newly added and correspond to the suspicious coins are found to have network points with the distance from the central point or the central circle layer being larger than the first preset distance, the corresponding network points are used as the newly added track central points.
According to the technical means, the position data of the bank network is used as the abscissa and the ordinate, the preset time period is used as the segmentation of different track ring layers, and the historical data of the suspicious coin triggering alarm is drawn into the historical diffusion track.
S3: a predicted diffusion trajectory is determined from the historical diffusion trajectory.
In an embodiment of the present application, determining a predicted diffusion track from a historical diffusion track includes:
and drawing and forming a predicted diffusion track on the periphery of the historical diffusion track according to the development trend of the last preset time period in the historical diffusion track.
Specifically, a diffusion point can be defined outside the ring layer based on the historical diffusion track of the last time period, then the diffusion point is connected with the central point, the length L1 from the ring layer of the last time period to the next-to-last ring layer on the rerouting line and the length L2 from the diffusion point to the ring layer of the last time period are intercepted, a plurality of points on the predicted diffusion track are determined according to the ratio of L2 to L1, finally the plurality of points are connected to form the predicted diffusion track, and in fig. 3, the predicted diffusion track 4 is drawn according to the historical diffusion track 3 of the second layer.
According to the technical means, the formed predicted diffusion track characterizes the possible range of the next time of the corresponding suspicious coin, and provides a data basis for advanced control.
S4: and determining the banking network points in the range of the predicted diffusion track according to the predicted diffusion track.
In the embodiment of the application, determining the banking website within the predicted diffusion track range according to the predicted diffusion track includes:
Projecting the banking outlets into a position coordinate system where the predicted diffusion track is located according to the position data of the banking outlets;
and determining the banking outlets corresponding to the projection points in the predicted diffusion track range as the banking outlets in the predicted diffusion track range.
According to the technical means, the net points where the suspicious coins can be spread in the next step are determined from the bank net points, so that the suspicious coins can be conveniently distributed and controlled in the corresponding net points in advance.
S5: the current suspicious coin information is added to the sensitive coin information and is issued to the cashier of the determined banking website.
In the prior art, a full quantity of blacklist base libraries are integrated on an acquisition management machine, and when the client program arranged on the acquisition management machine is started each time, blacklist data can be obtained from a service end increment arranged on a cloud server, and a cashier machine does not store the blacklist base per se, so that although calculation resources of the acquisition management machine can be used, the comparison workload of a remote service end is reduced, but the comparison result can be obtained only by more than 1 minute under the extreme condition of comparison with the full quantity base libraries.
In the embodiment of the application, the storage space of the cashier is utilized, and the sensitive coin information with the regional characteristics is newly added on the cashier.
On the existing extrusion of a full-quantity blacklist library only arranged on an acquisition manager and a cloud server, as counterfeit coins and suspicious coins have certain regional characteristics, for example, certain crown numbers appear more frequently in a current region, the crown numbers can be directly stored on the blacklist library of a cashier tool, and the comparison speed can be higher due to smaller bottom library capacity, the subsequent acquisition manager and cloud comparison function can be utilized, if the cashier tool is directly matched, the subsequent comparison step can be omitted, the comparison result is directly uploaded, the system can be linked with a supervision department or a public security system according to the established rule, and the hot spot data hit probability with the regional characteristics is higher.
In the embodiment of the application, the sources of the sensitive coin information mainly comprise three aspects, and some sensitive coin information is hot spot blacklist data collected by the cloud server in a statistics mode; some sensitive coin information is the key list data issued by the corresponding superior institutions or supervisory institutions; still other sensitive information is suspect coin information that needs to be delivered to the predicted network point in this application.
At present, when a cashier and a website match with a piece of suspicious coin data, the suspicious coin data is uploaded to a cloud server of a headquarter, the headquarter records the detailed content of the early warning information, including website information, suspicious coin crown word number information, equipment information and the like, the headquarter gathers according to the early warning information uploaded by the website, draws a suspicious coin/counterfeit coin map based on basic information such as geographical position of the website, can gather hot spot blacklist data of the website level, and the drawn map is more and more accurate through continuous use, data gathering and accumulation of the system, the crown word number with the front frequency obtained through statistics finally serves as hot spot blacklist data, and the hot electric blacklist data is updated regularly according to the data gathered by the headquarter.
The key list data issued by the superior institution or the supervision institution can be provincial-level, municipal-level, district-level, street-level and even website-level key list data which are made by the superior institution according to the business requirements of the headquarters. The crown word number information of the key investigation can be directly supplemented according to the requirements of business departments such as pedestrians, headquarters, secondary departments and the like, and the crown word number information is directly issued to a cashier from the cloud.
S6: the cashier compares the acquired coin information with the sensitive coin information in real time. In the embodiment of the application, the cashier can adopt a matching method for comparison.
S7: the cashier alarms when it is determined that there is money information that matches the sensitive money information.
According to the technical means, the predicted diffusion track of the suspicious coin is determined according to the historical data of the suspicious coin triggering alarm and the position data of the corresponding bank website, the website to which the suspicious coin is diffused next is predicted according to the predicted diffusion track, the current suspicious coin information is added into the sensitive coin information and is issued to the corresponding bank website, the control is carried out in advance, and the corresponding bank website cashier machine obtains the coin information and compares the coin information with the sensitive coin information in real time, so that the real-time alarm is realized.
In other embodiments of the present application, the method for real-time early warning based on suspicious coin trajectories further includes:
center range data for suspected coin findings is determined from a plurality of discrete historical diffusion tracks of contemporaneous time.
In one embodiment, as shown in fig. 4, the center points of a plurality of discrete historical diffusion tracks may be connected into a polygon, then a circumscribed circle having the most intersection points with the polygon is drawn, the center of the drawn circumscribed circle is taken as the center, and then a range circle is drawn with a preset radius, so as to obtain a center range 5 and corresponding data thereof.
According to the technical means, the central range of suspicious coin discovery is determined and obtained, and the data can be used as an auxiliary basis for relevant departments, so that the source of the crown word number can be quickly searched, and the trend of continuous diffusion is cut off.
Because the cashier has real-time comparison, the scheme not only can meet the trace tracking of suspicious coins and counterfeit coins, but also can be used for monitoring the trace of key crown numbers (for example, for tracking the position information of paper money used by criminal suspects or key personnel, and calling the monitoring information of the position at the same time to assist a public security organization to position).
FIG. 2 is a flow chart of a real-time early warning method based on suspicious coin trajectories in one embodiment. It should be understood that at least some of the steps in fig. 2 may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed sequentially, but may be performed alternately or alternately with at least a portion of the other steps or sub-steps of other steps.
The second aspect of the present application provides a real-time early warning system based on a suspected coin track, as shown in fig. 5, where the real-time early warning system based on a suspected coin track includes a cloud server and a cashier;
the cloud server is provided with:
the data acquisition unit is used for acquiring historical data of suspicious coin triggering early warning and position data of banking outlets;
the historical diffusion track drawing unit is used for drawing the historical diffusion track of the suspicious currency according to the historical data and the position data of the banking website;
a predicted diffusion track determining unit configured to determine a predicted diffusion track from the historical diffusion track;
the banking website determining unit is used for determining banking website within the range of the predicted diffusion track according to the predicted diffusion track;
the sensitive coin information issuing unit is used for adding the current suspicious coin information into the sensitive coin information and issuing the current suspicious coin information to the determined cashier at the bank website;
the cashier arrangement has:
the comparison unit is used for comparing the acquired coin information with the sensitive coin information in real time;
and the alarm unit is used for alarming when the coin information matched with the sensitive coin information is determined.
According to the technical means, the predicted diffusion track of the suspicious coin is determined according to the historical data of the suspicious coin triggering alarm and the position data of the corresponding bank website, the website to which the suspicious coin is diffused next is predicted according to the predicted diffusion track, the current suspicious coin information is added into the sensitive coin information and is issued to the corresponding bank website, the control is carried out in advance, and the corresponding bank website cashier machine obtains the coin information and compares the coin information with the sensitive coin information in real time, so that the real-time alarm is realized.
In an embodiment of the present application, the history diffusion trajectory drawing unit includes:
the center drawing module is used for drawing a track center point by taking the position of the bank website of the suspicious currency found for the first time in the historical data as a center position;
and the historical diffusion track drawing module is used for taking a preset time period as an interval, connecting the positions of the bank network points, which are more newly added in the same preset time period and are less than the preset distance from the center point, of the bank network points of which the corresponding suspicious coins are found, and drawing to form the historical diffusion track.
According to the technical means, the position data of the bank network is used as the abscissa and the ordinate, the preset time period is used as the segmentation of different track ring layers, and the historical data of the suspicious coin triggering alarm is drawn into the historical diffusion track.
In an embodiment of the present application, the predicted diffusion trajectory determination unit includes:
the predicted diffusion track drawing module is used for drawing and forming a predicted diffusion track on the periphery of the historical diffusion track according to the development trend of the last preset time period in the historical diffusion track.
According to the technical means, the formed predicted diffusion track characterizes the possible range of the next time of the corresponding suspicious coin, and provides a data basis for advanced control.
In an embodiment of the present application, the banking outlet determining unit includes:
the website projection module is used for projecting the website of the bank into a position coordinate system where the predicted diffusion track is located according to the position data of the website of the bank;
and the net point determining module is used for determining the bank net point corresponding to the projection point positioned in the predicted diffusion track range as the bank net point in the predicted diffusion track range.
According to the technical means, the net points where the suspicious coins can be spread in the next step are determined from the bank net points, so that the suspicious coins can be conveniently distributed and controlled in the corresponding net points in advance.
In this embodiment of the present application, the real-time early warning system based on suspicious coin trajectories further includes:
and the center range data determining unit is arranged on the cloud server and is used for determining center range data of suspicious coin discovery according to the contemporaneous multiple discrete historical diffusion tracks.
According to the technical means, the central range of suspicious coin discovery is determined and obtained, and the data can be used as an auxiliary basis for relevant departments, so that the source of the crown word number can be quickly searched, and the trend of continuous diffusion is cut off.
In other embodiments, an acquisition manager is connected between the cloud server and the cashier through a network, and is used for collecting and processing data transmitted by all the storage machines of the current website.
In this embodiment of the present application, the cloud server includes a processor and a memory, where the data acquisition unit, the history diffusion track drawing unit, the predicted diffusion track determining unit, the bank note determining unit, the sensitive note information issuing unit, the central range data determining unit and the like in the real-time early warning system based on the suspicious note track are all stored as program units in the memory, and the processor executes the program modules stored in the memory to implement corresponding functions. The cashier also comprises a processor and a memory, wherein a comparison unit, an alarm unit and the like in the real-time early warning system based on the suspicious coin track are stored in the memory as program units, and the processor executes the program modules stored in the memory to realize corresponding functions.
The processor includes a kernel, and the kernel fetches the corresponding program unit from the memory. The kernel can be provided with one or more than one kernel, and the real-time early warning method based on suspicious coin tracks is realized by adjusting kernel parameters.
The memory may include volatile memory, random Access Memory (RAM), and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), among other forms in computer readable media, the memory including at least one memory chip.
A third aspect of the present application provides a processor configured to perform the method of real-time early warning based on suspicious coin trajectories.
A fourth aspect of the present application provides a machine-readable storage medium having instructions stored thereon that, when executed by a processor, cause the processor to be configured to perform the method of real-time forewarning based on suspected coin trajectories.
A fifth aspect of the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the method of real-time early warning based on suspicious coin trajectories.
Through the technical scheme, the storage space of the cashier equipment is utilized to store the sensitive coin information containing the predicted suspicious coin information, so that the cashier can compare with the sensitive coin information in real time after acquiring the coin information, real-time alarm is realized, the predicted suspicious coin information can be used for distributing and controlling suspicious coins in advance, and compared with the existing comparison method of the acquisition manager, the comparison time is shortened.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer-readable media include both permanent and non-permanent, removable and non-removable media, and information storage may be implemented by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.

Claims (13)

1. The real-time early warning method based on the suspicious coin track is applied to a cloud server and is characterized by comprising the following steps of:
acquiring historical data of suspicious coin triggering early warning and position data of corresponding banking outlets;
Drawing a history diffusion track of the suspicious currency according to the history data and the position data of the banking outlets;
determining a predicted diffusion track according to the historical diffusion track;
determining banking outlets within the range of the predicted diffusion track according to the predicted diffusion track;
the current suspicious coin information is added into the sensitive coin information and is issued to a cashier of the determined banking website, so that the acquired coin information is compared with the sensitive coin information in real time through the cashier, and an alarm is given when the existence of the coin information matched with the sensitive coin information is determined.
2. The real-time warning method based on suspicious coin trajectories according to claim 1, wherein drawing the historical diffusion trajectories of suspicious coins according to the historical data and the position data of banking sites comprises:
drawing a track center point by taking the position of a banking website which first discovers suspicious coins in the historical data as a center position;
and taking the preset time period as an interval, connecting the positions of the banking outlets which are newly added in the same preset time period and found to correspond to the suspicious coins and have the distance smaller than the preset distance with the central point, and drawing to form a history diffusion track.
3. The method of claim 2, wherein determining a predicted diffusion trajectory from a historical diffusion trajectory comprises:
And drawing and forming a predicted diffusion track on the periphery of the historical diffusion track according to the development trend of the last preset time period in the historical diffusion track.
4. The method of claim 1, wherein determining banking sites within the predicted diffusion trajectory based on the predicted diffusion trajectory comprises:
projecting the banking outlets into a position coordinate system where the predicted diffusion track is located according to the position data of the banking outlets;
and determining the banking outlets corresponding to the projection points in the predicted diffusion track range as the banking outlets in the predicted diffusion track range.
5. The method for real-time early warning based on a suspected coin trajectory according to claim 1, further comprising:
center range data for suspected coin findings is determined from a plurality of discrete historical diffusion tracks of contemporaneous time.
6. The real-time early warning system based on the suspicious coin track is characterized by comprising a cloud server and a cashier machine;
the cloud server is provided with:
the data acquisition unit is used for acquiring historical data of the suspicious coin triggering early warning and position data of the corresponding banking website;
The historical diffusion track drawing unit is used for drawing the historical diffusion track of the suspicious currency according to the historical data and the position data of the banking website;
a predicted diffusion track determining unit configured to determine a predicted diffusion track from the historical diffusion track;
the banking website determining unit is used for determining banking website within the range of the predicted diffusion track according to the predicted diffusion track;
the sensitive coin information issuing unit is used for adding the current suspicious coin information into the sensitive coin information and issuing the current suspicious coin information to the determined cashier at the bank website;
the cashier arrangement has:
the comparison unit is used for comparing the acquired coin information with the sensitive coin information in real time;
and the alarm unit is used for alarming when the coin information matched with the sensitive coin information is determined.
7. The suspected coin trajectory-based real-time warning system of claim 6, wherein the historic diffusion trajectory drawing unit comprises:
the center drawing module is used for drawing a track center point by taking the position of the bank website of the suspicious currency found for the first time in the historical data as a center position;
and the historical diffusion track drawing module is used for taking a preset time period as an interval, connecting the positions of the bank network points, which are more newly added in the same preset time period and are less than the preset distance from the center point, of the bank network points of which the corresponding suspicious coins are found, and drawing to form the historical diffusion track.
8. The suspected coin trajectory-based real-time warning system of claim 6, wherein the predicted diffusion trajectory determination unit comprises:
the predicted diffusion track drawing module is used for drawing and forming a predicted diffusion track on the periphery of the historical diffusion track according to the development trend of the last preset time period in the historical diffusion track.
9. The real-time early warning system based on a suspected coin trajectory according to claim 6, wherein the banking outlet determination unit comprises:
the website projection module is used for projecting the website of the bank into a position coordinate system where the predicted diffusion track is located according to the position data of the website of the bank;
and the net point determining module is used for determining the bank net point corresponding to the projection point positioned in the predicted diffusion track range as the bank net point in the predicted diffusion track range.
10. The suspected coin trajectory-based real-time forewarning system of claim 6, further comprising:
and the center range data determining unit is arranged on the cloud server and is used for determining center range data of suspicious coin discovery according to the contemporaneous multiple discrete historical diffusion tracks.
11. A processor configured to perform the suspected coin trajectory-based real-time pre-warning method of any one of claims 1 to 5.
12. A machine-readable storage medium having instructions stored thereon, which when executed by a processor cause the processor to be configured to perform the real-time forewarning method based on suspected coin trajectories of any one of claims 1 to 5.
13. A computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the real-time warning method based on suspicious coin trajectories according to any one of claims 1 to 5.
CN202311265509.4A 2023-09-27 2023-09-27 Real-time early warning method, system, medium and processor based on suspicious coin track Pending CN117315839A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311265509.4A CN117315839A (en) 2023-09-27 2023-09-27 Real-time early warning method, system, medium and processor based on suspicious coin track

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311265509.4A CN117315839A (en) 2023-09-27 2023-09-27 Real-time early warning method, system, medium and processor based on suspicious coin track

Publications (1)

Publication Number Publication Date
CN117315839A true CN117315839A (en) 2023-12-29

Family

ID=89245755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311265509.4A Pending CN117315839A (en) 2023-09-27 2023-09-27 Real-time early warning method, system, medium and processor based on suspicious coin track

Country Status (1)

Country Link
CN (1) CN117315839A (en)

Similar Documents

Publication Publication Date Title
US7945515B2 (en) Mass compromise/point of compromise analytic detection and compromised card portfolio management system
US20180365696A1 (en) Financial fraud detection using user group behavior analysis
JPH117481A (en) Supervisory system and method
US20200242615A1 (en) First party fraud detection
US20200134986A1 (en) System for network resource exchanging
US11250680B2 (en) Utilizing a high generation cellular network for identifying devices associated with unauthorized activities and notifying enterprise facilities
US11907942B2 (en) Blockchain network risk management universal blockchain data model
CN110728301A (en) Credit scoring method, device, terminal and storage medium for individual user
CN109523124A (en) Asset data processing method, device, computer equipment and storage medium
CN115131117A (en) Tax inspection case analysis and early warning method and system by analyzing tax data
CN115018651A (en) Financial risk early warning system based on internet
CN109242658B (en) Suspicious transaction report generation method, suspicious transaction report generation system, suspicious transaction report generation computer device and suspicious transaction report storage medium
CN111951544A (en) Method and device for determining monitoring point
CN117315839A (en) Real-time early warning method, system, medium and processor based on suspicious coin track
CN113256121A (en) Artificial intelligent money laundering method and system
CN110430217A (en) Detection method, device and computer readable storage medium based on information system classification security threat
Lopes et al. Applying user signatures on fraud detection in telecommunications networks
CN114547406A (en) Data monitoring method, system, storage medium and electronic device
US11647048B2 (en) Real-time feedback service for resource access rule configuration
CN112819281A (en) Monitoring and alarming method and system for abnormal rotation behavior of reserved grains
KR102629578B1 (en) device and method for tracking Illegal purpose account
CN116882998B (en) Virtual currency fund analysis method
KR102641486B1 (en) Device and method of tracking virtual currency
CN114861807A (en) Behavior information processing method and device, electronic equipment and storage medium
CN117808479A (en) Illegal funds transfer risk processing method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination