CN115497045A - Target object checking method, device, equipment and storage medium - Google Patents

Target object checking method, device, equipment and storage medium Download PDF

Info

Publication number
CN115497045A
CN115497045A CN202211161428.5A CN202211161428A CN115497045A CN 115497045 A CN115497045 A CN 115497045A CN 202211161428 A CN202211161428 A CN 202211161428A CN 115497045 A CN115497045 A CN 115497045A
Authority
CN
China
Prior art keywords
data
counting
target object
target
video data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211161428.5A
Other languages
Chinese (zh)
Inventor
董宇
吴迪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
CCB Finetech Co Ltd
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN202211161428.5A priority Critical patent/CN115497045A/en
Publication of CN115497045A publication Critical patent/CN115497045A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/41Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The disclosure provides a target object checking method, a target object checking device and a target object checking storage medium, which can be applied to the technical field of big data. The method comprises the following steps: acquiring video data comprising a counting action on a target object, the target object being associated with a first entity object; acquiring recorded data from counting equipment, wherein the recorded data comprises first counting data obtained by counting a target object by the counting equipment; determining accounting data of the first entity object according to the target entity object identification of the first entity object; and determining an inspection result of the target object according to the video data, the first counting data and the accounting data.

Description

Target object checking method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of big data, and in particular, to a method, a system, an apparatus, an electronic device, a computer-readable storage medium, and a computer program product for checking a target object.
Background
The network point is the first line of a banking service customer, and a network point teller receives the handling work of various banking businesses, wherein various bank cards are important articles which are contacted by the network point teller in daily life, and the checking of the number of the bank cards, card issuing information and the like is important contents of network point operation management.
In some technical schemes, the checking of articles such as bank cards, cash and the like can be realized by adopting an offline manual counting mode. For example, the system can rely on the internal on-site inventory of a website supervisor for self-inspection, or on the onsite inspection of an assault by an upper operation management department. It can be seen that, by adopting the technical scheme, a large amount of labor and time cost can be consumed, and meanwhile, the inspection with higher frequency is difficult to be realized.
Disclosure of Invention
In view of the above, the present disclosure provides a target object inspection method, a target object inspection system, a target object inspection apparatus, an electronic device, a computer-readable storage medium, and a computer program product.
According to a first aspect of the present disclosure, there is provided a target object inspection method, including: acquiring video data comprising a counting action on a target object, the target object being associated with a first entity object; acquiring recorded data from counting equipment, wherein the recorded data comprises first counting data obtained by counting the target object by the counting equipment; determining accounting data of the first entity object according to a target entity object identifier of the first entity object; and based on the video data, the first count data and the accounting data, determining a result of the inspection of the target object.
According to another embodiment of the present disclosure, the determining a checking result of the target object according to the video data, the first count data and the accounting data includes: determining second count data for the target object from the video data; and comparing the first counting data, the second counting data and the accounting data to obtain the checking result.
According to another embodiment of the present disclosure, the comparing the first count data, the second count data and the accounting data to obtain the checking result includes: determining that the inspection result is passed in a case where it is determined that the first count data and the second count data respectively coincide with the accounting data; and determining that the detection result is failed in a case where it is determined that at least one of the first count data and the second count data is inconsistent with the accounting data.
According to another embodiment of the present disclosure, the determining, from the video data, second count data for the target object comprises: to a second entity object displaying the video data; in response to receiving a first input instruction of the second entity object, determining the second count data according to the first input instruction.
According to another embodiment of the present disclosure, the video data includes counting image data including a counting result exhibited by the counting apparatus; said processing means is arranged to process said video data, determining second count data for the target object comprises: carrying out target detection on the counting image data to obtain a target detection frame of the counting device; and identifying a sub-image corresponding to the target detection frame in the count image data, obtaining the second counting data.
<xnotran> , , , : </xnotran> Presenting the video data, the first count data, and the accounting data to a second entity object; and responding to the second input instruction of the second entity object, and determining the checking result according to the second input instruction.
According to another embodiment of the present disclosure, the record data further includes an actual entity object identifier and an actual tail box identifier; the method further comprises the following steps: sending an inspection request, wherein the inspection request corresponds to the target entity object identifier and a target tail box identifier for storing the target object; triggering the operation of determining the inspection result in response to detecting that the actual entity object identifier is consistent with the target entity object identifier and that the actual trunk identifier is consistent with the target trunk identifier; and generating a first prompt instruction in response to detecting that the actual entity object identifier is inconsistent with the target entity object identifier and/or the actual tail box identifier is inconsistent with the target tail box identifier.
Another aspect of the present disclosure provides a target object inspection system including a first device, a counting device, and a second device. The first device is used for acquiring video data comprising counting actions of a target object; the counting equipment is used for counting the target object to obtain first counting data; the second device is used for executing the target object checking method.
According to another embodiment of the present disclosure, the system further includes a third device for acquiring the video data from the first device; in the case that the video data is determined to pass the audit, sending the video data to the second device; and sending a second prompt instruction to the first device to enable the first device to reacquire video data including a counting action on the target object under the condition that the video data is determined not to pass the audit.
Another aspect of the present disclosure provides a target object inspection apparatus including: the device comprises a first acquisition module, a second acquisition module, a first determination module and a second determination module. The first acquisition module is used for acquiring video data comprising a counting action of a target object, wherein the target object is associated with a first entity object. The second acquisition module is used for acquiring recorded data from the counting device, wherein the recorded data comprises first counting data obtained by counting the target object by the counting device. The first determination module is used for determining the accounting data of the first entity object according to the target entity object identification of the first entity object. The second determining module is used for determining the checking result of the target object according to the video data, the first counting data and the accounting data.
Another aspect of the present disclosure provides an electronic device including: one or more processors; memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the above-described method.
Another aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the above-described method.
Another aspect of the disclosure also provides a computer program product comprising a computer program which, when executed by a processor, implements the above method.
According to the target object inspection method, the target object inspection system, the target object inspection device, the electronic device, the computer-readable storage medium and the computer program product provided by the disclosure, since the inspector of the superior operation management department does not need to check the target object on site at a bank outlet, remote checking of the target object can be realized by using the original devices of the bank outlet, such as a card counter and the internet of things. Therefore, the convenience of the inspection can be improved, a large amount of labor and time cost are saved, in addition, the inspection frequency can be quickly improved, the checking management strength of the target object is improved, and the influence on the network operation is reduced.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be apparent from the following description of embodiments of the disclosure, which proceeds with reference to the accompanying drawings, in which:
fig. 1 schematically illustrates an application scenario diagram of a target object inspection method, apparatus, device, medium and program product according to an embodiment of the present disclosure;
fig. 2 schematically illustrates a flow chart of a target object inspection method according to an embodiment of the present disclosure;
fig. 3 schematically illustrates a flowchart of a target object inspection method according to another embodiment of the present disclosure;
fig. 4 schematically illustrates a flowchart of a target object inspection method according to another embodiment of the present disclosure;
fig. 5 schematically illustrates a flowchart of a target object inspection method according to another embodiment of the present disclosure;
fig. 6 schematically illustrates a schematic diagram of a target object inspection method according to an embodiment of the present disclosure;
fig. 7 schematically shows a schematic structure of a target object inspection system according to an embodiment of the present disclosure;
fig. 8 is a block diagram schematically illustrating the structure of a target object inspection apparatus according to an embodiment of the present disclosure; and
fig. 9 schematically shows a block diagram of an electronic device adapted to implement the target object inspection method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In the following description, moreover, descriptions of well-known structures and techniques are omitted, to avoid unnecessarily obscuring the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "A, B and at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include, but not be limited to, systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
In the technical scheme of the disclosure, the collection, storage, use, processing, transmission, provision, disclosure, application and other processing of the personal information of the related user are all in accordance with the regulations of related laws and regulations, necessary confidentiality measures are taken, and the customs of the public order is not violated.
In the technical scheme of the disclosure, the data acquisition, collection, storage, use, processing, transmission, provision, disclosure, application and other processing are all in accordance with the regulations of relevant laws and regulations, necessary security measures are taken, and the public order and good custom are not violated.
Fig. 1 schematically illustrates an application scenario diagram of a target object inspection method, apparatus, device, medium, and program product according to an embodiment of the present disclosure.
As shown in fig. 1, an application scenario 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and otherwise process the received data such as the user request, and feed back a processing result (e.g., an inspection result determined according to the video data, the recorded data, and the like) to the terminal device.
It should be noted that the target object inspection method provided by the embodiment of the present disclosure may be generally performed by the server 105. Accordingly, the target object inspection apparatus provided by the embodiment of the present disclosure may be generally disposed in the server 105. The target object checking method provided by the embodiment of the present disclosure may also be executed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the target object inspection apparatus provided in the embodiment of the present disclosure may also be disposed in a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, and 103 and/or the server 105.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for an implementation.
The target object inspection method of the disclosed embodiment will be described in detail below through fig. 2 to 6 based on the scenario described in fig. 1.
<xnotran> 2 . </xnotran>
As shown in fig. 2, the target object inspection method 200 of the embodiment includes operations S210 to S240.
In operation S210, video data including a counting action on a target object associated with a first entity object is acquired.
For example, the target object may include an object in a tail box managed by a website teller, such as a bank card, cash, coins, precious metals, and the like. The bank card is a credit payment tool which is approved to be issued to the society by commercial banks and has all or part of functions of consuming credit, transferring accounts, depositing cash and the like, comprises a debit card, a credit card, a quasi-credit card and other finished cards and blank cards, is an important object stored on a counter, and is issued to customers when the customers transact bank card business.
For example, the counting action may include an action to count objects in the tail box. The object in the trunk can be checked by a teller or other personnel at a website, and a video of the checking process is recorded, so that video data is obtained, and then the video data is uploaded to the equipment for executing the target object checking method through the network.
For example, the first physical object may comprise a website teller. The association of the first entity object with the target object may indicate that the first entity object is responsible for managing the target object. For example, if a website teller corresponds to a trunk that needs to be managed and includes an object such as a bank card or cash, the website teller is associated with the bank card in the trunk.
In operation S220, log data including first count data in which the counting device counts the target object is acquired from the counting device.
For example, the counting device is related to the category of the target object to be counted, for example, the target object is a bank card, and the counting device may be a card counter, which is also called a digital card counter, and is a special counting device for counting bank cards, so that a large number of bank cards can be counted quickly. As another example, where the target object is cash, the counting device may be a bill validator. As another example, the target object is a coin, the counting device may be a coin separation counter.
For example, after the counting device counts the target object, the counted first count data may be transmitted to the device for performing the target object verification method through a network or the like.
In operation S230, accounting data of the first entity object is determined according to the target entity object identification of the first entity object.
For example, the target entity object identification represents an identification of the target entity object, such as an employee number of a website teller.
For example, the accounting data may include data recorded by the first entity object in an accounting system inside the bank, e.g., the system may record information such as the transaction processed by the first entity object, the amount of cash deposited in the tail box, the number of bank cards, etc. The accounting data of the first entity object may be queried from the accounting system based on the identity of the target entity object.
In operation S240, a result of inspection of the target object is determined according to the video data, the first count data, and the accounting data.
For example, the video data may embody an inventory process of the target object, the second count data of the target object may be obtained through the inventory process, whether the first count data, the second count data, and the accounting data are consistent or not may be compared, and then the inspection result of the target object may be determined according to whether the first count data, the second count data, and the accounting data are consistent or not. The inspection result may include pass and fail.
The technical scheme provided by the embodiment of the disclosure renovates the original mode of manually checking the target object on site, in practical application, an inspector of an upper operation management department does not need to check a bank card on site at a bank outlet, and can utilize original equipment of the bank outlet such as a card counting device and the Internet of things to realize remote checking of the target object, so that the convenience of checking is improved, a large amount of manpower and time cost are saved, in addition, the checking frequency can be quickly improved, the checking management force of important management and control articles such as the bank card is improved, and the influence on network outlet operation is reduced.
In addition, in practical application, as the video data rather than the image data is acquired, the credibility of the video data is higher than that of the image data, and therefore the situation that the first entity object falsely checks the counting process can be avoided.
In addition, the inspection is performed by combining the three data, namely the video data, the first counting data and the accounting data, and compared with the inspection performed only according to the image data and the financial data, the inspection method and the inspection device have the advantages that more types of data are considered, and accordingly the inspection accuracy can be improved.
Fig. 3 schematically shows a flowchart of a target object inspection method according to another embodiment of the present disclosure.
As shown in fig. 3, the target object inspection method 300 of this embodiment includes operations S310 to S330, and further includes operations S341 to S342.
For example, the operations S210 to S230 may be referred to in the operations S310 to S330, and the embodiments of the disclosure are not described herein again.
In operation S341, the video data, the first count data, and the accounting data are presented to the second entity object.
For example, the second entity object may represent a verifier of an upper operation management department.
For example, video data may be played through the display device such that the second entity object determines the second count data of the target object through the video data. The first count data and the accounting data may also be presented by a display device. The second entity object determines whether the first counting data, the second counting data and the accounting data are consistent by checking the displayed data, and then inputs the determined result to the device for executing the target object checking method, wherein the input operation triggers a second input instruction.
In operation S342, in response to receiving a second input instruction of the second entity object, a result of the ping is determined according to the second input instruction.
For example, the device receives the second input instruction and determines the ping result using the second input instruction. For example, if the second input command input by the second entity object indicates that the three data (i.e., the first count data, the second count data, and the accounting data) are identical, the device may determine that the inspection result is qualified. For another example, if the second input instruction input by the second entity object indicates that the three data are inconsistent, the device may determine that the inspection result is not qualified.
According to the technical scheme provided by the embodiment of the disclosure, since the video data, the first counting data and the accounting data are manually checked through the second entity object to determine the checking result, the control logic of the device for executing the target object checking method can be simplified. In addition, the problem of inaccurate checking results caused by errors generated in the device processing process can be avoided, so that the credibility of the checking results is improved.
Fig. 4 schematically shows a flowchart of a target object inspection method according to another embodiment of the present disclosure.
As shown in fig. 4, the target object checking method 400 of this embodiment includes operations S410 to S430, and further includes operations S443 to S444.
For example, the operations S210 to S230 may be referred to in the operations S410 to S430, and the embodiments of the disclosure are not described herein again.
In operation S443, second count data for the target object is determined according to the video data.
In one example, video data may be presented to a second physical object and then, in response to receiving a first input instruction to the second physical object, second count data may be determined in accordance with the first input instruction.
For example, the second entity object may represent a verifier of an upper operation management department. For example, video data may be played through the display device, and the second entity object determines second count data of the target object by viewing the video data. The second entity object may then input the determined number to a device for performing the above target object inspection method, the input operation may trigger the first input instruction, and the device receives the first input instruction and parses the number included in the first input instruction, thereby determining the second count data.
By adopting the technical scheme provided by the example, the second counting data is determined by manually viewing the video data by the second entity object, so that the control logic of the equipment for executing the target object checking method can be simplified. In addition, the problem that the second counting data is inaccurate due to errors generated in the equipment processing process can be avoided, thereby improving the confidence level of the second count data.
In one example, object detection may be performed on counting image data in the video data, resulting in an object detection frame of the counting device, the counting image data including a counting result exhibited by the counting device. And then, identifying the sub-image corresponding to the target detection frame in the counting image data to obtain second counting data.
For example, after the counting device counts the target object, the counting result may be displayed. For example, the card counter may display the number of bank cards and the validator may display the total amount of cash.
For example, the flow of recording the video may be preset, for example, it is required to record the counting result displayed by the counting device in a period of time near the end of the video. Then, an image at a predetermined time may be cut out from the video data as count image data, and the sum of the predetermined time and the predetermined time period may be the end time of the video data, and the predetermined time period may be 3 seconds. For example, the duration of video data is 3 minutes, and an image of 57 minutes can be used as the count image data. For example, the counting image data is subjected to object detection, so that an object detection frame of the counting device is obtained. And then cutting out a sub-image corresponding to the target detection frame from the counting image data. And then performing OCR (Optical Character Recognition) or ICR (Intelligent Character Recognition) on the sub-image to obtain a counting result displayed by the counting equipment, wherein the counting result is the second counting data determined by the equipment.
By adopting the technical scheme provided by the example, the second counting data can be automatically determined from the video data through the equipment without manual operation, so that the labor cost is further reduced, and the processing efficiency is improved.
In the operation S444 of the above-described method, comparing the first count data, the second count data and the accounting data, the inspection result is obtained.
For example, it may be determined that the inspection result is passed in the case where it is determined that the first count data is consistent with the accounting data and the second count data is consistent with the accounting data. The determination that the detection result is not passed may be made in a case where it is determined that the first count data is not consistent with the accounting data and/or the second count data is not consistent with the accounting data.
It can be seen that the disclosed embodiment replaces the above-mentioned operations S341 to S342 by operations S443 to S444. By adopting the operations S443 to S444 provided in the embodiment of the present disclosure, the video data, the first count data, and the accounting data may be automatically processed, and the inspection result of the target object may be obtained, so as to reduce the labor cost and improve the processing efficiency.
Fig. 5 schematically illustrates a flowchart of a target object inspection method according to another embodiment of the present disclosure.
As shown in fig. 5, the target object inspection method 500 of this embodiment includes operations S510 to S570.
In operation S510, a ping request is transmitted, where the ping request corresponds to a target entity object identifier and a target tail box identifier for storing a target object.
For example, the verifier may send a ping request through the device, which may be received by other remote devices (e.g., a computer, a cell phone, etc. used by the first physical object) and prompt the first physical object.
In operation S520, video data including a counting action on a target object associated with a first entity object is acquired.
For example, reference may be made to operation S210 in this operation, and details of the embodiment of the present disclosure are not repeated.
In operation S530, log data including an actual entity object identifier, an actual tail box identifier, and first count data obtained by the counting device counting the target object is obtained from the counting device.
For example, the present operation may be similar to the above operation S220, and compared to the above operation S220, the record data in the present operation S530 further includes an actual entity object identifier and an actual tail box identifier.
For example, the first entity object may input its own identifier in the counting device, which is an actual entity object identifier representing an actual responsible person who manages the target object of the current inventory. The first entity object may also input an identifier of the tail box in the counting device, where the identifier is an actual tail box identifier, and the actual tail box identifier represents an actual tail box where the target object managed the inventory is located. The counting device may assemble the actual physical object identifier, the actual trunk identifier, and the first count data into a predetermined format and then upload the predetermined format to a device that performs the target object inspection method.
In operation S540, it is determined whether a predetermined inspection condition is satisfied. If the predetermined inspection condition is satisfied, triggering operation S550; if the predetermined inspection condition is not satisfied, operation S570 is performed.
For example, the predetermined ping condition may include the actual physical object identification being consistent with the target physical object identification and the actual tail box identification being consistent with the target tail box identification.
In operation S550, accounting data of the first entity object is determined according to the target entity object identification of the first entity object.
For example, reference may be made to operation S230 in this operation, and details of the embodiment of the present disclosure are not repeated.
In operation S560, a checking result of the target object is determined according to the video data, the first count data, and the accounting data.
For example, the operation S240 may be referred to in this operation, and details of the embodiment of the present disclosure are not repeated.
In operation S570, a first cue instruction is generated.
For example, the non-satisfaction of the predetermined ping condition may include at least one of: the actual entity object identification is inconsistent with the target entity object identification, and the actual tail box identification is inconsistent with the target tail box identification.
It can be seen that the inconsistency between the actual entity object identifier and the target entity object identifier indicates that: the teller which the verifier wants to check is inconsistent with the teller actually checked. The actual tail box identification is represented by inconsistency with the target tail box identification: the tail box that the verifier wants to inspect is not consistent with the tail box that is actually inspected.
When the predetermined inspection condition is not satisfied, it indicates that the actually inspected teller or the actually inspected trunk does not coincide with the expectation, and thus a first prompt instruction may be generated to prompt the first entity object, the second entity object, and the actually inspected object, thereby ensuring the inspection effect.
Fig. 6 schematically illustrates a schematic diagram of a target object inspection method according to an embodiment of the present disclosure.
As shown in fig. 6, the staff related to this embodiment may include a website teller, a website supervisor, and a backend verifier, and this embodiment may relate to a staff APP601 of the verifier, a staff APP 602 of the website teller, a staff APP 603 of the supervisor, an internet of things platform 606 of the middle station, and a backend supervisor platform 604, and further need to use a card counter 605. The processing flow of the target object inspection method of this embodiment is as follows.
The checking personnel register the checking items through the staff APP601 of the checking personnel in a remote background and issue a checking request to a designated website teller.
After the website teller receives the check request through the employee APP 602 of the website teller, the self tail box is selected, and the tail box is selected, and puts the bank card held by itself into the card counter 605 for counting operation. The employee APP 602 of the website teller is also used to photograph the process of the card counter 605 counting the bank cards and the counting result displayed in the card counter 605. After the video shooting is finished, the video data can be submitted to a website supervisor for auditing.
The website supervisor checks the video data submitted by the website teller in the supervisor employee APP 603 and checks the video data, and after the checking is passed, the video data is sent to the supervising platform 604 through the website teller employee APP 602 or the supervisor employee APP 603.
In addition, after the card counter 605 completes the counting operation, and after the card counter 605 completes the card counting operation, the internet of things connected with the card counter 605 uploads the teller number, the trunk number, the first counting data and other record data to the internet of things platform 606 according to an agreed message format, and the teller number and the trunk number can be input into the card counter 605 by the checked teller at the website. The internet of things platform 606 uploads the recorded data in the card counter 605 to the supervising platform 604 in the background.
And the background supervising platform 604 combines the recorded data uploaded by the internet of things platform 606 and the video data uploaded by the employee APP, summarizes the recorded data into a primary remote check record of the bank card of the website and reminds the background checker to check in time.
Background check personnel log in the supervision platform 604, click the corresponding issued records, and display the summarized check record information. According to the recorded data of the card counter 605 uploaded by the internet of things platform 606 and the video data shot by the employee APP, the teller number and/or the trunk number are/is used for calling the background teller trunk bank card record to obtain the account data, and then the video data uploaded by the employee APP, the first counting data uploaded by the card counter 605 and the called account data are compared to obtain the checking result.
In practical applications, the supervision platform 604 and the employee APP601 of the verifier may be integrated on one device, or may be integrated on different devices respectively.
Fig. 7 schematically shows a schematic structure of the target object inspection system 700 according to an embodiment of the present disclosure.
As shown in the figure 7 of the drawings, the target object inspection system 700 provided in the present embodiment includes a first device 701, a counting device 702, and a second device 703.
The first device 701 is used to capture video data comprising a counting action on a target object. For example, the first device 701 may be an electronic device used by the first physical object, such as a cell phone used by a website teller.
The counting device 702 is configured to count the target object to obtain first counting data. For example, the counting device 702 may be a card counter, a bill validator, or the like.
The second device 703 is used to perform the above-described target object inspection method. For example, the second device 703 may be an electronic device used by the second physical object, such as a cell phone or a computer used for verification.
The target object checking system provided by the embodiment of the disclosure can realize the effect of remotely checking the target object.
According to another embodiment of the present disclosure, the target object inspection system may further include a third device, where the third device is configured to obtain video data from the first device, and send the video data to the second device when it is determined that the video data passes the audit; and in the event that the video data is determined to not pass the audit, sending a second prompting instruction to the first device, such that the first device re-captures video data including the counting action on the target object.
For example, the third device may be a device used by a website administrator, and the website administrator may audit the captured video data and then input an audit result to the third device.
The embodiment of the disclosure also audits the video data through the third device, so that the supervisor can know the items to be checked, and meanwhile, the problem that follow-up verification cannot be performed due to the fact that the video data are not satisfactory can be avoided.
Based on the target object checking method, the disclosure also provides a target object checking device. The apparatus will be described in detail below with reference to fig. 8.
Fig. 8 is a block diagram schematically illustrating the structure of the target object inspection apparatus according to an embodiment of the present disclosure.
As shown in fig. 8, the target object inspection apparatus 800 of this embodiment includes a first obtaining module 810, a second obtaining module 820, a first determining module 830, and a second determining module 840.
The first obtaining module 810 is configured to obtain video data including a counting action on a target object, the target object being associated with a first entity object. In an embodiment, the first obtaining module 810 may be configured to perform the operation S210 described above, which is not described herein again.
The second obtaining module 820 is configured to obtain the record data from the counting device, where the record data includes first count data obtained by counting the target object by the counting device. In an embodiment, the second obtaining module 820 may be configured to perform the operation S220 described above, which is not described herein again.
The first determining module 830 is configured to determine the accounting data of the first entity object according to the target entity object identifier of the first entity object. In an embodiment, the first determining module 830 may be configured to perform the operation S230 described above, and is not described herein again.
The second determining module 840 is configured to determine a checking result of the target object according to the video data, the first counting data, and the accounting data. In an embodiment, the second determining module 840 may be configured to perform the operation S240 described above, which is not described herein again.
According to another embodiment of the present disclosure, the second determining module includes: a first determination submodule and a comparison submodule. The first determining submodule is used for determining second counting data aiming at the target object according to the video data. The comparison sub-module is used for comparing the first counting data, the second counting data and the account data to obtain a checking result.
According to another embodiment of the present disclosure, the comparison submodule includes a first determination unit and a second determination unit. The first determination unit is configured to determine that the inspection result is passed in a case where it is determined that the first count data and the second count data are respectively consistent with the accounting data; the second determination unit is configured to determine that the detection result is not passed in a case where it is determined that at least one of the first count data and the second count data is inconsistent with the accounting data.
According to another embodiment of the present disclosure, the first determination submodule includes a presentation unit and a third determination unit. The display unit is used for displaying the video data to the second entity object; the third determining unit is used for responding to the first input instruction of the second entity object and determining the second counting data according to the first input instruction.
According to another embodiment of the present disclosure, the video data includes count image data including a count result exhibited by the counting apparatus; the first determination submodule includes a detection unit and an identification unit. The detection unit is used for carrying out target detection on the counting image data to obtain a target detection frame of the counting device; the identification unit is used for identifying the sub-image corresponding to the target detection frame in the counting image data to obtain second counting data.
According to another embodiment of the present disclosure, the second determination module includes a presentation sub-module and a second determination sub-module. The display submodule is used for displaying the video data, the first counting data and the financial data to a second entity object; the second determining submodule is used for responding to a second input instruction of the second entity object and determining the checking result according to the second input instruction.
According to another embodiment of the present disclosure, the logging data further comprises an actual entity object identifier and an actual tail box identifier; the device still includes: the device comprises a sending module, a triggering module and a generating module. The sending module is used for sending an inspection request, and the inspection request corresponds to a target entity object identifier and a target tail box identifier for storing a target object; the trigger module is used for triggering the operation of determining the checking result in response to the fact that the actual entity object identifier is consistent with the target entity object identifier and the actual trunk identifier is consistent with the target trunk identifier; the generating module is used for responding to the fact that the actual entity object identification is inconsistent with the target entity object identification and/or the actual tail box identification is inconsistent with the target tail box identification, and generating a first prompt instruction.
According to an embodiment of the present disclosure, any plurality of the first obtaining module 810, the second obtaining module 820, the first determining module 830, and the second determining module 840 may be combined and implemented in one module, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the first obtaining module 810, the second obtaining module 820, the first determining module 830, and the second determining module 840 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or implemented by any one of three implementations of software, hardware, and firmware, or any suitable combination of any of them. Alternatively, at least one of the first obtaining module 810, the second obtaining module 820, the first determining module 830 and the second determining module 840 may be at least partially implemented as a computer program module, which when executed, may perform a corresponding function.
Fig. 9 schematically illustrates a block diagram of an electronic device adapted to implement the target object inspection method according to an embodiment of the present disclosure.
As shown in fig. 9, an electronic apparatus 900 according to an embodiment of the present disclosure includes a processor 901 which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM) 902 or a program loaded from a storage portion 908 into a Random Access Memory (RAM) 903. Processor 901 may comprise, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 901 may also include on-board memory for caching purposes. The processor 901 may comprise a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
In the RAM 903, various programs and data necessary for the operation of the electronic apparatus 900 are stored. The processor 901, the ROM 902, and the RAM 903 are connected to each other through a bus 904. The processor 901 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 902 and/or the RAM 903. Note that the programs may also be stored in one or more memories other than the ROM 902 and the RAM 903. The processor 901 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
Electronic device 900 may also include input/output (I/O) interface 905, input/output (I/O) interface 905 also connected to bus 904, according to an embodiment of the present disclosure. The electronic device 900 may also include one or more of the following components connected to the I/O interface 905: an input portion 906 including a keyboard, a mouse, and the like; an output section 907 including components such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 908 including a hard disk and the like; and a communication section 909 including a network interface card such as a LAN card, a modem, or the like. The communication section 909 performs communication processing via a network such as the internet. The drive 910 is also connected to the I/O interface 905 as necessary. A removable medium 911 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 910 as necessary, so that a computer program read out therefrom is mounted into the storage section 908 as necessary.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 902 and/or the RAM 903 described above and/or one or more memories other than the ROM 902 and the RAM 903.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the method illustrated by the flow chart. When the computer program product runs in a computer system, the program code is used for causing the computer system to realize the item recommendation method provided by the embodiment of the disclosure.
The computer program performs the above-described functions defined in the system/apparatus of the embodiments of the present disclosure when executed by the processor 901. The above described systems, devices, modules, units, etc. may be implemented by computer program modules according to embodiments of the present disclosure.
In one embodiment, the computer program may be hosted on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted or distributed in the form of a signal over a network medium, and downloaded and installed through the communication section 909 and/or installed from the removable medium 911. The computer program containing program code may be transmitted using any suitable network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 909, and/or installed from the removable medium 911. The computer program, when executed by the processor 901, performs the above-described functions defined in the system of the embodiment of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only, and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (13)

1. A target object checking method comprises the following steps:
acquiring video data comprising a counting action on a target object, wherein the target object is associated with a first entity object;
acquiring recorded data from a counting device, wherein the recorded data comprises first counting data obtained by counting the target object by the counting device;
determining accounting data of the first entity object according to a target entity object identifier of the first entity object; and
and determining a checking result of the target object according to the video data, the first counting data and the accounting data.
2. The method of claim 1, wherein the determining a ping result for the target object from the video data, the first count data, and the accounting data comprises:
determining second count data for the target object from the video data; and
and comparing the first counting data, the second counting data and the accounting data to obtain the checking result.
3. The method of claim 2, wherein the comparing the first count data, the second count data, and the accounting data to obtain the verification result comprises:
determining that the inspection result is passed in a case where it is determined that the first count data and the second count data respectively coincide with the accounting data; and
determining that the detection result is not passed in a case where it is determined that at least one of the first count data and the second count data is inconsistent with the accounting data.
4. The method of claim 2, wherein said determining second count data for the target object from the video data comprises:
presenting the video data to a second physical object;
in response to receiving a first input instruction of the second entity object, determining the second count data according to the first input instruction.
5. The method of claim 2, wherein the video data comprises counting image data comprising a counting result exhibited by the counting device; said determining second count data for said target object from said video data comprises:
carrying out target detection on the counting image data to obtain a target detection frame of the counting device; and
and identifying the subimage corresponding to the target detection frame in the counting image data to obtain the second counting data.
6. The method of claim 1, wherein the determining a ping result for the target object from the video data, the first count data, and the accounting data comprises:
presenting the video data, the first count data, and the accounting data to a second entity object;
in response to receiving the second a second input instruction of the entity object, and determining the checking result according to the second input instruction.
7. The method of any of claims 1 to 6, wherein the logging data further comprises an actual entity object identification and an actual tail box identification; the method further comprises the following steps:
sending an inspection request, wherein the inspection request corresponds to the target entity object identifier and a target tail box identifier for storing the target object;
triggering the operation of determining the checking result in response to detecting that the actual entity object identifier is consistent with the target entity object identifier and the actual trunk identifier is consistent with the target trunk identifier; and
and generating a first prompt instruction in response to detecting that the actual entity object identifier is inconsistent with the target entity object identifier and/or the actual tail box identifier is inconsistent with the target tail box identifier.
8. A target object inspection system comprising:
the device comprises a first device, a second device and a third device, wherein the first device is used for acquiring video data comprising counting actions of a target object;
the counting device is used for counting the target object to obtain first counting data; and
a second device for performing the method of any one of claims 1 to 7.
9. The system of claim 8, further comprising:
a third device for acquiring the video data from the first device; in the case that the video data is determined to pass the audit, sending the video data to the second device; and sending a second prompt instruction to the first device to enable the first device to reacquire video data including a counting action on the target object under the condition that the video data is determined not to pass the audit.
10. A target object inspection apparatus comprising:
a first obtaining module, configured to obtain video data including a counting action on a target object, where the target object is associated with a first entity object;
the second acquisition module is used for acquiring recorded data from counting equipment, wherein the recorded data comprises first counting data obtained by counting the target object by the counting equipment;
the first determination module is used for determining the accounting data of the first entity object according to the target entity object identification of the first entity object; and
and the second determination module is used for determining the checking result of the target object according to the video data, the first counting data and the accounting data.
11. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-7.
12. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method according to any one of claims 1 to 7.
13. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1 to 7.
CN202211161428.5A 2022-09-22 2022-09-22 Target object checking method, device, equipment and storage medium Pending CN115497045A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211161428.5A CN115497045A (en) 2022-09-22 2022-09-22 Target object checking method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211161428.5A CN115497045A (en) 2022-09-22 2022-09-22 Target object checking method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115497045A true CN115497045A (en) 2022-12-20

Family

ID=84469755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211161428.5A Pending CN115497045A (en) 2022-09-22 2022-09-22 Target object checking method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115497045A (en)

Similar Documents

Publication Publication Date Title
US20240037225A1 (en) Systems and methods for detecting resources responsible for events
US8660952B1 (en) System and method for improved remote deposit user support
US8255304B1 (en) Systems and methods for audit confirmation and other confirmation services
US8130111B2 (en) Services portal
US11915195B2 (en) Systems and methods for intelligent field matching and anomaly detection
US20080288382A1 (en) Methods and Systems for Early Fraud Protection
US20080270303A1 (en) Method and system for detecting fraud in financial transactions
US20140279453A1 (en) Bill Payment Using Check Image
US20130204783A1 (en) System and method for performing remote check presentment (rcp) transactions by a check cashing company
US20220335405A1 (en) Payment System
US20200342428A1 (en) Techniques for virtual deposit of paper currency
US20230267537A1 (en) Transaction retrieval, transaction matching, alert generation, and processing of dispute alerts
US20150112821A1 (en) Budgeting Support at a Transaction Device
US20170372314A1 (en) Processing of dispute alerts
US20150066750A1 (en) Payments Perfection and Processing System
CN112767107A (en) Method, apparatus, device, medium and program product for detecting blacklist
CN115471228A (en) Financial business certificate checking method, device, equipment and storage medium
US11657681B1 (en) System to prevent full ATM enclosure skimming attacks
US20160063404A1 (en) Universal back office workflow
CN115497045A (en) Target object checking method, device, equipment and storage medium
CN114841815A (en) Transaction analysis method and device, electronic equipment and computer-readable storage medium
CN113112232A (en) Online loan auditing method, auditing device, electronic equipment and storage medium
CN114372800A (en) Transaction processing method, apparatus, device, medium and product
CN114115628A (en) U shield display information acquisition method, device, equipment, medium and program product applied to U shield test
US20110191259A1 (en) Financial Document Request and Retrieval

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination