CN115511598A - Counterfeit money management and control method, device, medium and equipment - Google Patents

Counterfeit money management and control method, device, medium and equipment Download PDF

Info

Publication number
CN115511598A
CN115511598A CN202211142163.4A CN202211142163A CN115511598A CN 115511598 A CN115511598 A CN 115511598A CN 202211142163 A CN202211142163 A CN 202211142163A CN 115511598 A CN115511598 A CN 115511598A
Authority
CN
China
Prior art keywords
information
counterfeit money
crown word
word number
number information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211142163.4A
Other languages
Chinese (zh)
Inventor
谭卓
蓝福潮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202211142163.4A priority Critical patent/CN115511598A/en
Publication of CN115511598A publication Critical patent/CN115511598A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application provides a counterfeit money control method, a counterfeit money control device, a counterfeit money control medium and counterfeit money control equipment, wherein the method comprises the following steps: the method comprises the steps of obtaining target crown word number information of currency to be identified, comparing the target crown word number information with preset crown word number information which is marked as false currency in a database in advance, if preset crown word number information which is consistent with the target crown word number information exists in the database, marking the currency to be identified corresponding to the target crown word number information as the false currency, obtaining market circulation information of the false currency, determining historical user information of the false currency according to the market circulation information, and judging whether to send out warning information or not based on the historical user information and current user information. By utilizing the counterfeit money control method provided by the embodiment of the application, the circulation node and the user information of the counterfeit money can be positioned by introducing a counterfeit money life cycle tracking mechanism, whether the counterfeit money user intends or not can be identified, and the impact on the user who intentionally uses the counterfeit money is enhanced.

Description

Counterfeit money management and control method, device, medium and equipment
Technical Field
The application relates to the technical field of electronic communication, in particular to a counterfeit money management and control method, a counterfeit money management and control device, a counterfeit money management and control medium and counterfeit money management and control equipment.
Background
The serial number information is composed of serial number and serial number, the serial number is two or three English letters printed on paper money for marking printing batch, and is arranged and printed by a bank note printer according to a certain rule, and the serial number is Arabic number serial number printed behind the serial number for marking the arrangement sequence of each bank note in the same serial number batch. Since the crown word number information is unique, it can be used to verify the authenticity of the currency. At present, most cashier counters are provided with crown word number information checking systems to assist cashiers in identifying the authenticity of currency. However, the existing crown word number information checking system only meets the checking function, and the crown word number information of the received and paid counterfeit money and the information of the received and paid people are not effectively utilized, and whether the counterfeit money user uses the counterfeit money under the condition of knowing the condition or not can not be judged, so that the counterfeit money user is difficult to trace, therefore, in the banking industry, how to accurately identify the counterfeit money machine user, and combing the use information of the counterfeit money while identifying the counterfeit money, so as to give automatic user information prejudgment, and has positive significance for anti-fraud identification of banks.
Disclosure of Invention
The embodiment of the application provides a counterfeit money control method, a counterfeit money control device, a counterfeit money control medium and counterfeit money control equipment.
An embodiment of the present application provides a counterfeit money management and control method, including:
acquiring target prefix number information of the currency to be identified;
comparing the target crown word number information with preset crown word number information marked as counterfeit money in a database in advance;
if preset crown word number information consistent with the target crown word number information exists in the database, marking the currency to be identified corresponding to the target crown word number information as a counterfeit currency;
acquiring market circulation information of the counterfeit money, and determining historical user information of the counterfeit money according to the market circulation information;
and judging whether to send out warning information or not based on the historical user information and the current user information.
In the counterfeit money management and control method according to the embodiment of the present application, the obtaining of the target crown word number information of the money to be identified includes:
and inputting the currency to be recognized into a trained information extraction model for information extraction operation to obtain the target crown word number information in the currency to be recognized.
In the counterfeit money management and control method according to the embodiment of the present application, before the obtaining of the market circulation information of the counterfeit money, the method further includes:
recording transaction data of the counterfeit money, wherein the transaction data comprises a transaction occurrence place, transaction occurrence time and counterfeit money user information;
and integrating the transaction data of each counterfeit money to generate market circulation information with a time chain relation.
In the counterfeit money management and control method according to the embodiment of the present application, the determining whether to send out warning information based on the historical user information and the current user information includes:
if the historical user information is consistent with the current user information, acquiring transaction data of the counterfeit money, and judging whether a counterfeit money exchange record exists in the transaction data;
and if the transaction data contains the counterfeit money refund record, judging that the user of the counterfeit money uses the counterfeit money under the informed condition, and sending out alarm information.
In the counterfeit money management and control method according to the embodiment of the present application, after determining that the user of the counterfeit money uses the counterfeit money under an informed condition, the sending the warning message includes:
and sending warning information to the current user of the counterfeit money, and binding the warning information with the current user to obtain the transaction data of the counterfeit money.
In the counterfeit money management and control method according to the embodiment of the present application, the method further includes:
and if the historical user information is consistent with the current user information and warning information bound with the current user exists in the transaction data of the counterfeit money, generating a credit record and uploading the credit record to a credit assessment system.
In the counterfeit money management and control method according to the embodiment of the present application, the method further includes:
and storing the target crown word number information corresponding to the counterfeit money into the database and updating the database.
Correspondingly, another aspect of the embodiments of the present application further provides a counterfeit money management and control device, where the counterfeit money management and control device includes:
the information acquisition module is used for acquiring the target crown word number information of the currency to be identified;
the information comparison module is used for comparing the target crown word number information with preset crown word number information marked as counterfeit money in a database in advance;
the information marking module is used for marking the currency to be identified corresponding to the target crown word number information as a counterfeit currency if preset crown word number information consistent with the target crown word number information exists in the database;
the information determining module is used for acquiring market circulation information of the counterfeit money and determining historical user information of the counterfeit money according to the market circulation information;
and the responsibility judgment module is used for judging whether to send out warning information or not based on the historical user information and the current user information.
Correspondingly, another aspect of the embodiments of the present application further provides a storage medium, where the storage medium stores a plurality of instructions, and the instructions are suitable for being loaded by a processor to execute the counterfeit money management and control method as described above.
Correspondingly, another aspect of the embodiment of the present application further provides a terminal device, which includes a processor and a memory, where the memory stores a plurality of instructions, and the processor loads the instructions to execute the counterfeit money management and control method described above.
The embodiment of the application provides a counterfeit money control method, a counterfeit money control device, a counterfeit money control medium and counterfeit money control equipment, wherein the counterfeit money control method comprises the steps of obtaining target crown word number information of money to be identified; comparing the target crown word number information with preset crown word number information marked as counterfeit money in a database in advance; if preset crown word number information consistent with the target crown word number information exists in the database, marking the currency to be identified corresponding to the target crown word number information as a counterfeit currency; obtaining market circulation information of the counterfeit money, and determining historical user information of the counterfeit money according to the market circulation information; and judging whether to send out warning information or not based on the historical user information and the current user information. By utilizing the counterfeit money control method provided by the embodiment of the application, the circulation node and the user information of the counterfeit money can be positioned by introducing a counterfeit money life cycle tracking mechanism, whether the counterfeit money user intends or not can be identified, and the attack to the user who intentionally uses the counterfeit money is enhanced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments will be briefly introduced below. It is obvious that the drawings in the following description are only some embodiments of the application, and that for a person skilled in the art, other drawings can also be derived from them without inventive effort.
Fig. 1 is a schematic flow chart of a counterfeit money management and control method according to an embodiment of the present application.
Fig. 2 is a schematic structural diagram of a counterfeit money management and control device according to an embodiment of the present disclosure.
Fig. 3 is another schematic structural diagram of a counterfeit money control device according to an embodiment of the present disclosure.
Fig. 4 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without inventive step, are intended to be within the scope of the present application.
It should be noted that the following is a brief introduction to the background of the present solution:
the scheme is mainly developed around the technical problem of 'how to realize intelligent counterfeit money identification and simultaneously can perform responsibility tracing on part of people who intentionally use counterfeit money'. It can be understood that the information of the crown word is composed of the crown word and the number, the crown word is two or three English letters printed on the paper money for marking the printing batch, the number is arranged and printed according to a certain rule by a paper money printer, and the number is the serial number of Arabic numerals printed behind the crown word for marking the arrangement sequence of each paper money in the same crown word batch. Since the crown-word number information is unique, it can be used to verify the authenticity of the currency. At present, most cashier counters are provided with crown word number information checking systems to assist cashiers in identifying the authenticity of currency. However, the conventional crown word number information checking system only satisfies the checking function, and does not effectively utilize the crown word number information of the received and paid counterfeit money and the information of the received and paid people, and cannot judge whether the counterfeit money user uses the counterfeit money in an informed state, so that the counterfeit money user is difficult to trace.
In order to solve the above technical problem, an embodiment of the present application provides a counterfeit money management and control method. By utilizing the counterfeit money control method provided by the embodiment of the application, the circulation node and the user information of the counterfeit money can be positioned by introducing a counterfeit money life cycle tracking mechanism, whether the counterfeit money user intends or not can be identified, and the impact on the user who intentionally uses the counterfeit money is enhanced.
Referring to fig. 1, fig. 1 is a schematic flow chart illustrating a counterfeit money management and control method according to an embodiment of the present application. The counterfeit money management and control method is applied to terminal equipment. Optionally, the terminal device is a terminal or a server. Optionally, the server is an independent physical server, or a server cluster or distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as cloud service, cloud database, cloud computing, cloud function, cloud storage, web service, cloud communication, middleware service, domain name service, security service, CDN (Content Delivery Network), big data and artificial intelligence platform. Optionally, the terminal is a banknote validator, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, a smart voice interaction device, a smart home appliance, a vehicle-mounted terminal, and the like, but is not limited thereto.
In an embodiment, the method may comprise the steps of:
step 101, obtaining the target crown word number information of the currency to be identified.
When a terminal device, such as a currency detector, installed with a currency control program performs currency detection operation on currency to be identified, target crown word number information in the currency to be identified is extracted first. In one example, the currency detector scans to obtain an image of the currency to be identified, inputs the image into a trained information extraction model to perform information extraction operation, and obtains target crown word number information in the currency to be identified.
It should be noted that the information extraction model may be obtained based on neural network training, for example, convolutional neural network training, and the specific training process includes:
acquiring a training sample of an information extraction model to be trained, wherein the training sample comprises image data provided with a label;
performing feature extraction on image data in the training sample through the information extraction model to be trained to obtain an image feature vector corresponding to the image data;
identifying crown word number information of the image data in the training sample based on the image feature vector through the information extraction model to be trained to obtain an identification result of the image data;
and adjusting parameters of the information extraction model to be trained based on the recognition result and the label of the image data to obtain the pre-trained information extraction model.
And 102, comparing the target crown word number information with preset crown word number information marked as counterfeit money in a database in advance.
The preset crown word number information is artificially constructed in advance and stored in a database, and the preset crown word number information is marked as counterfeit money. The target crown word number information is compared with the preset crown word number information in the database, whether the preset crown word number information which is matched with the target crown word number information in a consistent mode exists in the database or not is checked, whether the money to be identified corresponding to the target crown word number information is counterfeit money or not can be determined, and the counterfeit money is automatically identified.
Step 103, if preset crown word number information consistent with the target crown word number information exists in the database, marking the currency to be identified corresponding to the target crown word number information as counterfeit currency.
When the preset crown word number information consistent with the target crown word number information exists in the database, the currency to be identified corresponding to the target crown word number information is indicated to be a counterfeit currency, and at the moment, the currency to be identified corresponding to the target crown word number information is marked as the counterfeit currency.
In some embodiments, in order to continuously expand the preset crown word number information in the database to improve the accuracy of automatic counterfeit money identification, the target crown word number information corresponding to the counterfeit money may be stored in the database and the database may be updated.
And 104, acquiring market circulation information of the counterfeit money, and determining historical user information of the counterfeit money according to the market circulation information.
The market circulation information refers to transaction data generated by transaction in the circulation process of the counterfeit money, and specifically comprises the transaction occurrence place, the transaction occurrence time and counterfeit money user information. And when the currency is still circulated in the market after being identified as the counterfeit currency, the counterfeit currency generates corresponding transaction data after being identified by the terminal equipment provided with the counterfeit currency control program, and the market circulation information with a time chain relation is generated by integrating the transaction data of each counterfeit currency.
Based on the market circulation information of the counterfeit money, the historical user information of the counterfeit money can be determined, and whether to perform accountability on the current user of the counterfeit money can be judged according to the historical user information and the current user information.
Step 105, determining whether to send out warning information based on the historical user information and the current user information.
If the historical user information is consistent with the current user information, acquiring transaction data of the counterfeit money, and judging whether a counterfeit money exchange record exists in the transaction data. Specifically, if there is a counterfeit money refund record in the transaction data, it is determined that the user of the counterfeit money uses the counterfeit money under an informed condition, and a duty is performed on the current user of the counterfeit money.
It should be noted that the counterfeit money refund record means that the money is refunded to the money user after being recognized as counterfeit money by the cashier system, and in general, the cashier system issues a prompt message to the cashier after recognizing that the money to be recognized is counterfeit money, and lets the cashier inform the money user that the money is counterfeit money and the reason for refund, and at the same time, generates a counterfeit money refund record about the counterfeit money and uploads the counterfeit money refund record to the server for storing counterfeit money information.
In some embodiments, after determining that the user of the counterfeit money uses the counterfeit money under the informed condition, a warning message is sent to the current user of the counterfeit money, and the transaction data of the counterfeit money exists after the warning message is bound with the current user. When the historical user information is consistent with the current user information and warning information bound with the current user exists in the transaction data of the counterfeit money, the situation that the current user still uses the counterfeit money under the condition of being warned is shown, the situation can be considered to be serious, in order to severely punish the counterfeit money user, a credit record uploading credit system can be generated, and punishment is carried out on the counterfeit money user.
All the above optional technical solutions may be combined arbitrarily to form optional embodiments of the present application, and are not described herein again.
In specific implementation, the present application is not limited by the execution sequence of the described steps, and some steps may be performed in other sequences or simultaneously without conflict.
As can be seen from the above, in the counterfeit money control method provided in the embodiment of the present application, the target crown word number information of the money to be identified is obtained, the target crown word number information is compared with the preset crown word number information that is marked as a counterfeit money in advance in the database, if the preset crown word number information that is consistent with the target crown word number information exists in the database, the money to be identified corresponding to the target crown word number information is marked as a counterfeit money, the market circulation information of the counterfeit money is obtained, the historical user information of the counterfeit money is determined according to the market circulation information, and whether warning information is sent out is determined based on the historical user information and the current user information. By utilizing the counterfeit money control method provided by the embodiment of the application, the circulation node and the user information of the counterfeit money can be positioned by introducing a counterfeit money life cycle tracking mechanism, whether the counterfeit money user intends or not can be identified, and the impact on the user who intentionally uses the counterfeit money is enhanced.
The embodiment of the application also provides a counterfeit money control device, which can be integrated in the terminal equipment.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a counterfeit money management and control device according to an embodiment of the present application. The counterfeit money management and control device 30 may include:
the information acquisition module 31 is used for acquiring the target crown word number information of the currency to be identified;
the information comparison module 32 is used for comparing the target crown word number information with preset crown word number information marked as counterfeit money in a database in advance;
the information marking module 33 is configured to mark the money to be identified corresponding to the target crown word number information as a counterfeit money if preset crown word number information consistent with the target crown word number information exists in the database;
the information determining module 34 is used for acquiring market circulation information of the counterfeit money and determining historical user information of the counterfeit money according to the market circulation information;
and a responsibility judgment module 35, configured to judge whether to send out a warning message based on the historical user information and the current user information.
In some embodiments, the information obtaining module 31 is configured to input the currency to be recognized into a trained information extraction model for information extraction, so as to obtain information of a target crown word number in the currency to be recognized.
In some embodiments, the device further comprises an information generation module for recording transaction data of the counterfeit money, wherein the transaction data comprises a transaction occurrence place, a transaction occurrence time and counterfeit money user information; and integrating the transaction data of each counterfeit money to generate market circulation information with a time chain relation.
In some embodiments, the responsibility determining module 35 is configured to, if the historical user information is consistent with the current user information, obtain transaction data of the counterfeit money, and determine whether a counterfeit money refund record exists in the transaction data; and if the counterfeit money refund record exists in the transaction data, judging that the user of the counterfeit money uses the counterfeit money under the condition of knowing the situation, and issuing warning information.
In some embodiments, the device further comprises a warning module for sending warning information to the current user of the counterfeit money, and the transaction data of the counterfeit money exists after the warning information is bound with the current user.
In some embodiments, the apparatus further includes a penalty module, configured to generate a credit record on the credit record and acquire a credit system if the historical user information is consistent with the current user information and there is warning information bound to the current user in the transaction data of the counterfeit money.
In some embodiments, the apparatus further includes an updating module, configured to store the target crown word size information corresponding to the counterfeit currency in the database and update the database.
In specific implementation, the modules may be implemented as independent entities, or may be combined arbitrarily and implemented as one or several entities.
As can be seen from the above, in the counterfeit money management and control apparatus 30 provided in the embodiment of the present application, the information obtaining module 31 is configured to obtain the target crown word number information of the money to be identified; the information comparison module 32 is configured to compare the target crown word number information with preset crown word number information marked as counterfeit money in a database in advance; the information marking module 33 is configured to mark the money to be identified corresponding to the target crown word number information as a counterfeit money if preset crown word number information consistent with the target crown word number information exists in the database; the information determining module 34 is configured to obtain market circulation information of the counterfeit money, and determine historical user information of the counterfeit money according to the market circulation information; the responsibility determination module 35 is configured to determine whether to issue a warning message based on the historical user information and the current user information.
Referring to fig. 3, fig. 3 is another structural schematic diagram of a counterfeit money management and control apparatus according to an embodiment of the present disclosure, in which the counterfeit money management and control apparatus 30 includes a memory 120, one or more processors 180, and one or more applications, where the one or more applications are stored in the memory 120 and configured to be executed by the processor 180; the processor 180 may include an information acquisition module 31, an information comparison module 32, an information tagging module 33, an information determination module 34, and a responsibility determination module 35. For example, the structures and connection relationships of the above components may be as follows:
the memory 120 may be used to store applications and data. The memory 120 stores applications containing executable code. The application programs may constitute various functional modules. The processor 180 executes various functional applications and data processing by running the application programs stored in the memory 120. Further, the memory 120 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 120 may also include a memory controller to provide the processor 180 with access to the memory 120.
The processor 180 is a control center of the device, connects various parts of the entire terminal using various interfaces and lines, performs various functions of the device and processes data by running or executing an application program stored in the memory 120 and calling data stored in the memory 120, thereby monitoring the entire device. Optionally, processor 180 may include one or more processing cores; preferably, the processor 180 may integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, an application program, and the like.
Specifically, in this embodiment, the processor 180 loads the executable code corresponding to the process of one or more application programs into the memory 120 according to the following instructions, and the processor 180 runs the application programs stored in the memory 120, thereby implementing various functions:
an information obtaining module 31, configured to obtain target prefix number information of the currency to be identified;
the information comparison module 32 is used for comparing the target crown word number information with preset crown word number information marked as counterfeit money in a database in advance;
the information marking module 33 is configured to mark the money to be identified corresponding to the target crown word number information as a counterfeit money if preset crown word number information consistent with the target crown word number information exists in the database;
the information determining module 34 is used for acquiring market circulation information of the counterfeit money and determining historical user information of the counterfeit money according to the market circulation information;
and a responsibility judgment module 35, configured to judge whether to send out a warning message based on the historical user information and the current user information.
The embodiment of the application also provides the terminal equipment. The terminal device can be a server, a smart phone, a computer, a tablet computer and the like.
Referring to fig. 4, fig. 4 shows a schematic structural diagram of a terminal device provided in the embodiment of the present application, where the terminal device may be used to implement the counterfeit money management and control method provided in the embodiment. The terminal device 1200 may be a television, a smart phone, or a tablet computer.
As shown in fig. 4, the terminal device 1200 may include an RF (Radio Frequency) circuit 110, a memory 120 including one or more computer-readable storage media (only one shown in the figure), an input unit 130, a display unit 140, a sensor 150, an audio circuit 160, a transmission module 170, a processor 180 including one or more processing cores (only one shown in the figure), and a power supply 190. Those skilled in the art will appreciate that the terminal device 1200 configuration shown in fig. 4 does not constitute a limitation of terminal device 1200, and may include more or fewer components than those shown, or some components in combination, or a different arrangement of components. Wherein:
the RF circuit 110 is used for receiving and transmitting electromagnetic waves, and implementing interconversion between the electromagnetic waves and electrical signals, so as to communicate with a communication network or other devices. The RF circuitry 110 may include various existing circuit elements for performing these functions, such as an antenna, a radio frequency transceiver, a digital signal processor, an encryption/decryption chip, a Subscriber Identity Module (SIM) card, memory, and so forth. The RF circuitry 110 may communicate with various networks such as the internet, an intranet, a wireless network, or with other devices over a wireless network.
The memory 120 may be configured to store a software program and a module, such as a program instruction/module corresponding to the counterfeit money management and control method in the foregoing embodiment, and the processor 180 executes various functional applications and data processing by operating the software program and the module stored in the memory 120, and may automatically select a vibration alert mode according to a current scene where the terminal device is located to perform counterfeit money management and control, which may not only ensure that a scene such as a conference is not disturbed, but also ensure that a user may sense an incoming call, and thus, intelligence of the terminal device is improved. Memory 120 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 120 can further include memory located remotely from the processor 180, which can be connected to the terminal device 1200 through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input unit 130 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. In particular, the input unit 130 may include a touch-sensitive surface 131 as well as other input devices 132. The touch-sensitive surface 131, also referred to as a touch-sensitive display screen or a touch pad, may collect touch operations by a user on or near the touch-sensitive surface 131 (e.g., operations by a user on or near the touch-sensitive surface 131 using any suitable object or attachment such as a finger, a stylus, etc.) and drive the corresponding connection device according to a predetermined program. Alternatively, the touch sensitive surface 131 may comprise two parts, a touch detection device and a touch controller. The touch detection device detects a touch direction of a user, detects a signal brought by touch operation, and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 180, and can receive and execute commands sent by the processor 180. Additionally, the touch sensitive surface 131 may be implemented using various types of resistive, capacitive, infrared, and surface acoustic waves. In addition to the touch-sensitive surface 131, the input unit 130 may also include other input devices 132. In particular, other input devices 132 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 140 may be used to display information input by a user or information provided to the user and various graphic user interfaces of the terminal apparatus 1200, which may be configured by graphics, text, icons, video, and any combination thereof. The Display unit 140 may include a Display panel 141, and optionally, the Display panel 141 may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like. Further, touch sensitive surface 131 may overlay display panel 141, and when touch sensitive surface 131 detects a touch operation on or near touch sensitive surface 131, it may be transmitted to processor 180 to determine the type of touch event, and then processor 180 may provide a corresponding visual output on display panel 141 according to the type of touch event. Although in FIG. 4, touch-sensitive surface 131 and display panel 141 are shown as two separate components to implement input and output functions, in some embodiments, touch-sensitive surface 131 may be integrated with display panel 141 to implement input and output functions.
The terminal device 1200 may also include at least one sensor 150, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel 141 according to the brightness of ambient light, and a proximity sensor that may turn off the display panel 141 and/or the backlight when the terminal device 1200 is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when the mobile phone is stationary, and can be used for applications of recognizing the posture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which may be further configured in the terminal device 1200, further description is omitted here.
The audio circuitry 160, speaker 161, and microphone 162 may provide an audio interface between a user and the terminal device 1200. The audio circuit 160 may transmit the electrical signal converted from the received audio data to the speaker 161, and convert the electrical signal into a sound signal for output by the speaker 161; on the other hand, the microphone 162 converts the collected sound signal into an electrical signal, which is received by the audio circuit 160 and converted into audio data, and then the audio data is processed by the audio data output processor 180, and then sent to another terminal via the RF circuit 110, or the audio data is output to the memory 120 for further processing. The audio circuitry 160 may also include an earbud jack to provide communication of peripheral headphones with the terminal device 1200.
The terminal device 1200, which may assist the user in sending and receiving e-mails, browsing web pages, accessing streaming media, etc., through the transmission module 170 (e.g., wi-Fi module), provides the user with wireless broadband internet access. Although fig. 4 shows the transmission module 170, it is understood that it does not belong to the essential constitution of the terminal device 1200, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 180 is a control center of the terminal device 1200, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the terminal device 1200 and processes data by running or executing software programs and/or modules stored in the memory 120 and calling data stored in the memory 120, thereby performing overall monitoring of the mobile phone. Optionally, processor 180 may include one or more processing cores; in some embodiments, the processor 180 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 180.
Terminal device 1200 also includes a power supply 190 for powering the various components, which in some embodiments may be logically coupled to processor 180 via a power management system to manage power discharge and power consumption via the power management system. The power supply 190 may also include any component including one or more of a dc or ac power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
Although not shown, the terminal device 1200 may further include a camera (e.g., a front camera, a rear camera), a bluetooth module, and the like, which are not described in detail herein. Specifically, in this embodiment, the display unit 140 of the terminal device 1200 is a touch screen display, and the terminal device 1200 further includes a memory 120 and one or more programs, wherein the one or more programs are stored in the memory 120 and configured to be executed by the one or more processors 180, and the one or more programs include instructions for:
an information acquisition instruction, which is used for acquiring the target prefix number information of the currency to be identified;
an information comparison instruction, which is used for comparing the target crown word number information with preset crown word number information marked as counterfeit money in a database in advance;
an information marking instruction, configured to mark, if preset crown word number information that is consistent with the target crown word number information exists in the database, a currency to be identified corresponding to the target crown word number information as a counterfeit currency;
the information determining instruction is used for acquiring market circulation information of the counterfeit money and determining historical user information of the counterfeit money according to the market circulation information;
and the responsibility judgment instruction is used for judging whether to send out warning information or not based on the historical user information and the current user information.
In some embodiments, the information obtaining instruction is configured to input the currency to be recognized into a trained information extraction model for information extraction operation, so as to obtain information of a target crown word number in the currency to be recognized.
In some embodiments, the program further comprises information generating instructions for recording transaction data of the counterfeit money, wherein the transaction data comprises transaction occurrence place, transaction occurrence time and counterfeit money user information; and integrating the transaction data of each counterfeit money to generate market circulation information with a time chain relation.
In some embodiments, the responsibility judgment instruction is configured to, if the historical user information is consistent with the current user information, obtain transaction data of the counterfeit money, and judge whether a counterfeit money refund record exists in the transaction data; and if the counterfeit money refund record exists in the transaction data, judging that the user of the counterfeit money uses the counterfeit money under the condition of knowing the situation, and issuing warning information.
In some embodiments, the program further comprises warning instructions for issuing a warning message to a current user of the counterfeit money, and binding the warning message with the current user to obtain the transaction data of the counterfeit money.
In some embodiments, the program further comprises a penalty instruction for generating a credit system on the credit record if the historical user information is consistent with the current user information and warning information bound with the current user exists in the transaction data of the counterfeit money.
In some embodiments, the program further comprises an update instruction for storing the target crown word number information corresponding to the counterfeit currency in the database and updating the database.
The embodiment of the application further provides the terminal equipment. The terminal equipment can be equipment such as a smart phone and a computer.
As can be seen from the above, an embodiment of the present application provides a terminal device 1200, where the terminal device 1200 executes the following steps:
acquiring target prefix number information of the currency to be identified;
comparing the target crown word number information with preset crown word number information marked as counterfeit money in a database in advance;
if preset crown word number information consistent with the target crown word number information exists in the database, marking the currency to be identified corresponding to the target crown word number information as a counterfeit currency;
obtaining market circulation information of the counterfeit money, and determining historical user information of the counterfeit money according to the market circulation information;
and judging whether to send out warning information or not based on the historical user information and the current user information.
An embodiment of the present application further provides a storage medium, where a computer program is stored in the storage medium, and when the computer program runs on a computer, the computer executes the counterfeit money management and control method according to any one of the above embodiments.
It should be noted that, for the counterfeit money management and control method described in the present application, it can be understood by a person skilled in the art that all or part of the process of implementing the counterfeit money management and control method described in the present application can be completed by controlling the relevant hardware through a computer program, where the computer program can be stored in a computer readable storage medium, such as a memory of a terminal device, and executed by at least one processor in the terminal device, and the process of executing the process may include the process of the embodiment of the counterfeit money management and control method. The storage medium may be a magnetic disk, an optical disk, a Read Only Memory (ROM), a Random Access Memory (RAM), or the like.
For the counterfeit money management and control device in the embodiment of the present application, each functional module may be integrated in one processing chip, or each module may exist alone physically, or two or more modules are integrated in one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium, such as a read-only memory, a magnetic or optical disk, or the like.
The counterfeit money management and control method, device, medium and apparatus provided by the embodiments of the present application are described in detail above. The principle and the embodiment of the present application are explained by applying specific examples, and the above description of the embodiments is only used to help understand the method and the core idea of the present application; meanwhile, for those skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A counterfeit money management and control method is characterized by comprising the following steps:
acquiring target crown word number information of the currency to be identified;
comparing the target crown word number information with preset crown word number information marked as counterfeit money in a database in advance;
if preset crown word number information consistent with the target crown word number information exists in the database, marking the currency to be identified corresponding to the target crown word number information as a counterfeit currency;
acquiring market circulation information of the counterfeit money, and determining historical user information of the counterfeit money according to the market circulation information;
and judging whether to send out warning information or not based on the historical user information and the current user information.
2. The counterfeit money management and control method according to claim 1, wherein the acquiring of the target crown word number information of the money to be recognized includes:
and inputting the currency to be recognized into a trained information extraction model for information extraction operation to obtain the target prefix number information in the currency to be recognized.
3. A counterfeit money management method according to claim 1, wherein before the acquiring market circulation information of the counterfeit money, the method further comprises:
recording transaction data of the counterfeit money, wherein the transaction data comprises a transaction occurrence place, transaction occurrence time and counterfeit money user information;
and integrating the transaction data of each counterfeit money to generate market circulation information with a time chain relation.
4. The counterfeit money management and control method according to claim 1, wherein the determining whether to issue warning information based on the historical user information and the current user information includes:
if the historical user information is consistent with the current user information, acquiring transaction data of the counterfeit money, and judging whether a counterfeit money refund record exists in the transaction data;
and if the transaction data contains the counterfeit money refund record, judging that the user of the counterfeit money uses the counterfeit money under the informed condition, and sending out alarm information.
5. A counterfeit money management and control method according to claim 4, wherein said issuing of a warning message after said determination that the user of the counterfeit money uses counterfeit money under an informed condition comprises:
and sending warning information to the current user of the counterfeit money, and binding the warning information with the current user to obtain the transaction data of the counterfeit money.
6. A counterfeit money management and control method according to claim 5, further comprising:
and if the historical user information is consistent with the current user information and warning information bound with the current user exists in the transaction data of the counterfeit money, generating credit records and uploading the credit records to a credit investigation system.
7. The counterfeit currency management and control method according to claim 1, further comprising:
and storing the target crown word number information corresponding to the counterfeit money into the database and updating the database.
8. A counterfeit money management and control apparatus, comprising:
the information acquisition module is used for acquiring the target crown word number information of the currency to be identified;
the information comparison module is used for comparing the target crown word number information with preset crown word number information marked as counterfeit money in a database in advance;
the information marking module is used for marking the currency to be identified corresponding to the target prefix number information as counterfeit currency if preset prefix number information consistent with the target prefix number information exists in the database;
the information determining module is used for acquiring market circulation information of the counterfeit money and determining historical user information of the counterfeit money according to the market circulation information;
and the responsibility judgment module is used for judging whether to send out warning information or not based on the historical user information and the current user information.
9. A computer-readable storage medium storing a plurality of instructions, the instructions being suitable for being loaded by a processor to execute the counterfeit money management method according to any one of claims 1 to 7.
10. A terminal device comprising a processor and a memory, the memory storing a plurality of instructions, the processor loading the instructions to execute the counterfeit money management method according to any one of claims 1 to 7.
CN202211142163.4A 2022-09-20 2022-09-20 Counterfeit money management and control method, device, medium and equipment Pending CN115511598A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211142163.4A CN115511598A (en) 2022-09-20 2022-09-20 Counterfeit money management and control method, device, medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211142163.4A CN115511598A (en) 2022-09-20 2022-09-20 Counterfeit money management and control method, device, medium and equipment

Publications (1)

Publication Number Publication Date
CN115511598A true CN115511598A (en) 2022-12-23

Family

ID=84503023

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211142163.4A Pending CN115511598A (en) 2022-09-20 2022-09-20 Counterfeit money management and control method, device, medium and equipment

Country Status (1)

Country Link
CN (1) CN115511598A (en)

Similar Documents

Publication Publication Date Title
CN108345819B (en) Method and device for sending alarm message
CN110224870B (en) Interface monitoring method and device, computing equipment and storage medium
CN106464502A (en) Methods and systems for authentication of a communication device
CN111209377A (en) Text processing method, device, equipment and medium based on deep learning
CN111065086A (en) SIM (subscriber identity module) identification method and device, storage medium and mobile terminal
CN110909264B (en) Information processing method, device, equipment and storage medium
CN112231144A (en) Data processing method and device and electronic equipment
CN113190646A (en) User name sample labeling method and device, electronic equipment and storage medium
CN111007980A (en) Information input method and terminal equipment
CN114626036B (en) Information processing method and device based on face recognition, storage medium and terminal
CN115171222B (en) Behavior detection method and device, computer equipment and storage medium
CN116307394A (en) Product user experience scoring method, device, medium and equipment
CN115511598A (en) Counterfeit money management and control method, device, medium and equipment
CN115600213A (en) Vulnerability management method, device, medium and equipment based on application program
CN115330522A (en) Credit card approval method and device based on clustering, electronic equipment and medium
CN111158572B (en) Interaction method and electronic equipment
CN110856173B (en) Network access method and device and electronic equipment
CN110442361B (en) Gray release method and device and electronic equipment
CN113360908A (en) Data processing method, violation recognition model training method and related equipment
CN112633770A (en) Asset state judgment method and device, storage medium and electronic equipment
CN115205023A (en) Bill data monitoring method, device, medium and equipment
CN116486121A (en) Image verification method, device, medium and equipment
CN115344613A (en) Accuracy optimization method, apparatus, medium, and device based on bill data inspection
CN115344484A (en) Method, device, medium and equipment for optimizing test resources based on bill inspection
CN115344413A (en) Bill abnormal problem positioning method, device, medium and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination