CN111445616A - Invoice verification method and device, computer equipment and storage medium - Google Patents

Invoice verification method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN111445616A
CN111445616A CN202010125453.2A CN202010125453A CN111445616A CN 111445616 A CN111445616 A CN 111445616A CN 202010125453 A CN202010125453 A CN 202010125453A CN 111445616 A CN111445616 A CN 111445616A
Authority
CN
China
Prior art keywords
invoice
information
verification code
sequence
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010125453.2A
Other languages
Chinese (zh)
Other versions
CN111445616B (en
Inventor
王成林
范子龙
陈坤
陈建卓
陈兆文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ping An Medical Health Technology Service Co Ltd
Original Assignee
Ping An Medical and Healthcare Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Medical and Healthcare Management Co Ltd filed Critical Ping An Medical and Healthcare Management Co Ltd
Priority to CN202010125453.2A priority Critical patent/CN111445616B/en
Publication of CN111445616A publication Critical patent/CN111445616A/en
Application granted granted Critical
Publication of CN111445616B publication Critical patent/CN111445616B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0043Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using barcodes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/2008Testing patterns thereon using pre-processing, e.g. de-blurring, averaging, normalisation or rotation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/2016Testing patterns thereon using feature extraction, e.g. segmentation, edge detection or Hough-transformation

Abstract

The application relates to the technical field of information encryption, and provides an invoice verification method, an invoice verification device, computer equipment and a storage medium, wherein when the authenticity of an invoice is verified, an invoice picture is collected, a two-dimensional code in the invoice picture is identified, and a first verification code, a second verification code and a first check code are extracted; then, selecting first target information, second target information and third target information from the invoice text information to generate corresponding third verification code, fourth verification code and second verification code; respectively verifying whether the third verification code, the fourth verification code and the second check code are the same as the corresponding first verification code, second verification code and first check code; if the invoice is the same, verifying that the invoice is a real invoice; if any of the items are different, the invoice is verified to be a false invoice. The application can realize the authenticity of the automatic verification invoice, and a plurality of information needs to be verified when the invoice is verified, so that the verification accuracy is improved, and the counterfeit invoice is prevented from being verified.

Description

Invoice verification method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of information encryption technologies, and in particular, to an invoice verification method, an invoice verification apparatus, a computer device, and a storage medium.
Background
With the popularization of medical insurance participated by the whole citizen, more and more insurers can enjoy the convenience of real-time settlement of medical insurance treatment when seeing a doctor, but under the special conditions of unstable network, seeing a doctor in different places, forgetting to take cards and the like, the insurers still need to pay for themselves when seeing a doctor, and then carry an invoice and a detailed water bill of the cost during hospitalization to the medical insurance bureau for reimbursement.
However, at present, when the medical insurance bureau reimburses medical insurance, the authenticity of the invoice provided by the insurer needs to be verified, and at present, the invoice information such as the invoice number on the invoice is generally subjected to character recognition to simply verify whether the invoice is valid or not, and the information is easy to forge, so that the verification method is not accurate enough.
Disclosure of Invention
The application mainly aims to provide an invoice verification method, an invoice verification device, computer equipment and a storage medium, and aims to overcome the defect that the authenticity of an invoice is not accurately verified at present.
In order to achieve the above object, the present application provides an invoice verification method, including the following steps:
acquiring an invoice picture, and identifying invoice text information in the invoice picture; the invoice picture carries a two-dimensional code;
identifying the two-dimensional code in the invoice picture, and extracting a first verification code, a second verification code and a first check code; when the first verification code, the second verification code and the first check code are generated for an invoice, generating the invoice according to the invoice text information and a preset generation rule, and storing the invoice in a two-dimensional code of the invoice;
selecting first target information from the invoice text information, and encrypting the first target information through a first encryption algorithm to obtain a third verification code;
selecting second target information from the invoice text information, splicing the second target information and the third verification code to obtain first splicing information, and encrypting the first splicing information through a second encryption algorithm to obtain a fourth verification code;
selecting third target information from the invoice text information, and sequentially splicing the third verification code, the third target information and the fourth verification code to obtain second spliced information; encrypting the second splicing information through a third encryption algorithm to obtain a second check code;
verifying whether the third verification code is identical to the first verification code, verifying whether the fourth verification code is identical to the second verification code, and verifying whether the second verification code is identical to the first verification code;
if the invoice is the same, verifying that the invoice is a real invoice; if any of the items are different, the invoice is verified to be a false invoice.
Further, the step of selecting the first target information from the invoice text information includes:
identifying the actual picture size of the two-dimensional code in the invoice picture;
calculating the maximum data storage capacity of the two-dimensional code according to the actual picture size of the two-dimensional code;
acquiring total data storage capacity of each invoice text message, and judging whether the total data storage capacity is greater than the maximum data storage capacity;
if so, sequencing the invoice text information according to a preset sequence to obtain an invoice sequence;
sequentially selecting x pieces of invoice text information arranged in front in the invoice sequence to form a first target sequence; the total data storage capacity of the first x invoice text messages in the invoice sequence is not more than the maximum data storage capacity, and the total byte number of the first x +1 invoice text messages is more than the maximum data storage capacity;
and sequentially selecting a preset number of invoice text messages from the first target sequence as the first target information.
Further, the step of selecting second target information from the invoice text information includes:
removing the first target information from the first target sequence to form a second target sequence;
sequentially selecting a preset number of invoice text information from the second target sequence as second target information;
the step of selecting the third target information from the invoice text information comprises the following steps:
removing the second target information from the second target sequence to form a third target sequence;
and sequentially selecting a preset number of invoice text messages from the third target sequence as the third target information.
Further, the step of selecting the first target information from the invoice text information includes:
acquiring the total byte number of each invoice text message;
calculating to obtain an upper limit byte number according to the product of the total byte number of each invoice text message and a preset upper limit ratio;
sequencing the invoice text information according to a preset sequence to obtain a first sequence;
sequentially selecting n pieces of invoice text information arranged at the front in the first sequence as the first target information; the total byte number of the first n invoice character information is not more than the upper limit byte number, and the total byte number of the first n +1 invoice character information is more than the upper limit byte number.
Further, the step of selecting second target information from the invoice text information includes:
removing the first target information from the first sequence to form a second sequence;
sequentially selecting m invoice text messages arranged at the front in the second sequence as the second target information; wherein, the total byte number of the first m invoice text messages in the second sequence is not more than the upper limit byte number, and the total byte number of the first m +1 invoice text messages is more than the upper limit byte number;
the step of selecting the third target information from the invoice text information comprises the following steps:
removing the second target information from the second sequence to form a third sequence;
and taking each invoice text message in the third sequence as the third target message.
Further, the step of identifying the invoice text information in the invoice picture includes:
performing slant correction processing on the invoice picture, and converting the processed invoice picture into a black and white invoice picture;
inputting the black-and-white invoice picture into a preset text detection model to detect each character area in the black-and-white invoice picture; the text detection model is obtained by training based on a natural scene text detection model;
respectively adding a marking frame outside each character area;
identifying each mark frame based on an image identification technology, performing character identification on character contents in each mark frame through a character identification model to identify the invoice character information, and sequentially inputting the identified invoice character information into a medical insurance system.
The application also provides an invoice verification device, includes:
the collection unit is used for collecting invoice pictures and identifying invoice text information in the invoice pictures; the invoice picture carries a two-dimensional code;
the extraction unit is used for identifying the two-dimensional code in the invoice picture and extracting a first verification code, a second verification code and a first check code; when the first verification code, the second verification code and the first check code are generated for an invoice, generating the invoice according to the invoice text information and a preset generation rule, and storing the invoice in a two-dimensional code of the invoice;
the first encryption unit is used for selecting first target information from the invoice text information and encrypting the first target information through a first encryption algorithm to obtain a third verification code;
the second encryption unit is used for selecting second target information from the invoice text information, splicing the second target information with the third verification code to obtain first spliced information, and encrypting the first spliced information through a second encryption algorithm to obtain a fourth verification code;
the third encryption unit is used for selecting third target information from the invoice text information and splicing the third verification code, the third target information and the fourth verification code in sequence to obtain second spliced information; encrypting the second splicing information through a third encryption algorithm to obtain a second check code;
a first verification unit configured to verify whether the third verification code is the same as the first verification code, verify whether the fourth verification code is the same as the second verification code, and verify whether the second verification code is the same as the first verification code;
the second verification unit is used for verifying the invoice to be a real invoice if the invoice is the same; if any of the items are different, the invoice is verified to be a false invoice.
Further, the selecting, by the first encryption unit, first target information from the invoice text information specifically includes:
identifying the actual picture size of the two-dimensional code in the invoice picture;
calculating the maximum data storage capacity of the two-dimensional code according to the actual picture size of the two-dimensional code;
acquiring total data storage capacity of each invoice text message, and judging whether the total data storage capacity is greater than the maximum data storage capacity;
if so, sequencing the invoice text information according to a preset sequence to obtain an invoice sequence;
sequentially selecting x pieces of invoice text information arranged in front in the invoice sequence to form a first target sequence; the total data storage capacity of the first x invoice text messages in the invoice sequence is not more than the maximum data storage capacity, and the total byte number of the first x +1 invoice text messages is more than the maximum data storage capacity;
and sequentially selecting a preset number of invoice text messages from the first target sequence as the first target information.
Further, the second encrypting unit selects second target information from the invoice text information, and specifically includes:
removing the first target information from the first target sequence to form a second target sequence;
sequentially selecting a preset number of invoice text information from the second target sequence as second target information;
the third encryption unit selects third target information from the invoice text information, and specifically comprises:
removing the second target information from the second target sequence to form a third target sequence;
and sequentially selecting a preset number of invoice text messages from the third target sequence as the third target information.
Further, the selecting, by the first encryption unit, first target information from the invoice text information specifically includes:
acquiring the total byte number of each invoice text message;
calculating to obtain an upper limit byte number according to the product of the total byte number of each invoice text message and a preset upper limit ratio;
sequencing the invoice text information according to a preset sequence to obtain a first sequence;
sequentially selecting n pieces of invoice text information arranged at the front in the first sequence as the first target information; the total byte number of the first n invoice character information is not more than the upper limit byte number, and the total byte number of the first n +1 invoice character information is more than the upper limit byte number.
Further, the second encrypting unit selects second target information from the invoice text information, and specifically includes:
removing the first target information from the first sequence to form a second sequence;
sequentially selecting m invoice text messages arranged at the front in the second sequence as the second target information; wherein, the total byte number of the first m invoice text messages in the second sequence is not more than the upper limit byte number, and the total byte number of the first m +1 invoice text messages is more than the upper limit byte number;
the third encryption unit selects third target information from the invoice text information, and specifically comprises:
removing the second target information from the second sequence to form a third sequence;
and taking each invoice text message in the third sequence as the third target message.
Further, the collection unit identifies the invoice text information in the invoice picture, and specifically includes:
performing slant correction processing on the invoice picture, and converting the processed invoice picture into a black and white invoice picture;
inputting the black-and-white invoice picture into a preset text detection model to detect each character area in the black-and-white invoice picture; the text detection model is obtained by training based on a natural scene text detection model;
respectively adding a marking frame outside each character area;
identifying each mark frame based on an image identification technology, performing character identification on character contents in each mark frame through a character identification model to identify the invoice character information, and sequentially inputting the identified invoice character information into a medical insurance system.
The present application further provides a computer device comprising a memory and a processor, wherein the memory stores a computer program, and the processor implements the steps of any one of the above methods when executing the computer program.
The present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the method of any of the above.
According to the invoice verification method, the invoice verification device, the computer equipment and the storage medium, when the authenticity of the invoice is verified, the invoice picture is collected, the two-dimensional code in the invoice picture is identified, and the first verification code, the second verification code and the first check code are extracted; then, selecting first target information from the invoice text information, and encrypting the first target information through a first encryption algorithm to obtain a third verification code; selecting second target information from the invoice text information, splicing the second target information and the third verification code to obtain first splicing information, and encrypting the first splicing information through a second encryption algorithm to obtain a fourth verification code; selecting third target information from the invoice text information, and sequentially splicing the third verification code, the third target information and the fourth verification code to obtain second spliced information; encrypting the second splicing information through a third encryption algorithm to obtain a second check code; finally, verifying whether the third verification code is the same as the first verification code, verifying whether the fourth verification code is the same as the second verification code, and verifying whether the second verification code is the same as the first verification code; if the invoice is the same, verifying that the invoice is a real invoice; if any of the items are different, the invoice is verified to be a false invoice. The application can realize the authenticity of the automatic verification invoice, and a plurality of information needs to be verified when the invoice is verified, so that the verification accuracy is improved, and the counterfeit invoice is prevented from being verified.
Drawings
FIG. 1 is a schematic diagram illustrating steps of an invoice validation method according to an embodiment of the present application;
FIG. 2 is a block diagram of an invoice validation apparatus according to an embodiment of the present application;
fig. 3 is a block diagram illustrating a structure of a computer device according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Referring to fig. 1, an embodiment of the present application provides an invoice verification method, including the following steps:
step S1, collecting invoice pictures and identifying invoice text information in the invoice pictures; the invoice picture carries a two-dimensional code;
step S2, identifying the two-dimensional code in the invoice picture, and extracting a first verification code, a second verification code and a first check code; when the first verification code, the second verification code and the first check code are generated for an invoice, generating the invoice according to the invoice text information and a preset generation rule, and storing the invoice in a two-dimensional code of the invoice;
step S3, selecting first target information from the invoice text information, and encrypting the first target information through a first encryption algorithm to obtain a third verification code;
step S4, selecting second target information from the invoice text information, splicing the second target information with the third verification code to obtain first splicing information, and encrypting the first splicing information through a second encryption algorithm to obtain a fourth verification code;
step S5, selecting third target information from the invoice text information, and sequentially splicing the third verification code, the third target information and the fourth verification code to obtain second spliced information; encrypting the second splicing information through a third encryption algorithm to obtain a second check code;
step S6, verifying whether the third verification code is the same as the first verification code, verifying whether the fourth verification code is the same as the second verification code, and verifying whether the second verification code is the same as the first verification code;
step S7, if the invoice is the same, the invoice is verified to be a real invoice; if any of the items are different, the invoice is verified to be a false invoice.
In this embodiment, the method is applied to a scenario in which when the insurance-participating user carries the invoice to go to the medical insurance office for medical insurance reimbursement, a medical insurance system of the medical insurance office automatically verifies authenticity of the medical insurance invoice submitted by the insurance-participating user.
As described in the step S1, the medical insurance bureau acquires the invoice picture of the insurance participating user through the corresponding terminal device, and specifically, the electronic picture of the invoice can be acquired through scanning and shooting. The invoice text information is text information, and at least comprises: hospital name, patient name, date of treatment, mode of treatment, medicine, treatment project, service facilities, medical consumables and the like. In an embodiment, the identified invoice text information can be automatically input into the medical insurance system without manual input, so that the processing efficiency of the medical insurance system is improved, and the waiting time for business handling is reduced.
In order to avoid some illegal users from adopting counterfeit invoices to carry out medical insurance reimbursement, authenticity verification is required to be carried out on the invoices; therefore, as described in step S2, the two-dimensional code in the invoice picture is identified, and the two-dimensional code generally includes an invoice number, an invoice amount, an invoice identification code, and the like; in this embodiment, the two-dimensional code includes not only the information, but also a first verification code, a second verification code, and a first check code that are specific to this embodiment; the first verification code, the second verification code and the first check code are used for conveniently verifying the authenticity of the invoice; it can be understood that, when the invoice is generated, the first verification code, the second verification code and the first check code are added to the two-dimensional code. Specifically, the first verification code, the second verification code, and the first check code are generated according to the invoice text information, and the generation algorithms thereof correspond to the generation algorithms of the third verification code, the fourth verification code, and the second check code in this embodiment, respectively.
When the invoice is verified to be true or false, the two-dimensional code is scanned, and the information can be obtained from the two-dimensional code. In a real invoice, the generation process of the first verification code and the generation process of the third verification code should be consistent, the generation process of the second verification code and the generation process of the fourth verification code should be consistent, and the generation process of the first check code and the generation process of the second check code should be consistent; when a fake invoice is generated, a real invoice cannot be generated because the generation rule cannot be known.
As described in the above steps S3-S5, a plurality of invoice text messages are selected from the identified invoice text messages as first target information, and the first target information is encrypted by the first encryption algorithm to obtain a third verification code; the type of the first encryption algorithm may not be required, and need only be the same as the encryption algorithm used by the invoice in generating the first verification code. When the adopted encryption algorithms are the same and the selected first target information is the same, the generated verification codes are also the same; therefore, if the third verification code is different from the first verification code, the invoice can be indicated as a false invoice.
In order to further increase the difficulty of forging the invoice, the second verification code is further generated when the invoice is generated; when the invoice is verified, a plurality of invoice text messages are continuously selected from the invoice text messages to serve as second target messages, the second target messages are spliced with the third verification codes to obtain first spliced messages, and meanwhile, the first spliced messages are encrypted through a second encryption algorithm to obtain fourth verification codes. The second target information may be the same as or different from the first target information. In this embodiment, there is no requirement for the type of the second encryption algorithm, and it is only necessary to be the same as the encryption algorithm used by the invoice when the second verification code is generated. When the fourth verification code is generated, not only the second target information selected from the invoice text information is encrypted, but also the fourth verification code is generated by combining the generated third verification code, namely when the third verification code is incorrect, the fourth verification code is also abnormal generally; therefore, multiple verification is carried out, the rings are buckled, the anti-counterfeiting performance of the invoice is greatly enhanced, and the reliability is obviously improved.
Since the information included in the invoice text information includes public information such as hospital names and treatment methods, when different invoices are generated, if the selected first target information and the selected second target information are the same, the generated first verification code and the second verification code may also be the same, and different invoices cannot be distinguished through the first verification code and the second verification code. Therefore, in order to avoid the situation, a check code can be generated when the invoice is generated, and the check code is not only used for verifying the authenticity of the invoice, but also used for distinguishing the invoice. The second check code generated when the invoice is verified is the same as the first check code generated when the invoice is generated.
Specifically, third target information is selected from the invoice text information, and the third target information is distinguishing information in each invoice, such as invoice text information of patient names, invoice numbers and the like. Splicing the third verification code, the third target information and the fourth verification code in sequence to obtain second splicing information; encrypting the second splicing information through a third encryption algorithm to obtain a second check code; since the third target information is completely different each time, the second check codes generated based on the third verification code, the third target information and the fourth verification code each time are necessarily different, and thus, the third target information can be used as the differentiation of each invoice.
Meanwhile, the fourth verification code is generated based on the third verification code, the third target information and the fourth verification code, and if the generation rules of the third verification code and the fourth verification code are incorrect and cause that the third verification code and the second verification code are different from the corresponding first verification code and second verification code, the second verification code and the first verification code are different inevitably, so that the invoice is failed to be verified and is identified as a counterfeit invoice.
Verifying whether the third verification code is identical to the first verification code, verifying whether the fourth verification code is identical to the second verification code, and verifying whether the second verification code is identical to the first verification code, as described in the above steps S6-S7; if the first verification code, the second verification code and the first check code added in the invoice are all generated regularly; verifying the invoice to be a true invoice; if any one of the items is different, the generation rule is incorrect, and the invoice can be counterfeited, so that the invoice is verified to be a false invoice. By the method, the authenticity of the invoice can be automatically verified, and the verification code generation mode and the check code generation mode which are linked are adopted, so that the anti-counterfeiting performance of the invoice is higher, the invoice is prevented from being counterfeited, the counterfeit invoice is prevented from being fraudulently protected, and the safety of the invoice is improved.
In an embodiment, in the step S3, the step of extracting the first target information from the invoice text information includes:
step S31, identifying the actual picture size of the two-dimensional code in the invoice picture;
step S32, calculating the maximum data storage capacity of the two-dimensional code according to the actual picture size of the two-dimensional code;
step S33, acquiring total data storage of each invoice text message, and determining whether the total data storage is greater than the maximum data storage;
step S34, if yes, sorting the invoice text information according to a preset sequence to obtain an invoice sequence;
step S35, sequentially selecting x pieces of invoice text information arranged at the front in the invoice sequence to form a first target sequence; the total data storage capacity of the first x invoice text messages in the invoice sequence is not more than the maximum data storage capacity, and the total byte number of the first x +1 invoice text messages is more than the maximum data storage capacity;
step S36, sequentially selecting a preset number of invoice text messages from the first target sequence as the first target information.
It should be understood that, when the invoice is generated, a plurality of first target information is selected from the text information of each invoice in the same manner as described above, and a corresponding first verification code is generated based on the first target information. And if the first verification code is different from the third verification code generated based on the first target information during invoice verification, the invoice generation rule is wrong, and the invoice is determined to be a false invoice.
In this embodiment, the maximum data storage amount that the invoice two-dimensional code can store is limited by the size of the two-dimensional code, and the larger the size of the two-dimensional code is, the larger the data amount stored in the invoice two-dimensional code is; and obtaining the actual picture size of the two-dimensional code in the invoice picture, and calculating to obtain the maximum data storage capacity of the two-dimensional code according to the actual picture size, wherein the maximum data storage capacity generally takes bytes as a unit.
Acquiring total data storage capacity of each invoice text message, judging whether the total data storage capacity is greater than the maximum data storage capacity, and if so, indicating that the invoice text messages included in the invoice picture cannot be completely added into the two-dimensional code; at this time, a part of the invoice text information needs to be selected. Specifically, sequencing the invoice text information according to a preset sequence to obtain an invoice sequence; for example, the invoice text information is sequenced according to the hospital name, the treatment date, the treatment mode, the patient name and the medicine detail sequence to obtain an invoice sequence; then, first x pieces of invoice text information are selected from the invoice sequence obtained through sequencing to form a first target sequence, the total data storage amount of the first x pieces of invoice text information in the invoice sequence is not more than the maximum data storage amount, and the total byte number of the first x +1 pieces of invoice text information is more than the maximum data storage amount; the selected invoice text information can be added into the two-dimensional code, and meanwhile, the total data storage capacity of the selected invoice text information is close to the maximum data storage capacity of the two-dimensional code.
In this embodiment, the step of selecting the second target information from the invoice text information includes:
removing the first target information from the first target sequence to form a second target sequence;
sequentially selecting a preset number of invoice text information from the second target sequence as second target information;
the step of selecting the third target information from the invoice text information comprises the following steps:
removing the second target information from the second target sequence to form a third target sequence;
and sequentially selecting a preset number of invoice text messages from the third target sequence as the third target information.
In this embodiment, since the total data storage amount of the invoice text information in the first target sequence is not greater than the maximum data storage amount, all of the first target information, the second target information, and the third target information may be selected from the first target sequence, where all of the first target information, the second target information, and the third target information are different; and the preset number of the invoice text information included in the first target information, the second target information and the third target information can be the same or different.
In another embodiment, in the step S3, the step of extracting the first target information from the invoice text information includes:
step S301, acquiring the total byte number of each invoice text message;
step S302, calculating to obtain an upper limit byte number according to the product of the total byte number of each invoice text message and a preset upper limit ratio;
step S303, sequencing the invoice text information according to a preset sequence to obtain a first sequence;
step S304, sequentially selecting n invoice text messages arranged at the front in the first sequence as the first target information; the total byte number of the first n invoice character information is not more than the upper limit byte number, and the total byte number of the first n +1 invoice character information is more than the upper limit byte number.
In this embodiment, the method is mainly used for selecting a part of information from each invoice text information carried in the invoice picture as the first target information. Specifically, the total number of bytes of each invoice text message, that is, the total number of bytes included in the text of all invoice text messages, is obtained; an upper limit ratio (for example, 0.3, which is used to limit the total number of bytes of the first target information and is smaller than 1) is preset, and the maximum number of bytes of the first target information, that is, the upper limit number of bytes, is obtained by multiplying the upper limit ratio by the total number of bytes of each invoice text information.
Further, sequencing the invoice text information according to a preset sequence to obtain a first sequence; for example, the invoice text information is sequenced according to the sequence of hospital name, clinic date, clinic method, patient name and medicine detail to obtain a first sequence; then, selecting the first n pieces of invoice text information from the first sequence obtained by sequencing as the first target information, wherein the total data storage capacity of the first n pieces of invoice text information is not more than the upper limit byte number, and the total byte number of the first n +1 pieces of invoice text information is more than the upper limit byte number; so that the total byte number of the invoice character information selected in sequence is closest to the upper limit byte number. It can be understood that, when the invoice is generated, the order of the text information of the invoice should be consistent with the verification process, and the preset upper limit ratio should also be kept unchanged; therefore, the first target information selected in the invoice verification process can be ensured to be the same as the first target information selected in the invoice generation process, and the first verification code is enabled to be the same as the third verification code; if the first verification code is different from the third verification code, the invoice is judged to be a false invoice if the invoice is wrong in the generation process.
In this embodiment, the step of selecting the second target information from the invoice text information includes:
removing the first target information from the first sequence to form a second sequence;
sequentially selecting m invoice text messages arranged at the front in the second sequence as the second target information; wherein, the total byte number of the first m invoice text messages in the second sequence is not more than the upper limit byte number, and the total byte number of the first m +1 invoice text messages is more than the upper limit byte number;
the step of selecting the third target information from the invoice text information comprises the following steps:
removing the second target information from the second sequence to form a third sequence;
and taking each invoice text message in the third sequence as the third target message.
In an embodiment, the step S1 of identifying the invoice text information in the invoice picture includes:
step S101, performing inclination correction processing on the invoice picture, and converting the processed invoice picture into a black and white invoice picture; inclination correction processing is carried out, so that invoice text information in the invoice picture can not incline, and subsequent text recognition is facilitated; the processed invoice picture is converted into a black and white invoice picture, so that the subsequent processing calculation amount of the image is reduced conveniently, and the processing speed is increased; and after the invoice picture is converted into the black and white picture, the mark frame can be more prominent by adding the mark frame on the picture, so that the follow-up identification is facilitated.
Step S102, inputting the black and white invoice picture into a preset text detection model so as to detect each character area in the black and white invoice picture; the text detection model is obtained by training based on a natural scene text detection model;
step S103, adding a marking frame outside each character area respectively;
and S104, identifying each mark frame based on an image identification technology, performing character identification on character contents in each mark frame through a character identification model to identify the invoice character information, and sequentially inputting the identified invoice character information into a medical insurance system.
In this embodiment, the text detection model is obtained by pre-training and is obtained by training based on a natural scene text detection model; the file detection model is used for detecting the position of the text in the invoice picture of the user, namely detecting which region in the invoice picture has the text, and detecting the region as a text region so as to perform text recognition on the text region in the following.
Specifically, the training process of the text detection model comprises the steps of collecting a large number of invoice pictures of medical institutions, recording characteristic information on the invoice pictures, wherein the characteristic information at least comprises character information such as hospital names, patient names, treatment dates and treatment modes and position information of the characters in the invoice pictures, and conducting model training on the invoice pictures by adopting a natural scene text detection model based on deep learning to obtain the text detection model, wherein the natural scene text detection model comprises models such as FasterRCNN, CTPN and Seg L ink.
After each character area in the invoice picture is detected through the text detection model, a mark frame is added to each character area, so that each character area is highlighted conveniently; then, image recognition is carried out on each mark frame, and character recognition is carried out on character areas in each mark frame by adopting a character recognition model (such as an OCR recognition model) so as to obtain corresponding invoice character information; and finally, the identified invoice text information is automatically input into the medical insurance system without manual input, so that the processing efficiency of the medical insurance system is improved, and the waiting time for business handling is reduced.
Referring to fig. 2, an embodiment of the present application further provides an invoice verification apparatus, including:
the collection unit is used for collecting invoice pictures and identifying invoice text information in the invoice pictures; the invoice picture carries a two-dimensional code;
the extraction unit is used for identifying the two-dimensional code in the invoice picture and extracting a first verification code, a second verification code and a first check code; when the first verification code, the second verification code and the first check code are generated for an invoice, generating the invoice according to the invoice text information and a preset generation rule, and storing the invoice in a two-dimensional code of the invoice;
the first encryption unit is used for selecting first target information from the invoice text information and encrypting the first target information through a first encryption algorithm to obtain a third verification code;
the second encryption unit is used for selecting second target information from the invoice text information, splicing the second target information with the third verification code to obtain first spliced information, and encrypting the first spliced information through a second encryption algorithm to obtain a fourth verification code;
the third encryption unit is used for selecting third target information from the invoice text information and splicing the third verification code, the third target information and the fourth verification code in sequence to obtain second spliced information; encrypting the second splicing information through a third encryption algorithm to obtain a second check code;
a first verification unit configured to verify whether the third verification code is the same as the first verification code, verify whether the fourth verification code is the same as the second verification code, and verify whether the second verification code is the same as the first verification code;
the second verification unit is used for verifying the invoice to be a real invoice if the invoice is the same; if any of the items are different, the invoice is verified to be a false invoice.
Further, the selecting, by the first encryption unit, first target information from the invoice text information specifically includes:
identifying the actual picture size of the two-dimensional code in the invoice picture;
calculating the maximum data storage capacity of the two-dimensional code according to the actual picture size of the two-dimensional code;
acquiring total data storage capacity of each invoice text message, and judging whether the total data storage capacity is greater than the maximum data storage capacity;
if so, sequencing the invoice text information according to a preset sequence to obtain an invoice sequence;
sequentially selecting x pieces of invoice text information arranged in front in the invoice sequence to form a first target sequence; the total data storage capacity of the first x invoice text messages in the invoice sequence is not more than the maximum data storage capacity, and the total byte number of the first x +1 invoice text messages is more than the maximum data storage capacity;
and sequentially selecting a preset number of invoice text messages from the first target sequence as the first target information.
In an embodiment, the selecting, by the second encryption unit, second target information from the invoice text information specifically includes:
removing the first target information from the first target sequence to form a second target sequence;
sequentially selecting a preset number of invoice text information from the second target sequence as second target information;
the third encryption unit selects third target information from the invoice text information, and specifically comprises:
removing the second target information from the second target sequence to form a third target sequence;
and sequentially selecting a preset number of invoice text messages from the third target sequence as the third target information.
In an embodiment, the selecting, by the first encryption unit, first target information from the invoice text information specifically includes:
acquiring the total byte number of each invoice text message;
calculating to obtain an upper limit byte number according to the product of the total byte number of each invoice text message and a preset upper limit ratio;
sequencing the invoice text information according to a preset sequence to obtain a first sequence;
sequentially selecting n pieces of invoice text information arranged at the front in the first sequence as the first target information; the total byte number of the first n invoice character information is not more than the upper limit byte number, and the total byte number of the first n +1 invoice character information is more than the upper limit byte number.
In an embodiment, the selecting, by the second encryption unit, second target information from the invoice text information specifically includes:
removing the first target information from the first sequence to form a second sequence;
sequentially selecting m invoice text messages arranged at the front in the second sequence as the second target information; wherein, the total byte number of the first m invoice text messages in the second sequence is not more than the upper limit byte number, and the total byte number of the first m +1 invoice text messages is more than the upper limit byte number;
the third encryption unit selects third target information from the invoice text information, and specifically comprises:
removing the second target information from the second sequence to form a third sequence;
and taking each invoice text message in the third sequence as the third target message.
In an embodiment, the identifying, by the acquiring unit, the invoice text information in the invoice picture specifically includes:
performing slant correction processing on the invoice picture, and converting the processed invoice picture into a black and white invoice picture;
inputting the black-and-white invoice picture into a preset text detection model to detect each character area in the black-and-white invoice picture; the text detection model is obtained by training based on a natural scene text detection model;
respectively adding a marking frame outside each character area;
identifying each mark frame based on an image identification technology, performing character identification on character contents in each mark frame through a character identification model to identify the invoice character information, and sequentially inputting the identified invoice character information into a medical insurance system.
In this embodiment, please refer to corresponding parts in the above method embodiments for specific implementation of the above units/modules, which are not described herein again.
Referring to fig. 3, a computer device, which may be a server and whose internal structure may be as shown in fig. 3, is also provided in the embodiment of the present application. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer designed processor is used to provide computational and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing invoice data, encryption algorithms and the like. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program when executed by a processor implements a method of invoice validation.
Those skilled in the art will appreciate that the architecture shown in fig. 3 is only a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects may be applied.
An embodiment of the present application also provides a computer-readable storage medium having a computer program stored thereon, which, when executed by a processor, implements an invoice verification method. It is to be understood that the computer-readable storage medium in the present embodiment may be a volatile-readable storage medium or a non-volatile-readable storage medium.
In summary, according to the invoice verification method, the invoice verification device, the computer device and the storage medium provided in the embodiment of the present application, when verifying the authenticity of an invoice, an invoice picture is acquired, a two-dimensional code in the invoice picture is identified, and a first verification code, a second verification code and a first check code are extracted; then, selecting first target information from the invoice text information, and encrypting the first target information through a first encryption algorithm to obtain a third verification code; selecting second target information from the invoice text information, splicing the second target information and the third verification code to obtain first splicing information, and encrypting the first splicing information through a second encryption algorithm to obtain a fourth verification code; selecting third target information from the invoice text information, and sequentially splicing the third verification code, the third target information and the fourth verification code to obtain second spliced information; encrypting the second splicing information through a third encryption algorithm to obtain a second check code; finally, verifying whether the third verification code is the same as the first verification code, verifying whether the fourth verification code is the same as the second verification code, and verifying whether the second verification code is the same as the first verification code; if the invoice is the same, verifying that the invoice is a real invoice; if any of the items are different, the invoice is verified to be a false invoice. The application can realize the authenticity of the automatic verification invoice, and a plurality of information needs to be verified when the invoice is verified, so that the verification accuracy is improved, and the counterfeit invoice is prevented from being verified.
It will be understood by those of ordinary skill in the art that all or a portion of the processes of the methods of the embodiments described above may be implemented by a computer program that may be stored on a non-volatile computer-readable storage medium, which when executed, may include the processes of the embodiments of the methods described above, wherein any reference to memory, storage, database, or other medium provided herein and used in the embodiments may include non-volatile and/or volatile memory.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
The above description is only for the preferred embodiment of the present application and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are intended to be included within the scope of the present application.

Claims (10)

1. An invoice verification method is characterized by comprising the following steps:
acquiring an invoice picture, and identifying invoice text information in the invoice picture; the invoice picture carries a two-dimensional code;
identifying the two-dimensional code in the invoice picture, and extracting a first verification code, a second verification code and a first check code; when the first verification code, the second verification code and the first check code are generated for an invoice, generating the invoice according to the invoice text information and a preset generation rule, and storing the invoice in a two-dimensional code of the invoice;
selecting first target information from the invoice text information, and encrypting the first target information through a first encryption algorithm to obtain a third verification code;
selecting second target information from the invoice text information, splicing the second target information and the third verification code to obtain first splicing information, and encrypting the first splicing information through a second encryption algorithm to obtain a fourth verification code;
selecting third target information from the invoice text information, and sequentially splicing the third verification code, the third target information and the fourth verification code to obtain second spliced information; encrypting the second splicing information through a third encryption algorithm to obtain a second check code;
verifying whether the third verification code is identical to the first verification code, verifying whether the fourth verification code is identical to the second verification code, and verifying whether the second verification code is identical to the first verification code;
if the invoice is the same, verifying that the invoice is a real invoice; if any of the items are different, the invoice is verified to be a false invoice.
2. The invoice verification method according to claim 1, wherein the step of extracting the first target information from the invoice text information comprises:
identifying the actual picture size of the two-dimensional code in the invoice picture;
calculating the maximum data storage capacity of the two-dimensional code according to the actual picture size of the two-dimensional code;
acquiring total data storage capacity of each invoice text message, and judging whether the total data storage capacity is greater than the maximum data storage capacity;
if so, sequencing the invoice text information according to a preset sequence to obtain an invoice sequence;
sequentially selecting x pieces of invoice text information arranged in front in the invoice sequence to form a first target sequence; the total data storage capacity of the first x invoice text messages in the invoice sequence is not more than the maximum data storage capacity, and the total byte number of the first x +1 invoice text messages is more than the maximum data storage capacity;
and sequentially selecting a preset number of invoice text messages from the first target sequence as the first target information.
3. The invoice verification method according to claim 2, wherein the step of extracting second target information from the invoice text information comprises:
removing the first target information from the first target sequence to form a second target sequence;
sequentially selecting a preset number of invoice text information from the second target sequence as second target information;
the step of selecting the third target information from the invoice text information comprises the following steps:
removing the second target information from the second target sequence to form a third target sequence;
and sequentially selecting a preset number of invoice text messages from the third target sequence as the third target information.
4. The invoice verification method according to claim 1, wherein the step of extracting the first target information from the invoice text information comprises:
acquiring the total byte number of each invoice text message;
calculating to obtain an upper limit byte number according to the product of the total byte number of each invoice text message and a preset upper limit ratio;
sequencing the invoice text information according to a preset sequence to obtain a first sequence;
sequentially selecting n pieces of invoice text information arranged at the front in the first sequence as the first target information; the total byte number of the first n invoice character information is not more than the upper limit byte number, and the total byte number of the first n +1 invoice character information is more than the upper limit byte number.
5. The invoice verification method according to claim 4, wherein the step of extracting second target information from the invoice text information comprises:
removing the first target information from the first sequence to form a second sequence;
sequentially selecting m invoice text messages arranged at the front in the second sequence as the second target information; wherein, the total byte number of the first m invoice text messages in the second sequence is not more than the upper limit byte number, and the total byte number of the first m +1 invoice text messages is more than the upper limit byte number;
the step of selecting the third target information from the invoice text information comprises the following steps:
removing the second target information from the second sequence to form a third sequence;
and taking each invoice text message in the third sequence as the third target message.
6. The invoice verification method according to claim 1, wherein the step of identifying invoice text information in the invoice picture comprises:
performing slant correction processing on the invoice picture, and converting the processed invoice picture into a black and white invoice picture;
inputting the black-and-white invoice picture into a preset text detection model to detect each character area in the black-and-white invoice picture; the text detection model is obtained by training based on a natural scene text detection model;
respectively adding a marking frame outside each character area;
identifying each mark frame based on an image identification technology, performing character identification on character contents in each mark frame through a character identification model to identify the invoice character information, and sequentially inputting the identified invoice character information into a medical insurance system.
7. An invoice validation device, comprising:
the collection unit is used for collecting invoice pictures and identifying invoice text information in the invoice pictures; the invoice picture carries a two-dimensional code;
the extraction unit is used for identifying the two-dimensional code in the invoice picture and extracting a first verification code, a second verification code and a first check code; when the first verification code, the second verification code and the first check code are generated for an invoice, generating the invoice according to the invoice text information and a preset generation rule, and storing the invoice in a two-dimensional code of the invoice;
the first encryption unit is used for selecting first target information from the invoice text information and encrypting the first target information through a first encryption algorithm to obtain a third verification code;
the second encryption unit is used for selecting second target information from the invoice text information, splicing the second target information with the third verification code to obtain first spliced information, and encrypting the first spliced information through a second encryption algorithm to obtain a fourth verification code;
the third encryption unit is used for selecting third target information from the invoice text information and splicing the third verification code, the third target information and the fourth verification code in sequence to obtain second spliced information; encrypting the second splicing information through a third encryption algorithm to obtain a second check code;
a first verification unit configured to verify whether the third verification code is the same as the first verification code, verify whether the fourth verification code is the same as the second verification code, and verify whether the second verification code is the same as the first verification code;
the second verification unit is used for verifying the invoice to be a real invoice if the invoice is the same; if any of the items are different, the invoice is verified to be a false invoice.
8. The invoice validation device of claim 7, wherein the first encryption unit extracts first target information from the invoice text information, and specifically comprises:
identifying the actual picture size of the two-dimensional code in the invoice picture;
calculating the maximum data storage capacity of the two-dimensional code according to the actual picture size of the two-dimensional code;
acquiring total data storage capacity of each invoice text message, and judging whether the total data storage capacity is greater than the maximum data storage capacity;
if so, sequencing the invoice text information according to a preset sequence to obtain an invoice sequence;
sequentially selecting x pieces of invoice text information arranged in front in the invoice sequence to form a first target sequence; the total data storage capacity of the first x invoice text messages in the invoice sequence is not more than the maximum data storage capacity, and the total byte number of the first x +1 invoice text messages is more than the maximum data storage capacity;
and sequentially selecting a preset number of invoice text messages from the first target sequence as the first target information.
9. A computer device comprising a memory and a processor, the memory having stored therein a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method according to any of claims 1 to 6.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
CN202010125453.2A 2020-02-27 2020-02-27 Invoice verification method and device, computer equipment and storage medium Active CN111445616B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010125453.2A CN111445616B (en) 2020-02-27 2020-02-27 Invoice verification method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010125453.2A CN111445616B (en) 2020-02-27 2020-02-27 Invoice verification method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111445616A true CN111445616A (en) 2020-07-24
CN111445616B CN111445616B (en) 2023-03-31

Family

ID=71652764

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010125453.2A Active CN111445616B (en) 2020-02-27 2020-02-27 Invoice verification method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111445616B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113704823A (en) * 2021-08-30 2021-11-26 长城计算机软件与系统有限公司 Reimbursement processing method, system, storage medium and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104282070A (en) * 2013-07-08 2015-01-14 航天信息股份有限公司 Invoice fake validation method and system
CN207074454U (en) * 2017-08-15 2018-03-06 淮阴工学院 A kind of tax reciept based on Quick Response Code issues system
CN107800819A (en) * 2017-11-17 2018-03-13 深圳市泉眼网络科技有限公司 A kind of generation method of file identification, device and server
WO2018048379A1 (en) * 2016-09-08 2018-03-15 Rodsevych Taras Fedorovych Device and method for marking and verification of the authenticity of origin of goods and protection against counterfeiting
CN109118597A (en) * 2018-08-29 2019-01-01 上海哔哩哔哩科技有限公司 Intelligent terminal, ticketing service verifying system, method and computer readable storage medium
CN109766778A (en) * 2018-12-19 2019-05-17 平安科技(深圳)有限公司 Invoice information input method, device, equipment and storage medium based on OCR technique

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104282070A (en) * 2013-07-08 2015-01-14 航天信息股份有限公司 Invoice fake validation method and system
WO2018048379A1 (en) * 2016-09-08 2018-03-15 Rodsevych Taras Fedorovych Device and method for marking and verification of the authenticity of origin of goods and protection against counterfeiting
CN207074454U (en) * 2017-08-15 2018-03-06 淮阴工学院 A kind of tax reciept based on Quick Response Code issues system
CN107800819A (en) * 2017-11-17 2018-03-13 深圳市泉眼网络科技有限公司 A kind of generation method of file identification, device and server
CN109118597A (en) * 2018-08-29 2019-01-01 上海哔哩哔哩科技有限公司 Intelligent terminal, ticketing service verifying system, method and computer readable storage medium
CN109766778A (en) * 2018-12-19 2019-05-17 平安科技(深圳)有限公司 Invoice information input method, device, equipment and storage medium based on OCR technique

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113704823A (en) * 2021-08-30 2021-11-26 长城计算机软件与系统有限公司 Reimbursement processing method, system, storage medium and electronic equipment
CN113704823B (en) * 2021-08-30 2024-03-29 新长城科技有限公司 Reimbursement processing method, reimbursement processing system, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN111445616B (en) 2023-03-31

Similar Documents

Publication Publication Date Title
US11328365B2 (en) Systems and methods for insurance fraud detection
CN110365489B (en) Business auditing method, device and storage medium
AU2017209231A1 (en) Method, system, device and readable storage medium for realizing insurance claim fraud prevention based on consistency between multiple images
CA2589947C (en) Machine character recognition verification
US20180288040A1 (en) System and Method for Biometric Authentication-Based Electronic Notary Public
CN112214739A (en) Method and device for realizing electronic signature
CN110795714A (en) Identity authentication method and device, computer equipment and storage medium
CN112580108A (en) Signature and seal integrity verification method and computer equipment
WO2023030824A1 (en) Method for detecting a forgery of an identity document
CN111445616B (en) Invoice verification method and device, computer equipment and storage medium
CN111047284A (en) Contract signing method and device and computer equipment
CN114386013A (en) Automatic student status authentication method and device, computer equipment and storage medium
CN113642639A (en) Living body detection method, living body detection device, living body detection apparatus, and storage medium
JP2008009617A (en) System, program, and method for individual biological information collation
CN116612486A (en) Risk group identification method and system based on image identification and graph calculation
EP1670236A2 (en) Image data registration and verification methods and apparatus
CN113284137B (en) Paper fold detection method, device, equipment and storage medium
CN113807256A (en) Bill data processing method and device, electronic equipment and storage medium
CN113378619B (en) Insurance business data processing method and device, electronic equipment and storage medium
CN106055693A (en) Information processing method and terminal
CN110992163A (en) Electronic signature method, device, computer equipment and storage medium
UA127687C2 (en) Signing method system and/or device
CN113837169B (en) Text data processing method, device, computer equipment and storage medium
JP6865797B2 (en) Authenticity judgment method, information processing device, and program
US20230298445A1 (en) Learning apparatus, estimation apparatus, learning method, and non-transitory storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220525

Address after: 518000 China Aviation Center 2901, No. 1018, Huafu Road, Huahang community, Huaqiang North Street, Futian District, Shenzhen, Guangdong Province

Applicant after: Shenzhen Ping An medical and Health Technology Service Co.,Ltd.

Address before: Room 12G, Block H, 666 Beijing East Road, Huangpu District, Shanghai 200000

Applicant before: PING AN MEDICAL AND HEALTHCARE MANAGEMENT Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant