CN114360085A - Method for identifying attendance cheating behaviors, service system and terminal equipment thereof - Google Patents

Method for identifying attendance cheating behaviors, service system and terminal equipment thereof Download PDF

Info

Publication number
CN114360085A
CN114360085A CN202111414789.1A CN202111414789A CN114360085A CN 114360085 A CN114360085 A CN 114360085A CN 202111414789 A CN202111414789 A CN 202111414789A CN 114360085 A CN114360085 A CN 114360085A
Authority
CN
China
Prior art keywords
card punching
target user
request message
indication information
cheating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111414789.1A
Other languages
Chinese (zh)
Inventor
刘杰
田领
徐阳
赵茹
张盼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
People's Life Insurance Co ltd
Original Assignee
People's Life Insurance Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by People's Life Insurance Co ltd filed Critical People's Life Insurance Co ltd
Priority to CN202111414789.1A priority Critical patent/CN114360085A/en
Publication of CN114360085A publication Critical patent/CN114360085A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Abstract

The embodiment of the application provides a method for identifying attendance cheating behaviors, which comprises the following steps: receiving a card punching request message sent by a target user terminal, wherein the card punching request message carries first indication information and second indication information, the first indication information is used for indicating whether the target user forges current position information, and the second indication information indicates whether the target user carries out face image acquisition through legal card punching application; and judging whether the target user has cheating behavior of attendance card punching according to the card punching request message. Therefore, the method provided by the embodiment of the application integrates anti-cheating processes such as virtual positioning detection, face recognition technology and the like to form chain type anti-counterfeiting of the card punching process, and the accuracy and the real-time performance of attendance cheating recognition are guaranteed.

Description

Method for identifying attendance cheating behaviors, service system and terminal equipment thereof
Technical Field
The application belongs to the field of information processing, and particularly relates to a method for identifying attendance cheating behaviors, a service system and terminal equipment thereof.
Background
With the development of the attendance card punching mode, more and more attendance card punching cheating behaviors also appear. For example, cheating means such as card punching, virtual positioning, program request and the like of others are common attendance cheating modes, few identification technologies such as whether the card punching time of an employee is reasonable, whether the employee arrives at the site or not, whether repeated card punching behaviors exist or not need to be analyzed, and more technical means are lacked for support.
Due to the fact that various cheating means exist in the attendance checking process, the cheating means cannot be well identified in the prior art, the identification accuracy is not high, the attendance data is not true, and the attendance situation cannot be comprehensively reflected.
Therefore, there is a need for a method for identifying an attendance cheating behavior, a service system thereof, and a terminal device thereof.
Disclosure of Invention
The embodiment of the application provides a method for identifying attendance cheating behaviors, a service system and terminal equipment thereof, and the attendance cheating behaviors can be effectively identified.
In a first aspect, a method of identifying attendance cheating activities includes: receiving a card punching request message sent by a target user terminal, wherein the card punching request message carries first indication information and second indication information, the first indication information is used for indicating whether the target user forges current position information, and the second indication information indicates whether the target user carries out face image acquisition through legal card punching application; and judging whether the target user has cheating behavior of attendance card punching according to the card punching request message.
With reference to the first aspect, in a first possible implementation manner of the first aspect, the method further includes: and receiving a face recognition collected image sent by the target user, and determining that the target user has an attendance card-punching cheating line when the similarity between the face recognition collected image and the historical face image of the target user is less than or equal to a threshold value.
With reference to the first aspect and the foregoing implementation manner of the first aspect, in a second possible implementation manner of the first aspect, the determining whether the attendance checking cheat exists according to the checking request message includes: when the first indication information indicates that the target user forges the current position information, determining that the target user has an attendance card-punching cheating behavior; when the serial number carried in the second indication information is inconsistent with the historical record serial number generated by the legal card punching application, determining that the target user has the cheating behavior of attendance card punching; and when the first indication information indicates that the target user does not forge the current position information, and the serial number carried in the second indication information is consistent with the historical record serial number generated by the legal card punching application, determining that the target user does not have the cheating behavior of attendance card punching.
With reference to the first aspect and the foregoing implementation manner, in a third possible implementation manner of the first aspect, the determining whether the attendance card-punching cheat exists according to the card-punching request message includes: and decrypting the card punching request message according to a key, determining that the card punching request message is a legal request when the key successfully decrypts the sent card punching request message, and otherwise, determining that the card punching request message is an illegal request and that the target user has a cheating behavior of attendance card punching, wherein the key is generated by the target user terminal according to a preset rule by using a token generated by the legal card punching application, and the valid period of the token is preset time.
In a second aspect, a method for identifying attendance cheating behaviors is provided, which comprises the following steps: generating a card punching request message, wherein the card punching request message carries first indication information and second indication information, the first indication information is used for indicating whether the target user forges current position information, and the second indication information indicates whether the target user carries out face image acquisition through legal card punching application; and sending the card punching request message to a service system.
With reference to the second aspect, in a first possible implementation manner of the second aspect, the generating a card punching request packet includes: determining that the target user has falsified the current location information by at least one of: detecting that a virtual positioning configuration exists in the target user terminal equipment; detecting that a virtual positioning application exists in the target user terminal equipment; and detecting that the hook function hook interface exists in the target user terminal equipment.
With reference to the second aspect and the foregoing implementation manner of the second aspect, in a second possible implementation manner of the second aspect, the generating a card punching request packet includes: generating a key by using a token generated by legal card punching application according to a preset rule, wherein the validity period of the token is preset time; and encrypting the card punching request message by using the key.
In a third aspect, a service system for identifying attendance and cheating behaviors is provided, the service system comprising: the system comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving a card punching request message sent by a target user terminal, the card punching request message carries first indication information and second indication information, the first indication information is used for indicating whether a target user forges current position information, and the second indication information indicates whether the target user carries out face image acquisition through legal card punching application; and the processing unit is used for judging whether the target user has cheating behavior of attendance card punching according to the card punching request message.
It is to be understood that the above-mentioned service system for identifying an attendance cheating action is capable of implementing the steps of the method for identifying an attendance cheating action as described in the first aspect or in any one of the first aspects.
In a fourth aspect, a terminal device is provided, including: the processing unit is used for generating a card punching request message, wherein the card punching request message carries first indication information and second indication information, the first indication information is used for indicating whether the target user forges current position information, and the second indication information indicates whether the target user carries out face image acquisition through legal card punching application; and the sending unit is used for sending the card punching request message to a service system.
It will be appreciated that the above terminal device is capable of implementing the steps of the method of identifying an attendance cheating behaviour as described in the second aspect or any one of the second aspects.
In a third aspect, an electronic device is provided, which includes a processor, a communication interface, a memory, and a communication bus; the processor, the communication interface and the memory complete mutual communication through a bus; the memory is used for storing a computer program; the processor is configured to execute the program stored in the memory to implement the steps of the method for identifying the cheating on attendance as set forth in the first aspect or any one of the first aspects.
In a fourth aspect, an electronic device is provided, which includes a processor, a communication interface, a memory, and a communication bus; the processor, the communication interface and the memory complete mutual communication through a bus; the memory is used for storing a computer program; the processor is configured to execute the program stored in the memory to implement the steps of the method for identifying the cheating on attendance as set forth in the second aspect or any one of the second aspects.
In a fifth aspect, a readable storage medium is provided, on which a program or instructions are stored, which when executed by a processor, implement the steps of the method of identifying cheating on attendance as described in the first aspect or any one of the first aspects.
In a fifth aspect, a readable storage medium is provided, on which a program or instructions are stored, which when executed by a processor implement the steps of the method of identifying cheating on attendance as described in the second aspect or any one of the second aspects.
Therefore, the method provided by the embodiment of the application integrates anti-cheating processes such as virtual positioning detection, face recognition technology and the like to form chain type anti-counterfeiting of the card punching process, and the accuracy and the real-time performance of attendance cheating recognition are guaranteed. Links and risk points existing in card punching cheating are analyzed one by one, various technical defects are supplemented, a ring-in-ring checking method is formed, multi-angle and all-around judgment is achieved, and all-covering identification is carried out on each stage of card punching.
Furthermore, the application combines the request message encryption processing to improve the safety of attendance cheating identification, integrates the anti-cheating processes such as virtual positioning detection, face recognition technology and the like, forms a chain type cheating detection protective wall and provides efficient and reliable attendance cheating identification service.
Drawings
Fig. 1 shows a schematic flow chart of a method of identifying an attendance cheating action according to an embodiment of the present application.
Fig. 2 shows a schematic flow chart of a method of identifying an attendance cheating action according to a further embodiment of the present application.
Fig. 3 shows a schematic flow chart of a method of identifying an attendance cheating action according to another embodiment of the present application.
Fig. 4 provides a schematic structural diagram of a service system for identifying the attendance cheating behavior according to an embodiment of the present application.
FIG. 5 provides a schematic structural diagram of a service system for identifying the cheating action on attendance of an embodiment of the application.
FIG. 6 provides a schematic block diagram of an electronic device according to an embodiment of the present application
Detailed Description
Technical solutions in the embodiments of the present application will be clearly described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The method for auditing medical insurance control fees provided by the embodiment of the application is described in detail through a specific embodiment and an application scenario thereof with reference to the accompanying drawings.
Fig. 1 shows a schematic flow chart of a method for identifying an attendance cheating behavior according to an embodiment of the present application, an executing subject of the method may be a service system for identifying the attendance cheating behavior, for example, a backend server or the like, as shown in fig. 1, and the method 100 includes:
step 110, receiving a card punching request message sent by a target user terminal, wherein the card punching request message carries first indication information and second indication information, the first indication information is used for indicating whether the target user forges current position information, and the second indication information indicates whether the target user carries out face image acquisition through legal card punching application;
and step 120, judging whether the target user has an attendance card-punching cheating behavior according to the card-punching request message.
Specifically, the target user refers to a user who sends an attendance card punching request, after the target user performs a card punching operation through a self-owned terminal device, the card punching request message carries the first indication information, the first indication information is used for indicating whether the target user uses virtual positioning to forge position information, the second indication information can be a serial number generated when the target user punches a card through a legal card punching application or a forged serial number, and the like, and the face identification collected image of the target user can be a face image collected when the target user legally punches the card, or a face identification collected image generated by the terminal device through a cheating means when possible.
Optionally, as an embodiment of the present application, the method further includes: and receiving a face recognition collected image sent by the target user, and determining that the target user has a cheating line of attendance card punching when the similarity between the face recognition collected image and the historical face image of the target user is less than or equal to a threshold value.
Specifically, when the similarity between the target user face recognition collected image and the target user historical face image is smaller than or equal to a threshold value, that is, by comparing the face recognition collected image carried in the request message with the target user historical face image stored in the background server, cheating data or previous historical similar data is screened by analyzing the picture characteristic value and the pixel trend, in other words, the background server can compare the face living body detection and the video image of the face with the public security department base photo, obtain an authentication identifier according to the check of the face characteristic value, and determine whether the face brushing link is cheated.
The characteristic value analysis means that a character string representing key information of a human face is formed through an algorithm by collecting coordinate positions of information points of a human face area in a picture, if the same picture is used for comparison, a characteristic value data comparison result of the picture is a fixed value, but in actual life, pictures collected by an action system each time are different and should not have completely consistent conditions, and whether comparison is carried out on the same picture selected or not can be judged according to the characteristic value comparison result, so that whether cheating exists or not is judged.
The image analysis means that when the picture is generated from legal application, a picture code value is calculated through image acquisition, and the value is generated by system operation in the process of action of a person and is associated with the generated picture and the SDK. If the generated picture is falsified (for example, the same picture is added with some background), or the picture itself is generated by illegal application, or the picture code value is randomly forged and falsified, the server cannot establish the association between the picture code value and the picture and the SDK, and the association is regarded as cheating.
Further, the service system, according to the card punching request message, determining whether the attendance card punching cheating exists, includes: when the first indication information indicates that the target user forges the current position information, determining that the target user has an attendance card-punching cheating behavior; when the serial number carried in the second indication information is inconsistent with the historical record serial number generated by the legal card punching application, determining that the target user has the cheating behavior of attendance card punching; and when the first indication information indicates that the target user does not forge the current position information, the similarity between the target user face recognition collected image and the target user historical face image is greater than the threshold value, and the serial number carried in the second indication information is consistent with the historical record serial number generated by legal card punching application, determining that the target user does not have the cheat behavior of attendance and card punching.
Specifically, when the first indication information indicates that the target user forges the current location information, that is, the first indication information informs the background server that the terminal device of the target user uses virtual positioning, it is determined that the target user has a cheating behavior of attendance and card punching.
It should be appreciated that in one case, the first indication information can indicate that the terminal device of the target user has not detected the use of virtual positioning if the information content is empty.
Specifically, when the serial number carried in the second indication information is inconsistent with the historical record serial number generated by the legal card punching application, for example, the user directly skips checking of the legal card punching application through a program request, the first indication information and the second indication information carrying the face identification serial number cannot be obtained, or even if the user fills a false serial number, the background server calls the face identification record to check whether the received serial number is valid, and judges whether the card punching skips a face swiping authentication link to determine that the target user has cheating behavior of attendance card punching.
It should be understood that in some cases, the second indication information carries a serial number generated by a legal application, in some cases, the second indication information carries a forged serial number, and in other cases, the content of the second indication information is empty, which proves that a user directly passes a program request and skips checking of a card punching of the legal application.
Optionally, as an embodiment of the present application, the determining whether the attendance cheating by card punching exists according to the card punching request message includes: and decrypting the card punching request message according to a key, determining that the card punching request message is a legal request when the key successfully decrypts the sent card punching request message, and otherwise, determining that the card punching request message is an illegal request and that the target user has a cheating behavior of attendance card punching, wherein the key is generated by the target user terminal according to a preset rule by using a token generated by the legal card punching application, and the validity period of the token is preset time.
That is, after the service system receives the card punching request message, if the encrypted request message can be decrypted successfully, the encrypted request message is judged to be a legal request, and the information content in the request message can be acquired; if the successful decryption cannot be realized during the stock-entering process, the illegal request is determined, and the cheating behavior that the user steps on attendance and card-punching can be directly judged.
Specifically, in the process of requesting data transmission, the terminal device encrypts a data message, and a key is composed of a token of a target user and a self-defined private key, for example, the token validity period is 30 minutes, the combined string "[ token first bit + last bit + second bit + penultimate second bit ] [ token third bit + penultimate third bit + fourth bit + penultimate fourth bit ] [ private key ]" and the data message are subjected to encryption operation to obtain a client token (english, shorthand: JWT) encryption string, and the background server receives the encryption string to analyze, and judges whether the data is transmitted correctly.
It should be understood that the token of each user is different, and the generation rule of the key is the same, so that the background server can obtain the key of each user request message according to the known key generation rule, the dynamic key is assembled according to the token of the card user and the private key, and the private key is changed at fixed intervals, thereby effectively avoiding illegal requests and invalid requests.
Fig. 2 shows a schematic flowchart of a method for identifying attendance cheating behaviors, an executing subject of the method may be a terminal device used by a target user for attendance checking and card punching, such as a smart phone, and as shown in fig. 2, the method 200 includes:
step 210, generating a card punching request message, wherein the card punching request message carries first indication information, second indication information and a face recognition acquisition image of the target user, the first indication information is used for indicating whether the target user forges current position information, and the second indication information is used for indicating whether the target user acquires the face image through legal card punching application;
step 220, sending the card punching request message to a service system.
Optionally, in step 210, the generating a card punching request message includes: determining that the target user has falsified the current location information by at least one of: detecting that a virtual positioning configuration exists in the target user terminal equipment; detecting that a virtual positioning application exists in the target user terminal equipment; and detecting that the hook function hook interface exists in the target user terminal equipment.
Specifically, the positioning information is data provided by the terminal operating system interface, and the positioning information of the system interface can be modified by some technical means through illegal software, which is called interface hook. The hook detection is a technical means for identifying the situation, and mainly comprises the following detection means:
1. and detecting a function call relation chain generated in the program running period to judge whether a non-system function is inserted.
2. Detecting if the system configuration during program operation turns on sensitive configuration, such as debug switch, developer mode, position simulation switch.
3. And detecting whether a system application and a user application list installed by the system exist in the blacklist or any application exists in the program running process.
4. And detecting whether a plurality of copies of the attendance checking application are simultaneously operated in the system during the operation of the program.
5. And detecting whether the name of the application directory in which the program is located accords with the naming specification of an operating system or not and whether the program has read-write permission or not during the running of the program.
Specifically, in step 210, the explanation of the second indication information is similar to the definition in the embodiment of fig. 1, and is not repeated here.
It should be understood that there are many ways for the terminal device to determine the virtual positioning, and the present application is not limited thereto.
Optionally, as an embodiment of the present application, the generating a card punching request packet includes: generating a key by using a token generated by legal card punching application according to a preset rule, wherein the validity period of the token is preset time; and encrypting the card punching request message by using the key.
Specifically, in step 210, a specific manner of encrypting the card punching request message by using the key is consistent with the description in the embodiment of fig. 1, and is not described again here.
Fig. 3 shows a schematic flow chart of a method of an embodiment of the present application. As shown in fig. 3, the method includes: step 301, clicking an attendance check-in button in the terminal equipment; step 302, the terminal equipment judges whether virtual positioning exists through virtual positioning software detection, and adds a judgment result into a card punching request message in a first indication information form; step 303, performing face recognition operation, returning to the attendance check-in page again when face recognition fails, and adding second indication information in the request message when face recognition succeeds, wherein the second indication information is a serial number or serial number generated in legal application during face recognition operation; step 304, encrypting the card punching request message, wherein the specific encryption mode is as described above and is not described herein again; step 305, the service system decrypts the received card punching request message, if the decryption is failed, the card punching cheating is determined, otherwise, step 306 is executed, whether the serial number carried in the second indication information is consistent with the history record serial number generated by the legal card punching application is judged, if not, the card punching cheating is determined, and if so, the card punching success is determined.
It should be understood that the execution subjects of the above steps 301 to 304 are terminal devices for punching cards; step 305 and step 306 are executed by a background service system for attendance checking.
Therefore, the method provided by the embodiment of the application integrates anti-cheating processes such as virtual positioning detection, face recognition technology and the like to form a means for chain anti-counterfeiting and high real-time performance of a card punching process, and ensures the accuracy of recognition. Links and risk points existing in card punching cheating are analyzed one by one, various technical defects are supplemented, a ring-in-ring checking method is formed, multi-angle and all-around judgment is achieved, and all-covering identification is carried out on each stage of card punching.
Furthermore, the application combines the request message encryption processing to improve the safety of attendance cheating identification, integrates the anti-cheating processes such as virtual positioning detection, face recognition technology and the like, forms a chain type cheating detection protective wall and provides efficient and reliable attendance cheating identification service.
Fig. 4 is a schematic structural block diagram of a service system for identifying the attendance cheating behavior according to an embodiment of the present application, where the service system may be a backend server.
As shown in fig. 4, the system 400 includes: a receiving unit 410, where the receiving unit 410 is configured to receive a card punching request message sent by a target user terminal, where the card punching request message carries first indication information, second indication information, and a face identification acquisition image of a target user, the first indication information is used to indicate whether the target user forges current location information, and the second indication information indicates whether the target user performs face image acquisition through a legal card punching application;
and the processing unit 420 is configured to determine whether the target user has cheating behavior of attendance card-punching according to the card-punching request message.
The service system for identifying the attendance cheating behaviors provided by the embodiment of the invention can realize each process in the embodiment corresponding to the method for identifying the attendance cheating behaviors, and is not repeated here for avoiding repetition.
It should be noted that the service system for identifying the cheating on duty provided in the embodiment of the present invention and the method for identifying the cheating on duty provided in the embodiment of the present invention are based on the same inventive concept, and achieve the same beneficial effects, so the specific implementation of the embodiment may refer to the implementation and beneficial effects of the foregoing method for identifying the cheating on duty, and repeated parts are not described again.
Fig. 5 is a schematic structural block diagram of a terminal device for identifying an attendance cheating behavior according to an embodiment of the present application, where the service system may be a smart phone or the like used by a target user.
As shown in fig. 5, the terminal device 500 includes:
a processing unit 510, where the processing unit 510 is configured to generate a card punching request message, where the card punching request message carries first indication information, second indication information, and a face identification acquisition image of the target user, where the first indication information is used to indicate whether the target user forges current location information, and the second indication information indicates whether the target user performs face image acquisition through legal card punching application;
a sending unit 520, where the sending unit 520 is configured to send the card punching request message to a service system.
The terminal device for identifying the cheating on duty provided by the embodiment of the invention can realize each process in the embodiment corresponding to the method for identifying the cheating on duty, and is not repeated here for avoiding repetition.
It should be noted that the terminal device for identifying the cheating on duty provided in the embodiment of the present invention and the method for identifying the cheating on duty provided in the embodiment of the present invention are based on the same inventive concept, and achieve the same beneficial effects, so the specific implementation of the embodiment may refer to the implementation and beneficial effects of the foregoing method for identifying the cheating on duty, and repeated parts are not described again.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application. Corresponding to the method for identifying the cheating on attendance provided by the above embodiment, based on the same technical concept, an embodiment of the present invention further provides an electronic device, where the electronic device is configured to execute the method for identifying the cheating on attendance, and fig. 6 is a schematic structural diagram of an electronic device implementing each embodiment of the present invention, as shown in fig. 6. Electronic devices may vary widely in configuration or performance and may include one or more processors 601 and memory 602, where one or more stored applications or data may be stored in memory 602. Wherein the memory 602 may be transient or persistent storage. The application program stored in memory 602 may include one or more modules (not shown), each of which may include a series of computer-executable instructions for the electronic device. Still further, the processor 601 may be arranged in communication with the memory 602 to execute a series of computer executable instructions in the memory 602 on the electronic device. The electronic device may also include one or more power supplies 603, one or more wired or wireless network interfaces 604, one or more input-output interfaces 605, one or more keyboards 606.
Specifically, in this embodiment, the electronic device includes a processor, a communication interface, a memory, and a communication bus; the processor, the communication interface and the memory complete mutual communication through a bus; the memory is used for storing a computer program; the processor is configured to execute the program stored in the memory, and is specifically configured to execute the method provided in the embodiments of fig. 1 to 3.
The electronic device provided by the embodiment of the invention can realize each process in the embodiment corresponding to the method for identifying the attendance cheating behaviors, and in order to avoid repetition, the description is omitted here.
It should be noted that, the electronic device provided in the embodiment of the present invention is applied to a service system or a terminal device for identifying an attendance cheating behavior, and the same beneficial effects are achieved based on the same inventive concept as the method for identifying an attendance cheating behavior provided in the embodiment of the present invention, so that reference may be made to the implementation and the beneficial effects of the foregoing method for identifying an attendance cheating behavior in the specific implementation of the embodiment, and repeated details are not repeated.
An embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the method embodiments provided in the embodiments of fig. 1 to fig. 3, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method of identifying cheating on attendance comprising:
receiving a card punching request message sent by a target user terminal, wherein the card punching request message carries first indication information and second indication information, the first indication information is used for indicating whether the target user forges current position information, and the second indication information indicates whether the target user carries out face image acquisition through legal card punching application;
and judging whether the target user has cheating behavior of attendance card punching according to the card punching request message.
2. The method of claim 1, further comprising:
and receiving a face recognition collected image sent by the target user, and determining that the target user has a cheating line of attendance card punching when the similarity between the face recognition collected image and the historical face image of the target user is less than or equal to a threshold value.
3. The identification method according to claim 1, wherein the determining whether the attendance checking cheat exists according to the checking request message comprises:
when the first indication information indicates that the target user forges the current position information, determining that the target user has a cheating behavior of attendance and card punching;
when the serial number carried in the second indication information is inconsistent with the historical record serial number generated by the legal card punching application, determining that the target user has the cheating behavior of attendance card punching;
and when the first indication information indicates that the target user does not forge the current position information, and the serial number carried in the second indication information is consistent with the historical record serial number generated by the legal card punching application, determining that the target user does not have the cheating behavior of attendance card punching.
4. The identification method according to claim 1, wherein the determining whether the attendance checking cheat exists according to the checking request message comprises:
and decrypting the card punching request message according to a secret key, determining that the card punching request message is a legal request when the secret key successfully decrypts the sent card punching request message, and otherwise, determining that the card punching request message is an illegal request and that the target user has a cheating behavior of attendance card punching, wherein the secret key is generated by the target user terminal according to a preset rule by using a token generated by legal card punching application, and the validity period of the token is preset time.
5. A method of identifying cheating on attendance comprising:
generating a card punching request message, wherein the card punching request message carries first indication information and second indication information, the first indication information is used for indicating whether the target user forges current position information, and the second indication information indicates whether the target user carries out face image acquisition through legal card punching application;
and sending the card punching request message to a service system.
6. The identification method according to claim 5, wherein the generating a card punching request message comprises:
determining that the target user has falsified the current location information by at least one of:
detecting that a virtual positioning configuration exists in the target user terminal equipment;
detecting that a virtual positioning application exists in the target user terminal equipment;
and detecting that the hook function hook interface exists in the target user terminal equipment.
7. The identification method according to claim 6, wherein the generating a card punching request message comprises:
generating a key by using a token generated by legal card punching application according to a preset rule, wherein the validity period of the token is preset time;
and encrypting the card punching request message by using the key.
8. A service system for identifying on-duty cheating acts, the service system comprising:
the system comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving a card punching request message sent by a target user terminal, the card punching request message carries first indication information and second indication information, the first indication information is used for indicating whether a target user forges current position information, and the second indication information indicates whether the target user carries out face image acquisition through legal card punching application;
and the processing unit is used for judging whether the target user has cheating behavior of attendance card punching according to the card punching request message.
9. A terminal device, comprising:
the system comprises a processing unit, a processing unit and a processing unit, wherein the processing unit is used for generating a card punching request message, the card punching request message carries first indication information and second indication information, the first indication information is used for indicating whether a target user forges current position information, and the second indication information indicates whether the target user carries out face image acquisition through legal card punching application;
and the sending unit is used for sending the card punching request message to a service system.
10. An electronic device comprising a processor, a communication interface, a memory, and a communication bus; the processor, the communication interface and the memory complete mutual communication through a bus; the memory is used for storing a computer program; the processor is configured to execute the program stored in the memory to implement the method steps for identifying cheating on duty as set forth in any one of claims 1-3, or the processor is configured to execute the program stored in the memory to implement the method steps for identifying cheating on duty as set forth in any one of claims 4-6.
CN202111414789.1A 2021-11-25 2021-11-25 Method for identifying attendance cheating behaviors, service system and terminal equipment thereof Pending CN114360085A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111414789.1A CN114360085A (en) 2021-11-25 2021-11-25 Method for identifying attendance cheating behaviors, service system and terminal equipment thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111414789.1A CN114360085A (en) 2021-11-25 2021-11-25 Method for identifying attendance cheating behaviors, service system and terminal equipment thereof

Publications (1)

Publication Number Publication Date
CN114360085A true CN114360085A (en) 2022-04-15

Family

ID=81096100

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111414789.1A Pending CN114360085A (en) 2021-11-25 2021-11-25 Method for identifying attendance cheating behaviors, service system and terminal equipment thereof

Country Status (1)

Country Link
CN (1) CN114360085A (en)

Citations (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103021038A (en) * 2012-12-03 2013-04-03 福州开普软件信息技术有限公司 Campus classroom attendance checking-in system and method for realizing attendance checking-in by using system
CN103544575A (en) * 2013-11-11 2014-01-29 北京网秦天下科技有限公司 Attendance checking method and server based on terminals
CN103679831A (en) * 2013-12-17 2014-03-26 上海斐讯数据通信技术有限公司 Hand-held terminal, attendance checking equipment, electronic attendance checking system and attendance checking method
CN104392502A (en) * 2014-11-14 2015-03-04 苏州盖雅信息技术有限公司 Two-dimensional code attendance checking system based on intelligent cell phone and application method of two-dimensional code attendance checking system based on intelligent cell phone
CN105654372A (en) * 2015-12-22 2016-06-08 深圳前海微众银行股份有限公司 Identity recognition method for remote account opening and server and system
CN105844729A (en) * 2016-05-09 2016-08-10 乐视控股(北京)有限公司 Sign-in method and device
CN107369222A (en) * 2017-07-20 2017-11-21 北京建工土木工程有限公司 Engineering staff's work attendance intelligent management and system based on GPS
CN107820210A (en) * 2017-11-14 2018-03-20 广东欧珀移动通信有限公司 One kind is registered method, mobile terminal and computer-readable recording medium
CN108171032A (en) * 2017-12-01 2018-06-15 平安科技(深圳)有限公司 A kind of identity identifying method, electronic device and computer readable storage medium
CN108346191A (en) * 2018-02-06 2018-07-31 中国平安人寿保险股份有限公司 Work attendance method, device, computer equipment and storage medium
CN109003347A (en) * 2018-07-20 2018-12-14 四川知格科技有限公司 A kind of anti-cheating movable attendance checking terminal
CN109446772A (en) * 2018-09-03 2019-03-08 平安国际融资租赁有限公司 Accrediting amount calculation method, device, computer equipment and storage medium
CN109492865A (en) * 2018-09-29 2019-03-19 中国平安人寿保险股份有限公司 Anti- check card cheat method, device, computer installation and storage medium
WO2019062620A1 (en) * 2017-09-28 2019-04-04 钉钉控股(开曼)有限公司 Attendance check method and apparatus, and attendance check device
CN109635021A (en) * 2018-10-30 2019-04-16 平安科技(深圳)有限公司 A kind of data information input method, device and equipment based on human testing
CN109726663A (en) * 2018-12-24 2019-05-07 广东德诚科教有限公司 Online testing monitoring method, device, computer equipment and storage medium
CN109788440A (en) * 2019-01-14 2019-05-21 北京纷扬科技有限责任公司 It registers anti-cheating method, device, system, equipment and storage medium
CN110297919A (en) * 2019-05-23 2019-10-01 深圳壹账通智能科技有限公司 A kind of data cleaning method, device, equipment and storage medium
CN110300400A (en) * 2019-07-24 2019-10-01 北京顺丰同城科技有限公司 One kind is registered method, apparatus, electronic equipment and storage medium
CN110443016A (en) * 2019-07-04 2019-11-12 深圳壹账通智能科技有限公司 Information leakage preventing method, electronic device and storage medium
CN111079140A (en) * 2018-10-18 2020-04-28 中国人寿保险股份有限公司 Method, device and system for preventing cheating
CN111127830A (en) * 2018-11-01 2020-05-08 奇酷互联网络科技(深圳)有限公司 Alarm method, alarm system and readable storage medium based on monitoring equipment
CN111612443A (en) * 2020-04-30 2020-09-01 沈阳数云科技有限公司 Accumulation fund service handling method, system, equipment and readable storage medium
CN111968261A (en) * 2020-07-07 2020-11-20 咪咕文化科技有限公司 Electronic sign-in method, device, equipment and storage medium
CN112989922A (en) * 2021-01-07 2021-06-18 腾讯科技(深圳)有限公司 Face recognition method, device, equipment and storage medium based on artificial intelligence

Patent Citations (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103021038A (en) * 2012-12-03 2013-04-03 福州开普软件信息技术有限公司 Campus classroom attendance checking-in system and method for realizing attendance checking-in by using system
CN103544575A (en) * 2013-11-11 2014-01-29 北京网秦天下科技有限公司 Attendance checking method and server based on terminals
CN103679831A (en) * 2013-12-17 2014-03-26 上海斐讯数据通信技术有限公司 Hand-held terminal, attendance checking equipment, electronic attendance checking system and attendance checking method
CN104392502A (en) * 2014-11-14 2015-03-04 苏州盖雅信息技术有限公司 Two-dimensional code attendance checking system based on intelligent cell phone and application method of two-dimensional code attendance checking system based on intelligent cell phone
CN105654372A (en) * 2015-12-22 2016-06-08 深圳前海微众银行股份有限公司 Identity recognition method for remote account opening and server and system
CN105844729A (en) * 2016-05-09 2016-08-10 乐视控股(北京)有限公司 Sign-in method and device
CN107369222A (en) * 2017-07-20 2017-11-21 北京建工土木工程有限公司 Engineering staff's work attendance intelligent management and system based on GPS
WO2019062620A1 (en) * 2017-09-28 2019-04-04 钉钉控股(开曼)有限公司 Attendance check method and apparatus, and attendance check device
CN107820210A (en) * 2017-11-14 2018-03-20 广东欧珀移动通信有限公司 One kind is registered method, mobile terminal and computer-readable recording medium
CN108171032A (en) * 2017-12-01 2018-06-15 平安科技(深圳)有限公司 A kind of identity identifying method, electronic device and computer readable storage medium
CN108346191A (en) * 2018-02-06 2018-07-31 中国平安人寿保险股份有限公司 Work attendance method, device, computer equipment and storage medium
CN109003347A (en) * 2018-07-20 2018-12-14 四川知格科技有限公司 A kind of anti-cheating movable attendance checking terminal
CN109446772A (en) * 2018-09-03 2019-03-08 平安国际融资租赁有限公司 Accrediting amount calculation method, device, computer equipment and storage medium
CN109492865A (en) * 2018-09-29 2019-03-19 中国平安人寿保险股份有限公司 Anti- check card cheat method, device, computer installation and storage medium
CN111079140A (en) * 2018-10-18 2020-04-28 中国人寿保险股份有限公司 Method, device and system for preventing cheating
CN109635021A (en) * 2018-10-30 2019-04-16 平安科技(深圳)有限公司 A kind of data information input method, device and equipment based on human testing
CN111127830A (en) * 2018-11-01 2020-05-08 奇酷互联网络科技(深圳)有限公司 Alarm method, alarm system and readable storage medium based on monitoring equipment
CN109726663A (en) * 2018-12-24 2019-05-07 广东德诚科教有限公司 Online testing monitoring method, device, computer equipment and storage medium
CN109788440A (en) * 2019-01-14 2019-05-21 北京纷扬科技有限责任公司 It registers anti-cheating method, device, system, equipment and storage medium
CN110297919A (en) * 2019-05-23 2019-10-01 深圳壹账通智能科技有限公司 A kind of data cleaning method, device, equipment and storage medium
CN110443016A (en) * 2019-07-04 2019-11-12 深圳壹账通智能科技有限公司 Information leakage preventing method, electronic device and storage medium
CN110300400A (en) * 2019-07-24 2019-10-01 北京顺丰同城科技有限公司 One kind is registered method, apparatus, electronic equipment and storage medium
CN111612443A (en) * 2020-04-30 2020-09-01 沈阳数云科技有限公司 Accumulation fund service handling method, system, equipment and readable storage medium
CN111968261A (en) * 2020-07-07 2020-11-20 咪咕文化科技有限公司 Electronic sign-in method, device, equipment and storage medium
CN112989922A (en) * 2021-01-07 2021-06-18 腾讯科技(深圳)有限公司 Face recognition method, device, equipment and storage medium based on artificial intelligence

Similar Documents

Publication Publication Date Title
CN108985081B (en) Watermark encryption method, device, medium and electronic equipment
US10587604B2 (en) Device verification method and apparatus
CN112019332B (en) Encryption and decryption method based on micro-service, API gateway system and equipment
CN110086608A (en) User authen method, device, computer equipment and computer readable storage medium
CN108073821B (en) Data security processing method and device
CN111767578B (en) Data inspection method, device and equipment
CN113656780A (en) Cross-link access control method and device
CN114091103A (en) Method for training federated learning model, method for calling federated learning model and federated learning system
CN111259382A (en) Malicious behavior identification method, device and system and storage medium
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN108985409B (en) Identity card information reading method and device and electronic equipment
CN113901520A (en) Data processing method, device, equipment and medium based on block chain
CN113792307A (en) Seal management method and device and electronic equipment
CN107133517B (en) Data recovery method based on data encryption and calculation in memory
CN111222181B (en) AI model supervision method, system, server and storage medium
CN113709513B (en) Equipment fingerprint processing method, user side, server, system and storage medium
CN108765615B (en) Block chain-based card punching information storage method and system
CN114360085A (en) Method for identifying attendance cheating behaviors, service system and terminal equipment thereof
CN114428955A (en) Method and system for judging abnormal risk based on operation information and electronic equipment
CN111582954A (en) False data identification method and device
CN112464203A (en) Data format detection method based on intelligent password key application interface and electronic equipment
CN110717078A (en) Beauty shop business data monitoring method, device, equipment and medium
CN113990429B (en) Electronic medical record data protection method and device
CN112910883B (en) Data transmission method and device and electronic equipment
CN117499159B (en) Block chain-based data transaction method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination