CN117763534A - Bill management software access method, system, equipment and medium - Google Patents

Bill management software access method, system, equipment and medium Download PDF

Info

Publication number
CN117763534A
CN117763534A CN202311568980.0A CN202311568980A CN117763534A CN 117763534 A CN117763534 A CN 117763534A CN 202311568980 A CN202311568980 A CN 202311568980A CN 117763534 A CN117763534 A CN 117763534A
Authority
CN
China
Prior art keywords
target object
management software
information
page
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311568980.0A
Other languages
Chinese (zh)
Inventor
李鹏
杨家兴
陈玉刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongke Xunlian Intelligent Network Technology Beijing Co ltd
Original Assignee
Zhongke Xunlian Intelligent Network Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongke Xunlian Intelligent Network Technology Beijing Co ltd filed Critical Zhongke Xunlian Intelligent Network Technology Beijing Co ltd
Priority to CN202311568980.0A priority Critical patent/CN117763534A/en
Publication of CN117763534A publication Critical patent/CN117763534A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a bill management software access method, a system, equipment and a medium, comprising the following steps: when a user accesses the bill management software through the interface, multiple identity verifications can be carried out on the accessed user, and the identity verification modes are different each time, so that irrelevant personnel can access the bill management software at any time, the access security of the bill management software is enhanced, the leakage of business transaction information, identity information and the like on the bill is avoided, the business secret of an enterprise is effectively protected, and the operating efficiency of the enterprise can be indirectly improved. Meanwhile, after multiple times of identity verification, the content page of the bill management software is presented to the access user, so that the access user can normally review the corresponding content page. For example, the accessing user can input an identity inquiry character through the first content page, then compare the identity inquiry character with a prestored bill, and search the identity information of the bill issuer or the receiver through the comparison result.

Description

Bill management software access method, system, equipment and medium
Technical Field
The present disclosure relates to the field of ticket management and information security technologies, and in particular, to a method, a system, an apparatus, and a medium for accessing ticket management software.
Background
At present, some enterprises can adopt different bills which are mutually related by bill management software, so that the enterprises are assisted in controlling transaction business circulation flow. For example, the upstream ticket and the downstream ticket in the transaction flow process are associated by ticket management software. The upstream bill and the downstream bill basically record the identity information of the bill issuer and the bill receiver, and when the enterprise needs to know the identity information of the provider in the business circulation flow for some reasons, the business circulation flow can be completed by searching the identity information of the bill. At present, the identity information of the issuer or the receiver of the bill is usually searched by adopting a manual mode, the bills may need to be browsed one by one to search, and then the identity information on the bill is consulted when the corresponding bill is searched.
However, when the enterprise user uses the bill management software, if the access authority is not set for the bill management software, irrelevant personnel can possibly access the bill management software at any time, so that identity information on the bill is easily collected by the irrelevant personnel, and business secrets such as transaction business circulation flows at the upstream and downstream of the enterprise are revealed, thereby influencing the normal operation of the enterprise. Secondly, a single authentication mode is also easy to crack, so that the risk of revealing identity information is increased. In addition, in the prior art, when the identity information of the bill issuing party or the bill receiving party is queried, a more reliable comparison method is lacked, and the accuracy of the query result is possibly low.
Disclosure of Invention
In view of the above-mentioned drawbacks of the prior art, an object of the present application is to provide a ticket management software access method, system, device and medium, which are used for solving the technical problems existing in the prior art.
To achieve the above and other related objects, the present application provides a ticket management software access method, including the steps of:
responding to a first target object to trigger a generated first access request on bill management software, and providing a permission authentication page for the first target object based on a response result of the first access request; the authority authentication page is used for inputting authority authentication information to the first target object; the method comprises the steps of,
after a confirmation instruction on the authority authentication page is triggered, verifying the authority authentication information input through the authority authentication page; the method comprises the steps of,
when the authority authentication information passes the verification, a center certificate of the terminal equipment is obtained, and the center certificate is compared with a root certificate of the bill management software so as to verify the terminal equipment; and providing a first content page to the first target object when the terminal device passes the verification; the first content page comprises a bill content page which is required to be referred to after authority authentication on the bill management software, and the terminal equipment comprises terminal equipment for triggering and generating the first access request by the first target object;
And if the authority authentication information is not verified or the terminal equipment is not verified, not providing the first content page for the first target object.
In an embodiment of the present application, before responding to the first access request triggered by the first target object on the ticket management software, the method further includes:
receiving and responding to a second access request generated by the first target object triggered on a login page of the bill management software; wherein, the login page of the bill management software is provided by the terminal equipment;
providing an access login page of the bill management software to the first target object based on a response result of the second access request; the access login page is used for inputting identity information to the first target object, and the identity information comprises: account information, password information;
after the confirmation instruction on the access login page is triggered, marking the identity information input by the first target object on the access login page as real-time identity information;
comparing the real-time identity information with the identity information stored in a database, and determining whether the identity information input by the first target object is stored in the database or not according to the comparison result;
If the identity information input by the first target object is stored in the database, marking that the first target object passes login authentication and enters the bill management software, so that the first target object triggers and generates a first access request on the bill management software;
and if the identity information input by the first target object is not stored in the database, marking that the first target object fails login authentication, and providing the first target object with the access login page of the bill management software again.
In an embodiment of the present application, the process of verifying the authority authentication information input through the authority authentication page includes:
receiving account information, password information, temporary session feature code information and biometric identification information input by the first target object through the authority authentication page;
taking account information, password information, temporary session feature code information and biological identification information input by the first target object as authority authentication information of the first target object;
performing first authentication on the first target object based on the account information and the password information; after the first target object passes the first authentication, performing a second authentication on the first target object based on the temporary session feature code information; after the first target object passes the second authentication, performing third authentication on the first target object based on the biological identification information;
If the first target object passes the third authentication, marking that the authority authentication information passes the authentication;
and if the first target object fails the first authentication, the second authentication or the third authentication, marking that the authority authentication information fails the authentication.
In an embodiment of the present application, before providing the first content page to the first target object, the method further includes:
shooting a paper transaction receipt acquired in advance or in real time by using an image shooting device to form an electronic image of the transaction receipt; the paper transaction receipt comprises a paper transaction receipt when the first target object and the second target object conduct business transaction;
performing optical character recognition processing on the electronic image of the transaction receipt to obtain text information in the electronic image of the transaction receipt;
carrying out semantic recognition on the text information, extracting key fields for representing the same business transaction from the text information, and marking the key fields as business transaction fields; extracting a keyword field used for representing the generation time of the paper transaction receipt from the text information, and marking the keyword field as a transaction time field;
And according to the business transaction field and the transaction time field, correlating part or all of the transaction receipt electronic images so that when a first content page is provided for the first target object, all of the transaction receipt electronic images correlated with the same business transaction are displayed on the first content page according to the transaction time.
In one embodiment of the present application, the process of performing optical character recognition processing on the electronic image of the transaction document includes:
labeling the electronic images of the transaction receipts to form a sample data set;
selecting one or more transaction receipt electronic images, adding disturbance parameters for image enhancement, adding the transaction receipt electronic images subjected to image enhancement into the sample data set, and updating the sample data set to obtain an updated sample data set;
selecting a plurality of transaction receipt electronic images from the updated sample data set according to random proportion as a training data set, and taking the rest transaction receipt electronic images as a test set;
inputting the training data set into a pre-training optical character recognition model for training, and outputting the trained optical character recognition model when the training times reach the preset times;
And detecting the recognition precision of the trained optical character recognition model by using the test set, and performing optical character recognition processing on the electronic image of the transaction receipt by using the trained optical character recognition model at the current moment when the recognition precision is larger than or equal to a preset precision value.
In an embodiment of the present application, if the identification accuracy is smaller than a preset accuracy value, the method further includes:
selecting a plurality of transaction receipt electronic images from the sample data set according to a random proportion to serve as a new training data set, and taking the rest transaction receipt electronic images as a new test set; the method comprises the steps of,
performing iterative training on the optical character recognition model trained at the current moment by using the new training data set, detecting the recognition precision of the optical character recognition model after iterative training by using the new testing set, and ending the iterative training until the recognition precision corresponding to the optical character recognition model after iterative training is greater than or equal to a preset precision value; the method comprises the steps of,
and performing optical character recognition processing on the electronic image of the transaction receipt by using an optical character recognition model when the iterative training is finished.
In an embodiment of the present application, the disturbance parameters include at least one of: character rules, character length, dictionary range, number of characters, text lines, text boxes.
The application also provides a bill management software access system, which comprises:
the access request response module is used for responding to a first access request generated by triggering a first target object on bill management software and providing a permission authentication page for the first target object based on a response result of the first access request; the authority authentication page is used for inputting authority authentication information to the first target object;
the target object verification module is used for verifying the authority authentication information input through the authority authentication page after the confirmation instruction on the authority authentication page is triggered;
the terminal equipment verification module is used for acquiring a center certificate of the terminal equipment when the authority authentication information passes the verification, and comparing the center certificate with a root certificate of the bill management software so as to verify the terminal equipment; the terminal equipment comprises terminal equipment for triggering and generating the first access request by the first target object;
the access page module is used for providing a first content page for the first target object when the terminal equipment passes the verification; or, if the authority authentication information is not verified and/or the terminal device is not verified, not providing the first content page to the first target object; the first content page comprises a bill content page which is required to be referred to after authority authentication on the bill management software.
The application also provides a ticket management software access device, comprising:
a processor; and, a step of, in the first embodiment,
a computer readable medium storing instructions that, when executed by the processor, cause the device to perform the ticket management software access method of any one of the above.
The present application also provides a computer readable medium having instructions stored thereon that are loaded by a processor and that perform a ticket management software access method as described in any of the above.
As described above, the present application provides a method, a system, a device and a medium for accessing bill management software, which have the following beneficial effects: when a user accesses the bill management software through an interface, the method and the system can carry out identity verification on the accessed user for a plurality of times, and the identity verification modes are different each time, so that irrelevant personnel can access the bill management software at any time, the access security of the bill management software is enhanced, the leakage of business transaction information, identity information and the like on the bill is avoided, the business secret of an enterprise is effectively protected, and the operating efficiency of the enterprise can be indirectly improved. Meanwhile, after multiple times of identity verification, the content page of the bill management software is presented to the access user, so that the access user can normally review the corresponding content page.
Drawings
FIG. 1 is a schematic diagram of an exemplary system architecture to which the subject matter of one or more embodiments of the present application may be applied;
FIG. 2 is a flow chart of a method for accessing ticket management software according to an embodiment of the present application;
FIG. 3 is a schematic hardware architecture of a ticket management software access system according to an embodiment of the present disclosure;
fig. 4 is a schematic diagram of a hardware architecture of a ticket management software access device suitable for implementing one or more embodiments of the present application.
Detailed Description
Other advantages and effects of the present application will become apparent to those skilled in the art from the present disclosure, when the following description of the embodiments is taken in conjunction with the accompanying drawings. The present application may be embodied or carried out in other specific embodiments, and the details of the present application may be modified or changed from various points of view and applications without departing from the spirit of the present application. It should be noted that the following embodiments and features in the embodiments may be combined with each other without conflict.
It should be noted that, the illustrations provided in the present embodiment merely illustrate the basic concepts of the application by way of illustration, and only the components related to the application are shown in the drawings, rather than being drawn according to the number, shape and size of the components in actual implementation, and the form, number and proportion of the components in actual implementation may be arbitrarily changed, and the layout of the components may be more complex.
FIG. 1 illustrates a schematic diagram of an exemplary system architecture to which the subject matter of one or more embodiments of the present application may be applied. As shown in fig. 1, system architecture 100 may include a terminal device 110, a network 120, and a server 130. Terminal device 110 may include various electronic devices such as smart phones, tablet computers, notebook computers, desktop computers, and the like. The server 130 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing cloud computing services. Network 120 may be a communication medium of various connection types capable of providing a communication link between terminal device 110 and server 130, and may be, for example, a wired communication link or a wireless communication link.
The system architecture in the embodiments of the present application may have any number of terminal devices, networks, and servers, as desired for implementation. For example, the server 130 may be a server group composed of a plurality of server devices. In addition, the technical solution provided in the embodiment of the present application may be applied to the terminal device 110, or may be applied to the server 130, or may be implemented by the terminal device 110 and the server 130 together, which is not limited in particular in this application.
In one embodiment of the present application, the terminal device 110 or the server 130 of the present application may trigger a generated first access request on the ticket management software in response to the first target object, and provide a permission authentication page to the first target object based on a response result of the first access request; the authority authentication page is used for inputting authority authentication information to the first target object; after the confirmation instruction on the authority authentication page is triggered, verifying the authority authentication information input through the authority authentication page; when the authority authentication information passes the verification, a center certificate of the terminal equipment is obtained, and the center certificate is compared with a root certificate of bill management software to verify the terminal equipment; and providing a first content page to the first target object when the terminal device passes the verification; the terminal equipment comprises terminal equipment for triggering and generating a first access request by a first target object; if the authority authentication information is not verified or the terminal equipment is not verified, the first content page is not provided for the first target object. The terminal equipment 110 or the server 130 is utilized to execute the bill management software access method, when a user accesses the bill management software through an interface, multiple identity verifications can be carried out on the accessed user, and each identity verification mode is different, so that irrelevant personnel can be effectively prevented from accessing the bill management software at any time, the access safety of the bill management software is enhanced, the leakage of business transaction information, identity information and the like on the bill is avoided, the business secret of an enterprise is effectively protected, and the business efficiency of the enterprise can be indirectly improved. Meanwhile, after multiple times of identity verification, the content page of the bill management software is presented to the access user, so that the access user can normally review the corresponding content page. For example, the accessing user can input an identity inquiry character through the first content page, then compare the identity inquiry character with a prestored bill, and search the identity information of the bill issuer or the receiver through the comparison result. .
The foregoing describes the contents of an exemplary system architecture to which the present application technical solution is applied, and the following description continues to describe the ticket management software access method of the present application.
Fig. 2 is a schematic flow chart of a ticket management software access method according to an embodiment of the present application. Specifically, in an exemplary embodiment, as shown in fig. 2, the present embodiment provides a ticket management software access method, which includes the following steps:
s210, responding to a first access request generated by triggering a first target object on bill management software, and providing a permission authentication page for the first target object based on a response result of the first access request; the authority authentication page is used for inputting authority authentication information to the first target object;
s220, after the confirmation instruction on the authority authentication page is triggered, verifying the authority authentication information input through the authority authentication page;
s230-1, when the authority authentication information passes the verification, acquiring a center certificate of the terminal equipment, and comparing the center certificate with a root certificate of bill management software to verify the terminal equipment; and providing a first content page to the first target object when the terminal device passes the verification; the terminal equipment comprises terminal equipment for triggering and generating a first access request by a first target object;
And S230-2, if the authority authentication information is not verified or the terminal equipment is not verified, the first content page is not provided to the first target object.
Therefore, when the user accesses the bill management software through the interface, the embodiment can carry out multiple identity verifications on the accessed user, and the identity verification modes are different each time, so that irrelevant personnel can be effectively prevented from accessing the bill management software at any time, the access security of the bill management software is enhanced, the leakage of business transaction information, identity information and the like on the bill is avoided, the business secret of an enterprise is effectively protected, and the operating efficiency of the enterprise can be indirectly improved. Meanwhile, after multiple times of identity verification, the content page of the bill management software is presented to the access user, so that the access user can normally review the corresponding content page.
According to the above description, in an exemplary embodiment, a first content page is provided to a first target object, the first target object may input an identity inquiry character through the first content page, and then compare the identity inquiry character with a pre-stored ticket, and search related information of the first target object or the second target object through a comparison result. The first target object and the second target object are provided with a transaction receipt record. As an example, in this embodiment, the first target object and the second target object may be an issuer of the paper transaction receipt, or may be a recipient of the paper transaction receipt. If the first target object is the issuer of the paper transaction document, the second target object is the recipient of the paper transaction document; if the second target object is an issuer of the paper transaction document, the first target object is a recipient of the paper transaction document. Specifically, in this embodiment, the process of searching, by the first target object, the identity information of the second target object through the first content page includes:
Receiving an identity inquiry character input by a first target object on a first content page;
analyzing the identity inquiry character, extracting a key field for acquiring the identity information of the second target object based on the analysis result of the identity inquiry character, and marking the key field as a first key field;
taking the first key field as an identity index of an identity inquiry character, and calculating the similarity of the first key field and the second key field to be used as a first similarity; comparing the first similarity value with a preset similarity value; the second key field is pre-stored in the database and is generated based on the transaction receipt records of the first target object and the second target object. As an example, in the present embodiment, the second key field includes at least one of: the method comprises the steps of a bill issuer name, a bill receiver name, a bill issuer address and a bill receiver address. Specifically, the process of generating the second key field in the database according to the present embodiment includes: shooting a paper transaction receipt acquired in advance or in real time by using an image shooting device to form an electronic image of the transaction receipt; performing optical character recognition processing on the electronic image of the transaction receipt to obtain text information in the electronic image of the transaction receipt; carrying out semantic recognition on the text information, extracting a key field for representing the identity information of a second target object in the paper transaction receipt from the text information, and marking the key field as a second key field; and taking the second key field as an identity index of the second target object, and adding the second key field into a pre-established or real-time database. The image capturing device may be a camera, such as a camera, a mobile phone having a camera function, a tablet having a camera function, a computer having a camera function, a printer having a camera function or a scanning function, or the like. In this embodiment, the preset similarity value may be set according to actual situations, for example, the similarity value may be 0.95 as the preset similarity value, and the similarity value of other values may be used as the preset similarity value, which is not described herein.
If the first similarity value is greater than or equal to the preset similarity value, determining that a second target object exists in the database, matching identity information corresponding to a second key field from the database, taking the identity information as a first query result corresponding to an identity query character, and displaying the first query result on a second content page;
if the first similarity value is smaller than the preset similarity value, determining that the second target object does not exist in the database, feeding back a third content page to the first target object, and redisplaying the identity inquiry character in the third content page to remind the first target object to check the identity inquiry character again.
Therefore, the identity information can be quickly and accurately searched through the natural language or image recognition technology, and the searching efficiency is greatly improved; in addition, the embodiment can accurately identify the information on the bill by utilizing natural language and image identification technology, thereby reducing the error rate; meanwhile, the embodiment can save labor cost and improve working efficiency through an automatic identification technology. In addition, the embodiment can rapidly and accurately acquire the identity information of the bill, provide convenient and efficient service for the user, and improve the experience of the user. In summary, compared with the traditional method for manually searching the document identity information, the method has the advantages of higher efficiency, lower error rate, lower cost and better user experience, and has obvious superiority. In addition, in this embodiment, the identity acquisition character input by the first target object on the first display interface may be incorrect and incomplete, so in this embodiment, when the second target object cannot be acquired by the identity acquisition character input on the first display interface, the identity inquiry character is redisplayed on the third display interface, so that the first target object can check the input identity inquiry character again, and incorrect input or incomplete input is avoided, which results in that the identity result corresponding to the document cannot be acquired.
In an exemplary embodiment, before responding to the first access request triggered by the first target object on the ticket management software, the embodiment may further include:
receiving and responding to a second access request generated by triggering the first target object on a login page of bill management software; the login page of the bill management software is provided by the terminal equipment;
providing an access login page of the bill management software for the first target object based on a response result of the second access request; the access login page is used for inputting identity information to the first target object, and the identity information comprises: account information, password information;
after a confirmation instruction on the access login page is triggered, marking the identity information input by the first target object on the access login page as real-time identity information;
comparing the real-time identity information with the identity information stored in the database, and determining whether the identity information input by the first target object is stored in the database or not according to the comparison result;
if the identity information input by the first target object is stored in the database, marking that the first target object passes login authentication and enters ticket management software, so that the first target object triggers and generates a first access request on the ticket management software;
If the identity information input by the first target object is not stored in the database, marking that the first target object fails login authentication, and providing the first target object with the login page accessed by the bill management software again.
It can be seen that, in this embodiment, before responding to the first access request triggered by the first target object on the ticket management software, identity information verification is performed on the first target object, so as to determine whether the first target object has the authority to access the ticket management software. If the first target object passes the login authentication, the first target object is indicated to have the authority to access the bill management software, and the bill management software can be directly accessed at the moment, so that the first target object triggers the generation of the first access request on the bill management software. If the first target object does not pass the login authentication, the first target object is indicated to have no authority for accessing the bill management software, at the moment, the first target object can be provided with the login page accessed by the bill management software again, and identity information verification is carried out on the first target object again. If the number of repetition times of identity information verification on the first target object exceeds the preset verification times, the first target object can not be provided with the access login page of the bill management software any more, and the process of repeated verification is avoided. The preset verification number may be set according to the actual situation, for example, may be set to 3 times or may be set to 5 times.
According to the above description, in an exemplary embodiment, a process of verifying authority authentication information input through an authority authentication page includes:
receiving account information, password information, temporary session feature code information and biological identification information which are input by a first target object through a permission authentication page; in this embodiment, the temporary session feature code information may be temporary verification code information sent by the ticket management software to a mobile phone communication number associated with the first target object; the biometric information may be face information, body information, iris information, etc.
Taking account information, password information, temporary session feature code information and biological identification information input by the first target object as authority authentication information of the first target object;
performing first authentication on the first target object based on the account information and the password information; after the first target object passes the first authentication, performing a second authentication on the first target object based on the temporary session feature code information; after the first target object passes the second authentication, performing third authentication on the first target object based on the biological identification information;
If the first target object passes the third authentication, marking authority authentication information to pass the authentication;
if the first target object fails the first authentication, the second authentication or the third authentication, the mark authority authentication information fails the authentication.
Therefore, the embodiment performs three times of authentication on the first target object through account information, password information, temporary session feature code information and biometric identification information, so that the problem that a single authentication mode is easy to be broken and the security is not high can be solved. And by setting a plurality of identity verification modes and limiting access rights, the access control and identity information inquiry functions of the bill management software can be realized, the bill management software is prevented from being accessed by irrelevant personnel, the business secrets of enterprises are effectively protected, and the enterprises are helped to maintain normal operation.
According to the above description, in an exemplary embodiment, the process of comparing the terminal device center certificate with the root certificate of the ticket management software includes:
a. the bill management software sends a request to the terminal equipment to request to establish a secure connection;
b. the terminal equipment sends a self center certificate to bill management software;
c. After receiving the center certificate of the terminal equipment, the bill management software uses the root certificate to verify the center certificate of the terminal equipment;
d. if the bill management software passes the verification, the bill management software generates a random number, encrypts the random number by using a center certificate of the terminal equipment, and sends the encrypted random number to the terminal equipment;
e. after receiving the encrypted random number, the terminal equipment decrypts the encrypted random number by using the private key of the terminal equipment, and sends the decrypted random number to bill management software;
f. and after receiving the decrypted random number sent by the terminal equipment, the bill management software passes the comparison verification.
If the center certificate of the terminal equipment is compared with the root certificate of the bill management software, the corresponding communication flow is as follows: the bill management software and the terminal equipment are connected safely; the ticket management software can send encrypted data to the terminal equipment, and the terminal equipment can decrypt by using the private key of the terminal equipment; the terminal device may also send encrypted data to the ticket management software, which may decrypt using the terminal device's central certificate.
If the comparison between the center certificate of the terminal equipment and the root certificate of the bill management software is not passed, the corresponding communication flow is as follows: if the bill management software finds that the verification fails when verifying the center certificate of the terminal equipment, the bill management software stops the connection establishment; the bill management software and the terminal equipment cannot establish secure connection and cannot carry out encrypted communication; the parties may choose to terminate the communication or attempt other security verification means.
The present embodiment provides only the above common technical process and communication flow of comparison and verification between devices, and the actual situation may be different according to the specific security protocol, certificate format and verification mechanism. Specific implementation details may need to be adjusted according to specific requirements of the client and system architecture, and this implementation will not be described herein.
In an exemplary embodiment, before providing the first content page to the first target object, the embodiment may further include:
shooting a paper transaction receipt acquired in advance or in real time by using an image shooting device to form an electronic image of the transaction receipt; the paper transaction receipt comprises a paper transaction receipt when the first target object and the second target object conduct business transaction;
performing optical character recognition processing on the electronic image of the transaction receipt to obtain text information in the electronic image of the transaction receipt;
semantic recognition is carried out on the text information, and key fields for representing the same business transaction are extracted from the text information and marked as business transaction fields; extracting a keyword field for representing the generation time of the paper transaction receipt from the text information, and marking the keyword field as a transaction time field;
And according to the business transaction field and the transaction time field, correlating part or all of the transaction receipt electronic images so that when a first content page is provided for a first target object, all of the transaction receipt electronic images correlated with the same business transaction are displayed on the first content page according to the transaction time.
Therefore, according to the embodiment, after the first content page is provided for the first target object, the first target object can query the whole association result only by inputting all or part of query characters in the association result on the first content page, so that the first target object is helped to accurately find out the transaction receipt electronic image, and the query efficiency can be improved.
In accordance with the above, in an exemplary embodiment, the process of performing optical character recognition processing on an electronic image of a transaction document includes:
labeling the electronic images of the transaction receipts to form a sample data set;
and selecting one or more transaction receipt electronic images to add disturbance parameters for image enhancement, and adding the transaction receipt electronic images subjected to image enhancement into a sample data set to update the sample data set so as to obtain an updated sample data set. In this embodiment, the disturbance parameters include at least one of: character rules, character length, dictionary range, number of characters, text lines, text boxes. Specifically, the embodiment can improve the accuracy and generalization capability of a specific character set by means of automatic enhancement of multiple samples aiming at one or more selected electronic images of the transaction receipt. The generalization capability of the basic model, especially the generalization capability of the small character set, is enhanced through a sample enhancement algorithm. Disturbance factors are added into parameters such as character rules, character lengths, dictionary ranges, character numbers, text lines, text boxes and the like, and parameters with small influence such as fonts, character sets, background pictures and texture pictures are eliminated. To avoid the influence among parameters, the effect generated by the specific parameters is automatically tested and iterated. Through migration learning under specific scenes, the accuracy requirement is achieved.
Selecting a plurality of transaction receipt electronic images from the updated sample data set according to random proportion as a training data set, and taking the rest transaction receipt electronic images as a test set;
inputting the training data set into a pre-training optical character recognition model for training, and outputting the trained optical character recognition model when the training times reach the preset times;
detecting the recognition accuracy of the trained optical character recognition model by using the test set;
when the recognition precision is greater than or equal to a preset precision value, performing optical character recognition processing on the electronic image of the transaction receipt by using an optical character recognition model trained at the current moment;
when the identification precision is smaller than a preset precision value, selecting a plurality of transaction receipt electronic images from the sample data set according to random proportion again to serve as a new training data set, and taking the rest transaction receipt electronic images as a new test set; performing iterative training on the optical character recognition model trained at the current moment by using the new training data set, detecting the recognition precision of the optical character recognition model after iterative training by using the new testing set, and ending the iterative training until the recognition precision corresponding to the optical character recognition model after iterative training is greater than or equal to a preset precision value; and performing optical character recognition processing on the electronic image of the transaction receipt by using the optical character recognition model when the iterative training is finished.
In this embodiment, the training framework for pre-training the optical character recognition model includes, but is not limited to: convolutional neural network, recurrent neural network, connection sequence classification. As an example, the training framework selected in the embodiment of the present invention is: convolutional neural network + cyclic neural network + connection sequence classification. Acquiring super parameters of training sample set data, and setting training probability according to the super parameters; and randomly extracting one or more training sample set data according to the set training probability to form a batch for training, and generating one or more pre-training optical character recognition models. After one or more times of training, the generated pre-training optical character recognition model is evaluated and verified by using an adaptive moment estimation Optimizer (Adam Optimizer), and the optimal pre-training optical character recognition model in the evaluation and verification result is saved. When the training data set is input into the pre-training optical character recognition model for training, if the pre-training optical character recognition model exists, the pre-training optical character recognition model is used for transfer learning; if the pre-training optical character recognition model does not exist, the pre-training optical character recognition model is generated through training, and then the training data set is input into the pre-training optical character recognition model for training.
In summary, the present application provides a ticket management software access method, by responding to a first access request generated by triggering a first target object on ticket management software, and providing a permission authentication page for the first target object based on a response result of the first access request; the authority authentication page is used for inputting authority authentication information to the first target object; after the confirmation instruction on the authority authentication page is triggered, verifying the authority authentication information input through the authority authentication page; when the authority authentication information passes the verification, a center certificate of the terminal equipment is obtained, and the center certificate is compared with a root certificate of bill management software to verify the terminal equipment; and providing a first content page to the first target object when the terminal device passes the verification; the terminal equipment comprises terminal equipment for triggering and generating a first access request by a first target object; if the authority authentication information is not verified or the terminal equipment is not verified, the first content page is not provided for the first target object. Therefore, when a user accesses the bill management software through the interface, the method can carry out identity verification on the accessed user for a plurality of times, and the identity verification modes are different each time, thereby effectively avoiding that irrelevant personnel can access the bill management software at any time, enhancing the access security of the bill management software, avoiding that business transaction information, identity information and the like on the bill are revealed, effectively protecting business secrets of enterprises, and indirectly improving the business efficiency of the enterprises. Meanwhile, after multiple times of identity verification, the content page of the bill management software is presented to the access user, so that the access user can normally review the corresponding content page.
As shown in fig. 3, in another exemplary embodiment of the present application, this embodiment further provides a ticket management software access system, including:
an access request response module 310, configured to trigger a generated first access request on ticket management software in response to a first target object, and provide a permission authentication page for the first target object based on a response result of the first access request; the authority authentication page is used for inputting authority authentication information to the first target object;
the target object verification module 320 is configured to verify the authority authentication information input through the authority authentication page after the confirmation instruction on the authority authentication page is triggered;
the terminal device verification module 330 is configured to obtain a center certificate of the terminal device when the authority authentication information passes the verification, and compare the center certificate with a root certificate of the ticket management software to verify the terminal device; the terminal equipment comprises terminal equipment for triggering and generating a first access request by a first target object;
an access page module 340, configured to provide a first content page to a first target object when the terminal device passes the verification; or, if the authority authentication information fails to pass the verification and/or the terminal equipment fails to pass the verification, not providing the first content page to the first target object; the first content page comprises a bill content page which is required to be referred to after authority authentication on bill management software.
Therefore, when the user accesses the bill management software through the interface, the embodiment can carry out multiple identity verifications on the accessed user, and the identity verification modes are different each time, so that irrelevant personnel can be effectively prevented from accessing the bill management software at any time, the access security of the bill management software is enhanced, the leakage of business transaction information, identity information and the like on the bill is avoided, the business secret of an enterprise is effectively protected, and the operating efficiency of the enterprise can be indirectly improved. Meanwhile, after multiple times of identity verification, the content page of the bill management software is presented to the access user, so that the access user can normally review the corresponding content page.
The application provides a bill management software access system, which responds to a first access request generated by triggering a first target object on bill management software through an access request response module, and provides an authority authentication page for the first target object based on a response result of the first access request; the authority authentication page is used for inputting authority authentication information to the first target object; after a confirmation instruction on the authority authentication page is triggered through the target object verification module, verifying the authority authentication information input through the authority authentication page; when the authority authentication information passes the authentication, a center certificate of the terminal equipment is obtained through a terminal equipment authentication module, and the center certificate is compared with a root certificate of bill management software to authenticate the terminal equipment; and providing a first content page to the first target object when the terminal device passes the verification through the access page module; the terminal equipment comprises terminal equipment for triggering and generating a first access request by a first target object; or the access page module does not provide the first content page to the first target object when the authority authentication information is not verified and/or the terminal device is not verified. Therefore, when a user accesses the bill management software through the interface, the system can carry out identity verification on the accessed user for a plurality of times, and the identity verification modes are different each time, so that irrelevant personnel can be effectively prevented from accessing the bill management software at any time, the access security of the bill management software is enhanced, the leakage of business transaction information, identity information and the like on the bill is avoided, the business secret of an enterprise is effectively protected, and the operating efficiency of the enterprise can be indirectly improved. Meanwhile, after multiple times of identity verification, the content page of the bill management software is presented to the access user, so that the access user can normally review the corresponding content page.
It should be noted that, the bill management software access system provided in the foregoing embodiment and the bill management software access method provided in the foregoing embodiment belong to the same concept, and a specific manner in which each module performs an operation has been described in detail in the method embodiment, which is not described herein again. In practical application, the ticket management software access system provided in the above embodiment may distribute the functions to be completed by different functional modules according to needs, that is, the internal structure of the system is divided into different functional modules to complete all or part of the functions described above, which is not limited herein. For example, the access request response module 310 may be used to perform step S210, the target object authentication module 320 may be used to perform step S220, the terminal device authentication module 330 may be used to perform step S230-1, and the access page module 340 may be used to perform step S230-2.
It should be noted that, in the above embodiment, when the related data (for example, the identity inquiry character, the account information, the password information, the temporary session feature code information, the biometric information, and the like) is collected, stored, used, processed, transmitted, provided, disclosed, deleted, and the like, the processing is performed with or without consent of the user. Such as identity lookup characters, account information, password information, temporary session feature code information, and biometric information, are authorized with the user's knowledge and consent; either the user is actively provided after reading the relevant description, or the user is actively authorized/provided/uploaded, or otherwise obtained through or informed of the user's consent, while using some or all of the functions described in the above embodiments.
The embodiment of the application also provides a bill management software access device, which can comprise: one or more processors; and one or more machine readable media having instructions stored thereon that, when executed by the one or more processors, cause the device to perform the ticket management software access method described in fig. 2. Fig. 4 shows a schematic structural diagram of a ticket management software access device 1000. Referring to fig. 4, the ticket management software access device 1000 includes: processor 1010, memory 1020, power supply 1030, display unit 1040, and input unit 1060.
The processor 1010 is a control center of the ticket management software access device 1000, connects the respective components using various interfaces and lines, and performs various functions of the ticket management software access device 1000 by running or executing software programs and/or data stored in the memory 1020, thereby performing overall monitoring of the ticket management software access device 1000. In this embodiment, the processor 1010 executes the ticket management software access method described in fig. 2 when it invokes a computer program stored in the memory 1020. In the alternative, processor 1010 may include one or more processing units; preferably, the processor 1010 may integrate an application processor that primarily handles operating systems, user interfaces, applications, etc., with a modem processor that primarily handles wireless communications. In some embodiments, the processor, memory, may be implemented on a single chip, and in some embodiments, they may be implemented separately on separate chips.
The memory 1020 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, various applications, etc.; the storage data area may store data created according to the use of the ticket management software access device 1000, etc. In addition, memory 1020 may include high-speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state memory device, among others.
The ticket management software access device 1000 also includes a power supply 1030 (e.g., a battery) for powering the various components, which may be logically connected to the processor 1010 via a power management system so as to perform functions such as managing charge, discharge, and power consumption via the power management system.
The display unit 1040 may be used to display information input by a user or information provided to the user, and various menus of the ticket management software access device 1000, and in this embodiment of the present application, is mainly used to display a display interface of each application in the ticket management software access device 1000, and objects such as text and pictures displayed in the display interface. The display unit 1040 may include a display panel 1050. The display panel 1050 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (OLED), or the like.
The input unit 1060 may be used to receive information such as numbers or characters input by a user. The input unit 1060 may include a touch panel 1070 and other input devices 1080. Wherein the touch panel 1070, also referred to as a touch screen, may collect touch operations thereon or thereabout by a user (e.g., operations of the user on the touch panel 1070 or thereabout by using any suitable object or accessory such as a finger, a stylus, etc.).
Specifically, the touch panel 1070 may detect a touch operation by a user, detect signals resulting from the touch operation, convert the signals into coordinates of contacts, send the coordinates to the processor 1010, and receive and execute commands sent from the processor 1010. In addition, the touch panel 1070 may be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. Other input devices 1080 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, power on and off keys, etc.), a trackball, mouse, joystick, etc.
Of course, the touch panel 1070 may overlay the display panel 1050, and when a touch operation is detected on or near the touch panel 1070, the touch operation is transmitted to the processor 1010 to determine the type of touch event, and then the processor 1010 provides a corresponding visual output on the display panel 1050 according to the type of touch event. Although in fig. 4, the touch panel 1070 and the display panel 1050 implement the input and output functions of the ticket management software access apparatus 1000 as two separate components, in some embodiments, the touch panel 1070 and the display panel 1050 may be integrated to implement the input and output functions of the ticket management software access apparatus 1000.
The ticket management software access device 1000 may also include one or more sensors, such as a pressure sensor, a gravitational acceleration sensor, a proximity light sensor, and the like. Of course, the ticket management software access device 1000 described above may also include other components such as cameras, as desired in a particular application.
Embodiments of the present application also provide a computer-readable storage medium having instructions stored therein that, when executed by one or more processors, enable the above-described apparatus to perform a ticket management software access method as described in fig. 2 of the present application.
It will be appreciated by those skilled in the art that fig. 4 is merely an example of a ticket management software access device and is not limiting of the device, and the device may include more or fewer components than shown, or may combine certain components, or different components. For convenience of description, the above parts are described as being functionally divided into modules (or units) respectively. Of course, in implementing the present application, the functions of each module (or unit) may be implemented in the same piece or pieces of software or hardware.
It will be appreciated by those skilled in the art that the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, magnetic disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein. The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application, which are understood to include each flowchart illustration and/or block diagram illustration, and combinations of flowchart illustrations and/or block diagrams, respectively, of computer program instructions. These computer program instructions may be applied to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be understood that although the terms first, second, third, etc. may be used in embodiments of the present application to describe a preset range, etc., these preset ranges should not be limited to these terms. These terms are only used to distinguish one preset range from another. For example, a first preset range may also be referred to as a second preset range, and similarly, a second preset range may also be referred to as a first preset range without departing from the scope of embodiments of the present application.
The foregoing embodiments are merely illustrative of the principles of the present application and their effectiveness, and are not intended to limit the application. Modifications and variations may be made to the above-described embodiments by those of ordinary skill in the art without departing from the spirit and scope of the present application. Accordingly, it is intended that all equivalent modifications and variations which may be accomplished by persons skilled in the art without departing from the spirit and technical spirit of the disclosure be covered by the claims of this application.

Claims (10)

1. A ticket management software access method, the method comprising the steps of:
responding to a first target object to trigger a generated first access request on bill management software, and providing a permission authentication page for the first target object based on a response result of the first access request; the authority authentication page is used for inputting authority authentication information to the first target object; the method comprises the steps of,
After a confirmation instruction on the authority authentication page is triggered, verifying the authority authentication information input through the authority authentication page; the method comprises the steps of,
when the authority authentication information passes the verification, a center certificate of the terminal equipment is obtained, and the center certificate is compared with a root certificate of the bill management software so as to verify the terminal equipment; and providing a first content page to the first target object when the terminal device passes the verification; the first content page comprises a bill content page which is required to be referred to after authority authentication on the bill management software, and the terminal equipment comprises terminal equipment for triggering and generating the first access request by the first target object;
and if the authority authentication information is not verified or the terminal equipment is not verified, not providing the first content page for the first target object.
2. The ticket management software access method of claim 1, wherein prior to responding to a first access request triggered on ticket management software by a first target object, the method further comprises:
receiving and responding to a second access request generated by the first target object triggered on a login page of the bill management software; wherein, the login page of the bill management software is provided by the terminal equipment;
Providing an access login page of the bill management software to the first target object based on a response result of the second access request; the access login page is used for inputting identity information to the first target object, and the identity information comprises: account information, password information;
after the confirmation instruction on the access login page is triggered, marking the identity information input by the first target object on the access login page as real-time identity information;
comparing the real-time identity information with the identity information stored in a database, and determining whether the identity information input by the first target object is stored in the database or not according to the comparison result;
if the identity information input by the first target object is stored in the database, marking that the first target object passes login authentication and enters the bill management software, so that the first target object triggers and generates a first access request on the bill management software;
and if the identity information input by the first target object is not stored in the database, marking that the first target object fails login authentication, and providing the first target object with the access login page of the bill management software again.
3. The ticket management software access method according to claim 1 or 2, wherein the process of verifying the authority authentication information input through the authority authentication page includes:
receiving account information, password information, temporary session feature code information and biometric identification information input by the first target object through the authority authentication page;
taking account information, password information, temporary session feature code information and biological identification information input by the first target object as authority authentication information of the first target object;
performing first authentication on the first target object based on the account information and the password information; after the first target object passes the first authentication, performing a second authentication on the first target object based on the temporary session feature code information; after the first target object passes the second authentication, performing third authentication on the first target object based on the biological identification information;
if the first target object passes the third authentication, marking that the authority authentication information passes the authentication;
And if the first target object fails the first authentication, the second authentication or the third authentication, marking that the authority authentication information fails the authentication.
4. The ticket management software access method of claim 1 or 2, wherein before providing the first content page to the first target object, the method further comprises:
shooting a paper transaction receipt acquired in advance or in real time by using an image shooting device to form an electronic image of the transaction receipt; the paper transaction receipt comprises a paper transaction receipt when the first target object and the second target object conduct business transaction;
performing optical character recognition processing on the electronic image of the transaction receipt to obtain text information in the electronic image of the transaction receipt;
carrying out semantic recognition on the text information, extracting key fields for representing the same business transaction from the text information, and marking the key fields as business transaction fields; extracting a keyword field used for representing the generation time of the paper transaction receipt from the text information, and marking the keyword field as a transaction time field;
and according to the business transaction field and the transaction time field, correlating part or all of the transaction receipt electronic images so that when a first content page is provided for the first target object, all of the transaction receipt electronic images correlated with the same business transaction are displayed on the first content page according to the transaction time.
5. The ticket management software access method of claim 4 wherein the process of optically character recognition processing the electronic image of the transaction document comprises:
labeling the electronic images of the transaction receipts to form a sample data set;
selecting one or more transaction receipt electronic images, adding disturbance parameters for image enhancement, adding the transaction receipt electronic images subjected to image enhancement into the sample data set, and updating the sample data set to obtain an updated sample data set;
selecting a plurality of transaction receipt electronic images from the updated sample data set according to random proportion as a training data set, and taking the rest transaction receipt electronic images as a test set;
inputting the training data set into a pre-training optical character recognition model for training, and outputting the trained optical character recognition model when the training times reach the preset times;
and detecting the recognition precision of the trained optical character recognition model by using the test set, and performing optical character recognition processing on the electronic image of the transaction receipt by using the trained optical character recognition model at the current moment when the recognition precision is larger than or equal to a preset precision value.
6. The ticket management software access method of claim 5, wherein if the identification accuracy is less than a preset accuracy value, the method further comprises:
selecting a plurality of transaction receipt electronic images from the sample data set according to a random proportion to serve as a new training data set, and taking the rest transaction receipt electronic images as a new test set; the method comprises the steps of,
performing iterative training on the optical character recognition model trained at the current moment by using the new training data set, detecting the recognition precision of the optical character recognition model after iterative training by using the new testing set, and ending the iterative training until the recognition precision corresponding to the optical character recognition model after iterative training is greater than or equal to a preset precision value; the method comprises the steps of,
and performing optical character recognition processing on the electronic image of the transaction receipt by using an optical character recognition model when the iterative training is finished.
7. The ticket management software access method of claim 5 or 6, wherein the perturbation parameters comprise at least one of: character rules, character length, dictionary range, number of characters, text lines, text boxes.
8. A ticket management software access system, said system comprising:
The access request response module is used for responding to a first access request generated by triggering a first target object on bill management software and providing a permission authentication page for the first target object based on a response result of the first access request; the authority authentication page is used for inputting authority authentication information to the first target object;
the target object verification module is used for verifying the authority authentication information input through the authority authentication page after the confirmation instruction on the authority authentication page is triggered;
the terminal equipment verification module is used for acquiring a center certificate of the terminal equipment when the authority authentication information passes the verification, and comparing the center certificate with a root certificate of the bill management software so as to verify the terminal equipment; the terminal equipment comprises terminal equipment for triggering and generating the first access request by the first target object;
the access page module is used for providing a first content page for the first target object when the terminal equipment passes the verification; or, if the authority authentication information is not verified and/or the terminal device is not verified, not providing the first content page to the first target object; the first content page comprises a bill content page which is required to be referred to after authority authentication on the bill management software.
9. A ticket management software access device, comprising:
a processor; and, a step of, in the first embodiment,
a computer readable medium storing instructions that, when executed by the processor, cause the apparatus to perform the ticket management software access method of any of claims 1 to 7.
10. A computer readable medium having instructions stored thereon, the instructions being loaded by a processor and executing the ticket management software access method of any one of claims 1 to 7.
CN202311568980.0A 2023-11-22 2023-11-22 Bill management software access method, system, equipment and medium Pending CN117763534A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311568980.0A CN117763534A (en) 2023-11-22 2023-11-22 Bill management software access method, system, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311568980.0A CN117763534A (en) 2023-11-22 2023-11-22 Bill management software access method, system, equipment and medium

Publications (1)

Publication Number Publication Date
CN117763534A true CN117763534A (en) 2024-03-26

Family

ID=90320879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311568980.0A Pending CN117763534A (en) 2023-11-22 2023-11-22 Bill management software access method, system, equipment and medium

Country Status (1)

Country Link
CN (1) CN117763534A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143793A (en) * 2019-12-13 2020-05-12 支付宝(杭州)信息技术有限公司 Access control method and access control device
CN112801041A (en) * 2021-03-08 2021-05-14 北京市商汤科技开发有限公司 Financial data reimbursement method, device, equipment and storage medium
CN115842680A (en) * 2023-02-14 2023-03-24 杭州西软计算机工程有限公司 Network identity authentication management method and system
CN116049807A (en) * 2023-02-28 2023-05-02 重庆长安汽车股份有限公司 Service access system and method, electronic equipment and storage medium
CN116800510A (en) * 2023-07-04 2023-09-22 中国银行股份有限公司 Financial service system, method and medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143793A (en) * 2019-12-13 2020-05-12 支付宝(杭州)信息技术有限公司 Access control method and access control device
CN112801041A (en) * 2021-03-08 2021-05-14 北京市商汤科技开发有限公司 Financial data reimbursement method, device, equipment and storage medium
CN115842680A (en) * 2023-02-14 2023-03-24 杭州西软计算机工程有限公司 Network identity authentication management method and system
CN116049807A (en) * 2023-02-28 2023-05-02 重庆长安汽车股份有限公司 Service access system and method, electronic equipment and storage medium
CN116800510A (en) * 2023-07-04 2023-09-22 中国银行股份有限公司 Financial service system, method and medium

Similar Documents

Publication Publication Date Title
US11475143B2 (en) Sensitive data classification
US11403413B2 (en) Avoiding user session misclassification using configuration and activity fingerprints
CN111886842B (en) Remote user authentication using threshold-based matching
CN112464117B (en) Request processing method, apparatus, computer device and storage medium
WO2020024398A1 (en) Biometrics-assisted payment method and apparatus, and computer device and storage medium
CN109325326A (en) Data desensitization method, device, equipment and medium when unstructured data accesses
US20230153749A1 (en) Biometric authentication to facilitate shipment processing
EP2748781A2 (en) Multi-factor identity fingerprinting with user behavior
CN105743905B (en) A kind of method that realizing secure log, unit and system
US10474836B1 (en) Systems and methods for a generated fraud sandbox
US10764055B1 (en) Cluster-based security for network devices
CN113656761B (en) Business processing method and device based on biological recognition technology and computer equipment
CN113111330B (en) Enterprise legal identity authentication management method and system based on enterprise chain code
US20220058278A1 (en) Using machine learning to bypass activities of a secure document workflow based on recipient profile
CN113486316A (en) User identity authentication method and device, electronic equipment and readable storage medium
CN114996675A (en) Data query method and device, computer equipment and storage medium
CN107656959A (en) A kind of message leaving method, device and message equipment
WO2019153586A1 (en) Chat data processing method and apparatus, computer device and storage medium
KR102594497B1 (en) Method for generating user's wallet address based on face recognition to provide NFT experiences to the user who visit offline NFT stores, and NFT system for performing the same
CN112785410A (en) Relying party risk adjustment indicator systems and methods
CN110737677B (en) Data searching system and method
CN111062046A (en) Handwritten endorsement data security management method and endorsement terminal
US10003464B1 (en) Biometric identification system and associated methods
CN117763534A (en) Bill management software access method, system, equipment and medium
US11531739B1 (en) Authenticating user identity based on data stored in different locations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination