CN106408756A - Method and system for identifying illegal use of identity card in operational internet surfing place - Google Patents
Method and system for identifying illegal use of identity card in operational internet surfing place Download PDFInfo
- Publication number
- CN106408756A CN106408756A CN201610827852.7A CN201610827852A CN106408756A CN 106408756 A CN106408756 A CN 106408756A CN 201610827852 A CN201610827852 A CN 201610827852A CN 106408756 A CN106408756 A CN 106408756A
- Authority
- CN
- China
- Prior art keywords
- identity card
- place
- online
- metering data
- history
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0201—Market modelling; Market analysis; Collecting market data
Landscapes
- Business, Economics & Management (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Data Mining & Analysis (AREA)
- Economics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a method and a system for identifying the illegal use of an identity card in an operational internet surfing place, and relates to the field of certificate identification in an internet service business place. The method comprises the following steps: extracting historical billing data of an internet surfing place of a former natural day to serve as embezzling judgement data; counting the number of all consumption events occurred by each identity card number of the embezzling judgement data; traversing the number of the consumption events of all identity card numbers, marking the identity card numbers with more than X times of the consumption events as suspected embezzled identity card numbers, and counting the number Y of the suspected embezzled identity card numbers; determining whether the current internet surfing place exists a behaviour of using the identity card to open an account for surfing the internet in an unauthorized manner according to the number Y of the suspected embezzled identity card numbers. According to the method and the system for identifying the illegal use of the identity card in the operational internet surfing place, whether the internet surfing place exists the behaviour of using the identity card to open an account for surfing the internet in the unauthorized manner can be determined according to the number of all the consumption events of the same identity card number of the specified internet surfing place on one day.
Description
Technical field
The present invention relates to the certificate identification field in Internet service place of business is and in particular to a kind of operational online field
Illegally using recognition methodss and the system of identity card.
Background technology
With the development of the cybertimes, (offer accomplishing the object of profit making opening to the public of Internet service place
The place of service on net, is commonly called as Internet bar or net coffee, hereinafter referred to as surf the Net place) widely available among society;Online
Place provides computer related hardware for consumer, and consumer can freely manipulate software facility.According to the People's Republic of China (PRC)《Interconnection
Net service business place management rules》Relevant provision regulation, online place online primary condition be:1. must hold
Personal identification papers.2. I must expire for 18 one full year of life.
But, some online places, in order to receive netizen's online that is teenage and not carrying identity card, can be usurped in recent years
The identity card that client loses is opened an account in POS and is settled accounts;And then compromise pupillary physical and mental health, also result in simultaneously
Some law-breakers conceal in online place and anonymity is issued in the Internet and browsed illegal information.
The existing method preventing identity card stolen is generally:Using living things feature recognition (such as recognition of face) cooperation
Electronic characteristic identifies (such as mobile terminal identification code).But although said method needs in first registration biological characteristic and electricity
Subcharacter, but registered biological characteristic and electronic characteristic whether all institute cannot be verified when place of surfing the Net uses identity card
Belong to holder itself.Therefore, the identity card that the client usurping in said method still None- identified online place loses.
(me when opening an account, is needed to know fingerprint additionally, the third generation identity card with fingerprint identification technology has been promoted
Not), but, a large amount of second generation identity cards not possessing fingerprint identification technology are still commonly using;Therefore, also do not have in prior art
The method having the second generation identity card of client's loss usurped in identification online place.
Content of the invention
For defect present in prior art, present invention solves the technical problem that being:Existed according to specified online place
All consumption event number of times that in one day, same identification card number occurs, determine that this online place whether there is robber's brush identity card and opens an account
The behavior of online.
For reaching object above, the operational online place that the present invention provides, illegally using the recognition methodss of identity card, is wrapped
Include following steps:
S1:Timing extraction need detect identity card whether usurp online place previous consecutive days history charging number
According to timing cycle is 24 hours, and history metering data includes all consumption event of the netizen's real name internet with identification card number
Data;Using the history metering data of described previous consecutive days as usurping judgement data, go to S2;
S2:Usurp in judgement data all, all consumption event number of times that each identification card number is occurred are united
Meter, goes to S3;
S3:Travel through the consumption event number of times of all identification card numbers, will appear from the identification card number labelling of X above consumption event
For the doubtful identification card number usurped, count number Y of the doubtful identification card number usurped, go to S4;
S4:According to number Y of the doubtful identification card number usurped, determine that current place of surfing the Net whether there is robber's brush identity card and opens
The behavior of family online.
On the basis of technique scheme, extract described in S1 and need to detect the online place whether identity card is usurped
The idiographic flow of the history metering data of previous consecutive days is:Extract the history metering data table in current place of surfing the Net, history meter
Expense tables of data is used for storing the history metering data in current place of surfing the Net in fixed time limit;History metering data table determines and works as
The history metering data of front online place previous consecutive days.
On the basis of technique scheme, the idiographic flow of S4 is:Whether judge Y >=1, if it is determined that on current
Net place exists steals brush identity card and opens an account the behavior of online, otherwise determines that current place of surfing the Net does not exist on robber's brush identity card opens an account
The behavior of net.
On the basis of technique scheme, in S1, one-time-consumption event data includes opening an account and number of settling accounts of one group of association
According to.
What the present invention provided the realize operational online place of said method illegally using the identifying system of identity card, including
Intervalometer, requestor, consumption event enumerator, usurp identity card mark module and threshold-discrimination module;
Intervalometer is used for:Timing sends inquiry signal to requestor, and timing cycle is 24 hours;
Requestor is used for:After receiving inquiry signal, extract and need to detect the previous of the online place whether identity card is usurped
The history metering data of consecutive days, history metering data includes all consumption event of the netizen's real name internet with identification card number
Data;Using the history metering data of described previous consecutive days as usurping judgement data, send consumption to consumption event enumerator
Event count signal;
Consumption event enumerator is used for:After receiving consumption event count signal, usurp in judgement data all, to each
All consumption event number of times that individual identification card number occurs are counted, and usurp identity card mark to usurping the transmission of identity card mark module
Note signal;
Usurp identity card mark module to be used for:Receive after usurping identity card marking signal, travel through disappearing of all identification card numbers
Take event times, the identification card number that will appear from X above consumption event is labeled as the doubtful identification card number usurped, and counts doubtful robber
Number Y of identification card number, judges signal to threshold-discrimination module sending threshold value;
Threshold-discrimination module is used for:After receiving threshold determination signal, according to number Y of the doubtful identification card number usurped, really
Settled front online place whether there is steals brush identity card and opens an account the behavior of online.
On the basis of technique scheme, the specific workflow of described requestor is:Extract the history in online place
Metering data table, history metering data table is used for storing the history metering data in current place of surfing the Net in fixed time limit;In history
The history metering data of current place previous consecutive days of surfing the Net is determined in metering data table.
On the basis of technique scheme, the specific workflow of described threshold-discrimination module is:Whether judge Y >=1,
If the behavior of online it is determined that presence robber's brush identity card in online place is opened an account, otherwise determine that online place does not have robber's brush body
Part demonstrate,proves the behavior of online of opening an account.
On the basis of technique scheme, the one-time-consumption event data in described requestor includes opening of one group of association
Family and checkout data.
Compared with prior art, it is an advantage of the current invention that:
The identity card Limited Number illegally held due to online place owner, these illegal identity cards would generally be in short-term
The frequent degree that interior Reusability, therefore illegal identity card sends consumption event in online place in a short time is often very high.This
Bright exactly using identity card, usage frequency at short notice performs an analysis, statistics specified online place same identification card number in a day
The all consumption event number of times occurring, and then determine that this online place whether there is and steal brush identity card and open an account the behavior of online.
In view of this, compared with living things feature recognition of the prior art cooperation electronic characteristic identification, no matter the present invention gives birth to
Thing feature identification and electronic characteristic identify whether to be cracked, and all can detect whether identity card is stolen.Meanwhile, the present invention
Identification is usurped without the proof procedure relying on identity card during identity card, and then the day-to-day operations activity without interference with online place,
Either online place or user name all will not discover the statistics and analysis process of the present invention;Therefore, the disguise of the present invention is relatively
Good, it is very suitable for promoting.
Brief description
Fig. 1 is for operational online place in the embodiment of the present invention illegally using the flow chart of the recognition methodss of identity card;
Fig. 2 is for operational online place in the embodiment of the present invention illegally using the FB(flow block) of the identifying system of identity card.
Specific embodiment
Below in conjunction with drawings and Examples, the present invention is described in further detail.
Shown in Figure 1, in the embodiment of the present invention operational online place illegally using the recognition methodss of identity card, including
Following steps:
S1:Regularly (timing cycle is 24 hours) extracts the history meter in the online place needing to detect whether identity card is usurped
Take tables of data, history metering data table is used for storing the history metering data in this online place certain time Nei, history charging number
According to the netizen's real name internet including with identification card number all consumption event data (one-time-consumption event data include one group pass
Join opens an account and data of settling accounts);The history charging number of current place previous consecutive days of surfing the Net is determined in history metering data table
According to and as usurping judgement data, go to S2.
S2:Usurp in judgement data all, all consumption event number of times that each identification card number is occurred are united
Meter, goes to S3.
S3:Travel through the consumption event number of times of all identification card numbers, will appear from the identification card number labelling of X above consumption event
For the doubtful identification card number usurped, count number Y of the doubtful identification card number usurped, go to S4.
S4:According to number Y of the doubtful identification card number usurped, determine that current place of surfing the Net whether there is robber's brush identity card and opens
The behavior (if Y >=1, being, be not otherwise) of family online.
Shown in Figure 2, realize the operational online place of said method illegally using identity in the embodiment of the present invention
The identifying system of card, including intervalometer, requestor, consumption event enumerator, usurps identity card mark module and threshold determination mould
Block.
Intervalometer is used for:Timing sends inquiry signal to requestor, and timing cycle is 24 hours.
Requestor is used for:After receiving inquiry signal, extract the history in the online place needing to detect whether identity card is usurped
Metering data table, history metering data table is used for storing the history metering data in this online place certain time Nei, history charging
Data includes all consumption event data of the netizen's real name internet with identification card number, and (one-time-consumption event data includes one group
Associate opens an account and data of settling accounts);The history charging of current place previous consecutive days of surfing the Net is determined in history metering data table
Data as usurping judgement data, sends consumption event count signal to consumption event enumerator.
Consumption event enumerator is used for:After receiving consumption event count signal, usurp in judgement data all, to each
All consumption event number of times that individual identification card number occurs are counted, and usurp identity card mark to usurping the transmission of identity card mark module
Note signal.
Usurp identity card mark module to be used for:Receive after usurping identity card marking signal, travel through disappearing of all identification card numbers
Take event times, the identification card number that will appear from X above consumption event is labeled as the doubtful identification card number usurped, and counts doubtful robber
Number Y of identification card number, judges signal to threshold-discrimination module sending threshold value.
Threshold-discrimination module is used for:After receiving threshold determination signal, according to number Y of the doubtful identification card number usurped, really
Settled front online place whether there is steals brush identity card and opens an account the behavior (if Y >=1, being, be not otherwise) of online.
The present invention is not limited to above-mentioned embodiment, for those skilled in the art, without departing from
On the premise of the principle of the invention, some improvements and modifications can also be made, these improvements and modifications are also considered as the protection of the present invention
Within the scope of.The content not being described in detail in this specification belongs to prior art known to professional and technical personnel in the field.
Claims (8)
1. a kind of operational online place illegally using identity card recognition methodss it is characterised in that the method includes following step
Suddenly:
S1:The history metering data of the previous consecutive days in online place that timing extraction needs to detect whether identity card is usurped, fixed
When the cycle be 24 hours, history metering data includes all consumption event data of the netizen's real name internet with identification card number;
Using the history metering data of described previous consecutive days as usurping judgement data, go to S2;
S2:Usurp in judgement data all, all consumption event number of times that each identification card number is occurred count, and turn
To S3;
S3:Travel through the consumption event number of times of all identification card numbers, the identification card number that will appear from X above consumption event is labeled as doubting
The identification card number seemingly usurped, counts number Y of the doubtful identification card number usurped, goes to S4;
S4:According to number Y of the doubtful identification card number usurped, determine that current place of surfing the Net whether there is and steal on brush identity card opens an account
The behavior of net.
2. as claimed in claim 1 operational online place illegally using identity card recognition methodss it is characterised in that:In S1
Described extraction need detect identity card whether usurp online place the history metering data of previous consecutive days idiographic flow
For:Extract the history metering data table in current place of surfing the Net, history metering data table is used for storing in fixed time limit currently surfs the Net
The history metering data in place;The history charging number of current place previous consecutive days of surfing the Net is determined in history metering data table
According to.
3. as claimed in claim 1 operational online place illegally using identity card recognition methodss it is characterised in that:S4's
Idiographic flow is:Whether judge Y >=1, if the behavior of online it is determined that place presence robber's brush identity card of currently surfing the Net is opened an account,
Otherwise determine that current place of surfing the Net does not exist to steal brush identity card and open an account the behavior of online.
4. the operational online place as described in any one of claims 1 to 3 is illegally using the recognition methodss of identity card, its feature
It is:In S1, one-time-consumption event data includes opening an account and data of settling accounts of one group of association.
5. a kind of operational online place realizing Claims 1-4 any one methods described is illegally using the identification of identity card
System it is characterised in that:This system includes intervalometer, requestor, consumption event enumerator, usurps identity card mark module and threshold
Value determination module;
Intervalometer is used for:Timing sends inquiry signal to requestor, and timing cycle is 24 hours;
Requestor is used for:After receiving inquiry signal, extract the previous nature in the online place needing to detect whether identity card is usurped
The history metering data of day, history metering data includes all consumption event numbers of the netizen's real name internet with identification card number
According to;Using the history metering data of described previous consecutive days as usurping judgement data, send consumption thing to consumption event enumerator
Part count signal;
Consumption event enumerator is used for:After receiving consumption event count signal, usurp in judgement data all, to each body
All consumption event number of times that part card number occurs are counted, and usurp identity card labelling letter to usurping the transmission of identity card mark module
Number;
Usurp identity card mark module to be used for:Receive after usurping identity card marking signal, travel through the consumption thing of all identification card numbers
Piece number, the identification card number that will appear from X above consumption event is labeled as the doubtful identification card number usurped, and statistics is doubtful to be usurped
Number Y of identification card number, judges signal to threshold-discrimination module sending threshold value;
Threshold-discrimination module is used for:After receiving threshold determination signal, according to number Y of the doubtful identification card number usurped, determine and work as
Front online place whether there is steals brush identity card and opens an account the behavior of online.
6. as claimed in claim 5 operational online place illegally using identity card identifying system it is characterised in that:Described
The specific workflow of requestor is:Extract the history metering data table in online place, history metering data table refers to for storage
The history metering data in current place of surfing the Net in periodically limiting;The current previous nature in place of surfing the Net is determined in history metering data table
The history metering data of day.
7. as claimed in claim 5 operational online place illegally using identity card identifying system it is characterised in that:Described
The specific workflow of threshold-discrimination module is:Whether judge Y >=1, if it is determined that presence robber's brush identity card in online place is opened
The behavior of family online, otherwise determines that online place does not exist and steals brush identity card and open an account the behavior of online.
8. the operational online place as described in any one of claim 5 to 7 is illegally using the identifying system of identity card, its feature
It is:One-time-consumption event data in described requestor includes opening an account and data of settling accounts of one group of association.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610827852.7A CN106408756B (en) | 2016-09-18 | 2016-09-18 | A kind of operational online place illegally uses the recognition methods and system of identity card |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610827852.7A CN106408756B (en) | 2016-09-18 | 2016-09-18 | A kind of operational online place illegally uses the recognition methods and system of identity card |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN106408756A true CN106408756A (en) | 2017-02-15 |
| CN106408756B CN106408756B (en) | 2019-07-02 |
Family
ID=57997401
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201610827852.7A Active CN106408756B (en) | 2016-09-18 | 2016-09-18 | A kind of operational online place illegally uses the recognition methods and system of identity card |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN106408756B (en) |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1388481A (en) * | 2001-05-25 | 2003-01-01 | 林义富 | Financial transaction security system and method |
| US20060010487A1 (en) * | 2004-07-09 | 2006-01-12 | Fierer Robert G | System and method of verifying personal identities |
| CN101789113A (en) * | 2010-02-09 | 2010-07-28 | 许晓飞 | Individual consumption record acquisition and query system |
| CN202495090U (en) * | 2012-03-31 | 2012-10-17 | 成都因纳伟盛科技股份有限公司 | Internet cafe management system based on second generation identity card reader |
| CN103123712A (en) * | 2011-11-17 | 2013-05-29 | 阿里巴巴集团控股有限公司 | Method and system for monitoring network behavior data |
-
2016
- 2016-09-18 CN CN201610827852.7A patent/CN106408756B/en active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1388481A (en) * | 2001-05-25 | 2003-01-01 | 林义富 | Financial transaction security system and method |
| US20060010487A1 (en) * | 2004-07-09 | 2006-01-12 | Fierer Robert G | System and method of verifying personal identities |
| CN101789113A (en) * | 2010-02-09 | 2010-07-28 | 许晓飞 | Individual consumption record acquisition and query system |
| CN103123712A (en) * | 2011-11-17 | 2013-05-29 | 阿里巴巴集团控股有限公司 | Method and system for monitoring network behavior data |
| CN202495090U (en) * | 2012-03-31 | 2012-10-17 | 成都因纳伟盛科技股份有限公司 | Internet cafe management system based on second generation identity card reader |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106408756B (en) | 2019-07-02 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN106384273B (en) | Malicious bill-swiping detection system and method | |
| US20120131657A1 (en) | Apparatus and Method for Authenticated Multi-User Personal Information Database | |
| CN102945366A (en) | Method and device for face recognition | |
| CN104637184A (en) | Medical storage control method and system based on human face recognition | |
| WO2019041774A1 (en) | Customer information screening method and apparatus, electronic device, and medium | |
| CN107633573A (en) | The method for unlocking and intelligent door lock of a kind of intelligent door lock | |
| CN104636337B (en) | A kind of data cleansing storage method for value-added tax | |
| CN101739767A (en) | Method and system for processing abnormal operation of self-service terminal | |
| CN106485225A (en) | Identity card checking method and system based on biological nature identification | |
| CN107798448A (en) | The determination methods and device of black list user | |
| CN106789292A (en) | A kind of abnormal behaviour monitoring method and device | |
| CN110659335A (en) | Analysis method for recessive drug addicts | |
| CN102930492A (en) | Method for preventing counterfeiting and illegally using second-generation ID card | |
| CN101699435A (en) | Method for querying and authenticating second-generation ID card based on key information | |
| CN108510396A (en) | It insures method, apparatus, computer equipment and the storage medium of verification | |
| CN103207963A (en) | Two-factor authentication system based on fingerprint and vein recognition | |
| CN203192091U (en) | Automatic teller machine | |
| CN110059671A (en) | A kind of safety inspection method, system, device and computer readable storage medium | |
| CN104965927A (en) | Method and system of verifying identity (ID) cards by using database | |
| Descallar et al. | The association between the incidence of emergency department attendances for alcohol problems and assault incidents attended by police in New South Wales, Australia, 2003–2008: a time–series analysis | |
| CN106408756B (en) | A kind of operational online place illegally uses the recognition methods and system of identity card | |
| CN101702168A (en) | Method for inquiring information based on key information of the second generation identity card | |
| CN102254129A (en) | Identity (ID) card verifying system | |
| CN101840505A (en) | Individual identity identification system | |
| Sullivan | Digital identity–The legal person? |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |