CN114418740A - Illegal currency management method and system - Google Patents

Illegal currency management method and system Download PDF

Info

Publication number
CN114418740A
CN114418740A CN202210044248.2A CN202210044248A CN114418740A CN 114418740 A CN114418740 A CN 114418740A CN 202210044248 A CN202210044248 A CN 202210044248A CN 114418740 A CN114418740 A CN 114418740A
Authority
CN
China
Prior art keywords
information
currency
violation
illegal
template
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210044248.2A
Other languages
Chinese (zh)
Inventor
唐业祎
王超
汪维
何洋
肖翔
朱炜
孙歌睿
崔建民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN202210044248.2A priority Critical patent/CN114418740A/en
Publication of CN114418740A publication Critical patent/CN114418740A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)

Abstract

The embodiment of the application provides a method and a system for illegal currency management. The method comprises the following steps: acquiring image information of illegal currency, and acquiring illegal information in the image information based on a preset content identification algorithm; the violation information is sorted according to a preset template, and is pushed to a monitoring end; and responding to the confirmation signal of the monitoring end, and uploading the violation information to the monitoring end. The invention does not need the intervention of service personnel in the whole process, automatically realizes the work of extracting, filing and reporting the illegal currency violation information, reduces the workload of the service personnel and improves the intelligence and the accuracy of the illegal currency management.

Description

Illegal currency management method and system
Technical Field
The application relates to the technical field of financial supervision, in particular to an illegal currency management method and an illegal currency management system.
Background
In the process of handling business by a bank, business personnel often receive the currency printed with illegal contents, and in order to avoid the illegal currency continuing illegal circulation, the business personnel need to recycle the illegal currency, carry out illegal currency information arrangement and record and report the illegal currency information to the highest regulatory agency. In the existing management method, business personnel are required to manually compile a violation currency statistical table and report the violation currency statistical table to a related management department and a highest supervision end, the manual operation flow increases the burden of the business personnel of a bank outlet or a background clearing and sorting point, and meanwhile, the operation efficiency is greatly limited. The work content of bank business personnel is complex, if repeated illegal currency information arrangement is needed every day, the burden of the business personnel is increased, the business processing efficiency is influenced, the probability of information arrangement errors is greatly increased, and the illegal currency information arrangement errors are caused. Aiming at the problems of low efficiency, large workload and poor accuracy of the conventional illegal currency management method, a new illegal currency management method needs to be created.
Disclosure of Invention
An object of the embodiments of the present application is to provide an illegal money management method and an illegal money management system, so as to solve at least the above problems.
In order to achieve the above object, a first aspect of the present application provides an illegal currency management method for identifying and reporting illegal information of illegal currency, including: acquiring image information of illegal currency, and acquiring illegal information in the image information based on a preset content identification algorithm; the violation information is sorted according to a preset template, and is pushed to a monitoring end; and responding to the confirmation signal of the monitoring end, and uploading the violation information to the monitoring end.
In an embodiment of the application, the preset content recognition algorithm is any one or more of an ICR recognition algorithm, an OCR recognition algorithm, and an OpenCV recognition algorithm.
In an embodiment of the present application, the violation information includes: violation text information and violation image information.
In this embodiment of the application, the acquiring violation information in the image information based on a preset content identification algorithm includes: acquiring attribute information of all text information of the illegal currency according to a preset content identification algorithm; obtaining template currency corresponding to the violation currency according to the attribute information of the text information; extracting difference information between the attribute information and the template currency; and taking the difference information as the violation information.
In an embodiment of the present application, the attribute information includes: content information and coordinate information of each of the text information and the image information.
In this embodiment of the application, the obtaining, according to the attribute information of the text information, the template currency corresponding to the violation currency includes: taking the content information and the coordinate information of each text message as comparison information, and performing matching retrieval in a preset template currency library; the template currency library is used for storing standard content information and coordinate information of various types of currency; and screening the template currency with the maximum overlapping quantity with the content information and the coordinate information of the illegal currency as the template currency corresponding to the illegal currency.
In an embodiment of the present application, the preset template includes: recording mechanism, recording date, currency type, currency version, currency classification, record serial number, violation information, currency source, and registered teller.
In an embodiment of the present application, after the violation information is pushed to a monitoring end, the method further includes: opening the violation information modification function, and recovering the modified content information of the user; and covering the violation information by the modified content information, and uploading the covered information serving as the violation information for reporting to a supervisor end.
A second aspect of the present application provides an illegal currency management system, configured to identify and report illegal information of illegal currency, including: the collection unit is used for obtaining image information of illegal money and obtaining illegal information in the image information based on a preset content recognition algorithm; the processing unit is used for sorting the violation information according to a preset template and pushing the violation information to a monitoring end; and the reporting unit is used for responding to the confirmation signal of the monitoring end and uploading the violation information to the monitoring end.
In an embodiment of the present application, the processing unit is further configured to: after the violation information is pushed to a monitoring end, opening a violation information modification function and recovering modified content information of a user; overwriting the violation information with the modified content information; the reporting unit is further configured to: and uploading the information of completing coverage to a supervisor end as violation information for reporting. The system further comprises: and the human-computer interaction unit is used for displaying the violation information and acquiring the modified content information of the user.
A third aspect of the present application provides a machine-readable storage medium having stored thereon instructions that, when executed by a processor, cause the processor to be configured to perform the above-described method of violation currency management.
A fourth aspect of the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the above-described method of illegal currency management.
Through the technical scheme, in the service handling process, when the circulating illegal currency is found, business personnel place the illegal currency under the preset image acquisition device, subsequently and automatically recognize the illegal currency and acquire and file illegal contents, and automatically upload the illegal currency to a monitoring end after the confirmation of a user is finished. The illegal currency violation information extraction, filing and reporting work is automatically realized without intervention of business personnel in the whole process, the workload of the business personnel is reduced, and the management intelligence and accuracy of the illegal currency are improved.
Additional features and advantages of embodiments of the present application will be described in detail in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the disclosure and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the embodiments of the disclosure, but are not intended to limit the embodiments of the disclosure. In the drawings:
FIG. 1 schematically illustrates a flow chart of steps of an illegal currency management method according to an embodiment of the present application;
FIG. 2 schematically illustrates a system architecture of an offending currency management system according to an embodiment of the present application;
fig. 3 schematically shows an internal structure diagram of a computer device according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it should be understood that the specific embodiments described herein are only used for illustrating and explaining the embodiments of the present application and are not used for limiting the embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that if directional indications (such as up, down, left, right, front, and back … …) are referred to in the embodiments of the present application, the directional indications are only used to explain the relative positional relationship between the components, the movement situation, and the like in a specific posture (as shown in the drawings), and if the specific posture is changed, the directional indications are changed accordingly.
In addition, if there is a description of "first", "second", etc. in the embodiments of the present application, the description of "first", "second", etc. is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present application.
In the process of handling business by a bank, business personnel often receive the currency printed with illegal contents, and in order to avoid the illegal currency continuing illegal circulation, the business personnel need to recycle the illegal currency, carry out illegal currency information arrangement and record and report the illegal currency information to the highest regulatory agency. In the existing management method, business personnel are required to manually compile a violation currency statistical table and report the violation currency statistical table to a related management department and a highest supervision end, the manual operation flow increases the burden of the business personnel of a bank outlet or a background clearing and sorting point, and meanwhile, the operation efficiency is greatly limited. The work content of bank business personnel is complex, if repeated illegal currency information arrangement is needed every day, the burden of the business personnel is increased, the business processing efficiency is influenced, the probability of information arrangement errors is greatly increased, and the illegal currency information arrangement errors are caused.
In order to avoid the situation, the invention provides a novel illegal currency management method, which is to adopt a network to scan and upload illegal currency image information in a system, collect illegal currency elements by using ICR and manpower in a system background, automatically register the illegal currency and simultaneously generate a statistical form report, thereby meeting the production operation and management requirements. The intelligent image recognition technology is used for automatically recognizing the illegal currency image information elements scanned and submitted in the foreground of the system, so that the data information extraction efficiency is improved to the maximum extent; carrying out centralized manual review on the intelligent image recognition results which have low reliability or cannot be recognized, and verifying, modifying or supplementing the data; and automatically summarizing the final result data information into a content data report. Finally, the system automatically registers the illegal currency data information and generates the illegal currency statistical report for managers to timely inquire and know the illegal currency payment and receipt condition, so that the load of staffs in the foreground is reduced, the operation timeliness is improved, and the accuracy of extracting the data information is also ensured.
FIG. 1 schematically illustrates a flow diagram of an illegal currency management method according to an embodiment of the present application. As shown in FIG. 1, in one embodiment of the present application, there is provided an illegal currency management method, comprising the steps of:
step S10: the method comprises the steps of obtaining image information of illegal currency, and obtaining illegal information in the image information based on a preset content recognition algorithm.
Specifically, in the working process of the website service personnel, as long as the suspected violation money is received, detailed examination of the violation money is not required to be directly carried out, and the suspected violation money can be directly placed under the preset acquisition module. Preferably, the acquisition module is an image scanning device of each service counter of a network point, and an original scanning device is used for image acquisition, so that the hardware cost investment can be reduced, and the system upgrading economy is improved. The collection module responds to the image information appearing in the range thereof, and directly collects the image information of the illegal money, and the personnel at the network point place the upward currency with the suspicion of violation, so that the collection unit can collect the image conveniently.
After the image information of the illegal currency is obtained, specific illegal content arrangement is needed, because the currency has very uniform standard, and as long as information which does not exist in the standard currency exists, the excessive information is illegal information. The existing violation money is mainly printed with violation texts or violation images, so that specific violation content information can be comprehensively acquired only by acquiring corresponding violation text information and image information. However, how to identify the information that does not exist in the standard currency requires to acquire the corresponding standard currency first, and then perform comparison to identify the information. For example, there is much difference information between a 10-dollar denomination currency and a 100-dollar denomination currency, and it is impossible to determine whether or not violation information exists in the current violation currency and the specific content of the violation information without performing template currency matching.
Therefore, firstly, the template currency of the current currency needs to be acquired, all text information including version information, security classification information (face value information), crown word number information and violation text information in the violation paper currency is extracted by using an ICR recognition algorithm and an OCR recognition algorithm, and then the coordinate information of the information on the violation currency is acquired respectively. Matching and searching in a preset template currency library based on the specific content information and the coordinate information; the template currency library stores standard content information and coordinate information of various types of currencies; and screening the template currency with the maximum superposition quantity with the current illegal currency content information and the coordinate information as the template currency corresponding to the current illegal currency. Except for the currency number and the illegal text or image information, the other information finds the corresponding matched template currency, so that the template currency with the most overlapped items is the template currency corresponding to the current illegal currency. After the template currency of the current violation currency is obtained, the coordinate information and the content information of the difference information are determined based on the standard information on the standard currency, the violation text interval is marked in the collected image information based on the coordinate information, and the violation text is extracted and retained.
The scheme of the invention is implanted with the artificial intelligence technology of computer deep learning on the basis of OCR. And semantic reasoning and semantic analysis are adopted, and for the characters which are not identified by the OCR, the character information of the unidentified part can be completed according to the character context statement information and by combining with a knowledge base of the semantic network of the EAI. In the semantic reasoning process, only when the variable nodes in the unrecognized character context segments are completely and successfully matched with the sentences in the semantic knowledge base, the matching result is output, and the defects of the OCR technology are overcome. OCR (Optical Character Recognition) refers to a process in which an electronic device (e.g., a scanner or a digital camera) checks a Character printed on paper, determines its shape by detecting dark and light patterns, and then translates the shape into a computer text by a Character Recognition method; the method is characterized in that characters in a paper document are converted into an image file with a black-white dot matrix in an optical mode aiming at print characters, and the characters in the image are converted into a text format through recognition software for further editing and processing by word processing software. How to debug or use auxiliary information to improve recognition accuracy is the most important issue of OCR, and the term of icr (intelligent Character recognition) is generated accordingly. The main indicators for measuring the performance of an OCR system are: the rejection rate, the false recognition rate, the recognition speed, the user interface friendliness, the product stability, the usability, the feasibility and the like. Because the printing of the currency is very standard and obvious in standard, on the premise of ensuring the accuracy of image acquisition, the conventional OCR algorithm can be used for completing illegal information acquisition, but the method is limited by the influences of the image acquisition quality of an image acquisition device, the printing definition of illegal information and the like, and preferably the illegal information is extracted through an ICR recognition algorithm.
In one embodiment, when illegal images are printed in some illegal currencies, contour recognition of each image on the illegal currency is performed based on an OpenCV recognition algorithm, image information which is not on a standard template is positioned, a frame of the image information is recognized and sketched out, and image information which is sketched by the illegal images is stored. OpenCV is a cross-platform computer vision and machine learning software library issued based on apache2.0 licensing (open source), which can run on Linux, Windows, Android, and Mac OS operating systems. The method is light and efficient, is composed of a series of C functions and a small number of C + + classes, provides interfaces of languages such as Python, Ruby, MATLAB and the like, and realizes a plurality of general algorithms in the aspects of image processing and computer vision.
Step S20: and the violation information is sorted according to a preset template, and is pushed to a monitoring end.
Specifically, after the violation information is extracted, the violation information needs to be recorded and retained, and in the existing method, the related reaction information in the paper money needs to be manually identified, manually entered and registered in a specific form document, and the paper money also needs to be centrally filed. In order to adapt to the existing supervision requirement, the identified violation information also needs to be processed into filing information, a filing template is preset according to the existing supervision requirement, and the corresponding requirement information is filled into a filing form based on the identified information. Preferably, the preset template at least comprises: recording mechanism, recording date, currency type, currency version, currency classification, record serial number, violation information, currency source and register teller. Wherein, the recording mechanism, the recording date, the record serial number, the currency source and the grade teller are automatically input by the bank system. The currency type, currency version, currency classification and violation information are automatically input by the image recognition result. Because of the possibility of foreign currency business, in order to avoid the need of currency type selection every filing, the currency type identification is directly carried out during image identification, and the currency type identification is also carried out according to template matching.
For the condition that illegal texts or images are printed with different definitions or other stained information is mistakenly identified as illegal information, after finishing the arrangement of the identification information template, the verification and check are needed to be performed, and the accuracy of the input information is ensured to be higher. Preferably, the pushing of the listing information with a plurality of recognition results is preferentially recommended, because there are cases where a plurality of recognition results are likely to have a recognition error. In order to avoid reporting error information, the information is preferentially pushed, and a modification function is opened after pushing is completed, so that a supervisor can modify the information. And the supervisor modifies the corresponding information according to the spot check structure, covers the modified information as final standard information with the original identification information, and uses the covered information as final result information.
Step S30: and responding to the confirmation signal of the monitoring end, and uploading the violation information to the monitoring end.
Specifically, after the sampling inspection is completed, the monitoring personnel triggers a reporting instruction, and the system responds to a confirmation signal of the monitoring end and automatically uploads the final version of filing information to the monitoring end so as to ensure that the illegal currency information is directly stored.
In the embodiment of the invention, the data identification and filing are automatically executed by the system, and the intervention of business personnel is not needed in the whole process, so that the workload of the business personnel is reduced, and the efficiency and the accuracy of illegal currency management are improved. The invention firstly realizes the automatic online operation process of the system aiming at the original complicated illegal currency business operation process, and lightens the workload of network personnel. By utilizing the intelligent image recognition technology, the illegal currency key element information can be automatically extracted quickly and efficiently, and the production efficiency is greatly improved. The accuracy of extracting the element information can be ensured to the maximum extent through the link setting of manual checking and manual sampling inspection. The original distributed entry processing mode of the network points is changed into centralized processing by a small number of special persons in the system, and most of contents only need to be confirmed and processed except that a small number of contents need to be modified and added, so that the personnel reusing and processing efficiency is greatly improved.
In one embodiment, as shown in fig. 2, there is provided an illegal currency management system for identifying and reporting illegal information of illegal currency, the system comprising: the collection unit is used for obtaining image information of illegal money and obtaining illegal information in the image information based on a preset content recognition algorithm; the processing unit is used for sorting the violation information according to a preset template and pushing the violation information to a monitoring end; and the reporting unit is used for responding to the confirmation signal of the monitoring end and uploading the violation information to the monitoring end.
In one embodiment, the processing unit is further configured to: after the violation information is pushed to a monitoring end, opening a violation information modification function and recovering modified content information of a user; overwriting the violation information with the modified content information; the reporting unit is further configured to: and uploading the information of completing coverage to a supervisor end as violation information for reporting. The system further comprises: and the human-computer interaction unit is used for displaying the violation information and acquiring the modified content information of the user.
The illegal currency management system comprises a processor and a memory, wherein the acquisition unit, the processing unit, the reporting unit and the like are stored in the memory as program units, and the processor executes the program modules stored in the memory to realize corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more, and the illegal currency management method is realized by adjusting the kernel parameters.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
An embodiment of the present application provides a storage medium having a program stored thereon, the program implementing the above-described illegal money management method when executed by a processor.
The embodiment of the application provides a processor, wherein the processor is used for running a program, and the program runs to execute the illegal currency management method.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 3. The computer device includes a processor a01, a network interface a02, a memory (not shown), and a database (not shown) connected by a system bus. Wherein processor a01 of the computer device is used to provide computing and control capabilities. The memory of the computer device comprises an internal memory a03 and a non-volatile storage medium a 04. The non-volatile storage medium a04 stores an operating system B01, a computer program B02, and a database (not shown in the figure). The internal memory a03 provides an environment for the operation of the operating system B01 and the computer program B02 in the nonvolatile storage medium a 04. The network interface a02 of the computer device is used for communication with an external terminal through a network connection. The computer program B02 when executed by the processor A01 implements a method of illegal currency management.
Those skilled in the art will appreciate that the architecture shown in fig. 3 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
The present application also provides a computer program product adapted to perform the above-described method of illegal money management when executed on a data processing device.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, which include both non-transitory and non-transitory, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (12)

1. An illegal currency management method is used for identifying and reporting illegal information of illegal currency, and is characterized by comprising the following steps:
acquiring image information of illegal currency, and acquiring illegal information in the image information based on a preset content identification algorithm;
the violation information is sorted according to a preset template, and is pushed to a monitoring end;
and responding to the confirmation signal of the monitoring end, and uploading the violation information to the monitoring end.
2. The method of claim 1, wherein the preset content recognition algorithm is any one or more of an ICR recognition algorithm, an OCR recognition algorithm and an OpenCV recognition algorithm.
3. The method of claim 1, wherein the violation information comprises: violation text information and violation image information.
4. The method according to claim 1, wherein the obtaining violation information in the image information based on a preset content identification algorithm comprises:
acquiring attribute information of all text information of the illegal currency according to a preset content identification algorithm;
obtaining template currency corresponding to the violation currency according to the attribute information of the text information;
extracting difference information between the attribute information and the template currency;
and taking the difference information as the violation information.
5. The method of claim 4, wherein the attribute information comprises:
content information and coordinate information of each of the text information and the image information.
6. The method according to claim 5, wherein the obtaining of the template currency corresponding to the violation currency according to the attribute information of the text information comprises:
taking the content information and the coordinate information of each text message as comparison information, and performing matching retrieval in a preset template currency library; the template currency library is used for storing standard content information and coordinate information of various types of currency;
and screening the template currency with the maximum overlapping quantity with the content information and the coordinate information of the illegal currency as the template currency corresponding to the illegal currency.
7. The method of claim 1, wherein the preset template comprises:
recording mechanism, recording date, currency type, currency version, currency classification, record serial number, violation information, currency source, and registered teller.
8. The method of claim 1, wherein after pushing the violation information to a monitoring end, the method further comprises:
opening the violation information modification function, and recovering the modified content information of the user;
and covering the violation information by the modified content information, and uploading the covered information serving as the violation information for reporting to a supervisor end.
9. An illegal currency management system for identifying and reporting illegal information of illegal currency, which is characterized by comprising:
the collection unit is used for obtaining image information of illegal money and obtaining illegal information in the image information based on a preset content recognition algorithm;
the processing unit is used for sorting the violation information according to a preset template and pushing the violation information to a monitoring end;
and the reporting unit is used for responding to the confirmation signal of the monitoring end and uploading the violation information to the monitoring end.
10. The system of claim 9, wherein the processing unit is further configured to:
after the violation information is pushed to a monitoring end, opening a violation information modification function and recovering modified content information of a user;
overwriting the violation information with the modified content information;
the reporting unit is further configured to:
and uploading the information of completing coverage to a supervisor end as violation information for reporting.
The system further comprises:
and the human-computer interaction unit is used for displaying the violation information and acquiring the modified content information of the user.
11. A machine-readable storage medium having instructions stored thereon, which when executed by a processor, cause the processor to be configured to perform the method of violation currency management of any of claims 1-8.
12. A computer program product comprising a computer program, wherein the computer program, when executed by a processor, implements the method of violation currency management of any of claims 1-8.
CN202210044248.2A 2022-01-14 2022-01-14 Illegal currency management method and system Pending CN114418740A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210044248.2A CN114418740A (en) 2022-01-14 2022-01-14 Illegal currency management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210044248.2A CN114418740A (en) 2022-01-14 2022-01-14 Illegal currency management method and system

Publications (1)

Publication Number Publication Date
CN114418740A true CN114418740A (en) 2022-04-29

Family

ID=81273018

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210044248.2A Pending CN114418740A (en) 2022-01-14 2022-01-14 Illegal currency management method and system

Country Status (1)

Country Link
CN (1) CN114418740A (en)

Similar Documents

Publication Publication Date Title
CN109887153B (en) Finance and tax processing method and system
US11455784B2 (en) System and method for classifying images of an evidence
CN112613501A (en) Information auditing classification model construction method and information auditing method
CN111428599A (en) Bill identification method, device and equipment
CN109840520A (en) A kind of invoice key message recognition methods and system
CN111353491A (en) Character direction determining method, device, equipment and storage medium
CN110909363A (en) Software third-party component vulnerability emergency response system and method based on big data
EP4244761A1 (en) Fraud detection via automated handwriting clustering
CN114511866A (en) Data auditing method, device, system, processor and machine-readable storage medium
CN110796210A (en) Method and device for identifying label information
CN115062117A (en) Method for automatically generating and classifying documents based on natural language processing technology
CN113673528B (en) Text processing method, text processing device, electronic equipment and readable storage medium
CN113469005A (en) Recognition method of bank receipt, related device and storage medium
CN113269101A (en) Bill identification method, device and equipment
CN112508000A (en) Method and equipment for generating OCR image recognition model training data
CN116798061A (en) Bill auditing and identifying method, device, terminal and storage medium
CN114418740A (en) Illegal currency management method and system
CN111104853A (en) Image information input method and device, electronic equipment and storage medium
KR102440919B1 (en) Method, Device and program for automatically labeling slide scan data
RU2739342C1 (en) Method and system for intelligent document processing
CN113343968A (en) Multi-template certificate rapid verification method, system, medium and device
Narendra et al. Chaurah: A Smart Raspberry Pi based Parking System
CN112862409A (en) Picking bill verification method and device
WO2021054850A1 (en) Method and system for intelligent document processing
CN111414889A (en) Financial statement identification method and device based on character identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination