CN111324802A - Data auditing method and device based on identity recognition and computer equipment - Google Patents

Data auditing method and device based on identity recognition and computer equipment Download PDF

Info

Publication number
CN111324802A
CN111324802A CN202010099472.2A CN202010099472A CN111324802A CN 111324802 A CN111324802 A CN 111324802A CN 202010099472 A CN202010099472 A CN 202010099472A CN 111324802 A CN111324802 A CN 111324802A
Authority
CN
China
Prior art keywords
data
user
asset
auditing
character recognition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010099472.2A
Other languages
Chinese (zh)
Inventor
刘丽珍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
OneConnect Financial Technology Co Ltd Shanghai
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN202010099472.2A priority Critical patent/CN111324802A/en
Publication of CN111324802A publication Critical patent/CN111324802A/en
Priority to PCT/CN2020/106052 priority patent/WO2021164205A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • G06F16/5846Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content using extracted text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Abstract

The application relates to a data auditing method, a device, computer equipment and a storage medium which relate to research, development and management and are based on identity recognition. The method comprises the following steps: when a data auditing request is detected, comparing an identification character recognition result corresponding to a user identification with user identification information, extracting corresponding behavior historical data when the data auditing request is met, determining a data auditing mode corresponding to behavior historical data of different data types, acquiring a first user identification corresponding to the behavior historical data when the behavior historical data passes the data auditing corresponding to the auditing mode, pushing the first user identification to a priority queue, acquiring the first user identification from the priority queue, performing asset data auditing on an asset character recognition result corresponding to the first user identification, generating an auditing result and returning the auditing result to a user terminal. And performing preferential audit on the asset data information of the first user which passes the historical behavior data audit, and returning an audit result to the user, so that the working efficiency of data audit is improved.

Description

Data auditing method and device based on identity recognition and computer equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data auditing method and apparatus based on identity recognition, a computer device, and a storage medium.
Background
With the development of computing technology, processing activities on asset information become more frequent, and people can use their own assets for investment financing to receive higher-value returns. For a user with a financial product purchasing requirement, related enterprises need to check the purchasing qualification of the user, wherein the qualification of investors is the authentication process based on identity recognition of banks or enterprises when the user purchases a financial product. Currently, most enterprises determine whether the user has the purchasing qualification of the financial product by checking related data based on identification. After the customer uploads the data, whether the customer can purchase the related products is judged by auditing the data uploaded by the customer. However, currently, direct auditing is performed on data uploaded by a client, and there still exists more information irrelevant to user purchase qualification auditing in the data to be audited, which causes the problems that the workload of information auditing processing is increased, a large amount of computer resources are consumed, and auditing efficiency cannot be improved.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method, an apparatus, a computer device and a storage medium for data auditing based on identification, which can improve the efficiency of data auditing based on identification.
A data auditing method based on identity recognition, the method comprising:
when a data auditing request sent by a user is detected, acquiring an identity character recognition result and an asset character recognition result corresponding to a user identifier, and comparing the identity character recognition result with pre-stored user identity information;
when the identification character recognition result accords with the pre-stored user identification information, extracting behavior historical data corresponding to the user identification;
classifying the behavior history data according to a preset data classification rule to obtain behavior history data of different data types; the data types include numeric data, textual data, and byte data;
determining a data auditing mode corresponding to the behavior historical data of each different data type; the data auditing modes comprise a first auditing mode corresponding to digital behavior historical data, a second auditing mode corresponding to text behavior historical data and a third auditing mode corresponding to byte behavior historical data;
according to the auditing mode, respectively auditing the behavior historical data of the corresponding data types;
when the behavior history data passes the data audit, acquiring a first user identifier corresponding to the behavior history data, and pushing the first user identifier to a priority queue in a queuing system;
polling the queuing system, and acquiring the first user identifier from the priority queue;
and performing asset data audit on the asset character recognition result corresponding to the first user identifier, generating an audit result and returning the audit result to the user terminal.
In one embodiment, the asset data auditing the asset character recognition result corresponding to the first user identifier, generating an auditing result and returning the auditing result to the user terminal includes:
analyzing an asset information character recognition result corresponding to the first user identification, and extracting asset keywords from the asset information character recognition result; the asset keyword comprises an asset type corresponding to the first user identification;
acquiring a preset auditing standard, and comparing the asset keywords with the preset auditing standard;
and when the asset key character meets the preset auditing standard, returning a result of successful auditing of the first user.
In one embodiment, the performing asset data audit on the asset character recognition result corresponding to the first user identifier, generating an audit result, and returning the audit result to the user terminal further includes:
acquiring the preset auditing standard corresponding to the first user identification; the preset auditing standard is a preset total asset threshold corresponding to the first user identifier;
acquiring the asset numerical value size corresponding to each asset type corresponding to the first user identification;
accumulating the asset numerical value of each asset type to obtain a total asset numerical value;
comparing the total asset value with the preset total asset threshold value;
when the total asset numerical value is greater than or equal to the preset total asset threshold value, generating a result generated by auditing and returning the result to the user terminal; and when the total asset numerical value is smaller than the preset total asset threshold value, generating a result of the failure of the audit and returning the result to the user terminal.
In one embodiment, the user identifier further comprises a second user identifier; the method further comprises the following steps:
when the behavior data does not pass the data audit, obtaining a corresponding second user;
pushing a second user identifier corresponding to the second user to a common queue in the queuing system;
when the queuing system is polled to not acquire the first user identification, acquiring the second user identification from the common queue;
and performing asset data audit on the asset character recognition result corresponding to the second user identification by using the preset audit standard, generating an audit result and returning the audit result to the user terminal.
In one embodiment, the obtaining an identity character recognition result and an asset character recognition result corresponding to a user identifier when a data audit request sent by a user is detected, and comparing the identity character recognition result with pre-stored user identity information includes:
acquiring an identity certificate image file and an asset certificate image file uploaded by a user;
extracting character recognition information from the identity certificate image file and the asset certificate image file to obtain an identity character recognition result and an asset character recognition result;
acquiring pre-stored user identity information;
and comparing the identification result of the identity character with the pre-stored user identity information.
In one embodiment, the extracting, when the identification character recognition result matches the pre-stored user identification information, behavior history data corresponding to the user identifier includes:
when the identification character recognition result accords with the pre-stored user identification information, respectively acquiring browsing record related data, collection record related data and purchase record related data corresponding to the user identification; the browsing record related data comprises product categories browsed by a user, product values of corresponding products and browsing times; the collection record related data comprises product categories collected by the user and product values of corresponding products; the purchase record related data comprises the product category purchased by the user, the purchase times of the corresponding product, the purchase time and the product value.
An identification-based data auditing apparatus, the apparatus comprising:
the detection module is used for acquiring an identity character recognition result and an asset character recognition result corresponding to a user identifier when a data auditing request sent by a user is detected, and comparing the identity character recognition result with pre-stored user identity information;
the behavior history data extraction module is used for extracting behavior history data corresponding to the user identification when the identification result of the identity character accords with the pre-stored user identity information;
the classification module is used for classifying the behavior historical data according to a preset data classification rule to obtain behavior historical data of different data types; the data types include numeric data, textual data, and byte data;
the data auditing mode determining module is used for determining a data auditing mode corresponding to the behavior historical data of each different data type; the data auditing modes comprise a first auditing mode corresponding to digital behavior historical data, a second auditing mode corresponding to text behavior historical data and a third auditing mode corresponding to byte behavior historical data;
the data auditing module is used for respectively auditing the behavior historical data of the corresponding data types according to the auditing mode;
the pushing module is used for acquiring a first user identifier corresponding to the behavior history data when the behavior history data passes the data audit, and pushing the first user identifier to a priority queue in a queuing system;
the polling module is used for polling the queuing system and acquiring the first user identifier from the priority queue;
and the auditing result generating module is used for performing asset data auditing on the asset character recognition result corresponding to the first user identifier, generating an auditing result and returning the auditing result to the user terminal.
In one embodiment, the audit result generation module is further configured to:
analyzing an asset information character recognition result corresponding to the first user identification, and extracting asset keywords from the asset information character recognition result; the asset keyword comprises an asset type corresponding to the first user identification;
acquiring a preset auditing standard, and comparing the asset keywords with the preset auditing standard;
and when the asset key character meets the preset auditing standard, returning a result of successful auditing of the first user.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
when a data auditing request sent by a user is detected, acquiring an identity character recognition result and an asset character recognition result corresponding to a user identifier, and comparing the identity character recognition result with pre-stored user identity information;
when the identification character recognition result accords with the pre-stored user identification information, extracting behavior historical data corresponding to the user identification;
classifying the behavior history data according to a preset data classification rule to obtain behavior history data of different data types; the data types include numeric data, textual data, and byte data;
determining a data auditing mode corresponding to the behavior historical data of each different data type; the data auditing modes comprise a first auditing mode corresponding to digital behavior historical data, a second auditing mode corresponding to text behavior historical data and a third auditing mode corresponding to byte behavior historical data;
according to the auditing mode, respectively auditing the behavior historical data of the corresponding data types;
when the behavior history data passes the data audit, acquiring a first user identifier corresponding to the behavior history data, and pushing the first user identifier to a priority queue in a queuing system;
polling the queuing system, and acquiring the first user identifier from the priority queue;
and performing asset data audit on the asset character recognition result corresponding to the first user identifier, generating an audit result and returning the audit result to the user terminal.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
when a data auditing request sent by a user is detected, acquiring an identity character recognition result and an asset character recognition result corresponding to a user identifier, and comparing the identity character recognition result with pre-stored user identity information;
when the identification character recognition result accords with the pre-stored user identification information, extracting behavior historical data corresponding to the user identification;
classifying the behavior history data according to a preset data classification rule to obtain behavior history data of different data types; the data types include numeric data, textual data, and byte data;
determining a data auditing mode corresponding to the behavior historical data of each different data type; the data auditing modes comprise a first auditing mode corresponding to digital behavior historical data, a second auditing mode corresponding to text behavior historical data and a third auditing mode corresponding to byte behavior historical data;
according to the auditing mode, respectively auditing the behavior historical data of the corresponding data types;
when the behavior history data passes the data audit, acquiring a first user identifier corresponding to the behavior history data, and pushing the first user identifier to a priority queue in a queuing system;
polling the queuing system, and acquiring the first user identifier from the priority queue;
and performing asset data audit on the asset character recognition result corresponding to the first user identifier, generating an audit result and returning the audit result to the user terminal.
According to the data auditing method and device based on identity recognition, the computer equipment and the storage medium, when a data auditing request sent by a user is detected, an identity character recognition result and an asset character recognition result corresponding to a user identifier are obtained, and the identity character recognition result is compared with pre-stored user identity information. And when the identification character recognition result accords with the pre-stored user identification information, extracting the behavior historical data corresponding to the user identification, classifying the behavior historical data according to a preset data classification rule to obtain behavior historical data of different data types, and further determining a data auditing mode corresponding to the behavior historical data of different data types. And respectively performing data auditing on the behavior historical data of the corresponding data types according to the auditing mode, acquiring a first user identifier corresponding to the behavior historical data when the behavior historical data passes the data auditing, and pushing the first user identifier to a priority queue in the queuing system. And the polling queuing system acquires the first user identifier from the priority queue, performs asset data audit on the asset character recognition result corresponding to the first user identifier, generates an audit result and returns the audit result to the user terminal. By confirming the identity information of the client and auditing the behavior historical data of the user after the identity information is confirmed, the condition that all information submitted by the user is directly audited to cause confusion is avoided, the asset data information of the first user which passes the audit aiming at the historical behavior data can be preferentially audited, the audit result is timely returned to the user, and the work efficiency of data audit is improved.
Drawings
FIG. 1 is a diagram illustrating an application scenario of a data auditing method based on identification in one embodiment;
FIG. 2 is a schematic flow chart illustrating a data auditing method based on identification in one embodiment;
FIG. 3 is a block diagram of an apparatus for auditing data based on identification in one embodiment;
FIG. 4 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The data auditing method based on the identification provided by the application can be applied to the application environment shown in fig. 1. Wherein the user terminal 102 and the server 104 communicate over a network. When the server 104 detects a data auditing request sent by a user at the user terminal 102, an identity character recognition result and an asset character recognition result corresponding to a user identifier are obtained, and the identity character recognition result is compared with pre-stored user identity information. And when the identification character recognition result accords with the pre-stored user identification information, extracting the behavior historical data corresponding to the user identification, classifying the behavior historical data according to a preset data classification rule to obtain behavior historical data of different data types, and further determining a data auditing mode corresponding to the behavior historical data of different data types. And respectively performing data auditing on the behavior historical data of the corresponding data types according to the auditing mode, acquiring a first user identifier corresponding to the behavior historical data when the behavior historical data passes the data auditing, and pushing the first user identifier to a priority queue in the queuing system. The server 104 acquires the first user identifier from the priority queue through the polling queuing system, performs asset data audit on the asset character recognition result corresponding to the first user identifier, generates an audit result, and returns the audit result to the user terminal 102. The user terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 104 may be implemented by an independent server or a server cluster composed of a plurality of servers.
In one embodiment, as shown in fig. 2, there is provided an identity recognition-based data auditing method, which is described by taking the method as an example applied to the server in fig. 1, and includes the following steps:
s202, when a data auditing request sent by a user is detected, acquiring an identity character recognition result and an asset character recognition result corresponding to a user identification, and comparing the identity character recognition result with pre-stored user identity information.
Specifically, when the server detects a data auditing request sent by a user at the terminal, the server obtains an identification image file and an asset identification image file uploaded by the user, and extracts character recognition information from the identification image file and the asset identification image file, so that an identification character recognition result and an asset character recognition result can be obtained. And acquiring the user identity information prestored when the user registers from the system, and comparing the identity character recognition result with the prestored user identity information.
The user uploads the identity card image file and the asset certification image file to the server while the terminal sends a data verification request to the server, and the server receives the data verification request sent by the terminal and acquires the identity card image file and the asset certification image file uploaded by the user. The asset certification image files include income certificates, bank runs, deposit certificates, certificates of other financial products purchased, and image files of stocks, funds, futures, bonds, trusts, insurance and bankbooks, among others. The pre-stored user information is identity information input by a user at a terminal, and comprises an identity card number and a name of the user.
Further, the server can obtain the identification number and the name on the identification image file by analyzing the identification information character recognition result of the user, and judges whether the identification information character recognition result is matched with the identification number and the name which are input by the user in the terminal in advance by comparing the identification information character recognition result with the identification number and the name which are input by the user in advance in the terminal. And when the identification result of the identity information character is not matched with the identity card number and the name which are input by the user in the terminal in advance, the result of the failure of the verification needs to be returned. And when the image file format is wrong, the extraction of character recognition information cannot be realized, and information for re-uploading the image file needs to be returned.
The method comprises the steps of verifying whether an asset uploaded by a user is the user or not in an asset certificate, extracting information such as names and identity cards in an image file according to names in the asset certificate, identifying picture characters, generating a large string of character information, comparing the extracted names with user names in pre-stored user information, and comparing the user names with identity card numbers if the user names are different. And after the identity cards are matched, comparing, and if the identity card numbers are inconsistent, indicating that the uploaded asset certificate is not the owner and the verification is not passed.
And S204, when the identification character recognition result accords with the pre-stored user identity information, extracting the behavior history data corresponding to the user identification.
The behavior history data corresponding to the user identifier comprises browsing records, collecting records and product purchase records corresponding to the user identifier, the browsing records can be access records of a user on products and promotion activities in a system or a shopping mall, the collecting records comprise records for selecting to collect one or more products after the user browses the products, and the purchase records of the products comprise different types of products purchased by the user, values of corresponding products and the like. Specifically, the browsing record related data comprises product categories browsed by the user, product values of corresponding products and browsing times, the collection record related data comprises product categories collected by the user and product values of corresponding products, and the purchase record related data comprises product categories purchased by the user, purchase times of corresponding products, purchase time and product values.
Specifically, when the identification result of the identity information characters accords with the pre-stored identity information, that is, the identity card number and the name on the identity card image file uploaded by the user are matched with the identity card number and the name pre-input by the user at the terminal, the server acquires the browsing record, the collection record, the product purchase record and the promotion activity participation record of the user in the system or the mall according to the registration information of the user. Meanwhile, in the product purchase record of the user, the categories of financial products or insurance products purchased by the user are obtained, and the product value, the purchase time and the like are included.
And S206, classifying the behavior history data according to a preset data classification rule to obtain behavior history data of different data types, wherein the data types comprise digital data, text data and byte data.
Specifically, the preset data classification rule is used for classifying the behavior history data, and the classification basis corresponds to the data type, wherein the data type includes digital type data, text type data and byte type data, and the behavior history data can be classified into the digital type behavior history data, the text type behavior history data and the byte type behavior history data through the preset data classification rule.
S208, determining data auditing modes corresponding to behavior historical data of different data types; the data auditing modes comprise a first auditing mode corresponding to the digital behavior historical data, a second auditing mode corresponding to the text behavior historical data and a third auditing mode corresponding to the byte behavior historical data.
Specifically, because the behavior history data of different data types are provided with corresponding data auditing modes, the behavior history data of the corresponding data types can be audited by acquiring the data auditing modes corresponding to the behavior history data of different data types. The data auditing modes comprise a first auditing mode corresponding to the digital behavior historical data, a second auditing mode corresponding to the text behavior historical data and a third auditing mode corresponding to the byte behavior historical data. And the historical data of the digital behavior can be audited by utilizing a first auditing mode, the historical data of the text behavior can be audited by utilizing a second auditing mode, and similarly, the historical data of the byte behavior can be audited by utilizing a third auditing mode.
And S210, respectively performing data auditing on the behavior historical data of the corresponding data types according to the auditing mode.
Specifically, after data classification can be performed on browsing record related data, collection record related data and purchase record related data, data verification is performed by using corresponding data verification modes. The server checks different types of products browsed by the user and browsing times of corresponding products, and judges purchasing tendency of the user according to the browsing times of different products, generally speaking, the user has more purchasing tendency to the products browsed for many times, but the products which are not browsed and known cannot be easily purchased, so that whether the user passes preliminary data check can be preliminarily judged according to the browsing records of the user, namely whether the browsing records of the user can pass the data check.
Further, the browsing collection related data and the purchase record related data in the shopping mall or the system comprise the product category collected by the user and the product value of the corresponding product, and the product category purchased by the user, the purchase times of the corresponding product, the purchase time and the product value. The server needs to audit the products of different categories collected by the user, the number of the products of the same category and the product values of the products, and can judge whether the products with purchasing tendency of the user meet the asset types in the follow-up asset audit. And meanwhile, checking the purchase times of different types of products purchased by the user and the product values of corresponding products, and when the products purchased by the user conform to the acceptable asset types in the follow-up asset checking and the product values are accumulated, indicating that the collection record related data and the purchase record data of the user pass the data checking through a preset checking standard. Further, after the behavior data of the identifier passes the data audit, the user corresponding to the user identifier is the first user. The system performs auditing preferentially for the first user and is in a preferential queue in the queuing system.
S212, when the behavior history data passes the data auditing, acquiring a first user identifier corresponding to the behavior history data, and pushing the first user identifier to a priority queue in the queuing system.
Specifically, when the behavior history data passes the data audit, it is indicated that the user identifier corresponding to the behavior history data is changed to be the first user identifier, and the server can obtain the first user identifier corresponding to the first user and push the first user identifier to the priority queue in the queuing system. The user identifier further includes a second user identifier, that is, when the behavior data corresponding to the user identifier fails to be checked by the data, the user corresponding to the user identifier is obtained as the second user, and the second user identifier corresponding to the second user can be pushed to a second queue in the queuing system. A data audit of the second user in the second queue is performed after the priority queue.
S214, polling the queuing system to acquire the first user identification from the priority queue.
Specifically, the server polls the queuing system by using a polling mechanism, judges whether a first user identifier exists in a priority queue in the queuing system, and acquires the first user identifier when the first user identifier is identified in the queuing system.
And S216, performing asset data audit on the asset character recognition result corresponding to the first user identifier, generating an audit result and returning the audit result to the user terminal.
Specifically, the server analyzes the asset information character recognition result corresponding to the first user identification and extracts asset keywords from the asset information character recognition result. Wherein the asset key comprises an asset type corresponding to the first user identification. And the server compares the asset keyword with the preset auditing standard by acquiring the preset auditing standard, and returns a result of successful auditing of the first user when the asset keyword meets the preset auditing standard.
The server acquires a preset auditing standard, compares the asset keywords with the preset auditing standard, and specifically comprises the following steps: the server acquires a preset auditing standard, wherein the preset auditing standard is a preset total asset threshold corresponding to the user identification. And acquiring the asset numerical value corresponding to each asset type, accumulating the asset numerical values of the asset types, acquiring a total asset numerical value, comparing the total asset numerical value with a preset total asset threshold value, and judging the difference value between the total asset numerical value and the preset total asset threshold value. And further judging whether the total assets pass the audit or not according to the difference value of the total assets numerical value and the preset total assets threshold value.
Further, the server performs template matching according to the result returned by the asset information character recognition, obtains a corresponding value through regular matching, and performs templating, wherein at present, the character recognition can extract keywords such as money, account numbers and the like from the asset certificate submitted by the user, summarize the total asset value after extracting the keywords, and then judge whether the total asset value can reach the predetermined standard for auditing. And when the standard is met, the audit is passed, if the standard is not met, the audit is not passed, or the user is reminded to provide other asset certification files.
The summary of the total asset numerical values indicates that all money amounts in the multiple sets of asset proofs submitted by the users are summed, and the set auditing standards can be fixed or adjustable, but the user auditing standards for auditing all transmitted data need to be kept consistent. For example, if the general auditing standard is that the total assets reach more than 100 ten thousand, the assets can be approved, and then whether the total sum after summation exceeds 100 ten thousand can be judged to judge whether the assets pass the auditing. The reason for the failure of the audit is that the requirements of the corresponding financial products on the assets cannot be met based on the identity recognition.
In the data auditing method based on identity recognition, when a data auditing request sent by a user is detected, an identity character recognition result and an asset character recognition result corresponding to a user identifier are obtained, and the identity character recognition result is compared with pre-stored user identity information. And when the identification character recognition result accords with the pre-stored user identification information, extracting the behavior historical data corresponding to the user identification, classifying the behavior historical data according to a preset data classification rule to obtain behavior historical data of different data types, and further determining a data auditing mode corresponding to the behavior historical data of different data types. And respectively performing data auditing on the behavior historical data of the corresponding data types according to the auditing mode, acquiring a first user identifier corresponding to the behavior historical data when the behavior historical data passes the data auditing, and pushing the first user identifier to a priority queue in the queuing system. And the polling queuing system acquires the first user identifier from the priority queue, performs asset data audit on the asset character recognition result corresponding to the first user identifier, generates an audit result and returns the audit result to the user terminal. By confirming the identity information of the client and auditing the behavior historical data of the user after the identity information is confirmed, the condition that all information submitted by the user is directly audited to cause confusion is avoided, the asset data information of the first user which passes the audit aiming at the historical behavior data can be preferentially audited, the audit result is timely returned to the user, and the work efficiency of data audit is improved.
In one embodiment, the steps of performing asset data audit on the asset character recognition result corresponding to the first user identifier, generating an audit result and returning the audit result to the user terminal further include:
acquiring a preset auditing standard corresponding to a first user identifier; presetting an auditing standard as a preset total asset threshold corresponding to the first user identifier;
acquiring asset numerical values corresponding to asset types corresponding to the first user identification;
accumulating the asset numerical values of all asset types to obtain a total asset numerical value;
comparing the total asset value with a preset total asset threshold value;
when the total asset value is greater than or equal to the preset total asset threshold value, generating a result generated by auditing and returning the result to the user terminal; and when the total asset value is smaller than the preset total asset threshold value, generating a result of the failure of the audit and returning the result to the user terminal.
Specifically, the server obtains a preset auditing standard, wherein the preset auditing standard is a preset total asset threshold corresponding to the user identifier. And acquiring the asset numerical value corresponding to each asset type, accumulating the asset numerical values of the asset types, acquiring a total asset numerical value, comparing the total asset numerical value with a preset total asset threshold value, and judging the difference value between the total asset numerical value and the preset total asset threshold value. And further judging whether the total assets pass the audit or not according to the difference value of the total assets numerical value and the preset total assets threshold value. And when the difference value is positive, namely the total asset value is greater than the preset total asset threshold value, the audit is passed. And when the difference value is a negative number, namely the total asset value is smaller than the preset total asset threshold value, the audit is not passed, and the user is reminded that a file of other asset certificates needs to be provided again.
The asset types comprise income and financial products, including stocks, funds, futures, bonds, trusts, insurance and the like, and the value of the asset amount corresponding to each asset type is not fixed. The summary of the total asset value indicates that all money amounts in the multiple sets of asset proofs submitted by the users are summed, and the set auditing standard can be fixed or adjustable, but the user auditing standards for auditing all sent data need to be kept consistent. For example, if the general auditing standard is that the total assets reach more than 100 ten thousand, the assets can be approved, and then whether the total sum after summation exceeds 100 ten thousand can be judged to judge whether the assets pass the auditing. The reason for the failure of the audit is that the requirements of the corresponding financial products on the assets cannot be met based on the identity recognition.
In the above step, the asset keywords are extracted from the asset information character recognition result corresponding to the first user identifier, the asset keywords are checked by using the preset checking standard, and when the asset keywords meet the preset checking standard, the result that the first user successfully checks is returned. The method and the device realize the prior auditing of the asset information character recognition of the first user identification, can obtain the auditing result in time, reduce the time for the user to wait for the auditing result, and improve the user experience.
In one embodiment, a data auditing method based on identification is provided, which further includes:
when the behavior data corresponding to the user identification do not pass the data audit, the server obtains a corresponding second user; pushing a second user identifier corresponding to a second user to a second queue in the queuing system; when the polling queuing system does not acquire the first user identifier, acquiring a second user identifier from a second queue; and performing asset data audit on the asset character recognition result corresponding to the second user identifier by using a preset audit standard, generating an audit result and returning the audit result to the user terminal.
Specifically, the server analyzes the asset information character recognition result corresponding to the second user identification, and extracts asset keywords from the asset information character recognition result. And the asset keyword comprises an asset type corresponding to the second user identification. And the server compares the asset keyword with the preset auditing standard by acquiring the preset auditing standard, and returns a result of successful auditing of the second user when the asset keyword meets the preset auditing standard.
Further, the server obtains a preset audit standard, and compares the asset keyword with the preset audit standard, which specifically includes: the server acquires a preset auditing standard, wherein the preset auditing standard is a preset total asset threshold corresponding to the user identification. And acquiring the asset numerical value corresponding to each asset type, accumulating the asset numerical values of the asset types, acquiring a total asset numerical value, comparing the total asset numerical value with a preset total asset threshold value, and judging the difference value between the total asset numerical value and the preset total asset threshold value. And further judging whether the total assets pass the audit or not according to the difference value of the total assets numerical value and the preset total assets threshold value.
According to the data auditing method based on identity recognition, when the first user identification is not obtained, the second user identification at the front position is obtained from the queuing system, and the asset information character recognition result corresponding to the second user identification is audited by using the preset auditing standard to obtain the corresponding auditing result. Due to the fact that the first user is preferentially checked relative to the second user, the use experience of the first user is improved, and more first users are attracted.
In one embodiment, when a data auditing request sent by a user is detected, a step of obtaining an identity character recognition result and an asset character recognition result corresponding to a user identifier, and comparing the identity character recognition result with pre-stored user identity information includes:
the server acquires an identity certificate image file and an asset certificate image file uploaded by a user; extracting character recognition information from the identity certificate image file and the asset certificate image file to obtain an identity character recognition result and an asset character recognition result; acquiring pre-stored user identity information; and comparing the identification result of the identity character with the pre-stored user identity information.
Specifically, a user uploads an identity card image file and an asset certificate image file of the user to a server while sending a data verification request to the server by the terminal, and the server receives the data verification request sent by the terminal and acquires the identity card image file and the asset certificate image file uploaded by the user. The asset certification image files include income certificates, bank runs, deposit certificates, certificates of other financial products purchased, and image files of stocks, funds, futures, bonds, trusts, insurance and bankbooks, among others. The pre-stored user information is identity information input by a user at a terminal, and comprises an identity card number and a name of the user.
Further, the server can obtain the identification number and the name on the identification image file by analyzing the identification information character recognition result of the user, and judges whether the identification information character recognition result is matched with the identification number and the name which are input by the user in the terminal in advance by comparing the identification information character recognition result with the identification number and the name which are input by the user in advance in the terminal. And when the identification result of the identity information character is not matched with the identity card number and the name which are input by the user in the terminal in advance, the result of the failure of the verification needs to be returned. And when the image file format is wrong, the extraction of character recognition information cannot be realized, and information for re-uploading the image file needs to be returned.
In the steps, the server extracts the character recognition information from the identification image file and the asset image file uploaded by the user to obtain an identification character recognition result and an asset character recognition result, and compares the identification character recognition result with the pre-stored user identification information. The method and the device realize automatic verification of the user identity information, avoid manual offline verification, and improve the accuracy and verification speed of identity information verification.
It should be understood that, although the steps in the flowchart of fig. 2 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in fig. 2 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 3, there is provided an identification-based data auditing apparatus, including: the system comprises a detection module 302, a behavior history data extraction module 304, a classification module 306, a data auditing mode determination module 308, a data auditing module 310, a push module 312, a polling module 314 and an auditing result generation module 316, wherein:
the detection module 302 is configured to, when a data audit request sent by a user is detected, obtain an identity character recognition result and an asset character recognition result corresponding to a user identifier, and compare the identity character recognition result with pre-stored user identity information.
And the behavior history data extraction module 304 is configured to extract behavior history data corresponding to the user identifier when the identification result of the identity character matches pre-stored user identity information.
The classification module 306 is configured to classify the behavior history data according to a preset data classification rule to obtain behavior history data of different data types; the data types include numeric data, text data, and byte data.
A data auditing mode determining module 308, configured to determine data auditing modes corresponding to behavior history data of different data types; the data auditing modes comprise a first auditing mode corresponding to the digital behavior historical data, a second auditing mode corresponding to the text behavior historical data and a third auditing mode corresponding to the byte behavior historical data.
And the data auditing module 310 is configured to perform data auditing on the behavior history data of the corresponding data types according to the auditing manner.
The pushing module 312 is configured to, when the behavior history data passes the data audit, obtain a first user identifier corresponding to the behavior history data, and push the first user identifier to a priority queue in the queuing system.
The polling module 314 is configured to poll the queuing system to obtain the first subscriber identity from the priority queue.
And the audit result generating module 316 is configured to perform asset data audit on the asset character recognition result corresponding to the first user identifier, generate an audit result, and return the audit result to the user terminal.
According to the data auditing device based on identity recognition, when a data auditing request sent by a user is detected, an identity character recognition result and an asset character recognition result corresponding to a user identification are obtained, and the identity character recognition result is compared with pre-stored user identity information. And when the identification character recognition result accords with the pre-stored user identification information, extracting the behavior historical data corresponding to the user identification, classifying the behavior historical data according to a preset data classification rule to obtain behavior historical data of different data types, and further determining a data auditing mode corresponding to the behavior historical data of different data types. And respectively performing data auditing on the behavior historical data of the corresponding data types according to the auditing mode, acquiring a first user identifier corresponding to the behavior historical data when the behavior historical data passes the data auditing, and pushing the first user identifier to a priority queue in the queuing system. And the polling queuing system acquires the first user identifier from the priority queue, performs asset data audit on the asset character recognition result corresponding to the first user identifier, generates an audit result and returns the audit result to the user terminal. By confirming the identity information of the client and auditing the behavior historical data of the user after the identity information is confirmed, the condition that all information submitted by the user is directly audited to cause confusion is avoided, the asset data information of the first user which passes the audit aiming at the historical behavior data can be preferentially audited, the audit result is timely returned to the user, and the work efficiency of data audit is improved.
In one embodiment, the audit result generation module is further configured to:
analyzing an asset information character recognition result corresponding to the first user identification, and extracting asset keywords from the asset information character recognition result; an asset key comprising an asset type corresponding to the first user identification; acquiring a preset auditing standard, and comparing the asset keywords with the preset auditing standard; and when the asset keywords accord with the preset auditing standard, returning a result of successful auditing of the first user.
The auditing module realizes the prior auditing of the asset information character recognition of the first user identification, can obtain the auditing result in time, reduces the time for the user to wait for the auditing result, and improves the user experience.
In one embodiment, the audit result generation module is further configured to:
acquiring a preset auditing standard corresponding to a first user identifier; presetting an auditing standard as a preset total asset threshold corresponding to the first user identifier;
acquiring asset numerical values corresponding to asset types corresponding to the first user identification;
accumulating the asset numerical values of all asset types to obtain a total asset numerical value;
comparing the total asset value with a preset total asset threshold value;
when the total asset value is greater than or equal to the preset total asset threshold value, generating a result generated by auditing and returning the result to the user terminal; and when the total asset value is smaller than the preset total asset threshold value, generating a result of the failure of the audit and returning the result to the user terminal.
The auditing result generating module extracts asset keywords from the asset information character recognition result corresponding to the first user identifier, audits the asset keywords by using a preset auditing standard, and returns a result of successful auditing of the first user when the asset keywords meet the preset auditing standard. The method and the device realize the prior auditing of the asset information character recognition of the first user identification, can obtain the auditing result in time, reduce the time for the user to wait for the auditing result, and improve the user experience.
In one embodiment, an identity recognition-based data auditing apparatus is provided, which further includes a second user auditing module, configured to:
when the behavior data do not pass the data audit, obtaining a corresponding second user; pushing a second user identifier corresponding to a second user to a second queue in the queuing system; when the polling queuing system does not acquire the first user identifier, acquiring a second user identifier from a second queue; and auditing the asset character recognition result corresponding to the second user identification by using a preset auditing standard, and returning an auditing result.
According to the data auditing device based on identity recognition, when the first user identification is not obtained, the second user identification at the front position is obtained from the queuing system, and the asset information character recognition result corresponding to the second user identification is audited by using the preset auditing standard to obtain the corresponding auditing result. Due to the fact that the first user is preferentially checked relative to the second user, the use experience of the first user is improved, and more first users are attracted.
In one embodiment, the detection module is further to:
acquiring an identity certificate image file and an asset certificate image file uploaded by a user; extracting character recognition information from the identity certificate image file and the asset certificate image file to obtain an identity character recognition result and an asset character recognition result; acquiring pre-stored user identity information; and comparing the identification result of the identity character with the pre-stored user identity information.
The acquisition module realizes automatic verification of the user identity information, avoids manual offline verification, and improves the accuracy and verification speed of identity information verification.
For specific limitations of the data auditing device based on identification, reference may be made to the above limitations of the data auditing method based on identification, which are not described herein again. All or part of each module in the data auditing device based on identification can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 4. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing data audit data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a data auditing method based on identification.
Those skilled in the art will appreciate that the architecture shown in fig. 4 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory storing a computer program and a processor implementing the steps of the above-described method embodiments when the processor executes the computer program.
In an embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, carries out the steps of the respective method embodiment as described above.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A data auditing method based on identity recognition, the method comprising:
when a data auditing request sent by a user is detected, acquiring an identity character recognition result and an asset character recognition result corresponding to a user identifier, and comparing the identity character recognition result with pre-stored user identity information;
when the identification character recognition result accords with the pre-stored user identification information, extracting behavior historical data corresponding to the user identification;
classifying the behavior history data according to a preset data classification rule to obtain behavior history data of different data types; the data types include numeric data, textual data, and byte data;
determining a data auditing mode corresponding to the behavior historical data of each different data type; the data auditing modes comprise a first auditing mode corresponding to digital behavior historical data, a second auditing mode corresponding to text behavior historical data and a third auditing mode corresponding to byte behavior historical data;
according to the auditing mode, respectively auditing the behavior historical data of the corresponding data types;
when the behavior history data passes the data audit, acquiring a first user identifier corresponding to the behavior history data, and pushing the first user identifier to a priority queue in a queuing system;
polling the queuing system, and acquiring the first user identifier from the priority queue;
and performing asset data audit on the asset character recognition result corresponding to the first user identifier, generating an audit result and returning the audit result to the user terminal.
2. The method of claim 1, wherein performing asset data audit on the asset character recognition result corresponding to the first user identifier, generating an audit result and returning the audit result to the user terminal comprises:
analyzing an asset information character recognition result corresponding to the first user identification, and extracting asset keywords from the asset information character recognition result; the asset keyword comprises an asset type corresponding to the first user identification;
acquiring a preset auditing standard, and comparing the asset keywords with the preset auditing standard;
and when the asset key character meets the preset auditing standard, returning a result of successful auditing of the first user.
3. The method of claim 1, wherein the performing asset data audit on the asset character recognition result corresponding to the first user identifier, generating an audit result and returning the audit result to the user terminal further comprises:
acquiring the preset auditing standard corresponding to the first user identification; the preset auditing standard is a preset total asset threshold corresponding to the first user identifier;
acquiring the asset numerical value size corresponding to each asset type corresponding to the first user identification;
accumulating the asset numerical value of each asset type to obtain a total asset numerical value;
comparing the total asset value with the preset total asset threshold value;
when the total asset numerical value is greater than or equal to the preset total asset threshold value, generating a result generated by auditing and returning the result to the user terminal; and when the total asset numerical value is smaller than the preset total asset threshold value, generating a result of the failure of the audit and returning the result to the user terminal.
4. A method according to any one of claims 1 to 3, wherein the user identity further comprises a second user identity; the method further comprises the following steps:
when the behavior data does not pass the data audit, obtaining a corresponding second user;
pushing a second user identifier corresponding to the second user to a common queue in the queuing system;
when the queuing system is polled to not acquire the first user identification, acquiring the second user identification from the common queue;
and performing asset data audit on the asset character recognition result corresponding to the second user identification by using the preset audit standard, generating an audit result and returning the audit result to the user terminal.
5. The method according to any one of claims 1 to 3, wherein when a data audit request sent by a user is detected, acquiring an identity character recognition result and an asset character recognition result corresponding to a user identifier, and comparing the identity character recognition result with pre-stored user identity information, includes:
acquiring an identity certificate image file and an asset certificate image file uploaded by a user;
extracting character recognition information from the identity certificate image file and the asset certificate image file to obtain an identity character recognition result and an asset character recognition result;
acquiring pre-stored user identity information;
and comparing the identification result of the identity character with the pre-stored user identity information.
6. The method according to any one of claims 1 to 3, wherein when the identification character recognition result matches the pre-stored user identification information, extracting behavior history data corresponding to the user identifier includes:
when the identification character recognition result accords with the pre-stored user identification information, respectively acquiring browsing record related data, collection record related data and purchase record related data corresponding to the user identification; the browsing record related data comprises product categories browsed by a user, product values of corresponding products and browsing times; the collection record related data comprises product categories collected by the user and product values of corresponding products; the purchase record related data comprises the product category purchased by the user, the purchase times of the corresponding product, the purchase time and the product value.
7. A data auditing device based on identification, characterized in that the device comprises:
the detection module is used for acquiring an identity character recognition result and an asset character recognition result corresponding to a user identifier when a data auditing request sent by a user is detected, and comparing the identity character recognition result with pre-stored user identity information;
the behavior history data extraction module is used for extracting behavior history data corresponding to the user identification when the identification result of the identity character accords with the pre-stored user identity information;
the classification module is used for classifying the behavior historical data according to a preset data classification rule to obtain behavior historical data of different data types; the data types include numeric data, textual data, and byte data;
the data auditing mode determining module is used for determining a data auditing mode corresponding to the behavior historical data of each different data type; the data auditing modes comprise a first auditing mode corresponding to digital behavior historical data, a second auditing mode corresponding to text behavior historical data and a third auditing mode corresponding to byte behavior historical data;
the data auditing module is used for respectively auditing the behavior historical data of the corresponding data types according to the auditing mode;
the pushing module is used for acquiring a first user identifier corresponding to the behavior history data when the behavior history data passes the data audit, and pushing the first user identifier to a priority queue in a queuing system;
the polling module is used for polling the queuing system and acquiring the first user identifier from the priority queue;
and the auditing result generating module is used for performing asset data auditing on the asset character recognition result corresponding to the first user identifier, generating an auditing result and returning the auditing result to the user terminal.
8. The identification-based data auditing apparatus according to claim 7, where the auditing result generation module is further configured to:
analyzing an asset information character recognition result corresponding to the first user identification, and extracting asset keywords from the asset information character recognition result; the asset keyword comprises an asset type corresponding to the first user identification;
acquiring a preset auditing standard, and comparing the asset keywords with the preset auditing standard;
and when the asset key character meets the preset auditing standard, returning a result of successful auditing of the first user.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 6 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
CN202010099472.2A 2020-02-18 2020-02-18 Data auditing method and device based on identity recognition and computer equipment Pending CN111324802A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010099472.2A CN111324802A (en) 2020-02-18 2020-02-18 Data auditing method and device based on identity recognition and computer equipment
PCT/CN2020/106052 WO2021164205A1 (en) 2020-02-18 2020-07-31 Identity identification-based data auditing method and apparatus, and computer device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010099472.2A CN111324802A (en) 2020-02-18 2020-02-18 Data auditing method and device based on identity recognition and computer equipment

Publications (1)

Publication Number Publication Date
CN111324802A true CN111324802A (en) 2020-06-23

Family

ID=71167086

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010099472.2A Pending CN111324802A (en) 2020-02-18 2020-02-18 Data auditing method and device based on identity recognition and computer equipment

Country Status (2)

Country Link
CN (1) CN111324802A (en)
WO (1) WO2021164205A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021164205A1 (en) * 2020-02-18 2021-08-26 深圳壹账通智能科技有限公司 Identity identification-based data auditing method and apparatus, and computer device
CN113743902A (en) * 2021-09-08 2021-12-03 未鲲(上海)科技服务有限公司 Information auditing method and device based on artificial intelligence, terminal equipment and medium
CN113761854A (en) * 2021-08-27 2021-12-07 北京和利时系统工程有限公司 Method and device for realizing train control data processing

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115329156B (en) * 2022-10-14 2022-12-23 北京云成金融信息服务有限公司 Data management method and system based on historical data

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8346577B2 (en) * 2009-05-29 2013-01-01 Hyperquest, Inc. Automation of auditing claims
CA2885880C (en) * 2014-04-04 2018-07-31 Image Searcher, Inc. Image processing including object selection
CN106101138B (en) * 2016-07-29 2019-08-20 深圳市银雁金融服务有限公司 Method for processing business and device based on mobile terminal
CN106572100A (en) * 2016-10-25 2017-04-19 中国建设银行股份有限公司 Service data transfer audit method, device and system
CN108257027B (en) * 2017-06-16 2021-04-20 平安科技(深圳)有限公司 Policy data auditing method and device, computer equipment and storage medium
CN108764994A (en) * 2018-05-24 2018-11-06 深圳前海桔子信息技术有限公司 A kind of user behavior guidance method, device, server and storage medium
CN108921510A (en) * 2018-06-27 2018-11-30 中国建设银行股份有限公司 Banking remote auto checking method and system
CN109800639A (en) * 2018-12-14 2019-05-24 深圳壹账通智能科技有限公司 Insurance checking method and server based on big data
CN110648224A (en) * 2019-09-27 2020-01-03 中国工商银行股份有限公司 Method, apparatus, computer system, and medium for matching financial products
CN111324802A (en) * 2020-02-18 2020-06-23 深圳壹账通智能科技有限公司 Data auditing method and device based on identity recognition and computer equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021164205A1 (en) * 2020-02-18 2021-08-26 深圳壹账通智能科技有限公司 Identity identification-based data auditing method and apparatus, and computer device
CN113761854A (en) * 2021-08-27 2021-12-07 北京和利时系统工程有限公司 Method and device for realizing train control data processing
CN113743902A (en) * 2021-09-08 2021-12-03 未鲲(上海)科技服务有限公司 Information auditing method and device based on artificial intelligence, terminal equipment and medium

Also Published As

Publication number Publication date
WO2021164205A1 (en) 2021-08-26

Similar Documents

Publication Publication Date Title
CN108876133B (en) Risk assessment processing method, device, server and medium based on business information
CN111324802A (en) Data auditing method and device based on identity recognition and computer equipment
CN108446341B (en) Service state query method and device, computer equipment and storage medium
CN110493190B (en) Data information processing method and device, computer equipment and storage medium
US20140258169A1 (en) Method and system for automated verification of customer reviews
CN109815803B (en) Face examination risk control method and device, computer equipment and storage medium
WO2019104892A1 (en) Remote face-to-face signing agent matching method, electronic device, and computer-readable storage medium
CN110489415B (en) Data updating method and related equipment
CN110782277A (en) Resource processing method, resource processing device, computer equipment and storage medium
CN108334625B (en) User information processing method and device, computer equipment and storage medium
WO2021042747A1 (en) Invoice picture recognition and verification method and system, device, and readable storage medium
CN111310205A (en) Sensitive information detection method and device, computer equipment and storage medium
CN110766275A (en) Data verification method and device, computer equipment and storage medium
CN112651841A (en) Online business handling method and device, server and computer readable storage medium
CN110717650A (en) Receipt data processing method and device, computer equipment and storage medium
CN110636106A (en) Information pushing method and device, computer equipment and storage medium
CN111178203B (en) Signature verification method and device, computer equipment and storage medium
CN110378811B (en) Arbitration information processing method, apparatus, computer device and storage medium
CN111125748A (en) Judgment method and device for unauthorized query, computer equipment and storage medium
CN113888299A (en) Wind control decision method and device, computer equipment and storage medium
CN110533381B (en) Case jurisdiction auditing method, device, computer equipment and storage medium
CN112699646A (en) Data processing method, device, equipment and medium
CN115269437A (en) Test case recommendation method and device, computer equipment and storage medium
CN113687800A (en) File printing processing method and device, computer equipment and storage medium
CN110119496B (en) Document verification method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination