CN117745407A - Two-card management system and method based on identity verification - Google Patents

Two-card management system and method based on identity verification Download PDF

Info

Publication number
CN117745407A
CN117745407A CN202410134542.1A CN202410134542A CN117745407A CN 117745407 A CN117745407 A CN 117745407A CN 202410134542 A CN202410134542 A CN 202410134542A CN 117745407 A CN117745407 A CN 117745407A
Authority
CN
China
Prior art keywords
card
opener
personnel
data
early warning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410134542.1A
Other languages
Chinese (zh)
Inventor
赵素坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Langfang Bolian Technology Development Co ltd
Original Assignee
Langfang Bolian Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Langfang Bolian Technology Development Co ltd filed Critical Langfang Bolian Technology Development Co ltd
Priority to CN202410134542.1A priority Critical patent/CN117745407A/en
Publication of CN117745407A publication Critical patent/CN117745407A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a two-card management system and a two-card management method based on identity verification, which belong to the technical field of bank card and mobile phone card management, and the two-card management system based on identity verification comprises the following components: one device is provided with a dedicated two-dimensional code; the server is communicated with the equipment and is used for receiving the front and back face identification information and the face identification information of the identity card uploaded by the card opener and forwarding the information to public security intranet data; a database, which is communicated with the server and is used for storing and inquiring the data of the card opener; the analysis module is communicated with the database and is used for carrying out omnibearing real-time statistics, analysis and research on the data of the card opening personnel; the early warning module is communicated with the analysis module and is used for warning and reminding abnormal voice; the invention provides a two-card management system and method based on identity verification, which are used for solving the technical problem of how to effectively verify the identity and early warn the risk of a person opening a card at a banking website or an operator website.

Description

Two-card management system and method based on identity verification
Technical Field
The invention belongs to the technical field of management of bank cards and mobile phone cards, and particularly relates to a two-card management system and method based on identity verification.
Background
The term "two cards" refers to a bank card and a mobile phone card, which are usually used by lawbreakers to trap or force others to transact at low price or free, and are used for criminal activities such as transferring dirt, money laundering, fraud, etc. The crime mode not only causes huge economic loss and credit damage to banks and operators, but also brings legal risks and life trouble to wide card opening staff.
In order to effectively prevent and fight criminals involving "two cards", some technical solutions have been proposed and applied. For example, some banks or operators use biometric identification techniques such as face recognition, fingerprint recognition, iris recognition, etc. to authenticate the card reader. These techniques may improve the accuracy and security of identity verification, but also have some problems and limitations. For example, biometric identification techniques require the collection and storage of large amounts of personal sensitive information, which can pose privacy concerns and information security risks; biometric identification techniques may also be subject to interference from environmental, equipment, artifacts, etc., resulting in erroneous or failed identification; biometric identification technology also requires higher hardware and maintenance costs, increasing the operating pressures of banks and operators.
In addition, some banks or operators adopt intelligent management technologies such as data analysis, risk assessment, early warning pushing and the like to monitor and early warn the risk of card opening personnel. These techniques may increase the efficiency and sensitivity of risk prevention and control, but also have some problems and limitations. For example, technologies such as data analysis, risk assessment, early warning pushing and the like need to depend on massive data sources and quality, and problems such as incomplete, inaccurate, untimely and the like of data can exist; the technologies such as data analysis, risk assessment, early warning pushing and the like need to depend on complex algorithms and models, and the problems that the algorithms are unstable, inadaptation, unexplainable and the like can exist; the technologies of data analysis, risk assessment, early warning pushing and the like also need to consider ethical and legal problems of artificial intelligence, and avoid the consequences of discrimination, misjudgment and the like.
Therefore, the existing technical scheme still has some shortages and improvement spaces, and a more efficient, safe, intelligent and humanized two-card management system and method are required to be provided so as to meet the actual demands and social expectations of banks and operators.
Disclosure of Invention
Aiming at the problems, the invention provides a two-card management system based on identity check, which is used for solving the technical problem of how to effectively check the identity and early warn the risk of a person opening a card at a banking website or an operator website.
In order to achieve the above purpose, the invention adopts the following technical scheme:
the invention solves the technical problem of how to effectively check the identity and early warn the risk of the card opening personnel at the banking website or the operator website. The invention adopts a two-card management system based on identity check, which comprises the following components:
the equipment is provided with a special two-dimensional code and is used for providing the special two-dimensional code for card opening personnel to scan at a banking website or an operator website;
the server is communicated with the equipment and is used for receiving the front and back face identification information and the face identification information of the identity card uploaded by the card opener and forwarding the information to public security intranet data;
the database is communicated with the server and is used for storing and inquiring past experiences of the card opening personnel, mobile phone numbers, card opening time, whether the personnel pay attention to or not and other data;
the analysis module is communicated with the database and is used for carrying out structural analysis on the data of the card opening personnel, and carrying out omnibearing real-time statistics, analysis and judgment on the conditions of cycle abnormality and frequency abnormality;
the early warning module is communicated with the analysis module and is used for judging whether the personnel belong to key management and control personnel according to the analysis result and pushing abnormal voice early warning and reminding of the personnel in real time;
a binding module which is communicated with the server and is used for binding the card number of the normally checked card opener through a pc end or a small program; the device, the server, the database, the analysis module, the early warning module and the binding module are connected through a network to realize data exchange and control instruction transmission.
The beneficial effects of the invention are as follows: the criminal behavior of 'two cards' involved in a case can be effectively prevented and hit, the risk prevention and control capability of banks and operators is improved, legal rights and interests of card opening personnel are protected, and bank account opening service is optimized.
The working principle of the invention is as follows: when the card opening personnel scans the exclusive two-dimensional code on the equipment, the equipment can display a safety prompt of renting, lending and buying and selling bank cards suspected illegal crime notice to the card opening personnel, and the card opening personnel is required to upload the front and back face of the identity card and face recognition information. The server receives this information and converts the identification card number into a unique identifier (uuid) to avoid being retrieved from the data transmission. The server forwards the information to public security intranet data, and stores and inquires the past experience of the person who opens the card, the mobile phone number, the time of opening the card, whether the person pays attention or not, and the like from a database. The analysis module can perform structural analysis on the data, and perform omnibearing real-time statistics, analysis and judgment under the conditions of cycle abnormality, frequency abnormality and the like. The early warning module can judge whether the personnel belong to the important management and control personnel according to the analysis result, and push abnormal voice early warning reminding of the personnel in real time. If the verification is normal, the binding module can bind the card number of the card opening personnel through the pc end or the applet. If the verification is abnormal, the early warning module informs relevant departments to verify and treat.
Under the preferred implementation condition, the invention solves the technical problem of how to display the safety prompt and play the voice early warning prompt to the card opener on the equipment. Under the preferred implementation condition, the invention adopts the following technical scheme:
the device is also provided with a display screen and a loudspeaker, and is used for displaying the safety reminding to the card opener and playing the voice early warning reminding pushed by the early warning module.
Under the preferred implementation condition, the invention has the following beneficial effects: the safety awareness and risk prevention capability of the card opening personnel can be enhanced, the timeliness and effectiveness of the early warning module are improved, and the user experience and interactivity of the equipment are improved.
Under the preferred implementation, the working principle of the invention is as follows: when the card opening personnel scans the exclusive two-dimensional code on the equipment, the equipment can display a safety prompt for renting, lending and buying and selling bank card suspected illegal crime notification to the card opening personnel through the display screen, and the card opening personnel is required to upload the information of the front face and the back face of the identity card and the face recognition. If the early warning module judges that the card breaking personnel belong to key management and control personnel, the equipment can play the voice early warning reminding pushed by the early warning module through a loudspeaker: note that the card opener belongs to the important control object, and immediately performs verification and treatment. "
Under the preferred implementation condition, the invention solves the technical problem of how to protect the identity information of the card opener from being acquired in the data transmission. Under the preferred implementation condition, the invention adopts the following technical scheme:
the server is also used for converting the ID card number uploaded by the card opener into a unique identifier (uuid) so as to avoid the data content acquired in the data transmission.
Under the preferred implementation condition, the invention has the following beneficial effects: the privacy protection and the data security of the card opening personnel can be improved, the identity information is prevented from being stolen or revealed, and the risk and the loss are reduced.
Under the preferred implementation, the working principle of the invention is as follows: when the card opener uploads the information of the front face and the back face of the identity card and the face recognition, the server receives the information and converts the identity card number into a unique identifier (uuid). uuid is a string of 32 hexadecimal digits with high uniqueness and randomness, independent of any centralisation mechanism or algorithm. The server forwards uuid and other information to the public security intranet data together, and stores and inquires relevant data of the card opener from a database. Thus, even if the data is intercepted or stolen in the data transmission process, the identity card number of the card opener cannot be directly obtained, so that the identity information of the card opener is protected.
Under the preferred implementation condition, the invention solves the technical problem of how to perform effective structural analysis and risk assessment on the data of the card opening personnel. Under the preferred implementation condition, the invention adopts the following technical scheme: the analysis module adopts the following formula to carry out structural analysis on the data of the card opening personnel:
wherein x represents the data characteristic vector of the card opener, y represents the risk evaluation value of the card opener, beta represents the parameter vector of the analysis module, e is an irrational number, and the value is 2.718281828.
Under the preferred implementation condition, the invention has the following beneficial effects: the risk assessment value of the card opening personnel can be calculated according to the data feature vector of the card opening personnel, so that the card opening personnel are classified and ordered, key management and control personnel are screened out, and the accuracy and the efficiency of the analysis module are improved.
Under the preferred implementation, the working principle of the invention is as follows: when the analysis module receives the related data of the card opener stored and inquired in the database, the analysis module converts the data into a data characteristic vector x and uses a formulaAnd calculating a risk evaluation value y of the card opener. In the formula, f (x) is a regression function that maps x to a value y between 0 and 1. The parameter vector beta is a weight coefficient which is learned and updated according to historical data and feedback by an analysis module, and can reflect the influence degree of different data characteristics on the risk assessment value. The analysis module classifies and sorts the card opening personnel according to the risk evaluation value y, if y is larger than a set threshold value, the card opening personnel are judged to belong to key management and control personnel, and the result is transmitted to the early warning module.
Under the preferred implementation condition, the invention solves the technical problem of how to effectively learn and update the parameter vector of the analysis module. Under the preferred implementation condition, the invention adopts the following technical scheme:
the analysis module updates the parameter vector β according to the following formula:wherein t represents the number of iterations, α represents the learning rate, L (β t ) Representing a loss function.
Under the preferred implementation condition, the invention has the following beneficial effects: the parameter vector beta of the analysis module can be dynamically adjusted according to the historical data and feedback, so that the parameter vector beta is closer to the actual situation, and the adaptability and the sensitivity of the analysis module are improved.
Under the preferred implementation, the working principle of the invention is as follows: when the analysis module receives the related data of the card opener stored and inquired in the database, the analysis module can use the formulaAnd calculating a risk evaluation value y of the card opener. Where f (x) is a logistic regression function, x can be mapped to a value y between 0 and 1. The parameter vector beta is a weight coefficient which is learned and updated according to historical data and feedback by an analysis module, and can reflect the influence degree of different data characteristics on the risk assessment value. The analysis module calculates a loss function L (beta) according to the risk assessment value beta and the actual result (whether the important management and control personnel are involved) t ) Representing the prediction error. The analysis module will use the formula +.>The parameter vector beta is updated. In the formula, L (beta) t ) The gradient of the loss function to the parameter vector β is shown, indicating the direction in which the loss function changes most rapidly. Alpha represents the learning rate and represents the magnitude of the change in the parameter vector beta at each iteration. The analysis module updates the parameter vector beta with a certain step length along the opposite direction of the gradient, so that the parameter vector beta gradually approaches the minimum value of the loss function, and the prediction accuracy is improved.
Under the preferred implementation condition, the method and the device solve the technical problems of judging whether the method and the device belong to key management and control personnel according to the analysis result and pushing abnormal voice early warning and reminding of the personnel in real time. Under the preferred implementation condition, the invention adopts the following technical scheme:
the early warning module judges whether the key management and control personnel belong to the following conditions:
the risk assessment value of the card opener is larger than a set threshold value;
the card opening personnel belongs to one of a person who opens more, frequently opens cards, front personnel, key library personnel or two-card thematic library personnel.
Under the preferred implementation condition, the invention has the following beneficial effects: the key management and control personnel can be found and warned in time, the pertinence and the effectiveness of the early warning module are improved, and the quick response and treatment of related departments are promoted.
Under the preferred implementation, the working principle of the invention is as follows: when the early warning module receives the analysis result transmitted by the analysis module, the early warning module can judge whether the key management and control personnel belong to according to the set conditions. If so, the early warning module can push abnormal voice early warning reminding of the personnel: note that the card opener belongs to the important control object, and immediately performs verification and treatment. If not, the early warning module does not do any operation.
Under the preferred implementation condition, the invention solves the technical problem of how to set the proper voice early warning reminding content. Under the preferred implementation condition, the invention adopts the following technical scheme:
the voice early warning reminding of early warning module propelling movement is: note that the card opener belongs to the important control object, and immediately performs verification and treatment. "
Under the preferred implementation condition, the invention has the following beneficial effects: the identity and the emergency degree of key management personnel can be briefly and clearly conveyed, the warning performance and the urgency of the early warning module are improved, and high importance and rapid action of related departments are brought.
Under the preferred implementation, the working principle of the invention is as follows: when the early warning module judges that the card breaking personnel belong to key management and control personnel, the early warning module can push voice early warning reminding to the equipment through network connection. The equipment can play the pronunciation early warning and remind through the speaker: note that the card opener belongs to the important control object, and immediately performs verification and treatment. The voice early warning prompt contains the risk level and the processing requirement of the card opener, and can effectively draw the attention and response of related departments.
Under the preferred implementation condition, the invention solves the technical problem of how to bind the card number of the normally checked card opener. Under the preferred implementation condition, the invention adopts the following technical scheme:
the binding module carries out card number binding on a normally checked card opener through the following steps:
(1) Generating a random six-digit verification code and sending the random six-digit verification code to the mobile phone number of the card opener through a short message;
(2) Receiving a verification code input by a card opener, and comparing the verification code with the transmitted verification code;
(3) If the comparison is successful, prompting a card opener to input a card number, and binding the card number with identity information of the card opener;
(4) If the comparison fails, prompting the card opener to re-input the verification code or re-acquire the verification code.
Under the preferred implementation condition, the invention has the following beneficial effects: the method can effectively verify whether the mobile phone number of the card opener is consistent with the card number, prevent illegal actions such as renting, lending, buying and selling bank cards, and the like, and improve the safety and reliability of the binding module.
Under the preferred implementation, the working principle of the invention is as follows: when the binding module receives the information of the card opening personnel checking normally, the binding module generates a random six-digit verification code and sends the random six-digit verification code to the mobile phone number of the card opening personnel through a short message. The binding module receives the verification code input by the card opener and compares the verification code with the transmitted verification code. If the comparison is successful, the binding module prompts the card opener to input the card number and binds the card number with the identity information of the card opener. If the comparison fails, the binding module prompts the card opener to re-input the verification code or re-acquire the verification code. Thus, only the card opener with the correct mobile phone number and the correct card number can be ensured to complete the binding operation.
The invention solves the technical problem of how to effectively check the identity and early warn the risk of the card opening personnel at the banking website or the operator website. The invention adopts a two-card management method based on identity check, which comprises the following steps:
(1) Providing a proprietary two-dimensional code at a banking website or an operator website for a card opener to continuously scan the proprietary two-dimensional code and displaying a safety prompt of 'renting, lending, buying and selling a criminal notice' on equipment;
(2) Uploading the front and back sides of the identity card and face recognition information, and forwarding the information to public security intranet data;
(3) The ID card number is converted into a unique identifier so as to avoid obtaining the data content in the data transmission;
(4) Storing and inquiring past experience, mobile phone number, card opening time, whether people pay attention to and the like of the card opening personnel;
(5) Carrying out structural analysis on the data of the card opening personnel, and carrying out omnibearing real-time statistics, analysis and judgment according to the cycle abnormality and frequency abnormality conditions;
(6) Judging whether the monitoring system belongs to key management and control personnel according to the analysis result, and pushing abnormal voice early warning reminding of the personnel in real time;
if the verification is normal, binding the card number of the card opener through a pc end or a small program;
if the verification is abnormal, the verification and treatment are immediately performed.
The beneficial effects of the invention are as follows: the criminal behavior of 'two cards' involved in a case can be effectively prevented and hit, the risk prevention and control capability of banks and operators is improved, legal rights and interests of card opening personnel are protected, and bank account opening service is optimized.
The working principle of the invention is as follows: when a card opener scans the exclusive two-dimensional code provided by a banking website or an operator website, the device can display a safety prompt for renting, lending and buying/selling a criminal offence notice of a bankcard suspicion to the card opener, and the card opener is required to upload the information of the front face and the back face of the identity card and the face recognition. The server receives this information and converts the identification card number into a unique identifier (uuid) to avoid being retrieved from the data transmission. The server forwards the information to public security intranet data, and stores and inquires the past experience of the person who opens the card, the mobile phone number, the time of opening the card, whether the person pays attention or not, and the like from a database. The analysis module can perform structural analysis on the data, and perform omnibearing real-time statistics, analysis and judgment under the conditions of cycle abnormality, frequency abnormality and the like. The early warning module can judge whether the personnel belong to the important management and control personnel according to the analysis result, and push abnormal voice early warning reminding of the personnel in real time. If the verification is normal, the binding module can bind the card number of the card opening personnel through the pc end or the applet. If the verification is abnormal, the early warning module informs relevant departments to verify and treat.
Drawings
FIG. 1 is a schematic diagram of the present invention.
Detailed Description
The following detailed description of the invention, in conjunction with the examples, is intended to be merely exemplary and explanatory and should not be construed as limiting the scope of the invention in any way, in order to provide a better understanding of the invention as claimed.
Example 1:
as shown in fig. 1, the present invention provides a two-card management system based on identity verification, comprising:
the equipment is provided with a special two-dimensional code and is used for providing the special two-dimensional code for card opening personnel to scan at a banking website or an operator website;
the server is communicated with the equipment and is used for receiving the front and back face identification information and the face identification information of the identity card uploaded by the card opener and forwarding the information to public security intranet data;
a database, which is communicated with the server and is used for storing and inquiring past experiences of the card opening personnel, mobile phone numbers, card opening time and whether the personnel data is focused or not;
the analysis module is communicated with the database and is used for carrying out structural analysis on the data of the card opening personnel, and carrying out omnibearing real-time statistics, analysis and judgment on the conditions of cycle abnormality and frequency abnormality;
the early warning module is communicated with the analysis module and is used for judging whether the personnel belong to key management and control personnel according to the analysis result and pushing abnormal voice early warning and reminding of the personnel in real time;
a binding module which is communicated with the server and is used for binding the card number of the normally checked card opener through a pc end or a small program; the device, the server, the database, the analysis module, the early warning module and the binding module are connected through a network to realize data exchange and control instruction transmission.
The device is an intelligent terminal device, such as a tablet personal computer, a mobile phone and the like. The equipment has the functions of scanning two-dimension codes, shooting identity cards and faces, displaying information, playing sounds and the like. The device is provided with a dedicated two-dimensional code, and the two-dimensional code comprises a unique identification code and related information of the device. The device is also provided with a display screen and a loudspeaker. The display screen is used for displaying a safety prompt of renting, lending and buying and selling bankcard suspected illegal crime notification and other information to the card opener. The loudspeaker is used for playing the voice early warning reminding pushed by the early warning module.
When the system of the invention is used, a card opener needs to scan the special two-dimensional code on the equipment at first. After scanning, the device can display a safety prompt 'taxi, lend, buy and sell bankcard suspected crime notice' to the card opener through a display screen, and the card opener is required to agree with the notice. If the card opener agrees, the device can require the card opener to upload the information of the front face and the back face of the identity card and the face recognition. If the card opener does not agree, the device will refuse the operation of the card opener.
After the equipment receives the information of the front and back sides of the identity card and the face recognition information uploaded by the card opener, the equipment can send the information to the server. The server will convert the card reader's identification card number into a unique identifier (uuid) to avoid being retrieved from the data transmission to obtain the piece of data content. The server forwards the information to public security intranet data, and stores and inquires the past experience of the person who opens the card, the mobile phone number, the time of opening the card, whether the person pays attention or not, and the like from a database. The analysis module can perform structural analysis on the data, and perform omnibearing real-time statistics, analysis and judgment under the conditions of cycle abnormality, frequency abnormality and the like. The analysis module will use the formulaAnd calculating a risk evaluation value y of the card opener, and judging whether the card opener belongs to key management and control personnel according to the set conditions. If so, the early warning module can push personnel to the equipment through network connectionConstant voice early warning reminding: note that the card opener belongs to the important control object, and immediately performs verification and treatment. If not, the early warning module does not do any operation. If the verification is normal, the binding module can bind the card number of the card opening personnel through the pc end or the applet. If the verification is abnormal, the early warning module informs relevant departments to verify and treat.
Example 2:
the difference between this embodiment and embodiment 1 is that the binding module binds the card number of the card opener through the pc end.
When the system of the invention is used, if the verification is normal, the binding module can bind the card number of the card opener through the pc end. The binding module generates a random six-digit verification code and sends the random six-digit verification code to the mobile phone number of the card opener through a short message. The binding module receives the verification code input by the card opener and compares the verification code with the transmitted verification code. If the comparison is successful, the binding module prompts the card opener to input the card number and binds the card number with the identity information of the card opener. If the comparison fails, the binding module prompts the card opener to re-input the verification code or re-acquire the verification code.
Example 3:
the present embodiment is different from embodiment 1 in that the binding module performs card number binding on the card opener through an applet.
When the system of the invention is used, if the verification is normal, the binding module can bind the card number of the card opener through the small program. The binding module generates a random six-digit verification code and sends the random six-digit verification code to the mobile phone number of the card opener through a short message. The binding module receives the scanned applet code from the card reader and enters the applet interface. An input box is displayed on the applet interface for entering the verification code. The binding module compares the entered verification code with the transmitted verification code. If the comparison is successful, an input box is displayed on the applet interface for inputting the card number. The binding module binds the input card number with the identity information of the card opener. If the comparison fails, a prompt message is displayed on the applet interface, and the card opener is required to input the verification code again or acquire the verification code again.
Example 4:
when calculating the risk assessment value y of the card reader,
e is an irrational number, and the value is 2.718281828;
this means that the risk assessment value of the card opener a is very low, almost negligible, and therefore not belonging to the important regulatory personnel.
Setting a data characteristic vector x of a card opener B B The method comprises the following steps:
this means that the card opener B has no forerunner, but belongs to a key library person or a two-card thematic library person, 10 cards are opened in a certain time, the time interval between each card is 5 days, and the mobile phone number is repeated with other 3 card openers.
Then, according to the formula, the risk assessment value y of the card opener B can be calculated B The method comprises the following steps:
this means that the risk assessment value of the card opener B is very high, and it can be almost determined to be an important manager, and thus it is necessary to immediately perform verification and disposal.
In this embodiment, the parameter vector β of the analysis module is learned and updated based on historical data and feedback. The analysis module calculates a loss function L (beta) according to the actual result of the card opener (whether the card opener belongs to the key management and control personnel) t ) Representing the prediction error. The analysis module will use the formulaThe parameter vector beta is updated. In the formula>The gradient of the loss function to the parameter vector β is shown, indicating the direction in which the loss function changes most rapidly. Alpha represents the learning rate and represents the magnitude of the change in the parameter vector beta at each iteration. The analysis module updates the parameter vector beta with a certain step length along the opposite direction of the gradient, so that the parameter vector beta gradually approaches the minimum value of the loss function, and the prediction accuracy is improved.
For ease of understanding, the following is a simple derivation and description of this formula.
First, a loss function L (β t ) The following form:
wherein n represents the total number of card openers, y i Representing the actual result (0 or 1), f (x) i ) Representing the risk assessment value (between 0 and 1) for the i-th card reader. This loss function is a commonly used logistic regression loss function that measures the difference between the predicted and actual values. The smaller the loss function when the predicted value and the actual value are closer; the more distant the predicted and actual values are, the greater the loss function is.
Then, the gradient of the loss function to the parameter vector beta can be foundI.e. the partial derivative of the loss function in each parameter direction. To simplify the calculation, only the loss function is calculated for one of the parameters beta j The partial derivatives of the other parameters can be similarly found. According to the chain law there are:
wherein z is i Represents beta x i Is a shorthand for (2). The expression for each part can be found separately as follows:
wherein x is ij Representing the j-th data characteristic of the i-th card opener. Substituting these expressions into the above formula yields:
this is the loss function versus parameter beta j I.e. the j-th component of the gradient. The partial derivatives of all parameters are combined into a vector to obtain gradient
Finally, it can be according to the formulaThe parameter vector beta is updated. The meaning of this formula is that, for each iteration, the parameter vector β is updated in a step α along the opposite direction of the gradient, gradually approaching the minimum of the loss function. Therefore, the parameter vector beta can be continuously optimized, so that the parameter vector beta is closer to the actual situation, and the adaptability and the sensitivity of the analysis module are improved.
Through the formula, the analysis module can calculate the risk assessment value of the card opening personnel according to the data feature vector of the card opening personnel, so that the card opening personnel are classified and ordered, key management and control personnel are screened out, and the accuracy and the efficiency of the analysis module are improved.
Example 5:
the difference between this embodiment and embodiment 1 is that the early warning module determines whether the key management and control personnel is included according to the following conditions: the risk assessment value of the card opener is larger than a set threshold value; the card opening personnel belongs to one of a person who opens more, frequently opens cards, front personnel, key library personnel or two-card thematic library personnel. These conditions can be adjusted and optimized according to the actual situation, so as to improve the flexibility and adaptability of the early warning module.
In this embodiment, the voice early warning alert pushed by the early warning module is: note that the card opener belongs to the important control object, and immediately performs verification and treatment. The voice early warning reminding can simply and clearly convey the identity and the emergency degree of the key management and control personnel, improves the warning performance and the urgency of the early warning module, and brings high importance and rapid action to related departments.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
The principles and embodiments of the present invention have been described herein with reference to specific examples, the description of which is intended only to facilitate an understanding of the method of the present invention and its core ideas. The foregoing is merely a preferred embodiment of the invention, and it should be noted that, due to the limited text expressions, there is objectively no limit to the specific structure, and that, for a person skilled in the art, modifications, adaptations or variations may be made without departing from the principles of the present invention, and the above technical features may be combined in any suitable manner; such modifications, variations and combinations, or the direct application of the inventive concepts and aspects to other applications without modification, are contemplated as falling within the scope of the present invention.

Claims (9)

1. A two-card management system based on identity verification, comprising:
the equipment is provided with a special two-dimensional code and is used for providing the special two-dimensional code for card opening personnel to scan at a banking website or an operator website;
the server is communicated with the equipment and is used for receiving the front and back face identification information and the face identification information of the identity card uploaded by the card opener and forwarding the information to public security intranet data;
a database, which is communicated with the server and is used for storing and inquiring past experiences of the card opening personnel, mobile phone numbers, card opening time and whether the personnel data is focused or not;
the analysis module is communicated with the database and is used for carrying out structural analysis on the data of the card opening personnel, and carrying out omnibearing real-time statistics, analysis and judgment on the conditions of cycle abnormality and frequency abnormality;
the early warning module is communicated with the analysis module and is used for judging whether the personnel belong to key management and control personnel according to the analysis result and pushing abnormal voice early warning and reminding of the personnel in real time;
a binding module which is communicated with the server and is used for binding the card number of the normally checked card opener through a pc end or a small program; the device, the server, the database, the analysis module, the early warning module and the binding module are connected through a network to realize data exchange and control instruction transmission.
2. The two-card management system based on identity verification according to claim 1, wherein the device is further provided with a display screen and a loudspeaker, and the two-card management system is used for displaying the security prompt to a card opener and playing the voice early warning prompt pushed by the early warning module.
3. The two-card management system based on identity verification according to claim 1, wherein the server is further configured to convert an identification card number uploaded by a card opener into a unique identifier, so as to avoid obtaining the piece of data content in data transmission.
4. The two-card management system based on identity verification according to claim 1, wherein the analysis module performs a structured analysis on the data of the card opening personnel using the following formula:
wherein x represents the data characteristic vector of the card opener, y represents the risk evaluation value of the card opener, beta represents the parameter vector of the analysis module, e is an irrational number, and the value is 2.718281828.
5. The two-card management system based on identity verification of claim 4, wherein the analysis module updates the parameter vector β according to the following formula:wherein t represents the number of iterations, α represents the learning rate, L (β t ) Representing a loss function.
6. The two-card management system based on identity verification according to claim 1, wherein the early warning module judges whether the two-card management system belongs to a key management and control person according to the following conditions: the risk assessment value of the card opener is larger than a set threshold value; the card opening personnel belongs to one of a person who opens more, frequently opens cards, front personnel, key library personnel or two-card thematic library personnel.
7. The two-card management system based on identity verification according to claim 1, wherein the voice early warning prompt pushed by the early warning module is: note that the card opener belongs to the important management object, and immediately performs verification and treatment.
8. The two-card management system based on identity verification according to claim 1, wherein the binding module binds the card number of the normally verified card opener by:
(1) Generating a random six-digit verification code and sending the random six-digit verification code to the mobile phone number of the card opener through a short message;
(2) Receiving a verification code input by a card opener, and comparing the verification code with the transmitted verification code;
(3) If the comparison is successful, prompting a card opener to input a card number, and binding the card number with identity information of the card opener;
(4) If the comparison fails, prompting the card opener to re-input the verification code or re-acquire the verification code.
9. The two-card management method based on identity verification is characterized by comprising the following steps of:
(1) Providing a proprietary two-dimensional code at a banking website or an operator website for a card opener to continuously scan the proprietary two-dimensional code and displaying a safety prompt on equipment;
(2) Uploading the front and back sides of the identity card and face recognition information, and forwarding the information to public security intranet data;
(3) The ID card number is converted into a unique identifier so as to avoid obtaining the data content in the data transmission;
(4) Storing and inquiring past experiences of card openers, mobile phone numbers, card opening time and whether the data of the personnel are focused or not;
(5) Carrying out structural analysis on the data of the card opening personnel, and carrying out omnibearing real-time statistics, analysis and judgment according to the cycle abnormality and frequency abnormality conditions;
(6) Judging whether the monitoring system belongs to key management and control personnel according to the analysis result, and pushing abnormal voice early warning reminding of the personnel in real time;
if the verification is normal, binding the card number of the card opener through a pc end or a small program;
if the verification is abnormal, the verification and treatment are immediately performed.
CN202410134542.1A 2024-01-31 2024-01-31 Two-card management system and method based on identity verification Pending CN117745407A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410134542.1A CN117745407A (en) 2024-01-31 2024-01-31 Two-card management system and method based on identity verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410134542.1A CN117745407A (en) 2024-01-31 2024-01-31 Two-card management system and method based on identity verification

Publications (1)

Publication Number Publication Date
CN117745407A true CN117745407A (en) 2024-03-22

Family

ID=90254809

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410134542.1A Pending CN117745407A (en) 2024-01-31 2024-01-31 Two-card management system and method based on identity verification

Country Status (1)

Country Link
CN (1) CN117745407A (en)

Similar Documents

Publication Publication Date Title
US11797657B1 (en) Behavioral profiling method and system to authenticate a user
US10091180B1 (en) Behavioral profiling method and system to authenticate a user
JP5984191B2 (en) Management biometric notification system and method
US20190238568A1 (en) Identifying Artificial Artifacts in Input Data to Detect Adversarial Attacks
Wei et al. Effective detection of sophisticated online banking fraud on extremely imbalanced data
MXPA01007936A (en) Tokenless biometric atm access system.
CN111709603B (en) Service request processing method, device and system based on wind control
CN111915468A (en) Novel anti-fraud active inspection and early warning system for network
Ojugo et al. Forging a user-trust memetic modular neural network card fraud detection ensemble: A pilot study
US20230206372A1 (en) Fraud Detection Using Aggregate Fraud Score for Confidence of Liveness/Similarity Decisions
WO2011025689A1 (en) Integrated fraud platform
Bose Intelligent technologies for managing fraud and identity theft
CN117745407A (en) Two-card management system and method based on identity verification
Dissanayake et al. “Trust Pass”-Blockchain-Based Trusted Digital Identity Platform Towards Digital Transformation
US20230047174A1 (en) System and method for improving cybersecurity for telecommunication devices
CN114549221A (en) Vehicle accident loss processing method and device, computer equipment and storage medium
Nuakoh et al. Detecting impersonation in social network sites (sns) using artificial immune systems (ais)
CN117291615B (en) Visual contrast analysis method and device for overcoming anti-fraud based on network payment
Gombiro et al. A conceptual framework for detecting financial crime in mobile money transactions
CN109063847A (en) A kind of Intelligent recycling bin control method and system
Mandela et al. IMEI-based Mobile Device Tracking and Stolen Phone Identification System
EP4060539A1 (en) Real-time malicious activity detection using non-transaction data
Buoni Fraud detection: from basic techniques to a multi-agent approach
CN117350835A (en) Security system risk early warning method, security system risk early warning device, security system risk early warning equipment and storage medium
Rajasekhar et al. Cyber Hacking Breaches Prediction Using Machine Learning

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination