CN116843389A - Financial room access control system, method and storage medium - Google Patents
Financial room access control system, method and storage medium Download PDFInfo
- Publication number
- CN116843389A CN116843389A CN202310658008.6A CN202310658008A CN116843389A CN 116843389 A CN116843389 A CN 116843389A CN 202310658008 A CN202310658008 A CN 202310658008A CN 116843389 A CN116843389 A CN 116843389A
- Authority
- CN
- China
- Prior art keywords
- information
- target
- recommended
- door opening
- resource
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000012790 confirmation Methods 0.000 claims abstract description 77
- 238000012502 risk assessment Methods 0.000 claims description 68
- 238000004891 communication Methods 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 12
- 238000012216 screening Methods 0.000 claims description 4
- 238000013473 artificial intelligence Methods 0.000 abstract description 2
- 239000000047 product Substances 0.000 description 46
- 238000007726 management method Methods 0.000 description 34
- 238000004458 analytical method Methods 0.000 description 17
- 238000012545 processing Methods 0.000 description 16
- 238000011156 evaluation Methods 0.000 description 15
- 230000006870 function Effects 0.000 description 15
- 238000010586 diagram Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 7
- 230000003044 adaptive effect Effects 0.000 description 5
- 230000009286 beneficial effect Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000006978 adaptation Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 239000012467 final product Substances 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000005389 magnetism Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- 229910021389 graphene Inorganic materials 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 239000010970 precious metal Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
- G06Q30/0255—Targeted advertisements based on user history
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/02—Reservations, e.g. for tickets, services or events
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
- G06Q30/0267—Wireless devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
- G06Q30/0269—Targeted advertisements based on user profile or attribute
- G06Q30/0271—Personalized advertisement
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Asset management; Financial planning or analysis
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/23—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Marketing (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Human Resources & Organizations (AREA)
- Operations Research (AREA)
- Technology Law (AREA)
- Tourism & Hospitality (AREA)
- Computer Networks & Wireless Communication (AREA)
- Quality & Reliability (AREA)
- Human Computer Interaction (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The application relates to a financial room access control system, a financial room access control method and a storage medium. Can be used in the field of artificial intelligence. The system comprises: the scanner scans the graphic code to acquire and send a target mobile phone number corresponding to a target client terminal in a preset range of the access control to the server; when a binding account exists in a target mobile phone number, the server sends a door opening instruction to the access controller, a target account identifier corresponding to the target client terminal is determined based on the target mobile phone number, historical resource operation information corresponding to the target client terminal is inquired and analyzed based on the target account identifier, and resource information to be recommended is obtained and sent to the handheld terminal; the door control controller receives and generates door opening confirmation information based on the door opening instruction, and sends the door opening confirmation information to the handheld terminal; when the financial room corresponding to the door opening confirmation information is empty, the handheld terminal sends an unlocking signal to the electromagnetic lock so that the electromagnetic lock executes door opening operation; and displaying the resource information to be recommended. By adopting the method, the service performance of the financial room access control system can be improved.
Description
Technical Field
The application relates to the technical field of computers, in particular to a financial room access control system, a financial room access control method and a financial room access control storage medium.
Background
At present, in order to serve high-end financial clients, each bank website is provided with a financial room, precious metals, souvenirs, exclusive cards, financial products and the like are shown in the financial room, the clients can reserve corresponding financial services, and after the clients enter the financial room, the financial manager can recommend related products according to simple conversations with the clients. However, the existing financial room access control system has fewer functions and lower performance, and cannot provide more convenient service for clients, so that the service performance of the financial room access control system is lower.
Disclosure of Invention
Based on the above, it is necessary to provide a financial room access control system, a method and a storage medium capable of realizing client resource directionality recommendation, for improving service performance of the financial room access control system.
A financial room access control system, the system comprising:
the scanner is used for acquiring a target mobile phone number corresponding to a target client terminal in a preset range of the access control through scanning the graphic code, and sending the target mobile phone number to the server;
when the target mobile phone number has a binding account, the server sends a door opening instruction to the access controller, determines a target account identifier corresponding to the target client terminal based on the target mobile phone number, inquires historical resource operation information of the target client terminal based on the target account identifier, analyzes the historical resource operation information to obtain resource information to be recommended, and sends the resource information to be recommended to the handheld terminal;
The access controller receives the door opening instruction, generates door opening confirmation information based on the door opening instruction, and sends the door opening confirmation information to the handheld terminal;
the handheld terminal receives the door opening confirmation information, and when the financial room corresponding to the door opening confirmation information is in an idle state, an unlocking signal is sent to the electromagnetic lock so that the electromagnetic lock can execute door opening operation;
the handheld terminal is also used for displaying the resource information to be recommended.
In one embodiment, the financial room access control system further comprises an identity authentication device; the server is further used for sending a reauthentication signal to the identity authentication device when the target mobile phone number does not have a binding account.
In one embodiment, the identity authentication device is configured to receive the re-authentication signal, select a target authentication mode from candidate authentication modes, and perform an identity authentication operation based on the target authentication mode, where the candidate authentication modes include a service credential authentication mode and a biometric authentication mode.
In one embodiment, the server interacts with a plurality of financial chambers and a plurality of handheld terminals; the financial management room comprises a scanner, an access controller, an electromagnetic lock and an identity authentication device.
In one embodiment, the server is further configured to obtain risk assessment information corresponding to the target client terminal from the historical resource operation information, perform risk assessment operation based on the risk assessment information to obtain a target risk assessment level, and screen resources with risk assessment threshold levels corresponding to various resources being less than or equal to the target risk assessment level as recommended resources to be optimized; and acquiring historical holding resource information corresponding to the target client terminal from the historical resource operation information, and when resources meeting non-recommended resource limiting conditions exist in the historical holding resource information and the resources are recommended resources to be optimized, eliminating the resources meeting the non-recommended resource limiting conditions from the resources to be optimized to obtain the resources to be recommended, and taking the resource information corresponding to the resources to be recommended as the resource information to be recommended.
In one embodiment, the non-recommended resource restrictions include a limit on amount, a limit on number of purchases, an age restriction, a ratio restriction, and an account type restriction.
In one embodiment, the handheld terminal is further configured to send a service valuation message to the target client terminal via 5G communication; and sending an unlocking signal to the electromagnetic lock so that the electromagnetic lock can execute door opening operation.
A financial room access control method, the method comprising:
scanning the scanning graphic code through a scanner to obtain a target mobile phone number corresponding to a target client terminal in a preset range of the access control, and sending the target mobile phone number to a server;
when a binding account exists in the target mobile phone number, sending a door opening instruction to an access controller through the server, determining a target account identifier corresponding to the target client terminal based on the target mobile phone number, inquiring historical resource operation information corresponding to the target client terminal based on the target account identifier, analyzing the historical resource operation information to obtain resource information to be recommended, and sending the resource information to be recommended to a handheld terminal;
receiving the door opening instruction through the door access controller, generating door opening confirmation information based on the door opening instruction, and sending the door opening confirmation information to the handheld terminal;
the hand-held terminal receives the door opening confirmation information, and when a financial room corresponding to the door opening confirmation information is in an idle state, an unlocking signal is sent to the electromagnetic lock so that the electromagnetic lock executes door opening operation; and displaying the resource information to be recommended.
In one embodiment, analyzing the historical resource operation information to obtain the resource information to be recommended includes:
acquiring risk assessment information corresponding to the target client terminal from the historical resource operation information through the server, performing risk assessment operation based on the risk assessment information to obtain a target risk assessment level, and screening resources with risk assessment threshold levels smaller than or equal to the target risk assessment level corresponding to various resources as recommended resources to be optimized;
and acquiring historical holding resource information corresponding to the target client terminal from the historical resource operation information, and when resources meeting non-recommended resource limiting conditions exist in the historical holding resource information and the resources are recommended resources to be optimized, eliminating the resources meeting the non-recommended resource limiting conditions from the resources to be optimized to obtain the resources to be recommended, and taking the resource information corresponding to the resources to be recommended as the resource information to be recommended.
A financial room access control device, the device comprising:
the scanning module is used for scanning the scanning graphic code through the scanner, obtaining a target mobile phone number corresponding to a target client terminal in a preset range of the access control, and sending the target mobile phone number to the server;
The analysis module is used for sending a door opening instruction to the access controller when the binding account exists in the target mobile phone number through the server, determining a target account identifier corresponding to the target client terminal based on the target mobile phone number, inquiring historical resource operation information corresponding to the target client terminal based on the target account identifier, analyzing the historical resource operation information to obtain resource information to be recommended, and sending the resource information to be recommended to the handheld terminal;
the door opening confirmation module is used for receiving the door opening instruction through the door control controller, generating door opening confirmation information based on the door opening instruction, and sending the door opening confirmation information to the handheld terminal;
the door opening module is used for receiving the door opening confirmation information through the handheld terminal, and sending an unlocking signal to the electromagnetic lock when the financial room corresponding to the door opening confirmation information is in an idle state so as to enable the electromagnetic lock to execute door opening operation; and displaying the resource information to be recommended.
A computer device comprising a memory storing a computer program and a processor which when executing the computer program performs the steps of:
Scanning the scanning graphic code through a scanner to obtain a target mobile phone number corresponding to a target client terminal in a preset range of the access control, and sending the target mobile phone number to a server;
when a binding account exists in the target mobile phone number, sending a door opening instruction to an access controller through the server, determining a target account identifier corresponding to the target client terminal based on the target mobile phone number, inquiring historical resource operation information corresponding to the target client terminal based on the target account identifier, analyzing the historical resource operation information to obtain resource information to be recommended, and sending the resource information to be recommended to a handheld terminal;
receiving the door opening instruction through the door access controller, generating door opening confirmation information based on the door opening instruction, and sending the door opening confirmation information to the handheld terminal;
the hand-held terminal receives the door opening confirmation information, and when a financial room corresponding to the door opening confirmation information is in an idle state, an unlocking signal is sent to the electromagnetic lock so that the electromagnetic lock executes door opening operation; and displaying the resource information to be recommended.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
Scanning the scanning graphic code through a scanner to obtain a target mobile phone number corresponding to a target client terminal in a preset range of the access control, and sending the target mobile phone number to a server;
when a binding account exists in the target mobile phone number, sending a door opening instruction to an access controller through the server, determining a target account identifier corresponding to the target client terminal based on the target mobile phone number, inquiring historical resource operation information corresponding to the target client terminal based on the target account identifier, analyzing the historical resource operation information to obtain resource information to be recommended, and sending the resource information to be recommended to a handheld terminal;
receiving the door opening instruction through the door access controller, generating door opening confirmation information based on the door opening instruction, and sending the door opening confirmation information to the handheld terminal;
the hand-held terminal receives the door opening confirmation information, and when a financial room corresponding to the door opening confirmation information is in an idle state, an unlocking signal is sent to the electromagnetic lock so that the electromagnetic lock executes door opening operation; and displaying the resource information to be recommended.
According to the financial room access control system, the method, the device, the computer equipment and the storage medium, the target mobile phone number corresponding to the target client terminal in the preset range of the access control is obtained through scanning the graphic code by the scanner, and the target mobile phone number is sent to the server; when the target mobile phone number has a binding account, the server sends a door opening instruction to the access controller, determines a target account identifier corresponding to the target client terminal based on the target mobile phone number, inquires historical resource operation information corresponding to the target client terminal based on the target account identifier, analyzes the historical resource operation information to obtain resource information to be recommended, and sends the resource information to be recommended to the handheld terminal; the access controller receives the door opening instruction, generates door opening confirmation information based on the door opening instruction, and sends the door opening confirmation information to the handheld terminal; the handheld terminal receives the door opening confirmation information, and when the financial room corresponding to the door opening confirmation information is in an idle state, an unlocking signal is sent to the electromagnetic lock so that the electromagnetic lock can execute door opening operation; the handheld terminal is further used for displaying the resource information to be recommended, the graphic code is scanned within the preset range of the access control through the scanner, the target mobile phone number corresponding to the target client terminal is obtained, the target mobile phone number is sent to the server, the server analyzes the target mobile phone number, when a binding account exists in the target mobile phone number, a door opening command is sent to the access control controller, a target account identifier corresponding to the target client terminal is determined based on the target mobile phone number, historical resource operation information corresponding to the target client terminal is inquired according to the target account identifier, the historical resource operation information is analyzed, the resource information to be recommended is obtained and sent to the handheld terminal for displaying, meanwhile, the door opening controller sends door opening confirmation information to the handheld terminal after receiving the door opening command, so that the handheld terminal sends unlocking signals to the electromagnetic lock when a corresponding financial room under the door opening confirmation information is in an idle state, the electromagnetic lock is enabled to execute door opening operation, the control of the financial room access control system and the recommended resources are well perfected, the functions of the financial room access control system are enriched, and the service performance of the access control system is better.
Drawings
FIG. 1 is an application environment diagram of a financial room access control system in one embodiment;
FIG. 2 is a flow chart of a method for controlling entrance guard of a financial room in one embodiment;
FIG. 3 is a flow diagram of risk assessment in one embodiment;
FIG. 4 is a schematic deployment diagram of a financial institution entrance guard system in one embodiment;
FIG. 5 is a block diagram of a financial room entrance guard control device in one embodiment;
fig. 6 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The financial room access control system and method provided by the embodiment of the application can be applied to an application environment shown in fig. 1. Wherein 102 represents a server; 104 represents a handheld terminal; 106 represents a client terminal; 108 represents a financial management room, 108A represents a scanner, 108B represents an electromagnetic lock, 108C represents an identity authentication device, and 108D represents an access controller. Further, the handheld terminal 104, the client terminal 106, and the financial institution 108 are not limited to those illustrated in FIG. 1. The server 104, the handheld terminal 104, the client terminal 106, and the scanner 108A, the electromagnetic lock 108B, the authentication device 108C, and the access controller 108D in the financial room 108 communicate via a network, which may be a 5G communication technology. The data storage system may store data that the server 104 needs to process. The data storage system may be integrated on the server 104 or may be located on a cloud or other network server. The scanner 108A is configured to obtain, by scanning the graphic code, a target mobile phone number corresponding to a target client terminal within a preset range of the access control, and send the target mobile phone number to the server. The server 102 is configured to send a door opening instruction to the access controller when a binding account exists in the target mobile phone number, determine a target account identifier corresponding to the target client terminal based on the target mobile phone number, query historical resource operation information corresponding to the target client terminal based on the target account identifier, analyze the historical resource operation information, obtain resource information to be recommended, and send the resource information to be recommended to the handheld terminal. The door controller 108D is configured to receive a door opening command, generate door opening confirmation information based on the door opening command, and send the door opening confirmation information to the handheld terminal. The handheld terminal 104 is configured to receive the door opening confirmation information, and send an unlocking signal to the electromagnetic lock when the financial room corresponding to the door opening confirmation information is in an idle state, so that the electromagnetic lock performs a door opening operation. The handheld terminal 104 is further configured to display resource information to be recommended. The client terminal 106 is configured to input reservation information and transmit a reservation request. The client terminal 106 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices, portable wearable devices, and the like. The server 102 may be implemented as a stand-alone server or as a server cluster of multiple servers. The handheld terminal 104 may be, but is not limited to, a handheld smart PAD (portable android device) or other smart terminal.
The financial room access control system, method and storage medium of the present application include, but are not limited to, those used in the field of artificial intelligence and in the field of finance.
In one embodiment, as shown in fig. 2, a financial room access control system is provided, and the method is applied to the system in fig. 1 for illustration, where the system includes:
and the scanner is used for acquiring a target mobile phone number corresponding to the target client terminal in the preset range of the access control through scanning the graphic code, and sending the target mobile phone number to the server.
Wherein the scanner refers to a machine that reads the graphic code information. The graphic code refers to a two-dimensional code which is distributed on a plane according to a certain rule by using a certain specific geometric figure, is black-white and is used for recording data symbol information, and can analyze data information of clients, wherein the data information comprises, but is not limited to, client names, ages, mobile phone numbers and the like. The target client refers to a client corresponding to the target client. The preset range of the entrance guard refers to the range of the scanner in the financial room for scanning the graphic code. The target mobile phone number refers to a mobile phone number corresponding to the target client, and can be a mobile phone number filled in when reserving a financial management room. The server refers to a server for processing logic operations related to entrance guard of the financial management room, and can simultaneously execute logic operations of a plurality of financial management rooms.
Specifically, when a customer needs to consult with a financial service of a bank, the customer can log in a client corresponding to a financial room access control system to carry out corresponding reservation, a graphic code corresponding to the customer is obtained through filling of reservation information, when the customer needs to enter the financial room, the graphic code of the customer is scanned through a scanner of the financial room, the graphic code is analyzed through the scanner to obtain a target mobile phone number corresponding to a target customer terminal, and the mobile phone number is sent to a server, so that the server can carry out further authentication and analysis on the target customer through the target mobile phone number, the customer is a bound customer of the bank, and information recommended to the bound customer can be obtained through analysis.
And when the target mobile phone number is in the bound account, the server sends a door opening instruction to the access controller, determines a target account identifier corresponding to the target client terminal based on the target mobile phone number, queries historical resource operation information corresponding to the target client terminal based on the target account identifier, analyzes the historical resource operation information to obtain resource information to be recommended, and sends the resource information to be recommended to the handheld terminal.
The door opening instruction refers to an instruction for controlling the financial management room door to be opened. The access controller refers to control equipment for analyzing and controlling the opening and closing of the door of the financial management room. The target account identification refers to information for uniquely identifying a customer's bank account, which is a bank account number. Historical resource operation information refers to a historical record of a resource by a client, including, but not limited to, client browsing website information, client clicking website related information, client consultation information, client reservation information, and the like. The resource information to be recommended refers to the resource information which best meets the requirements of clients and can be financial product resource information. The handheld terminal is a handheld terminal device, and is a data acquisition and processing terminal which is provided with an android or WinCE operating system, a memory, a CPU, a display card, a screen and a keyboard, has data transmission processing capability, is provided with a battery, and can be used in a mobile mode.
Specifically, after the server receives the target mobile phone number sent after the scanner analyzes, the server searches whether the target mobile phone number is bound with a corresponding account according to the stored data information about the binding of the mobile phone number and the customer bank account, and if the target mobile phone number is not bound with the corresponding bank account, the server sends the target mobile phone number to another identity authentication device so that the identity authentication device can further authenticate the target mobile phone number; if the target mobile phone number is bound with the corresponding account, a target account identifier corresponding to the target mobile phone number is obtained, historical operation information corresponding to the target client is queried from stored data information corresponding to the target client according to the target account identifier, and the historical operation information is analyzed to obtain resource information to be recommended, which is adaptive to the client demand.
And the access controller receives the door opening instruction, generates door opening confirmation information based on the door opening instruction, and sends the door opening confirmation information to the handheld terminal.
The access controller refers to a core data processing and storage part of the financial room access system, and comprises, but is not limited to, receiving an access system switch instruction, analyzing the instruction and performing logic processing. The door opening instruction refers to a command to perform a door opening operation. The door opening confirmation information refers to information about whether to open the door, and can carry other data information, such as information obtained after analysis of clients, besides information about the financial room required to be opened.
Specifically, the access controller can process data of related instructions of the financial room access control system, when the server analyzes that the client is a binding account, the access controller receives an opening instruction, further generates opening confirmation information according to the opening instruction and sends the opening confirmation information to the handheld terminal for further safety confirmation, and therefore safety of the access control is improved to a certain extent.
And the handheld terminal receives the door opening confirmation information, and when the financial room corresponding to the door opening confirmation information is in an idle state, the handheld terminal sends an unlocking signal to the electromagnetic lock so that the electromagnetic lock executes door opening operation.
The electromagnetic lock is a lock manufactured by utilizing the principle that current generates magnetism, and is also called a magnetic lock.
Specifically, when the handheld terminal receives the door opening confirmation information, the idle state of the financial management room corresponding to the door opening confirmation information is confirmed according to the financial management room information in the door opening confirmation information, and if the financial management room is in the idle state currently, an unlocking signal is sent to the electromagnetic lock so that the electromagnetic lock can execute unlocking operation.
The handheld terminal is also used for displaying the information of the resources to be recommended.
The handheld terminal can also receive the resource information to be recommended, which is obtained by the server through analysis, and display the resource information in a sequence most suitable for recommendation, so that a user corresponding to the handheld terminal can more intuitively obtain the resource information which should be recommended to the client, and the service experience of the client is improved.
For example, in a specific implementation scenario, the client corresponding to the handheld terminal is a financial manager, and the financial manager can intuitively know which financial products the client is more inclined to from the financial product information sequenced in the handheld terminal, so that the client is subjected to directional marketing according to the information, the diversity of functions of the financial room access control system is reflected, and the functional service of the client for applying the financial room access control system is improved.
According to the financial room access control system, the graphic code is scanned within the preset range of the access control through the scanner, the target mobile phone number corresponding to the target client terminal is obtained, the target mobile phone number is sent to the server, the server analyzes the target mobile phone number, when a binding account exists in the target mobile phone number, a door opening command is sent to the access control controller, a target account identifier corresponding to the target client terminal is determined based on the target mobile phone number, historical resource operation information corresponding to the terminal is inquired according to the target account identifier, the historical resource operation information is analyzed, the resource information to be recommended is obtained and sent to the handheld terminal for display, meanwhile, the door controller sends door opening confirmation information to the handheld terminal after receiving the door opening command, so that the handheld terminal sends an unlocking signal to the electromagnetic lock when the corresponding financial room under the door opening confirmation information is in an idle state, the electromagnetic lock is enabled to execute door opening operation, the control of the financial room access control system and the analysis of recommended resources are achieved, functions of the financial room access control system are well perfected and enriched, and service performance of the access control system of the financial room is better improved.
In one embodiment, the financial room access control system further comprises an identity authentication device; the server is also used for sending a reauthentication signal to the identity authentication device when the target mobile phone number does not have a binding account.
The identity authentication device refers to equipment for authenticating clients, and includes authentication technologies including, but not limited to, service credential authentication (identity card/bank card/account number password), biometric authentication (iris/fingerprint/voiceprint) and the like. The re-authentication signal refers to a signal for performing other authentication of the client.
Specifically, if the server analyzes that the target mobile phone number is not bound with the account based on the target mobile phone number, the server sends a re-authentication signal containing information that other authentications need to be performed on the client to confirm the validity of the client identity to the identity authentication device, so that the identity authentication device confirms the validity of the client identity through other authentication modes.
In the embodiment, the identity authentication device is added, so that the safety of the identity validity identification of the client is further enhanced, and the improvement of the safety performance of the financial room access control system is facilitated.
In one embodiment, the identity authentication device is configured to receive a re-authentication signal, select a target authentication mode from candidate authentication modes, and perform an identity authentication operation based on the target authentication mode, where the candidate authentication modes include a service credential authentication mode and a biometric authentication mode.
The candidate authentication modes refer to various authentication modes provided by the financial room access control system and used for confirming the validity of the identity of the client. The target authentication mode refers to an authentication mode selected under the current operation for confirming the validity of the identity of the client. The service credential authentication mode refers to a mode of identity verification through specific identification information, and can be identity card authentication, bank card authentication, account password authentication and the like. The biometric authentication means authentication based on biometric identification information, and may be iris authentication, fingerprint authentication, voiceprint authentication, or the like.
Specifically, the identity authentication device may display other candidate authentication modes on a corresponding display screen or other display devices, and select one candidate authentication mode from the candidate authentication modes as a target authentication mode, and authenticate the client identity through the target authentication mode, so as to obtain a judgment result of whether the client identity is effective. The target authentication mode can be acquired according to other authentication modes input by the client terminal.
In the above embodiment, the diversity of the candidate authentication modes is beneficial to enriching the functionality of the financial management room access control system, and improves the service performance of the financial management room access control system to a certain extent.
In one embodiment, a server interacts with a plurality of financial chambers and a plurality of handheld terminals; the financial management room comprises a scanner, an access controller, an electromagnetic lock and an identity authentication device.
Specifically, each financial management room is provided with a scanner, an access controller, an electromagnetic lock and an identity authentication device, the server interacts with a plurality of financial management rooms, namely, the server and instrument equipment (including but not limited to the scanner, the access controller, the electromagnetic lock and the identity authentication device) in each financial management room interact with data, and processing logic for data transmitted by the financial management rooms through 5G communication is executed. In addition, the handheld terminal is not limited to one, and the server may transmit the analyzed data to the corresponding handheld terminal for analysis by different clients.
In the above embodiment, one or more servers interact with the devices in the plurality of financial rooms at the same time, which is beneficial to improving the efficiency of the access control system of the financial rooms on data processing.
In one embodiment, the server is further configured to obtain risk assessment information corresponding to the target client terminal from the historical resource operation information, perform risk assessment operation based on the risk assessment information to obtain a target risk assessment level, and screen resources with risk assessment threshold levels corresponding to various resources being less than or equal to the target risk assessment level as recommended resources to be optimized; and acquiring historical holding resource information corresponding to the target client terminal from the historical resource operation information, and when resources meeting the non-recommended resource limiting conditions exist in the historical holding resource information and the resources are to-be-optimized recommended resources, eliminating the resources meeting the non-recommended resource limiting conditions from the to-be-optimized recommended resources to obtain to-be-recommended resources, and taking the resource information corresponding to the to-be-recommended resources as to-be-recommended resource information.
Wherein the risk assessment information refers to information related to a reputation risk of the client. The risk assessment operation refers to an assessment of the potential risk of a customer performing an operation (e.g., purchasing a financial product). The target risk assessment level refers to a risk level that is assessed when a customer performs a certain operation. The risk assessment threshold level refers to a critical risk level at which each resource is at risk. The recommended resources to be optimized refer to the resources selected after preliminary evaluation according to the risk level. The history holding resource information refers to history information of the customer purchasing the resource. Non-recommended resource constraints refer to constraints for screening out resources that do not meet the recommendation to the customer. The resource to be recommended refers to a resource matched with the client demand degree, and can be any number of kinds of resources.
Specifically, in order to recommend resources which are necessary to be matched for the customer demand degree and benefit of the guaranteeing bank, risk assessment information of the customer can be obtained from historical resource operation information of the customer, and potential risks of the customer are assessed by carrying out risk assessment on the risk assessment information. In order to ensure that the resources purchased by the clients are reduced to bring more risks to the clients, the resources with smaller potential risks, namely the risk evaluation threshold level is smaller than or equal to the target risk evaluation level of the clients, can be selected from various resources to serve as recommended resources to be optimized. In order to further acquire resources which are higher in adaptation degree with the demands of the clients and meet the self-limiting conditions of each resource, historical holding resources of the clients are further required to be analyzed so as to optimize the resources to be optimized, resources meeting the non-recommended resource limiting conditions in the resources to be optimized are removed, the resources to be recommended which are more adaptive to the demands of the clients are further acquired, resource information (namely resource information to be recommended) corresponding to the resources to be recommended is ordered, and the ordered resource information to be recommended is sent to the handheld terminal, so that the information of the resources to be recommended is displayed more intuitively through the handheld terminal, and the service performance of the financial room access control system is improved.
In the embodiment, the resources to be recommended are obtained by performing risk assessment on the clients, so that the demands of the resources to be recommended and the clients are more adaptive, meanwhile, the function of the financial management room access control system is enriched due to the addition of the function, and the service performance of the financial management room access control system is better improved.
In one embodiment, the non-recommended resource restrictions include a limit on amount, a limit on number of purchases, an age restriction, a ratio restriction, and an account type restriction.
The limit condition refers to a limit condition of the total limit of resources. The purchase number limitation condition means that each resource has a limitation of a prescribed purchase number. Age constraints refer to each resource having a corresponding customer age constraint. The ratio limit condition refers to whether the client asset ratio satisfies a condition that a certain resource limits the asset ratio. The account type limitation condition refers to a limitation condition that each resource has a corresponding currency type, and whether a customer holds a currency type account corresponding to the resource.
In one embodiment, from an actual scene, financial products can be used as resources, and a server can analyze the risk assessment level of a client according to the risk assessment information of the client, so as to select financial products with the risk level smaller than or equal to the risk assessment level corresponding to the client from all the financial products, and obtain a preliminary product set S (namely resources to be optimized); then, products meeting the limit conditions are screened out from the product set, such as a customer holds a financial product T, the financial product T has corresponding total limit, whether the financial product T is full or not is inquired, and if the financial product T is full, the financial product T is removed from the product set S; and products meeting the limit conditions of the purchase times are screened out from the product set S, for example, the financial product T held by a customer has limit of the purchase times, if the customer reaches the limit of the purchase times, the condition of purchasing the financial product is not met any more, and the financial product T is deleted from the product set S; in addition, some financial products have the limit of purchasing age, at this time, the age of the customer can be judged, if the age of the customer does not accord with the age limit condition of the financial products, the financial products are deleted from the product set S; in addition, some financial products have corresponding proportion limiting conditions, and when the asset proportion of the client does not meet the proportion limiting conditions corresponding to the financial products, the financial products which do not meet the proportion limiting conditions are removed from the product set S; and finally, if the customer does not have a currency account corresponding to the financial product, removing the financial product which does not meet the account type limiting condition from the product set S, then obtaining a final product set with higher adaptation degree to the customer, sorting the products in the final product set according to the purchase amount of each financial product from low to high, and sending the sorted financial products to the handheld terminal, thereby adding and perfecting the function of the financial room access control system and being beneficial to improving the service performance of the financial room access control system.
In one embodiment, the handheld terminal is further configured to send a service valuation message to the target client terminal via 5G communication; and sending an unlocking signal to the electromagnetic lock so that the electromagnetic lock performs a door opening operation.
The 5G communication refers to communication through a fifth generation mobile communication technology, and is a new generation broadband mobile communication technology with the characteristics of high efficiency, low time delay and large connection. The service evaluation message refers to an evaluation message for evaluating the service performance of the system function, and may be a 5G message.
Specifically, in order to realize rapid communication among all functional devices in the financial room access control system, data transmission can be carried out among all the functional devices through a 5G communication technology. After the resource recommendation service of the client is completed, the service evaluation message can be sent to the target client terminal at the handheld terminal, so that the client can input relevant evaluation at the target client terminal, more client evaluation information can be collected, and the financial room access control system can be functionally optimized through the client evaluation information. When the corresponding recommended service is completed and the door of the financial management room needs to be opened, an unlocking signal can be sent to the electromagnetic lock through the handheld terminal, so that the electromagnetic lock can execute door opening operation.
In this embodiment, the addition of the 5G communication technology makes the data transmission efficiency between the devices of the financial room access control system faster, and the addition of the service evaluation function is beneficial to collecting the customer evaluation information, so as to accumulate data for the improvement of the financial room access control system, and improve the service performance of the financial room access control system to a certain extent.
In one embodiment, as shown in fig. 2, a financial room access control method is provided, and the method is applied to the system in fig. 1 for illustration, and includes the following steps:
step S200, scanning the scanning graphic code through a scanner, obtaining a target mobile phone number corresponding to a target client terminal in a preset range of the access control, and sending the target mobile phone number to a server.
Wherein the scanner refers to a machine that reads the graphic code information. The graphic code refers to a two-dimensional code which is distributed on a plane according to a certain rule by using a certain specific geometric figure, is black-white and is used for recording data symbol information, and can analyze data information of clients, wherein the data information comprises, but is not limited to, client names, ages, mobile phone numbers and the like. The target client refers to a client corresponding to the target client. The preset range of the entrance guard refers to the range of the scanner in the financial room for scanning the graphic code. The target mobile phone number refers to a mobile phone number corresponding to the target client, and can be a mobile phone number filled in when reserving a financial management room. The server refers to a server for processing logic operations related to entrance guard of the financial management room, and can simultaneously execute logic operations of a plurality of financial management rooms.
Specifically, when a customer needs to consult with a financial service of a bank, the customer can log in a client corresponding to a financial room access control system to carry out corresponding reservation, a graphic code corresponding to the customer is obtained through filling of reservation information, when the customer needs to enter the financial room, the graphic code of the customer is scanned through a scanner of the financial room, the graphic code is analyzed through the scanner to obtain a target mobile phone number corresponding to a target customer terminal, and the mobile phone number is sent to a server, so that the server can carry out further authentication and analysis on the target customer through the target mobile phone number, the customer is a bound customer of the bank, and information recommended to the bound customer can be obtained through analysis.
Step S202, when a binding account exists in a target mobile phone number through a server, a door opening instruction is sent to an access controller, a target account identifier corresponding to a target client terminal is determined based on the target mobile phone number, historical resource operation information corresponding to the target client terminal is queried based on the target account identifier, the historical resource operation information is analyzed, resource information to be recommended is obtained, and the resource information to be recommended is sent to a handheld terminal.
The door opening instruction refers to an instruction for controlling the financial management room door to be opened. The access controller refers to control equipment for analyzing and controlling the opening and closing of the door of the financial management room. The target account identification refers to information for uniquely identifying a customer's bank account, which is a bank account number. Historical resource operation information refers to a historical record of a resource by a client, including, but not limited to, client browsing website information, client clicking website related information, client consultation information, client reservation information, and the like. The resource information to be recommended refers to the resource information which best meets the requirements of clients and can be financial product resource information. The handheld terminal is a handheld terminal device, and is a data acquisition and processing terminal which is provided with an android or WinCE operating system, a memory, a CPU, a display card, a screen and a keyboard, has data transmission processing capability, is provided with a battery, and can be used in a mobile mode.
Specifically, after the server receives the target mobile phone number sent after the scanner analyzes, the server searches whether the target mobile phone number is bound with a corresponding account according to the stored data information about the binding of the mobile phone number and the customer bank account, and if the target mobile phone number is not bound with the corresponding bank account, the server sends the target mobile phone number to another identity authentication device so that the identity authentication device can further authenticate the target mobile phone number; if the target mobile phone number is bound with the corresponding account, a target account identifier corresponding to the target mobile phone number is obtained, historical operation information corresponding to the target client is queried from stored data information corresponding to the target client according to the target account identifier, and the historical operation information is analyzed to obtain resource information to be recommended, which is adaptive to the client demand.
Step S204, a door opening instruction is received through the door control controller, door opening confirmation information is generated based on the door opening instruction, and the door opening confirmation information is sent to the handheld terminal.
The access controller refers to a core data processing and storage part of the financial room access system, and comprises, but is not limited to, receiving an access system switch instruction, analyzing the instruction and performing logic processing. The door opening instruction refers to a command to perform a door opening operation. The door opening confirmation information refers to information about whether to open the door, and can carry other data information, such as information obtained after analysis of clients, besides information about the financial room required to be opened.
Specifically, the access controller can process data of related instructions of the financial room access control system, when the server analyzes that the client is a binding account, the access controller receives an opening instruction, further generates opening confirmation information according to the opening instruction and sends the opening confirmation information to the handheld terminal for further safety confirmation, and therefore safety of the access control is improved to a certain extent.
Step S206, receiving the door opening confirmation information through the handheld terminal, and sending an unlocking signal to the electromagnetic lock when the financial room corresponding to the door opening confirmation information is in an idle state so as to enable the electromagnetic lock to execute door opening operation; and displaying the resource information to be recommended.
The electromagnetic lock is a lock manufactured by utilizing the principle that current generates magnetism, and is also called a magnetic lock.
Specifically, when the handheld terminal receives the door opening confirmation information, the idle state of the financial management room corresponding to the door opening confirmation information is confirmed according to the financial management room information in the door opening confirmation information, and if the financial management room is in the idle state currently, an unlocking signal is sent to the electromagnetic lock so that the electromagnetic lock can execute unlocking operation.
According to the financial room entrance guard control method, the scanner scans the graphic code in the preset range of the entrance guard, the target mobile phone number corresponding to the target client terminal is obtained, the target mobile phone number is sent to the server, the server analyzes the target mobile phone number, when a binding account exists in the target mobile phone number, a door opening command is sent to the entrance guard controller, a target account identifier corresponding to the target client terminal is determined based on the target mobile phone number, historical resource operation information corresponding to the target client terminal is inquired according to the target account identifier, the historical resource operation information is analyzed, the resource information to be recommended is obtained and sent to the handheld terminal for displaying, meanwhile, the door controller sends the door opening confirmation information to the handheld terminal after receiving the door opening command, so that the handheld terminal sends an unlocking signal to the electromagnetic lock when the corresponding financial room under the door opening confirmation information is in an idle state, the electromagnetic lock performs door opening operation, the control of the financial room entrance guard system on the financial room door and the analysis on recommended resources are well perfected and the functions of the financial room entrance guard system are enriched, and the service performance of the financial room entrance guard system is better improved.
In one embodiment, as shown in fig. 3, step S202 includes:
step S300, risk assessment information corresponding to the target client terminal is obtained from the historical resource operation information through the server, risk assessment operation is carried out based on the risk assessment information, a target risk assessment grade is obtained, and resources with risk assessment threshold grades smaller than or equal to the target risk assessment grade corresponding to various resources are screened as recommended resources to be optimized.
Step S302, historical holding resource information corresponding to the target client terminal is obtained from the historical resource operation information, when resources meeting non-recommended resource limiting conditions exist in the historical holding resource information and the resources are to-be-optimized recommended resources, the resources meeting the non-recommended resource limiting conditions are removed from the to-be-optimized recommended resources, the to-be-recommended resources are obtained, and the resource information corresponding to the to-be-recommended resources is used as the to-be-recommended resource information.
Wherein the risk assessment information refers to information related to a reputation risk of the client. The risk assessment operation refers to an assessment of the potential risk of a customer performing an operation (e.g., purchasing a financial product). The target risk assessment level refers to a risk level that is assessed when a customer performs a certain operation. The risk assessment threshold level refers to a critical risk level at which each resource is at risk. The recommended resources to be optimized refer to the resources selected after preliminary evaluation according to the risk level. The history holding resource information refers to history information of the customer purchasing the resource. Non-recommended resource constraints refer to constraints for screening out resources that do not meet the recommendation to the customer. The resource to be recommended refers to a resource matched with the client demand degree, and can be any number of kinds of resources.
Specifically, in order to recommend resources which are necessary to be matched for the customer demand degree and benefit of the guaranteeing bank, risk assessment information of the customer can be obtained from historical resource operation information of the customer, and potential risks of the customer are assessed by carrying out risk assessment on the risk assessment information. In order to ensure that the resources purchased by the clients are reduced to bring more risks to the clients, the resources with smaller potential risks, namely the risk evaluation threshold level is smaller than or equal to the target risk evaluation level of the clients, can be selected from various resources to serve as recommended resources to be optimized. In order to further acquire resources which are higher in adaptation degree with the demands of the clients and meet the self-limiting conditions of each resource, historical holding resources of the clients are further required to be analyzed so as to optimize the resources to be optimized, resources meeting the non-recommended resource limiting conditions in the resources to be optimized are removed, the resources to be recommended which are more adaptive to the demands of the clients are further acquired, resource information (namely resource information to be recommended) corresponding to the resources to be recommended is ordered, and the ordered resource information to be recommended is sent to the handheld terminal, so that the information of the resources to be recommended is displayed more intuitively through the handheld terminal, and the service performance of the financial room access control system is improved.
In the embodiment, risk assessment information corresponding to a target client terminal is obtained from historical resource operation information, risk assessment operation is performed based on the risk assessment information to obtain a target risk assessment level, and resources with risk assessment threshold levels smaller than or equal to the target risk assessment level corresponding to various resources are screened as recommended resources to be optimized; the method comprises the steps of obtaining historical holding resource information corresponding to a target client terminal from historical resource operation information, when resources meeting non-recommended resource limiting conditions exist in the historical holding resource information and the resources are to-be-optimized recommended resources, removing the resources meeting the non-recommended resource limiting conditions from the to-be-optimized recommended resources to obtain to-be-recommended resources, taking the resource information corresponding to the to-be-recommended resources as the to-be-recommended resource information, so that multi-layer condition optimization selection of the recommended resources is realized, the probability of purchasing the recommended resources by clients is improved to a certain extent, the functions of the financial management room access control system are enriched, and further the service performance of the financial management room access control system is improved.
In one embodiment, as shown in fig. 4, fig. 4 is a schematic deployment diagram of a part of devices in a financial room access control system of a bank in one embodiment, where the number of financial rooms and the number of handheld terminals are not limited to those shown in fig. 4. Before a client enters a financial management room, the client can carry out financial product consultation with a bank financial manager at the corresponding terminal through a 5G communication technology, and at the moment, the server can store information related to financial products interested by the client in the consultation process sent by the corresponding terminal of the financial manager, so as to complete the function of an access control system of the financial room. In addition, the client can reserve in advance, a corresponding two-dimension code is generated during reservation, when the client arrives at a financial management room, the client mobile phone number is obtained by scanning the client two-dimension code through a scanner, the mobile phone number is sent to a server through the scanner, so that the server inquires whether a bank account is bound to the mobile phone number, if the bank account is bound, a door opening instruction is sent to an entrance guard controller, after the entrance guard controller receives the instruction, a corresponding door opening confirmation message is generated and sent to a handheld terminal corresponding to a financial management room manager, and when the handheld terminal confirms that the financial management room corresponding to the door opening confirmation message is in an idle state, the door opening signal is sent to an electromagnetic lock, so that the electromagnetic lock performs door opening operation; if the server inquires that the mobile phone number corresponding to the client is not bound with the bank account, the re-authentication message is sent to the identity authentication device, the identity authentication device can provide a business certificate authentication method such as an identity card, a bank card and an account password and a biometric authentication method such as iris, fingerprint and voiceprint to authenticate the identity validity of the client, after the authentication is passed, the authentication is sent to the server through the message, so that the server obtains historical resource operation information of the client and sends a door opening instruction to the door controller, the door controller sends a door opening confirmation message to the handheld terminal, the handheld terminal sends a door opening signal to the electromagnetic lock after confirming that the financial room is in an idle state, so that the electromagnetic lock performs door opening operation, and meanwhile, the server analyzes the historical resource operation information to obtain resources to be recommended, namely financial product information obtained by the door control system according to client information analysis. Wherein, the historical resource operation information can be obtained by the following sources: (1) Inquiring basic information of a client, namely inquiring the sex, birthday, account opening date, account opening website, address, exclusive financial manager and the like of the client in a user center of a banking system according to the ID of the client account; (2) Inquiring the operation information of the client, namely inquiring the most frequently transacted business, browsed products and the like of the client in an operation record center of a banking system according to the account ID of the client; (3) Inquiring financial information of the client, and according to the account ID of the client, inquiring financial risk assessment grade, held financial products, financial proportions and the like of the client in a financial information center of a banking system; and (4) acquiring information filled in when the client makes a reservation. A banking system refers to a related system of banks associated with a financial institution access system, which may be a system for different types of functions. In addition, after the financial room access control system finishes corresponding service for clients, a financial manager can send a service evaluation message to the client terminal through the handheld terminal and send a door opening signal to the electromagnetic lock at the same time, so that the electromagnetic lock executes door opening operation, the multifunctional application of the financial room access control system is realized, the analysis processing function of resource recommendation is added in the financial room access control system, the functions of the financial room access control system are richer, the service performance of the financial room access control system is further improved, and the experience of the clients is improved while the directional recommendation of financial products is facilitated.
Based on the same inventive concept, the embodiment of the application also provides a financial room access control device for realizing the related financial room access control method. The implementation scheme of the solution provided by the device is similar to the implementation scheme recorded in the method, so the specific limitation in the embodiments of the access control device for one or more financial rooms provided below can be referred to the limitation of the access control method for the financial room hereinabove, and the description is omitted here.
In one embodiment, as shown in fig. 5, there is provided a financial room entrance guard control device, including: a scanning module 500, an analysis module 502, a door opening confirmation module 504, and a door opening module 506, wherein:
the scanning module 500 is configured to scan the scanned graphic code through a scanner, obtain a target mobile phone number corresponding to a target client terminal within a preset range of the access control, and send the target mobile phone number to a server.
The analysis module 502 is configured to send, when the binding account exists in the target mobile phone number through the server, a door opening instruction to an access controller, determine a target account identifier corresponding to the target client terminal based on the target mobile phone number, query historical resource operation information corresponding to the target client terminal based on the target account identifier, analyze the historical resource operation information, obtain resource information to be recommended, and send the resource information to be recommended to a handheld terminal.
And the door opening confirmation module 504 is configured to receive the door opening instruction through the door access controller, generate door opening confirmation information based on the door opening instruction, and send the door opening confirmation information to the handheld terminal.
The door opening module 506 is configured to receive the door opening confirmation information through the handheld terminal, and send an unlocking signal to the electromagnetic lock when the financial room corresponding to the door opening confirmation information is in an idle state, so that the electromagnetic lock performs a door opening operation; and displaying the resource information to be recommended.
In one embodiment, the analysis module 502 is further configured to obtain, by using the server, risk assessment information corresponding to the target client terminal from the historical resource operation information, perform a risk assessment operation based on the risk assessment information, obtain a target risk assessment level, and screen resources with risk assessment threshold levels corresponding to various resources less than or equal to the target risk assessment level as recommended resources to be optimized; and acquiring historical holding resource information corresponding to the target client terminal from the historical resource operation information, and when resources meeting non-recommended resource limiting conditions exist in the historical holding resource information and the resources are recommended resources to be optimized, eliminating the resources meeting the non-recommended resource limiting conditions from the resources to be optimized to obtain the resources to be recommended, and taking the resource information corresponding to the resources to be recommended as the resource information to be recommended.
All or part of the modules in the financial room access control device can be realized by software, hardware and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 6. The computer device includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer equipment is used for storing relevant data of the financial room access control system. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for communicating with an external terminal through a network connection. The computer program when executed by the processor is used for realizing a financial room access control method.
It will be appreciated by those skilled in the art that the structure shown in FIG. 6 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a robot is also provided that includes a memory, a processor, and computer readable instructions stored in the memory and executable on the processor that when executed perform the steps of the method embodiments described above.
In one embodiment, a computer-readable storage medium is provided, storing a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
In one embodiment, a computer program product or computer program is provided that includes computer instructions stored in a computer readable storage medium. The processor of the robot reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the robot performs the steps in the above-described method embodiments.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data need to comply with the related laws and regulations and standards of the related country and region.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.
Claims (10)
1. A financial room access control system, the system comprising:
the scanner is used for acquiring a target mobile phone number corresponding to a target client terminal in a preset range of the access control through scanning the graphic code, and sending the target mobile phone number to the server;
when the target mobile phone number has a binding account, the server sends a door opening instruction to the access controller, determines a target account identifier corresponding to the target client terminal based on the target mobile phone number, inquires historical resource operation information corresponding to the target client terminal based on the target account identifier, analyzes the historical resource operation information to obtain resource information to be recommended, and sends the resource information to be recommended to the handheld terminal;
The access controller receives the door opening instruction, generates door opening confirmation information based on the door opening instruction, and sends the door opening confirmation information to the handheld terminal;
the handheld terminal receives the door opening confirmation information, and when the financial room corresponding to the door opening confirmation information is in an idle state, an unlocking signal is sent to the electromagnetic lock so that the electromagnetic lock can execute door opening operation;
the handheld terminal is also used for displaying the resource information to be recommended.
2. The system of claim 1, wherein the financial institution entrance guard system further comprises an identity authentication device; the server is further used for sending a reauthentication signal to the identity authentication device when the target mobile phone number does not have a binding account.
3. The system of claim 2, wherein the identity authentication device is configured to receive the re-authentication signal, select a target authentication method from candidate authentication methods, and perform an identity authentication operation based on the target authentication method, where the candidate authentication methods include a service credential authentication method and a biometric authentication method.
4. The system according to any one of claims 1 or 2, wherein the server interacts with a plurality of financial offices and a plurality of handheld terminals; the financial management room comprises a scanner, an access controller, an electromagnetic lock and an identity authentication device.
5. The system of claim 1, wherein the server is further configured to obtain risk assessment information corresponding to the target client terminal from the historical resource operation information, perform risk assessment operation based on the risk assessment information to obtain a target risk assessment level, and screen resources with risk assessment threshold levels corresponding to various resources less than or equal to the target risk assessment level as recommended resources to be optimized; and acquiring historical holding resource information corresponding to the target client terminal from the historical resource operation information, and when resources meeting non-recommended resource limiting conditions exist in the historical holding resource information and the resources are recommended resources to be optimized, eliminating the resources meeting the non-recommended resource limiting conditions from the resources to be optimized to obtain the resources to be recommended, and taking the resource information corresponding to the resources to be recommended as the resource information to be recommended.
6. The system of claim 5, wherein the non-recommended resource limitations include a credit limit, a number of purchases limit, an age limit, a proportioning limit, and an account type limit.
7. The system of claim 1, wherein the handheld terminal is further configured to send a service valuation message to the target client terminal via 5G communication; and sending an unlocking signal to the electromagnetic lock so that the electromagnetic lock can execute door opening operation.
8. The access control method for the financial management room is characterized by comprising the following steps:
scanning the scanning graphic code through a scanner to obtain a target mobile phone number corresponding to a target client terminal in a preset range of the access control, and sending the target mobile phone number to a server;
when a binding account exists in the target mobile phone number, sending a door opening instruction to an access controller through the server, determining a target account identifier corresponding to the target client terminal based on the target mobile phone number, inquiring historical resource operation information corresponding to the target client terminal based on the target account identifier, analyzing the historical resource operation information to obtain resource information to be recommended, and sending the resource information to be recommended to a handheld terminal;
receiving the door opening instruction through the door access controller, generating door opening confirmation information based on the door opening instruction, and sending the door opening confirmation information to the handheld terminal;
The hand-held terminal receives the door opening confirmation information, and when a financial room corresponding to the door opening confirmation information is in an idle state, an unlocking signal is sent to the electromagnetic lock so that the electromagnetic lock executes door opening operation; and displaying the resource information to be recommended.
9. The method of claim 8, wherein analyzing the historical resource operation information to obtain resource information to be recommended comprises:
acquiring risk assessment information corresponding to the target client terminal from the historical resource operation information through the server, performing risk assessment operation based on the risk assessment information to obtain a target risk assessment level, and screening resources with risk assessment threshold levels smaller than or equal to the target risk assessment level corresponding to various resources as recommended resources to be optimized;
and acquiring historical holding resource information corresponding to the target client terminal from the historical resource operation information, and when resources meeting non-recommended resource limiting conditions exist in the historical holding resource information and the resources are recommended resources to be optimized, eliminating the resources meeting the non-recommended resource limiting conditions from the resources to be optimized to obtain the resources to be recommended, and taking the resource information corresponding to the resources to be recommended as the resource information to be recommended.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 8 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310658008.6A CN116843389A (en) | 2023-06-05 | 2023-06-05 | Financial room access control system, method and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310658008.6A CN116843389A (en) | 2023-06-05 | 2023-06-05 | Financial room access control system, method and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116843389A true CN116843389A (en) | 2023-10-03 |
Family
ID=88166136
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310658008.6A Pending CN116843389A (en) | 2023-06-05 | 2023-06-05 | Financial room access control system, method and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116843389A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117994882A (en) * | 2024-04-02 | 2024-05-07 | 杭州海康威视数字技术股份有限公司 | Pass permission authentication equipment and method |
-
2023
- 2023-06-05 CN CN202310658008.6A patent/CN116843389A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117994882A (en) * | 2024-04-02 | 2024-05-07 | 杭州海康威视数字技术股份有限公司 | Pass permission authentication equipment and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6076167A (en) | Method and system for improving security in network applications | |
US12118552B2 (en) | User profiling based on transaction data associated with a user | |
AU2009241407B2 (en) | Dynamic account authentication using a mobile device | |
CN108876133A (en) | Risk assessment processing method, device, server and medium based on business information | |
CN110489415B (en) | Data updating method and related equipment | |
CN111526173B (en) | System for safely accelerating resource allocation | |
CN107888671A (en) | A kind of information-pushing method and device | |
CN112036890B (en) | Customer identity authentication method and device | |
CN111275448A (en) | Face data processing method and device and computer equipment | |
US11023895B2 (en) | Automated review system for transactions | |
CN110324314A (en) | User registering method and device, storage medium, electronic equipment | |
CN108846741B (en) | Payment processing method and approval document processing method | |
CN116843389A (en) | Financial room access control system, method and storage medium | |
US20150332128A1 (en) | Network-implemented methods and systems for authenticating a paper financial instrument | |
US20220058651A1 (en) | Authentication of financial transaction | |
CN112508621B (en) | Transaction analysis method and device | |
US20190122211A1 (en) | Method and device facilitating expansion of primary payment instruments | |
O’Kane | Detecting patterns in the Ethereum transactional data using unsupervised learning | |
CN117034358A (en) | Service certificate processing method and device and computer equipment | |
US20250014037A1 (en) | Content verification | |
CN117874733B (en) | Transaction execution method and system | |
US11943234B2 (en) | System and method for determining a volatile file based on a selection factor | |
EP4280142A1 (en) | System and method for automated feature generation and usage in identity decision making | |
WO2024057164A1 (en) | System and method for trading and management of digital asset | |
CN116664185A (en) | User portrait generation method, device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |